Tzer-Shyong Chen

Orcid: 0000-0001-8915-5057

According to our database1, Tzer-Shyong Chen authored at least 78 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment.
IEEE Access, 2023

2022
Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records.
Knowl. Based Syst., 2022

2021
Machine learning approaches for the genomic prediction of rheumatoid arthritis and systemic lupus erythematosus.
BioData Min., 2021

Who Donates on Line? Segmentation Analysis and Marketing Strategies Based on Machine Learning for Online Charitable Donations in Taiwan.
IEEE Access, 2021

2020
Smart Fall Prediction for Elderly Care Using iPhone and Apple Watch.
Wirel. Pers. Commun., 2020

Web-Based Dashboard for the Interactive Visualization and Analysis of National Risk-Standardized Mortality Rates of Sepsis in the US.
J. Medical Syst., 2020

Applying time-constraint access control of personal health record in cloud computing.
Enterp. Inf. Syst., 2020

The Implementation of IoT-based Smart Laboratory Management System.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Dynamic Hierarchical Security Access Control with Time-Limited Method in Electronic Medical Record.
Proceedings of the Advanced Information Networking and Applications, 2020

VR and AR Technology on Cultural Communication.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

2019
On the security of threshold random grid-based visual secret sharing.
Multim. Tools Appl., 2019

Efficient Hierarchical Key Management Scheme for VR/AR Database Systems.
Int. J. Netw. Secur., 2019

Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
A Stock Market Prediction System Based on High-Level Fuzzy Petri Nets.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2018

A hierarchical access control scheme based on Lagrange interpolation for mobile agents.
Int. J. Distributed Sens. Networks, 2018

An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples.
IEEE Access, 2018

An Implementation of Interactive RFID Positioning Healthcare System on Mobile Platform.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2016
The Application of RFID to Healthcare Management of Nursing House.
Wirel. Pers. Commun., 2016

Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
J. Medical Syst., 2016

Confidentiality Protection of Digital Health Records in Cloud Computing.
J. Medical Syst., 2016

Implementation of Online Veterinary Hospital on Cloud Platform.
J. Medical Syst., 2016

2015
Design of secure access control scheme for personal health record-based cloud healthcare service.
Secur. Commun. Networks, 2015

2014
An Agent-Based Auction Protocol on Mobile Devices.
J. Appl. Math., 2014

2013
Secure PHR Access Control Scheme for Healthcare Application Clouds.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

2012
A Password-Based User Authentication Scheme for the Integrated EPR Information System.
J. Medical Syst., 2012

The Enhancement of Security in Healthcare Information Systems.
J. Medical Syst., 2012

Mobile Agent Application and Integration in Electronic Anamnesis System.
J. Medical Syst., 2012

A Mobile Agent Approach for Secure Integrated Medical Information Systems.
J. Medical Syst., 2012

A Secure Integrated Medical Information System.
J. Medical Syst., 2012

An Authentication Scheme to Healthcare Security under Wireless Sensor Networks.
J. Medical Syst., 2012

Secure Dynamic Access Control Scheme of PHR in Cloud Computing.
J. Medical Syst., 2012

A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce.
Expert Syst. Appl., 2011

2010
An ECC-Based Blind Signature Scheme.
J. Networks, 2010

2009
A novel application of grey system theory to information security (Part I).
Comput. Stand. Interfaces, 2009

A conference key agreement protocol with fault-tolerant capability.
Comput. Stand. Interfaces, 2009

Efficient migration for mobile computing in distributed networks.
Comput. Stand. Interfaces, 2009

Ring signature scheme for ECC-based anonymous signcryption.
Comput. Stand. Interfaces, 2009

Threshold authenticated encryption scheme using labor-division signature.
Comput. Stand. Interfaces, 2009

Efficient migration access control for mobile agents.
Comput. Stand. Interfaces, 2009

A Blind Signature Scheme Based on Elliptic Curve Cryptosystem.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Hierarchical Time-Bound Key Management for Mobile Agents.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

2008
Bidder-anonymous English auction scheme with privacy and public verifiability.
J. Syst. Softw., 2008

Unconditionally secure cryptosystems based on quantum cryptography.
Inf. Sci., 2008

Access control in user hierarchy based on elliptic curve cryptosystem.
Inf. Sci., 2008

Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A Novel Elliptic Curve Dynamic Access Control System.
IEICE Trans. Commun., 2007

ID-based digital signature scheme on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2007

2006
Threshold Signature Scheme Resistible for Conspiracy Attack.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Hacking Tricks Toward Security on Network Environments.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Unconditionally Secure Cryptosystem Based on Quantum Cryptography.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Novel Key Management and Access Control Scheme for Mobile Agent.
Proceedings of the Computational Intelligence, 2006

A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
An efficient threshold group signature scheme.
Appl. Math. Comput., 2005

An efficient threshold RSA digital signature scheme.
Appl. Math. Comput., 2005

A novel cryptosystem based on grey system theory and genetic algorithm.
Appl. Math. Comput., 2005

An efficient undeniable group-oriented signature scheme.
Appl. Math. Comput., 2005

A novel key management scheme for dynamic access control in a user hierarchy.
Appl. Math. Comput., 2005

A threshold signature scheme based on the elliptic curve cryptosystem.
Appl. Math. Comput., 2005

2004
Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem.
J. Comput. Sci. Technol., 2004

A practical authenticated encryption scheme based on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2004

A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2004

An English auction scheme in the online transaction environment.
Comput. Secur., 2004

Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme.
Appl. Math. Comput., 2004

A traceable proxy multisignature scheme based on the elliptic curve cryptosystem.
Appl. Math. Comput., 2004

A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy.
J. Comput. Sci. Technol., 2003

Efficient proxy multisignature schemes based on the elliptic curve cryptosystem.
Comput. Secur., 2003

2002
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations.
Comput. Secur., 2002

Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm.
Comput. Secur., 2002

2000
A Method of Shape Control of Curve Design.
Proceedings of the Geometric Modeling and Processing 2000, 2000

1995
A Simple Tree Pattern Matching Algorithm for Code Generator.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995


  Loading...