Kuo-Hui Yeh

Orcid: 0000-0003-0598-761X

According to our database1, Kuo-Hui Yeh authored at least 95 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detecting Adversarial Examples of Fake News via the Neurons Activation State.
IEEE Trans. Comput. Soc. Syst., August, 2024

Emerging Authentication Technologies for Zero Trust on the Internet of Things.
Symmetry, August, 2024

Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT.
Comput. Electr. Eng., 2024

2023
Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System.
IEEE Trans. Ind. Informatics, November, 2023

Revocable and Unbounded Attribute-Based Encryption Scheme With Adaptive Security for Integrating Digital Twins in Internet of Things.
IEEE J. Sel. Areas Commun., October, 2023

A task-oriented neural dialogue system capable of knowledge accessing.
J. Inf. Secur. Appl., August, 2023

A Trusted Reputation Management Scheme for Cross-Chain Transactions.
Sensors, July, 2023

Trusting Computing as a Service for Blockchain Applications.
IEEE Internet Things J., July, 2023

Special Issue Editorial "Deep Learning Technologies for Mobile Networks: A Themed Issue in Honor of Prof. Han-Chieh Chao".
Symmetry, March, 2023

Towards Intelligent Attack Detection Using DNA Computing.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Enhancing OAuth With Blockchain Technologies for Data Portability.
IEEE Trans. Cloud Comput., 2023

Special Issue Editorial "Blockchain-Enabled Technology for IoT Security, Privacy and Trust".
Symmetry, 2023

Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT.
IEEE Internet Things J., 2023

A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2.
Comput. Ind. Eng., 2023

Designing a Mobile Payment-Driven Mobility-as-a-Service Architecture for Bus Transportation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls.
Proceedings of the Big Data Technologies and Applications, 2023

2022
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT.
IEEE J. Biomed. Health Informatics, 2022

A Secure Interoperability Management Scheme for Cross-Blockchain Transactions.
Symmetry, 2022

Security, Trust and Privacy for Cloud, Fog and Internet of Things.
Secur. Commun. Networks, 2022

An Evolutionary Risk-based Access Control Framework for Enterprise File Systems.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Integrating FIDO Authentication with New Digital Identity in Taiwan.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

A Novel Fast Recovery Method for HT Tamper in Embedded Processor.
Proceedings of the Blockchain Technology and Emerging Technologies, 2022

2021
Security and Privacy Techniques in IoT Environment.
Sensors, 2021

Efficient access control with traceability and user revocation in IoT.
Multim. Tools Appl., 2021

Blockchain for edge-enabled smart cities applications.
J. Inf. Secur. Appl., 2021

Towards a Novel Interoperability Management Scheme for Cross-blockchain Transactions.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks.
IEEE Trans. Emerg. Top. Comput., 2020

Security and Privacy in IoT-Cloud-Based e-Health Systems - A Comprehensive Review.
Symmetry, 2020

A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things.
J. Inf. Secur. Appl., 2020

Special issue on security and privacy of blockchain technologies.
Int. J. Inf. Sec., 2020

Exploring coupled images fusion based on joint tensor decomposition.
Hum. centric Comput. Inf. Sci., 2020

Special Issue on FinTech Security and Privacy.
Future Gener. Comput. Syst., 2020

bleRPC: A plug-and-play RPC framework over BLE.
Comput. Commun., 2020

IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT.
IEEE Access, 2020

2019
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things.
ACM Trans. Embed. Comput. Syst., 2019

Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications.
J. Ambient Intell. Humaniz. Comput., 2019

Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges.
IEEE Internet Things J., 2019

Lightweight IoT-based authentication scheme in cloud computing circumstance.
Future Gener. Comput. Syst., 2019

Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing.
Future Gener. Comput. Syst., 2019

2018
Authentication with What You See and Remember in the Internet of Things.
Symmetry, 2018

Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018

A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments.
IEEE Syst. J., 2018

A robust NFC-based personalized IPTV service system.
Multim. Tools Appl., 2018

Special Issue on Advanced Persistent Threat.
Future Gener. Comput. Syst., 2018

I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics.
IEEE Commun. Mag., 2018

A Robust Mobile Payment Scheme With Smart Contract-Based Transaction Repository.
IEEE Access, 2018

A Data-Driven Security Risk Assessment Scheme for Personal Data Protection.
IEEE Access, 2018

A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices.
IEEE Access, 2018

A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things.
IEEE Access, 2018

Seeing Is Believing: Authenticating Users with What They See and Remember.
Proceedings of the Information Security Practice and Experience, 2018

An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017

Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.
Sensors, 2017

Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
IEICE Trans. Inf. Syst., 2017

Cryptanalysis of Wang et al's Certificateless Signature Scheme without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2017

A NFC-Based Authentication Scheme for Personalized IPTV Services.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

2016
Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid.
IEEE Syst. J., 2016

A Secure IoT-Based Healthcare System With Body Sensor Networks.
IEEE Access, 2016

Transparent authentication scheme with adaptive biometrie features for IoT networks.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
An efficient certificateless signature scheme without bilinear pairings.
Multim. Tools Appl., 2015

A lightweight authentication scheme with user untraceability.
Frontiers Inf. Technol. Electron. Eng., 2015

An Anonymous and Lightweight Authentication Scheme for Mobile Devices.
Inf. Technol. Control., 2015

An Efficient Resource Allocation Framework for Cloud Federations.
Inf. Technol. Control., 2015

Novel Authentication Schemes for IoT Based Healthcare Systems.
Int. J. Distributed Sens. Networks, 2015

A fraud detection system for real-time messaging communication on Android Facebook messenger.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

2014
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration.
Wirel. Pers. Commun., 2014

A Provably Secure Multi-server Based Authentication Scheme.
Wirel. Pers. Commun., 2014

An Authentication Scheme for Ubiquitous RFID Systems.
Proceedings of the Radio Frequency Identification System Security, 2014

An analysis framework for information loss and privacy leakage on Android applications.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Analysis and design of a smart card based authentication protocol.
J. Zhejiang Univ. Sci. C, 2013

Efficient and secure three-party authenticated key exchange protocol for mobile environments.
J. Zhejiang Univ. Sci. C, 2013

Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care.
Int. J. Distributed Sens. Networks, 2013

Robust Certificateless Signature Scheme without Bilinear Pairings.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
A Patient Privacy-Aware E-health System Based on Passive RFID.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Cryptanalyses of Two Ultralightweight RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification System Security, 2012

Analysis of an eHealth Care System with Smart Card Based Authentication.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems.
J. Inf. Sci. Eng., 2011

Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture.
Int. J. Commun. Syst., 2011

Adaptive collision resolution for efficient RFID tag identification.
EURASIP J. Wirel. Commun. Netw., 2011

2010
Two robust remote user authentication protocols using smart cards.
J. Syst. Softw., 2010

Mutual RFID Authentication Scheme for Resource-constrained Tags.
J. Inf. Sci. Eng., 2010

Anonymous Coexistence Proofs for RFID Tags.
J. Inf. Sci. Eng., 2010

De-synchronization attack on RFID authentication protocols.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Cryptanalysis of two three-party encrypted key exchange protocols.
Comput. Stand. Interfaces, 2009

Improvement of an EPC Gen2 Compliant RFID Authentication Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
New mutual agreement protocol to secure mobile RFID-enabled devices.
Inf. Secur. Tech. Rep., 2008

An Efficient Tree-Based Tag Identification Protocol for RFID Systems.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Novel RFID Authentication Schemes for Security Enhancement and System Efficiency.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007


  Loading...