Kuo-Hsuan Huang

According to our database1, Kuo-Hsuan Huang authored at least 16 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Framework for Off-Line Operation of Smart and Traditional Devices of IoT Services.
Sensors, 2020

Bifurcation Analysis of Gear Pair with Continuous and Intermittent Mesh Stiffness Using Enhanced Compliance Method.
Int. J. Bifurc. Chaos, 2020

2012
An Agent-Based Secure Transaction Protocol with Fair Privacy.
Proceedings of the Fourth International Conference on Computational Intelligence, 2012

2010
Application of Portable CDA for Secure Clinical-document Exchange.
J. Medical Syst., 2010

A Multi-Voting Enhancement for Newborn Screening Healthcare Information System.
J. Medical Syst., 2010

2009
Secure and efficient group key management with shared key derivation.
Comput. Stand. Interfaces, 2009

A conference key agreement protocol with fault-tolerant capability.
Comput. Stand. Interfaces, 2009

Efficient migration for mobile computing in distributed networks.
Comput. Stand. Interfaces, 2009

Threshold authenticated encryption scheme using labor-division signature.
Comput. Stand. Interfaces, 2009

2008
Bidder-anonymous English auction scheme with privacy and public verifiability.
J. Syst. Softw., 2008

2007
ID-based digital signature scheme on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2007

2004
Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem.
J. Comput. Sci. Technol., 2004

A practical authenticated encryption scheme based on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2004

Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme.
Appl. Math. Comput., 2004

A traceable proxy multisignature scheme based on the elliptic curve cryptosystem.
Appl. Math. Comput., 2004

A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004


  Loading...