default search action
Tzer-Shyong Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j54]Yin-Tzu Huang, Tzer-Shyong Chen, Sheng-De Wang:
Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment. IEEE Access 11: 46871-46881 (2023) - 2022
- [j53]Yin-Tzu Huang, Dai-Lun Chiang, Tzer-Shyong Chen, Sheng-De Wang, Feipei Lai, Yu-Da Lin:
Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records. Knowl. Based Syst. 236: 107679 (2022) - 2021
- [j52]Chiung-Wen Hsu, Yu-Lin Chang, Tzer-Shyong Chen, Te-Yi Chang, Yu-Da Lin:
Who Donates on Line? Segmentation Analysis and Marketing Strategies Based on Machine Learning for Online Charitable Donations in Taiwan. IEEE Access 9: 52728-52740 (2021) - [j51]Chih-Wei Chung, Tzu-Hung Hsiao, Chih-Jen Huang, Yen-Ju Chen, Hsin-Hua Chen, Ching-Heng Lin, Seng-Cho Chou, Tzer-Shyong Chen, Yu-Fang Chung, Hwai-I Yang, Yi-Ming Chen:
Machine learning approaches for the genomic prediction of rheumatoid arthritis and systemic lupus erythematosus. BioData Min. 14(1) (2021) - 2020
- [j50]Dai-Lun Chiang, Yin-Tzu Huang, Tzer-Shyong Chen, Feipei Lai:
Applying time-constraint access control of personal health record in cloud computing. Enterp. Inf. Syst. 14(2): 266-281 (2020) - [j49]Meng-Tse Lee, Fong-Ci Lin, Szu-Ta Chen, Wan-Ting Hsu, Samuel Lin, Tzer-Shyong Chen, Feipei Lai, Chien-Chang Lee:
Web-Based Dashboard for the Interactive Visualization and Analysis of National Risk-Standardized Mortality Rates of Sepsis in the US. J. Medical Syst. 44(2): 54 (2020) - [j48]Kuang-Yen Tai, Dai-Lun Chiang, Tzer-Shyong Chen, Victor R. L. Shen, Feipei Lai, Frank Yeong-Sung Lin:
Smart Fall Prediction for Elderly Care Using iPhone and Apple Watch. Wirel. Pers. Commun. 114(1): 347-365 (2020) - [c25]Minqi Guo, Hsuan-Yu Chen, Tsung-Chih Hsiao, Zhen-Yu Wu, Huan-Chieh Tseng, Yu-Tzu Chang, Tzer-Shyong Chen:
VR and AR Technology on Cultural Communication. 6GN 2020: 469-474 - [c24]Kuang-Yen Tai, Tzer-Shyong Chen, Frank Yeong-Sung Lin, Po-Min Huang, Jing-Chen Tu:
Dynamic Hierarchical Security Access Control with Time-Limited Method in Electronic Medical Record. AINA 2020: 1251-1264 - [c23]Nan-Kai Hsieh, Tsan-Ching Kang, Tzer-Long Chen, Jhih-Chung Chang, Min Chien Wang, Tzer-Shyong Chen, Yu-Fang Chung:
The Implementation of IoT-based Smart Laboratory Management System. ICEA 2020: 1:1-1:3 - [c22]I Fang Chang, Ya-Hsueh Chuang, Tzer-Long Chen, Yi Ping Yin, Yen Ni Liu, Tzer-Shyong Chen:
A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus. ICEA 2020: 3:1-3:2
2010 – 2019
- 2019
- [j47]Tsung-Chih Hsiao, Yu-Min Huang, Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen:
Efficient Hierarchical Key Management Scheme for VR/AR Database Systems. Int. J. Netw. Secur. 21(4): 551-555 (2019) - [j46]Bing-Jian Wang, Tzer-Shyong Chen, Fuh-Gwo Jeng, Tzung-Her Chen:
On the security of threshold random grid-based visual secret sharing. Multim. Tools Appl. 78(8): 10157-10180 (2019) - [c21]Kuang-Yen Tai, Dai-Lun Chiang, Chun-Yen Chuang, Tzer-Shyong Chen, Frank Yeong-Sung Lin:
Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System. BWCCA 2019: 327-337 - 2018
- [j45]Shyh-Wei Chen, Dai-Lun Chiang, Tzer-Shyong Chen, Han-Yu Lin, Yu-Fang Chung, Feipei Lai:
An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples. IEEE Access 6: 71651-71661 (2018) - [j44]Tsung-Chih Hsiao, Zhen Yu Wu, Tzer-Long Chen, Yu-Fang Chung, Tzer-Shyong Chen:
A hierarchical access control scheme based on Lagrange interpolation for mobile agents. Int. J. Distributed Sens. Networks 14(7) (2018) - [j43]Rong-Kuan Shen, Cheng-Ying Yang, Victor R. L. Shen, Wei-Chen Li, Tzer-Shyong Chen:
