Jheng-Jia Huang

Orcid: 0000-0003-1050-6390

According to our database1, Jheng-Jia Huang authored at least 28 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

Anonymous and Unlinkable Identity Scheme in Open Data Environment.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
A Robust Two Factor Authentication Scheme with Fine Grained Biometrics Verification.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Cross-Network-Slice Authentication Scheme for the 5<sup>th</sup> Generation Mobile Communication System.
IEEE Trans. Netw. Serv. Manag., 2021

Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery.
IEEE Trans. Cloud Comput., 2021

An Efficient Secure Handover Scheme Supporting Cross-Network Slicing for Multi-Operator Environments.
Proceedings of the Thirteenth International Conference on Mobile Computing and Ubiquitous Network, 2021

Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications.
IEEE Trans. Inf. Forensics Secur., 2020

A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes.
Proceedings of the International Computer Symposium, 2020

2018
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers.
IEEE Syst. J., 2018

Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading.
IEEE Internet Things J., 2018

Probably Secure Efficient Anonymous Credential Scheme.
Int. J. Softw. Innov., 2018

ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G.
CoRR, 2018

Verifiable Privacy-Preserving Payment Mechanism for Smart Grids.
Proceedings of the Internet and Distributed Computing Systems, 2018

Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Multireceiver Predicate Encryption for Online Social Networks.
IEEE Trans. Signal Inf. Process. over Networks, 2017

Provably Secure Timed-Release Proxy Conditional Reencryption.
IEEE Syst. J., 2017

Homomorphic encryption supporting logical operations.
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017

2016
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

2015
A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
An Efficient Authentication and Service Key Agreement Scheme in IOT Environments.
Proceedings of the Intelligent Systems and Applications, 2014

Strongly Privacy-Preserving Communication Protocol for VANETs.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Anonymous Multi-receiver Certificate-Based Encryption.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Secure Certificateless Signature Scheme Supporting Batch Verification.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013


  Loading...