King-Hang Wang

Orcid: 0000-0002-4475-7596

According to our database1, King-Hang Wang authored at least 29 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A secure authenticated and key exchange scheme for fog computing.
Enterp. Inf. Syst., 2021

2019
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications.
J. Ambient Intell. Humaniz. Comput., 2019

A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems.
IEEE Access, 2019

Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments.
IEEE Access, 2019

A Secure Authentication Protocol for Internet of Vehicles.
IEEE Access, 2019

Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks.
Proceedings of the Genetic and Evolutionary Computing, 2019

A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks.
Proceedings of the Genetic and Evolutionary Computing, 2019

2018
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags.
J. Supercomput., 2018

Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
J. Netw. Intell., 2018

Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol.
J. Inf. Sci. Eng., 2018

Comments on Recent Proposed Cui Et Al.'s KASE and Lu Et Al.'s dIBEKS Schemes.
J. Inf. Hiding Multim. Signal Process., 2018

Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map.
J. Inf. Hiding Multim. Signal Process., 2018

Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

A Public Auditing Scheme with Data Recovery.
Proceedings of the Genetic and Evolutionary Computing, 2018

2017
A secure authentication scheme for Internet of Things.
Pervasive Mob. Comput., 2017

Comments on a privacy preserving public auditing mechanism for shared cloud data.
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017

On the Security of a Certificateless Public Key Encryption with Keyword Search.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2017

Comments on Yu et al's Shared Data Integrity Verification Protocol.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

2014
CRFID: An RFID system with a cloud database as a back-end server.
Future Gener. Comput. Syst., 2014

2013
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2013

2011
A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code.
IEEE Trans. Computers, 2011

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

2009
On the security of the secure arithmetic code.
IEEE Trans. Inf. Forensics Secur., 2009

On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme.
IEEE Trans. Dependable Secur. Comput., 2009

SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
On the Security of Chien's Ultralightweight RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2008

Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008


  Loading...