Wei-Bin Lee

According to our database1, Wei-Bin Lee authored at least 63 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Characterizing Behaviors of Sockpuppets in Online Political Discourses.
J. Inf. Sci. Eng., May, 2023

2022
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions.
J. Inf. Secur. Appl., 2022

2021
Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security.
Symmetry, 2021

2020
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations.
KSII Trans. Internet Inf. Syst., 2020

2019
Secure and efficient protection for HTTP cookies with self-verification.
Int. J. Commun. Syst., 2019

2018
A novel DRM scheme for accommodating expectations of personal use.
Multim. Tools Appl., 2018

2015
A Novel Anti-classification Approach for Knowledge Protection.
J. Medical Syst., 2015

2014
Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication.
Int. J. Digit. Crime Forensics, 2014

A HIPAA-compliant key management scheme with revocation of authorization.
Comput. Methods Programs Biomed., 2014

An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving.
J. Supercomput., 2013

Applying Cloud Computing Technologies to Gerontology and Geriatrics Health Care System (GGHCS).
Proceedings of the 2013 13th International Conference on Quality Software, 2013

2012
An efficient and secure multi-server authentication scheme with key agreement.
J. Syst. Softw., 2012

Convergence Time of Wang's kWTA Network with Stochastic Output Nodes.
Proceedings of the Third FTRA International Conference on Mobile, 2012

An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme in Vehicular Ad-hoc Networks.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Routing Protocols with Power Saving and Data Salvation for Wireless Sensor Networks.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

A CAPTCHA with Tips Related to Alphabets Upper or Lower Case.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

A SWE-Based Network Management Framework for Environment Monitoring.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2011
A Novel Key Management Solution for Reinforcing Compliance With HIPAA Privacy/Security Regulations.
IEEE Trans. Inf. Technol. Biomed., 2011

Adaptive Secret Sharing for Color Images.
Int. J. Comput. Intell. Syst., 2011

An Anti-phishing User Authentication Scheme without Using a Sensitive Key Table.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Secure communication between set-top box and smart card for fair use in DTV broadcasting.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

2009
A Practical and Efficient Electronic Checkbook.
J. Organ. Comput. Electron. Commer., 2009

An Overall Cost-effective Authentication Technique for the Global Mobility Network.
Int. J. Netw. Secur., 2009

A self-verification authentication mechanism for mobile satellite communication systems.
Comput. Electr. Eng., 2009

A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Enhancement of the RFID security method with ownership transfer.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations.
IEEE Trans. Inf. Technol. Biomed., 2008

A round- and computation-efficient three-party authenticated key exchange protocol.
J. Syst. Softw., 2008

A Self-Concealing Mechanism for Authentication of Portable Communication Systems.
Int. J. Netw. Secur., 2008

A Secure Authentication Scheme with Anonymity for Wireless Communications.
IEEE Commun. Lett., 2008

Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks.
Comput. Stand. Interfaces, 2008

A new method for using hash functions to solve remote user authentication.
Comput. Electr. Eng., 2008

An Efficient Non-repudiation Mechanism for SIP-Based Services.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
A Portable DRM Scheme Using Smart Cards.
J. Organ. Comput. Electron. Commer., 2007

A novel deniable authentication protocol using generalized ElGamal signature scheme.
Inf. Sci., 2007

A secure protocol for misbehavior-penalization-based fair digital signature exchange.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Security enhancement of a novel proxy key generation protocol.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Improved self-certified group-oriented cryptosystem without a combiner.
J. Syst. Softw., 2006

Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting.
Proceedings of the Ninth International Conference on Control, 2006

2005
A new delegation-based authentication protocol for use in portable communication systems.
IEEE Trans. Wirel. Commun., 2005

A publicly verifiable copyright-proving scheme resistant to malicious attacks.
IEEE Trans. Ind. Electron., 2005

An enhanced user authentication scheme for multi-server Internet services.
Appl. Math. Comput., 2005

Remarks on some signature schemes based on factoring and discrete logarithms.
Appl. Math. Comput., 2005

Self-Stabilization Neighborhood Synchronizer for Uniform Rings.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

Efficient Date-Constraint Hierarchical Key Assignment Scheme.
Proceedings of The 2005 International Conference on Security and Management, 2005

Remote User Authentication Scheme with User Anonymity.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems.
J. Netw. Comput. Appl., 2004

A smart card-based remote scheme for password authentication in multi-server Internet services.
Comput. Stand. Interfaces, 2004

Secure SAS-like password authentication schemes.
Comput. Stand. Interfaces, 2004

2002
A public verifiable copy protection technique for still images.
J. Syst. Softw., 2002

1999
A concept of designing cheater identification methods for secret sharing.
J. Syst. Softw., 1999

(t, n) Threshold Digital Signature With Traceability Property.
J. Inf. Sci. Eng., 1999

Conference key distribution schemes for portable communication systems.
Comput. Commun., 1999

1998
Using RSA with low exponent in a public network.
Comput. Commun., 1998

Authenticity of public keys in asymmetric cryptosystems.
Comput. Commun., 1998

A Scheme for Obtaining a Message from the Digital Multisignature.
Proceedings of the Public Key Cryptography, 1998

1997
Authenticated Encryption Schemes with Linkage Between Message Blocks.
Inf. Process. Lett., 1997

Three ID-based information security functions.
Comput. Commun., 1997

1996
On Key Changeable ID-Based Digital Signature Scheme.
J. Inf. Sci. Eng., 1996

Integrating Authentication in Public Key Distribution System.
Inf. Process. Lett., 1996


  Loading...