Wen-Chung Kuo

According to our database1, Wen-Chung Kuo authored at least 57 papers between 1995 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
3D-Playfair Encrypted Message Verification Technology based on MD5.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Verifiable data hiding scheme with tamper detection.
J. Intell. Fuzzy Syst., 2019

A novel multisignature scheme based on chaotic maps.
J. Intell. Fuzzy Syst., 2019

Study on Android Hybrid Malware Detection Based on Machine Learning.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
A high capacity data hiding scheme based on re-adjusted GEMD.
Multim. Tools Appl., 2018

Malware Detection Method Based on CNN.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

2017
Secure multi-group data hiding based on gemd map.
Multim. Tools Appl., 2017

Anonymous and Authentication Protocol For Multi-Server.
Inf. Technol. Control., 2017

Enhancement authentication protocol using zero-knowledge proofs and chaotic maps.
Int. J. Commun. Syst., 2017

2016
Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps.
Inf. Technol. Control., 2016

Signed digit data hiding scheme.
Inf. Process. Lett., 2016

An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
A Formula Diamond Encoding Data Hiding Scheme.
J. Inf. Hiding Multim. Signal Process., 2015

A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme.
J. Inf. Hiding Multim. Signal Process., 2015

E-Health Services for Elderly Care Based on Google Cloud Messaging.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Authenticated Secret Sharing Scheme Based on GMEMD.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

An Enhanced Secure Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Hybrid GEMD Data Hiding.
J. Inf. Hiding Multim. Signal Process., 2014

A DoS-Resistant Robust Identification and Key Agreement Protocol with User Anonymity.
J. Inf. Hiding Multim. Signal Process., 2014

Group Key Management based on (2, 2) Secret Sharing.
KSII Trans. Internet Inf. Syst., 2014

Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks.
Inf. Technol. Control., 2014

An efficient and secure anonymous mobility network authentication scheme.
J. Inf. Secur. Appl., 2014

Robust smart-card-based remote user password authentication scheme.
Int. J. Commun. Syst., 2014

Reversible Shared Data Hiding Based on Modified Signed Digit EMD.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Cryptanalysis of Anonymous Authenticated and Key Agreement Scheme Based on Biometric for Multi-Server Environment.
Proceedings of the Intelligent Systems and Applications, 2014

Data Hiding Based on Radix-2.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Image Hiding by Square Fully Exploiting Modification Directions.
J. Inf. Hiding Multim. Signal Process., 2013

Secure Modulus Data Hiding Scheme.
KSII Trans. Internet Inf. Syst., 2013

Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy.
Inf. Technol. Control., 2013

A Steganographic Scheme Based on Formula Fully Exploiting Modification Directions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A GEMD Data Hiding by Pixel Segmentation Strategy.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Automatic Adding License Management Functionality for Android Applications.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
A Secure Password-Based Remote User Authentication Scheme without Smart Cards.
Inf. Technol. Control., 2012

High-Capacity Steganographic Method Based on Division Arithmetic and LSB Replacement.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Reversible Data Hiding for JPEG Based on EMD.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Single-Packet IP Traceback with Less Logging.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Weaknesses of a Secure Dynamic ID Based Remote User Authentication Scheme.
J. Convergence Inf. Technol., 2010

Digitally signed document flexible sanitizing scheme based on bilinear maps.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

Adaptive reversible data hiding based on histogram.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

High Embedding Reversible Data Hiding Scheme for JPEG.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

High Flexible Sanitizing Signature Scheme Based on Bilinear Maps.
Proceedings of the Future Generation Information Technology, 2010

Detour Routing Protocol for Geographic Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET.
Sensors, 2009

Reversible Secret Image Sharing Based on Shamir's Scheme.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Zero-Collision RFID Tags Identification Based on CDMA.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Security Enhancement of the Authentication Protocol for RFID Systems.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Enhance the Image Sharing with Steganography and Authentication.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Comments on "A Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation".
IEEE Trans. Multim., 2007

Reversible Data Hiding Based on Histogram.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007

On ElGamal Signature Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Design a Secure and Practical Metering Scheme.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006

2005
A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Attack and Improvement on the Lee-Chiu Remote Authentication Schem.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

1999
On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes.
J. Inf. Sci. Eng., 1999

1995
Cryptanalysis of the Enhanced ElGamal's Signature Scheme.
Proceedings of the Cryptography: Policy and Algorithms, 1995


  Loading...