default search action
Tsu-Yang Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j74]Shu-Chuan Chu, Xu Yuan, Jeng-Shyang Pan, Tsu-Yang Wu, Fengting Yan:
An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection. Wirel. Networks 30(4): 2675-2696 (2024) - 2023
- [j73]Pooja Tyagi, Saru Kumari, Mridul Kumar Gupta, Chien-Ming Chen, Tsu-Yang Wu, Sachin Kumar:
A secure protocol for patient monitoring in wireless body area networks. Concurr. Comput. Pract. Exp. 35(10) (2023) - [j72]Tsu-Yang Wu, Fangfang Kong, Qian Meng, Saru Kumari, Chien-Ming Chen:
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture. EURASIP J. Wirel. Commun. Netw. 2023(1): 36 (2023) - [j71]Chien-Ming Chen, Qingkai Miao, Sachin Kumar, Tsu-Yang Wu:
Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - 2022
- [j70]Pei-Cheng Song, Shu-Chuan Chu, Jeng-Shyang Pan, Tsu-Yang Wu:
An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 39(1/2): 1-19 (2022) - [j69]Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen, Yu-Xi Hu, Tsu-Yang Wu:
Simple multi-scale human abnormal behaviour detection based on video. Int. J. Inf. Comput. Secur. 17(3/4): 310-320 (2022) - [j68]Jianqing Gao, Haiyang Zou, Fuquan Zhang, Tsu-Yang Wu:
An intelligent stage light-based actor identification and positioning system. Int. J. Inf. Comput. Secur. 18(1/2): 204-218 (2022) - [j67]Yingran Ma, Yanjun Peng, Tsu-Yang Wu:
Transfer learning model for false positive reduction in lymph node detection via sparse coding and deep learning. J. Intell. Fuzzy Syst. 43(2): 2121-2133 (2022) - [j66]Naidan Feng, Tsu-Yang Wu, Yongquan Liang:
A deep dynamic neural network model and its application for ECG classification. J. Intell. Fuzzy Syst. 43(2): 2147-2154 (2022) - [j65]Tsu-Yang Wu, Qian Meng, Saru Kumari, Peng Zhang:
Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments. Sensors 22(10): 3858 (2022) - [j64]Tsu-Yang Wu, Fangfang Kong, Liyang Wang, Yeh-Cheng Chen, Saru Kumari, Jeng-Shyang Pan:
Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm. Sensors 22(23): 9174 (2022) - [j63]Tsu-Yang Wu, Xinglan Guo, Yeh-Cheng Chen, Saru Kumari, Chien-Ming Chen:
SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing. Symmetry 14(7): 1393 (2022) - [j62]Tsu-Yang Wu, Qian Meng, Lei Yang, Xinglan Guo, Saru Kumari:
A provably secure lightweight authentication protocol in mobile edge computing environments. J. Supercomput. 78(12): 13893-13914 (2022) - 2021
- [j61]Tsu-Yang Wu, Xinglan Guo, Lei Yang, Qian Meng, Chien-Ming Chen:
A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles. Mob. Inf. Syst. 2021: 3277113:1-3277113:14 (2021) - [j60]Tsu-Yang Wu, Lei Yang, Jia-Ning Luo, Jimmy Ming-Tai Wu:
A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments. Secur. Commun. Networks 2021: 2299632:1-2299632:15 (2021) - [j59]Tsu-Yang Wu, Lei Yang, Zhiyuan Lee, Chien-Ming Chen, Jeng-Shyang Pan, SK Hafizul Islam:
Improved ECC-Based Three-Factor Multiserver Authentication Scheme. Secur. Commun. Networks 2021: 6627956:1-6627956:14 (2021) - [j58]Tsu-Yang Wu, Tao Wang, Yu-Qi Lee, Weimin Zheng, Saru Kumari, Sachin Kumar:
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System. Secur. Commun. Networks 2021: 6658041:1-6658041:16 (2021) - [j57]Tsu-Yang Wu, Zhiyuan Lee, Lei Yang, Chien-Ming Chen:
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks. Secur. Commun. Networks 2021: 9944460:1-9944460:17 (2021) - [j56]Tsu-Yang Wu, Zhiyuan Lee, Lei Yang, Jia-Ning Luo, Raylin Tso:
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J. Supercomput. 77(7): 6992-7020 (2021) - [j55]Tsu-Yang Wu, Lei Yang, Zhiyuan Lee, Shu-Chuan Chu, Saru Kumari, Sachin Kumar:
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2021: 5537018:1-5537018:15 (2021) - 2020
- [j54]Tsu-Yang Wu, Zhiyuan Lee, Mohammad S. Obaidat, Saru Kumari, Sachin Kumar, Chien-Ming Chen:
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks. IEEE Access 8: 28096-28108 (2020) - [j53]Fuquan Zhang, Tsu-Yang Wu, Yiou Wang, Rui Xiong, Gangyi Ding, Peng Mei, Laiyang Liu:
Application of Quantum Genetic Optimization of LVQ Neural Network in Smart City Traffic Network Prediction. IEEE Access 8: 104555-104564 (2020) - [j52]Raylin Tso, Kaibin Huang, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Tsu-Yang Wu:
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing. IEEE Access 8: 152551-152564 (2020) - [j51]Jianneng Chen, Zhen-Jie Huang, Yu-Ping Zhou, Fumin Zou, Chien-Ming Chen, Jimmy Ming-Tai Wu, Tsu-Yang Wu:
Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks. IET Networks 9(6): 290-297 (2020) - [j50]Tsu-Yang Wu, Jerry Chun-Wei Lin, Unil Yun, Chun-Hao Chen, Gautam Srivastava, Xianbiao Lv:
An efficient algorithm for fuzzy frequent itemset mining. J. Intell. Fuzzy Syst. 38(5): 5787-5797 (2020) - [c42]Zhaoshan Sun, Jeng-Shyang Pan, Chi-Hua Chen, Tsu-Yang Wu:
A Probability-Based Analytical Model Based on Deep Learning for Traffic Information Estimation. ICCE-TW 2020: 1-2 - [c41]Yan Wang, Jeng-Shyang Pan, Chi-Hua Chen, Tsu-Yang Wu:
Data Filtering Method for the Optimization of Mobile Positioning Based on Deep Learning. ICCE-TW 2020: 1-2
2010 – 2019
- 2019
- [j49]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu:
Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments. IEEE Access 7: 49232-49239 (2019) - [j48]Eric Ke Wang, Xun Zhang, Fan Wang, Tsu-Yang Wu, Chien-Ming Chen:
Multilayer Dense Attention Model for Image Caption. IEEE Access 7: 66358-66368 (2019) - [j47]Lanlan Kang, Ruey-Shun Chen, Yeh-Cheng Chen, Chung-Chei Wang, Xingguan Li, Tsu-Yang Wu:
Using Cache Optimization Method to Reduce Network Traffic in Communication Systems Based on Cloud Computing. IEEE Access 7: 124397-124409 (2019) - [j46]Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Chin-Feng Lai, Naixue Xiong, Jimmy Ming-Tai Wu:
A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems. IEEE Access 7: 181434-181443 (2019) - [j45]Fuquan Zhang, Tsu-Yang Wu, Guangyuan Zheng:
Video salient region detection model based on wavelet transform and feature comparison. EURASIP J. Image Video Process. 2019: 58 (2019) - [j44]Fuquan Zhang, Tsu-Yang Wu, Jeng-Shyang Pan, Gangyi Ding, Zuoyong Li:
Human motion recognition based on SVM in VR art media interaction environment. Hum. centric Comput. Inf. Sci. 9: 40 (2019) - [j43]Chien-Ming Chen, King-Hang Wang, Kuo-Hui Yeh, Bin Xiang, Tsu-Yang Wu:
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J. Ambient Intell. Humaniz. Comput. 10(8): 3133-3142 (2019) - [j42]Trong-The Nguyen, Jeng-Shyang Pan, Tsu-Yang Wu, Thi-Kien Dao, Trinh-Dong Nguyen:
Node Coverage Optimization Strategy Based on Ions Motion Optimization. J. Netw. Intell. 4(1): 1-9 (2019) - [j41]Shun-Miao Zhang, Xin Su, Xin-hua Jiang, Ming-long Chen, Tsu-Yang Wu:
