Follow
Tso Raylin
Tso Raylin
Verified email at cs.nccu.edu.tw
Title
Cited by
Cited by
Year
Decentralized E-voting systems based on the blockchain technology
JH Hsiao, R Tso, CM Chen, ME Wu
Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 17, 305-309, 2018
1162018
PKE-AET: public key encryption with authorized equality test
K Huang, R Tso, YC Chen, SMM Rahman, A Almogren, A Alamri
The Computer Journal 58 (10), 2686-2697, 2015
972015
Strongly secure certificateless short signatures
R Tso, X Huang, W Susilo
Journal of Systems and Software 85 (6), 1409-1417, 2012
862012
Efficient and short certificateless signature
R Tso, X Yi, X Huang
Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008
692008
Distributed E-voting and E-bidding systems based on smart contract
R Tso, ZY Liu, JH Hsiao
Electronics 8 (4), 422, 2019
642019
Efficient and short certificateless signatures secure against realistic adversaries
R Tso, X Yi, X Huang
the Journal of Supercomputing 55, 173-191, 2011
622011
Malware image classification using one-shot learning with siamese networks
SC Hsiao, DY Kao, ZY Liu, R Tso
Procedia Computer Science 159, 1863-1871, 2019
582019
Efficient ID-based digital signatures with message recovery
R Tso, C Gu, T Okamoto, E Okamoto
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
552007
Certificateless aggregate signature with efficient verification
YC Chen, R Tso, M Mambo, K Huang, G Horng
Security and Communication Networks 8 (13), 2232-2243, 2015
502015
Multi-dimensional quantum state sharing based on quantum Fourier transform
H Qin, R Tso, Y Dai
Quantum Information Processing 17, 1-12, 2018
432018
Analyzing WannaCry ransomware considering the weapons and exploits
KAO Da-Yu, SC Hsiao, TSO Raylin
2019 21st International Conference on Advanced Communication Technology …, 2019
412019
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
TY Wu, Z Lee, L Yang, JN Luo, R Tso
The Journal of Supercomputing 77 (7), 6992-7020, 2021
402021
Public-key authenticated encryption with keyword search: Cryptanalysis, enhanced security, and quantum-resistant instantiation
ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen
Proceedings of the 2022 ACM on Asia conference on computer and …, 2022
392022
One-way and two-party authenticated ID-based key agreement protocols using pairing
T Okamoto, R Tso, E Okamoto
Modeling Decisions for Artificial Intelligence: Second International …, 2005
392005
A commutative encryption scheme based on ElGamal encryption
K Huang, R Tso
2012 International Conference on Information Security and Intelligent …, 2012
382012
Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud
R Tso, A Alelaiwi, SM Mizanur Rahman, ME Wu, MS Hossain
Journal of Signal Processing Systems 89, 51-59, 2017
352017
On the improvement of Fermat factorization using a continued fraction technique
ME Wu, R Tso, HM Sun
Future Generation Computer Systems 30, 162-168, 2014
332014
Hierarchical quantum secret sharing based on special high-dimensional entangled state
H Qin, WKS Tang, R Tso
IEEE Journal of Selected Topics in Quantum Electronics 26 (3), 1-6, 2020
302020
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption
K Huang, R Tso, YC Chen
Journal of Computer and System Sciences 89, 400-409, 2017
252017
ID-Based group password-authenticated key exchange
X Yi, R Tso, E Okamoto
Advances in Information and Computer Security: 4th International Workshop on …, 2009
242009
The system can't perform the operation now. Try again later.
Articles 1–20