On the security of Chien's ultralightweight RFID authentication protocol HM Sun, WC Ting, KH Wang IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009 | 158 | 2009 |
A secure authentication protocol for internet of vehicles CM Chen, B Xiang, Y Liu, KH Wang Ieee Access 7, 12047-12057, 2019 | 147 | 2019 |
Spate: small-group pki-less authenticated trust establishment YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ... IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010 | 117 | 2010 |
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019 | 98 | 2019 |
A provably secure certificateless public key encryption with keyword search TY Wu, CM Chen, KH Wang, C Meng, EK Wang Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019 | 93 | 2019 |
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags KH Wang, CM Chen, W Fang, TY Wu The Journal of Supercomputing 74 (1), 65-70, 2018 | 82 | 2018 |
A study of user-friendly hash comparison schemes HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ... 2009 Annual Computer Security Applications Conference, 105-114, 2009 | 58 | 2009 |
A secure authentication scheme for internet of things KH Wang, CM Chen, W Fang, TY Wu Pervasive and Mobile Computing 42, 15-26, 2017 | 49 | 2017 |
A review of contemporary e-voting: Requirements, technology, systems and usability KH Wang, SK Mondal, K Chan, X Xie Data Science and Pattern Recognition 1 (1), 31-47, 2017 | 47 | 2017 |
A scalable transitive human-verifiable authentication protocol for mobile devices CM Chen, KH Wang, TY Wu, JS Pan, HM Sun IEEE Transactions on Information Forensics and Security 8 (8), 1318-1330, 2013 | 42 | 2013 |
An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks CM Chen, B Xiang, TY Wu, KH Wang Applied Sciences 8 (7), 1074, 2018 | 28 | 2018 |
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol” CM Chen, W Fang, KH Wang, TY Wu Nonlinear Dynamics 87 (3), 2073-2075, 2017 | 28 | 2017 |
A secure authenticated and key exchange scheme for fog computing CM Chen, Y Huang, KH Wang, S Kumari, ME Wu Enterprise Information Systems, 1-16, 2020 | 27 | 2020 |
A native APIs protection mechanism in the kernel mode against malicious code HM Sun, H Wang, KH Wang, CM Chen IEEE Transactions on Computers 60 (6), 813-823, 2011 | 27 | 2011 |
On the security of an efficient time-bound hierarchical key management scheme HM Sun, KH Wang, CM Chen IEEE transactions on dependable and secure computing 6 (2), 159-160, 2009 | 23 | 2009 |
On the security of the secure arithmetic code HM Sun, KH Wang, WC Ting IEEE transactions on information forensics and security 4 (4), 781-789, 2009 | 22 | 2009 |
On the security of a three-party authenticated key agreement protocol based on chaotic maps CM Chen, KH Wang, TY Wu, EK Wang Data Science and Pattern Recognition 1 (2), 1-10, 2017 | 20 | 2017 |
Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments TY Wu, CM Chen, KH Wang, JMT Wu IEEE Access 7, 49232-49239, 2019 | 19 | 2019 |
A robust mutual authentication with a key agreement scheme for session initiation protocol CM Chen, B Xiang, KH Wang, KH Yeh, TY Wu Applied Sciences 8 (10), 1789, 2018 | 15 | 2018 |
CRFID: An RFID system with a cloud database as a back-end server SM Chen, ME Wu, HM Sun, KH Wang Future Generation Computer Systems 30, 155-161, 2014 | 15 | 2014 |