Yi-Li Huang
According to our database1,
Yi-Li Huang
authored at least 42 papers
between 2011 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
0
5
10
1
1
1
1
2
5
1
3
2
2
3
6
8
4
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proceedings of the 2021 Digital Image Computing: Techniques and Applications, 2021
Proceedings of the 32nd British Machine Vision Conference 2021, 2021
2020
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme.
Concurr. Comput. Pract. Exp., 2020
2018
IEEE Access, 2018
2017
Comput. Informatics, 2017
Proceedings of the Mobile Internet Security - Second International Symposium, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
A secure data encryption method employing a sequential-logic style mechanism for a cloud system.
Int. J. Web Grid Serv., 2015
Electron. Commer. Res. Appl., 2015
2014
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.
J. Supercomput., 2014
Soft Comput., 2014
Intell. Autom. Soft Comput., 2014
Comput. Sci. Inf. Syst., 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
Math. Comput. Model., 2013
A secure wireless communication system by integrating RSA and Diffie-Hellman PKDS in 4G environments and an intelligent protection-key chain with a data connection core.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks.
Mob. Inf. Syst., 2011
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
J. Univers. Comput. Sci., 2011
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Proceedings of the First International Conference on Data Compression, 2011
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011