Junguo Liao

Orcid: 0000-0003-3514-6299

According to our database1, Junguo Liao authored at least 26 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A multikey fully homomorphic encryption privacy protection protocol based on blockchain for edge computing system.
Concurr. Comput. Pract. Exp., February, 2023

DTSAC: Smart Contract-based Access Control with Delegation and Trust Management.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
An adaptive traffic sign recognition scheme based on deep learning in complex environment.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

2021
Blockchain Privacy Protection Algorithm Based on Pedersen Commitment and Zero-knowledge Proof.
Proceedings of the ICBTA 2021: 4th International Conference on Blockchain Technology and Applications, Xi'an, China, December 17, 2021

2020
A Post-processing Trajectory Publication Method Under Differential Privacy.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

Privacy Security Classification (PSC) Model for the Attributes of Social Network Users.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Vehicle Detection Based on Drone Images with the Improved Faster R-CNN.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

2018
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet Things J., 2018

2017
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Secur. Commun. Networks, 2016

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016

An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2015

A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015

Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2015

2014
Robust dynamic ID-based remote user authentication scheme using smart cards.
Int. J. Ad Hoc Ubiquitous Comput., 2014

Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A secure remote user mutual authentication scheme using smart cards.
Proceedings of the IEEE Computers, 2014

2013
An enhanced smart card based remote user password authentication scheme.
J. Netw. Comput. Appl., 2013

Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

2011
Anonymous electronic voting protocol with traceability.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2009
Security Analysis of NSSK Protocol and its Improvement.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2007
Intrusion Detection Using Ensemble of SVM Classifiers.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
Modeling Chinese Wall Policy Using Colored Petri Nets.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005


  Loading...