default search action
Ching-Fang Hsu 0001
Person information
- affiliation: Central China Normal University, Computer School, Wuhan, China
- affiliation (PhD 2010): Huazhong University of Science and Technology, Wuhan, China
Other persons with the same name
- Ching-Fang Hsu (aka: Chingfang Hsu) — disambiguation page
- Ching-Fang Hsu 0002 — National Cheng Kung University, Department of Computer Science and Information Engineering, Taiwan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Ching-Fang Hsu, Zhe Xia, Tianshu Cheng, Lein Harn:
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G. Comput. J. 67(3): 840-850 (2024) - [j47]Ze Zhang, Chingfang Hsu, Man Ho Au, Lein Harn, Jianqun Cui, Zhe Xia, Zhuo Zhao:
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones. Comput. Networks 238: 110118 (2024) - [j46]Zhuo Zhao, Ching-Fang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang, Liu Liu:
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones. Cybersecur. 7(1): 50 (2024) - [j45]Liu Liu, Ching-Fang Hsu, Man Ho Au, Lein Harn, Jianqun Cui, Zhuo Zhao:
A revocable and comparable attribute-based signature scheme from lattices for IoMT. J. Syst. Archit. 154: 103222 (2024) - [j44]Shuchang Zeng, Ching-Fang Hsu, Lein Harn, Yi-Ning Liu, Yang Liu:
Efficient and Privacy-Preserving Skyline Queries Over Encrypted Data Under a Blockchain-Based Audit Architecture. IEEE Trans. Knowl. Data Eng. 36(9): 4603-4617 (2024) - 2023
- [j43]Chingfang Hsu, Lein Harn, Zhe Xia, Jianqun Cui, Jingxue Chen:
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks. Comput. J. 66(1): 208-220 (2023) - [j42]Lein Harn, Ching-Fang Hsu, Zhe Xia, Zixuan Li:
Multiple Blind Signature for e-Voting and e-Cash. Comput. J. 66(10): 2331-2338 (2023) - [j41]Ching-Fang Hsu, Zhe Xia, Lein Harn, Man Ho Au, Jianqun Cui, Zhuo Zhao:
Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities. Inf. Sci. 647: 119488 (2023) - [j40]Lein Harn, Chingfang Hsu, Zhe Xia, Hang Xu, Shuchang Zeng, Fengling Pang:
Simple and efficient threshold changeable secret sharing. J. Inf. Secur. Appl. 77: 103576 (2023) - [j39]Linyan Bai, Ching-Fang Hsu, Lein Harn, Jianqun Cui, Zhuo Zhao:
A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments. IEEE Trans. Dependable Secur. Comput. 20(4): 3535-3545 (2023) - [j38]Hang Xu, Ching-Fang Hsu, Lein Harn, Jianqun Cui, Zhuo Zhao, Ze Zhang:
Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things. IEEE Trans. Serv. Comput. 16(4): 3000-3013 (2023) - [j37]Ching-Fang Hsu, Lein Harn, Zhe Xia, Zhuo Zhao, Hang Xu:
Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT. Wirel. Pers. Commun. 129(4): 2403-2417 (2023) - [j36]Hongyu Wang, Ching-Fang Hsu, Lein Harn:
A Lightweight and Robust Stream Cipher Based on PI for Intelligent Transportation Systems. Wirel. Pers. Commun. 130(3): 1661-1675 (2023) - [c3]Fengling Pang, Chingfang Hsu, Man Ho Au, Lein Harn, Ze Zhang, Li Long:
Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments. TrustCom 2023: 849-856 - 2022
- [j35]Lein Harn, Chingfang Hsu, Zhe Xia:
A novel threshold changeable secret sharing scheme. Frontiers Comput. Sci. 16(1): 161807 (2022) - [j34]Chingfang Hsu, Lein Harn, Zhe Xia, Linyan Bai, Ze Zhang:
