Chin-Tser Huang
Orcid: 0000-0003-3983-972X
According to our database1,
Chin-Tser Huang
authored at least 100 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The universal federator: A third-party authentication solution to federated cloud, edge, and fog.
J. Netw. Comput. Appl., 2024
Adaptive Channel Switching for Connected Vehicles under Extreme Weather Conditions: A Reinforcement Learning Based Approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery Networks.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems.
Proceedings of the Ubiquitous Security, 2023
Proceedings of the Ubiquitous Security, 2023
SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC.
Proceedings of the Provable and Practical Security, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Security Management in Content Distribution Networks: a delay-variance reduction approach for content mirror site placement.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023
2022
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment.
Network, 2022
Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather.
Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, 2022
Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022
2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021
Impact of Weather Conditions on 5G Communication Channel under Connected Vehicles Framework.
CoRR, 2021
Proceedings of the 2021 IEEE International Conference on Wireless for Space and Extreme Environments, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Comput. Networks, 2020
Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus.
IEEE Access, 2020
Proceedings of the IEEE International Smart Cities Conference, 2020
2019
A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology.
IEEE Access, 2019
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
Decision tree rule learning approach to counter burst header packet flooding attack in Optical Burst Switching network.
Opt. Switch. Netw., 2018
A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis.
Comput. Hum. Behav., 2018
Blockchain-inspired Framework for Runtime Verification of IoT Ecosystem Task Fulfillment.
Proceedings of the IEEE International Smart Cities Conference, 2018
2017
Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model.
Int. J. Netw. Secur., 2017
Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates.
Electron. Commer. Res., 2017
Proceedings of the IEEE International Conference on Consumer Electronics, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
Proceedings of the 6th IEEE International Conference on Cloud Networking, 2017
2016
Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations.
J. Electr. Comput. Eng., 2016
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.
Proceedings of the IEEE International Conference on Communications, 2014
2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Proceedings of IEEE International Conference on Communications, 2013
2012
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012
A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012
Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
A practical implementation of veiled certificate for user-centric privacy protection.
Proceedings of the 50th Annual Southeast Regional Conference, 2012
2011
Comput. Commun., 2011
Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations.
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Global Communications Conference, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
Proceedings of IEEE International Conference on Communications, 2010
2009
EURASIP J. Adv. Signal Process., 2009
EURASIP J. Adv. Signal Process., 2009
Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements.
Comput. Secur., 2009
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Int. J. Netw. Secur., 2008
Proceedings of the IEEE International Conference on Sensor Networks, 2008
Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, 2008
2007
Int. J. Sens. Networks, 2007
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks.
Proceedings of the Global Communications Conference, 2007
Proceedings of the 45th Annual Southeast Regional Conference, 2007
2006
Proceedings of the 3rd IEEE International Symposium on Wireless Communication Systems, 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the 44st Annual Southeast Regional Conference, 2006
Advances in Information Security 21, Springer, ISBN: 978-0-387-24426-6, 2006
2005
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005
2003
2002
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
2001
Proceedings of the Self-Stabilizing Systems, 5th International Workshop, 2001
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001
2000
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000