TTP based high-efficient multi-key exchange protocol

KL Tsai, YL Huang, FY Leu, I You - IEEE Access, 2016 - ieeexplore.ieee.org
With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to
transmit a message to another user, the transmitted data are encrypted by a session key …

[PDF][PDF] Identifying Large Young Hacker Concentration in Indonesia

OW Purbo, P Prasetyo, AP Dimaz, BP Agung… - Journal of Internet …, 2024 - jisis.org
Abstract An Indonesian 2023 Capture the Flag competition for 18-year-olds is looked at for
the first time. It engaged a diverse participant profile, encompassing high school students …

A wandering path tracking and fall detection system for people with dementia

CY Ko, FY Leu, IT Lin - 2014 Ninth International Conference on …, 2014 - ieeexplore.ieee.org
This paper proposes a safety assistant, named wandering path tracking and fall detection
system (PTFaD for short), which is a smartphone-based system monitoring people with …

A secure data encryption method employing a sequential–logic style mechanism for a cloud system

YL Huang, CR Dai, FY Leu… - International Journal of …, 2015 - inderscienceonline.com
Recently, security problems have been the focuses of cloud computing research since
people worry that their data/files stored in a cloud system may be illegally accessed. Also …

[HTML][HTML] A secure communication over wireless environments by using a data connection core

YL Huang, FY Leu, KC Wei - Mathematical and Computer Modelling, 2013 - Elsevier
Recently, wireless networks, such as Wi-Fi and 3G, have been widely equipped and
popularly used in the world. People holding smart devices can conveniently access the …

Improving security level of LTE authentication and key agreement procedure

FY Leu, I You, YL Huang, K Yim… - 2012 IEEE Globecom …, 2012 - ieeexplore.ieee.org
In recent years, LTE (Long Term Evolution) has been one of the mainstreams of current
wireless communication systems. But when its HSS authenticates UEs, the random number …

A modified PKM environment for the security enhancement of IEEE 802.16 e

PK Panda, S Chattopadhyay - Computer Standards & Interfaces, 2019 - Elsevier
IEEE 802.16 standard developed Privacy Key Management (PKM) security protocol for
WiMAX. However, it still suffers from various attacks such as forgery attack, replay attack …

Time slot based data sharing with time slot based password

P Baskaran, EG Anurag, S Kaviyarasu… - … on Innovations in …, 2017 - ieeexplore.ieee.org
This approach has taken a review of time slot based password technique in which the
password is used only once for each and when time slot ends the password is not useful …

A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment

YL Huang, FY Leu, I You, YK Sun, CC Chu - The Journal of …, 2014 - Springer
In broadband wireless technology, due to having many salient advantages, such as high
data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one …

A batch verification scheme by using the Matrix-Detection Algorithm

YL Huang, CH Lin, FY Leu - 網際網路技術學刊, 2012 - airitilibrary.com
When a government office O delivers a batch of documents to a remote government office R,
for security consideration, R has to verify whether the documents received are those …