Chien-Lung Hsu

Orcid: 0000-0003-3105-5939

According to our database1, Chien-Lung Hsu authored at least 81 papers between 2001 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids.
IEEE Trans. Ind. Informatics, 2022

A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems.
IEEE Access, 2022

2021
A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems.
Sensors, 2021

An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments.
IEEE Access, 2021

2020
Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks.
Sensors, 2020

An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things.
Sensors, 2020

A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks.
IEEE Access, 2020

Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems.
IEEE Access, 2020

A Time Bound Dynamic Group key Distribution Scheme with Anonymous Three-factor Identification for IoT-Based Multi-Server Environments.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model.
Future Internet, 2019

2018
Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps.
J. Supercomput., 2018

2017
Electronic Commerce Research Profiles: Comparing E-Commerce and Information Systems Journals.
Pac. Asia J. Assoc. Inf. Syst., 2017

Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
IEICE Trans. Inf. Syst., 2017

Privacy-preserved conference key distribution protocol.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

A dynamic identity end-to-end authentication key exchange protocol for IoT environments.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

2016
Transparent authentication scheme with adaptive biometrie features for IoT networks.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography.
Proceedings of the New Trends in Intelligent Information and Database Systems, 2015

A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet.
Wirel. Pers. Commun., 2015

A bibliometric study of SSME in information systems research.
Scientometrics, 2015

Security, Privacy, and Applications in Mobile Healthcare.
Int. J. Distributed Sens. Networks, 2015

RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model.
IEICE Trans. Inf. Syst., 2015

Editorial: Electronic Commerce Research in seven maps.
Electron. Commer. Res., 2015

Privacy-Preserved Key Agreement with User Authentication.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions.
Inf. Technol. Control., 2014

Exploring the linkages between perceived information accessibility and microblog stickiness: The moderating role of a sense of community.
Inf. Manag., 2014

Universal forgery attack on a strong designated verifier signature scheme.
Int. Arab J. Inf. Technol., 2014

Improving the effectiveness of experiential decisions by recommendation systems.
Expert Syst. Appl., 2014

Improved migration for mobile computing in distributed networks.
Comput. Stand. Interfaces, 2014

Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings.
Proceedings of the Intelligent Systems and Applications, 2014

2013
The iFit: An Integrated Physical Fitness Testing System to Evaluate the Degree of Physical Fitness of the Elderly.
IEEE Trans. Biomed. Eng., 2013

Designing an Intelligent Health Monitoring System and Exploring User Acceptance for the Elderly.
J. Medical Syst., 2013

The Role of Privacy Protection in Healthcare Information Systems Adoption.
J. Medical Syst., 2013

An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network.
KSII Trans. Internet Inf. Syst., 2013

The effect of community identity on continuance intention of microblogging.
Int. J. Electron. Bus., 2013

Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

User Acceptance of a Community-Based Healthcare Information System Preserving User Privacy.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services for Quality of Life, 2013

2012
Pairing-based strong designated verifier proxy signature scheme with low cost.
Secur. Commun. Networks, 2012

A Security and Privacy Preserving E-Prescription System Based on Smart Cards.
J. Medical Syst., 2012

Provably convertible multi-authenticated encryption scheme for generalized group communications.
Inf. Sci., 2012

A secure IRB system for assisting the development of intelligent medical devices.
Expert Syst. Appl., 2012

2011
A three-level authenticated conference key establishment protocol for UMTS networks.
J. Zhejiang Univ. Sci. C, 2011

Secure key management scheme for dynamic hierarchical access control based on ECC.
J. Syst. Softw., 2011

New identity-based key-insulated convertible multi-authenticated encryption scheme.
J. Netw. Comput. Appl., 2011

Improved convertible authenticated encryption scheme with provable security.
Inf. Process. Lett., 2011

A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme.
Int. J. Found. Comput. Sci., 2011

The Influences of National Images on Marketing Performance: A Mediated Model Link.
Int. J. Electron. Bus. Manag., 2011

Security Analysis of an eSeal Used in Taiwan Customs Officials.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

A digital evidence protection method with hierarchical access control mechanisms.
Proceedings of the International Carnahan Conference on Security Technology, 2011

A Telehealthcare System to Care for Older People Suffering from Metabolic Syndrome.
Proceedings of the Universal Access in Human-Computer Interaction. Users Diversity, 2011

Design and Development a Social Networks Platform for Older People.
Proceedings of the Universal Access in Human-Computer Interaction. Users Diversity, 2011

2010
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks.
Int. J. Secur. Networks, 2010

Effect of Commitment and Trust towards Micro-blogs on Consumer Behavioral Intention: A Relationship Marketing Perspective.
Int. J. Electron. Bus. Manag., 2010

Research on the Connections Between Corporate Social Responsibility and Corporation Image in the Risk Society: Take the Mobile Telecommunication Industry as an Example.
Int. J. Electron. Bus. Manag., 2010

Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations.
Proceedings of the Communication and Networking, 2010

2009
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks.
Inf. Sci., 2009

2008
Recursive protocol for group-oriented authentication with key distribution.
J. Syst. Softw., 2008

Convertible multi-authenticated encryption scheme.
Inf. Sci., 2008

Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme.
Comput. Syst. Sci. Eng., 2008

2007
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Inf. Sci., 2007

Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics.
Proceedings of the Future Generation Communication and Networking, 2007

2005
New proxy multi-signature scheme.
Appl. Math. Comput., 2005

Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.
Appl. Math. Comput., 2005

Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability.
Appl. Math. Comput., 2005

A user friendly remote authentication scheme with smart cards against impersonation attacks.
Appl. Math. Comput., 2005

Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem.
Appl. Math. Comput., 2005

2004
Group-oriented signature scheme with distinguished signing authoritie.
Future Gener. Comput. Syst., 2004

Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers.
Comput. Stand. Interfaces, 2004

Security of Chien et al.'s remote user authentication scheme using smart cards.
Comput. Stand. Interfaces, 2004

Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
Comput. Secur., 2004

Efficient proxy signature schemes using self-certified public keys.
Appl. Math. Comput., 2004

2003
Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Veh. Technol., 2003

Security of two remote user authentication schemes using smart cards.
IEEE Trans. Consumer Electron., 2003

Threshold signature scheme using self-certified public keys.
J. Syst. Softw., 2003

Improvement of the Miyazaki-Takaragi threshold digital signature scheme.
Inf. Process. Lett., 2003

Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
Comput. Secur., 2003

Improvement of modified authenticated key agreement protocol.
Appl. Math. Comput., 2003

Improvement of threshold proxy signature scheme.
Appl. Math. Comput., 2003

2002
Convertible authenticated encryption scheme.
J. Syst. Softw., 2002

Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002

ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Appl. Math. Comput., 2002

2001
New nonrepudiable threshold proxy signature scheme with known signers.
J. Syst. Softw., 2001


  Loading...