Iuon-Chang Lin

According to our database1, Iuon-Chang Lin authored at least 85 papers between 2000 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Research on the Secure Financial Surveillance Blockchain Systems.
Int. J. Netw. Secur., 2020

2019
A real-time parking service with proxy re-encryption in vehicular cloud computing.
Eng. Appl. Artif. Intell., 2019

A Novel Sharing M-Coupons with Lightweight Computations via Cloud Computing.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

2018
Case study of physical internet for improving efficiency in solar cell industry.
J. Ambient Intell. Humaniz. Comput., 2018

A Survey of E-book Digital Right Management.
Int. J. Netw. Secur., 2018

Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

2017
Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery.
Informatica, 2017

A Survey of Blockchain Security Issues and Challenges.
Int. J. Netw. Secur., 2017

2016
Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process.
J. Comput., 2016

The Novel Features for Phishing Based on User Device Detection.
J. Comput., 2016

2015
A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments.
Mob. Inf. Syst., 2015

A Cloud-Based Authentication Protocol for RFID Supply Chain Systems.
J. Netw. Syst. Manag., 2015

The Secure Transaction Protocol in NFC Card Emulation Mode.
Int. J. Netw. Secur., 2015

An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Secure Electronic Coupons.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
A source authentication scheme based on message recovery digital signature for multicast.
Int. J. Commun. Syst., 2014

NFC Attacks Analysis and Survey.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
Data Hiding for HTML Files Using Character Coding Table and Index Coding Table.
KSII Trans. Internet Inf. Syst., 2013

2012
An effective AKA protocol for UMTS.
Int. J. Mob. Commun., 2012

Providing perfect forward secrecy for location-aware wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2012

A Cloud-User Access Control Mechanism Based on Data Masking.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
Special issue on soft computing for information system security.
Appl. Soft Comput., 2011

A Dynamic Join-leave Multi-purpose Scheme for RFID Infrastructure.
Proceedings of the PECCS 2011, 2011

HB Family RFID Mutual Authentication Protocol.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
A least-significant-bit substitution data hiding scheme by using modulus function and optimal permutation refining.
Int. J. Multim. Intell. Secur., 2010

Multicast Key Management without Rekeying Processes.
Comput. J., 2010

Resampling Halftone Images Using Interpolation and Error-Diffusion.
Comput. J., 2010

An Improved Digital Signature Scheme with Fault Tolerance in RSA.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

An Efficient Source Authentication for Multicast Based on Merkle Hash Tree.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Flexible RFID location system based on artificial neural networks for medical care facilities.
SIGBED Rev., 2009

A countable and time-bound password-based user authentication scheme for the applications of electronic commerce.
Inf. Sci., 2009

TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS.
Int. J. Netw. Manag., 2009

A novel key management scheme for dynamic multicast communications.
Int. J. Commun. Syst., 2009

Hiding data in spatial domain images with distortion tolerance.
Comput. Stand. Interfaces, 2009

An Efficient Mutual Authentication Protocol for RFID Systems.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System.
Wirel. Pers. Commun., 2008

New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency.
J. Comput. Sci. Technol., 2008

A neural network system for authenticating remote users in multi-server architecture.
Int. J. Commun. Syst., 2008

An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Halftone image resampling by interpolation and error-diffusion.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

2007
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment.
Wirel. Pers. Commun., 2007

Security enhancement for digital signature schemes with fault tolerance in RSA.
Inf. Sci., 2007

A new steganographic method for color and grayscale image hiding.
Comput. Vis. Image Underst., 2007

A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Efficient Steganography Scheme for M-Commerce.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Edge Enhanced Technique for Digital Halftoning Using Error Diffusion.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
A new solution for assigning cryptographic keys to control access in mobile agent environments.
Wirel. Commun. Mob. Comput., 2006

An Efficient Progressive Image Transmission Scheme for Chinese Calligraphy.
Int. J. Pattern Recognit. Artif. Intell., 2006

Reversible Watermarking: Current Status and Key Issues.
Int. J. Netw. Secur., 2006

An Access Control System with Time-constraint Using Support Vector Machines.
Int. J. Netw. Secur., 2006

An Improvement on Secure E-mail Protocols Providing Perfect Forward Secrecy.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Secure and Efficient Scheme for Authenticating Remote Users using Smart Card.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
A user authentication system using back-propagation network.
Neural Comput. Appl., 2005

Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Informatica, 2005

A dynamic mechanism for determining relationships in a partially ordered user hierarchy.
Int. J. High Perform. Comput. Netw., 2005

The General Pay-Word: A Micro-payment Scheme Based on <i>n</i>-dimension One-way Hash Chain.
Des. Codes Cryptogr., 2005

An ID-based multisignature scheme without reblocking and predetermined signing order.
Comput. Stand. Interfaces, 2005

A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters.
Comput. Artif. Intell., 2005

2004
Remarks on fingerprint-based remote user authentication scheme using smart cards.
ACM SIGOPS Oper. Syst. Rev., 2004

An improvement of delegated multisignature scheme with document decomposition.
ACM SIGOPS Oper. Syst. Rev., 2004

Novel full-search schemes for speeding up image coding using vector quantization.
Real Time Imaging, 2004

A Secure LITESET Scheme.
IEICE Trans. Inf. Syst., 2004

Efficient access control and key management schemes for mobile agents.
Comput. Stand. Interfaces, 2004

A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively.
Vis. Comput., 2003

A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IEEE Trans. Knowl. Data Eng., 2003

A new remote user authentication scheme for multi-server architecture.
Future Gener. Comput. Syst., 2003

A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Gener. Comput. Syst., 2003

Security enhancement for anonymous secure e-voting over a network.
Comput. Stand. Interfaces, 2003

The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture.
Comput. Stand. Interfaces, 2003

2002
Adding timestamps to the secure electronic auction protocol.
Data Knowl. Eng., 2002

An Efficient Edge Detection Technique for Chinese Calligraphy.
Proceedings of the 6th Joint Conference on Information Science, 2002

2001
A remote password authentication scheme for multiserver architecture using neural networks.
IEEE Trans. Neural Networks, 2001

A simple micro-payment scheme.
J. Syst. Softw., 2001

Cryptanalysis of the Improved User Efficient Blind Signatures.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, 2000

Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures.
Informatica, 2000

Security Enhancement for the "Simple Authentication Key Agreement Algorithm".
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000


  Loading...