Tzer-Shyong Chen
Orcid: 0000-0001-8915-5057
According to our database1,
Tzer-Shyong Chen
authored at least 78 papers
between 1995 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
IEEE Access, 2023
2022
Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records.
Knowl. Based Syst., 2022
2021
Machine learning approaches for the genomic prediction of rheumatoid arthritis and systemic lupus erythematosus.
BioData Min., 2021
Who Donates on Line? Segmentation Analysis and Marketing Strategies Based on Machine Learning for Online Charitable Donations in Taiwan.
IEEE Access, 2021
2020
Wirel. Pers. Commun., 2020
Web-Based Dashboard for the Interactive Visualization and Analysis of National Risk-Standardized Mortality Rates of Sepsis in the US.
J. Medical Syst., 2020
Applying time-constraint access control of personal health record in cloud computing.
Enterp. Inf. Syst., 2020
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Dynamic Hierarchical Security Access Control with Time-Limited Method in Electronic Medical Record.
Proceedings of the Advanced Information Networking and Applications, 2020
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020
2019
Multim. Tools Appl., 2019
Int. J. Netw. Secur., 2019
Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
2018
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2018
A hierarchical access control scheme based on Lagrange interpolation for mobile agents.
Int. J. Distributed Sens. Networks, 2018
An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples.
IEEE Access, 2018
An Implementation of Interactive RFID Positioning Healthcare System on Mobile Platform.
Proceedings of the Advances on Broadband and Wireless Computing, 2018
2016
Wirel. Pers. Commun., 2016
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
J. Medical Syst., 2016
J. Medical Syst., 2016
J. Medical Syst., 2016
2015
Design of secure access control scheme for personal health record-based cloud healthcare service.
Secur. Commun. Networks, 2015
2014
2013
Proceedings of the 42nd International Conference on Parallel Processing, 2013
2012
A Password-Based User Authentication Scheme for the Integrated EPR Information System.
J. Medical Syst., 2012
J. Medical Syst., 2012
J. Medical Syst., 2012
J. Medical Syst., 2012
J. Medical Syst., 2012
J. Medical Syst., 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce.
Expert Syst. Appl., 2011
2010
2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
2008
J. Syst. Softw., 2008
Inf. Sci., 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Comput. Stand. Interfaces, 2007
2006
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Proceedings of the Computational Intelligence, 2006
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
2004
J. Comput. Sci. Technol., 2004
A practical authenticated encryption scheme based on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2004
A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem.
Comput. Stand. Interfaces, 2004
Comput. Secur., 2004
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme.
Appl. Math. Comput., 2004
Appl. Math. Comput., 2004
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
2003
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy.
J. Comput. Sci. Technol., 2003
Comput. Secur., 2003
2002
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations.
Comput. Secur., 2002
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm.
Comput. Secur., 2002
2000
Proceedings of the Geometric Modeling and Processing 2000, 2000
1995
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995