Dong-Her Shih

Orcid: 0000-0003-1605-8488

According to our database1, Dong-Her Shih authored at least 47 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Consumer Intentions to Switch On-Demand Food Delivery Platforms: A Perspective from Push-Pull-Mooring Theory.
J. Theor. Appl. Electron. Commer. Res., 2023

2021
Preventing Return Fraud in Reverse Logistics - A Case Study of ESPRES Solution by Ethereum.
J. Theor. Appl. Electron. Commer. Res., 2021

2020
Verification of Cryptocurrency Mining Using Ethereum.
IEEE Access, 2020

A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System.
IEEE Access, 2020

2017
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment.
Proceedings of the Information Science and Applications 2017, 2017

2016
Stock Trading Point Decision with Petri Nets.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

A colored Petri Net for stock trading signal detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

2015
An implementation framework for E-Government 2.0.
Telematics Informatics, 2015

A robust copyright and ownership protection mechanism for music.
Multim. Tools Appl., 2015

APN model construction for malicious email detection.
Expert Syst. Appl., 2015

2014
An APN model for Arrhythmic beat classification.
Bioinform., 2014

The Influence of Moral Orientation and Relational Risk on Knowledge Sharing in Supply Chains.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

2013
An intelligent embedded system for malicious email filtering.
Comput. Stand. Interfaces, 2013

Business-to-government application integration framework: A case study of the high technology industry in Taiwan.
Comput. Stand. Interfaces, 2013

ECG identification of arrhythmias by using an associative Petri net.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
Explore dependency syndrome on mobile phone user.
Int. J. Mob. Commun., 2012

Exploring the Individual's Behavior on Self-Disclosure Online.
Int. J. Hum. Comput. Interact., 2012

Development Stage and Relationship of MIS and TQM in the E-business ERA.
Int. J. Electron. Bus. Manag., 2012

2011
An implementation and evaluation of recommender systems for traveling abroad.
Expert Syst. Appl., 2011

A secure multi-item e-auction mechanism with bid privacy.
Comput. Secur., 2011

2010
An embedded mobile ECG reasoning system for elderly patients.
IEEE Trans. Inf. Technol. Biomed., 2010

Augmenting a Web-Based Learning Environment through Blending Formative Assessment Services.
J. Web Eng., 2010

A Web-based Light Electric Vehicle for Homecare Use - A Pilot Study.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
A platform for syndicating and manipulating instrumentation and measurement data on the Web.
Proceedings of the IEEE International Conference on Virtual Environments, 2009

2008
An Empirical Study of Factors Affecting RFID's Adoption in Taiwan.
J. Glob. Inf. Manag., 2008

Security aspects of mobile phone virus: a critical survey.
Ind. Manag. Data Syst., 2008

Differential quality-of-service provision in mobile networks.
Int. J. Mob. Commun., 2008

Deconstructing mobile commerce service with continuance intention.
Int. J. Mob. Commun., 2008

Collaborative spam filtering with heterogeneous agents.
Expert Syst. Appl., 2008

The development of audit detection risk assessment system: Using the fuzzy theory and audit risk model.
Expert Syst. Appl., 2008

Provision of Pedagogical Resources in Service-Oriented Instructional Environments.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
A Generalized Associative Petri Net for Reasoning.
IEEE Trans. Knowl. Data Eng., 2007

A mobile physiological monitoring system for patient transport.
J. High Speed Networks, 2007

MoRVAM: A reverse Vickrey auction system for mobile commerce.
Expert Syst. Appl., 2007

A Secure Protocol of Reverse Discriminatory Auction with Bid Privacy.
Proceedings of the International Conference on Mobile Business (ICMB 2007), 2007

Exploring the Relationships between Personal Characteristics, Aims, and Reasons of Learning in Further Education by Associating Rule Mining.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
A secure reverse Vickrey auction scheme with bid privacy.
Inf. Sci., 2006

Linking secure reverse auction with web service.
Int. J. Serv. Stand., 2006

Taxonomy and survey of RFID anti-collision protocols.
Comput. Commun., 2006

2005
Classification methods in the detection of new malicious emails.
Inf. Sci., 2005

Securing industry-wide EPCglobal Network with WS-Security.
Ind. Manag. Data Syst., 2005

RFID tags: privacy and security aspects.
Int. J. Mob. Commun., 2005

A new reverse auction agent system for m-commerce using mobile agents.
Comput. Stand. Interfaces, 2005

2004
E-mail viruses: how organizations can protect their e-mails.
Online Inf. Rev., 2004

Internet security: malicious e-mails detection and protection.
Ind. Manag. Data Syst., 2004

Bandwidth saturation QoS provisioning for adaptive multimedia in wireless/mobile networks.
Comput. Stand. Interfaces, 2004

Bluetooth technology: an exploratory study of the analysis and implementation frameworks.
Comput. Stand. Interfaces, 2004


  Loading...