Jen-Chieh Hsu

ORCID: 0009-0007-7412-3870
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cryptographic Implementations and Security
  • Complexity and Algorithms in Graphs
  • Cloud Data Security Solutions
  • Indoor and Outdoor Localization Technologies
  • Underwater Vehicles and Communication Systems
  • Security in Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Advanced Authentication Protocols Security
  • Wireless Networks and Protocols
  • Nanocluster Synthesis and Applications
  • Cryptography and Residue Arithmetic
  • User Authentication and Security Systems
  • Advanced biosensing and bioanalysis techniques
  • Energy Efficient Wireless Sensor Networks
  • Coding theory and cryptography
  • VLSI and Analog Circuit Testing
  • Quantum Computing Algorithms and Architecture
  • Quantum Dots Synthesis And Properties
  • Internet Traffic Analysis and Secure E-voting
  • Petri Nets in System Modeling

National Chengchi University
2018-2024

National Taiwan University of Science and Technology
2012-2017

We report the effect of initial Ag : In stoichiometry, capping ligand concentration, and reaction temperature on optical properties (such as photoluminescence [PL] quantum yield, PL full width at half-maximum, wavelength maximum emission) AgInS2 dots (QDs). The fabricated QDs exhibit excellent characteristics, including yields up to 22% appearance an excitonic absorption peak. This is first reported observation such a well-defined exciton feature in QDs. Its could indicate relatively narrow...

10.1039/c2jm30679d article EN Journal of Materials Chemistry 2012-01-01

Nowadays, there is an increasing requirement for indoor position and navigation with location based services (LBSs). Many applications on smartphones exploit different techniques inputs positioning. However, the environment complex so that accuracy of affected easily by servals signal interference. In this paper, we propose a hybrid system assisted RSS fingerprint utilize iBeacon to assist Wi-Fi system, APs can divide space into sections, accurately locate where you are in environment. The...

10.1109/icumt.2016.7765336 article EN 2016-10-01

The demand for indoor positioning and navigation is increasing exponentially in recent years. When more international students visitors come to the university campus study academic activities, wireless by smartphones becomes a truly welcomed service. We propose hybrid system utilizing iBeacon within Wi-Fi network with fingerprint technique, implement campus-wide positioning. In this system, certain number of APs provide umbrella coverage campus, under iBeacons precisely localize mobile users...

10.1109/isne.2017.7968740 article EN 2017-05-01

10.1109/ispacs62486.2024.10868854 article EN 2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS) 2024-12-10

A proxy re-encryption with keyword search (PRES) provides simultaneously the function of and flexible sharing data. The concept is more efficient than traditional data-sharing method by performing "search-download-decrypt-encrypt." However, a PRES limited to searching for encrypted keywords using same public key. To address this problem, Li et al. introduced new primitive, called equality test (PREET), which can ciphertext under different keys. PREET effectively solves these problems an...

10.1109/asiajcis53848.2021.00016 article EN 2021-08-01

Oblivious transfer (OT) protocol is a fundamental building block of cryptography and can be applied widely in many fields. A secure oblivious supposed to ensure the privacy both senders receivers. The receivers means that information being selected by would never revealed senders. On other hand, have no further except for one has been selected. In this case, are able deceive sending same messages. Likewise, existing 1-out-of-n OT protocols, malicious make all n messages same, so will always...

10.1109/ntms.2018.8328707 article EN 2018-02-01

Predicate encryption (PE), formalized by Katz et al., is a new paradigm of public-key that conceptually captures the supports fine-grained access control policy. Because nature PE, it used for cloud storage so users can retrieve encrypted data without revealing any information about to servers and other users. Although lots PE schemes have been studied, predicate-hiding security seldom considered; is, user’s secret key may leak sensitive predicate. Additionally, current relies on discrete...

10.1155/2021/6678194 article EN cc-by Security and Communication Networks 2021-02-12

Policy-controlled signature (PCS) was introduced by Pairat Thorncharoensri et al. at ICICS 2009, and improved Computer Standards & Interfaces 2017. In this type of digital signature, signer can sign a message with some policies. Any verifier who does not satisfies the policies cannot verify message. They also extended notion policy-controlled called it "universal signature". their notion, they improve flexibility PCS scheme allowing third party to equip policy, rather than signer. work, we...

10.1109/ntms.2018.8328712 article EN 2018-02-01

To achieve data sharing model in clouds under modern technology, several attribute-based encryption schemes have been proposed many different ways. (ABE) is a one-to-many, fine-grained access control mechanism. Based on elliptic curve cryptography, we can reduce the computation overhead. However, most of these ABE over curves are insecure or lacking security proofs. In this manuscript, review revocable multi-authority by Ming et al.'s 2021 and give cryptanalysis their scheme. More...

10.1109/asiajcis57030.2022.00015 article EN 2022-07-01
Coming Soon ...