Prof. Yuh-Min Tseng
National Changhua University of Education, China
Email: ymtseng@cc.ncue.edu.tw
Qualifications
1999 Ph.D., National Chung-Hsing University, China
1990 M.Sc., National Taiwan University, China
1988 B.Sc., National Chiao-Tung University, China
Publications
(Selected)
-
T.Y. Wu, Y.M. Tseng and T.T. Tsai, “A revocable ID-based authenticated
group key exchange protocol with resistant to malicious participants”, Computer
Networks, Vol. 56, No. 12, pp. 2994-3006, 2012.
-
Y.M. Tseng, C.H. Yu and T.Y. Wu, "Towards scalable key management
for secure multicast communication", Information Technology and Control,
Vol. 41, No. 2, pp. 173-182, 2012.
-
T.Y. Wu and Y.M. Tseng, “Further analysis of pairing-based traitor
tracing schemes for broadcast encryption”, Security and Communication Networks,
Accepted, 2012. (Corresponding author) (SCI).
-
Y.M. Tseng and T.T. Tsai, “Efficient revocable ID-based encryption with a
public channel”, The Computer Journal, Vol. 55, No. 4, pp. 475-486, 2012.
(Corresponding author) (SCI, EI).
-
C.L. Chen, C.C. Lee, Y.M. Tseng and T.T. Chou, “A private online system
for executing wills based on a secret sharing mechanism”, Security and
Communication Networks, Vol. 5, No. 7, pp. 725-737, 2012. (SCI).
-
T.Y. Wu and Y.M. Tseng, “Towards ID-based authenticated group key
exchange protocol with identifying malicious participants”, Informatica, Vol.
23, No. 2, pp. 315-334, 2012. (Corresponding author) (SCI, EI).
-
Y.H. Chuang, Y.M. Tseng and C.-L. Lei, “Efficient mutual authentication
and key agreement with user anonymity for roaming services in global mobility
networks”, International Journal of Innovative Computing Information and
Control, Vol. 8, No. 9, pp. 6415-6428, 2012. (SCI, EI).
-
Y.H. Chuang and Y.M. Tseng, “Towards generalized ID-based user
authentication for mobile multi-server environment”, International Journal of
Communication Systems, Vol. 25, No. 4, pp. 447-460, 2012. (Corresponding
author) (SCI).
-
T.Y. Wu, Y.M. Tseng and C.W. Yu, “ID-based key-insulated signature scheme
with batch verifications and its novel application”, International Journal of
Innovative Computing Information and Control, Vol. 8, No. 7(A), pp. 4797-4810,
2012. (Corresponding author) (SCI, EI).
-
T.Y. Wu, Y.M. Tseng and C.W. Yu, “Two-round contributory group key
exchange protocol for wireless network environments”, EURASIP Journal on
Wireless Communications and Networking, 2011:12, 2011. (Corresponding author)
(SCI, EI).
-
T.Y. Wu, Y.M. Tseng and C.W. Yu, “A secure ID-based authenticated group
key exchange protocol resistant to insider attacks”, Journal of Information Science
and Engineering, Vol. 27, No. 3, pp. 915-932, 2011. (Corresponding author)
(SCI, EI).
-
Y.M. Tseng and F.G. Chen, “A free-rider aware reputation system for
peer-to-peer file sharing networks”, Expert Systems with Applications, Vol. 38,
No. 3, pp. 2432-2440, 2011. (SCI, EI).
-
T.Y. Wu and Y.M. Tseng, “A pairing-based publicly verifiable secret
sharing scheme”, Journal of Systems Science and Complexity, Vol. 24, No. 1, pp.
186-194, 2011. ( Corresponding author) (SCI).
-
T.C. Yeh, C.H. Wu, and Y.M. Tseng, “Improvement of the RFID
authentication scheme based on quadratic residue”, Computer Communications,
Vol. 34, No. 3, pp. 337-341, 2011. (SCI, EI).
-
T.Y. Wu and Y.M. Tseng, “An efficient user authentication and key
exchange protocol for mobile client-server environment”, Computer Networks,
Vol. 54, No. 9, pp. 1520-1530, 2010. ( Corresponding author) (SCI, EI).
-
T.Y. Wu and Y.M. Tseng, “An ID-based mutual authentication and key
exchange protocol for low-power mobile devices”, The Computer Journal, Vol. 53,
No. 7, pp. 1062-1070, 2010. ( Corresponding author) (SCI, EI).
-
Y.M. Tseng and T.Y. Wu, “Analysis and improvement on a contributory group
key exchange protocol based on the Diffie-Hellman technique”, Informatica, Vol.
21, No. 2, pp. 247-258, 2010. (SCI, EI).
-
Y.H. Chuang and Y.M. Tseng, "An efficient dynamic group key
agreement protocol for imbalanced wireless networks", International
Journal of Network Management, Vol. 20, No. 4, pp. 167-180, 2010. (
Corresponding author) (SCI, EI).
-
Y.M. Tseng and T.Y. Wu, “A novel convinced Diffie-Hellman computation
scheme and its cryptographic application”, ICCSA 2010, Lecture Note in Computer
Science, LNCS 6019, pp. 225-235, Springer-Verlag, 2010. (EI).
-
T.Y. Wu and Y.M. Tseng, “Comments on an ID-based authenticated group key
agreement protocol with withstanding insider attacks”, IEICE Trans. on
Fundamentals of Electronics, Communications of Computer, Vol.E92-A, No.10, pp.
2638-2640, 2009. ( Corresponding author) (SCI, EI).
-
Y.M. Tseng, T.Y. Wu and J.D. Wu, “An efficient and provably secure
ID-based signature scheme with batch verifications”, International Journal of
Innovative Computing, Information and Control, Vol. 5, No. 11, pp.3911-3922,
2009.
-
Y.M. Tseng, “USIM-based EAP-TLS authentication protocol for wireless
local area networks", Computer Standards & Interfaces, Vol. 31, No. 1,
pp.128-136, 2009. (SCI, EI).
-
T.Y. Wu and Y.M. Tseng, “An efficient user authentication and key
exchange protocol for mobile client-server environment’, Computer Networks, Accepted,
200.
-
Y.M. Tseng and J.K. Jan, "Improved group signature scheme based on
the discrete logarithm problem", IEE Electronics Letters, Vol. 35, No. 1,
pp. 37-38, 1999. (SCI, EI).
Profile Details
https://cc2.ncue.edu.tw/~ymtseng/tseng_english.html