Iuon-Chang Lin

According to our database1, Iuon-Chang Lin authored at least 82 papers between 2000 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Case study of physical internet for improving efficiency in solar cell industry.
J. Ambient Intelligence and Humanized Computing, 2018

A Survey of E-book Digital Right Management.
I. J. Network Security, 2018

2017
Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery.
Informatica, Lith. Acad. Sci., 2017

A Survey of Blockchain Security Issues and Challenges.
I. J. Network Security, 2017

2016
Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process.
JCP, 2016

The Novel Features for Phishing Based on User Device Detection.
JCP, 2016

2015
A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments.
Mobile Information Systems, 2015

A Cloud-Based Authentication Protocol for RFID Supply Chain Systems.
J. Network Syst. Manage., 2015

The Secure Transaction Protocol in NFC Card Emulation Mode.
I. J. Network Security, 2015

An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks.
IJDSN, 2015

Secure Electronic Coupons.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
A source authentication scheme based on message recovery digital signature for multicast.
Int. J. Communication Systems, 2014

NFC Attacks Analysis and Survey.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
Data Hiding for HTML Files Using Character Coding Table and Index Coding Table.
TIIS, 2013

2012
An effective AKA protocol for UMTS.
IJMC, 2012

Providing perfect forward secrecy for location-aware wireless sensor networks.
EURASIP J. Wireless Comm. and Networking, 2012

A Cloud-User Access Control Mechanism Based on Data Masking.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
Special issue on soft computing for information system security.
Appl. Soft Comput., 2011

A Dynamic Join-leave Multi-purpose Scheme for RFID Infrastructure.
Proceedings of the PECCS 2011, 2011

HB Family RFID Mutual Authentication Protocol.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
A least-significant-bit substitution data hiding scheme by using modulus function and optimal permutation refining.
IJMIS, 2010

Multicast Key Management without Rekeying Processes.
Comput. J., 2010

Resampling Halftone Images Using Interpolation and Error-Diffusion.
Comput. J., 2010

An Improved Digital Signature Scheme with Fault Tolerance in RSA.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

An Efficient Source Authentication for Multicast Based on Merkle Hash Tree.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Flexible RFID location system based on artificial neural networks for medical care facilities.
SIGBED Review, 2009

A countable and time-bound password-based user authentication scheme for the applications of electronic commerce.
Inf. Sci., 2009

TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS.
Int. Journal of Network Management, 2009

A novel key management scheme for dynamic multicast communications.
Int. J. Communication Systems, 2009

Hiding data in spatial domain images with distortion tolerance.
Computer Standards & Interfaces, 2009

An Efficient Mutual Authentication Protocol for RFID Systems.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System.
Wireless Personal Communications, 2008

New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency.
J. Comput. Sci. Technol., 2008

A neural network system for authenticating remote users in multi-server architecture.
Int. J. Communication Systems, 2008

An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Halftone image resampling by interpolation and error-diffusion.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

2007
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment.
Wireless Personal Communications, 2007

Security enhancement for digital signature schemes with fault tolerance in RSA.
Inf. Sci., 2007

A new steganographic method for color and grayscale image hiding.
Computer Vision and Image Understanding, 2007

A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Efficient Steganography Scheme for M-Commerce.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Edge Enhanced Technique for Digital Halftoning Using Error Diffusion.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
A new solution for assigning cryptographic keys to control access in mobile agent environments.
Wireless Communications and Mobile Computing, 2006

An Efficient Progressive Image Transmission Scheme for Chinese Calligraphy.
IJPRAI, 2006

Reversible Watermarking: Current Status and Key Issues.
I. J. Network Security, 2006

An Access Control System with Time-constraint Using Support Vector Machines.
I. J. Network Security, 2006

An Improvement on Secure E-mail Protocols Providing Perfect Forward Secrecy.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Secure and Efficient Scheme for Authenticating Remote Users using Smart Card.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
A user authentication system using back-propagation network.
Neural Computing and Applications, 2005

Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Informatica, Lith. Acad. Sci., 2005

A dynamic mechanism for determining relationships in a partially ordered user hierarchy.
IJHPCN, 2005

The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain.
Des. Codes Cryptography, 2005

An ID-based multisignature scheme without reblocking and predetermined signing order.
Computer Standards & Interfaces, 2005

A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters.
Computers and Artificial Intelligence, 2005

2004
Remarks on fingerprint-based remote user authentication scheme using smart cards.
Operating Systems Review, 2004

An improvement of delegated multisignature scheme with document decomposition.
Operating Systems Review, 2004

Novel full-search schemes for speeding up image coding using vector quantization.
Real-Time Imaging, 2004

A Secure LITESET Scheme.
IEICE Transactions, 2004

Efficient access control and key management schemes for mobile agents.
Computer Standards & Interfaces, 2004

A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively.
The Visual Computer, 2003

A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IEEE Trans. Knowl. Data Eng., 2003

A new remote user authentication scheme for multi-server architecture.
Future Generation Comp. Syst., 2003

A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Generation Comp. Syst., 2003

Security enhancement for anonymous secure e-voting over a network.
Computer Standards & Interfaces, 2003

The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture.
Computer Standards & Interfaces, 2003

2002
Adding timestamps to the secure electronic auction protocol.
Data Knowl. Eng., 2002

An Efficient Edge Detection Technique for Chinese Calligraphy.
Proceedings of the 6th Joint Conference on Information Science, 2002

2001
A remote password authentication scheme for multiserver architecture using neural networks.
IEEE Trans. Neural Networks, 2001

A simple micro-payment scheme.
Journal of Systems and Software, 2001

Cryptanalysis of the Improved User Efficient Blind Signatures.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci., 2000

Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures.
Informatica, Lith. Acad. Sci., 2000

Security Enhancement for the "Simple Authentication Key Agreement Algorithm".
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000


  Loading...