Tien-Ho Chen

According to our database1, Tien-Ho Chen authored at least 13 papers between 2010 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography.
Comput. Stand. Interfaces, 2014

2013
Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data.
IET Inf. Secur., 2013

A novel near-infrared array based arterial pulse wave measurement method.
Proceedings of the 2013 IEEE Biomedical Circuits and Systems Conference (BioCAS), Rotterdam, The Netherlands, October 31, 2013

2012
WuKong: a practical video streaming service based on native BitTorrent and scalable video coding.
Multim. Tools Appl., 2012

A SoC design for portable 2-dimension oximeter image system.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

A portable 2-D oximeter image system design for breast foreign tissue detection.
Proceedings of the 2012 IEEE Biomedical Circuits and Systems Conference, 2012

2011
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors, 2011

An efficient anonymous authentication protocol for mobile pay-TV.
J. Netw. Comput. Appl., 2011

Security enhancement on an improvement on two remote user authentication schemes using smart cards.
Future Gener. Comput. Syst., 2011

An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

2010
An Advanced ECC ID-Based Remote Mutual Authentication Scheme for Mobile Devices.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Security Improvement on a Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography.
Proceedings of the Communication and Networking, 2010


  Loading...