Chou‐Chen Yang

747 total citations
33 papers, 526 citations indexed

About

Chou‐Chen Yang is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Chou‐Chen Yang has authored 33 papers receiving a total of 526 indexed citations (citations by other indexed papers that have themselves been cited), including 26 papers in Computer Networks and Communications, 18 papers in Information Systems and 15 papers in Artificial Intelligence. Recurrent topics in Chou‐Chen Yang's work include Advanced Authentication Protocols Security (15 papers), Cryptography and Data Security (14 papers) and Advanced Steganography and Watermarking Techniques (7 papers). Chou‐Chen Yang is often cited by papers focused on Advanced Authentication Protocols Security (15 papers), Cryptography and Data Security (14 papers) and Advanced Steganography and Watermarking Techniques (7 papers). Chou‐Chen Yang collaborates with scholars based in Taiwan, Indonesia and Japan. Chou‐Chen Yang's co-authors include Ting‐Yi Chang, Min‐Shiang Hwang, Wei-Ting Liu, Yuh‐Min Tseng, Woei Lin, Ching‐Ying Lin, Yawen Yang and Huichuan Huang and has published in prestigious journals such as Future Generation Computer Systems, Applied Mathematics and Computation and Computers & Security.

In The Last Decade

Chou‐Chen Yang

30 papers receiving 476 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chou‐Chen Yang Taiwan 12 340 322 283 132 116 33 526
Marc Fischlin Germany 14 230 0.7× 357 1.1× 226 0.8× 56 0.4× 50 0.4× 47 482
Chanathip Namprempre Thailand 8 166 0.5× 384 1.2× 169 0.6× 118 0.9× 21 0.2× 11 465
Patrick Horster Germany 6 201 0.6× 283 0.9× 237 0.8× 73 0.6× 27 0.2× 15 370
Ali Aydın Selçuk Türkiye 10 196 0.6× 313 1.0× 127 0.4× 119 0.9× 42 0.4× 39 475
Barbara Masucci Italy 16 208 0.6× 471 1.5× 210 0.7× 180 1.4× 29 0.3× 39 625
Emmanuel Bresson United States 10 532 1.6× 419 1.3× 225 0.8× 45 0.3× 25 0.2× 19 605
Ante Đerek United States 10 344 1.0× 248 0.8× 274 1.0× 19 0.1× 41 0.4× 23 442
Matthew W. Pagano United States 7 143 0.4× 509 1.6× 367 1.3× 39 0.3× 43 0.4× 9 633
A. Freier 3 260 0.8× 171 0.5× 153 0.5× 32 0.2× 74 0.6× 3 365
Changsha Ma United States 9 429 1.3× 207 0.6× 391 1.4× 38 0.3× 25 0.2× 12 538

Countries citing papers authored by Chou‐Chen Yang

Since Specialization
Citations

This map shows the geographic impact of Chou‐Chen Yang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chou‐Chen Yang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chou‐Chen Yang more than expected).

Fields of papers citing papers by Chou‐Chen Yang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chou‐Chen Yang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chou‐Chen Yang. The network helps show where Chou‐Chen Yang may publish in the future.

Co-authorship network of co-authors of Chou‐Chen Yang

This figure shows the co-authorship network connecting the top 25 collaborators of Chou‐Chen Yang. A scholar is included among the top collaborators of Chou‐Chen Yang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chou‐Chen Yang. Chou‐Chen Yang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yang, Chou‐Chen, et al.. (2022). A certificateless aggregate signature scheme for security and privacy protection in VANET. International Journal of Distributed Sensor Networks. 18(5). 3627530870–3627530870. 24 indexed citations
2.
Yang, Chou‐Chen, et al.. (2013). A Traceable and Fair Transaction Mechanism for Digital Rights Management on P2P Networks. 網際網路技術學刊. 14(7). 1043–1051. 2 indexed citations
3.
Yang, Chou‐Chen, et al.. (2012). A Novel Authorized File-Sharing Protocol for P2P Networks. INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences. 4(8). 76–83.
4.
Yang, Chou‐Chen, et al.. (2011). A token-based authorized file-sharing protocol for BitTorrent-like P2P systems. 1. 155–158. 1 indexed citations
5.
Yang, Chou‐Chen, et al.. (2011). A Novel DRM Solution Based on 3G Security Architecture. International Journal of Digital Content Technology and its Applications. 5(11). 19–26. 2 indexed citations
6.
Yang, Chou‐Chen, et al.. (2009). Trusted DRM on P2P Network. 20(3). 24–37. 3 indexed citations
7.
Yang, Chou‐Chen, Yawen Yang, & Wei-Ting Liu. (2006). A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network. Wireless Personal Communications. 39(2). 229–251. 2 indexed citations
8.
Chang, Ting‐Yi, Chou‐Chen Yang, & Min‐Shiang Hwang. (2004). Cryptanalysis of Publicly Verifiable Authenticated Encryption(Information Security). IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 87(6). 1645–1646. 1 indexed citations
9.
Yang, Chou‐Chen, et al.. (2004). Cryptanalysis of a user friendly remote authentication scheme with smart cards. Computers & Security. 23(5). 425–427. 23 indexed citations
10.
Yang, Chou‐Chen, et al.. (2004). Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function. Applied Mathematics and Computation. 162(1). 211–214. 2 indexed citations
11.
Yang, Chou‐Chen, et al.. (2004). An improvement of the Yang-Shieh password authentication schemes. Applied Mathematics and Computation. 162(3). 1391–1396. 30 indexed citations
12.
Tseng, Yuh‐Min, et al.. (2004). Authentication and Billing Protocols for the Integration of WLAN and 3G Networks. Wireless Personal Communications. 29(3-4). 351–366. 18 indexed citations
13.
Tseng, Yuh‐Min, et al.. (2004). An efficient authentication protocol for integrating WLAN and cellular networks. 1. 416–420. 9 indexed citations
14.
Yang, Chou‐Chen, et al.. (2004). An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. ACM SIGOPS Operating Systems Review. 38(3). 91–96.
15.
Yang, Chou‐Chen, et al.. (2004). Ant mobility model platform for network simulator. 2501. 380–384 Vol.2. 4 indexed citations
16.
Yang, Chou‐Chen, et al.. (2004). A novel mobile IP registration scheme for hierarchical mobility management. 26. 367–374. 4 indexed citations
17.
Chang, Ting‐Yi, Chou‐Chen Yang, & Min‐Shiang Hwang. (2003). A threshold signature scheme for group communications without a shared distribution center. Future Generation Computer Systems. 20(6). 1013–1021. 31 indexed citations
18.
Yang, Chou‐Chen, Ting‐Yi Chang, & Min‐Shiang Hwang. (2003). A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem. Computer Standards & Interfaces. 25(2). 141–145. 20 indexed citations
19.
Yang, Chou‐Chen, Ting‐Yi Chang, & Min‐Shiang Hwang. (2003). Security of Improvement on Methods for Protecting Password Transmission. Informatica. 14(4). 551–558. 14 indexed citations
20.
Yang, Chou‐Chen, Ting‐Yi Chang, & Min‐Shiang Hwang. (2003). A (t,n) multi-secret sharing scheme. Applied Mathematics and Computation. 151(2). 483–490. 146 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026