Woei-Jiunn Tsaur

Orcid: 0000-0002-4247-914X

According to our database1, Woei-Jiunn Tsaur authored at least 50 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An IoT and blockchain based logistics application of UAV.
Multim. Tools Appl., January, 2024

Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection.
Future Internet, 2024

Constructing a Secure Charity NFT Auction Platform Using Fisco Bcos Blockchain for Enhancing Transparency and Traceability.
IEEE Access, 2024

2023
FFK: Fourier-Transform Fuzzy-c-means Kalman-Filter Based RSSI Filtering Mechanism for Indoor Positioning.
Sensors, October, 2023

An anonymous and fair auction system based on blockchain.
J. Supercomput., September, 2023

2022
A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System.
Symmetry, 2022

A Highly Secure IoT Firmware Update Mechanism Using Blockchain.
Sensors, 2022

A Secure and Traceable Vehicles and Parts System Based on Blockchain and Smart Contract.
Sensors, 2022

Enterprise Data Sharing with Privacy-Preserved Based on Hyperledger Fabric Blockchain in IIOT's Application.
Sensors, 2022

2021
An Anti-Counterfeit and Traceable Management System for Brand Clothing with Hyperledger Fabric Framework.
Symmetry, 2021

2019
DANS: A Secure and Efficient Driver-Abnormal Notification Scheme With IoT Devices Over IoV.
IEEE Syst. J., 2019

2018
Automatic detection for online games bot with APP.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

2017
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control.
ACM Trans. Intell. Syst. Technol., 2017

Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
Sensors, 2017

2015
Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection.
IEEE Trans. Reliab., 2015

2014
A secure mobile DRM system based on cloud architecture.
Comput. Sci. Inf. Syst., 2014

2013
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
Inf. Technol. Control., 2013

2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Veh. Technol., 2012

A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems.
IEEE Trans. Multim., 2012

Strengthening digital rights management using a new driver-hidden rootkit.
IEEE Trans. Consumer Electron., 2012

An efficient and secure multi-server authentication scheme with key agreement.
J. Syst. Softw., 2012

Secure communication for electronic business applications in mobile agent networks.
Expert Syst. Appl., 2012

2011
Identifying Smartphone Malware Using Data Mining Technology.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
A Secure Smart-Card-based Password Authenticated Key Agreement Scheme in Multi-server Environments.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Mobile Malware Behavioral Analysis and Preventive Strategy Using Ontology.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2009
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

An Agent-Based Single Sign-On Scheme for Web Services Environments.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
A Secure Authentication Scheme with Anonymity for Wireless Communications.
IEEE Commun. Lett., 2008

Constructing Secure Commercial Vehicle Operation Systems Based on XML and RFID Techniques.
Proceedings of the 2008 International Conference on E-Learning, 2008

2007
A novel deniable authentication protocol using generalized ElGamal signature scheme.
Inf. Sci., 2007

A secure protocol for misbehavior-penalization-based fair digital signature exchange.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

A new security scheme for on-demand source routing in mobile ad hoc networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

2005
A mobile agent protected scheme using pairing-based cryptosystems.
Int. J. Mob. Commun., 2005

An enhanced user authentication scheme for multi-server Internet services.
Appl. Math. Comput., 2005

Efficient algorithms for speeding up the computations of elliptic curve cryptosystems.
Appl. Math. Comput., 2005

Several security schemes constructed using ECC-based self-certified public key cryptosystems.
Appl. Math. Comput., 2005

2004
A smart card-based remote scheme for password authentication in multi-server Internet services.
Comput. Stand. Interfaces, 2004

2001
Auditing Causal Relationships of Group Multicast Communications in Group-Oriented Distributed Systems.
J. Supercomput., 2001

A Flexible User Authentication Scheme for Multi-server Internet Services.
Proceedings of the Networking, 2001

1998
A new generalized software complexity metric for distributed programs.
Inf. Softw. Technol., 1998

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments.
Comput. J., 1998

A Scheme for Auditing Causal Relationships in Group Oriented Distributed Systems.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998

1997
An authentication-combined access control scheme using a geometric approach in distributed systems.
Proceedings of the 1997 ACM symposium on Applied Computing, 1997

An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

1996
On the design of secure group-oriented communication channels in Internet environments.
Proceedings of the 7th IEEE International Symposium on Personal, 1996

Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996

1995
Toward Software Metrics for Distributed Software.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995


  Loading...