Back
Return
Biography
Dr. Yuh-Min Tseng

Prof. Yuh-Min Tseng

National Changhua University of Education, China


Email: ymtseng@cc.ncue.edu.tw


Qualifications

1999  Ph.D., National Chung-Hsing University, China

1990  M.Sc., National Taiwan University, China

1988  B.Sc., National Chiao-Tung University, China


Publications (Selected)


  1. T.Y. Wu, Y.M. Tseng and T.T. Tsai, “A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants”, Computer Networks, Vol. 56, No. 12, pp. 2994-3006, 2012.
  2. Y.M. Tseng, C.H. Yu and T.Y. Wu, "Towards scalable key management for secure multicast communication", Information Technology and Control, Vol. 41, No. 2, pp. 173-182, 2012.
  3. T.Y. Wu and Y.M. Tseng, “Further analysis of pairing-based traitor tracing schemes for broadcast encryption”, Security and Communication Networks, Accepted, 2012. (Corresponding author) (SCI).
  4. Y.M. Tseng and T.T. Tsai, “Efficient revocable ID-based encryption with a public channel”, The Computer Journal, Vol. 55, No. 4, pp. 475-486, 2012. (Corresponding author) (SCI, EI).
  5. C.L. Chen, C.C. Lee, Y.M. Tseng and T.T. Chou, “A private online system for executing wills based on a secret sharing mechanism”, Security and Communication Networks, Vol. 5, No. 7, pp. 725-737, 2012. (SCI).
  6. T.Y. Wu and Y.M. Tseng, “Towards ID-based authenticated group key exchange protocol with identifying malicious participants”, Informatica, Vol. 23, No. 2, pp. 315-334, 2012. (Corresponding author) (SCI, EI).
  7. Y.H. Chuang, Y.M. Tseng and C.-L. Lei, “Efficient mutual authentication and key agreement with user anonymity for roaming services in global mobility networks”, International Journal of Innovative Computing Information and Control, Vol. 8, No. 9, pp. 6415-6428, 2012. (SCI, EI).
  8. Y.H. Chuang and Y.M. Tseng, “Towards generalized ID-based user authentication for mobile multi-server environment”, International Journal of Communication Systems, Vol. 25, No. 4, pp. 447-460, 2012. (Corresponding author) (SCI).
  9. T.Y. Wu, Y.M. Tseng and C.W. Yu, “ID-based key-insulated signature scheme with batch verifications and its novel application”, International Journal of Innovative Computing Information and Control, Vol. 8, No. 7(A), pp. 4797-4810, 2012. (Corresponding author) (SCI, EI).
  10. T.Y. Wu, Y.M. Tseng and C.W. Yu, “Two-round contributory group key exchange protocol for wireless network environments”, EURASIP Journal on Wireless Communications and Networking, 2011:12, 2011. (Corresponding author) (SCI, EI).
  11. T.Y. Wu, Y.M. Tseng and C.W. Yu, “A secure ID-based authenticated group key exchange protocol resistant to insider attacks”, Journal of Information Science and Engineering, Vol. 27, No. 3, pp. 915-932, 2011. (Corresponding author) (SCI, EI).
  12. Y.M. Tseng and F.G. Chen, “A free-rider aware reputation system for peer-to-peer file sharing networks”, Expert Systems with Applications, Vol. 38, No. 3, pp. 2432-2440, 2011. (SCI, EI).
  13. T.Y. Wu and Y.M. Tseng, “A pairing-based publicly verifiable secret sharing scheme”, Journal of Systems Science and Complexity, Vol. 24, No. 1, pp. 186-194, 2011. ( Corresponding author) (SCI).
  14. T.C. Yeh, C.H. Wu, and Y.M. Tseng, “Improvement of the RFID authentication scheme based on quadratic residue”, Computer Communications, Vol. 34, No. 3, pp. 337-341, 2011. (SCI, EI).
  15. T.Y. Wu and Y.M. Tseng, “An efficient user authentication and key exchange protocol for mobile client-server environment”, Computer Networks, Vol. 54, No. 9, pp. 1520-1530, 2010. ( Corresponding author) (SCI, EI).
  16. T.Y. Wu and Y.M. Tseng, “An ID-based mutual authentication and key exchange protocol for low-power mobile devices”, The Computer Journal, Vol. 53, No. 7, pp. 1062-1070, 2010. ( Corresponding author) (SCI, EI).
  17. Y.M. Tseng and T.Y. Wu, “Analysis and improvement on a contributory group key exchange protocol based on the Diffie-Hellman technique”, Informatica, Vol. 21, No. 2, pp. 247-258, 2010. (SCI, EI).
  18. Y.H. Chuang and Y.M. Tseng, "An efficient dynamic group key agreement protocol for imbalanced wireless networks", International Journal of Network Management, Vol. 20, No. 4, pp. 167-180, 2010. ( Corresponding author) (SCI, EI).
  19. Y.M. Tseng and T.Y. Wu, “A novel convinced Diffie-Hellman computation scheme and its cryptographic application”, ICCSA 2010, Lecture Note in Computer Science, LNCS 6019, pp. 225-235, Springer-Verlag, 2010. (EI).
  20. T.Y. Wu and Y.M. Tseng, “Comments on an ID-based authenticated group key agreement protocol with withstanding insider attacks”, IEICE Trans. on Fundamentals of Electronics, Communications of Computer, Vol.E92-A, No.10, pp. 2638-2640, 2009. ( Corresponding author) (SCI, EI).
  21. Y.M. Tseng, T.Y. Wu and J.D. Wu, “An efficient and provably secure ID-based signature scheme with batch verifications”, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 11, pp.3911-3922, 2009.
  22. Y.M. Tseng, “USIM-based EAP-TLS authentication protocol for wireless local area networks", Computer Standards & Interfaces, Vol. 31, No. 1, pp.128-136, 2009. (SCI, EI).
  23. T.Y. Wu and Y.M. Tseng, “An efficient user authentication and key exchange protocol for mobile client-server environment’, Computer Networks, Accepted, 200.
  24. Y.M. Tseng and J.K. Jan, "Improved group signature scheme based on the discrete logarithm problem", IEE Electronics Letters, Vol. 35, No. 1, pp. 37-38, 1999. (SCI, EI).



Profile Details

https://cc2.ncue.edu.tw/~ymtseng/tseng_english.html