Kuo-Yu Tsai

Orcid: 0000-0003-0025-5807

According to our database1, Kuo-Yu Tsai authored at least 22 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analyzing image-based political propaganda in referendum campaigns: from elements to strategies.
EPJ Data Sci., December, 2023

Use improved KINECT to recognize whole-body images to enhance accuracy.
Vis. Comput., May, 2023

2022
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract.
J. Inf. Secur. Appl., 2022

2021
Preserving indomitable DDoS vitality through resurrection social hybrid botnet.
Comput. Secur., 2021

2020
Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems.
IEEE Access, 2020

2019
A geographic map-based middleware framework to obfuscate smart vehicles' locations.
Multim. Tools Appl., 2019

2017
Novel designated ownership transfer with grouping proof.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2015
An efficient certificateless signature scheme without bilinear pairings.
Multim. Tools Appl., 2015

Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
J. Inf. Sci. Eng., 2015

Robust Distributed Reprogramming Protocol of Wireless Sensor Networks for Healthcare Systems.
Int. J. Distributed Sens. Networks, 2015

2014
A Novel RFID Tag Identification Protocol: Adaptive $$n$$ n -Resolution and $$k$$ k -Collision Arbitration.
Wirel. Pers. Commun., 2014

2013
Two ID-based authenticated schemes with key agreement for mobile environments.
J. Supercomput., 2013

Analysis and design of a smart card based authentication protocol.
J. Zhejiang Univ. Sci. C, 2013

Efficient and secure three-party authenticated key exchange protocol for mobile environments.
J. Zhejiang Univ. Sci. C, 2013

Robust Certificateless Signature Scheme without Bilinear Pairings.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability.
KSII Trans. Internet Inf. Syst., 2012

2010
A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks.
J. Zhejiang Univ. Sci. C, 2010

Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks.
Int. J. Secur. Networks, 2010

New dynamic ID authentication scheme using smart cards.
Int. J. Commun. Syst., 2010

2008
Recursive protocol for group-oriented authentication with key distribution.
J. Syst. Softw., 2008

Convertible multi-authenticated encryption scheme.
Inf. Sci., 2008

2007
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Inf. Sci., 2007


  Loading...