Hang Tu

According to our database1, Hang Tu authored at least 14 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A SM2 based efficient and lightweight batch verification approach for IC cards.
J. Inf. Secur. Appl., March, 2023

A Pipelined AES and SM4 Hardware Implementation for Multi-tasking Virtualized Environments.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
Effective Deep Attributed Network Representation Learning With Topology Adapted Smoothing.
IEEE Trans. Cybern., 2022

2019
Fingerprint authentication based on fuzzy extractor in the mobile device.
Int. J. Electron. Secur. Digit. Forensics, 2019

Efficient authentication scheme for vehicular ad-hoc networks with batch verification using bilinear pairings.
Int. J. Embed. Syst., 2019

A Generalized Obfuscation Method to Protect Software of Mobile Apps.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

2018
Secure and efficient authentication scheme for access control in mobile pay-TV systems.
Int. J. Electron. Secur. Digit. Forensics, 2018

2015
An improved authentication protocol for session initiation protocol using smart card.
Peer-to-Peer Netw. Appl., 2015

A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments.
Multim. Tools Appl., 2015

2014
Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system.
J. Supercomput., 2014

An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
J. Supercomput., 2014

Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol.
Inf. Technol. Control., 2014

A security enhanced password authentication and update scheme based on elliptic curve cryptography.
Int. J. Electron. Secur. Digit. Forensics, 2014

2007
Design of Electronic Circuits Using a Divide-and-Conquer Approach.
Proceedings of the Evolvable Systems: From Biology to Hardware, 2007


  Loading...