Horng-Twu Liaw
According to our database1,
Horng-Twu Liaw
authored at least 40 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A study of identity authentication using blockchain technology in a 5G multi-type network environment.
Comput. Sci. Inf. Syst., 2024
2020
The study for dispatch decision of medical emergency resources with real-time spatial analysis.
J. Supercomput., 2020
2019
2017
A secure smart card authentication and authorization framework using in multimedia cloud.
Multim. Tools Appl., 2017
2016
Secur. Commun. Networks, 2016
On decentralized group key management mechanism for vehicular <i>ad hoc</i> networks.
Secur. Commun. Networks, 2016
Knowl. Eng. Rev., 2016
2015
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015
2014
Digital rights management system with user privacy, usage transparency, and superdistribution support.
Int. J. Commun. Syst., 2014
Sci. China Inf. Sci., 2014
2013
2012
Secur. Commun. Networks, 2012
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011
2010
Efficient password authentication schemes based on a geometric approach for a multi-server environment.
J. Zhejiang Univ. Sci. C, 2010
IET Inf. Secur., 2010
The Routing Mechanism with Interference Aware and Congestion Aware for IEEE 802.16j Networks.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2008
IEEE Trans. Ind. Electron., 2008
2007
Electron. Commer. Res. Appl., 2007
2006
Math. Comput. Model., 2006
Appl. Math. Comput., 2006
2005
Math. Comput. Model., 2005
2004
ACM SIGOPS Oper. Syst. Rev., 2004
2002
Int. J. Electron. Commer., 2002
Comput. J., 2002
2001
Fair blind threshold signatures based on discrete logarithm.
Comput. Syst. Sci. Eng., 2001
1995
Cryptologia, 1995
1994
A dynamic cryptographic key generation and information broadcasting scheme in information systems.
Comput. Secur., 1994
1993
J. Inf. Sci. Eng., 1993
An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control.
BIT, 1993
1992