Hsing-Bai Chen

According to our database1, Hsing-Bai Chen authored at least 13 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security.
Symmetry, 2021

2019
Secure and efficient protection for HTTP cookies with self-verification.
Int. J. Commun. Syst., 2019

2018
A novel DRM scheme for accommodating expectations of personal use.
Multim. Tools Appl., 2018

2011
An Anti-phishing User Authentication Scheme without Using a Sensitive Key Table.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Secure communication between set-top box and smart card for fair use in DTV broadcasting.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

2009
A self-verification authentication mechanism for mobile satellite communication systems.
Comput. Electr. Eng., 2009

Enhancement of the RFID security method with ownership transfer.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
A round- and computation-efficient three-party authenticated key exchange protocol.
J. Syst. Softw., 2008

Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Comput. Stand. Interfaces, 2008

An Efficient Non-repudiation Mechanism for SIP-Based Services.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2005
A secure on-line software transaction scheme.
Comput. Stand. Interfaces, 2005

Self-Stabilization Neighborhood Synchronizer for Uniform Rings.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

Remote User Authentication Scheme with User Anonymity.
Proceedings of The 2005 International Conference on Security and Management, 2005


  Loading...