King-Hang Wang
Orcid: 0000-0002-4475-7596
According to our database1,
King-Hang Wang
authored at least 29 papers
between 2008 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
Enterp. Inf. Syst., 2021
2019
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications.
J. Ambient Intell. Humaniz. Comput., 2019
IEEE Access, 2019
Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments.
IEEE Access, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
2018
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags.
J. Supercomput., 2018
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
J. Netw. Intell., 2018
J. Inf. Sci. Eng., 2018
J. Inf. Hiding Multim. Signal Process., 2018
Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map.
J. Inf. Hiding Multim. Signal Process., 2018
Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Proceedings of the Genetic and Evolutionary Computing, 2018
2017
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2017
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017
2014
Future Gener. Comput. Syst., 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
2011
IEEE Trans. Dependable Secur. Comput., 2011
IEEE Trans. Computers, 2011
2010
IEEE Trans. Mob. Comput., 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
IEEE Trans. Dependable Secur. Comput., 2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008