Han-Yu Lin

ORCID: 0000-0003-3657-3241
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Advanced Authentication Protocols Security
  • Complexity and Algorithms in Graphs
  • Cryptography and Residue Arithmetic
  • Cloud Data Security Solutions
  • User Authentication and Security Systems
  • Cryptographic Implementations and Security
  • Privacy-Preserving Technologies in Data
  • Security in Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • graph theory and CDMA systems
  • Advanced Steganography and Watermarking Techniques
  • Color perception and design
  • Augmented Reality Applications
  • Spatial Cognition and Navigation
  • Robotic Path Planning Algorithms
  • Robotics and Automated Systems
  • Internet Traffic Analysis and Secure E-voting
  • Access Control and Trust
  • DNA and Biological Computing
  • Biometric Identification and Security
  • Ergonomics and Musculoskeletal Disorders
  • Mobile Health and mHealth Applications
  • Digital Media Forensic Detection

China Mobile (China)
2024

National Taiwan Ocean University
2015-2024

Feng Chia University
2011-2024

Fuzhou University
2023

Southeast University
2018

Tunghai University
2013-2018

National Kaohsiung Normal University
2007-2015

Institute for Information Industry
2012

Chang Gung University
2011

Kainan University
2011

10.1007/s10207-013-0216-7 article EN International Journal of Information Security 2013-11-01

10.1016/j.cnsns.2014.05.027 article EN Communications in Nonlinear Science and Numerical Simulation 2014-06-19

In the fog computing architecture, a is node closer to clients and responsible for responding users’ requests as well forwarding messages clouds. some medical applications such remote healthcare, sensor of patients will first send encrypted data sensed information nearby that acting re-encryption proxy could generate re-encrypted ciphertext designated requested users in cloud. Specifically, user can request access cloud ciphertexts by sending query forward this corresponding owner who...

10.3390/s23052706 article EN cc-by Sensors 2023-03-01

10.1007/s11277-014-1829-5 article EN Wireless Personal Communications 2014-05-08

10.1007/s10798-015-9302-7 article EN International Journal of Technology and Design Education 2015-02-18

Population aging is currently a tough problem of many countries. How to utilize modern technologies (including both information and medical technologies) improve the service quality health an important issue. Personal Health Record (PHR) could be regarded as kind records individuals. A ciphertext policy attribute-based encryption (CP-ABE) cryptographic primitive for fine-grained access control outsourced data in clouds. In order enable patients effectively store his PHR clouds, we propose...

10.3390/app11010063 article EN cc-by Applied Sciences 2020-12-23

10.1016/j.camwa.2010.07.015 article EN publisher-specific-oa Computers & Mathematics with Applications 2010-08-08

With the development of information technology and medical technology, developed countries have been establish organization to set standard for electronic records in response new generation on application, they gradually develop emerging exchange mode, Personal Health Records (PHR). PHR can integrate different kind personal health records. Internet or portable device, offers integrity accuracy Through records, we evaluate quality care, provide continued care patients, promote efficiency...

10.1109/icpp.2013.127 article EN 2013-10-01

IoT-based data outsourcing services in clouds could be regarded as a new trend recent years, they reduce the hardware and software cost for enterprises obtain higher flexibility. To securely transfer an encrypted message cloud, so-called proxy re-encryption scheme is better alternative. In such schemes, ciphertext designated aggregation able to re-encrypted one another by semi-trusted without decryption. this paper, we introduce secure protocol clouds. The proposed provably assuming hardness...

10.3390/s21010067 article EN cc-by Sensors 2020-12-24

Certificateless public key cryptography is a commonly adopted implementation system to solve problems of key-escrow and untrusted authority. strong designated verifier signatures (CL-SDVSs) are special variations digital signatures, since their authenticity can only be convinced by verifier. To offer this functionality, most CL-SDVS mechanisms use shared secret between signer However, Shim points out that the leakage common values will inevitably delegate signing capability any third party....

10.1109/access.2018.2809437 article EN cc-by-nc-nd IEEE Access 2018-01-01

In this paper, we first present the concept of a "fair" password authentication system which means that when user provides is unable to pass authentication, capable taking step ahead detect and determine real cause failure, whether it was user's own problem or files had already been tampered with damaged. Then, based on theory quadratic residue computational difficulty solving integer factorization problem, propose "simple" fair dynamic (meaning different dynamically created each time he...

10.1109/aimsec.2011.6010603 article EN 2011-08-01

10.1016/j.jnca.2011.06.005 article EN Journal of Network and Computer Applications 2011-06-26

For securing confidential applications such as credit card transactions, on-line auctions and business contract signing, etc., a convertible authenticated encryption (CAE) scheme simultaneously satisfying the properties of authenticity, confidentiality non-repudiation is better choice. By combining advantages identity-based systems key-insulated ones, in this paper, we propose first novel CAE (IB-KICAE) from pairings. Integrating with systems, our can effectively mitigate impact caused by...

10.1142/s0129054111008325 article EN International Journal of Foundations of Computer Science 2011-04-01

Anonymous authentication with key exchange is an important technique for any subject who attempts to access sensitive cloud services without compromising his/her identity. However, most so-called anonymous schemes, also known as dynamic protocols, only consider and offer preauthentication anonymity resist ID-theft attacks. This motivates the author propose a new scheme achieving both postauthentication user anonymity. By using registered security token hardware together rememberable...

10.1109/jsyst.2018.2828022 article EN IEEE Systems Journal 2018-09-14

This research focuses on designing and structuring a smart healthcare system for college students in Taiwan. It is expected to utilize the method of technology assisting controlling their dietaries physical activities by establishing an interactive healthy diet evaluation system. Due rapid development phone applications, users can easily record dietary contents, nutrients, exercise process anyplace anywhere. contains module module. automatically supply proposal with accordance users' basic...

10.1109/access.2018.2881996 article EN cc-by-nc-nd IEEE Access 2018-01-01
Coming Soon ...