Nai-Wei Lo

Orcid: 0000-0003-4622-4977

According to our database1, Nai-Wei Lo authored at least 84 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Anonymous and Unlinkable Identity Scheme in Open Data Environment.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

2020
BLE-Based Authentication Protocol for Micropayment Using Wearable Device.
Wirel. Pers. Commun., 2020

FOTB: a secure blockchain-based firmware update framework for IoT environment.
Int. J. Inf. Sec., 2020

Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms.
CoRR, 2020

An Efficient Blockchain-based Firmware Update Framework for IoT Environment.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
A Machine Learning Framework for Biometric Authentication Using Electrocardiogram.
IEEE Access, 2019

Multivariate Time Series Data Transformation for Convolutional Neural Network.
Proceedings of the IEEE/SICE International Symposium on System Integration, 2019

Privacy-Preserving Encryption-Domain Video Retrieval over the Cloud via Block Transformations of Key Frames.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

F1ow-based Anomaly Detection Using Multilayer Perceptron in Software Defined Networks.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

A Secure IoT Firmware Update Framework Based on MQTT Protocol.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology - ISAT 2019, 2019

Secure and Lightweight Firmware Update Framework for IoT Environment.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

2018
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.
Sensors, 2018

A Lightweight Continuous Authentication Protocol for the Internet of Things.
Sensors, 2018

A robust NFC-based personalized IPTV service system.
Multim. Tools Appl., 2018

Streaming data analysis framework for cyber-physical system of metal machining processes.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

An Over-the-Blockchain Firmware Update Framework for IoT Devices.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
A secure smart card authentication and authorization framework using in multimedia cloud.
Multim. Tools Appl., 2017

Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
IEICE Trans. Inf. Syst., 2017

A NFC-Based Authentication Scheme for Personalized IPTV Services.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

2016
Secure Anonymous Key Distribution Scheme for Smart Grid.
IEEE Trans. Smart Grid, 2016

An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings.
IEEE Trans. Intell. Transp. Syst., 2016

Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid.
IEEE Syst. J., 2016

Provably secure anonymous authentication with batch verification for mobile roaming services.
Ad Hoc Networks, 2016

Dynamic multi-factor authentication for smartphone.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

A Novel Authentication Protocol for Micropayment with Wearable Devices.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

A Framework for Third Party Android Marketplaces to Identify Repackaged Apps.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings.
Wirel. Pers. Commun., 2015

An Attribute-Role Based Access Control Mechanism for Multi-tenancy Cloud Environment.
Wirel. Pers. Commun., 2015

A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
IEEE Syst. J., 2015

Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments.
Secur. Commun. Networks, 2015

A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card.
Int. J. Commun. Syst., 2015

An Accountable Identity-Based Billing Protocol for Cloud Environment.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A fraud detection system for real-time messaging communication on Android Facebook messenger.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Intelligent Display Auto-Lock Scheme for Mobile Devices.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Hash-Based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration.
Wirel. Pers. Commun., 2014

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings.
J. Appl. Math., 2014

Secure anonymous authentication scheme without verification table for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2014

Innovative Applications and Security of Internet of Things.
Int. J. Distributed Sens. Networks, 2014

Digital rights management system with user privacy, usage transparency, and superdistribution support.
Int. J. Commun. Syst., 2014

Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings.
Int. J. Commun. Syst., 2014

RFID Multi-Ownership Transfer Protocol in VMI Environments.
Proceedings of the Radio Frequency Identification System Security, 2014

Motivations, Deployment, and Assessment of Taiwan's E-Invoicing System: An Overview.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

An analysis framework for information loss and privacy leakage on Android applications.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

Danger Theory-based Privacy Protection Model for Social Networks.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

2013
Secure Handover Authentication Protocol Based on Bilinear Pairings.
Wirel. Pers. Commun., 2013

A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks.
Wirel. Pers. Commun., 2013

Novel Anonymous Authentication Scheme Using Smart Cards.
IEEE Trans. Ind. Informatics, 2013

Authentication with low-cost RFID tags in mobile networks.
Secur. Commun. Networks, 2013

Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings.
Inf. Technol. Control., 2013

Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care.
Int. J. Distributed Sens. Networks, 2013

ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices.
Ad Hoc Sens. Wirel. Networks, 2013

New Identity-Based Sequential Aggregate Signature Scheme from RSA.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

2012
Two RFID-Based Solutions for Secure Inpatient Medication Administration.
J. Medical Syst., 2012

A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability.
KSII Trans. Internet Inf. Syst., 2012

Secure Delegation-Based Authentication Protocol for Wireless Roaming Service.
IEEE Commun. Lett., 2012

A Patient Privacy-Aware E-health System Based on Passive RFID.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Cryptanalyses of Two Ultralightweight RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification System Security, 2012

Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

Analysis of an eHealth Care System with Smart Card Based Authentication.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems.
J. Inf. Sci. Eng., 2011

Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture.
Int. J. Commun. Syst., 2011

Adaptive collision resolution for efficient RFID tag identification.
EURASIP J. Wirel. Commun. Netw., 2011

Ownership transfer protocol for RFID objects using lightweight computing operators.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
Two robust remote user authentication protocols using smart cards.
J. Syst. Softw., 2010

Mutual RFID Authentication Scheme for Resource-constrained Tags.
J. Inf. Sci. Eng., 2010

Anonymous Coexistence Proofs for RFID Tags.
J. Inf. Sci. Eng., 2010

De-synchronization attack on RFID authentication protocols.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Transparent Digital Rights Management System with Superdistribution.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2009

A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks.
EURASIP J. Wirel. Commun. Netw., 2009

Cryptanalysis of two three-party encrypted key exchange protocols.
Comput. Stand. Interfaces, 2009

Improvement of an EPC Gen2 Compliant RFID Authentication Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
New mutual agreement protocol to secure mobile RFID-enabled devices.
Inf. Secur. Tech. Rep., 2008

An Efficient Tree-Based Tag Identification Protocol for RFID Systems.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Novel RFID Authentication Schemes for Security Enhancement and System Efficiency.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
ezBusiness - A Novel Mobile Business Application Architecture.
Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications, 2006

1998
Parallel implementation of a unified approach to image focus and defocus analysis on the Parallel Virtual Machine.
Proceedings of the Visual Information Processing VII, Orlando, FL, USA, April 13, 1998, 1998

1997
Fault Tolerant Algorithms for Broadcasting on the Star Graph Network.
IEEE Trans. Computers, 1997


  Loading...