Kuo-Hui Yeh

According to our database1, Kuo-Hui Yeh
  • authored at least 40 papers between 2007 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A robust NFC-based personalized IPTV service system.
Multimedia Tools Appl., 2018

Special Issue on Advanced Persistent Threat.
Future Generation Comp. Syst., 2018

I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics.
IEEE Communications Magazine, 2018

2017
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017

Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.
Sensors, 2017

Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
IEICE Transactions, 2017

Cryptanalysis of Wang et al's Certificateless Signature Scheme without Bilinear Pairings.
IACR Cryptology ePrint Archive, 2017

2016
Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid.
IEEE Systems Journal, 2016

A Secure IoT-Based Healthcare System With Body Sensor Networks.
IEEE Access, 2016

Transparent authentication scheme with adaptive biometrie features for IoT networks.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
An efficient certificateless signature scheme without bilinear pairings.
Multimedia Tools Appl., 2015

A lightweight authentication scheme with user untraceability.
Frontiers of IT & EE, 2015

An Anonymous and Lightweight Authentication Scheme for Mobile Devices.
ITC, 2015

An Efficient Resource Allocation Framework for Cloud Federations.
ITC, 2015

Novel Authentication Schemes for IoT Based Healthcare Systems.
IJDSN, 2015

A fraud detection system for real-time messaging communication on Android Facebook messenger.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

2014
A Novel RFID Tag Identification Protocol: Adaptive $$n$$ n -Resolution and $$k$$ k -Collision Arbitration.
Wireless Personal Communications, 2014

A Provably Secure Multi-server Based Authentication Scheme.
Wireless Personal Communications, 2014

An Authentication Scheme for Ubiquitous RFID Systems.
Proceedings of the Radio Frequency Identification System Security, 2014

An analysis framework for information loss and privacy leakage on Android applications.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Analysis and design of a smart card based authentication protocol.
Journal of Zhejiang University - Science C, 2013

Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care.
IJDSN, 2013

Robust Certificateless Signature Scheme without Bilinear Pairings.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
A Patient Privacy-Aware E-health System Based on Passive RFID.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Analysis of an eHealth Care System with Smart Card Based Authentication.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems.
J. Inf. Sci. Eng., 2011

Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture.
Int. J. Communication Systems, 2011

Adaptive collision resolution for efficient RFID tag identification.
EURASIP J. Wireless Comm. and Networking, 2011

2010
Two robust remote user authentication protocols using smart cards.
Journal of Systems and Software, 2010

Mutual RFID Authentication Scheme for Resource-constrained Tags.
J. Inf. Sci. Eng., 2010

Anonymous Coexistence Proofs for RFID Tags.
J. Inf. Sci. Eng., 2010

De-synchronization attack on RFID authentication protocols.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Cryptanalysis of two three-party encrypted key exchange protocols.
Computer Standards & Interfaces, 2009

Improvement of an EPC Gen2 Compliant RFID Authentication Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
New mutual agreement protocol to secure mobile RFID-enabled devices.
Inf. Sec. Techn. Report, 2008

An Efficient Tree-Based Tag Identification Protocol for RFID Systems.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Novel RFID Authentication Schemes for Security Enhancement and System Efficiency.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007


  Loading...