A Stock Market Prediction System Based on High-Level Fuzzy Petri Nets. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 26(5): 771-808 (2018) - [c20]Kuang-Yen Tai, Shun-Li Yen, Tzer-Shyong Chen, Yu-Hsuan Tseng:
An Implementation of Interactive RFID Positioning Healthcare System on Mobile Platform. BWCCA 2018: 350-360 - 2016
- [j42]Yu-Ting Liao, Tzer-Shyong Chen, Tzer-Long Chen, Yu-Fang Chung, Yu-Xin Chen, Jen-Hung Hwang, Huihui Wang, Wei Wei:
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information. J. Medical Syst. 40(5): 119:1-119:7 (2016) - [j41]Shyh-Wei Chen, Dai-Lun Chiang, Chia-Hui Liu, Tzer-Shyong Chen, Feipei Lai, Huihui Wang, Wei Wei:
Confidentiality Protection of Digital Health Records in Cloud Computing. J. Medical Syst. 40(5): 124:1-124:12 (2016) - [j40]Tzer-Shyong Chen, Tzer-Long Chen, Yu-Fang Chung, Yao-Min Huang, Tao-Chieh Chen, Huihui Wang, Wei Wei:
Implementation of Online Veterinary Hospital on Cloud Platform. J. Medical Syst. 40(6): 147:1-147:7 (2016) - [j39]Yu-Ting Liao, Tzer-Long Chen, Tzer-Shyong Chen, Zheng-Hong Zhong, Jen-Hung Hwang:
The Application of RFID to Healthcare Management of Nursing House. Wirel. Pers. Commun. 91(3): 1237-1257 (2016) - 2015
- [j38]Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen, Tzer-Shyong Chen:
Design of secure access control scheme for personal health record-based cloud healthcare service. Secur. Commun. Networks 8(7): 1332-1346 (2015) - 2014
- [j37]Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen, Dai-Lun Chiang, Yu-Ting Chen:
An Agent-Based Auction Protocol on Mobile Devices. J. Appl. Math. 2014: 314180:1-314180:11 (2014) - 2013
- [c19]Chia-Hui Liu, Fong-Qi Lin, Dai-Lun Chiang, Tzer-Long Chen, Chin-Sheng Chen, Han-Yu Lin, Yu-Fang Chung, Tzer-Shyong Chen:
Secure PHR Access Control Scheme for Healthcare Application Clouds. ICPP 2013: 1067-1076 - 2012
- [j36]Zhen Yu Wu, Yu-Fang Chung, Feipei Lai, Tzer-Shyong Chen:
A Password-Based User Authentication Scheme for the Integrated EPR Information System. J. Medical Syst. 36(2): 631-638 (2012) - [j35]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
Mobile Agent Application and Integration in Electronic Anamnesis System. J. Medical Syst. 36(3): 1009-1020 (2012) - [j34]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
The Enhancement of Security in Healthcare Information Systems. J. Medical Syst. 36(3): 1673-1688 (2012) - [j33]Chia-Hui Liu, Yu-Fang Chung, Te-Wei Chiang, Tzer-Shyong Chen, Sheng-De Wang:
A Mobile Agent Approach for Secure Integrated Medical Information Systems. J. Medical Syst. 36(5): 2731-2741 (2012) - [j32]Tsung-Chih Hsiao, Zhen Yu Wu, Yu-Fang Chung, Tzer-Shyong Chen, Gwoboa Horng:
A Secure Integrated Medical Information System. J. Medical Syst. 36(5): 3103-3113 (2012) - [j31]Tsung-Chih Hsiao, Yu-Ting Liao, Jen-Yan Huang, Tzer-Shyong Chen, Gwoboa Horng:
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks. J. Medical Syst. 36(6): 3649-3664 (2012) - [j30]Tzer-Shyong Chen, Chia-Hui Liu, Tzer-Long Chen, Chin-Sheng Chen, Jian-Guo Bau, Tzu-Ching Lin:
Secure Dynamic Access Control Scheme of PHR in Cloud Computing. J. Medical Syst. 36(6): 4005-4020 (2012) - [c18]Zhen Yu Wu, Dai-Lun Chiang, Tzu-Ching Lin, Yu-Fang Chung, Tzer-Shyong Chen:
A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network. AINA Workshops 2012: 25-28 - [c17]Tsung-Chih Hsiao, Yu-Ting Liao, Jen-Yan Huang, Tzer-Shyong Chen, Gwoboa Horng:
Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks. AINA Workshops 2012: 502-507 - 2011
- [j29]Yu-Fang Chung, Yu-Ting Chen, Tzer-Long Chen, Tzer-Shyong Chen:
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce. Expert Syst. Appl. 38(8): 9900-9907 (2011) - 2010
- [j28]Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen:
An ECC-Based Blind Signature Scheme. J. Networks 5(8): 921-928 (2010)
2000 – 2009
- 2009
- [j27]Kuo-Hsuan Huang, Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen:
Efficient migration for mobile computing in distributed networks. Comput. Stand. Interfaces 31(1): 40-47 (2009) - [j26]Victor R. L. Shen, Yu-Fang Chung, Tzer-Shyong Chen:
A novel application of grey system theory to information security (Part I). Comput. Stand. Interfaces 31(2): 277-281 (2009) - [j25]Yu-Fang Chung, Kuo-Hsuan Huang, Tzer-Shyong Chen:
Threshold authenticated encryption scheme using labor-division signature. Comput. Stand. Interfaces 31(2): 300-304 (2009) - [j24]Kuo-Hsuan Huang, Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen:
A conference key agreement protocol with fault-tolerant capability. Comput. Stand. Interfaces 31(2): 401-405 (2009) - [j23]Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen:
Ring signature scheme for ECC-based anonymous signcryption. Comput. Stand. Interfaces 31(4): 669-674 (2009) - [j22]Yu-Fang Chung, Tzer-Shyong Chen, Ming-Wei Lai:
Efficient migration access control for mobile agents. Comput. Stand. Interfaces 31(6): 1061-1068 (2009) - [c16]Yu-Fang Chung, Tzer-Shyong Chen, Yu-Ting Chen, Chiu-Chan Lee, Szu-Wen Wang:
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce. ICA3PP 2009: 214-225 - [c15]Yu-Fang Chung, Tzer-Shyong Chen, Chia-Chao Ho, Yi-Hsuan Yeh, Hsiu-Chia Ko:
Hierarchical Time-Bound Key Management for Mobile Agents. ICA3PP 2009: 242-253 - [c14]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent. MUE 2009: 189-196 - [c13]Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen:
A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. NCM 2009: 2044-2049 - 2008
- [j21]Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen:
Access control in user hierarchy based on elliptic curve cryptosystem. Inf. Sci. 178(1): 230-243 (2008) - [j20]Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen:
Unconditionally secure cryptosystems based on quantum cryptography. Inf. Sci. 178(8): 2044-2058 (2008) - [j19]Yu-Fang Chung, Kuo-Hsuan Huang, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen:
Bidder-anonymous English auction scheme with privacy and public verifiability. J. Syst. Softw. 81(1): 113-119 (2008) - [c12]Yu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang:
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. AINA Workshops 2008: 650-655 - 2007
- [j18]Yu-Fang Chung, Kuo-Hsuan Huang, Feipei Lai, Tzer-Shyong Chen:
ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Stand. Interfaces 29(6): 601-604 (2007) - [j17]Jyh-Horng Wen, Ming-Chang Wu, Tzer-Shyong Chen:
A Novel Elliptic Curve Dynamic Access Control System. IEICE Trans. Commun. 90-B(8): 1979-1987 (2007) - 2006
- [c11]Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen:
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. CIS 2006: 502-512 - [c10]Jen-Yi Pan, Tzer-Long Chen, Tzer-Shyong Chen:
A Novel Key Management and Access Control Scheme for Mobile Agent. ICIC (2) 2006: 334-345 - [c9]Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen:
Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem. JCIS 2006 - [c8]Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen:
Unconditionally Secure Cryptosystem Based on Quantum Cryptography. JCIS 2006 - [c7]Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu:
Hacking Tricks Toward Security on Network Environments. PDCAT 2006: 442-447 - [c6]Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen:
Threshold Signature Scheme Resistible for Conspiracy Attack. PDCAT 2006: 479-483 - 2005
- [j16]Tzer-Shyong Chen, Jen-Yan Huang:
A novel key management scheme for dynamic access control in a user hierarchy. Appl. Math. Comput. 162(1): 339-351 (2005) - [j15]Tzer-Shyong Chen:
A threshold signature scheme based on the elliptic curve cryptosystem. Appl. Math. Comput. 162(3): 1119-1134 (2005) - [j14]Tzer-Shyong Chen, Jen-Yan Huang, Tzer-Long Chen:
An efficient undeniable group-oriented signature scheme. Appl. Math. Comput. 165(1): 95-102 (2005) - [j13]Qiu-Liang Xu, Tzer-Shyong Chen:
An efficient threshold RSA digital signature scheme. Appl. Math. Comput. 166(1): 25-34 (2005) - [j12]Yuan-Lung Yu, Tzer-Shyong Chen:
An efficient threshold group signature scheme. Appl. Math. Comput. 167(1): 362-371 (2005) - [j11]Victor R. L. Shen, Tzer-Shyong Chen, Kai-Quan Shai:
A novel cryptosystem based on grey system theory and genetic algorithm. Appl. Math. Comput. 170(2): 1290-1302 (2005) - 2004
- [j10]Tzer-Shyong Chen, Yu-Fang Chung, Kuo-Hsuan Huang:
A traceable proxy multisignature scheme based on the elliptic curve cryptosystem. Appl. Math. Comput. 159(1): 137-145 (2004) - [j9]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme. Appl. Math. Comput. 159(1): 147-155 (2004) - [j8]Tzer-Shyong Chen:
An English auction scheme in the online transaction environment. Comput. Secur. 23(5): 389-399 (2004) - [j7]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
A practical authenticated encryption scheme based on the elliptic curve cryptosystem. Comput. Stand. Interfaces 26(5): 461-469 (2004) - [j6]Tzer-Shyong Chen:
A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem. Comput. Stand. Interfaces 27(1): 33-38 (2004) - [j5]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem. J. Comput. Sci. Technol. 19(4): 570-573 (2004) - [c5]Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian:
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. COMPSAC 2004: 396-397 - [c4]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. EEE 2004: 106-112 - [c3]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. EEE 2004: 569-572 - 2003
- [j4]Tzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang:
Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. Comput. Secur. 22(6): 527-534 (2003) - [j3]Tzer-Shyong Chen, Yu-Fang Chung:
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy. J. Comput. Sci. Technol. 18(2): 210-213 (2003) - 2002
- [j2]Victor R. L. Shen, Tzer-Shyong Chen:
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations. Comput. Secur. 21(2): 164-171 (2002) - [j1]Tzer-Shyong Chen, Yu-Fang Chung:
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. Comput. Secur. 21(6): 565-570 (2002) - 2000
- [c2]Qi Duan, Tzer-Shyong Chen, Kamal Djidjeli, W. G. Price, Edward H. Twizell:
A Method of Shape Control of Curve Design. GMP 2000: 184-189
1990 – 1999
- 1995
- [c1]Tzer-Shyong Chen, Feipei Lai, Rung-Ji Shang:
A Simple Tree Pattern Matching Algorithm for Code Generator. COMPSAC 1995: 162-167
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint