​
Login / Signup
Fu-Kuo Tseng
Publication Activity (10 Years)
Years Active: 2009-2016
Publications (10 Years): 1
Top Topics
Regular Languages
Encrypted Data
Grammatical Inference
Encryption Scheme
Top Venues
IWSEC
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
IACR Cryptol. ePrint Arch.
ICS
</>
Publications
</>
Fu-Kuo Tseng
,
Rong-Jaye Chen
Towards Position-Aware Symbol-Based Searches on Encrypted Data from Symmetric Predicate Encryption Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2016)
Fu-Kuo Tseng
,
Rong-Jaye Chen
Cryptanalysis and Improvement of an Encoding Method for Private-Key Hidden Vector Encryptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(9) (2015)
Fu-Kuo Tseng
,
Rong-Jaye Chen
,
Bao-Shuh Paul Lin
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy.
IWSEC
(2014)
Shao-Heng Chen
,
Fu-Kuo Tseng
,
Rong-Jaye Chen
A Privacy-Preserving Encoding for Efficient Comparison Queries and Access Control from Predicate Encryption.
ICS
(2014)
Fu-Kuo Tseng
,
Rong-Jaye Chen
,
Bao-Shuh Paul Lin
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy.
IACR Cryptol. ePrint Arch.
2014 (2014)
Fu-Kuo Tseng
,
Rong-Jaye Chen
,
Bao-Shuh Paul Lin
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search.
TrustCom/ISPA/IUCC
(2013)
Fu-Kuo Tseng
,
Yung-Hsiang Liu
,
Rong-Jaye Chen
,
Bao-Shuh Paul Lin
Statistics on Encrypted Cloud Data.
IWSEC
(2013)
Fu-Kuo Tseng
,
Yung-Hsiang Liu
,
Rong-Jaye Chen
Ensuring correctness of range searches on encrypted cloud data.
CloudCom
(2012)
Fu-Kuo Tseng
,
Yung-Hsiang Liu
,
Rong-Jaye Chen
Toward Authenticated and Complete Query Results from Cloud Storages.
TrustCom
(2012)
Fu-Kuo Tseng
,
Yung-Hsiang Liu
,
Jing-Shyang Hwu
,
Rong-Jaye Chen
A Secure Reed-Solomon Code Incentive Scheme for Commercial Ad Dissemination Over VANETs.
IEEE Trans. Veh. Technol.
60 (9) (2011)
Fu-Kuo Tseng
,
John Kar-Kin Zao
,
Yung-Hsiang Liu
,
Fang-Po Kuo
Halo: A Hierarchical Identity-Based Public Key Infrastructure for Peer-to-Peer Opportunistic Collaboration.
Mobile Data Management
(2009)
Jyh-Shyan Lin
,
Fu-Kuo Tseng
,
Rong-Jaye Chen
An Analysis of Hierarchical Identity-Based Cryptosystems.
FCS
(2009)