Residence energy control system based on wireless smart socket and IoT

KL Tsai, FY Leu, I You - IEEE Access, 2016 - ieeexplore.ieee.org
To avoid resources on green earth being exhausted much earlier by human beings, energy
saving has been one of the key issues in our everyday lives. In fact, energy control for some …

Privacy-aware forecasting of quality of service in mobile edge computing

H Jin, P Zhang, H Dong, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We propose a novel privacy-aware Quality of Service (QoS) forecasting approach in the
mobile edge environment–Edge-PMAM (Edge QoS forecasting with P ublic M odel and A …

Design and implementation of bilingual digital reader based on artificial intelligence and big data technology

K Chen, Y Zu, Y Cui - Journal of Computational Methods in …, 2020 - content.iospress.com
Along with the development of computer and information technology and the arrival of the
digital reading wave, more and more users have switched the way they meet their reading …

S-PMIPv6: An intra-LMA model for IPv6 mobility

FY Leu, CY Liu, JC Liu, FC Jiang, H Susanto - Journal of Network and …, 2015 - Elsevier
IPv6 defined in RFC 2460 in the mid-1990s is an improved and streamlined successor
version of IP version 4 (IPv4). It is designed to coexist with IPv4, while providing better …

Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage

XA Wang, F Xhafa, W Cai, J Ma, F Wei - Computers & Electrical …, 2016 - Elsevier
With the fast development in Cloud storage technologies and ever increasing use of Cloud
data centres, data privacy and confidentiality has become a must. Indeed, Cloud data …

A Secure M-Commerce System based on credit card transaction

FY Leu, YL Huang, SM Wang - Electronic Commerce Research and …, 2015 - Elsevier
Nowadays the demands for wireless Internet shopping are increasing. But credit card fraud
has been serious, and SET and SSL have their own problems. To enhance the security of …

Secure data-sharing using distributed environmental matching keys

KL Tsai, FY Leu - Pervasive and Mobile Computing, 2017 - Elsevier
In the past decade, with the development of data-sharing on cloud storage, people can
access their personal or commercial data stored in different systems or devices anytime and …

Generating dynamic box by using an input string

JJ Liu, YL Huang, FY Leu, XY Pan, LR Chen - Mobile Internet Security …, 2019 - Springer
Today, encrypting and decrypting data by looking up a table is quite popular and its
processing speed is high. But currently, the table to be looked up is a static S-Box, the …

[PDF][PDF] A Wrapping Encryption Based on Double Randomness Mechanism

YL Huang, FY Leu, RK Sheu, JC Liu… - CMC-COMPUTERS …, 2023 - cdn.techscience.cn
Currently, data security mainly relies on password (PW) or system channel key (SKCH) to
encrypt data before they are sent, no matter whether in broadband networks, the 5th …

A 3D encryption with shifting mapping substitution mechanism

YL Huang, FY Leu, I You, RY Su… - 2017 14th IEEE …, 2017 - ieeexplore.ieee.org
Today, due to the popularity and convenience of wireless communications, people
communicate with others by using mobile phones almost every day, as one of their important …