A privacy authentication scheme based on cloud for medical environment CL Chen, TT Yang, ML Chiang, TF Shih Journal of medical systems 38 (11), 1-16, 2014 | 78 | 2014 |
Location-aware routing protocol with dynamic adaptation of request zone for mobile ad hoc networks TF Shih, HC Yen Wireless Networks 14 (3), 321-333, 2008 | 72 | 2008 |
A secure medical data exchange protocol based on cloud environment CL Chen, TT Yang, TF Shih Journal of medical systems 38 (9), 1-12, 2014 | 69 | 2014 |
Special Section on Multi-dimensional Mobile Information Networks-Particle Swarm Optimization Algorithm for Energy-Efficient Cluster-Based Sensor Networks TF Shih IEICE Transactions on Fundamentals Electronics Communications and Computer …, 2006 | 29* | 2006 |
A bilinear pairing-based dynamic key management and authentication for wireless sensor networks CL Chen, TF Shih, YT Tsai, DK Li Journal of Sensors 2015, 2015 | 22 | 2015 |
Core location-aided cluster-based routing protocol for mobile ad hoc networks TF Shih, HC Yen pp223-228, 2006 | 22 | 2006 |
Location-based multicast routing protocol for mobile ad hoc networks TF Shih, CC Shih, CL Chen WSEAS Transactions on Computers 7 (8), 1270-1279, 2008 | 17 | 2008 |
Anti-counterfeit ownership transfer protocol for low cost RFID system CL Chen, YY Chen, YC Huang, CS Liu, CI Lin, TF Shih WSEAS Transactions on Computers 7 (8), 1149-1158, 2008 | 15 | 2008 |
An RFID authentication and anti-counterfeit transaction protocol CL Chen, YY Chen, TF Shih, TM Kuo Computer, Consumer and Control (IS3C), 2012 International Symposium on, 419-422, 2012 | 13 | 2012 |
Cluster-based multicast routing protocol for MANET. CC Shih, TF Shih WSEAS Transactions on Computers 6 (3), 566-572, 2007 | 12 | 2007 |
Bus Drivers Fatigue Measurement Based on Monopolar EEG CL Chen, CY Liao, RC Chen, YW Tang, TF Shih Asian Conference on Intelligent Information and Database Systems, 308-317, 2017 | 11 | 2017 |
A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards CL Chen, YC Huang, TF Shih Information Technology And Control 41 (3), 220-228, 2012 | 11 | 2012 |
Hierarchical localization strategy for wireless sensor networks 施再繁, 張巍騰 WSEAS Transactions on Computers 7 (8), 1260-1269, 2008 | 10 | 2008 |
A novel key management of two-tier dissemination for wireless sensor network CL Chen, YT Tsai, TF Shih Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 …, 2012 | 5 | 2012 |
An Efficient Anti-Collision Algorithm for RFID System TF Shih, WL Hsu WSEAS International Conference. Proceedings. Mathematics and Computers in …, 2009 | 5 | 2009 |
An efficient Anti-Collision Algorithm for RFID System 施再繁, 許文力 The 8th WSEAS International Conference on APPLIED COMPUTER & APPLIED …, 2009 | 5* | 2009 |
An Investigator Unearths Illegal Behavior via a Subliminal Channel CL Chen, TF Shih, K Wang, CH Chen, WJ Tsaur Journal of Internet Technology 19 (2), 573-580, 2018 | 3 | 2018 |
Design of a secure communication and handoff protocol for VANETs CL Chen, TM Kuo, TF Shih Journal of High Speed Networks 20 (3), 179-192, 2014 | 3 | 2014 |
Distributed multicast routing protocol for mobile ad hoc networks TF Shih, S CHAO-CHENG, CL Chen Proceeding of the 6th WSEAS International Conference on APPLIED …, 2008 | 3 | 2008 |
Authenticated group key agreement protocol for unbalanced wireless mobile networks CF Lu, TC Wu, TF Shih Complex, Intelligent and Software Intensive Systems (CISIS), 2010 …, 2010 | 2 | 2010 |