Chien-Lung Hsu

According to our database1, Chien-Lung Hsu authored at least 72 papers between 2001 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 




Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps.
The Journal of Supercomputing, 2018

Retraction Note to: The financial crisis research: a bibliometric analysis.
Scientometrics, 2017

Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
IEICE Transactions, 2017

Privacy-preserved conference key distribution protocol.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

A dynamic identity end-to-end authentication key exchange protocol for IoT environments.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

Bibliometric study of Electronic Commerce Research in Information Systems & MIS Journals.
Scientometrics, 2016

Transparent authentication scheme with adaptive biometrie features for IoT networks.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography.
Proceedings of the New Trends in Intelligent Information and Database Systems, 2015

A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet.
Wireless Personal Communications, 2015

A bibliometric study of SSME in information systems research.
Scientometrics, 2015

Security, Privacy, and Applications in Mobile Healthcare.
IJDSN, 2015

RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model.
IEICE Transactions, 2015

Editorial: Electronic Commerce Research in seven maps.
Electronic Commerce Research, 2015

Privacy-Preserved Key Agreement with User Authentication.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions.
ITC, 2014

Exploring the linkages between perceived information accessibility and microblog stickiness: The moderating role of a sense of community.
Information & Management, 2014

Universal forgery attack on a strong designated verifier signature scheme.
Int. Arab J. Inf. Technol., 2014

Improving the effectiveness of experiential decisions by recommendation systems.
Expert Syst. Appl., 2014

Improved migration for mobile computing in distributed networks.
Computer Standards & Interfaces, 2014

Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings.
Proceedings of the Intelligent Systems and Applications, 2014

The iFit: An Integrated Physical Fitness Testing System to Evaluate the Degree of Physical Fitness of the Elderly.
IEEE Trans. Biomed. Engineering, 2013

Designing an Intelligent Health Monitoring System and Exploring User Acceptance for the Elderly.
J. Medical Systems, 2013

The Role of Privacy Protection in Healthcare Information Systems Adoption.
J. Medical Systems, 2013

An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network.
TIIS, 2013

The effect of community identity on continuance intention of microblogging.
IJEB, 2013

Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

User Acceptance of a Community-Based Healthcare Information System Preserving User Privacy.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services for Quality of Life, 2013

Pairing-based strong designated verifier proxy signature scheme with low cost.
Security and Communication Networks, 2012

A Security and Privacy Preserving E-Prescription System Based on Smart Cards.
J. Medical Systems, 2012

Provably convertible multi-authenticated encryption scheme for generalized group communications.
Inf. Sci., 2012

A secure IRB system for assisting the development of intelligent medical devices.
Expert Syst. Appl., 2012

A three-level authenticated conference key establishment protocol for UMTS networks.
Journal of Zhejiang University - Science C, 2011

Secure key management scheme for dynamic hierarchical access control based on ECC.
Journal of Systems and Software, 2011

New identity-based key-insulated convertible multi-authenticated encryption scheme.
J. Network and Computer Applications, 2011

Improved convertible authenticated encryption scheme with provable security.
Inf. Process. Lett., 2011

A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme.
Int. J. Found. Comput. Sci., 2011

The Influences of National Images on Marketing Performance: A Mediated Model Link.
IJEBM, 2011

Security Analysis of an eSeal Used in Taiwan Customs Officials.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

A digital evidence protection method with hierarchical access control mechanisms.
Proceedings of the International Carnahan Conference on Security Technology, 2011

A Telehealthcare System to Care for Older People Suffering from Metabolic Syndrome.
Proceedings of the Universal Access in Human-Computer Interaction. Users Diversity, 2011

Design and Development a Social Networks Platform for Older People.
Proceedings of the Universal Access in Human-Computer Interaction. Users Diversity, 2011

Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks.
IJSN, 2010

Effect of Commitment and Trust towards Micro-blogs on Consumer Behavioral Intention: A Relationship Marketing Perspective.
IJEBM, 2010

Research on the Connections Between Corporate Social Responsibility and Corporation Image in the Risk Society: Take the Mobile Telecommunication Industry as an Example.
IJEBM, 2010

Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations.
Proceedings of the Communication and Networking, 2010

A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks.
Inf. Sci., 2009

Recursive protocol for group-oriented authentication with key distribution.
Journal of Systems and Software, 2008

Convertible multi-authenticated encryption scheme.
Inf. Sci., 2008

Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme.
Comput. Syst. Sci. Eng., 2008

Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Inf. Sci., 2007

Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics.
Proceedings of the Future Generation Communication and Networking, 2007

New proxy multi-signature scheme.
Applied Mathematics and Computation, 2005

Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.
Applied Mathematics and Computation, 2005

Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability.
Applied Mathematics and Computation, 2005

A user friendly remote authentication scheme with smart cards against impersonation attacks.
Applied Mathematics and Computation, 2005

Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem.
Applied Mathematics and Computation, 2005

Group-oriented signature scheme with distinguished signing authoritie.
Future Generation Comp. Syst., 2004

Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers.
Computer Standards & Interfaces, 2004

Security of Chien et al.'s remote user authentication scheme using smart cards.
Computer Standards & Interfaces, 2004

Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
Computers & Security, 2004

Efficient proxy signature schemes using self-certified public keys.
Applied Mathematics and Computation, 2004

Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Vehicular Technology, 2003

Security of two remote user authentication schemes using smart cards.
IEEE Trans. Consumer Electronics, 2003

Threshold signature scheme using self-certified public keys.
Journal of Systems and Software, 2003

Improvement of the Miyazaki-Takaragi threshold digital signature scheme.
Inf. Process. Lett., 2003

Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
Computers & Security, 2003

Improvement of modified authenticated key agreement protocol.
Applied Mathematics and Computation, 2003

Improvement of threshold proxy signature scheme.
Applied Mathematics and Computation, 2003

Convertible authenticated encryption scheme.
Journal of Systems and Software, 2002

Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002

ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Applied Mathematics and Computation, 2002

New nonrepudiable threshold proxy signature scheme with known signers.
Journal of Systems and Software, 2001