Ting-Fang Cheng

According to our database1, Ting-Fang Cheng authored at least 20 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem.
Int. J. Inf. Comput. Secur., 2021

2020
The Research on Scent and Fragrance in Memory with Machine Learning.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

2017
Secret sharing: using meaningful image shadows based on Gray code.
Multim. Tools Appl., 2017

Smart card-based password authenticated key agreement protocol using chaotic maps.
Int. J. Commun. Syst., 2017

2016
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving.
J. Electr. Comput. Eng., 2016

An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards.
Int. J. Netw. Secur., 2016

A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards.
Int. J. Commun. Syst., 2016

Comments on the authentication scheme for IoT and cloud servers.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016

2015
A dependable storage service system in cloud environment.
Secur. Commun. Networks, 2015

2014
A Provably Secure t-out-of-n Oblivious Transfer Mechanism based on Blind Signature.
J. Inf. Hiding Multim. Signal Process., 2014

An authentication and key agreement protocol for satellite communications.
Int. J. Commun. Syst., 2014

A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy.
Fundam. Informaticae, 2014

A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment.
Comput. J., 2014

A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
A Novel Electronic English Auction System With a Secure On-Shelf Mechanism.
IEEE Trans. Inf. Forensics Secur., 2013

A high-performance reversible data-hiding scheme for LZW codes.
J. Syst. Softw., 2013

2009
An efficient proxy raffle protocol with anonymity-preserving.
Comput. Stand. Interfaces, 2009

2008
Security design for three-party encrypted key exchange protocol using smart cards.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

2007
Security enhancement of an IC-card-based remote login mechanism.
Comput. Networks, 2007


  Loading...