Yu-Yi Chen

According to our database1, Yu-Yi Chen authored at least 35 papers between 1998 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


A novel group ownership proof and transfer scheme for B2B, B2C and C2C transactions.
Int. J. Ad Hoc Ubiquitous Comput., 2018

The design of secure mobile coupon mechanism with the implementation for NFC smartphones.
Comput. Electr. Eng., 2017

Design and Implementation of an FPGA-Based Data/Timing Formatter.
J. Electron. Test., 2015

Design and analysis of a secure and effective emergency system for mountaineering events.
J. Supercomput., 2014

The design of conditional access mechanism for ubiquitous video on demand services.
Secur. Commun. Networks, 2014

A design of IPTV conditional access mechanism based on P2P network.
Peer Peer Netw. Appl., 2014

An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof.
Int. J. Medical Informatics, 2014

A secure mobile DRM system based on cloud architecture.
Comput. Sci. Inf. Syst., 2014

FPGA-Based Subset Sum Delay Lines.
Proceedings of the 23rd IEEE Asian Test Symposium, 2014

A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System.
J. Medical Syst., 2013

Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
Inf. Technol. Control., 2013

The design of speedy seamless safe messaging mechanism in VANET.
Int. J. Comput. Math., 2013

A Secure EHR System Based on Hybrid Clouds.
J. Medical Syst., 2012

A Design of Tamper Resistant Prescription RFID Access Control System.
J. Medical Syst., 2012

On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management.
KSII Trans. Internet Inf. Syst., 2012

Design of an RFID on-line authentication and anti-counterfeit transaction protocol.
Int. J. RF Technol. Res. Appl., 2012

Video Super-Resolution by Motion Compensated Iterative Back-Projection Approach.
J. Inf. Sci. Eng., 2011

A tagged-product ownership transfer mechanism used in retailer and second-hand transaction.
Int. J. Radio Freq. Identif. Technol. Appl., 2011

A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping
CoRR, 2011

The design of RFID access control protocol using the strategy of indefinite-index and challenge-response.
Comput. Commun., 2011

Study and Implementation of RFID Eseals for Power Meters.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

A secure negotiable on-demand services model for cloud environment.
Proceedings of EUROCON 2011, 2011

A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping.
Proceedings of the 2011 International Conference on Broadband, 2011

A Non-repudiated Self-service Store System Based on Portable Trusted Device.
Wirel. Pers. Commun., 2009

A Low-cost RFID Authentication Protocol with Location Privacy Protection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Fair-Use DRM System Based on Web Service.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce Transaction.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Mobile Ticket System Based on Personal Trusted Device.
Wirel. Pers. Commun., 2007

A Secure Authentication Scheme for a Public Terminal Before a Transaction.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

Design of a fair proxy raffle protocol on the Internet.
Comput. Stand. Interfaces, 2005

A fair and secure mobile billing system.
Comput. Networks, 2005

A novel proxy deposit protocol for e-cash systems.
Appl. Math. Comput., 2005

The design of a secure anonymous Internet voting system.
Comput. Secur., 2004

A secure anonymous voting protocol with a complete supervision.
Comput. Syst. Sci. Eng., 2002

"Paramita wisdom" password authentication scheme without verification tables.
J. Syst. Softw., 1998