A secure authentication protocol for internet of vehicles CM Chen, B Xiang, Y Liu, KH Wang Ieee Access 7, 12047-12057, 2019 | 307 | 2019 |
On the security of Chien's ultralightweight RFID authentication protocol HM Sun, WC Ting, KH Wang IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009 | 180 | 2009 |
A secure authenticated and key exchange scheme for fog computing CM Chen, Y Huang, KH Wang, S Kumari, ME Wu Enterprise Information Systems 15 (9), 1200-1215, 2021 | 163 | 2021 |
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu Journal of Ambient Intelligence and Humanized Computing 10, 3133-3142, 2019 | 150 | 2019 |
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags KH Wang, CM Chen, W Fang, TY Wu The Journal of Supercomputing 74, 65-70, 2018 | 146 | 2018 |
A provably secure certificateless public key encryption with keyword search TY Wu, CM Chen, KH Wang, C Meng, EK Wang Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019 | 145 | 2019 |
A review of contemporary e-voting: Requirements, technology, systems and usability KHK Wang, SK Mondal, KC Chan, X Xie Data Science and Pattern Recognition 1 (1), 31, 2017 | 127 | 2017 |
Spate: small-group pki-less authenticated trust establishment YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 125 | 2009 |
A secure authentication scheme for internet of things KH Wang, CM Chen, W Fang, TY Wu Pervasive and Mobile Computing 42, 15-26, 2017 | 114 | 2017 |
An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks CM Chen, B Xiang, TY Wu, KH Wang Applied Sciences 8 (7), 1074, 2018 | 83 | 2018 |
A study of user-friendly hash comparison schemes HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ... 2009 annual computer security applications conference, 105-114, 2009 | 76 | 2009 |
Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments TY Wu, CM Chen, KH Wang, JMT Wu IEEE Access 7, 49232-49239, 2019 | 63 | 2019 |
A scalable transitive human-verifiable authentication protocol for mobile devices CM Chen, KH Wang, TY Wu, JS Pan, HM Sun IEEE Transactions on Information Forensics and Security 8 (8), 1318-1330, 2013 | 46 | 2013 |
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol” CM Chen, W Fang, KH Wang, TY Wu Nonlinear Dynamics 87, 2073-2075, 2017 | 41 | 2017 |
On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci CM Chen, KH Wang, TY Wu, EK Wang Pattern Recognit 1 (2), 1-10, 2017 | 41 | 2017 |
A robust mutual authentication with a key agreement scheme for session initiation protocol CM Chen, B Xiang, KH Wang, KH Yeh, TY Wu Applied Sciences 8 (10), 1789, 2018 | 39 | 2018 |
On the security of an efficient time-bound hierarchical key management scheme HM Sun, KH Wang, CM Chen IEEE transactions on dependable and secure computing 6 (2), 159-160, 2009 | 35 | 2009 |
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review. TY Wu, CM Chen, KH Wang, JS Pan, W Zheng, SC Chu, JF Roddick J. Netw. Intell. 3 (1), 16-25, 2018 | 29 | 2018 |
A native apis protection mechanism in the kernel mode against malicious code HM Sun, H Wang, KH Wang, CM Chen IEEE Transactions on Computers 60 (6), 813-823, 2011 | 29 | 2011 |
Cryptanalysis and improvements on three-party-authenticated key agreement protocols based on chaotic maps CM Chen, L Xu, KH Wang, S Liu, TY Wu Journal of Internet Technology 19 (3), 679-687, 2018 | 25 | 2018 |