A Traffic Prediction Method of Bicycle-sharing based on Long and Short term Memory Network. J. Netw. Intell. 4(2): 17-29 (2019) - [c40]Tsu-Yang Wu, Zhiyuan Lee, Yanyu Huang, Chien-Ming Chen, Yeh-Cheng Chen:
Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing. ICCE-TW 2019: 1-2 - [c39]Xiao-Cong Liang, Tsu-Yang Wu, Yu-Qi Lee, Tao Wang, Chien-Ming Chen, Yeh-Cheng Chen:
Cryptanalysis of an Anonymous Message Authentication Scheme for Smart Grid. ICGEC 2019: 455-461 - [c38]Lei Yang, Tsu-Yang Wu, Zhiyuan Lee, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Shu-Chuan Chu, Mu-En Wu:
Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks. ICGEC 2019: 462-467 - [c37]Zhiyuan Lee, Tsu-Yang Wu, Lei Yang, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Shu-Chuan Chu, Yeh-Cheng Chen:
A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks. ICGEC 2019: 468-473 - 2018
- [j40]Chun-Ta Li, Tsu-Yang Wu, Chien-Ming Chen:
A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps. IEEE Access 6: 66742-66753 (2018) - [j39]Tsu-Yang Wu, Chao Meng, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan:
Comments on Recent Proposed Cui Et Al.'s KASE and Lu Et Al.'s dIBEKS Schemes. J. Inf. Hiding Multim. Signal Process. 9(1): 162-169 (2018) - [j38]Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Jeng-Shyang Pan, Chien-Ming Chen, Jimmy Ming-Tai Wu:
Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map. J. Inf. Hiding Multim. Signal Process. 9(4): 1050-1057 (2018) - [j37]Jianneng Chen, Fumin Zou, Tsu-Yang Wu, Yu-Ping Zhou:
A New Certificate-Based Aggregate Signature Scheme for Wireless Sensor Networks. J. Inf. Hiding Multim. Signal Process. 9(5): 1264-1280 (2018) - [j36]Chien-Ming Chen, Guangjie Wang, Weicheng Fang, Tsu-Yang Wu:
A New Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. J. Inf. Hiding Multim. Signal Process. 9(6): 1595-1602 (2018) - [j35]Chien-Ming Chen, Weicheng Fang, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, King-Hang Wang:
Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol. J. Inf. Sci. Eng. 34(2): 371-390 (2018) - [j34]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Weimin Zheng, Shu-Chuan Chu, John F. Roddick:
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review. J. Netw. Intell. 3(1): 16-25 (2018) - [j33]King-Hang Wang, Chien-Ming Chen, Weicheng Fang, Tsu-Yang Wu:
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J. Supercomput. 74(1): 65-70 (2018) - [c36]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, Jeng-Shyang Pan:
A Public Auditing Scheme with Data Recovery. ICGEC 2018: 595-602 - [c35]Jimmy Ming-Tai Wu, Meng-Hsiun Tsai, Sheng-Han Xiao, Tsu-Yang Wu:
Construct Left Ventricular Hypertrophy Prediction Model Based on Random Forest. IIH-MSP (1) 2018: 142-150 - [c34]Chien-Ming Chen, Yanyu Huang, Xiaoting Deng, Tsu-Yang Wu:
On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor. IIH-MSP (1) 2018: 171-177 - [c33]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, Jeng-Shyang Pan:
Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme. IIH-MSP (1) 2018: 178-183 - 2017
- [j32]Chien-Ming Chen, Chun-Ta Li, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan:
A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System. IEEE Access 5: 3410-3422 (2017) - [j31]Tsu-Yang Wu, Yuh-Min Tseng, Sen-Shan Huang, Yi-Chen Lai:
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems. IEEE Access 5: 19333-19341 (2017) - [j30]Hong Ma, Tsu-Yang Wu, Min Chen, Rong-Hua Yang, Jeng-Shyang Pan:
