An improved and efficient coercion-resistant measure for electronic voting system.
Int. J. Inf. Sec., August, 2024
A reliable authentication scheme of personal health records in cloud computing.
Wirel. Networks, July, 2024
Advanced authentication of IoT sensor network for industrial safety.
Internet Things, 2024
Security Privacy and Policy for Cryptographic Based Electronic Medical Information System.
Sensors, 2021
Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
The Development of Smart Home Disaster Prevention System.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020
Design and Implementation a Smart Pillbox.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020
VR and AR Technology on Cultural Communication.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020
Virtual Reality, Augmented Reality and Mixed Reality on the Marketing of Film and Television Creation Industry.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020
On the Security Policy and Privacy Protection in Electronic Health Information System.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020
Multi-function Electric Scooter Assistant System for Seniors.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020
A Secure and Efficient Digital-Data-Sharing System for Cloud Environments.
Sensors, 2019
An radio-frequency identification security authentication mechanism for Internet of things applications.
Int. J. Distributed Sens. Networks, 2019
Group-Oriented Cryptosystem for Personal Health Records Exchange and Sharing.
IEEE Access, 2019
A hierarchical access control scheme based on Lagrange interpolation for mobile agents.
Int. J. Distributed Sens. Networks, 2018
An electronic voting mechanism for fighting bribery and coercion.
J. Netw. Comput. Appl., 2014
A Reliable RFID Mutual Authentication Scheme for Healthcare Environments.
J. Medical Syst., 2013
Maximal Similarity Embedding.
Neurocomputing, 2013
A Secure RFID Authentication Scheme for Medicine Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Detect Rare Events via MICE Algorithm with Optimal Threshold.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
A Reliable User Authentication and Key Agreement Scheme for Web-Based Hospital-Acquired Infection Surveillance Information System.
J. Medical Syst., 2012
A Secure Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012
Redactable Signatures for Signed CDA Documents.
J. Medical Syst., 2012
A Password-Based User Authentication Scheme for the Integrated EPR Information System.
J. Medical Syst., 2012
A Secure Integrated Medical Information System.
J. Medical Syst., 2012
Casting Ballots over Internet Connection Against Bribery and Coercion.
Comput. J., 2012
A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Approach to designing bribery-free and coercion-free electronic voting scheme.
J. Syst. Softw., 2009
Ring signature scheme for ECC-based anonymous signcryption.
Comput. Stand. Interfaces, 2009
Unconditionally secure cryptosystems based on quantum cryptography.
Inf. Sci., 2008
Unconditionally Secure Cryptosystem Based on Quantum Cryptography.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
Proceedings of the Computational Intelligence and Security, International Conference, 2006