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments. J. Cloud Comput. 11: 89 (2022) - [j33]Quanrun Li, Min Luo, Chingfang Hsu, Lianhai Wang, Debiao He:
A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices. IEEE Syst. J. 16(3): 4816-4826 (2022) - [j32]Lein Harn, Chingfang Hsu, Zhe Xia:
General logic-operation-based lightweight group-key distribution schemes for Internet of Vehicles. Veh. Commun. 34: 100457 (2022) - 2021
- [j31]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Zhuo Zhao:
Non-interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks. IET Commun. 15(2): 328-336 (2021) - [j30]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Quanrun Li:
Design of ideal secret sharing based on new results on representable quadripartite matroids. J. Inf. Secur. Appl. 58: 102724 (2021) - [j29]Lein Harn, Zhe Xia, Chingfang Hsu:
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks. Peer-to-Peer Netw. Appl. 14(2): 722-728 (2021) - [j28]Zhuo Zhao, Chingfang Hsu, Lein Harn, Qing Yang, Lulu Ke:
Lightweight Privacy-Preserving Data Sharing Scheme for Internet of Medical Things. Wirel. Commun. Mob. Comput. 2021: 8402138:1-8402138:13 (2021) - [j27]Lein Harn, Chingfang Hsu, Zhe Xia:
Lightweight and flexible key distribution schemes for secure group communications. Wirel. Networks 27(1): 129-136 (2021) - 2020
- [j26]Qi Cheng, Ching-Fang Hsu, Zhe Xia, Lein Harn:
Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN. IEEE Access 8: 71833-71839 (2020) - [j25]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang:
Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir's SS for 5G Networks. IEEE Access 8: 203965-203971 (2020) - [j24]Lein Harn, Chingfang Hsu, Zhe Xia:
Lightweight group key distribution schemes based on pre-shared pairwise keys. IET Commun. 14(13): 2162-2165 (2020) - [j23]Lein Harn, Zhe Xia, Ching-Fang Hsu, Yining Liu:
Secret sharing with secure secret reconstruction. Inf. Sci. 519: 1-8 (2020) - [j22]Zhe Xia, Yining Liu, Ching-Fang Hsu, Chinchen Chang:
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications. Secur. Commun. Networks 2020: 6183861:1-6183861:8 (2020) - [j21]Ching-Fang Hsu, Lein Harn, Bing Zeng:
UMKESS: user-oriented multi-group key establishments using secret sharing. Wirel. Networks 26(1): 421-430 (2020)
2010 – 2019
- 2019
- [j20]Quanrun Li, Ching-Fang Hsu, Kim-Kwang Raymond Choo, Debiao He:
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. Secur. Commun. Networks 2019: 7871067:1-7871067:13 (2019) - [j19]Zhe Xia, Yi-Ning Liu, Ching-Fang Hsu, Chin-Chen Chang:
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials. Symmetry 11(1): 88 (2019) - 2018
- [j18]Lein Harn, Ching-Fang Hsu, Bohan Li:
Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party. Mob. Networks Appl. 23(5): 1132-1140 (2018) - 2017
- [j17]Lein Harn, Ching-Fang Hsu:
A Practical Hybrid Group Key Establishment for Secure Group Communications. Comput. J. 60(11): 1582-1589 (2017) - [j16]Lein Harn, Ching-Fang Hsu, Zhe Xia, Junwei Zhou:
How to Share Secret Efficiently over Networks. Secur. Commun. Networks 2017: 5437403:1-5437403:6 (2017) - [j15]Lein Harn, Ching-Fang Hsu:
