Chien-Ming Chen

Orcid: 0000-0002-6502-472X

Affiliations:
  • Harbin Institute of Technology, School of Computer Science, Shenzhen, China
  • Shandong University of Science and Technology, College of Computer Science and Engineering, Qingdao, China (former)


According to our database1, Chien-Ming Chen authored at least 190 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things.
IEEE Internet Things J., March, 2024

Designing a Security Framework Based on Hybrid Communication in Internet of Nano Things.
IEEE Internet Things J., February, 2024

2023
Anomaly Rule Detection in Sequence Data.
IEEE Trans. Knowl. Data Eng., December, 2023

Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., December, 2023

Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation.
Pattern Recognit., November, 2023

Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments.
Trans. Emerg. Telecommun. Technol., November, 2023

A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment.
Comput. Commun., November, 2023

Adversarial Robustness in Graph-Based Neural Architecture Search for Edge AI Transportation Systems.
IEEE Trans. Intell. Transp. Syst., August, 2023

A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning.
ACM Trans. Sens. Networks, May, 2023

A blockchain-based signature exchange protocol for metaverse.
Future Gener. Comput. Syst., May, 2023

Special Issue Editorial "Deep Learning Technologies for Mobile Networks: A Themed Issue in Honor of Prof. Han-Chieh Chao".
Symmetry, March, 2023

A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT.
J. Syst. Archit., March, 2023

A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment.
Veh. Commun., February, 2023

Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme.
Sensors, February, 2023

Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System.
IEEE Internet Things J., February, 2023

An Interpretive Perspective: Adversarial Trojaning Attack on Neural-Architecture-Search Enabled Edge AI Systems.
IEEE Trans. Ind. Informatics, 2023

Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain.
IEEE Trans. Ind. Informatics, 2023

A Genetic Algorithm for the Waitable Time-Varying Multi-Depot Green Vehicle Routing Problem.
Symmetry, 2023

Systematic survey of mobile payments, protocols, and security infrastructure.
J. Ambient Intell. Humaniz. Comput., 2023

A secure protocol for patient monitoring in wireless body area networks.
Concurr. Comput. Pract. Exp., 2023

2022
Smart System: Joint Utility and Frequency for Pattern Classification.
ACM Trans. Manag. Inf. Syst., December, 2022

Gaussian Mutation-Spider Monkey Optimization (GM-SMO) Model for Remote Sensing Scene Classification.
Remote. Sens., December, 2022

OHUQI: Mining on-shelf high-utility quantitative itemsets.
J. Supercomput., 2022

Analysis on improving the application of machine learning in product development.
J. Supercomput., 2022

Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems.
IEEE Trans. Intell. Transp. Syst., 2022

AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

Comments on "A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance".
IEEE Trans. Intell. Transp. Syst., 2022

Forward Privacy Preservation in IoT-Enabled Healthcare Systems.
IEEE Trans. Ind. Informatics, 2022

SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing.
Symmetry, 2022

Heterogeneous Signcryption Scheme From IBC to PKI With Equality Test for WBANs.
IEEE Syst. J., 2022

LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things.
Sensors, 2022

Security, Trust and Privacy for Cloud, Fog and Internet of Things.
Secur. Commun. Networks, 2022

Data Augmentation for Internet of Things Dialog System.
Mob. Networks Appl., 2022

Understanding the impact on convolutional neural networks with different model scales in AIoT domain.
J. Parallel Distributed Comput., 2022

A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles.
Int. J. Distributed Sens. Networks, 2022

Mining large-scale high utility patterns in vehicular ad hoc network environments.
Trans. Emerg. Telecommun. Technol., 2022

On-shelf utility mining from transaction database.
Eng. Appl. Artif. Intell., 2022

An enhanced scheme for mutual authentication for healthcare services.
Digit. Commun. Networks, 2022

Designing secure and lightweight user access to drone for smart city surveillance.
Comput. Stand. Interfaces, 2022

Towards Correlated Sequential Rules.
CoRR, 2022

An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing.
Computing, 2022

2021
Intelligent monitor for typhoon in IoT system of smart city.
J. Supercomput., 2021

DNetUnet: a semi-supervised CNN of medical image segmentation for super-computing AI service.
J. Supercomput., 2021

A secure blockchain-based group key agreement protocol for IoT.
J. Supercomput., 2021

HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs.
IEEE Trans. Intell. Transp. Syst., 2021

Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain.
IEEE Trans. Ind. Informatics, 2021

Towards Revenue Maximization with Popular and Profitable Products.
Trans. Data Sci., 2021

Neural-Architecture-Search-Based Multiobjective Cognitive Automation System.
IEEE Syst. J., 2021

Improved ECC-Based Three-Factor Multiserver Authentication Scheme.
Secur. Commun. Networks, 2021

A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2021

Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure.
Secur. Commun. Networks, 2021

