default search action
Hung-Yu Chien
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Nian-Zu Wang, Hung-Yu Chien:
Design and Implementation of MQTT-Based Over-the-Air Updating Against Curious Brokers. IEEE Internet Things J. 11(6): 10768-10777 (2024) - [c37]Hung-Yu Chien, Kuang-Yu Chao:
Design and Evaluation of YOLOv7-Based License-Plate Recognition for Mobile Vehicles Using Notebook-Raspberry-PI. COMPSAC 2024: 1536-1537 - 2023
- [c36]Hung-Yu Chien:
POSTER: Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTT. ACNS Workshops 2023: 669-674 - 2022
- [c35]Hung-Yu Chien:
Design of End-To-End Security for MQTT 5.0. SciSec 2022: 353-363 - 2021
- [j54]Hung-Yu Chien:
Self-Healing Group Key Distribution Facilitating Source Authentication Using Block Codes. Secur. Commun. Networks 2021: 2942568:1-2942568:11 (2021) - [c34]Hung-Yu Chien:
Highly Efficient Anonymous IoT Authentication using Composite Hashing. DSC 2021: 1-7 - 2020
- [j53]Hung-Yu Chien, Yi-Jui Chen, Guo-Hao Qiu, Jian Fu Liao, Ruo-Wei Hung, Pei-Chih Lin, Xi-An Kou, Mao-Lun Chiang, Chunhua Su:
A MQTT-API-compatible IoT security-enhanced platform. Int. J. Sens. Networks 32(1): 54-68 (2020)
2010 – 2019
- 2019
- [c33]Hung-Yu Chien, Chunhua Su:
A Fault-Tolerant and Flexible Privacy-Preserving Multisubset Data Aggregation in Smart Grid. CSII (selected papers) 2019: 165-175 - [c32]Hung-Yu Chien, Xi-An Kou, Mao-Lun Chiang, Chunhua Su:
Secure and Efficient MQTT Group Communication Design. CSII (selected papers) 2019: 177-186 - [c31]Hung-Yu Chien, Guo-Hao Qiu, Ruo-Wei Hung, An-Tong Shih, Chunhua Su:
Hierarchical MQTT with Edge Computation. iCAST 2019: 1-5 - [c30]Hung-Yu Chien, An-Tong Shih, Yuh-Min Tseng:
Exploration of Fast Edible Oil Classification Using Infrared Spectrum, Machine Learning, and Chemometrics. iCAST 2019: 1-6 - 2018
- [j52]Hung-Yu Chien:
An effective approach to solving large communication overhead issue and strengthening the securities of AKA protocols. Int. J. Commun. Syst. 31(1) (2018) - [j51]Hung-Yu Chien:
Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios. IEEE Internet Things J. 5(3): 1890-1903 (2018) - [c29]Hung-Yu Chien:
Dynamic Public Key Certificates for IoT and WSN Scenarios. COMPSAC (2) 2018: 646-651 - [c28]Hung-Yu Chien, Yuh-Min Tseng, Ruo-Wei Hung:
Some Study of Applying Infra-Red in Agriculture IoT. iCAST 2018: 1-5 - [c27]Yuh-Min Tseng, Jui-Di Wu, Ruo-Wei Hung, Hung-Yu Chien:
Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments. iCAST 2018: 251-256 - 2017
- [j50]Hung-Yu Chien:
Efficient authentication scheme with tag-identity protection for EPC Class 2 Generation 2 version 2 standards. Int. J. Distributed Sens. Networks 13(3) (2017) - [j49]Hung-Yu Chien:
Group Authentication with Multiple Trials and Multiple Authentications. Secur. Commun. Networks 2017: 3109624:1-3109624:7 (2017) - [j48]Hung-Yu Chien:
Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking. Wirel. Pers. Commun. 94(4): 2925-2936 (2017) - [c26]Yi-Jui Chen, Hung-Yu Chien:
IoT-based green house system with splunk data analysis. iCAST 2017: 260-263 - [c25]Hung-Yu Chien, Jian-Fan Chen, Yu-Yu Chen, Pei-Syuan Lin, Yi-Ting Chang, Rong-Chung Chen:
An Ontology-Based Herb Therapy Recommendation for Respiration System. IIH-MSP (1) 2017: 74-81 - 2016
- [j47]Hung-Yu Chien:
A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients. Comput. J. 59(4): 592-601 (2016) - 2015
- [j46]Hung-Yu Chien, Tzong-Chen Wu, Chien-Lung Hsu:
RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model. IEICE Trans. Inf. Syst. 98-D(4): 750-759 (2015) - [j45]Chin-I Lee, Hung-Yu Chien:
An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System. Int. J. Distributed Sens. Networks 11: 642425:1-642425:7 (2015) - [j44]Hung-Yu Chien:
Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy. Mob. Inf. Syst. 2015: 354586:1-354586:7 (2015) - [c24]Hung-Yu Chien:
De-synchronization Attack on Quadratic Residues-Based RFID Ownership Transfer. AsiaJCIS 2015: 42-47 - 2014
- [j43]Hung-Yu Chien, Yingjiu Li, Nai-Wei Lo:
Innovative Applications and Security of Internet of Things. Int. J. Distributed Sens. Networks 10 (2014) - [c23]Teng Yu Huang, Hung-Yu Chien:
Gen2v2-Security-and-Privacy-Features-Leveraged Application Designs. AsiaJCIS 2014: 141-147 - [c22]Hung-Yu Chien, Meng-Yuan Chiang, Yi-Ting Hsin, Chun-Pei Hung:
Efficiently tracking TANET suspicious packets and identifying the devices using Splunk. ICS 2014: 866-874 - 2013
- [j42]Hung-Yu Chien:
Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Networks 57(14): 2705-2717 (2013) - [j41]Hung-Yu Chien, Shyr-Kuen Chen, Ching-Yang Lin, Jia-Ling Yan, Wei-Chen Liao, Huan-Yi Chu, Kuan-Ju Chen, Bo-Fan Lai, Yi-Ting Chen:
Design and Implementation of ZigBee-Ontology-Based Exhibit Guidance and Recommendation System. Int. J. Distributed Sens. Networks 9 (2013) - [j40]Hung-Yu Chien, Tzong-Chen Wu, Ming-Kuei Yeh:
Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks. J. Inf. Sci. Eng. 29(2): 249-265 (2013) - [j39]Hung-Yu Chien, Chin-I Lee, Tzong-Chen Wu:
Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks. Secur. Commun. Networks 6(8): 993-998 (2013) - [j38]Hung-Yu Chien, Chu-Sing Yang, Hung-Pin Hou:
Non-linearity cannot help RFID resist full-disclosure attacks and terrorist fraud attacks. Secur. Commun. Networks 6(12): 1490-1495 (2013) - 2012
- [j37]Hung-Yu Chien:
Improved Anonymous Multi-receiver Identity-Based Encryption. Comput. J. 55(4): 439-446 (2012) - [j36]Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih:
Server-less RFID authentication and searching protocol with enhanced security. Int. J. Commun. Syst. 25(3): 376-385 (2012) - 2011
- [j35]Hung-Yu Chien:
Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model. J. Inf. Sci. Eng. 27(4): 1487-1501 (2011) - [j34]Hung-Yu Chien, Chia-Chuan Yang, Tzong-Chen Wu, Chin-Feng Lee:
Two RFID-based Solutions to Enhance Inpatient Medication Safety. J. Medical Syst. 35(3): 369-375 (2011) - [j33]Jiun-Long Huang, Lo-Yao Yeh, Hung-Yu Chien:
ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 60(1): 248-262 (2011) - [c21]Hung-Yu Chien, Chin-I Lee, Shyr-Kuen Chen, Hung-Pin Hou:
New RFID Authentication Protocol with DOS-attack Resistance. ICPADS 2011: 605-609 - 2010
- [j32]Hung-Yu Chien, Chin-Feng Lee, Shih-Bin Liu, Tzong-Chen Wu:
Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls. Int. J. Internet Protoc. Technol. 5(3): 166-173 (2010) - [j31]Hung-Yu Chien, Chen-Wei Huang:
A Lightweight Authentication Protocol for Low-Cost RFID. J. Signal Process. Syst. 59(1): 95-102 (2010) - [c20]Hung-Yu Chien, Ying-Lun Chen, Chien-Feng Lo, Yuh-Ming Huang:
A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security. GPC 2010: 407-417
2000 – 2009
- 2009
- [j30]Hung-Yu Chien, Tzong-Chen Wu:
Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps. Comput. J. 52(6): 646-655 (2009) - [j29]Hung-Yu Chien, Tzu-Hang Hsu:
Secure fast WLAN handoff using time-bound delegated authentication. Int. J. Commun. Syst. 22(5): 565-584 (2009) - [j28]Hung-Yu Chien, Ru-Yu Lin:
The Study of Secure E-Will System on the Internet. J. Inf. Sci. Eng. 25(3): 877-893 (2009) - [j27]Hung-Yu Chien, Chi-Sung Laih:
ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distributed Comput. 69(10): 848-853 (2009) - [c19]Tzong-Chen Wu, Hung-Yu Chien:
Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. IIH-MSP 2009: 262-265 - 2008
- [j26]Hung-Yu Chien, Ru-Yu Lin:
Improved ID-based security framework for ad hoc network. Ad Hoc Networks 6(1): 47-60 (2008) - [j25]Hung-Yu Chien:
Selectively Convertible Authenticated Encryption in the Random Oracle Model. Comput. J. 51(4): 419-434 (2008) - [j24]Hung-Yu Chien:
Practical anonymous user authentication scheme with security proof. Comput. Secur. 27(5-6): 216-223 (2008) - [c18]Hung-Yu Chien, Rung Ching Chen, Annie Shen:
Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space. AINA 2008: 327-333 - [c17]Hung-Yu Chien:
Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance. APSCC 2008: 607-614 - [c16]Hung-Yu Chien:
DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols. APSCC 2008: 615-622 - [c15]Hung-Yu Chien:
Highly Efficient ID-Based Ring Signature from Pairings. APSCC 2008: 829-834 - [c14]Hung-Yu Chien, Tzong-Chen Wu:
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. ISI Workshops 2008: 69-76 - 2007
- [j23]Hung-Yu Chien, Che-Hao Chen:
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Comput. Stand. Interfaces 29(2): 254-259 (2007) - [j22]Hung-Yu Chien, Chen-Wei Huang:
Security of ultra-lightweight RFID authentication protocols and its improvements. ACM SIGOPS Oper. Syst. Rev. 41(4): 83-86 (2007) - [j21]Hung-Yu Chien:
Comments on an Efficient ID-Based Broadcast Encryption Scheme. IEEE Trans. Broadcast. 53(4): 809-810 (2007) - [j20]Hung-Yu Chien:
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Trans. Dependable Secur. Comput. 4(4): 337-340 (2007) - [c13]Hung-Yu Chien:
ID-Based Key Agreement with Anonymity for Ad Hoc Networks. EUC 2007: 333-345 - [c12]Hung-Yu Chien, Chen-Wei Huang:
A Lightweight RFID Protocol Using Substring. EUC 2007: 422-431 - [c11]Hung-Yu Chien, Yuan-Liang Tang, Ying-Lun Chen:
A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme. IMECS 2007: 371-374 - [c10]Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu:
Secure Fast Pre-authentication Based on IEEE 802.11i. IMECS 2007: 1325-1330 - [c9]Hung-Yu Chien:
New efficient user authentication scheme with user anonymity facilitating e-commerce applications. CEC/EEE 2007: 461-464 - 2006
- [j19]Hung-Yu Chien:
Forgery attacks on digital signature schemes without using one-way hash and message redundancy. IEEE Commun. Lett. 10(5): 324-325 (2006) - [c8]Hung-Yu Chien:
On the Revocation of Proxy Signatures. IMECS 2006: 160-162 - [c7]Hung-Yu Chien, Ru-Yu Lin:
ID-Based E-Will System using Bilinear Pairings. IMECS 2006: 225-230 - [c6]Hung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen:
Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks. IMECS 2006: 258-263 - [c5]Hung-Yu Chien:
Secure Access Control Schemes for RFID Systems with Anonymity. MDM 2006: 96 - [c4]Hung-Yu Chien, Ru-Yu Lin:
Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing. SUTC (1) 2006: 520-529 - [i2]Hung-Yu Chien:
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings. IACR Cryptol. ePrint Arch. 2006: 13 (2006) - 2005
