What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chun-I Fan
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiajcis
A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method.
Ayako Sasaki
Takeshi Takahashi
Keisuke Furumoto
Chun-I Fan
Tomohiro Morikawa
2024
conf/wisa
PUF-Based Authentication and Authorization Protocol for IoT.
Yu-Tse Shih
Shih-Ming Huang
Chun-I Fan
2024
conf/wisa
Fuzzing JavaScript Engines with Diversified Mutation Strategies.
Cheng-Han Shie
Pin-Huang Fang
Chun-I Fan
2022
journals/istr
Fast keyword search over encrypted data with short ciphertext in clouds.
Yi-Fan Tseng
Chun-I Fan
Zi-Cheng Liu
2022
conf/asiajcis
Message from the General Co-Chairs: AsiaJCIS 2022.
Dingyi Pei
Koji Nakao
Heung Youl Youm
Chun-I Fan
2021
journals/istr
Reliable file transfer protocol with producer anonymity for Named Data Networking.
Chun-I Fan
Arijit Karati
Pei-Shan Yang
2020
journals/tifs
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications.
Chun-I Fan
Jheng-Jia Huang
Min-Zhe Zhong
Ruei-Hau Hsu
Wen-Tsuen Chen
Jemin Lee
2020
conf/asiajcis
Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map.
Chun-I Fan
Yi-Fan Tseng
Yen-Lin Huang
2020
conf/asiajcis
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing.
Ruei-Hau Hsu
Yi-Cheng Wang
Chun-I Fan
Bo Sun
Tao Ban
Takeshi Takahashi
Ting-Wei Wu
Shang-Wei Kao
2018
conf/asiajcis
Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem.
Chun-I Fan
Yi-Fan Tseng
Cheng-Yuan E
Jheng-Jia Huang
2016
conf/asiajcis
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares.
Hiroaki Kikuchi
Hideo Yasunaga
Hiroki Matsui
Chun-I Fan
2015
conf/asiajcis
Attribute-Based Proxy Re-encryption with Dynamic Membership.
Chun-I Fan
Chien-Nan Wu
Chun-Hung Chen
Yi-Fan Tseng
Cheng-Chun Feng
2015
conf/asiajcis
A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments.
Jheng-Jia Huang
Wen-Shenq Juang
Chun-I Fan
2015
conf/asiajcis
Encrypted Data Deduplication in Cloud Storage.
Chun-I Fan
Shi-Yuan Huang
Wen-Che Hsu
2014
conf/asiajcis
Strongly Privacy-Preserving Communication Protocol for VANETs.
Chun-I Fan
Wei-Zhe Sun
Shih-Wei Huang
Wen-Shenq Juang
Jheng-Jia Huang
2014
conf/asiajcis
Anonymous Credential Scheme Supporting Active Revocation.
Chun-I Fan
Chien-Nan Wu
Jen-Chun Hsu
Yi-Fan Tseng
Wen-Tsuen Chen
2013
conf/asiajcis
Secure Certificateless Signature Scheme Supporting Batch Verification.
Chun-I Fan
Pei-Hsiu Ho
Jheng-Jia Huang
Yi-Fan Tseng
2013
conf/asiajcis
Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Chi-Yao Weng
Cheng-Hsing Yang
Chun-I Fan
Kuan-Liang Liu
Hung-Min Sun
2011
conf/cans
Group Signature with Constant Revocation Costs for Signers and Verifiers.
Chun-I Fan
Ruei-Hau Hsu
Mark Manulis
2009
journals/tifs
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics.
Chun-I Fan
Yi-Hui Lin
2007
conf/iwsec
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications.
Chun-I Fan
Vincent Shi-Ming Huang
2005
journals/compsec
Robust remote authentication scheme with smart cards.
Chun-I Fan
Yung-Cheng Chan
Zhi-Kai Zhang
1996
conf/asiacrypt
A Multi-Recastable Ticket Scheme for Electronic Elections.
Chun-I Fan
Chin-Laung Lei
Coauthors
Arijit Karati
(1)
Ayako Sasaki
(1)
Bo Sun
(1)
Cheng-Chun Feng
(1)
Cheng-Han Shie
(1)
Cheng-Hsing Yang
(1)
Cheng-Yuan E
(1)
Chi-Yao Weng
(1)
Chien-Nan Wu
(2)
Chin-Laung Lei
(1)
Chun-Hung Chen
(1)
Chun-I Fan
(23)
Dingyi Pei
(1)
Heung Youl Youm
(1)
Hideo Yasunaga
(1)
Hiroaki Kikuchi
(1)
Hiroki Matsui
(1)
Hung-Min Sun
(1)
Jemin Lee
(1)
Jen-Chun Hsu
(1)
Jheng-Jia Huang
(5)
Keisuke Furumoto
(1)
Koji Nakao
(1)
Kuan-Liang Liu
(1)
Mark Manulis
(1)
Min-Zhe Zhong
(1)
Pei-Hsiu Ho
(1)
Pei-Shan Yang
(1)
Pin-Huang Fang
(1)
Ruei-Hau Hsu
(3)
Shang-Wei Kao
(1)
Shi-Yuan Huang
(1)
Shih-Ming Huang
(1)
Shih-Wei Huang
(1)
Takeshi Takahashi
(2)
Tao Ban
(1)
Ting-Wei Wu
(1)
Tomohiro Morikawa
(1)
Vincent Shi-Ming Huang
(1)
Wei-Zhe Sun
(1)
Wen-Che Hsu
(1)
Wen-Shenq Juang
(2)
Wen-Tsuen Chen
(2)
Yen-Lin Huang
(1)
Yi-Cheng Wang
(1)
Yi-Fan Tseng
(6)
Yi-Hui Lin
(1)
Yu-Tse Shih
(1)
Yung-Cheng Chan
(1)
Zhi-Kai Zhang
(1)
Zi-Cheng Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to