Tzer-Long Chen

Orcid: 0000-0002-2586-0993

According to our database1, Tzer-Long Chen authored at least 29 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An improved and efficient coercion-resistant measure for electronic voting system.
Int. J. Inf. Sec., August, 2024

A reliable authentication scheme of personal health records in cloud computing.
Wirel. Networks, July, 2024

2021
Research on Image Steganography Based on Sudoku Matrix.
Symmetry, 2021

Security Privacy and Policy for Cryptographic Based Electronic Medical Information System.
Sensors, 2021

2020
The Implementation of IoT-based Smart Laboratory Management System.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

The Implementation of Smart Aquarium System with Intelligent Sensors.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Design and Implementation a Smart Pillbox.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

Multi-function Electric Scooter Assistant System for Seniors.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

2019
Efficient Hierarchical Key Management Scheme for VR/AR Database Systems.
Int. J. Netw. Secur., 2019

2018
A hierarchical access control scheme based on Lagrange interpolation for mobile agents.
Int. J. Distributed Sens. Networks, 2018

2016
The Application of RFID to Healthcare Management of Nursing House.
Wirel. Pers. Commun., 2016

Security approach to controlling access to personal health records in healthcare service.
Secur. Commun. Networks, 2016

Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
J. Medical Syst., 2016

Implementation of Online Veterinary Hospital on Cloud Platform.
J. Medical Syst., 2016

2014
An Agent-Based Auction Protocol on Mobile Devices.
J. Appl. Math., 2014

2013
A Secure RFID Authentication Scheme for Medicine Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Secure PHR Access Control Scheme for Healthcare Application Clouds.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

2012
Secure Dynamic Access Control Scheme of PHR in Cloud Computing.
J. Medical Syst., 2012

Deployment of Secure Mobile Agents for Medical Information Systems.
J. Medical Syst., 2012

A Study on Agent-Based Secure Scheme for Electronic Medical Record System.
J. Medical Syst., 2012

A time- bound hierarchical access control for multicast systems.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

2011
Electronic Medical Archives: A Different Approach to Applying Re-signing Mechanisms to Digital Signatures.
J. Medical Syst., 2011

An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce.
Expert Syst. Appl., 2011

2010
An ECC-Based Blind Signature Scheme.
J. Networks, 2010

An efficient date-constraint hierarchical key management scheme for mobile agents.
Expert Syst. Appl., 2010

2009
A Blind Signature Scheme Based on Elliptic Curve Cryptosystem.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2006
A Novel Key Management and Access Control Scheme for Mobile Agent.
Proceedings of the Computational Intelligence, 2006

2005
An efficient undeniable group-oriented signature scheme.
Appl. Math. Comput., 2005


  Loading...