King Hang Wang, Kevin
King Hang Wang, Kevin
Bestätigte E-Mail-Adresse bei comp.hkbu.edu.hk
Titel
Zitiert von
Zitiert von
Jahr
On the security of Chien's ultralightweight RFID authentication protocol
HM Sun, WC Ting, KH Wang
IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009
1562009
A secure authentication protocol for internet of vehicles
CM Chen, B Xiang, Y Liu, KH Wang
Ieee Access 7, 12047-12057, 2019
1302019
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ...
IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010
1122010
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019
892019
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
852019
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74 (1), 65-70, 2018
772018
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
582009
A secure authentication scheme for Internet of Things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
452017
A review of contemporary e-voting: Requirements, technology, systems and usability
KH Wang, SK Mondal, K Chan, X Xie
Data Science and Pattern Recognition 1 (1), 31-47, 2017
432017
A scalable transitive human-verifiable authentication protocol for mobile devices
CM Chen, KH Wang, TY Wu, JS Pan, HM Sun
IEEE Transactions on Information Forensics and Security 8 (8), 1318-1330, 2013
392013
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”
CM Chen, W Fang, KH Wang, TY Wu
Nonlinear Dynamics 87 (3), 2073-2075, 2017
282017
A native APIs protection mechanism in the kernel mode against malicious code
HM Sun, H Wang, KH Wang, CM Chen
IEEE Transactions on Computers 60 (6), 813-823, 2011
252011
An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks
CM Chen, B Xiang, TY Wu, KH Wang
Applied Sciences 8 (7), 1074, 2018
242018
On the security of the secure arithmetic code
HM Sun, KH Wang, WC Ting
IEEE transactions on information forensics and security 4 (4), 781-789, 2009
212009
A secure authenticated and key exchange scheme for fog computing
CM Chen, Y Huang, KH Wang, S Kumari, ME Wu
Enterprise Information Systems, 1-16, 2020
202020
On the security of a three-party authenticated key agreement protocol based on chaotic maps
CM Chen, KH Wang, TY Wu, EK Wang
Data Science and Pattern Recognition 1 (2), 1-10, 2017
202017
On the security of an efficient time-bound hierarchical key management scheme
HM Sun, KH Wang, CM Chen
IEEE transactions on dependable and secure computing 6 (2), 159-160, 2009
202009
Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments
TY Wu, CM Chen, KH Wang, JMT Wu
IEEE Access 7, 49232-49239, 2019
172019
CRFID: An RFID system with a cloud database as a back-end server
SM Chen, ME Wu, HM Sun, KH Wang
Future Generation Computer Systems 30, 155-161, 2014
152014
A LSB substitution compatible steganography
HM Sun, KH Wang, CC Liang, YS Kao
TENCON 2007-2007 IEEE Region 10 Conference, 1-3, 2007
152007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20