Hui-Feng Huang
According to our database1,
Hui-Feng Huang
authored at least 43 papers
between 2002 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Int. J. Netw. Secur., 2015
2014
Int. J. Netw. Secur., 2014
An efficient <i>t</i>-out-of-<i>n</i> oblivious transfer for information security and privacy protection.
Int. J. Commun. Syst., 2014
User Authentication with Anonymity for Roaming Service with Smart Cards in Global Mobility Networks.
Ad Hoc Sens. Wirel. Networks, 2014
Proceedings of the 2014 IEEE International Symposium on Independent Computing, 2014
2013
Pattern Recognit. Lett., 2013
2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
The Case Study of Adaptive Network-Based Fuzzy Inference System Modeling for TAIEX Prediction.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
2011
Int. J. Distributed Sens. Networks, 2011
Int. J. Commun. Syst., 2011
2010
J. Convergence Inf. Technol., 2010
J. Convergence Inf. Technol., 2010
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
Int. J. Commun. Syst., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
2008
Int. J. Mob. Commun., 2008
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy.
Fundam. Informaticae, 2008
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
A New Design of Efficient Key Pre-distribution Scheme for Secure Wireless Sensor Networks.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2006
Inf. Sci., 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
An Untraceable Forward-Secure Blind Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
2005
Multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Comput. Stand. Interfaces, 2005
Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Appl. Math. Comput., 2005
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
A new cryptographic key assignment scheme with time-constraint access control in a hierarchy.
Comput. Stand. Interfaces, 2004
2003
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers.
Fundam. Informaticae, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
2002
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002