Skip to main content

and
  1. No Access

    Article

    An improved user authentication and key agreement scheme for roaming service in ubiquitous network

    Up till now, numerous authentication and key agreement schemes have been proposed for ubiquitous networks. Recently, Arshad and Rasoolzadegan also proposed an authentication and key agreement scheme for ubiqui...

    Shaheena Khatoon, Te-Yu Chen, Cheng-Chi Lee in Annals of Telecommunications (2022)

  2. No Access

    Article

    Towards secure and efficient user authentication scheme using smart card for multi-server environments

    Two user authentication schemes for multi-server environments have been proposed by Tsai and Wang et al., respectively. However, there are some flaws existing in both schemes. Therefore, a new scheme for impro...

    Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, **n-Ke Jan in The Journal of Supercomputing (2013)

  3. No Access

    Chapter and Conference Paper

    A New Proxy Electronic Voting Scheme Based on Proxy Signatures

    Electronic voting (e-voting) is used to solve the problems of traditional paper-based voting and to lower costs. So far, many researchers have offered their secure e-voting systems. However, the existing schem...

    Cheng-Chi Lee, Te-Yu Chen, Shu-Chen Lin in Future Information Technology, Application… (2012)

  4. No Access

    Article

    Neural-network-based robust adaptive control for a class of nonlinear systems

    In this study, a robust adaptive control (RAC) system is developed for a class of nonlinear systems. The RAC system is comprised of a computation controller and a robust compensator. The computation controller...

    Chih-Min Lin, Ang-Bung Ting, Ming-Chia Li, Te-Yu Chen in Neural Computing and Applications (2011)

  5. No Access

    Article

    Ein aufgerolltes Kapillarviskosimeter für Blut

    W. P. Walawender, Te Yu Chen, D. F. Cala in Colloid and Polymer Science (1978)