Enhanced delegation-based authentication protocol for PCSs
LEE, Tian-Fu, CHANG, Shu-Hui, HWANG, Tzonelih, CHONG, Song-Kong
Published in IEEE transactions on wireless communications (01.05.2009)
Published in IEEE transactions on wireless communications (01.05.2009)
Get full text
Journal Article
On the security of an enhanced UMTS authentication and key agreement protocol
Hwang, Min-Shiang, Chong, Song-Kong, Ou, Hsia-Hung
Published in European transactions on telecommunications (01.04.2011)
Published in European transactions on telecommunications (01.04.2011)
Get full text
Journal Article
Improvement on “Quantum Key Agreement Protocol with Maximally Entangled States”
Chong, Song-Kong, Tsai, Chia-Wei, Hwang, Tzonelih
Published in International journal of theoretical physics (01.06.2011)
Published in International journal of theoretical physics (01.06.2011)
Get full text
Journal Article
Dynamic quantum secret sharing
Hsu, Jung-Lun, Chong, Song-Kong, Hwang, Tzonelih, Tsai, Chia-Wei
Published in Quantum information processing (2013)
Published in Quantum information processing (2013)
Get full text
Journal Article
DoS-resistant ID-based password authentication scheme using smart cards
Hwang, Min-Shiang, Chong, Song-Kong, Chen, Te-Yu
Published in The Journal of systems and software (2010)
Published in The Journal of systems and software (2010)
Get full text
Journal Article
New arbitrated quantum signature of classical messages against collective amplitude damping noise
Hwang, Tzonelih, Chong, Song-Kong, Luo, Yi-Ping, Wei, Tong-Xuan
Published in Optics communications (01.06.2011)
Published in Optics communications (01.06.2011)
Get full text
Journal Article
The Moderately Hard DoS-Resistant Authentication Protocol on Client Puzzles
Hwang, Min-Shiang, Chong, Song-Kong, Ou, Hsia-Hung
Published in Informatica (Vilnius, Lithuania) (01.01.2016)
Published in Informatica (Vilnius, Lithuania) (01.01.2016)
Get full text
Journal Article
An improved address ownership in mobile IPv6
Hwang, Min-Shiang, Lee, Cheng-Chi, Chong, Song-Kong
Published in Computer communications (05.09.2008)
Published in Computer communications (05.09.2008)
Get full text
Journal Article
Key Stroke Profiling for Data Loss Prevention
Jain-Shing Wu, Yuh-Jye Lee, Song-Kong Chong, Chih-Ta Lin, Jung-Lun Hsu
Published in 2013 Conference on Technologies and Applications of Artificial Intelligence (01.12.2013)
Published in 2013 Conference on Technologies and Applications of Artificial Intelligence (01.12.2013)
Get full text
Conference Proceeding
Automatic Alignment for Side-Channel Attack Against Cryptographic Modules
Wang, Sying-Jyan, Lin, Yi-Chi, Lin, Chen-Yeh, Chong, Song-Kong, Li, Katherine Shu-Min
Published in 2022 IET International Conference on Engineering Technologies and Applications (IET-ICETA) (14.10.2022)
Published in 2022 IET International Conference on Engineering Technologies and Applications (IET-ICETA) (14.10.2022)
Get full text
Conference Proceeding
Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication
Wang, Sying-Jyan, Li, Katherine Shu-Min, Lin, Chen-Yeh, Chong, Song-Kong
Published in 2022 IEEE 31st Asian Test Symposium (ATS) (01.11.2022)
Published in 2022 IEEE 31st Asian Test Symposium (ATS) (01.11.2022)
Get full text
Conference Proceeding
Improving IJTAG Test Efficiency and Security
Wang, Sying-Jyan, Shih, Yen-Chang, Li, Katherine Shu-Min, Lin, Chen-Yeh, Chong, Song-Kong
Published in 2022 International Symposium on VLSI Design, Automation and Test (VLSI-DAT) (18.04.2022)
Published in 2022 International Symposium on VLSI Design, Automation and Test (VLSI-DAT) (18.04.2022)
Get full text
Conference Proceeding
A simple method to secure the integrating a key distribution into digital signature standard
Song-Kong Chong, Shu-Fen Chiou, Min-Shiang Hwang
Published in 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT) (01.04.2012)
Get full text
Published in 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT) (01.04.2012)
Conference Proceeding