A Novel Design of Membership Authentication and Group Key Establishment Protocol. Secur. Commun. Networks 2017: 8547876:1-8547876:7 (2017) - [j14]Ching-Fang Hsu, Lein Harn, Yi Mu, Maoyuan Zhang, Xuan Zhu:
Computation-efficient key establishment in wireless group communications. Wirel. Networks 23(1): 289-297 (2017) - [j13]Lein Harn, Ching-Fang Hsu:
(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial. Wirel. Pers. Commun. 95(2): 1495-1504 (2017) - [j12]Lein Harn, Ching-Fang Hsu:
A Novel Threshold Cryptography with Membership Authentication and Key Establishment. Wirel. Pers. Commun. 97(3): 3943-3950 (2017) - 2016
- [j11]Lein Harn, Ching-Fang Hsu, Mingwu Zhang, Tingting He, Maoyuan Zhang:
Realizing secret sharing with general access structure. Inf. Sci. 367-368: 209-220 (2016) - [j10]Yining Liu, Wei Guo, Chi Cheng, Ching-Fang Hsu, Junyan Qian, Changlu Lin:
A Robust Electronic Voting Scheme Against Side Channel Attack. J. Inf. Sci. Eng. 32(6): 1471-1486 (2016) - 2015
- [j9]Lein Harn, Ching-Fang Hsu:
Dynamic threshold secret reconstruction and its application to the threshold cryptography. Inf. Process. Lett. 115(11): 851-857 (2015) - [j8]Ching-Fang Hsu, Shan Wu, Lein Harn:
New Results on Ideal Multipartite Secret Sharing and its Applications to Group Communications. Wirel. Pers. Commun. 82(1): 283-292 (2015) - 2014
- [j7]Ching-Fang Hsu, Bing Zeng, Maoyuan Zhang:
A novel group key transfer for big data security. Appl. Math. Comput. 249: 436-443 (2014) - [j6]Ching-Fang Hsu, Bing Zeng, Guohua Cui, Liang Chen:
A New Secure Authenticated Group Key Transfer Protocol. Wirel. Pers. Commun. 74(2): 457-467 (2014) - [j5]Ching-Fang Hsu, Lein Harn, Guohua Cui:
An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs. Wirel. Pers. Commun. 77(1): 383-394 (2014) - [j4]Ching-Fang Hsu, Lein Harn:
Multipartite Secret Sharing Based on CRT. Wirel. Pers. Commun. 78(1): 271-282 (2014) - [c2]Ching-Fang Hsu, Shan Wu:
Analysis of VMSS Schemes for Group Key Transfer Protocol. NPC 2014: 555-558 - 2013
- [j3]Ching-Fang Hsu, Bing Zeng, Qi Cheng:
A label graph based verifiable secret sharing scheme for general access structures. J. Commun. Networks 15(4): 407-410 (2013) - 2012
- [i4]Ching-Fang Hsu, Bing Zeng, Qi Cheng, Guohua Cui:
A novel Group Key Transfer Protocol. IACR Cryptol. ePrint Arch. 2012: 43 (2012) - 2011
- [j2]Ching-Fang Hsu, Qi Cheng, Xueming Tang, Bing Zeng:
An ideal multi-secret sharing scheme based on MSP. Inf. Sci. 181(7): 1403-1409 (2011) - [j1]Ching-Fang Hsu, Guohua Cui, Qi Cheng, Jing Chen:
A novel linear multi-secret sharing scheme for group communication in wireless mesh networks. J. Netw. Comput. Appl. 34(2): 464-468 (2011) - 2010
- [i3]Bing Zeng, Xueming Tang, Ching-Fang Hsu:
A Framework For Fully-Simulatable h-Out-Of-n Oblivious Transfer. CoRR abs/1005.0043 (2010) - [i2]Bing Zeng, Xueming Tang, Ching-Fang Hsu:
A Framework For Fully-Simulatable h-Out-Of-n Oblivious Transfer. IACR Cryptol. ePrint Arch. 2010: 199 (2010) - [i1]Ching-Fang Hsu, Qi Cheng:
On Representable Matroids and Ideal Secret Sharing. IACR Cryptol. ePrint Arch. 2010: 232 (2010)
2000 – 2009
- 2009
- [c1]Qi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu:
On Non-representable Secret Sharing Matroids. ISPEC 2009: 124-135
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint