Iuon-Chang Lin
Orcid: 0009-0002-3367-6317
According to our database1,
Iuon-Chang Lin
authored at least 99 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality.
Symmetry, February, 2024
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle.
IEEE Trans. Netw. Sci. Eng., 2024
Proceedings of the 2024 8th International Conference on Medical and Health Informatics, 2024
Proceedings of the 2024 8th International Conference on Medical and Health Informatics, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
2023
A Grid-Based Key Pre-Distribution Scheme Using Dependent Keys in Wireless Sensor Networks.
J. Inf. Sci. Eng., May, 2023
A Novel Reversible Data Hiding Method with Contrast Enhancement for Color Medical Images.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
2022
A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things.
IEICE Trans. Inf. Syst., December, 2022
Symmetry, 2022
Proceedings of the New Trends in Computer Technologies and Applications, 2022
2021
J. Ambient Intell. Smart Environ., 2021
2020
Int. J. Netw. Secur., 2020
2019
Eng. Appl. Artif. Intell., 2019
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
2018
J. Ambient Intell. Humaniz. Comput., 2018
Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage.
Proceedings of the New Trends in Computer Technologies and Applications, 2018
2017
Informatica, 2017
Proceedings of the 2017 International Conference on Management Engineering, 2017
2016
Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process.
J. Comput., 2016
2015
Mob. Inf. Syst., 2015
J. Netw. Syst. Manag., 2015
Int. J. Netw. Secur., 2015
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
A source authentication scheme based on message recovery digital signature for multicast.
Int. J. Commun. Syst., 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
2013
KSII Trans. Internet Inf. Syst., 2013
2012
EURASIP J. Wirel. Commun. Netw., 2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
2011
Appl. Soft Comput., 2011
A Dynamic Join-leave Multi-purpose Scheme for RFID Infrastructure.
Proceedings of the PECCS 2011, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
2010
A least-significant-bit substitution data hiding scheme by using modulus function and optimal permutation refining.
Int. J. Multim. Intell. Secur., 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
Flexible RFID location system based on artificial neural networks for medical care facilities.
SIGBED Rev., 2009
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce.
Inf. Sci., 2009
Int. J. Netw. Manag., 2009
Int. J. Commun. Syst., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System.
Wirel. Pers. Commun., 2008
J. Comput. Sci. Technol., 2008
A neural network system for authenticating remote users in multi-server architecture.
Int. J. Commun. Syst., 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
2007
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment.
Wirel. Pers. Commun., 2007
Inf. Sci., 2007
Comput. Vis. Image Underst., 2007
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
A new solution for assigning cryptographic keys to control access in mobile agent environments.
Wirel. Commun. Mob. Comput., 2006
Int. J. Pattern Recognit. Artif. Intell., 2006
Int. J. Netw. Secur., 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
Neural Comput. Appl., 2005
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Informatica, 2005
A dynamic mechanism for determining relationships in a partially ordered user hierarchy.
Int. J. High Perform. Comput. Netw., 2005
The General Pay-Word: A Micro-payment Scheme Based on <i>n</i>-dimension One-way Hash Chain.
Des. Codes Cryptogr., 2005
An ID-based multisignature scheme without reblocking and predetermined signing order.
Comput. Stand. Interfaces, 2005
Comput. Artif. Intell., 2005
2004
ACM SIGOPS Oper. Syst. Rev., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
Real Time Imaging, 2004
Comput. Stand. Interfaces, 2004
A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively.
Vis. Comput., 2003
IEEE Trans. Knowl. Data Eng., 2003
Future Gener. Comput. Syst., 2003
A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Gener. Comput. Syst., 2003
Comput. Stand. Interfaces, 2003
The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture.
Comput. Stand. Interfaces, 2003
2002
An Efficient Edge Detection Technique for Chinese Calligraphy.
Proceedings of the 6th Joint Conference on Information Science, 2002
2001
A remote password authentication scheme for multiserver architecture using neural networks.
IEEE Trans. Neural Networks, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Informatica, 2000
Informatica, 2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000