Kuo-Hui Yeh
Cited by
Cited by
A secure IoT-based healthcare system with body sensor networks
KH Yeh
IEEE access 4, 10288-10299, 2016
A blockchain connected gateway for BLE-based devices in the internet of things
SC Cha, JF Chen, C Su, KH Yeh
ieee access 6, 24639-24649, 2018
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019
Lightweight IoT-based authentication scheme in cloud computing circumstance
L Zhou, X Li, KH Yeh, C Su, W Chiu
Future Generation Computer Systems 91, 244-251, 2019
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
H Xiong, Y Zhao, L Peng, H Zhang, KH Yeh
Future Generation Computer Systems 97, 453-461, 2019
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
Novel authentication schemes for IoT based healthcare systems
JL Hou, KH Yeh
International Journal of Distributed Sensor Networks 11 (11), 183659, 2015
Security and privacy in IoT-cloud-based e-health systems—A comprehensive review
C Butpheng, KH Yeh, H Xiong
Symmetry 12 (7), 1191, 2020
A novel certificateless signature scheme for smart objects in the Internet-of-Things
KH Yeh, C Su, KKR Choo, W Chiu
Sensors 17 (5), 1001, 2017
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
NW Lo, KH Yeh
International Conference on Embedded and Ubiquitous Computing, 43-56, 2007
Privacy enhancing technologies in the Internet of Things: Perspectives and challenges
SC Cha, TY Hsu, Y Xiang, KH Yeh
IEEE Internet of Things Journal 6 (2), 2159-2187, 2018
On the design of blockchain-based ECDSA with fault-tolerant batch verification protocol for blockchain-enabled IoMT
H Xiong, C Jin, M Alazab, KH Yeh, H Wang, TR Gadekallu, W Wang, C Su
IEEE journal of biomedical and health informatics 26 (5), 1977-1986, 2021
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints
L Zhou, KH Yeh, G Hancke, Z Liu, C Su
IEEE Signal Processing Magazine 35 (5), 76-87, 2018
Anonymous coexistence proofs for RFID tags
NW Lo, KH Yeh
Journal of Information Science and Engineering 26 (4), 1213-1230, 2010
A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments
KH Yeh
IEEE Systems Journal 12 (2), 2027-2038, 2017
Special issue on advanced persistent threat
J Chen, C Su, KH Yeh, M Yung
Future Generation Computer Systems 79, 243-246, 2018
Cryptanalysis of two three-party encrypted key exchange protocols
NW Lo, KH Yeh
Computer Standards & Interfaces 31 (6), 1167-1174, 2009
An efficient ultralightweight authentication protocol for RFID systems
KH Yeh, NW Lo, E Winata
Radio Frequency Identification System Security, 49-60, 2010
I walk, therefore i am: continuous user authentication with plantar biometrics
KH Yeh, C Su, W Chiu, L Zhou
IEEE Communications Magazine 56 (2), 150-157, 2018
An efficient certificateless signature scheme without bilinear pairings
KH Yeh, KY Tsai, CY Fan
Multimedia Tools and Applications 74 (16), 6519-6530, 2015
The system can't perform the operation now. Try again later.
Articles 1–20