TTP based high-efficient multi-key exchange protocol

KL Tsai, YL Huang, FY Leu, I You - IEEE Access, 2016 - ieeexplore.ieee.org
With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to
transmit a message to another user, the transmitted data are encrypted by a session key …

A secure data encryption method employing a sequential–logic style mechanism for a cloud system

YL Huang, CR Dai, FY Leu… - International Journal of …, 2015 - inderscienceonline.com
Recently, security problems have been the focuses of cloud computing research since
people worry that their data/files stored in a cloud system may be illegally accessed. Also …

[HTML][HTML] A secure communication over wireless environments by using a data connection core

YL Huang, FY Leu, KC Wei - Mathematical and Computer Modelling, 2013 - Elsevier
Recently, wireless networks, such as Wi-Fi and 3G, have been widely equipped and
popularly used in the world. People holding smart devices can conveniently access the …

Improving security level of LTE authentication and key agreement procedure

FY Leu, I You, YL Huang, K Yim… - 2012 IEEE Globecom …, 2012 - ieeexplore.ieee.org
In recent years, LTE (Long Term Evolution) has been one of the mainstreams of current
wireless communication systems. But when its HSS authenticates UEs, the random number …

A modified PKM environment for the security enhancement of IEEE 802.16 e

PK Panda, S Chattopadhyay - Computer Standards & Interfaces, 2019 - Elsevier
IEEE 802.16 standard developed Privacy Key Management (PKM) security protocol for
WiMAX. However, it still suffers from various attacks such as forgery attack, replay attack …

[PDF][PDF] Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.

YL Huang, FY Leu - J. Wirel. Mob. Networks Ubiquitous Comput …, 2011 - researchgate.net
Recently, wireless communication has been popularly used in our everyday life. However,
its security is a crucial work since messages are broadcasted via wireless channels through …

Building a block cipher mode of operation with feedback keys

YL Huang, FY Leu, JC Liu, JH Yang… - 2013 IEEE …, 2013 - ieeexplore.ieee.org
In this paper, we propose two block cipher modes of operation (BCMO for short), named the
Key Stream Protection Chain mode (KSPC for short) and Output Dual Chaining mode (ODC …

A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment

YL Huang, FY Leu, I You, YK Sun, CC Chu - The Journal of …, 2014 - Springer
In broadband wireless technology, due to having many salient advantages, such as high
data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one …

A block cipher mode of operation with two keys

YL Huang, FY Leu, JC Liu, JH Yang - … , March 25-29, 2013. Proceedings 1, 2013 - Springer
In this paper, we propose a novel block cipher mode of operation (BCMO for short), named
Output Protection Chain (OPC for short), which as a symmetric encryption structure is …

[PDF][PDF] Encryption of 4G mobile broadband systems

R Vafaei - 2014 - academia.edu
Mobile communication is the most popular technology that has developed from expensive
technology for some individuals to today's worldwide system used by majority of the people …