Yu-Yi Chen

According to our database1, Yu-Yi Chen authored at least 35 papers between 1998 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A novel group ownership proof and transfer scheme for B2B, B2C and C2C transactions.
Int. J. Ad Hoc Ubiquitous Comput., 2018

2017
The design of secure mobile coupon mechanism with the implementation for NFC smartphones.
Comput. Electr. Eng., 2017

2015
Design and Implementation of an FPGA-Based Data/Timing Formatter.
J. Electron. Test., 2015

2014
Design and analysis of a secure and effective emergency system for mountaineering events.
J. Supercomput., 2014

The design of conditional access mechanism for ubiquitous video on demand services.
Secur. Commun. Networks, 2014

A design of IPTV conditional access mechanism based on P2P network.
Peer Peer Netw. Appl., 2014

An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof.
Int. J. Medical Informatics, 2014

A secure mobile DRM system based on cloud architecture.
Comput. Sci. Inf. Syst., 2014

FPGA-Based Subset Sum Delay Lines.
Proceedings of the 23rd IEEE Asian Test Symposium, 2014

2013
A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System.
J. Medical Syst., 2013

Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
Inf. Technol. Control., 2013

The design of speedy seamless safe messaging mechanism in VANET.
Int. J. Comput. Math., 2013

2012
A Secure EHR System Based on Hybrid Clouds.
J. Medical Syst., 2012

A Design of Tamper Resistant Prescription RFID Access Control System.
J. Medical Syst., 2012

On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management.
KSII Trans. Internet Inf. Syst., 2012

Design of an RFID on-line authentication and anti-counterfeit transaction protocol.
Int. J. RF Technol. Res. Appl., 2012

2011
Video Super-Resolution by Motion Compensated Iterative Back-Projection Approach.
J. Inf. Sci. Eng., 2011

A tagged-product ownership transfer mechanism used in retailer and second-hand transaction.
Int. J. Radio Freq. Identif. Technol. Appl., 2011

A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping
CoRR, 2011

The design of RFID access control protocol using the strategy of indefinite-index and challenge-response.
Comput. Commun., 2011

Study and Implementation of RFID Eseals for Power Meters.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

A secure negotiable on-demand services model for cloud environment.
Proceedings of EUROCON 2011, 2011

A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping.
Proceedings of the 2011 International Conference on Broadband, 2011

2009
A Non-repudiated Self-service Store System Based on Portable Trusted Device.
Wirel. Pers. Commun., 2009

A Low-cost RFID Authentication Protocol with Location Privacy Protection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Fair-Use DRM System Based on Web Service.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce Transaction.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
A Mobile Ticket System Based on Personal Trusted Device.
Wirel. Pers. Commun., 2007

A Secure Authentication Scheme for a Public Terminal Before a Transaction.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

2005
Design of a fair proxy raffle protocol on the Internet.
Comput. Stand. Interfaces, 2005

A fair and secure mobile billing system.
Comput. Networks, 2005

A novel proxy deposit protocol for e-cash systems.
Appl. Math. Comput., 2005

2004
The design of a secure anonymous Internet voting system.
Comput. Secur., 2004

2002
A secure anonymous voting protocol with a complete supervision.
Comput. Syst. Sci. Eng., 2002

1998
"Paramita wisdom" password authentication scheme without verification tables.
J. Syst. Softw., 1998


  Loading...