Woei-Jiunn Tsaur
Orcid: 0000-0002-4247-914X
According to our database1,
Woei-Jiunn Tsaur
authored at least 50 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., January, 2024
Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection.
Future Internet, 2024
Constructing a Secure Charity NFT Auction Platform Using Fisco Bcos Blockchain for Enhancing Transparency and Traceability.
IEEE Access, 2024
2023
FFK: Fourier-Transform Fuzzy-c-means Kalman-Filter Based RSSI Filtering Mechanism for Indoor Positioning.
Sensors, October, 2023
J. Supercomput., September, 2023
2022
A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System.
Symmetry, 2022
A Secure and Traceable Vehicles and Parts System Based on Blockchain and Smart Contract.
Sensors, 2022
Enterprise Data Sharing with Privacy-Preserved Based on Hyperledger Fabric Blockchain in IIOT's Application.
Sensors, 2022
2021
An Anti-Counterfeit and Traceable Management System for Brand Clothing with Hyperledger Fabric Framework.
Symmetry, 2021
2019
DANS: A Secure and Efficient Driver-Abnormal Notification Scheme With IoT Devices Over IoV.
IEEE Syst. J., 2019
2018
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018
2017
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control.
ACM Trans. Intell. Syst. Technol., 2017
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
Sensors, 2017
2015
Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection.
IEEE Trans. Reliab., 2015
2014
Comput. Sci. Inf. Syst., 2014
2013
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET.
Inf. Technol. Control., 2013
2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Veh. Technol., 2012
A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems.
IEEE Trans. Multim., 2012
IEEE Trans. Consumer Electron., 2012
J. Syst. Softw., 2012
Expert Syst. Appl., 2012
2011
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2010
A Secure Smart-Card-based Password Authenticated Key Agreement Scheme in Multi-server Environments.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
2009
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
An Agent-Based Single Sign-On Scheme for Web Services Environments.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
IEEE Commun. Lett., 2008
Constructing Secure Commercial Vehicle Operation Systems Based on XML and RFID Techniques.
Proceedings of the 2008 International Conference on E-Learning, 2008
2007
Inf. Sci., 2007
A secure protocol for misbehavior-penalization-based fair digital signature exchange.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
2005
Int. J. Mob. Commun., 2005
Appl. Math. Comput., 2005
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems.
Appl. Math. Comput., 2005
Several security schemes constructed using ECC-based self-certified public key cryptosystems.
Appl. Math. Comput., 2005
2004
A smart card-based remote scheme for password authentication in multi-server Internet services.
Comput. Stand. Interfaces, 2004
2001
Auditing Causal Relationships of Group Multicast Communications in Group-Oriented Distributed Systems.
J. Supercomput., 2001
Proceedings of the Networking, 2001
1998
Inf. Softw. Technol., 1998
Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments.
Comput. J., 1998
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998
1997
An authentication-combined access control scheme using a geometric approach in distributed systems.
Proceedings of the 1997 ACM symposium on Applied Computing, 1997
An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997
1996
On the design of secure group-oriented communication channels in Internet environments.
Proceedings of the 7th IEEE International Symposium on Personal, 1996
Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996
1995
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995