
Professor Jue-Sam Chou
Current affiliation: University of Nanhua
Subject: Computer Science
Primary location: Taiwan
ECC-based untraceable authentication for large-scale active-tag RFID systems
Published in:Electronic Commerce Research
Publication date:2014-11-04
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
Published in:The Journal of Supercomputing
Publication date:2013-12-25
Mental poker game based on a bit commitment scheme through network
Published in:Computer Networks
Publication date:2002-02-01
ChemInform Abstract: Direct Transformation of Aldehydes to Nitriles Using Iodine in Ammonia Water.
Published in:ChemInform
Publication date:2010-05-26
An efficient session key generation for NTDR networks based on bilinear paring
Published in:Computer Communications
Publication date:2008-09-01
A Novel Anonymous Proxy Signature Scheme
Published in:Advances in Multimedia
Publication date:2012-01-01
RC hash function
Published in:Journal of Information and Optimization Sciences
Publication date:2001-05-01
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Published in:Advances in Multimedia
Publication date:2012-01-01
A novel electronic cash system with trustee-based anonymity revocation from pairing
Published in:Electronic Commerce Research and Applications
Publication date:2011-11-01
A fast algorithm for reliability-oriented task assignment in a distributed system
Published in:Computer Communications
Publication date:2002-11-01
Keyed/Unkeyed RIPEMD-128, 192, 256
Published in:Journal of Information and Optimization Sciences
Publication date:2001-09-01
Terminal pair maximal flow finding using DNA computation
Published in:Journal of Information and Optimization Sciences
Publication date:2001-09-01
A constant-time identifying large-scale RFID tags using lines on a plane
Published in:Transactions on Emerging Telecommunications Technologies
Publication date:2013-04-21
Integrity Protection of Document Assets by Computing Skeletons
Published in:Second International Conference on Innovative Computing, Informatio and Control (ICICIC 2007)
Publication date:2007-09-01
An improvement of an efficient user identification scheme based on ID-based cryptosystem
Published in:IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06)
Publication date:Not available
Improved multi-server authentication protocol
Published in:Security and Communication Networks
Publication date:2011-05-12Improved multi-server authentication protocol
A Novel Hierarchical Key Management Scheme Based on Quadratic Residues
Published in:Parallel and Distributed Processing and Applications
Publication date:2004-01-01
A novel mutual authentication scheme based on quadratic residues for RFID systems
Published in:Computer Networks
Publication date:2008-08-01
A response to a critique of “A novel electronic cash system with trustee-based anonymity revocation from pairing,” by Chen, Chou, Sun and Cho (2011)
Published in:Electronic Commerce Research and Applications
Publication date:2012-07-01