Kuo-Hui Yeh
Orcid: 0000-0003-0598-761X
According to our database1,
Kuo-Hui Yeh
authored at least 96 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Conditional Privacy-Preserving Mutual Authentication Protocol With Fine-Grained Forward and Backward Security in IoV.
IEEE Trans. Intell. Transp. Syst., November, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
Symmetry, August, 2024
Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT.
Comput. Electr. Eng., 2024
2023
Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System.
IEEE Trans. Ind. Informatics, November, 2023
Revocable and Unbounded Attribute-Based Encryption Scheme With Adaptive Security for Integrating Digital Twins in Internet of Things.
IEEE J. Sel. Areas Commun., October, 2023
J. Inf. Secur. Appl., August, 2023
Sensors, July, 2023
IEEE Internet Things J., July, 2023
Special Issue Editorial "Deep Learning Technologies for Mobile Networks: A Themed Issue in Honor of Prof. Han-Chieh Chao".
Symmetry, March, 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
IEEE Trans. Cloud Comput., 2023
Special Issue Editorial "Blockchain-Enabled Technology for IoT Security, Privacy and Trust".
Symmetry, 2023
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT.
IEEE Internet Things J., 2023
Comput. Ind. Eng., 2023
Designing a Mobile Payment-Driven Mobility-as-a-Service Architecture for Bus Transportation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the Big Data Technologies and Applications, 2023
2022
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT.
IEEE J. Biomed. Health Informatics, 2022
Symmetry, 2022
Secur. Commun. Networks, 2022
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
2021
Multim. Tools Appl., 2021
Towards a Novel Interoperability Management Scheme for Cross-blockchain Transactions.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021
Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining.
IEEE Trans. Emerg. Top. Comput. Intell., 2020
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks.
IEEE Trans. Emerg. Top. Comput., 2020
Symmetry, 2020
A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things.
J. Inf. Secur. Appl., 2020
Int. J. Inf. Sec., 2020
Hum. centric Comput. Inf. Sci., 2020
IEEE Access, 2020
2019
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things.
ACM Trans. Embed. Comput. Syst., 2019
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications.
J. Ambient Intell. Humaniz. Comput., 2019
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing.
Future Gener. Comput. Syst., 2019
2018
Symmetry, 2018
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018
A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments.
IEEE Syst. J., 2018
IEEE Commun. Mag., 2018
IEEE Access, 2018
IEEE Access, 2018
A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017
Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.
Sensors, 2017
Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
IEICE Trans. Inf. Syst., 2017
Cryptanalysis of Wang et al's Certificateless Signature Scheme without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
2016
IEEE Syst. J., 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
2015
Multim. Tools Appl., 2015
Frontiers Inf. Technol. Electron. Eng., 2015
Inf. Technol. Control., 2015
Inf. Technol. Control., 2015
Int. J. Distributed Sens. Networks, 2015
A fraud detection system for real-time messaging communication on Android Facebook messenger.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015
2014
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration.
Wirel. Pers. Commun., 2014
Wirel. Pers. Commun., 2014
Proceedings of the Radio Frequency Identification System Security, 2014
An analysis framework for information loss and privacy leakage on Android applications.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014
2013
J. Zhejiang Univ. Sci. C, 2013
Efficient and secure three-party authenticated key exchange protocol for mobile environments.
J. Zhejiang Univ. Sci. C, 2013
Int. J. Distributed Sens. Networks, 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the Radio Frequency Identification System Security, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
J. Inf. Sci. Eng., 2011
Int. J. Commun. Syst., 2011
EURASIP J. Wirel. Commun. Netw., 2011
2010
J. Syst. Softw., 2010
J. Inf. Sci. Eng., 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
Comput. Stand. Interfaces, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Inf. Secur. Tech. Rep., 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007