Decentralized E-voting systems based on the blockchain technology JH Hsiao, R Tso, CM Chen, ME Wu Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 17, 305-309, 2018 | 117 | 2018 |
PKE-AET: public key encryption with authorized equality test K Huang, R Tso, YC Chen, SMM Rahman, A Almogren, A Alamri The Computer Journal 58 (10), 2686-2697, 2015 | 97 | 2015 |
Strongly secure certificateless short signatures R Tso, X Huang, W Susilo Journal of Systems and Software 85 (6), 1409-1417, 2012 | 86 | 2012 |
Efficient and short certificateless signature R Tso, X Yi, X Huang Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008 | 69 | 2008 |
Distributed E-voting and E-bidding systems based on smart contract R Tso, ZY Liu, JH Hsiao Electronics 8 (4), 422, 2019 | 64 | 2019 |
Efficient and short certificateless signatures secure against realistic adversaries R Tso, X Yi, X Huang the Journal of Supercomputing 55, 173-191, 2011 | 62 | 2011 |
Malware image classification using one-shot learning with siamese networks SC Hsiao, DY Kao, ZY Liu, R Tso Procedia Computer Science 159, 1863-1871, 2019 | 58 | 2019 |
Efficient ID-based digital signatures with message recovery R Tso, C Gu, T Okamoto, E Okamoto Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007 | 55 | 2007 |
Certificateless aggregate signature with efficient verification YC Chen, R Tso, M Mambo, K Huang, G Horng Security and Communication Networks 8 (13), 2232-2243, 2015 | 50 | 2015 |
Multi-dimensional quantum state sharing based on quantum Fourier transform H Qin, R Tso, Y Dai Quantum Information Processing 17, 1-12, 2018 | 43 | 2018 |
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks TY Wu, Z Lee, L Yang, JN Luo, R Tso The Journal of Supercomputing 77 (7), 6992-7020, 2021 | 41 | 2021 |
Analyzing WannaCry ransomware considering the weapons and exploits KAO Da-Yu, SC Hsiao, TSO Raylin 2019 21st International Conference on Advanced Communication Technology …, 2019 | 41 | 2019 |
Public-key authenticated encryption with keyword search: Cryptanalysis, enhanced security, and quantum-resistant instantiation ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen Proceedings of the 2022 ACM on Asia conference on computer and …, 2022 | 40 | 2022 |
One-way and two-party authenticated ID-based key agreement protocols using pairing T Okamoto, R Tso, E Okamoto Modeling Decisions for Artificial Intelligence: Second International …, 2005 | 39 | 2005 |
A commutative encryption scheme based on ElGamal encryption K Huang, R Tso 2012 International Conference on Information Security and Intelligent …, 2012 | 38 | 2012 |
Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud R Tso, A Alelaiwi, SM Mizanur Rahman, ME Wu, MS Hossain Journal of Signal Processing Systems 89, 51-59, 2017 | 35 | 2017 |
On the improvement of Fermat factorization using a continued fraction technique ME Wu, R Tso, HM Sun Future Generation Computer Systems 30, 162-168, 2014 | 33 | 2014 |
Hierarchical quantum secret sharing based on special high-dimensional entangled state H Qin, WKS Tang, R Tso IEEE Journal of Selected Topics in Quantum Electronics 26 (3), 1-6, 2020 | 30 | 2020 |
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption K Huang, R Tso, YC Chen Journal of Computer and System Sciences 89, 400-409, 2017 | 25 | 2017 |
ID-Based group password-authenticated key exchange X Yi, R Tso, E Okamoto Advances in Information and Computer Security: 4th International Workshop on …, 2009 | 25 | 2009 |