Nai-Wei Lo
Orcid: 0000-0003-4622-4977
According to our database1,
Nai-Wei Lo
authored at least 83 papers
between 1997 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
2022
A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments.
Proceedings of the New Trends in Computer Technologies and Applications, 2022
2020
Wirel. Pers. Commun., 2020
Int. J. Inf. Sec., 2020
Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms.
CoRR, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
IEEE Access, 2019
Proceedings of the IEEE/SICE International Symposium on System Integration, 2019
Privacy-Preserving Encryption-Domain Video Retrieval over the Cloud via Block Transformations of Key Frames.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019
F1ow-based Anomaly Detection Using Multilayer Perceptron in Software Defined Networks.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019
Proceedings of the Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology - ISAT 2019, 2019
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
2018
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.
Sensors, 2018
Sensors, 2018
Streaming data analysis framework for cyber-physical system of metal machining processes.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
A secure smart card authentication and authorization framework using in multimedia cloud.
Multim. Tools Appl., 2017
Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
IEICE Trans. Inf. Syst., 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
2016
IEEE Trans. Smart Grid, 2016
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings.
IEEE Trans. Intell. Transp. Syst., 2016
IEEE Syst. J., 2016
Provably secure anonymous authentication with batch verification for mobile roaming services.
Ad Hoc Networks, 2016
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
2015
Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings.
Wirel. Pers. Commun., 2015
An Attribute-Role Based Access Control Mechanism for Multi-tenancy Cloud Environment.
Wirel. Pers. Commun., 2015
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
IEEE Syst. J., 2015
Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments.
Secur. Commun. Networks, 2015
A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card.
Int. J. Commun. Syst., 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
A fraud detection system for real-time messaging communication on Android Facebook messenger.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration.
Wirel. Pers. Commun., 2014
J. Appl. Math., 2014
Secure anonymous authentication scheme without verification table for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2014
Int. J. Distributed Sens. Networks, 2014
Digital rights management system with user privacy, usage transparency, and superdistribution support.
Int. J. Commun. Syst., 2014
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings.
Int. J. Commun. Syst., 2014
Proceedings of the Radio Frequency Identification System Security, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
An analysis framework for information loss and privacy leakage on Android applications.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014
2013
Wirel. Pers. Commun., 2013
A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks.
Wirel. Pers. Commun., 2013
IEEE Trans. Ind. Informatics, 2013
Secur. Commun. Networks, 2013
Inf. Technol. Control., 2013
Int. J. Distributed Sens. Networks, 2013
ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices.
Ad Hoc Sens. Wirel. Networks, 2013
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
2012
J. Medical Syst., 2012
KSII Trans. Internet Inf. Syst., 2012
IEEE Commun. Lett., 2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the Radio Frequency Identification System Security, 2012
Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
J. Inf. Sci. Eng., 2011
Int. J. Commun. Syst., 2011
EURASIP J. Wirel. Commun. Netw., 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
2010
J. Syst. Softw., 2010
J. Inf. Sci. Eng., 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
IEICE Trans. Inf. Syst., 2009
EURASIP J. Wirel. Commun. Netw., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Inf. Secur. Tech. Rep., 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2006
ezBusiness - A Novel Mobile Business Application Architecture.
Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications, 2006
1998
Parallel implementation of a unified approach to image focus and defocus analysis on the Parallel Virtual Machine.
Proceedings of the Visual Information Processing VII, Orlando, FL, USA, April 13, 1998, 1998
1997
IEEE Trans. Computers, 1997