Chin-Ling Chen

Orcid: 0000-0002-4958-2043

According to our database1, Chin-Ling Chen authored at least 167 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS.
Clust. Comput., August, 2024

An IoT and blockchain based logistics application of UAV.
Multim. Tools Appl., January, 2024

Quantified emotion analysis based on design principles of color feature recognition in pictures.
Multim. Tools Appl., 2024

Constructing a Secure Charity NFT Auction Platform Using Fisco Bcos Blockchain for Enhancing Transparency and Traceability.
IEEE Access, 2024

A Survey and Planning Advice of Blockchain-Based Used Car Bidding Platform.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A Blockchain and IPFS-Based Anticounterfeit Traceable Functionality of Car Insurance Claims System.
Sensors, December, 2023

Special issue on "Recent advances on computational intelligence techniques and applications in big data".
Evol. Intell., October, 2023

An anonymous and fair auction system based on blockchain.
J. Supercomput., September, 2023

An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort.
Sensors, July, 2023

Blockchain-based alcoholic beverages supply chain management system.
J. Ambient Intell. Humaniz. Comput., March, 2023

An Artwork Rental System Based on Blockchain Technology.
Symmetry, February, 2023

Special Issue: Symmetric and Asymmetric Encryption in Blockchain.
Symmetry, February, 2023

Benefits Evaluation Method of an Integrated Energy System Based on a Fuzzy Comprehensive Evaluation Method.
Symmetry, 2023

Machine learning for trust, security, and privacy in computing and communications.
EURASIP J. Wirel. Commun. Netw., 2023

2022
A Collective Anomaly Detection Technique to Detect Crypto Wallet Frauds on Bitcoin Network.
Symmetry, 2022

Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud.
Symmetry, 2022

A Digital Media Subscription Management System Combined with Blockchain and Proxy Re-Encryption Mechanisms.
Symmetry, 2022

A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System.
Symmetry, 2022

A Highly Secure IoT Firmware Update Mechanism Using Blockchain.
Sensors, 2022

A Novel Deep Learning-Based Cooperative Communication Channel Model for Wireless Underground Sensor Networks.
Sensors, 2022

An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications.
Sensors, 2022

A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions.
Sensors, 2022

A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks.
Sensors, 2022

A Secure and Traceable Vehicles and Parts System Based on Blockchain and Smart Contract.
Sensors, 2022

Enterprise Data Sharing with Privacy-Preserved Based on Hyperledger Fabric Blockchain in IIOT's Application.
Sensors, 2022

A Traceable Vaccine Supply Management System.
Sensors, 2022

A Bayesian network correlation-based classifier chain algorithm for multilabel learning.
Int. J. Comput. Sci. Eng., 2022

2021
A Novel Subcarrier-Level Spectrum Sensing Method by Utilizing Fine-Grained Channel State Information in Wireless Networks.
Wirel. Commun. Mob. Comput., 2021

A blockchain-based intelligent anti-switch package in tracing logistics system.
J. Supercomput., 2021

An Anti-Counterfeit and Traceable Management System for Brand Clothing with Hyperledger Fabric Framework.
Symmetry, 2021

A Traceable Online Will System Based on Blockchain and Smart Contract Technology.
Symmetry, 2021

A Traceable Firearm Management System Based on Blockchain and IoT Technology.
Symmetry, 2021

Authorized Shared Electronic Medical Record System with Proxy Re-Encryption and Blockchain Technology.
Sensors, 2021

A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism.
Trans. Emerg. Telecommun. Technol., 2021

A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services.
IEEE Access, 2021

E-book Circulation System Based on Blockchain.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

FreeSee: A Parameter-Independent Pattern-Based Device-Free Human Behaviour Sensing System with Wireless Signals of IoT Devices.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021

2020
A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing.
Wirel. Pers. Commun., 2020

An Improved Network Traffic Classification Model Based on a Support Vector Machine.
Symmetry, 2020

Non-sparse label specific features selection for multi-label classification.
Neurocomputing, 2020

A secure electronic medical record authorization system for smart device application in cloud computing environments.
Hum. centric Comput. Inf. Sci., 2020

A spatiotemporal data compression approach with low transmission cost and high data fidelity for an air quality monitoring system.
Future Gener. Comput. Syst., 2020

Label Specific Features-Based Classifier Chains for Multi-Label Classification.
IEEE Access, 2020

Semi-Online Computational Offloading by Dueling Deep-Q Network for User Behavior Prediction.
IEEE Access, 2020

A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System.
IEEE Access, 2020

An IoT-Based Traceable Drug Anti-Counterfeiting Management System.
IEEE Access, 2020

2019
A Cloud-Based Crime Reporting System with Identity Protection.
Symmetry, 2019

Accurate Human Gesture Sensing With Coarse-Grained RF Signatures.
IEEE Access, 2019

