Nai-Wei Lo
Orcid: 0000-0003-4622-4977
  According to our database1,
  Nai-Wei Lo
  authored at least 90 papers
  between 1997 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
A robust and efficient blockchain-based framework for updating firmware in IoT environments.
    
  
    Peer Peer Netw. Appl., August, 2025
    
  
Dynamic generation mechanism of virtual blockchain networks for cross-chain transactions.
    
  
    Enterp. Inf. Syst., June, 2025
    
  
Dynamic trust management framework using blockchain for zero-trust-based authentication in BYOD environments.
    
  
    Enterp. Inf. Syst., February, 2025
    
  
    ICT Express, 2025
    
  
Authentication protocol for vehicular networks using Zero-Knowledge Proofs and Elliptic Curve Cryptography.
    
  
    ICT Express, 2025
    
  
  2024
Quantum-Resistant Updatable Public Keys: Enhancing the Quisquis Protocol with LWE-Based Security.
    
  
    Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2024
    
  
Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key.
    
  
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
    
  
  2023
    Proceedings of the 18th Asia Joint Conference on Information Security, 2023
    
  
  2022
A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments.
    
  
    Proceedings of the New Trends in Computer Technologies and Applications, 2022
    
  
  2020
    Wirel. Pers. Commun., 2020
    
  
    Int. J. Inf. Sec., 2020
    
  
Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms.
    
  
    CoRR, 2020
    
  
    Proceedings of the 15th Asia Joint Conference on Information Security, 2020
    
  
  2019
    IEEE Access, 2019
    
  
    Proceedings of the IEEE/SICE International Symposium on System Integration, 2019
    
  
Privacy-Preserving Encryption-Domain Video Retrieval over the Cloud via Block Transformations of Key Frames.
    
  
    Proceedings of the 42nd International Convention on Information and Communication Technology, 2019
    
  
F1ow-based Anomaly Detection Using Multilayer Perceptron in Software Defined Networks.
    
  
    Proceedings of the 42nd International Convention on Information and Communication Technology, 2019
    
  
    Proceedings of the Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology - ISAT 2019, 2019
    
  
    Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
    
  
  2018
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.
    
  
    Sensors, 2018
    
  
    Sensors, 2018
    
  
Streaming data analysis framework for cyber-physical system of metal machining processes.
    
  
    Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
    
  
    Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
    
  
  2017
A secure smart card authentication and authorization framework using in multimedia cloud.
    
  
    Multim. Tools Appl., 2017
    
  
Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
    
  
    IEICE Trans. Inf. Syst., 2017
    
  
    Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
    
  
  2016
    IEEE Trans. Smart Grid, 2016
    
  
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings.
    
  
    IEEE Trans. Intell. Transp. Syst., 2016
    
  
    IEEE Syst. J., 2016
    
  
Provably secure anonymous authentication with batch verification for mobile roaming services.
    
  
    Ad Hoc Networks, 2016
    
  
    Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016
    
  
    Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
    
  
    Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
    
  
  2015
Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings.
    
  
    Wirel. Pers. Commun., 2015
    
  
An Attribute-Role Based Access Control Mechanism for Multi-tenancy Cloud Environment.
    
  
    Wirel. Pers. Commun., 2015
    
  
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
    
  
    IEEE Syst. J., 2015
    
  
Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments.
    
  
    Secur. Commun. Networks, 2015
    
  
A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card.
    
  
    Int. J. Commun. Syst., 2015
    
  
    Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
    
  
A fraud detection system for real-time messaging communication on Android Facebook messenger.
    
  
    Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015
    
  
    Proceedings of the 10th Asia Joint Conference on Information Security, 2015
    
  
    Proceedings of the 10th Asia Joint Conference on Information Security, 2015
    
  
  2014
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration.
    
  
    Wirel. Pers. Commun., 2014
    
  
    J. Appl. Math., 2014
    
  
Secure anonymous authentication scheme without verification table for mobile satellite communication systems.
    
  
    Int. J. Satell. Commun. Netw., 2014
    
  
    Int. J. Distributed Sens. Networks, 2014
    
  
Digital rights management system with user privacy, usage transparency, and superdistribution support.
    
  
    Int. J. Commun. Syst., 2014
    
  
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings.
    
  
    Int. J. Commun. Syst., 2014
    
  
    Proceedings of the Radio Frequency Identification System Security, 2014
    
  
    Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
    
  
An analysis framework for information loss and privacy leakage on Android applications.
    
  
    Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014
    
  
    Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014
    
  
  2013
    Wirel. Pers. Commun., 2013
    
  
A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks.
    
  
    Wirel. Pers. Commun., 2013
    
  
    IEEE Trans. Ind. Informatics, 2013
    
  
    Secur. Commun. Networks, 2013
    
  
    Inf. Technol. Control., 2013
    
  
    Int. J. Distributed Sens. Networks, 2013
    
  
ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices.
    
  
    Ad Hoc Sens. Wirel. Networks, 2013
    
  
    Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
    
  
  2012
    J. Medical Syst., 2012
    
  
    KSII Trans. Internet Inf. Syst., 2012
    
  
    IEEE Commun. Lett., 2012
    
  
    Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
    
  
    Proceedings of the Radio Frequency Identification System Security, 2012
    
  
Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications.
    
  
    Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012
    
  
    Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
    
  
  2011
    J. Inf. Sci. Eng., 2011
    
  
    Int. J. Commun. Syst., 2011
    
  
    EURASIP J. Wirel. Commun. Netw., 2011
    
  
    Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
    
  
  2010
    J. Syst. Softw., 2010
    
  
    J. Inf. Sci. Eng., 2010
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
    Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
    
  
    Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
    
  
    Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
    
  
  2009
    IEICE Trans. Inf. Syst., 2009
    
  
    EURASIP J. Wirel. Commun. Netw., 2009
    
  
    Comput. Stand. Interfaces, 2009
    
  
    Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
    
  
  2008
    Inf. Secur. Tech. Rep., 2008
    
  
    Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
    
  
  2007
    Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
    
  
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System.
    
  
    Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
    
  
  2006
ezBusiness - A Novel Mobile Business Application Architecture.
  
    Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications, 2006
    
  
  1998
Parallel implementation of a unified approach to image focus and defocus analysis on the Parallel Virtual Machine.
    
  
    Proceedings of the Visual Information Processing VII, Orlando, FL, USA, April 13, 1998, 1998
    
  
  1997
    IEEE Trans. Computers, 1997