A secure authentication protocol for Internet of vehicles CM Chen, B Xiang, Y Liu, KH Wang IEEE Access 7, 12047-12057, 2019 | 295 | 2019 |
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks CM Chen, YH Lin, YC Lin, HM Sun IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011 | 209 | 2011 |
Stolen-verifier attack on two new strong-password authentication protocols CM Chen, WC Ku IEICE Transactions on communications 85 (11), 2519-2521, 2002 | 178 | 2002 |
PoRX: A reputation incentive scheme for blockchain consensus of IIoT EK Wang, Z Liang, CM Chen, S Kumari, MK Khan Future Generation Computer Systems 102, 140-151, 2020 | 166 | 2020 |
A secure authenticated and key exchange scheme for fog computing CM Chen, Y Huang, KH Wang, S Kumari, ME Wu Enterprise Information Systems 15 (9), 1200-1215, 2021 | 159 | 2021 |
A multilevel model of team cultural diversity and creativity: The role of climate for inclusion CR Li, CJ Lin, YH Tien, CM Chen The Journal of Creative Behavior 51 (2), 163-179, 2017 | 154 | 2017 |
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu Journal of Ambient Intelligence and Humanized Computing 10, 3133-3142, 2019 | 147 | 2019 |
A provably secure certificateless public key encryption with keyword search TY Wu, CM Chen, KH Wang, C Meng, EK Wang Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019 | 144 | 2019 |
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags KH Wang, CM Chen, W Fang, TY Wu The Journal of Supercomputing 74, 65-70, 2018 | 144 | 2018 |
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System CT Li, TY Wu, CL Chen, CC Lee, CM Chen Sensors 17 (7), 1482, 2017 | 137 | 2017 |
A secure blockchain-based e-health records storage and sharing scheme S Shamshad, K Mahmood, S Kumari, CM Chen Journal of Information Security and Applications 55, 102590, 2020 | 135 | 2020 |
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme WC Ku, CM Chen, HL Lee IEICE Transactions on Communications 86 (5), 1682-1684, 2003 | 121 | 2003 |
Decentralized E-voting systems based on the blockchain technology JH Hsiao, R Tso, CM Chen, ME Wu Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 17, 305-309, 2018 | 119 | 2018 |
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain EK Wang, CM Chen, MM Hassan, A Almogren Future Generation Computer Systems 108, 135-144, 2020 | 118 | 2020 |
Selecting Hyper-Parameters of Gaussian Process Regression Based on Non-Inertial Particle Swarm Optimization in Internet of Things L Kang, RS Chen, N Xiong, YC Chen, YX Hu, CM Chen IEEE Access 7, 59504-59513, 2019 | 118 | 2019 |
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar, CM Chen IEEE Access 8, 28096-28108, 2020 | 116 | 2020 |
HDMA: hybrid D2D message authentication scheme for 5G-enabled VANETs P Wang, CM Chen, S Kumari, M Shojafar, R Tafazolli, YN Liu IEEE Transactions on Intelligent Transportation Systems 22 (8), 5071-5080, 2021 | 110 | 2021 |
Discovering high utility-occupancy patterns from uncertain data CM Chen, L Chen, W Gan, L Qiu, W Ding Information Sciences 546, 1208-1229, 2021 | 104 | 2021 |
A secure authentication scheme for Internet of Things KH Wang, CM Chen, W Fang, TY Wu Pervasive and Mobile Computing 42, 15-26, 2017 | 104 | 2017 |
CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC A Kumari, V Kumar, MY Abbasi, S Kumari, P Chaudhary, CM Chen IEEE Access 8, 107838-107852, 2020 | 85 | 2020 |