An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems.
IEEE Access, 2019

An Efficient Stacking Model of Multi-Label Classification Based on Pareto Optimum.
IEEE Access, 2019

A reliable integrated car anti-theft system in VANET.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

An intelligent wearable navigation and driving recorder system in VANET.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

Digital Image Anti-counterfeiting Technology.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018

A fair and secure group buying system based on arbitration computing mechanism.
Soft Comput., 2018

On the Basis of Eye Tracker to Design A Remote Home Care Application System.
J. Netw. Intell., 2018

Design of a secure and effective medical cyber-physical system for ubiquitous telemonitoring pregnancy.
Concurr. Comput. Pract. Exp., 2018

An Improvement on Remote User Authentication Schemes Using Smart Cards.
Comput., 2018

An Agreement Under Early Stopping and Fault Diagnosis Protocol in a Cloud Computing Environment.
IEEE Access, 2018

Robot Identification and Authentication in a Robot Cloud Service System.
IEEE Access, 2018

A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018

Analyzing the Web Mail Using Wireshark.
Proceedings of the 14th International Conference on Natural Computation, 2018

Automatic detection for online games bot with APP.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

A Survey of Authentication Protocols in VANET.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
A secure key authentication scheme for cryptosystems based on GDLP and IFP.
Soft Comput., 2017

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017

Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
Sensors, 2017

An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing.
J. Sensors, 2017

An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel.
Inf. Technol. Control., 2017

Securing Information Exchange in VANETs by Using Pairing-Based Cryptography.
Int. J. Found. Comput. Sci., 2017

A secure mutual authentication scheme with non-repudiation for vehicular ad hoc networks.
Int. J. Commun. Syst., 2017

User Authentication using Leap Motion.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

A recommendation model of smart parking.
Proceedings of the 13th International Conference on Natural Computation, 2017

Development of Audio and Visual Attention Assessment System in Combination with Brain Wave Instrument: Apply to Children with Attention Deficit Hyperactivity Disorder.
Proceedings of the Genetic and Evolutionary Computing, 2017

Neurofeedback based attention training for children with ADHD.
Proceedings of the IEEE 8th International Conference on Awareness Science and Technology, 2017

Design of a Secure Emergency Communication System Based on Cloud for Pregnancy.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Bus Drivers Fatigue Measurement Based on Monopolar EEG.
Proceedings of the Intelligent Information and Database Systems - 9th Asian Conference, 2017

2016
A secure payment system for multimedia on demand on mobile VANET clouds.
Secur. Commun. Networks, 2016

Design of a VANET privacy and non-repudiation accident reporting system.
Secur. Commun. Networks, 2016

A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment.
Int. J. Data Warehous. Min., 2016

A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
Inf. Technol. Control., 2016

A Non-Repudiated and Intelligent RFID Medication Safety Management System.
Intell. Autom. Soft Comput., 2016

A novel lottery protocol for mobile environments.
Comput. Electr. Eng., 2016

Design of a secure medical data sharing system via an authorized mechanism.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Cryptanalysis of Lee and Lin's innovative electronic group-buying system.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Secure Official Vehicle Communication Protocol for VANET.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A resource utilization measurement detection against DDoS attacks.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks.
J. Sensors, 2015

Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks.
J. Sensors, 2015

A mobile-device-based event reporting scheme for WSNs.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

2014
Design and analysis of a secure and effective emergency system for mountaineering events.
J. Supercomput., 2014

An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards.
Secur. Commun. Networks, 2014

A Secure Medical Data Exchange Protocol Based on Cloud Environment.
J. Medical Syst., 2014

A Privacy Authentication Scheme Based on Cloud for Medical Environment.
J. Medical Syst., 2014

Design of a secure communication and handoff protocol for VANETs.
J. High Speed Networks, 2014

A radio frequency identification application for car theft prevention in parking lot management systems.
Int. J. Commun. Syst., 2014

Designing A Healthcare Authorization Model Based On Cloud Authentication.
Intell. Autom. Soft Comput., 2014

A secure mobile DRM system based on cloud architecture.
Comput. Sci. Inf. Syst., 2014

A Secure Authentication Scheme of Health Care Based on the Cloud.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol.
Wirel. Pers. Commun., 2013

A Secure Ambulance Communication Protocol for VANET.
Wirel. Pers. Commun., 2013

An Ownership Transfer Scheme Using Mobile RFIDs.
Wirel. Pers. Commun., 2013

A secure ownership transfer protocol using EPCglobal Gen-2 RFID.
Telecommun. Syst., 2013

A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing.
Inf. Technol. Control., 2013

Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
Inf. Technol. Control., 2013

A mobile commercial system for membership-based stores using mobile RFID readers.
Int. J. RF Technol. Res. Appl., 2013

A Two-Tier Coordination System against DDoS Attacks.
Int. J. Online Eng., 2013

Combining quality of services path first routing and admission control to support VoIP traffic.
Future Gener. Comput. Syst., 2013

Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks.
Comput. Sci. Inf. Syst., 2013

Design a dynamic key management protocol for data gathering in wireless sensor network.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Improve Two Remote User Authentication Scheme Using Smart Card.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2012
A private online system for executing wills based on a secret sharing mechanism.
Secur. Commun. Networks, 2012

RFID system for public train transportation.
Secur. Commun. Networks, 2012

Using RFID Yoking Proof Protocol to Enhance Inpatient Medication Safety.
J. Medical Syst., 2012

A Non-Repudiated and Traceable Authorization System Based on Electronic Health Insurance Cards.
J. Medical Syst., 2012

Performance Evaluation of Active Queue Management Using A Hybrid Approach.
J. Comput., 2012

A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards.
Inf. Technol. Control., 2012

Design of an RFID on-line authentication and anti-counterfeit transaction protocol.
Int. J. RF Technol. Res. Appl., 2012

Mobile device integration of a fingerprint biometric remote authentication scheme.
Int. J. Commun. Syst., 2012

Based on mobile RFID for membership stores system conforming EPC C1G2 standards.
Int. J. Ad Hoc Ubiquitous Comput., 2012

Fair offline digital content transaction system.
IET Inf. Secur., 2012

A Novel Key Management of Two-Tier Dissemination for Wireless Sensor Network.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A downlink scheduling based on queue length estimation for VoIP in WiMAX networks.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

A proposal of next generation network: QoS mapping for MPLS-DiffServ and label forwarding.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
Design of a secure RFID authentication scheme preceding market transactions.
Mob. Inf. Syst., 2011

A Verifiable and Traceable Secondhand Digital Media Market Protocol.
KSII Trans. Internet Inf. Syst., 2011

RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards.
Int. J. Netw. Secur., 2011

A novel and low-computation e-cash transfer system against blackmail for mobile communications.
Int. J. Mob. Commun., 2011

A fair online payment system for digital content via subliminal channel.
Electron. Commer. Res. Appl., 2011

A Dual-Tree-Based On-Demand Multicast Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

A Coverage Algorithm to Improve the Performance of PEGASIS in Wireless Sensor Networks.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

An Improvement on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

An Improvement of Chen Et al.'s Scheme for Mobile Pay-TV.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Private Escrow Protocol for Internet Will System Design.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

On Achieving Robustness and Fairness in Call Admission Control for Voice Services within NGN Environment.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

2010
Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks.
Sensors, 2010

Performance of a data gather scheme with novel chain construction for wireless sensor networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

A spare two-tier data aggregation for grid-based wireless sensor networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

Authenticated Multiple Keys Exchange Protocol Based on Bilinear Pairings.
Proceedings of the International Conference on E-Business and E-Government, 2010

Using Mobile Device to Design a Secure Transaction.
Proceedings of the CISIS 2010, 2010

Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
A Non-repudiated Self-service Store System Based on Portable Trusted Device.
Wirel. Pers. Commun., 2009

A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test.
J. Univers. Comput. Sci., 2009

Construction of a Real-Time and Secure Mobile Ticket System.
J. Inf. Sci. Eng., 2009

Enhancing MPLS Protection Method with Adaptive Segment Repair.
IEICE Trans. Commun., 2009

A traceable E-cash transfer system against blackmail via subliminal channel.
Electron. Commer. Res. Appl., 2009

Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection.
Eng. Appl. Artif. Intell., 2009

2008
A PTD-based transaction protocol for public transportation.
Int. J. Commun. Syst., 2008

A secure and traceable E-DRM system based on mobile device.
Expert Syst. Appl., 2008

Dynamic Session-Key Generation for Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2008

A Framework Supporting User-Specific Services in RFID Systems.
Proceedings of the Fifth IEEE International Conference on Wireless, 2008

2007
A Mobile Ticket System Based on Personal Trusted Device.
Wirel. Pers. Commun., 2007

A Secure Authentication Scheme for a Public Terminal Before a Transaction.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

A server-aided signature scheme for mobile commerce.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

2005
Design of a fair proxy raffle protocol on the Internet.
Comput. Stand. Interfaces, 2005

A fair and secure mobile billing system.
Comput. Networks, 2005

A novel proxy deposit protocol for e-cash systems.
Appl. Math. Comput., 2005

Supporting Rate-based Control in DiffServ Networks.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

2004
The design of a secure anonymous Internet voting system.
Comput. Secur., 2004

2002
DiffServ Operational Model.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

2000
A new dynamic bandwidth allocation scheme for MPEG videos in ATM networks.
Comput. Commun., 2000

Design of a multiple leaky buckets shaper.
Comput. Commun., 2000

1999
Dynamic priority transmission mechanism for DQDB.
Comput. Commun., 1999

1995
A Distributed Load Balancing Algorithm Based on Spanning Trees.
Proceedings of the Seventh SIAM Conference on Parallel Processing for Scientific Computing, 1995


  Loading...