Search

Your search keyword '"Chien-Lung Hsu"' showing total 33 results

Search Constraints

Start Over You searched for: Author "Chien-Lung Hsu" Remove constraint Author: "Chien-Lung Hsu" Language english Remove constraint Language: english
33 results on '"Chien-Lung Hsu"'

Search Results

1. Developing the 'Healthcare CEO App' for patients with type 1 diabetes transitioning from adolescence to young adulthood: A mixed‐methods study

2. A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems

3. An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments

4. Privacy Concerns and Information Sharing: The Perspective of the U-Shaped Curve

5. A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks

6. Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems

7. A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems

8. FAIDM for Medical Privacy Protection in 5G Telemedicine Systems

9. An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things

10. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks

11. Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model

13. Research on a community-based platform for promoting health and physical fitness in the elderly community.

14. ID-Based Deniable Authentication Protocol with Key Agreement and Time-Bound Properties for 6G-Based WBAN Healthcare Environments

15. Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems

16. FAIDM for Medical Privacy Protection in 5G Telemedicine Systems

17. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks

19. Electronic Commerce Research Profiles: Comparing E-Commerce and Information Systems Journals.

24. Universal Forgery Attack on a Strong Designated Verifier Signature Scheme.

25. An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network.

26. ACCEPTANCE OF INFORMATION TECHNOLOGY AND THE INTERNET BY PEOPLE AGED OVER FIFTY IN TAIWAN.

27. PREDICTORS OF FUTURE USE OF TELEHOMECARE HEALTH SERVICES BY MIDDLE-AGED PEOPLE IN TAIWAN.

28. EFFECT OF COMMITMENT AND TRUST TOWARDS MICRO-BLOGS ON CONSUMER BEHAVIORAL INTENTION: A RELATIONSHIP MARKETING PERSPECTIVE.

30. Cryptanalysis and Enhancement of Two-pass Authenticated Key Agreement with Key Confirmation Protocols.

31. Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme.

33. Security of Two Remote User Authentication Schemes Using Smart Cards.

Catalog

Books, media, physical & digital resources