Shin-Yan Chiou
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
J. Inf. Sci. Eng., September, 2024
2021
A Real-Time, Automatic, and Dynamic Scheduling and Control System for PET Patients Based on Wearable Sensors.
Sensors, 2021
Secur. Commun. Networks, 2021
2020
IEEE Access, 2020
2019
Int. J. Netw. Secur., 2019
2018
Common friends discovery for multiple parties with friendship ownership and replay-attack resistance in mobile social networks.
Wirel. Networks, 2018
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment.
Secur. Commun. Networks, 2018
Design and Implementation of a Multiple-Choice E-voting Scheme on Mobile System using Novel t -out-of- n Oblivious Signature.
J. Inf. Sci. Eng., 2018
Int. J. Netw. Secur., 2018
A Real-Time, Automated and Privacy-Preserving Mobile Emergency-Medical-Service Network for Informing the Closest Rescuer to Rapidly Support Mobile-Emergency-Call Victims.
IEEE Access, 2018
2017
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature.
Secur. Commun. Networks, 2017
A trustworthy online recommendation system based on social connections in a privacy-preserving manner.
Multim. Tools Appl., 2017
2016
Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.
J. Medical Syst., 2016
2015
An Efficient Privacy Authentication Scheme Based on Cloud Models for Medical Environment.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
2014
Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety.
J. Medical Syst., 2014
2013
Mobile common friends discovery with friendship ownership and replay-attack resistance.
Wirel. Networks, 2013
2012
A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application.
Proceedings of the Radio Frequency Identification System Security, 2012
2009
Proceedings of the iiWAS'2009, 2009
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2003
Cryptanalysis of an optimized protocol for mobile network authentication and security.
Inf. Process. Lett., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003