Chunhua Su
Chunhua Su
Division of Computer Science, University of Aizu, Japan
在 的电子邮件经过验证
A blockchain connected gateway for BLE-based devices in the internet of things
SC Cha, JF Chen, C Su, KH Yeh
IEEE Access 6, 24639-24649, 2018
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
Lightweight IoT-based authentication scheme in cloud computing circumstance
L Zhou, X Li, KH Yeh, C Su, W Chiu
Future generation computer systems 91, 244-251, 2019
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
Ieee Access 6, 7234-7243, 2017
A novel certificateless signature scheme for smart objects in the Internet-of-Things
KH Yeh, C Su, KKR Choo, W Chiu
Sensors 17 (5), 1001, 2017
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints
L Zhou, KH Yeh, G Hancke, Z Liu, C Su
IEEE Signal Processing Magazine 35 (5), 76-87, 2018
Special issue on advanced persistent threat
J Chen, C Su, KH Yeh, M Yung
Future Generation Computer Systems 79, 243-246, 2018
Privacy-preserving two-party k-means clustering via secure approximation
C Su, F Bao, J Zhou, T Takagi, K Sakurai
21st International Conference on Advanced Information Networking and …, 2007
I walk, therefore i am: continuous user authentication with plantar biometrics
KH Yeh, C Su, W Chiu, L Zhou
IEEE Communications Magazine 56 (2), 150-157, 2018
You think, therefore you are: transparent authentication system with brainwave-oriented bio-features for IoT networks
L Zhou, C Su, W Chiu, KH Yeh
IEEE Transactions on Emerging Topics in Computing 8 (2), 303-312, 2017
FPDP: Flexible privacy-preserving data publishing scheme for smart agriculture
J Song, Q Zhong, W Wang, C Su, Z Tan, Y Liu
IEEE Sensors Journal, 2020
A user-friendly privacy framework for users to achieve consents with nearby BLE devices
SC Cha, MS Chuang, KH Yeh, ZJ Huang, C Su
IEEE Access 6, 20779-20787, 2018
Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data
K Liang, C Su, J Chen, JK Liu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Am I eclipsed? A smart detector of eclipse attacks for Ethereum
G Xu, B Guo, C Su, X Zheng, K Liang, DS Wong, H Wang
Computers & Security 88, 101604, 2020
A distributed privacy-preserving association rules mining scheme using frequent-pattern tree
C Su, K Sakurai
International Conference on Advanced Data Mining and Applications, 170-181, 2008
Towards false alarm reduction using fuzzy if-then rules for medical cyber physical systems
W Li, W Meng, C Su, LF Kwok
IEEE Access 6, 6530-6539, 2018
Improved handover authentication and key predistribution for wireless mesh networks
X Yang, X Huang, J Han, C Su
Concurrency and Computation: Practice and Experience 28 (10), 2978-2990, 2016
Contractward: Automated vulnerability detection models for ethereum smart contracts
W Wang, J Song, G Xu, Y Li, H Wang, C Su
IEEE Transactions on Network Science and Engineering, 2020
Game theoretic security of quantum bit commitment
L Zhou, X Sun, C Su, Z Liu, KKR Choo
Information Sciences 479, 503-514, 2019
Improved lightweight pseudo-random number generators for the low-cost rfid tags
J Chen, A Miyaj, H Sato, C Su
2015 IEEE Trustcom/BigDataSE/ISPA 1, 17-24, 2015
文章 1–20