Woei-Jiunn Tsaur
According to our database1,
Woei-Jiunn Tsaur
authored at least 39 papers
between 1995 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2019
DANS: A Secure and Efficient Driver-Abnormal Notification Scheme With IoT Devices Over IoV.
IEEE Systems Journal, 2019
2018
Automatic detection for online games bot with APP.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018
2017
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control.
ACM TIST, 2017
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
Sensors, 2017
2015
Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection.
IEEE Trans. Reliability, 2015
2014
A secure mobile DRM system based on cloud architecture.
Comput. Sci. Inf. Syst., 2014
2013
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
ITC, 2013
2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Vehicular Technology, 2012
A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems.
IEEE Trans. Multimedia, 2012
Strengthening digital rights management using a new driver-hidden rootkit.
IEEE Trans. Consumer Electronics, 2012
An efficient and secure multi-server authentication scheme with key agreement.
Journal of Systems and Software, 2012
Secure communication for electronic business applications in mobile agent networks.
Expert Syst. Appl., 2012
2011
Identifying Smartphone Malware Using Data Mining Technology.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2010
A Secure Smart-Card-based Password Authenticated Key Agreement Scheme in Multi-server Environments.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Mobile Malware Behavioral Analysis and Preventive Strategy Using Ontology.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
2009
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
An Agent-Based Single Sign-On Scheme for Web Services Environments.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
A Secure Authentication Scheme with Anonymity for Wireless Communications.
IEEE Communications Letters, 2008
Constructing Secure Commercial Vehicle Operation Systems Based on XML and RFID Techniques.
Proceedings of the 2008 International Conference on E-Learning, 2008
2007
A novel deniable authentication protocol using generalized ElGamal signature scheme.
Inf. Sci., 2007
A secure protocol for misbehavior-penalization-based fair digital signature exchange.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
A new security scheme for on-demand source routing in mobile ad hoc networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
2005
A mobile agent protected scheme using pairing-based cryptosystems.
IJMC, 2005
An enhanced user authentication scheme for multi-server Internet services.
Applied Mathematics and Computation, 2005
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems.
Applied Mathematics and Computation, 2005
Several security schemes constructed using ECC-based self-certified public key cryptosystems.
Applied Mathematics and Computation, 2005
2004
A smart card-based remote scheme for password authentication in multi-server Internet services.
Computer Standards & Interfaces, 2004
2001
Auditing Causal Relationships of Group Multicast Communications in Group-Oriented Distributed Systems.
The Journal of Supercomputing, 2001
A Flexible User Authentication Scheme for Multi-server Internet Services.
Proceedings of the Networking, 2001
1998
A new generalized software complexity metric for distributed programs.
Information & Software Technology, 1998
Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments.
Comput. J., 1998
A Scheme for Auditing Causal Relationships in Group Oriented Distributed Systems.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998
1997
An authentication-combined access control scheme using a geometric approach in distributed systems.
Proceedings of the 1997 ACM symposium on Applied Computing, 1997
An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997
1996
Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996
1995
Toward Software Metrics for Distributed Software.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995