2023
Diversity and Suitability of the State-of-the-Art Wearable and Wireless EEG Systems Review.
IEEE J. Biomed. Health Informatics, August, 2023
2018
A novel group ownership proof and transfer scheme for B2B, B2C and C2C transactions.
Int. J. Ad Hoc Ubiquitous Comput., 2018
2017
The design of secure mobile coupon mechanism with the implementation for NFC smartphones.
Comput. Electr. Eng., 2017
2015
Design and Implementation of an FPGA-Based Data/Timing Formatter.
J. Electron. Test., 2015
2014
Design and analysis of a secure and effective emergency system for mountaineering events.
J. Supercomput., 2014
The design of conditional access mechanism for ubiquitous video on demand services.
Secur. Commun. Networks, 2014
A design of IPTV conditional access mechanism based on P2P network.
Peer-to-Peer Netw. Appl., 2014
An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof.
Int. J. Medical Informatics, 2014
A secure mobile DRM system based on cloud architecture.
Comput. Sci. Inf. Syst., 2014
FPGA-Based Subset Sum Delay Lines.
Proceedings of the 23rd IEEE Asian Test Symposium, 2014
2013
A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System.
J. Medical Syst., 2013
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
Inf. Technol. Control., 2013
The design of speedy seamless safe messaging mechanism in VANET.
Int. J. Comput. Math., 2013
2012
A Secure EHR System Based on Hybrid Clouds.
J. Medical Syst., 2012
A Design of Tamper Resistant Prescription RFID Access Control System.
J. Medical Syst., 2012
On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management.
KSII Trans. Internet Inf. Syst., 2012
Design of an RFID on-line authentication and anti-counterfeit transaction protocol.
Int. J. RF Technol. Res. Appl., 2012
2011
Video Super-Resolution by Motion Compensated Iterative Back-Projection Approach.
J. Inf. Sci. Eng., 2011
A tagged-product ownership transfer mechanism used in retailer and second-hand transaction.
Int. J. Radio Freq. Identif. Technol. Appl., 2011
A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping
CoRR, 2011
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response.
Comput. Commun., 2011
Study and Implementation of RFID Eseals for Power Meters.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011
A secure negotiable on-demand services model for cloud environment.
Proceedings of EUROCON 2011, 2011
A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping.
Proceedings of the 2011 International Conference on Broadband, 2011
2009
A Non-repudiated Self-service Store System Based on Portable Trusted Device.
Wirel. Pers. Commun., 2009
A Low-cost RFID Authentication Protocol with Location Privacy Protection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
A Fair-Use DRM System Based on Web Service.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce Transaction.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2007
A Mobile Ticket System Based on Personal Trusted Device.
Wirel. Pers. Commun., 2007
A Secure Authentication Scheme for a Public Terminal Before a Transaction.
Proceedings of the Network-Based Information Systems, First International Conference, 2007
2005
Design of a fair proxy raffle protocol on the Internet.
Comput. Stand. Interfaces, 2005
A fair and secure mobile billing system.
Comput. Networks, 2005
A novel proxy deposit protocol for e-cash systems.
Appl. Math. Comput., 2005
2004
The design of a secure anonymous Internet voting system.
Comput. Secur., 2004
2002
A secure anonymous voting protocol with a complete supervision.
Comput. Syst. Sci. Eng., 2002
1998
"Paramita wisdom" password authentication scheme without verification tables.
J. Syst. Softw., 1998