A Parse Tree-Based NoSQL Injection Attacks Detection Mechanism. J. Inf. Hiding Multim. Signal Process. 8(4): 916-928 (2017) - [j29]King-Hang Wang, Chien-Ming Chen, Weicheng Fang, Tsu-Yang Wu:
A secure authentication scheme for Internet of Things. Pervasive Mob. Comput. 42: 15-26 (2017) - [j28]Chun-Ta Li, Tsu-Yang Wu, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen:
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors 17(7): 1482 (2017) - [j27]Tsu-Yang Wu, Chien-Ming Chen, Xiuyang Sun, Shuai Liu, Jerry Chun-Wei Lin:
A Countermeasure to SQL Injection Attack for Cloud Environment. Wirel. Pers. Commun. 96(4): 5279-5293 (2017) - [c32]Tsu-Yang Wu, Yueshan Lin, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan:
Comments on Yu et al's Shared Data Integrity Verification Protocol. ECC 2017: 73-78 - [c31]Tsu-Yang Wu, Weicheng Fang, Chien-Ming Chen, Eric Ke Wang:
Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards. ECC 2017: 79-87 - [c30]Tsu-Yang Wu, Jerry Chun-Wei Lin, Yuyu Zhang:
Mining of Multiple Fuzzy Frequent Itemsets with Transaction Insertion. ECC 2017: 137-144 - [c29]Tsu-Yang Wu, Jerry Chun-Wei Lin, Yinan Shao, Philippe Fournier-Viger, Tzung-Pei Hong:
Updating the Discovered High Average-Utility Patterns with Transaction Insertion. ICGEC 2017: 66-73 - [c28]Tsu-Yang Wu, Bin Xiang, Guangjie Wang, Chien-Ming Chen, Eric Ke Wang:
Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. ICGEC 2017: 191-198 - [c27]Tsu-Yang Wu, Chao Meng, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan:
Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme. ICGEC 2017: 199-205 - [c26]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen:
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System". ICISA 2017: 282-289 - [c25]Tsu-Yang Wu, Chao Meng, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan:
On the Security of a Certificateless Public Key Encryption with Keyword Search. IIH-MSP (1) 2017: 191-197 - [c24]Tsu-Yang Wu, Jerry Chun-Wei Lin, Shifeng Ren:
Efficient Mining of High Average-Utility Itemsets with Multiple Thresholds. IIH-MSP (1) 2017: 198-205 - [c23]Tsu-Yang Wu, Weicheng Fang, Chien-Ming Chen, Guangjie Wang:
Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks. IIH-MSP (1) 2017: 206-213 - [c22]Tsu-Yang Wu, Yueshan Lin, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan, Mu-En Wu:
Comments on a privacy preserving public auditing mechanism for shared cloud data. MISNC 2017: 48:1-48:6 - 2016
- [j26]Jerry Chun-Wei Lin, Tsu-Yang Wu, Philippe Fournier-Viger, Guo Lin, Justin Zhan, Miroslav Voznák:
Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining. Eng. Appl. Artif. Intell. 55: 269-284 (2016) - [j25]Yu Chen, Chien-Ming Chen, Jeng-Shyang Pan, Tsu-Yang Wu, Shuai Liu:
Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps. J. Inf. Hiding Multim. Signal Process. 7(6): 1365-1372 (2016) - [j24]Chien-Ming Chen, Linlin Xu, Tsu-Yang Wu, Ci-Rong Li:
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol. J. Netw. Intell. 1(2): 61-66 (2016) - [c21]Jerry Chun-Wei Lin, Xianbiao Lv, Philippe Fournier-Viger, Tsu-Yang Wu, Tzung-Pei Hong:
Efficient Mining of Fuzzy Frequent Itemsets with Type-2 Membership Functions. ACIIDS (2) 2016: 191-200 - [c20]Chien-Ming Chen, Xiaojie Zhang, Tsu-Yang Wu:
A Secure Condition-Based Location Authentication Protocol for Mobile Devices. CMCSN 2016: 146-149 - [c19]Tsu-Yang Wu, Fanya Meng, Chien-Ming Chen, Shuai Liu, Jeng-Shyang Pan:
On the Security of a Certificateless Searchable Public Key Encryption Scheme. ICGEC 2016: 113-119 - 2015
- [j23]Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang:
A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321: 224-237 (2015) - [j22]Eric Ke Wang, Zhenjie Cao, Tsu-Yang Wu, Chien-Ming Chen:
MAPMP: A Mutual Authentication Protocol for Mobile Payment. J. Inf. Hiding Multim. Signal Process. 6(4): 697-707 (2015) - [j21]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks. J. Univers. Comput. Sci. 21(3): 406-418 (2015) - [c18]Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang:
An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme. ICGEC (2) 2015: 3-9 - [c17]Jerry Chun-Wei Lin, Tsu-Yang Wu, Philippe Fournier-Viger, Guo Lin, Tzung-Pei Hong, Jeng-Shyang Pan:
A Sanitization Approach of Privacy Preserving Utility Mining. ICGEC (2) 2015: 47-57 - [c16]Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang:
Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme. IIH-MSP 2015: 203-206 - [c15]Eric Ke Wang, Huan Liu, Gang Wang, Yuming Ye, Tsu-Yang Wu, Chien-Ming Chen:
Context recognition for adaptive hearing-aids. INDIN 2015: 1102-1107 - [c14]Eric Ke Wang, Chun-Wei Lin, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye:
Privacy Protection Framework in Social Networked Cars. MISNC 2015: 553-561 - [c13]Chien-Ming Chen, Linlin Xu, Xiaojie Zhang, Tsu-Yang Wu, Jeng-Shyang Pan:
On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps. RVSP 2015: 143-146 - 2014
- [j20]Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng:
Efficient searchable ID-based encryption with a designated server. Ann. des Télécommunications 69(7-8): 391-402 (2014) - [j19]Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu:
RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE. Informatica 25(2): 299-326 (2014) - [c12]Tsu-Yang Wu, Chengxiang Zhou, Eric Ke Wang, Jeng-Shyang Pan, Chien-Ming Chen:
Towards Time-Bound Hierarchical Key Management in Cloud Computing. ECC (1) 2014: 31-38 - [c11]Xinying Zheng, Chien-Ming Chen, Tsu-Yang Wu, Eric Ke Wang, Tsui-Ping Chung:
Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID. ECC (1) 2014: 145-153 - [c10]Tsu-Yang Wu, Jeng-Shyang Pan, Chien-Ming Chen, Chun-Wei Lin:
Towards SQL Injection Attacks Detection Mechanism Using Parse Tree. ICGEC 2014: 371-380 - [c9]Eric Ke Wang, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye, Zhujin Zhang, Futai Zou:
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things. ICGEC 2014: 389-397 - [c8]Chun-Wei Lin, Tsu-Yang Wu, Guo Lin, Tzung-Pei Hong:
Maintenance algorithm for updating the discovered multiple fuzzy frequent itemsets for transaction deletion. ICMLC 2014: 475-480 - [c7]Tsu-Yang Wu, Chengxiang Zhou, Chien-Ming Chen, Eric Ke Wang, Jeng-Shyang Pan:
Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control. MISNC 2014: 437-444 - [c6]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu:
Security Analysis and Improvement of Femtocell Access Control. NSS 2014: 223-232 - 2013
- [j18]Tsu-Yang Wu, Yuh-Min Tseng:
Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Inf. Secur. 7(3): 239-246 (2013) - [j17]Yuh-Min Tseng, Tung-Tso Tsai, Tsu-Yang Wu:
