Wei-Liang Tai
Orcid: 0000-0001-7517-7570
According to our database1,
Wei-Liang Tai
authored at least 42 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A High-Payload Data Hiding Scheme Based on Absolute Moment Block Truncation Coding for Minimizing Hiding Impact.
Symmetry, 2024
2022
Symmetry, 2022
2021
A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments.
Symmetry, 2021
Security Analyses of an Anonymous Two Factor Authentication Protocol for Roaming Service in Global Mobile Networks.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021
2020
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing.
Int. J. Netw. Secur., 2020
2019
Signal Process. Image Commun., 2019
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.
Int. J. Netw. Secur., 2019
2018
Symmetry, 2018
Signal Process. Image Commun., 2018
2017
Symmetry, 2017
A novel hybrid image authentication scheme based on absolute moment block truncation coding.
Multim. Tools Appl., 2017
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks.
J. Inf. Secur. Appl., 2017
Int. J. Netw. Secur., 2017
2016
An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems.
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
2015
Multim. Tools Appl., 2015
2014
KSII Trans. Internet Inf. Syst., 2014
Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices.
Informatica, 2013
A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the 9th International Conference on Information, 2013
2012
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting.
KSII Trans. Internet Inf. Syst., 2012
A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches.
Inf. Technol. Control., 2012
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011
Proceedings of the 11th IEEE International Conference on Bioinformatics and Bioengineering, 2011
2009
IEEE Trans. Circuits Syst. Video Technol., 2009
2008
Multilevel reversible data hiding based on histogram modification of difference images.
Pattern Recognit., 2008
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery.
Pattern Recognit., 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Fundam. Informaticae, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
IEEE Trans. Circuits Syst. Video Technol., 2006
Comments on Distributed Sign-and-Encryption Schemes.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2005
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005