Jung-Hui Chiu

According to our database1, Jung-Hui Chiu authored at least 23 papers between 1986 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Word-Based AES Encryption Without Data Expansion.
J. Inf. Sci. Eng., 2016

2015
Solving Scalability Problems on Secure RFID Grouping-Proof Protocol.
Wirel. Pers. Commun., 2015

2013
The performance evaluation of fast iterative localized re-authentication for 3G/UMTS-WLAN interworking networks.
J. Ambient Intell. Humaniz. Comput., 2013

2012
An RFID Based Multi-batch Supply Chain Systems.
Wirel. Pers. Commun., 2012

More than Learning Mathematics: The Impact of Mathematics Games on Learning in Geography and Community Education.
Proceedings of the 2012 IEEE Fourth International Conference On Digital Game And Intelligent Toy Enhanced Learning, 2012

2011
Select-response grouping proof and its verification protocol for RFID tags.
Int. J. Intell. Inf. Database Syst., 2011

A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks.
EURASIP J. Wirel. Commun. Netw., 2011

A Novel Stream Cipher with Hash Function for the RFID Device.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
A fast iterative localized re-authentication protocol for heterogeneous mobile networks.
IEEE Trans. Consumer Electron., 2010

Performance Evaluation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks.
J. Networks, 2010

The Iterative Distributed Re-authentication Scheme Based on EAP-AKA in 3G/UMTS-WLAN Heterogeneous Mobile Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Concurrent Error Detection in Shifted Dual Basis Multiplier over GF(2m) Using Cyclic Code Approach.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Authentication Schemes Based on the EAP-SIM Mechanism in GSM-WLAN Heterogeneous Mobile Networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Select-Response Grouping Proof for RFID Tags.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

2008
An OFDM-Based Speech Encryption System without Residual Intelligibility.
IEICE Trans. Inf. Syst., 2008

Prevention of Information Leakage by Photo-Coupling in Smart Card.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Reading order independent grouping proof for RFID tags.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

2005
Identity-Based Key Agreement for Peer Group Communication from Pairings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

1993
The Delay Analysis in a Noisy General Cut-Through Switching Network.
Comput. Networks ISDN Syst., 1993

1991
A Simulation Study on the Service Strategies for Packet Voice Communication Networks.
Comput. Networks ISDN Syst., 1991

1988
An improved sequential estimation scheme for PN acquisition.
IEEE Trans. Commun., 1988

1987
The Minimum Likelihood-A New Concept for Bit Synchronization.
IEEE Trans. Commun., 1987

1986
Closed-Form Statistical Analysis for Square Law PN Acquisition. Detector Performance in Spread Spectrum Systems.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986


  Loading...