Verifiable dynamic ranked search with forward privacy over encrypted cloud data.
Peer-to-Peer Netw. Appl., 2021

A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain.
IEEE Netw., 2021

A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles.
Mob. Inf. Syst., 2021

A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT).
J. Inf. Secur. Appl., 2021

On the construction of a post-quantum blockchain for smart city.
J. Inf. Secur. Appl., 2021

Discovering high utility-occupancy patterns from uncertain data.
Inf. Sci., 2021

Neural Architecture Search for Robust Networks in 6G-Enabled Massive IoT Domain.
IEEE Internet Things J., 2021

A trusted consensus fusion scheme for decentralized collaborated learning in massive IoT domain.
Inf. Fusion, 2021

Lightweight authentication protocol in edge-based smart grid environment.
EURASIP J. Wirel. Commun. Netw., 2021

A secure authenticated and key exchange scheme for fog computing.
Enterp. Inf. Syst., 2021

Flexible Pattern Discovery and Analysis.
CoRR, 2021

Transfer reinforcement learning-based road object detection in next generation IoT domain.
Comput. Networks, 2021

Sliding large kernel of deep learning algorithm for mobile electrocardiogram diagnosis.
Comput. Electr. Eng., 2021

A fast instance segmentation with one-stage multi-task deep neural network for autonomous driving.
Comput. Electr. Eng., 2021

A jumping mining attack and solution.
Appl. Intell., 2021

A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

On the Construction of a Post-Quantum Blockchain.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Joint Utility and Frequency for Pattern Classification.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

NSPIS: Mining Negative Sequential Patterns with Individual Support.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Mining On-shelf High-utility Quantitative Itemsets.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
A dynamic trust model in internet of things.
Soft Comput., 2020

An Improved Blockchain-Based Authentication Protocol for IoT Network Management.
Secur. Commun. Networks, 2020

Decentralized Private Information Sharing Protocol on Social Networks.
Secur. Commun. Networks, 2020

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure.
J. Sensors, 2020

A framework of deep reinforcement learning for stock evaluation functions.
J. Intell. Fuzzy Syst., 2020

PrivGRU: Privacy-preserving GRU inference using additive secret sharing.
J. Intell. Fuzzy Syst., 2020

A secure blockchain-based e-health records storage and sharing scheme.
J. Inf. Secur. Appl., 2020

Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity.
Int. J. Inf. Sec., 2020

Efficient certificate-based aggregate signature scheme for vehicular <i>ad hoc</i> networks.
IET Networks, 2020

An anonymous authenticated key-agreement scheme for multi-server infrastructure.
Hum. centric Comput. Inf. Sci., 2020

PoRX: A reputation incentive scheme for blockchain consensus of IIoT.
Future Gener. Comput. Syst., 2020

Incentive evolutionary game model for opportunistic social networks.
Future Gener. Comput. Syst., 2020

A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain.
Future Gener. Comput. Syst., 2020

Proof of X-repute blockchain consensus protocol for IoT systems.
Comput. Secur., 2020

Joint-learning segmentation in Internet of drones (IoD)-based monitor systems.
Comput. Commun., 2020

Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain.
Comput. Electr. Eng., 2020

Using IoT technology for computer-integrated manufacturing systems in the semiconductor industry.
Appl. Soft Comput., 2020

Analysis of Kelly betting on finite repeated games.
Appl. Math. Comput., 2020

An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks.
IEEE Access, 2020

CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC.
IEEE Access, 2020

A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems.
IEEE Access, 2020

UHUOPM: High Utility Occupancy Pattern Mining in Uncertain Data.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

TopHUI: Top-k high-utility itemset mining with negative utility.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

OSUMI: On-Shelf Utility Mining from Itemset-based Data.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Robust Beamforming Design for MISO Bursty Interference Channels Under Traffic Uncertainties.
IEEE Trans. Signal Process., 2019

Flexible, Efficient, and Secure Access Delegation in Cloud Computing.
ACM Trans. Manag. Inf. Syst., 2019

Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
Sensors, 2019

Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications.
J. Ambient Intell. Humaniz. Comput., 2019

An Effective Digital System for Intelligent Financial Environments.
IEEE Access, 2019

Design and Analysis of a Strengthen Internal Control Scheme for Smart Trust Financial Service.
IEEE Access, 2019

Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments.
IEEE Access, 2019

Multilayer Dense Attention Model for Image Caption.
IEEE Access, 2019

Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications.
IEEE Access, 2019

Selecting Hyper-Parameters of Gaussian Process Regression Based on Non-Inertial Particle Swarm Optimization in Internet of Things.
IEEE Access, 2019

Study on Secrecy Capacity of Wireless Sensor Networks in Internet of Things Based on the Amplify-and-Forward Compressed Sensing Scheme.
IEEE Access, 2019

A Secure Authentication Protocol for Internet of Vehicles.
IEEE Access, 2019

Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks.
Proceedings of the Genetic and Evolutionary Computing, 2019

