Narn-Yih LEE


Web Metering Scheme Based on the Bilinear Pairings
Narn-Yih LEE Ming-Feng LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/03/01
Vol. E90-D  No. 3  pp. 688-691
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
cryptographymetering schemesecret sharingbilinear pairingsnetwork security
 Summary | Full Text:PDF(80.9KB)

Verifiable Oblivious Transfer Protocol
Narn-Yih LEE Chien-Chih WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/12/01
Vol. E88-D  No. 12  pp. 2890-2892
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
oblivious transferverificationzero knowledgecryptographysame message attack
 Summary | Full Text:PDF(72.4KB)

Improvement of One-Time Password Authentication Scheme Using Smart Cards
Narn-Yih LEE Jung-Chic CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/09/01
Vol. E88-B  No. 9  pp. 3765-3767
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptographysecurityone-time passworduser authenticationsmart card
 Summary | Full Text:PDF(61.5KB)

A Framework for One-Round Mobile Agent Transaction
Chi-Chao CHANG Narn-Yih LEE Tzonelih HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/07/01
Vol. E87-B  No. 7  pp. 1883-1889
Type of Manuscript:  Special Section PAPER (Special Section on Next Generation Networks Software)
Category: Security Issues
Keyword: 
mobile agent systemselectronic commercesecurityundetachable signatures
 Summary | Full Text:PDF(190.8KB)

Comment on Traceability Analysis on Chaum Blind Signature Scheme
Narn-Yih LEE Chien-Nan WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/02/01
Vol. E87-A  No. 2  pp. 511-512
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyblind signaturedigital signatureuntraceabilitysecurity
 Summary | Full Text:PDF(52.1KB)

Analysis on Traceability on Stadler et al.'s Fair Blind Signature
Narn-Yih LEE Ming-Kung SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/11/01
Vol. E86-A  No. 11  pp. 2901-2902
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographydigital signatureblind signatureuntraceability
 Summary | Full Text:PDF(103.3KB)

Robust Digital Signature Scheme with Subliminal Channels
Narn-Yih LEE Dai-Rui LIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 187-188
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographysecuritydigital signaturesubliminal channel
 Summary | Full Text:PDF(103.3KB)

The Security of the Improvement on the Generalization of Threshold Signature and Authenticated Encryption
Narn-Yih LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A  No. 10  pp. 2364-2367
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographythreshold signaturegroup-oriented cryptographyauthenticated encryptionsecurity
 Summary | Full Text:PDF(138.1KB)

Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network
Narn-Yih LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/02/01
Vol. E85-D  No. 2  pp. 386-391
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
cryptographycryptanalysisaccess controluser authentication
 Summary | Full Text:PDF(204.5KB)