Wei-Chi Ku

According to our database1, Wei-Chi Ku authored at least 33 papers between 1995 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient Shoulder Surfing Resistant PIN Authentication Scheme Based on Localized Tactile Feedback.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2016
A Simple Sector-Based Textual-Graphical Password Scheme with Resistance to Login-Recording Attacks.
IEICE Trans. Inf. Syst., 2016

2015
A Sector-Based Graphical Password Scheme with Resistance to Login-Recording Attacks.
IEICE Trans. Inf. Syst., 2015

2014
An enhanced capture attacks resistant text-based graphical password scheme.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

2012
An enhanced simple secure remote password authentication scheme without using cryptography.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Improvement of EPC-C1G2 RFID authentication protocols.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

2009
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments.
Comput. Stand. Interfaces, 2009

2008
Three weaknesses in a simple three-party key exchange protocol.
Inf. Sci., 2008

An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
An Enhanced Verifier-Free Remote User Password Authentication Scheme.
Proceedings of ICEBE 2007, 2007

2006
Authentication Protocols Using Hoover-Kausik's Software Token.
J. Inf. Sci. Eng., 2006

Weaknesses of Two SAS-Like Password Authentication Schemes.
IEICE Trans. Commun., 2006

2005
Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture.
IEEE Trans. Neural Networks, 2005

Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme.
ACM SIGOPS Oper. Syst. Rev., 2005

Cryptanalysis of a flexible remote user authentication scheme using smart cards.
ACM SIGOPS Oper. Syst. Rev., 2005

Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme.
Informatica, 2005

Vulnerabilities of Wu-Chieu's Improved Password Authentication Scheme Using Smart Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Weaknesses of a Remote User Authentication Scheme Using Smart Cards for Multi-Server Architecture.
IEICE Trans. Commun., 2005

Cryptanalysis of a Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards.
IEICE Trans. Commun., 2005

A Remote User Authentication Scheme Using Strong Graphical Passwords.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Weakness and Simple Improvement of a Password Authentication Scheme Based on Geometric Approach.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

2004
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004

A hash-based strong-password authentication scheme without using smart cards.
ACM SIGOPS Oper. Syst. Rev., 2004

An e-Voting Scheme with Improved Resistance to Bribe and Coercion.
IACR Cryptol. ePrint Arch., 2004

An e-Voting Scheme against Bribe and Coercion.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol.
ACM SIGOPS Oper. Syst. Rev., 2003

Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme.
ACM SIGOPS Oper. Syst. Rev., 2003

An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

2002
An Anonymous Endorsement System.
J. Inf. Sci. Eng., 2002

An Improved ID-Based Authentication and Key Distribution Protocol.
Proceedings of the Information Networking, 2002

1999
A secure and practical electronic voting scheme.
Comput. Commun., 1999

1995
Reparable key distribution protocols for Internet environments.
IEEE Trans. Commun., 1995


  Loading...