Follow
Chun-I Fan
Chun-I Fan
Distinguished Professor, National Sun Yat-sen University
Verified email at mail.cse.nsysu.edu.tw - Homepage
Title
Cited by
Cited by
Year
Privacy-enhanced data aggregation scheme against internal attackers in smart grid
CI Fan, SY Huang, YL Lai
IEEE Transactions on Industrial informatics 10 (1), 666-675, 2013
2532013
A practical privacy-preserving data aggregation (3PDA) scheme for smart grid
Y Liu, W Guo, CI Fan, L Chang, C Cheng
IEEE Transactions on Industrial Informatics 15 (3), 1767-1774, 2018
2482018
Robust remote authentication scheme with smart cards
CI Fan, YC Chan, ZK Zhang
Computers & Security 24 (8), 619-628, 2005
2182005
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
CI Fan, YH Lin
IEEE Transactions on Information Forensics and Security 4 (4), 933-945, 2009
2032009
Anonymous multireceiver identity-based encryption
CI Fan, LY Huang, PH Ho
IEEE Transactions on Computers 59 (9), 1239-1249, 2010
1552010
Malware detection systems based on API log data mining
CI Fan, HW Hsiao, CH Chou, YF Tseng
2015 IEEE 39th annual computer software and applications conference 3, 255-260, 2015
1042015
Low-computation partially blind signatures for electronic cash
CI Fan, CL Lei
IEICE Transactions on Fundamentals of Electronics, Communications and …, 1998
931998
Randomization enhanced Chaum's blind signature scheme
CI Fan, WK Chen, YS Yeh
Computer Communications 23 (17), 1677-1680, 2000
812000
Arbitrary-state attribute-based encryption with dynamic membership
CI Fan, VSM Huang, HM Ruan
IEEE Transactions on Computers 63 (8), 1951-1961, 2013
762013
Provably secure randomized blind signature scheme based on bilinear pairing
CI Fan, WZ Sun, VSM Huang
Computers & Mathematics with Applications 60 (2), 285-293, 2010
652010
Efficient blind signature scheme based on quadratic residues
CI Fan, CL Lei
Electronics Letters 32 (9), 811-813, 1996
641996
A privacy-preserving federated learning system for android malware detection based on edge computing
RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao
2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020
602020
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage
CI Fan, SY Huang
Future Generation Computer Systems 29 (7), 1716-1724, 2013
572013
Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices
A Karati, CI Fan, RH Hsu
IEEE Internet of Things Journal 6 (6), 10431-10440, 2019
562019
An extended multi-server-based user authentication and key agreement scheme with user anonymity
CT Li, CC Lee, CY Weng, CI Fan
KSII Transactions on Internet and Information Systems (TIIS) 7 (1), 119-131, 2013
542013
User efficient blind signatures
CI Fan, CL Lei
Electronics letters 34 (6), 544-546, 1998
531998
Hybrid data deduplication in cloud environment
CI Fan, SY Huang, WC Hsu
2012 International Conference on Information Security and Intelligent …, 2012
402012
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings.
CI Fan, RH Hsu, PH Ho
J. Inf. Sci. Eng. 27 (3), 969-982, 2011
402011
User efficient recoverable off-line e-cash scheme with fast anonymity revoking
CI Fan, VSM Huang, YC Yu
Mathematical and Computer Modelling 58 (1-2), 227-237, 2013
392013
Complete EAP method: User efficient and forward secure authentication protocol for IEEE 802.11 wireless LANs
CI Fan, YH Lin, RH Hsu
IEEE transactions on parallel and distributed systems 24 (4), 672-680, 2012
382012
The system can't perform the operation now. Try again later.
Articles 1–20