230 results on '"Chien-Lung Hsu"'
Search Results
2. A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems
3. An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments
4. Privacy Concerns and Information Sharing: The Perspective of the U-Shaped Curve
5. A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks
6. Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems
7. A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems
8. FAIDM for Medical Privacy Protection in 5G Telemedicine Systems
9. An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things
10. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks
11. Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model
12. Technological Empowerment for Aging Workforce in Elderly Care Programs: Service Model Design and Development of an Elderly Care Shared Service Platform.
13. Security, Privacy, and Applications in Mobile Healthcare
14. Research on a community-based platform for promoting health and physical fitness in the elderly community.
15. A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids.
16. A Time Bound Dynamic Group key Distribution Scheme with Anonymous Three-factor Identification for IoT-Based Multi-Server Environments.
17. Privacy-preserved conference key distribution protocol.
18. A dynamic identity end-to-end authentication key exchange protocol for IoT environments.
19. Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps.
20. Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks.
21. Privacy-Preserved Key Agreement with User Authentication.
22. A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography.
23. ID-Based Deniable Authentication Protocol with Key Agreement and Time-Bound Properties for 6G-Based WBAN Healthcare Environments
24. Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings.
25. Evaluating Digital Divide Based on Big Wireless Logs: A Case Study among Remote Tribes in Taiwan
26. A bibliometric study of SSME in information systems research.
27. Editorial: Electronic Commerce Research in seven maps.
28. RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model.
29. A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet.
30. User Acceptance of a Community-Based Healthcare Information System Preserving User Privacy.
31. Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map.
32. A digital evidence protection method with hierarchical access control mechanisms.
33. Security Analysis of an eSeal Used in Taiwan Customs Officials.
34. Design and Development a Social Networks Platform for Older People.
35. A Telehealthcare System to Care for Older People Suffering from Metabolic Syndrome.
36. Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations.
37. Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions.
38. Improving the effectiveness of experiential decisions by recommendation systems.
39. Universal forgery attack on a strong designated verifier signature scheme.
40. Improved migration for mobile computing in distributed networks.
41. Exploring the linkages between perceived information accessibility and microblog stickiness: The moderating role of a sense of community.
42. A Systematic Literature Review of Blockchain Technology: Security Properties, Applications and Challenges
43. Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics.
44. Developing the 'Healthcare CEO App' for patients with type 1 diabetes transitioning from adolescence to young adulthood: A mixed-methods study
45. Transparent authentication scheme with adaptive biometrie features for IoT networks.
46. The effect of community identity on continuance intention of microblogging.
47. The iFit: An Integrated Physical Fitness Testing System to Evaluate the Degree of Physical Fitness of the Elderly.
48. An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network.
49. Provably convertible multi-authenticated encryption scheme for generalized group communications.
50. A secure IRB system for assisting the development of intelligent medical devices.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.