Mu-En Wu

According to our database1, Mu-En Wu authored at least 43 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A shareable keyword search over encrypted data in cloud computing.
The Journal of Supercomputing, 2018

A Novel Approach of Option Portfolio Construction Using the Kelly Criterion.
IEEE Access, 2018

Oblivious Transfer Protocols Based on Commutative Encryption.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

A Novel Approach for Option Trading Based on Kelly Criterion.
Proceedings of the Intelligent Information and Database Systems - 10th Asian Conference, 2018

2017
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud.
Signal Processing Systems, 2017

Using trading mechanisms to investigate large futures data and their implications to market trends.
Soft Comput., 2017

2016
On the Study of Trading Strategies Within Limited Arbitrage Based on SVM.
Proceedings of the Genetic and Evolutionary Computing, 2016

Numerical Evaluation of Two Management Schemes for Sharing Limited Bandwidth.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

2015
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks.
J. UCS, 2015

An atomic routing game for multi-class communication networks with quality of service requirements.
Proceedings of the 24th Wireless and Optical Communication Conference, 2015

An Empirical Comparison between Kelly Criterion and Vince's Optimal F.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Empirical Evaluations on Momentum Effects of Taiwan Index Futures Market.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Resisting Dynamic Strategies in Gradually Evolving Worlds.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A KL Divergence Function for Randomized Secret Shares.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

An Adaptive Kelly Betting Strategy for Finite Repeated Games.
Proceedings of the Genetic and Evolutionary Computing, 2015

Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the Genetic and Evolutionary Computing, 2015

2014
A communication-efficient private matching scheme in Client-Server model.
Inf. Sci., 2014

On the improvement of Fermat factorization using a continued fraction technique.
Future Generation Comp. Syst., 2014

CRFID: An RFID system with a cloud database as a back-end server.
Future Generation Comp. Syst., 2014

A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2014

Security Analysis and Improvement of Femtocell Access Control.
Proceedings of the Network and System Security - 8th International Conference, 2014

An Improved Visual Cryptography with Cheating Prevention.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A Methodology for Hook-Based Kernel Level Rootkits.
Proceedings of the Information Security Practice and Experience, 2014

Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

On the design of trading schemes of equity funds based on random traders.
Proceedings of the 2014 IEEE International Conference on Granular Computing, 2014

2013
Rating Equity Funds against Return of Random Traders.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks.
TOSN, 2012

On the Improvement of Fermat Factorization.
Proceedings of the Network and System Security - 6th International Conference, 2012

Cryptanalysis of Exhaustive Search on Attacking RSA.
Proceedings of the Network and System Security - 6th International Conference, 2012

Making Profit in a Prediction Market.
Proceedings of the Computing and Combinatorics - 18th Annual International Conference, 2012

2009
Trading decryption for speeding encryption in Rebalanced-RSA.
Journal of Systems and Software, 2009

Short-Exponent RSA.
IEICE Transactions, 2009

Simple Backdoors on RSA Modulus by Using RSA Vulnerability.
IEICE Transactions, 2009

A Note on Factoring alpha-LSBS Moduli.
IEICE Transactions, 2009

A Pair-wise Key Establishment for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
IACR Cryptology ePrint Archive, 2008

Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

On the Improvement of the BDF Attack on LSBS-RSA.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Dual RSA and Its Security Analysis.
IEEE Trans. Information Theory, 2007

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2005
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent.
IACR Cryptology ePrint Archive, 2005


  Loading...