King Hang Wang, Kevin
King Hang Wang, Kevin
在 comp.hkbu.edu.hk 的電子郵件地址已通過驗證
標題
引用次數
引用次數
年份
On the security of Chien's ultralightweight RFID authentication protocol
HM Sun, WC Ting, KH Wang
IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009
1582009
A secure authentication protocol for internet of vehicles
CM Chen, B Xiang, Y Liu, KH Wang
Ieee Access 7, 12047-12057, 2019
1472019
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ...
IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010
1172010
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019
982019
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
932019
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74 (1), 65-70, 2018
822018
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
582009
A secure authentication scheme for internet of things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
492017
A review of contemporary e-voting: Requirements, technology, systems and usability
KH Wang, SK Mondal, K Chan, X Xie
Data Science and Pattern Recognition 1 (1), 31-47, 2017
472017
A scalable transitive human-verifiable authentication protocol for mobile devices
CM Chen, KH Wang, TY Wu, JS Pan, HM Sun
IEEE Transactions on Information Forensics and Security 8 (8), 1318-1330, 2013
422013
An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks
CM Chen, B Xiang, TY Wu, KH Wang
Applied Sciences 8 (7), 1074, 2018
282018
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”
CM Chen, W Fang, KH Wang, TY Wu
Nonlinear Dynamics 87 (3), 2073-2075, 2017
282017
A secure authenticated and key exchange scheme for fog computing
CM Chen, Y Huang, KH Wang, S Kumari, ME Wu
Enterprise Information Systems, 1-16, 2020
272020
A native APIs protection mechanism in the kernel mode against malicious code
HM Sun, H Wang, KH Wang, CM Chen
IEEE Transactions on Computers 60 (6), 813-823, 2011
272011
On the security of an efficient time-bound hierarchical key management scheme
HM Sun, KH Wang, CM Chen
IEEE transactions on dependable and secure computing 6 (2), 159-160, 2009
232009
On the security of the secure arithmetic code
HM Sun, KH Wang, WC Ting
IEEE transactions on information forensics and security 4 (4), 781-789, 2009
222009
On the security of a three-party authenticated key agreement protocol based on chaotic maps
CM Chen, KH Wang, TY Wu, EK Wang
Data Science and Pattern Recognition 1 (2), 1-10, 2017
202017
Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments
TY Wu, CM Chen, KH Wang, JMT Wu
IEEE Access 7, 49232-49239, 2019
192019
A robust mutual authentication with a key agreement scheme for session initiation protocol
CM Chen, B Xiang, KH Wang, KH Yeh, TY Wu
Applied Sciences 8 (10), 1789, 2018
152018
CRFID: An RFID system with a cloud database as a back-end server
SM Chen, ME Wu, HM Sun, KH Wang
Future Generation Computer Systems 30, 155-161, 2014
152014
系統目前無法執行作業,請稍後再試。
文章 1–20