Shin-Yan Chiou

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2021
A Real-Time, Automatic, and Dynamic Scheduling and Control System for PET Patients Based on Wearable Sensors.
Sensors, 2021

Generalized Proxy Oblivious Signature and Its Mobile Application.
Secur. Commun. Networks, 2021

2020
Design and Implementation of Beacon-Based Positioning.
J. Inf. Sci. Eng., 2020

A Trusted Mobile Ride-Hailing Evaluation System With Privacy and Authentication.
IEEE Access, 2020

2019
An Efficient RFID Authentication Protocol Using Dynamic Identity.
Int. J. Netw. Secur., 2019

2018
Common friends discovery for multiple parties with friendship ownership and replay-attack resistance in mobile social networks.
Wirel. Networks, 2018

An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment.
Secur. Commun. Networks, 2018

Design and Implementation of a Multiple-Choice E-voting Scheme on Mobile System using Novel t -out-of- n Oblivious Signature.
J. Inf. Sci. Eng., 2018

A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application.
Int. J. Netw. Secur., 2018

An enhanced authentication scheme in mobile RFID system.
Ad Hoc Networks, 2018

A Real-Time, Automated and Privacy-Preserving Mobile Emergency-Medical-Service Network for Informing the Closest Rescuer to Rapidly Support Mobile-Emergency-Call Victims.
IEEE Access, 2018

2017
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature.
Secur. Commun. Networks, 2017

A trustworthy online recommendation system based on social connections in a privacy-preserving manner.
Multim. Tools Appl., 2017

2016
Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.
J. Medical Syst., 2016

2015
An Efficient Privacy Authentication Scheme Based on Cloud Models for Medical Environment.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

2014
Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety.
J. Medical Syst., 2014

2013
Mobile common friends discovery with friendship ownership and replay-attack resistance.
Wirel. Networks, 2013

2012
A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application.
Proceedings of the Radio Frequency Identification System Security, 2012

2009
Micropayment schemes with ability to return changes.
Proceedings of the iiWAS'2009, 2009

A Trustable Reputation Scheme Based on Private Relationships.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

Common Friends Discovery with Privacy and Authenticity.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Efficient Authentication Schemes for Handover in Mobile WiMAX.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2003
Cryptanalysis of an optimized protocol for mobile network authentication and security.
Inf. Process. Lett., 2003

A Tempo-Based <i>t</i>-out-of-<i>n</i> Audio Cryptography Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003


  Loading...