A secure authenticated and key exchange scheme for fog computing
Chen, Chien-Ming, Huang, Yanyu, Wang, King-Hang, Kumari, Saru, Wu, Mu-En
Published in Enterprise information systems (21.10.2021)
Published in Enterprise information systems (21.10.2021)
Get full text
Journal Article
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
Chen, Chien-Ming, Wang, King-Hang, Yeh, Kuo-Hui, Xiang, Bin, Wu, Tsu-Yang
Published in Journal of ambient intelligence and humanized computing (01.08.2019)
Published in Journal of ambient intelligence and humanized computing (01.08.2019)
Get full text
Journal Article
An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks
Chen, Chien-Ming, Xiang, Bing, Wu, Tsu-Yang, Wang, King-Hang
Published in Applied sciences (01.07.2018)
Published in Applied sciences (01.07.2018)
Get full text
Journal Article
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Sun, Hung-Min, Ting, Wei-Chih, Wang, King-Hang
Published in IEEE transactions on dependable and secure computing (01.03.2011)
Published in IEEE transactions on dependable and secure computing (01.03.2011)
Get full text
Journal Article
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”
Chen, Chien-Ming, Fang, Weicheng, Wang, King-Hang, Wu, Tsu-Yang
Published in Nonlinear dynamics (01.02.2017)
Published in Nonlinear dynamics (01.02.2017)
Get full text
Journal Article
A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems
Wu, Tsu-Yang, Fan, Xiaoning, Wang, King-Hang, Lai, Chin-Feng, Xiong, Naixue, Wu, Jimmy Ming-Tai
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol
Chen, Chien-Ming, Xiang, Bin, Wang, King-Hang, Yeh, Kuo-Hui, Wu, Tsu-Yang
Published in Applied sciences (01.10.2018)
Published in Applied sciences (01.10.2018)
Get full text
Journal Article
On the Security of the Secure Arithmetic Code
Sun, Hung-Min, Wang, King-Hang, Ting, Wei-Chih
Published in IEEE transactions on information forensics and security (01.12.2009)
Published in IEEE transactions on information forensics and security (01.12.2009)
Get full text
Journal Article
A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code
Sun, Hung-Min, Wang, Hsun, Wang, King-Hang, Chen, Chien-Ming
Published in IEEE transactions on computers (01.06.2011)
Published in IEEE transactions on computers (01.06.2011)
Get full text
Journal Article
A provably secure certificateless public key encryption with keyword search
Wu, Tsu-Yang, Chen, Chien-Ming, Wang, King-Hang, Meng, Chao, Wang, Eric Ke
Published in Journal of the Chinese Institute of Engineers (02.01.2019)
Published in Journal of the Chinese Institute of Engineers (02.01.2019)
Get full text
Journal Article
A secure authentication scheme for Internet of Things
Wang, King-Hang, Chen, Chien-Ming, Fang, Weicheng, Wu, Tsu-Yang
Published in Pervasive and mobile computing (01.12.2017)
Published in Pervasive and mobile computing (01.12.2017)
Get full text
Journal Article
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme
Sun, Hung-Min, Wang, King-Hang, Chen, Chien-Ming
Published in IEEE transactions on dependable and secure computing (01.04.2009)
Published in IEEE transactions on dependable and secure computing (01.04.2009)
Get full text
Journal Article
A Study of User-Friendly Hash Comparison Schemes
Hsu-Chun Hsiao, Yue-Hsun Lin, Studer, A., Studer, C., King-Hang Wang, Kikuchi, H., Perrig, A., Hung-Min Sun, Bo-Yin Yang
Published in 2009 Annual Computer Security Applications Conference (01.12.2009)
Published in 2009 Annual Computer Security Applications Conference (01.12.2009)
Get full text
Conference Proceeding
Reconsidering a lightweight anonymous authentication protocol
Chen, Chien-Ming, Wang, King-Hang, Fang, Weicheng, Wu, Tsu-Yang, Wang, Eric Ke
Published in Journal of the Chinese Institute of Engineers (02.01.2019)
Published in Journal of the Chinese Institute of Engineers (02.01.2019)
Get full text
Journal Article
CRFID: An RFID system with a cloud database as a back-end server
Chen, Shuai-Min, Wu, Mu-En, Sun, Hung-Min, Wang, King-Hang
Published in Future generation computer systems (01.01.2014)
Published in Future generation computer systems (01.01.2014)
Get full text
Journal Article
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack
Hung-Min Sun, King-Hang Wang
Published in 2008 International Symposium on Electronic Commerce and Security (01.08.2008)
Published in 2008 International Symposium on Electronic Commerce and Security (01.08.2008)
Get full text
Conference Proceeding