Jheng-Jia Huang
Orcid: 0000-0003-1050-6390
According to our database1,
Jheng-Jia Huang
authored at least 31 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
2022
Proceedings of the New Trends in Computer Technologies and Applications, 2022
A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments.
Proceedings of the New Trends in Computer Technologies and Applications, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Cross-Network-Slice Authentication Scheme for the 5<sup>th</sup> Generation Mobile Communication System.
IEEE Trans. Netw. Serv. Manag., 2021
Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery.
IEEE Trans. Cloud Comput., 2021
An Efficient Secure Handover Scheme Supporting Cross-Network Slicing for Multi-Operator Environments.
Proceedings of the Thirteenth International Conference on Mobile Computing and Ubiquitous Network, 2021
Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
2020
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications.
IEEE Trans. Inf. Forensics Secur., 2020
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020
Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes.
Proceedings of the International Computer Symposium, 2020
2018
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers.
IEEE Syst. J., 2018
Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading.
IEEE Internet Things J., 2018
ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G.
CoRR, 2018
Proceedings of the Internet and Distributed Computing Systems, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
2017
IEEE Trans. Signal Inf. Process. over Networks, 2017
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017
2016
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016
Proceedings of the 6th International Conference on IT Convergence and Security, 2016
2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013