Horng-Twu Liaw

According to our database1, Horng-Twu Liaw authored at least 40 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A study of identity authentication using blockchain technology in a 5G multi-type network environment.
Comput. Sci. Inf. Syst., 2024

2020
The study for dispatch decision of medical emergency resources with real-time spatial analysis.
J. Supercomput., 2020

2019
A Node Activation-Based Routing Scheme in Micro/Nanobots Networks.
IEEE Access, 2019

2017
A secure smart card authentication and authorization framework using in multimedia cloud.
Multim. Tools Appl., 2017

2016
An authentication, authorization, and accounting mechanism for 3G/WLAN networks.
Secur. Commun. Networks, 2016

On decentralized group key management mechanism for vehicular <i>ad hoc</i> networks.
Secur. Commun. Networks, 2016

An efficient route scheduling mechanism for WiMAX network - ERRATUM.
Knowl. Eng. Rev., 2016

2015
A Study on High Secure and Efficient MANET Routing Scheme.
J. Sensors, 2015

Authenticating with privacy protection in opportunistic networks.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

2014
An efficient route scheduling mechanism for WiMAX network.
Knowl. Eng. Rev., 2014

Digital rights management system with user privacy, usage transparency, and superdistribution support.
Int. J. Commun. Syst., 2014

A trend based investment decision approach using clustering and heuristic algorithm.
Sci. China Inf. Sci., 2014

2013
Centralized group key management mechanism for VANET.
Secur. Commun. Networks, 2013

2012
Secure authentication mechanism for RFID tag in WLAN convergence 3G networks.
Secur. Commun. Networks, 2012

Authentication using graphical password in cloud.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

A Web-based Medical Emergency Guiding System.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

Analysis of an eHealth Care System with Smart Card Based Authentication.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
An RFID secure authentication mechanism in WLAN.
Comput. Commun., 2011

High Security Authentication Mechanism for Mobile Networks.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011

2010
Efficient password authentication schemes based on a geometric approach for a multi-server environment.
J. Zhejiang Univ. Sci. C, 2010

Cluster-based secure communication mechanism in wireless ad hoc networks.
IET Inf. Secur., 2010

The Routing Mechanism with Interference Aware and Congestion Aware for IEEE 802.16j Networks.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010

Transparent Digital Rights Management System with Superdistribution.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2008
Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2008

2007
A new electronic traveler's check scheme based on one-way hash function.
Electron. Commer. Res. Appl., 2007

2006
An efficient and complete remote user authentication scheme using smart cards.
Math. Comput. Model., 2006

An electronic online bidding auction protocol with both security and efficiency.
Appl. Math. Comput., 2006

2005
The design of a secure and fair sealed-bid auction service<sup>, </sup>.
Math. Comput. Model., 2005

2004
A simple password authentication using a polynomial.
ACM SIGOPS Oper. Syst. Rev., 2004

Fair blind threshold signatures in wallet with observers.
J. Syst. Softw., 2004

A secure electronic voting protocol for general elections.
Comput. Secur., 2004

A practical anonymous multi-authority e-cash scheme.
Appl. Math. Comput., 2004

2002
Privacy and Anonymity Protection with Blind Threshold Signatures.
Int. J. Electron. Commer., 2002

A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting.
Comput. J., 2002

2001
Fair blind threshold signatures based on discrete logarithm.
Comput. Syst. Sci. Eng., 2001

1995
An Efficient Password Authentication Scheme Based on a Unit Circle.
Cryptologia, 1995

1994
A dynamic cryptographic key generation and information broadcasting scheme in information systems.
Comput. Secur., 1994

1993
Efficient Parallel Algorithms for Finding the Majority Element.
J. Inf. Sci. Eng., 1993

An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control.
BIT, 1993

1992
A parallel algorithm for finding congruent regions.
Comput. Graph., 1992


  Loading...