关注
Tzay-Farn Shih(施再繁)
Tzay-Farn Shih(施再繁)
朝陽科技大學資訊工程學系副教授
在 cyut.edu.tw 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A privacy authentication scheme based on cloud for medical environment
CL Chen, TT Yang, ML Chiang, TF Shih
Journal of medical systems 38 (11), 1-16, 2014
782014
Location-aware routing protocol with dynamic adaptation of request zone for mobile ad hoc networks
TF Shih, HC Yen
Wireless Networks 14 (3), 321-333, 2008
722008
A secure medical data exchange protocol based on cloud environment
CL Chen, TT Yang, TF Shih
Journal of medical systems 38 (9), 1-12, 2014
692014
Special Section on Multi-dimensional Mobile Information Networks-Particle Swarm Optimization Algorithm for Energy-Efficient Cluster-Based Sensor Networks
TF Shih
IEICE Transactions on Fundamentals Electronics Communications and Computer …, 2006
29*2006
A bilinear pairing-based dynamic key management and authentication for wireless sensor networks
CL Chen, TF Shih, YT Tsai, DK Li
Journal of Sensors 2015, 2015
222015
Core location-aided cluster-based routing protocol for mobile ad hoc networks
TF Shih, HC Yen
pp223-228, 2006
222006
Location-based multicast routing protocol for mobile ad hoc networks
TF Shih, CC Shih, CL Chen
WSEAS Transactions on Computers 7 (8), 1270-1279, 2008
172008
Anti-counterfeit ownership transfer protocol for low cost RFID system
CL Chen, YY Chen, YC Huang, CS Liu, CI Lin, TF Shih
WSEAS Transactions on Computers 7 (8), 1149-1158, 2008
152008
An RFID authentication and anti-counterfeit transaction protocol
CL Chen, YY Chen, TF Shih, TM Kuo
Computer, Consumer and Control (IS3C), 2012 International Symposium on, 419-422, 2012
132012
Cluster-based multicast routing protocol for MANET.
CC Shih, TF Shih
WSEAS Transactions on Computers 6 (3), 566-572, 2007
122007
Bus Drivers Fatigue Measurement Based on Monopolar EEG
CL Chen, CY Liao, RC Chen, YW Tang, TF Shih
Asian Conference on Intelligent Information and Database Systems, 308-317, 2017
112017
A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards
CL Chen, YC Huang, TF Shih
Information Technology And Control 41 (3), 220-228, 2012
112012
Hierarchical localization strategy for wireless sensor networks
施再繁, 張巍騰
WSEAS Transactions on Computers 7 (8), 1260-1269, 2008
102008
A novel key management of two-tier dissemination for wireless sensor network
CL Chen, YT Tsai, TF Shih
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 …, 2012
52012
An Efficient Anti-Collision Algorithm for RFID System
TF Shih, WL Hsu
WSEAS International Conference. Proceedings. Mathematics and Computers in …, 2009
52009
An efficient Anti-Collision Algorithm for RFID System
施再繁, 許文力
The 8th WSEAS International Conference on APPLIED COMPUTER & APPLIED …, 2009
5*2009
An Investigator Unearths Illegal Behavior via a Subliminal Channel
CL Chen, TF Shih, K Wang, CH Chen, WJ Tsaur
Journal of Internet Technology 19 (2), 573-580, 2018
32018
Design of a secure communication and handoff protocol for VANETs
CL Chen, TM Kuo, TF Shih
Journal of High Speed Networks 20 (3), 179-192, 2014
32014
Distributed multicast routing protocol for mobile ad hoc networks
TF Shih, S CHAO-CHENG, CL Chen
Proceeding of the 6th WSEAS International Conference on APPLIED …, 2008
32008
Authenticated group key agreement protocol for unbalanced wireless mobile networks
CF Lu, TC Wu, TF Shih
Complex, Intelligent and Software Intensive Systems (CISIS), 2010 …, 2010
22010
系统目前无法执行此操作,请稍后再试。
文章 1–20