Hsiao-Ling Wu

According to our database1, Hsiao-Ling Wu authored at least 21 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A New Attack for Self-Certified Digital Signatures for E-commerce Applications.
J. Inf. Sci. Eng., 2021

2020
A Secure IoT-Based Authentication System in Cloud Computing Environment.
Sensors, 2020

Secure and anonymous authentication scheme for the Internet of Things with pairing.
Pervasive Mob. Comput., 2020

Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations.
KSII Trans. Internet Inf. Syst., 2020

2019
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data.
Secur. Commun. Networks, 2019

Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Communication Network.
Proceedings of the 2019 International Electronics Communication Conference, 2019

2018
Attacks on "a provably secure and efficient authentication scheme for access control in mobile pay-TV systems".
Multim. Tools Appl., 2018

On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

2017
Notes on "Secure authentication scheme for IoT and cloud servers".
Pervasive Mob. Comput., 2017

Adaptive image sharing based on the quadri-directional search strategy with meaningful shadows.
Multim. Tools Appl., 2017

Secure CAS-based authentication scheme for mobile pay-TV systems.
Int. J. Commun. Syst., 2017

2016
A secure authentication scheme with provable correctness for pay-TV systems.
Secur. Commun. Networks, 2016

Distortion-free secret image sharing method with two meaningful shadows.
IET Image Process., 2016

2015
A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems.
J. Inf. Hiding Multim. Signal Process., 2015

2014
A Fast and Secure Scheme for Data Outsourcing in the Cloud.
KSII Trans. Internet Inf. Syst., 2014

An authentication and key agreement protocol for satellite communications.
Int. J. Commun. Syst., 2014

Applying Histogram Modification to Embed Secret Message in AMBTC.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
An Efficient Smart Card Based Authentication Scheme Using Image Encryption.
J. Inf. Sci. Eng., 2013

An Image Encryption Scheme Based on Concatenated Torus Automorphisms.
KSII Trans. Internet Inf. Syst., 2013

An Anonymous Multi-Receiver Encryption Based on RSA.
Int. J. Netw. Secur., 2013


  Loading...