Ruei-Hau Hsu

Orcid: 0000-0003-0856-9229

According to our database1, Ruei-Hau Hsu authored at least 34 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Facing to Latency of Hyperledger Fabric for Blockchain-Enabled IoT: Modeling and Analysis.
IEEE Netw., November, 2023

Universally Secure Device-to-Device Communications with Privacy Protection and Fine-grained Access Control Based on 5G-enabled Multi-access Edge Computing.
J. Inf. Sci. Eng., May, 2023

Ensuring End-to-End Security with Fine-grained Access Control for Connected and Autonomous Vehicles.
CoRR, 2023

Poster: Verifiable Data Valuation with Strong Fairness in Horizontal Federated Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2022

Private Data Preprocessing for Privacy-preserving Federated Learning.
Proceedings of the 5th IEEE International Conference on Knowledge Innovation and Invention, 2022

2021
Is Blockchain Suitable for Data Freshness? An Age-of-Information Perspective.
IEEE Netw., 2021

Latency Modeling of Hyperledger Fabric for Blockchain-based IoT (BC-IoT) Networks.
CoRR, 2021

SGD<sup>2</sup>: Secure Group-based Device-to-Device Communications with Fine-grained Access Control for IoT in 5G.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications.
IEEE Trans. Inf. Forensics Secur., 2020

Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks.
Int. J. Inf. Sec., 2020

EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing.
CoRR, 2020

Is Blockchain Suitable for Data Freshness? - Age-of-Information Perspective.
CoRR, 2020

A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Privacy-preserving Data Sharing with Attribute-based Private Matching Based on Edge Computation in the Internet-of-Things.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices.
IEEE Internet Things J., 2019

Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions.
IEEE Consumer Electron. Mag., 2019

2018
GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks.
IEEE Trans. Inf. Forensics Secur., 2018

Reconfigurable Security: Edge-Computing-Based Framework for IoT.
IEEE Netw., 2018

ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G.
CoRR, 2018

Enhancement of FTP-NDN Supporting Nondesignated Receivers.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

CORE: Cooperative Encryption with its Applications to Controllable Security Services.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2016
Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
J. Inf. Sci. Eng., 2015

Group anonymous D2D communication with end-to-end security in LTE-A.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2013
Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs.
IEEE Trans. Parallel Distributed Syst., 2013

2012
Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme.
Secur. Commun. Networks, 2012

2011
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings.
J. Inf. Sci. Eng., 2011

Group Signature with Constant Revocation Costs for Signers and Verifiers.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.
IEEE/ACM Trans. Netw., 2010

2008
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

2006
Remote Password Authentication Scheme with Smart Cards and Biometrics.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Improved DSA variant for batch verification.
Appl. Math. Comput., 2005

2003
Infinite generating keys based on publish system.
Proceedings of the IEEE International Conference on Systems, 2003


  Loading...