2025
Unconsciously Continuous Authentication Protocol in Zero-Trust Architecture Based on Behavioral Biometrics.
IEEE Trans. Reliab., June, 2025
ML-based intrusion detection system for precise APT cyber-clustering.
Comput. Secur., 2025
2024
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle.
IEEE Trans. Netw. Sci. Eng., 2024
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime.
IEEE Trans. Inf. Forensics Secur., 2024
Preserving manipulated and synthetic Deepfake detection through face texture naturalness.
J. Inf. Secur. Appl., 2024
Enhancing Data Embedding Capacity in Encrypted Images via Adaptive MSB Prediction.
Proceedings of the 2024 6th International Conference on Image, Video and Signal Processing, 2024
2023
Constructing gene features for robust 3D mesh zero-watermarking.
J. Inf. Secur. Appl., March, 2023
Preserving friendly stacking and weighted shadows in selective scalable secret image sharing.
Multim. Tools Appl., 2023
Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination.
KSII Trans. Internet Inf. Syst., 2023
2022
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation.
IEEE Trans. Netw. Serv. Manag., December, 2022
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract.
J. Inf. Secur. Appl., 2022
CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training.
Comput. Secur., 2022
Preserving Collusion-Free and Traceability in Car-Sharing System Based on Blockchain.
Proceedings of the New Trends in Computer Technologies and Applications, 2022
2021
Preserving Liberty and Fairness in Combinatorial Double Auction Games Based on Blockchain.
IEEE Syst. J., 2021
Robust 3D mesh zero-watermarking based on spherical coordinate and Skewness measurement.
Multim. Tools Appl., 2021
Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem.
Int. J. Inf. Comput. Secur., 2021
Preserving indomitable DDoS vitality through resurrection social hybrid botnet.
Comput. Secur., 2021
2020
Learning salient seeds refer to the manifold ranking and background-prior strategy.
Multim. Tools Appl., 2020
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations.
KSII Trans. Internet Inf. Syst., 2020
Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks.
IEEE Access, 2020
Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images.
Proceedings of the ICFET 2020, 2020
2019
Visibility dehazing based on channel-weighted analysis and illumination tuning.
Multim. Tools Appl., 2019
AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS.
Int. J. Netw. Secur., 2019
2018
Refining irregular image illumination with concurrent ownership embedding.
Multim. Tools Appl., 2018
Selective scalable secret image sharing with adaptive pixel-embedding technique.
Multim. Tools Appl., 2018
2017
Image structure rebuilding technique using fractal dimension on the best match patch searching.
Multim. Tools Appl., 2017
Selective scalable secret image sharing with verification.
Multim. Tools Appl., 2017
SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks.
Int. J. Netw. Secur., 2017
2016
Renovating Contaminative Image Archives Based on Patch Propagation and Adaptive Confidence Collation.
IEEE Trans. Circuits Syst. Video Technol., 2016
Tele-micropayment scam prevention based on visual secret sharing technique.
Multim. Tools Appl., 2016
Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity.
KSII Trans. Internet Inf. Syst., 2016
2015
Stable watermarking technique based on XNOR operation and scale relationship.
Multim. Tools Appl., 2015
Enhancing the Security of Credit Card Transaction based on Visual DSC.
KSII Trans. Internet Inf. Syst., 2015
Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique.
Digit. Signal Process., 2015
2014
Fast authentication mechanism with provable correctness for cluster-based VANETs.
Secur. Commun. Networks, 2014
Self-Recognized Image Protection Technique that Resists Large-Scale Cropping.
IEEE Multim., 2014
2013
A wide-adapted bantam protocol for roaming across wireless areas.
Wirel. Networks, 2013
HORME: hierarchical-object-relational medical management for electronic record.
Secur. Commun. Networks, 2013
Notes on "Authentication protocol using an identifier in an ad hoc network environment".
Math. Comput. Model., 2013
RII: Renovating the irregular illumination of digital image archives.
J. Vis. Commun. Image Represent., 2013
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.
Image Vis. Comput., 2013
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy.
Int. J. Netw. Secur., 2013
Preserving user-participation for insecure network communications with CAPTCHA and visual secret sharing technique.
IET Networks, 2013
Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness.
IET Inf. Secur., 2013
An innovative electronic group-buying system for mobile commerce.
Electron. Commer. Res. Appl., 2013
2012
A robust e-commerce service: Light-weight secure mail-order mechanism.
Electron. Commer. Res. Appl., 2012
2011
Protecting the content integrity of digital imagery with fidelity preservation.
ACM Trans. Multim. Comput. Commun. Appl., 2011
An interactive mobile SMS confirmation method using secret sharing technique.
Comput. Secur., 2011
2010
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs.
Wirel. Pers. Commun., 2010
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector.
Digit. Signal Process., 2010
2009
Dual Digital Watermarking for Internet Media Based on Hybrid Strategies.
IEEE Trans. Circuits Syst. Video Technol., 2009
A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images.
IEEE Trans. Circuits Syst. Video Technol., 2009
Distortion-free secret image sharing mechanism using modulus operator.
Pattern Recognit., 2009
Robust t-out-of-n oblivious transfer mechanism based on CRT.
J. Netw. Comput. Appl., 2009
Non-iterative privacy preservation for online lotteries.
IET Inf. Secur., 2009
A Secure Multicast Framework in Large and High-Mobility Network Groups.
IEICE Trans. Commun., 2009
Design of electronic t-out-of-n lotteries on the Internet.
Comput. Stand. Interfaces, 2009
An on-line electronic check system with mutual authentication.
Comput. Electr. Eng., 2009
Hybrid (2, n) Visual Secret Sharing Scheme for Color Images.
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009
A Brand-New Mobile Value-Added Service: M-Check.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
A Self-Reference Watermarking Scheme Based on Wet Paper Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
2008
Preserving data integrity in mobile <i>ad hoc</i> networks with variant Diffie-Hellman protocol.
Secur. Commun. Networks, 2008
Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Security design for three-party encrypted key exchange protocol using smart cards.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
2007
Secure communications for cluster-based ad hoc networks using node identities.
J. Netw. Comput. Appl., 2007
Anonymous authentication scheme for wireless communications.
Int. J. Mob. Commun., 2007
Security enhancement of an IC-card-based remote login mechanism.
Comput. Networks, 2007
2006
A secure and efficient authentication scheme for mobile users.
Int. J. Mob. Commun., 2006
An anonymous voting mechanism based on the key exchange protocol.
Comput. Secur., 2006
2005
Efficient authentication protocols of GSM.
Comput. Commun., 2005
An Efficient Algorithm for Incremental Mining of Association Rules.
Proceedings of the 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), 2005
Time-bounded Based Password Authentication Scheme.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Improvement on an Optimized Protocol for Mobile Network Authentication and Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004