High-Utility Itemset Mining in Big Dataset.
Proceedings of the Genetic and Evolutionary Computing, 2019

Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2019

Cryptanalysis of an Anonymous Message Authentication Scheme for Smart Grid.
Proceedings of the Genetic and Evolutionary Computing, 2019

A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks.
Proceedings of the Genetic and Evolutionary Computing, 2019

Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

2018
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags.
J. Supercomput., 2018

Authentication with What You See and Remember in the Internet of Things.
Symmetry, 2018

A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018

Towards secure authenticating of cache in the reader for RFID-based IoT systems.
Peer-to-Peer Netw. Appl., 2018

Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
J. Netw. Intell., 2018

Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol.
J. Inf. Sci. Eng., 2018

Comments on Recent Proposed Cui Et Al.'s KASE and Lu Et Al.'s dIBEKS Schemes.
J. Inf. Hiding Multim. Signal Process., 2018

Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map.
J. Inf. Hiding Multim. Signal Process., 2018

A New Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
J. Inf. Hiding Multim. Signal Process., 2018

A Robust Mobile Payment Scheme With Smart Contract-Based Transaction Repository.
IEEE Access, 2018

A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps.
IEEE Access, 2018

A Multiple Objective PSO-Based Approach for Data Sanitization.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2018

Energy Efficiency Maximization in Multi-User Miso Mixed RF/VLC Heterogeneous Cellular Networks.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

A Public Auditing Scheme with Data Recovery.
Proceedings of the Genetic and Evolutionary Computing, 2018

2017
A Countermeasure to SQL Injection Attack for Cloud Environment.
Wirel. Pers. Commun., 2017

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017

A secure authentication scheme for Internet of Things.
Pervasive Mob. Comput., 2017

A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
IEEE Access, 2017

Comments on a privacy preserving public auditing mechanism for shared cloud data.
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017

On the Security of a Certificateless Public Key Encryption with Keyword Search.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017

Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Genetic and Evolutionary Computing, 2017

Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2017

Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Comments on Yu et al's Shared Data Integrity Verification Protocol.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Password-Based Authenticated Key Exchange from Lattices for Client/Server Model.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Decentralized E-Voting Systems Based on the Blockchain Technology.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.
J. Netw. Intell., 2016

Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps.
J. Inf. Hiding Multim. Signal Process., 2016

Efficient mining of short periodic high-utility itemsets.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

On the Security of a Certificateless Searchable Public Key Encryption Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2016

Time Competition Flooding in High-Density Wireless Sensor Network.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

A Secure Condition-Based Location Authentication Protocol for Mobile Devices.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

2015
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks.
J. Univers. Comput. Sci., 2015

MAPMP: A Mutual Authentication Protocol for Mobile Payment.
J. Inf. Hiding Multim. Signal Process., 2015

A provable authenticated group key agreement protocol for mobile environment.
Inf. Sci., 2015

An enhancement of return address stack for security.
Comput. Stand. Interfaces, 2015

On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Privacy Protection Framework in Social Networked Cars.
Proceedings of the Multidisciplinary Social Networks Research, 2015

Context recognition for adaptive hearing-aids.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A KL Divergence Function for Randomized Secret Shares.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2015

Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the Genetic and Evolutionary Computing, 2015

2014
Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID.
J. Inf. Hiding Multim. Signal Process., 2014

A defence scheme against Identity Theft Attack based on multiple social networks.
Expert Syst. Appl., 2014

Eliminating rouge femtocells based on distance bounding protocol and geographic information.
Expert Syst. Appl., 2014

A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2014

Security Analysis and Improvement of Femtocell Access Control.
Proceedings of the Network and System Security - 8th International Conference, 2014

Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control.
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014

A Methodology for Hook-Based Kernel Level Rootkits.
Proceedings of the Information Security Practice and Experience, 2014

Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Maintaining high-utility itemsets in dynamic databases.
Proceedings of the 2014 International Conference on Machine Learning and Cybernetics, 2014

Towards SQL Injection Attacks Detection Mechanism Using Parse Tree.
Proceedings of the Genetic and Evolutionary Computing, 2014

MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things.
Proceedings of the Genetic and Evolutionary Computing, 2014

Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

Towards Time-Bound Hierarchical Key Management in Cloud Computing.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

2013
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2013

SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN.
J. Inf. Hiding Multim. Signal Process., 2013

An Energy-Aware Routing Protocol Using Cat Swarm Optimization for Wireless Sensor Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

An Efficient Detecting Mechanism for Cross-Site Script Attacks in the Cloud.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

2012
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

2011
A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code.
IEEE Trans. Computers, 2011

2009
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme.
IEEE Trans. Dependable Secur. Comput., 2009

2008
Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems.
IEEE Trans. Multim., 2008

An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2008

2007
An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2003
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme.
ACM SIGOPS Oper. Syst. Rev., 2003


  Loading...