Yue-Hsun Lin

According to our database1, Yue-Hsun Lin authored at least 24 papers between 2006 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

SmartAuth: User-Centered Authorization for the Internet of Things.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
High-Speed Inter-Domain Fault Localization.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

2014
Eliminating rouge femtocells based on distance bounding protocol and geographic information.
Expert Syst. Appl., 2014

XIA: architecting a more trustworthy and evolvable internet.
Comput. Commun. Rev., 2014

Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks.
IEEE Trans. Knowl. Data Eng., 2013

SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN.
J. Inf. Hiding Multim. Signal Process., 2013

KISS: "Key It Simple and Secure" Corporate Key Management.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

SafeSlinger: easy-to-use and secure public-key exchange.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

2012
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Practical RSA signature scheme based on periodical rekeying for wireless sensor networks.
ACM Trans. Sens. Networks, 2012

oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks.
IEEE Trans. Inf. Forensics Secur., 2012

COCA: Computation Offload to Clouds Using AOP.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

2009
SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

A Pair-wise Key Establishment for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

DepenDNS: Dependable Mechanism against DNS Cache Poisoning.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Efficient Authentication Schemes for Handover in Mobile WiMAX.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2008

2006
API Monitoring System for Defeating Worms and Exploits in MS-Windows System.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006


  Loading...