Yu-Fang Chung

Orcid: 0000-0002-7373-7201

According to our database1, Yu-Fang Chung authored at least 64 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Machine learning approaches to identify systemic lupus erythematosus in anti-nuclear antibody-positive patients using genomic data and electronic health records.
BioData Min., 2024

2021
Machine learning approaches for the genomic prediction of rheumatoid arthritis and systemic lupus erythematosus.
BioData Min., 2021

2020
The Implementation of IoT-based Smart Laboratory Management System.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2019
Efficient Hierarchical Key Management Scheme for VR/AR Database Systems.
Int. J. Netw. Secur., 2019

2018
A hierarchical access control scheme based on Lagrange interpolation for mobile agents.
Int. J. Distributed Sens. Networks, 2018

An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples.
IEEE Access, 2018

2017
Secure user authentication scheme for wireless healthcare sensor networks.
Comput. Electr. Eng., 2017

2016
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
J. Medical Syst., 2016

Implementation of Online Veterinary Hospital on Cloud Platform.
J. Medical Syst., 2016

2014
The Application of RFID Monitoring Technology to Patrol Management System in Petrochemical Industry.
Wirel. Pers. Commun., 2014

A Novel Assessment of Flexibility by Microcirculatory Signals.
Sensors, 2014

The design of authentication key protocol in certificate-free public key cryptosystem.
Secur. Commun. Networks, 2014

Development of a Decision Support Engine to Assist Patients with Hospital Selection.
J. Medical Syst., 2014

An Agent-Based Auction Protocol on Mobile Devices.
J. Appl. Math., 2014

Improving Inpatient Fall Prevention Strategies Using Interactive Data Repository Information System.
Proceedings of the Nursing Informatics 2014 - East Meets West eSMART+, 2014

2013
Design of a Wireless Sensor Network Platform for Tele-Homecare.
Sensors, 2013

An Architecture Model for Multiple Disease Management Information Systems.
J. Medical Syst., 2013

Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining.
Inf. Sci., 2013

A novel reduction approach for Petri net systems based on matching theory.
Expert Syst. Appl., 2013

Detect Rare Events via MICE Algorithm with Optimal Threshold.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Secure PHR Access Control Scheme for Healthcare Application Clouds.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

2012
A Physician Order Category-Based Clinical Guideline Comparison System.
J. Medical Syst., 2012

A Reliable User Authentication and Key Agreement Scheme for Web-Based Hospital-Acquired Infection Surveillance Information System.
J. Medical Syst., 2012

A Secure Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012

Redactable Signatures for Signed CDA Documents.
J. Medical Syst., 2012

A Password-Based User Authentication Scheme for the Integrated EPR Information System.
J. Medical Syst., 2012

The Enhancement of Security in Healthcare Information Systems.
J. Medical Syst., 2012

Mobile Agent Application and Integration in Electronic Anamnesis System.
J. Medical Syst., 2012

A Mobile Agent Approach for Secure Integrated Medical Information Systems.
J. Medical Syst., 2012

A Secure Integrated Medical Information System.
J. Medical Syst., 2012

Deployment of Secure Mobile Agents for Medical Information Systems.
J. Medical Syst., 2012

A Study on Agent-Based Secure Scheme for Electronic Medical Record System.
J. Medical Syst., 2012

Casting Ballots over Internet Connection Against Bribery and Coercion.
Comput. J., 2012

A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce.
Expert Syst. Appl., 2011

2010
An efficient date-constraint hierarchical key management scheme for mobile agents.
Expert Syst. Appl., 2010

2009
Approach to designing bribery-free and coercion-free electronic voting scheme.
J. Syst. Softw., 2009

A novel application of grey system theory to information security (Part I).
Comput. Stand. Interfaces, 2009

A conference key agreement protocol with fault-tolerant capability.
Comput. Stand. Interfaces, 2009

Efficient migration for mobile computing in distributed networks.
Comput. Stand. Interfaces, 2009

Ring signature scheme for ECC-based anonymous signcryption.
Comput. Stand. Interfaces, 2009

Threshold authenticated encryption scheme using labor-division signature.
Comput. Stand. Interfaces, 2009

Efficient migration access control for mobile agents.
Comput. Stand. Interfaces, 2009

Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Hierarchical Time-Bound Key Management for Mobile Agents.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

2008
Bidder-anonymous English auction scheme with privacy and public verifiability.
J. Syst. Softw., 2008

Unconditionally secure cryptosystems based on quantum cryptography.
Inf. Sci., 2008

Access control in user hierarchy based on elliptic curve cryptosystem.
Inf. Sci., 2008

Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
ID-based digital signature scheme on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2007

2006
Threshold Signature Scheme Resistible for Conspiracy Attack.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Unconditionally Secure Cryptosystem Based on Quantum Cryptography.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2004
Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem.
J. Comput. Sci. Technol., 2004

A practical authenticated encryption scheme based on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2004

Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme.
Appl. Math. Comput., 2004

A traceable proxy multisignature scheme based on the elliptic curve cryptosystem.
Appl. Math. Comput., 2004

A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy.
J. Comput. Sci. Technol., 2003

Efficient proxy multisignature schemes based on the elliptic curve cryptosystem.
Comput. Secur., 2003

2002
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm.
Comput. Secur., 2002


  Loading...