- [j18]Hung-Yu Chien:
Comments on ID-based multi-signature with distinguished signing authorities. Appl. Math. Comput. 170(2): 1284-1289 (2005) - [j17]Hung-Yu Chien, Ren-Chiun Wang, Chou Chen Yang:
Note on Robust and Simple Authentication Protocol. Comput. J. 48(1): 27-29 (2005) - [c3]Hung-Yu Chien, Che-Hao Chen:
A Remote Authentication Scheme Preserving User Anonymity. AINA 2005: 245-248 - [c2]Chin-Ming Hong, Chih-Ming Chen, Hung-Yu Chien:
Learning Efficiency Improvement of Fuzzy CMAC by Aitken Acceleration Method. SEKE 2005: 556-595 - [i1]Hung-Yu Chien:
Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols. IACR Cryptol. ePrint Arch. 2005: 13 (2005) - 2004
- [j16]Hung-Yu Chien, Jinn-Ke Jan:
Improved authenticated multiple-key agreement protocol without using conventional one-way function. Appl. Math. Comput. 147(2): 491-497 (2004) - [j15]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
Solving the invalid signer-verified signature problem and comments on Xia-You group signature. J. Syst. Softw. 73(3): 369-373 (2004) - [j14]Hung-Yu Chien:
Efficient Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Knowl. Data Eng. 16(10): 1301-1304 (2004) - 2003
- [j13]Yuh-Min Tseng, Jinn-Ke Jan, Hung-Yu Chien:
Digital signature with message recovery using self-certified public keys and its variants. Appl. Math. Comput. 136(2-3): 203-214 (2003) - [j12]Hung-Yu Chien, Jinn-Ke Jan, Yuh-Min Tseng:
Cryptanalysis on Mu-Varadharajan's e-voting schemes. Appl. Math. Comput. 139(2-3): 525-530 (2003) - [j11]Yuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien:
Authenticated encryption schemes with message linkages for message flows. Comput. Electr. Eng. 29(1): 101-109 (2003) - [j10]Hung-Yu Chien, Jinn-ke Jan:
Robust and Simple Authentication Protocol. Comput. J. 46(2): 193-201 (2003) - [j9]Hung-Yu Chien, Jinn-ke Jan:
New hierarchical assignment without Public Key cryptography. Comput. Secur. 22(6): 523-526 (2003) - [j8]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
Partially Blind Threshold Signature Based on RSA. Informatica 14(2): 155-166 (2003) - [j7]Hung-Yu Chien:
Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function. Informatica 14(4): 445-454 (2003) - [j6]Hung-Yu Chien, Jinn-ke Jan:
A hybrid authentication protocol for large mobile network. J. Syst. Softw. 67(2): 123-130 (2003) - 2002
- [j5]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
An Efficient and Practical Solution to Remote Authentication: Smart Card. Comput. Secur. 21(4): 372-375 (2002) - [j4]Hung-Yu Chien, Jinn-Ke Jan, Yuh-Min Tseng:
Forgery attacks on "Multisignature schemes for authenticating mobile code delegates". IEEE Trans. Veh. Technol. 51(6): 1669-1671 (2002) - 2001
- [j3]Yuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien:
On the Security of Methods for Protecting Password Transmission. Informatica 12(3): 469-476 (2001) - [j2]Hung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng:
Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. Inf. Process. Lett. 80(2): 113-117 (2001) - [j1]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
A modified remote login authentication scheme based on geometric approach. J. Syst. Softw. 55(3): 287-290 (2001) - [c1]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
RSA-Based Partially Blind Signature with Low Computation. ICPADS 2001: 385-389
Coauthor Index
aka: Jinn-Ke Jan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint