Zhen Yu Wu

Orcid: 0000-0002-5552-3517

According to our database1, Zhen Yu Wu authored at least 32 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An improved and efficient coercion-resistant measure for electronic voting system.
Int. J. Inf. Sec., August, 2024

A reliable authentication scheme of personal health records in cloud computing.
Wirel. Networks, July, 2024

2021
Security Privacy and Policy for Cryptographic Based Electronic Medical Information System.
Sensors, 2021

2020
Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

The Development of Smart Home Disaster Prevention System.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

Design and Implementation a Smart Pillbox.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

VR and AR Technology on Cultural Communication.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

Virtual Reality, Augmented Reality and Mixed Reality on the Marketing of Film and Television Creation Industry.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

On the Security Policy and Privacy Protection in Electronic Health Information System.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

Multi-function Electric Scooter Assistant System for Seniors.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

2019
A Secure and Efficient Digital-Data-Sharing System for Cloud Environments.
Sensors, 2019

An radio-frequency identification security authentication mechanism for Internet of things applications.
Int. J. Distributed Sens. Networks, 2019

Group-Oriented Cryptosystem for Personal Health Records Exchange and Sharing.
IEEE Access, 2019

2018
A hierarchical access control scheme based on Lagrange interpolation for mobile agents.
Int. J. Distributed Sens. Networks, 2018

2014
An electronic voting mechanism for fighting bribery and coercion.
J. Netw. Comput. Appl., 2014

2013
A Reliable RFID Mutual Authentication Scheme for Healthcare Environments.
J. Medical Syst., 2013

Maximal Similarity Embedding.
Neurocomputing, 2013

A Secure RFID Authentication Scheme for Medicine Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Detect Rare Events via MICE Algorithm with Optimal Threshold.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
A Reliable User Authentication and Key Agreement Scheme for Web-Based Hospital-Acquired Infection Surveillance Information System.
J. Medical Syst., 2012

A Secure Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012

Redactable Signatures for Signed CDA Documents.
J. Medical Syst., 2012

A Password-Based User Authentication Scheme for the Integrated EPR Information System.
J. Medical Syst., 2012

A Secure Integrated Medical Information System.
J. Medical Syst., 2012

Casting Ballots over Internet Connection Against Bribery and Coercion.
Comput. J., 2012

A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2009
Approach to designing bribery-free and coercion-free electronic voting scheme.
J. Syst. Softw., 2009

Ring signature scheme for ECC-based anonymous signcryption.
Comput. Stand. Interfaces, 2009

2008
Unconditionally secure cryptosystems based on quantum cryptography.
Inf. Sci., 2008

2006
Unconditionally Secure Cryptosystem Based on Quantum Cryptography.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...