AES-128 based secure low power communication for LoRaWAN IoT environments KL Tsai, YL Huang, FY Leu, I You, YL Huang, CH Tsai Ieee Access 6, 45325-45334, 2018 | 152 | 2018 |
TTP based High-efficient Multi-Key Exchange Protocol I KUN-LIN TSAI, (Member, IEEE), YI-LI HUANG, (Member, IEEE), FANG-YIE LEU ... IEEE Access 4, 6261–6271, 2016 | 31 | 2016 |
A Secure M-Commerce System based on credit card transaction FY Leu, YL Huang, SM Wang Electronic Commerce Research and Applications 14 (5), 351-360, 2015 | 22 | 2015 |
A secure communication over wireless environments by using a data connection core YL Huang, FY Leu, KC Wei Mathematical and Computer Modelling 58 (5-6), 1459-1474, 2013 | 22 | 2013 |
A secure data encryption method employing a sequential–logic style mechanism for a cloud system YL Huang, CR Dai, FY Leu, I You International Journal of Web and Grid Services 11 (1), 102-124, 2015 | 20 | 2015 |
Improving security level of LTE authentication and key agreement procedure FY Leu, I You, YL Huang, K Yim, CR Dai 2012 IEEE Globecom Workshops, 1032-1036, 2012 | 20 | 2012 |
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other. YL Huang, FY Leu J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 96-107, 2011 | 19 | 2011 |
A handover scheme for LTE wireless networks under the assistance of GPS YS Huang, FY Leu, JC Liu, YL Huang, WCC Chu 2013 Eighth International Conference on Broadband and Wireless Computing …, 2013 | 18 | 2013 |
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802. 16e wireless networks YF Ciou, FY Leu, YL Huang, K Yim Mobile Information Systems 7 (3), 241-269, 2011 | 18 | 2011 |
Designing a healthcare authorization model based on cloud authentication CL Chen, TT Yang, FY Leu, YL Huang Intelligent Automation & Soft Computing 20 (3), 365-379, 2014 | 16 | 2014 |
Improving Security Levels of IEEE802. 16e Authentication by Involving Diffie-Hellman PKDS. YL Huang, FY Leu, CH Chiu, IL Lin J. Univers. Comput. Sci. 17 (6), 891-911, 2011 | 16 | 2011 |
The simulation of an emotional robot implemented with fuzzy logic FY Leu, J Liu, YT Hsu, YL Huang Soft Computing 18, 1729-1743, 2014 | 12 | 2014 |
A secure wireless communication system integrating PRNG and Diffie-Hellman PKDS by using a data connection core YL Huang, FY Leu, JC Liu, LJ Lo, WCC Chu 2013 Eighth International Conference on Broadband and Wireless Computing …, 2013 | 12 | 2013 |
A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment YL Huang, FY Leu, I You, YK Sun, CC Chu The Journal of Supercomputing 67, 635-652, 2014 | 11 | 2014 |
A group file encryption method using dynamic system environment key KL Tsai, JS Tan, FY Leu, YL Huang 2014 17th International Conference on Network-Based Information Systems, 476-483, 2014 | 9 | 2014 |
Building a block cipher mode of operation with feedback keys YL Huang, FY Leu, JC Liu, JH Yang, CW Yu, CC Chu, CT Yang 2013 IEEE International Symposium on Industrial Electronics, 1-4, 2013 | 9 | 2013 |
Controlling traffic lights for ambulances FY Leu, MH Chen, YL Huang, CC Lin 2012 Seventh International Conference on Broadband, Wireless Computing …, 2012 | 9 | 2012 |
Generating dynamic box by using an input string JJ Liu, YL Huang, FY Leu, XY Pan, LR Chen Mobile Internet Security: Second International Symposium, MobiSec 2017, Jeju …, 2019 | 7 | 2019 |
High-efficient multi-key exchange protocol based on three-party authentication KL Tsai, YL Huang, FY Leu, JS Tan, M Ye 2014 Eighth International Conference on Innovative Mobile and Internet …, 2014 | 7 | 2014 |
A secure and high performance wireless sensor network based on symmetric key matrix YL Huang, FY Leu, PH Su, TH Sung, SC Liu 2016 10th International Conference on Innovative Mobile and Internet …, 2016 | 6 | 2016 |