224 results on '"Yeh, Kuo-Hui"'
Search Results
2. Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system
3. Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT
4. A Novel Fast Recovery Method for HT Tamper in Embedded Processor
5. A task-oriented neural dialogue system capable of knowledge accessing
6. A cycle-level recovery method for embedded processor against HT tamper
7. A Novel Fast Recovery Method for HT Tamper in Embedded Processor
8. Towards a Dynamic Reputation Management Scheme for Cross-Chain Transactions
9. Designing a Mobile Payment-Driven Mobility-as-a-Service Architecture for Bus Transportation
10. A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2
11. MiniNet: Dense squeeze with depthwise separable convolutions for image classification in resource-constrained autonomous systems
12. TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications.
13. Efficient access control with traceability and user revocation in IoT
14. Emerging Authentication Technologies for Zero Trust on the Internet of Things.
15. A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things
16. bleRPC: A plug-and-play RPC framework over BLE
17. A NFC-Based Authentication Scheme for Personalized IPTV Services
18. Seeing Is Believing: Authenticating Users with What They See and Remember
19. Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System
20. Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
21. Editorial: Sustainable and intelligent plant health management in Asia (2022)
22. Trusting Computing as a Service for Blockchain Applications
23. A Trusted Reputation Management Scheme for Cross-Chain Transactions
24. A robust NFC-based personalized IPTV service system
25. Special Issue Editorial “Blockchain-Enabled Technology for IoT Security, Privacy and Trust”
26. Special Issue Editorial “Deep Learning Technologies for Mobile Networks: A Themed Issue in Honor of Prof. Han-Chieh Chao”
27. Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT
28. Towards Intelligent Attack Detection Using DNA Computing
29. A Trusted Reputation Management Scheme for Cross-Chain Transactions
30. Trusting Computing as a Service for Blockchain Applications
31. Special issue on security and privacy of blockchain technologies
32. Seeing Is Believing: Authenticating Users with What They See and Remember
33. Towards Intelligent Attack Detection Using DNA Computing
34. Revocable and Unbounded Attribute-based Encryption Scheme with Adaptive Security for Integrating Digital Twins in Internet of Things
35. Detecting Adversarial Examples of Fake News via the Neurons Activation State
36. Enhancing OAuth With Blockchain Technologies for Data Portability
37. A Secure Interoperability Management Scheme for Cross-Blockchain Transactions
38. End-to-End Task-oriented Dialogue System Using Knowledge Filter and Attention Memory Pointer
39. Integrating FIDO Authentication with New Digital Identity in Taiwan
40. A NFC-Based Authentication Scheme for Personalized IPTV Services
41. An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System
42. Novel RFID Authentication Schemes for Security Enhancement and System Efficiency
43. Robust IoT-based nursing-care support system with smart bio-objects
44. Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection
45. A Secure IoT and Cloud Computing-Enabled e-Health Management System
46. An efficient certificateless signature scheme without bilinear pairings
47. A lightweight authentication scheme with user untraceability
48. On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT
49. A Provably Secure Multi-server Based Authentication Scheme
50. Security, Trust and Privacy for Cloud, Fog and Internet of Things
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.