Hui-Feng Huang

According to our database1, Hui-Feng Huang authored at least 43 papers between 2002 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Convertible Multi-authenticated Encryption Scheme for Data Communication.
Int. J. Netw. Secur., 2015

2014
Enhancement of Timestamp-based User Authentication Scheme with Smart Card.
Int. J. Netw. Secur., 2014

An efficient <i>t</i>-out-of-<i>n</i> oblivious transfer for information security and privacy protection.
Int. J. Commun. Syst., 2014

User Authentication with Anonymity for Roaming Service with Smart Cards in Global Mobility Networks.
Ad Hoc Sens. Wirel. Networks, 2014

A privacy and authentication protocol for mobile RFID system.
Proceedings of the 2014 IEEE International Symposium on Independent Computing, 2014

2013
Active steganalysis for interpolation-error based reversible data hiding.
Pattern Recognit. Lett., 2013

Efficient Mobile Conference Scheme for Wireless Communication.
Informatica, 2013

2012
Enhancement of Dynamic ID Based User Authentication for Multi-server Environment.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

The Case Study of Adaptive Network-Based Fuzzy Inference System Modeling for TAIEX Prediction.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
Efficient key management for preserving HIPAA regulations.
J. Syst. Softw., 2011

A New Design of Access Control in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2011

Efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2011

2010
Efficient Access Control in a Hierarchy for Hardware-limited Users.
J. Convergence Inf. Technol., 2010

A New Design of Encryption/Decryption for Field Applications.
J. Convergence Inf. Technol., 2010

Designing a New Mutual Authentication Scheme Based on Nonce and Smart Cards.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

Enhancement of Two-Factor User Authentication in Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
A simple three-party password-based key exchange protocol.
Int. J. Commun. Syst., 2009

A novel access control protocol for secure sensor networks.
Comput. Stand. Interfaces, 2009

An Efficient Three Party Authenticated Key Exchange for Mobile Communications.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

2008
A novel efficient conference scheme for mobile communications.
Int. J. Mob. Commun., 2008

A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy.
Fundam. Informaticae, 2008

A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network.
Proceedings of the Intelligence and Security Informatics, 2008

A New Dynamic Access Control in Wireless Sensor Networks.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Enhancement of the Mutual Authentication protocol on RFID Passive Tags.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A New Design of Efficient Key Pre-distribution Scheme for Secure Wireless Sensor Networks.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Efficient Mutual Authentication Protocol on RFID Tags.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
A novel efficient (<i>t</i>, <i>n</i>) threshold proxy signature scheme.
Inf. Sci., 2006

A New Efficient Authentication Scheme for Session Initiation Protocol.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A New Cryptographic Key Assignment Scheme using a One-way Hash Function.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

An Untraceable Forward-Secure Blind Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

An Untraceable Electronic Cash System Using Fair Blind Signatures.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

2005
Multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Comput. Stand. Interfaces, 2005

Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Appl. Math. Comput., 2005

A Novel Conference Key Distribution System with Re-keying Protocol.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

An efficient deniable authentication protocol.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A New Design for Efficient t-out-n Oblivious Transfer Scheme.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
A new design of efficient partially blind signature scheme.
J. Syst. Softw., 2004

A new cryptographic key assignment scheme with time-constraint access control in a hierarchy.
Comput. Stand. Interfaces, 2004

2003
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers.
Fundam. Informaticae, 2003

An Efficient Convertible Authenticated Encryption Scheme and Its Variant.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

2002
Cryptanalysis of the WD Public-Key Cryptosystem.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002


  Loading...