Efficient Revocable Multi-Receiver ID-Based Encryption. Inf. Technol. Control. 42(2): 159-169 (2013) - [j16]Tsu-Yang Wu, Yuh-Min Tseng:
Further analysis of pairing-based traitor tracing schemes for broadcast encryption. Secur. Commun. Networks 6(1): 28-32 (2013) - [j15]Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu:
Provably secure revocable ID-based signature in the standard model. Secur. Commun. Networks 6(10): 1250-1260 (2013) - [j14]Chien-Ming Chen, King-Hang Wang, Tsu-Yang Wu, Jeng-Shyang Pan, Hung-Min Sun:
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices. IEEE Trans. Inf. Forensics Secur. 8(8): 1318-1330 (2013) - [c5]Wei Kan, Tsu-Yang Wu, Tao Han, Chun-Wei Lin, Chien-Ming Chen, Jeng-Shyang Pan:
An Efficient Detecting Mechanism for Cross-Site Script Attacks in the Cloud. EMC/HumanCom 2013: 663-672 - 2012
- [j13]Tsu-Yang Wu, Yuh-Min Tseng, Tung-Tso Tsai:
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants. Comput. Networks 56(12): 2994-3006 (2012) - [j12]Tsu-Yang Wu, Yuh-Min Tseng:
Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants. Informatica 23(2): 315-334 (2012) - [j11]Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu:
A Fully Secure Revocable ID-Based Encryption in the Standard Model. Informatica 23(3): 487-505 (2012) - [j10]Yuh-Min Tseng, Chen-Hung Yu, Tsu-Yang Wu:
Towards scalable key management for secure multicast communication. Inf. Technol. Control. 41(2): 173-182 (2012) - [j9]Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng:
A Revocable ID-based Signcryption Scheme. J. Inf. Hiding Multim. Signal Process. 3(3): 240-251 (2012) - [c4]Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng:
Revocable ID-based Signature Scheme with Batch Verifications. IIH-MSP 2012: 49-54 - 2011
- [j8]Tsu-Yang Wu, Yuh-Min Tseng, Ching-Wen Yu:
Two-round contributory group key exchange protocol for wireless network environments. EURASIP J. Wirel. Commun. Netw. 2011: 12 (2011) - [j7]Tsu-Yang Wu, Yuh-Min Tseng, Ching-Wen Yu:
A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks. J. Inf. Sci. Eng. 27(3): 915-932 (2011) - [j6]Tsu-Yang Wu, Yuh-Min Tseng:
A pairing-based publicly verifiable secret sharing scheme. J. Syst. Sci. Complex. 24(1): 186-194 (2011) - 2010
- [j5]Tsu-Yang Wu, Yuh-Min Tseng:
An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices. Comput. J. 53(7): 1062-1070 (2010) - [j4]Tsu-Yang Wu, Yuh-Min Tseng:
An efficient user authentication and key exchange protocol for mobile client-server environment. Comput. Networks 54(9): 1520-1530 (2010) - [j3]Yuh-Min Tseng, Tsu-Yang Wu:
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique. Informatica 21(2): 247-258 (2010) - [c3]Yuh-Min Tseng, Tsu-Yang Wu:
A Novel Convinced Diffie-Hellman Computation Scheme and Its Cryptographic Application. ICCSA (4) 2010: 225-235
2000 – 2009
- 2009
- [j2]Tsu-Yang Wu, Yuh-Min Tseng:
Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2638-2640 (2009) - [c2]Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu:
Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. ARES 2009: 935-940 - 2008
- [j1]Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu:
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards. Informatica 19(2): 285-302 (2008) - 2007
- [c1]Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu:
A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. COMPSAC (2) 2007: 700-710
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint