Wen-Chung Kuo
According to our database1,
Wen-Chung Kuo
authored at least 58 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Machine Learning Attack Resilient and Low-Latency Authentication Scheme for AI-Driven Patient Health Monitoring System.
IEEE Commun. Stand. Mag., September, 2024
2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
2018
Multim. Tools Appl., 2018
Proceedings of the New Trends in Computer Technologies and Applications, 2018
2017
Int. J. Commun. Syst., 2017
2016
Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps.
Inf. Technol. Control., 2016
An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
An Enhanced Secure Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
A DoS-Resistant Robust Identification and Key Agreement Protocol with User Anonymity.
J. Inf. Hiding Multim. Signal Process., 2014
KSII Trans. Internet Inf. Syst., 2014
Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks.
Inf. Technol. Control., 2014
J. Inf. Secur. Appl., 2014
Int. J. Commun. Syst., 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Cryptanalysis of Anonymous Authenticated and Key Agreement Scheme Based on Biometric for Multi-Server Environment.
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
J. Inf. Hiding Multim. Signal Process., 2013
Inf. Technol. Control., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Inf. Technol. Control., 2012
High-Capacity Steganographic Method Based on Division Arithmetic and LSB Replacement.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
2010
J. Convergence Inf. Technol., 2010
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Future Generation Information Technology, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
Comments on "A Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation".
IEEE Trans. Multim., 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007
Proceedings of the Future Generation Communication and Networking, 2007
2006
Design a Secure and Practical Metering Scheme.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006
2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Attack and Improvement on the Lee-Chiu Remote Authentication Schem.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005
1999
On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes.
J. Inf. Sci. Eng., 1999
1995
Proceedings of the Cryptography: Policy and Algorithms, 1995