Woei-Jiunn Tsaur

According to our database1, Woei-Jiunn Tsaur authored at least 39 papers between 1995 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
DANS: A Secure and Efficient Driver-Abnormal Notification Scheme With IoT Devices Over IoV.
IEEE Systems Journal, 2019

2018
Automatic detection for online games bot with APP.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

2017
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control.
ACM TIST, 2017

Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
Sensors, 2017

2015
Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection.
IEEE Trans. Reliability, 2015

2014
A secure mobile DRM system based on cloud architecture.
Comput. Sci. Inf. Syst., 2014

2013
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
ITC, 2013

2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Vehicular Technology, 2012

A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems.
IEEE Trans. Multimedia, 2012

Strengthening digital rights management using a new driver-hidden rootkit.
IEEE Trans. Consumer Electronics, 2012

An efficient and secure multi-server authentication scheme with key agreement.
Journal of Systems and Software, 2012

Secure communication for electronic business applications in mobile agent networks.
Expert Syst. Appl., 2012

2011
Identifying Smartphone Malware Using Data Mining Technology.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
A Secure Smart-Card-based Password Authenticated Key Agreement Scheme in Multi-server Environments.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Mobile Malware Behavioral Analysis and Preventive Strategy Using Ontology.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2009
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

An Agent-Based Single Sign-On Scheme for Web Services Environments.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
A Secure Authentication Scheme with Anonymity for Wireless Communications.
IEEE Communications Letters, 2008

Constructing Secure Commercial Vehicle Operation Systems Based on XML and RFID Techniques.
Proceedings of the 2008 International Conference on E-Learning, 2008

2007
A novel deniable authentication protocol using generalized ElGamal signature scheme.
Inf. Sci., 2007

A secure protocol for misbehavior-penalization-based fair digital signature exchange.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

A new security scheme for on-demand source routing in mobile ad hoc networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

2005
A mobile agent protected scheme using pairing-based cryptosystems.
IJMC, 2005

An enhanced user authentication scheme for multi-server Internet services.
Applied Mathematics and Computation, 2005

Efficient algorithms for speeding up the computations of elliptic curve cryptosystems.
Applied Mathematics and Computation, 2005

Several security schemes constructed using ECC-based self-certified public key cryptosystems.
Applied Mathematics and Computation, 2005

2004
A smart card-based remote scheme for password authentication in multi-server Internet services.
Computer Standards & Interfaces, 2004

2001
Auditing Causal Relationships of Group Multicast Communications in Group-Oriented Distributed Systems.
The Journal of Supercomputing, 2001

A Flexible User Authentication Scheme for Multi-server Internet Services.
Proceedings of the Networking, 2001

1998
A new generalized software complexity metric for distributed programs.
Information & Software Technology, 1998

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments.
Comput. J., 1998

A Scheme for Auditing Causal Relationships in Group Oriented Distributed Systems.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998

1997
An authentication-combined access control scheme using a geometric approach in distributed systems.
Proceedings of the 1997 ACM symposium on Applied Computing, 1997

An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

1996
Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996

1995
Toward Software Metrics for Distributed Software.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995


  Loading...