Follow
Kuo-Hui Yeh
Title
Cited by
Cited by
Year
A secure IoT-based healthcare system with body sensor networks
KH Yeh
IEEE access 4, 10288-10299, 2016
2672016
A blockchain connected gateway for BLE-based devices in the internet of things
SC Cha, JF Chen, C Su, KH Yeh
ieee access 6, 24639-24649, 2018
2542018
Lightweight IoT-based authentication scheme in cloud computing circumstance
L Zhou, X Li, KH Yeh, C Su, W Chiu
Future generation computer systems 91, 244-251, 2019
1842019
Security and privacy in IoT-cloud-based e-health systems—A comprehensive review
C Butpheng, KH Yeh, H Xiong
Symmetry 12 (7), 1191, 2020
1452020
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10, 3133-3142, 2019
1442019
On the design of blockchain-based ECDSA with fault-tolerant batch verification protocol for blockchain-enabled IoMT
H Xiong, C Jin, M Alazab, KH Yeh, H Wang, TR Gadekallu, W Wang, C Su
IEEE journal of biomedical and health informatics 26 (5), 1977-1986, 2021
1302021
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
H Xiong, Y Zhao, L Peng, H Zhang, KH Yeh
Future Generation Computer Systems 97, 453-461, 2019
1172019
Privacy enhancing technologies in the Internet of Things: Perspectives and challenges
SC Cha, TY Hsu, Y Xiang, KH Yeh
IEEE Internet of Things Journal 6 (2), 2159-2187, 2018
922018
Novel authentication schemes for IoT based healthcare systems
JL Hou, KH Yeh
International Journal of Distributed Sensor Networks 11 (11), 183659, 2015
892015
A novel certificateless signature scheme for smart objects in the Internet-of-Things
KH Yeh, C Su, KKR Choo, W Chiu
Sensors 17 (5), 1001, 2017
872017
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
872010
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints
L Zhou, KH Yeh, G Hancke, Z Liu, C Su
IEEE Signal Processing Magazine 35 (5), 76-87, 2018
732018
A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments
KH Yeh
IEEE Systems Journal 12 (2), 2027-2038, 2017
652017
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
NW Lo, KH Yeh
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops …, 2007
632007
Special issue on advanced persistent threat
J Chen, C Su, KH Yeh, M Yung
Future Generation Computer Systems 79, 243-246, 2018
532018
Anonymous coexistence proofs for RFID tags
NW Lo, KH Yeh
Journal of Information Science and Engineering 26 (4), 1213-1230, 2010
522010
An efficient certificateless signature scheme without bilinear pairings
KH Yeh, KY Tsai, CY Fan
Multimedia Tools and Applications 74, 6519-6530, 2015
472015
A user-friendly privacy framework for users to achieve consents with nearby BLE devices
SC Cha, MS Chuang, KH Yeh, ZJ Huang, C Su
IEEE Access 6, 20779-20787, 2018
452018
I walk, therefore i am: continuous user authentication with plantar biometrics
KH Yeh, C Su, W Chiu, L Zhou
IEEE Communications Magazine 56 (2), 150-157, 2018
452018
Cryptanalysis of two three-party encrypted key exchange protocols
NW Lo, KH Yeh
Computer Standards & Interfaces 31 (6), 1167-1174, 2009
422009
The system can't perform the operation now. Try again later.
Articles 1–20