Chien-Lung Hsu
Orcid: 0000-0003-3105-5939
According to our database1,
Chien-Lung Hsu
authored at least 82 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
1
2
2
4
1
1
2
5
5
5
4
6
3
1
3
1
5
5
7
3
1
1
1
2
1
1
1
2
4
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Technological Empowerment for Aging Workforce in Elderly Care Programs: Service Model Design and Development of an Elderly Care Shared Service Platform.
Proceedings of the Universal Access in Human-Computer Interaction, 2024
2022
IEEE Trans. Ind. Informatics, 2022
A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems.
IEEE Access, 2022
2021
A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems.
Sensors, 2021
An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments.
IEEE Access, 2021
2020
Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks.
Sensors, 2020
An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things.
Sensors, 2020
A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks.
IEEE Access, 2020
Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems.
IEEE Access, 2020
A Time Bound Dynamic Group key Distribution Scheme with Anonymous Three-factor Identification for IoT-Based Multi-Server Environments.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model.
Future Internet, 2019
2018
Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps.
J. Supercomput., 2018
2017
Electronic Commerce Research Profiles: Comparing E-Commerce and Information Systems Journals.
Pac. Asia J. Assoc. Inf. Syst., 2017
Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
IEICE Trans. Inf. Syst., 2017
Proceedings of the Twelfth International Conference on Digital Information Management, 2017
A dynamic identity end-to-end authentication key exchange protocol for IoT environments.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017
2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
2015
A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography.
Proceedings of the New Trends in Intelligent Information and Database Systems, 2015
Wirel. Pers. Commun., 2015
Int. J. Distributed Sens. Networks, 2015
RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model.
IEICE Trans. Inf. Syst., 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
Inf. Technol. Control., 2014
Exploring the linkages between perceived information accessibility and microblog stickiness: The moderating role of a sense of community.
Inf. Manag., 2014
Int. Arab J. Inf. Technol., 2014
Expert Syst. Appl., 2014
Comput. Stand. Interfaces, 2014
Proceedings of the Intelligent Systems and Applications, 2014
2013
The iFit: An Integrated Physical Fitness Testing System to Evaluate the Degree of Physical Fitness of the Elderly.
IEEE Trans. Biomed. Eng., 2013
Designing an Intelligent Health Monitoring System and Exploring User Acceptance for the Elderly.
J. Medical Syst., 2013
J. Medical Syst., 2013
An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network.
KSII Trans. Internet Inf. Syst., 2013
Int. J. Electron. Bus., 2013
Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
User Acceptance of a Community-Based Healthcare Information System Preserving User Privacy.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services for Quality of Life, 2013
2012
Secur. Commun. Networks, 2012
J. Medical Syst., 2012
Provably convertible multi-authenticated encryption scheme for generalized group communications.
Inf. Sci., 2012
Expert Syst. Appl., 2012
2011
J. Zhejiang Univ. Sci. C, 2011
J. Syst. Softw., 2011
J. Netw. Comput. Appl., 2011
Inf. Process. Lett., 2011
Int. J. Found. Comput. Sci., 2011
Int. J. Electron. Bus. Manag., 2011
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011
Proceedings of the International Carnahan Conference on Security Technology, 2011
Proceedings of the Universal Access in Human-Computer Interaction. Users Diversity, 2011
Proceedings of the Universal Access in Human-Computer Interaction. Users Diversity, 2011
2010
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks.
Int. J. Secur. Networks, 2010
Effect of Commitment and Trust towards Micro-blogs on Consumer Behavioral Intention: A Relationship Marketing Perspective.
Int. J. Electron. Bus. Manag., 2010
Research on the Connections Between Corporate Social Responsibility and Corporation Image in the Risk Society: Take the Mobile Telecommunication Industry as an Example.
Int. J. Electron. Bus. Manag., 2010
Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations.
Proceedings of the Communication and Networking, 2010
2009
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks.
Inf. Sci., 2009
2008
J. Syst. Softw., 2008
Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme.
Comput. Syst. Sci. Eng., 2008
2007
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Inf. Sci., 2007
Proceedings of the Future Generation Communication and Networking, 2007
2005
Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.
Appl. Math. Comput., 2005
Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability.
Appl. Math. Comput., 2005
A user friendly remote authentication scheme with smart cards against impersonation attacks.
Appl. Math. Comput., 2005
Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem.
Appl. Math. Comput., 2005
2004
Future Gener. Comput. Syst., 2004
Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers.
Comput. Stand. Interfaces, 2004
Comput. Stand. Interfaces, 2004
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
Comput. Secur., 2004
Appl. Math. Comput., 2004
2003
Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Veh. Technol., 2003
IEEE Trans. Consumer Electron., 2003
Inf. Process. Lett., 2003
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
Comput. Secur., 2003
Appl. Math. Comput., 2003
2002
Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002
ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Appl. Math. Comput., 2002
2001
J. Syst. Softw., 2001