default search action
Tsu-Yang Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j74]Shu-Chuan Chu, Xu Yuan, Jeng-Shyang Pan, Tsu-Yang Wu, Fengting Yan:
An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection. Wirel. Networks 30(4): 2675-2696 (2024) - 2023
- [j73]Pooja Tyagi, Saru Kumari, Mridul Kumar Gupta, Chien-Ming Chen, Tsu-Yang Wu, Sachin Kumar:
A secure protocol for patient monitoring in wireless body area networks. Concurr. Comput. Pract. Exp. 35(10) (2023) - [j72]Tsu-Yang Wu, Fangfang Kong, Qian Meng, Saru Kumari, Chien-Ming Chen:
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture. EURASIP J. Wirel. Commun. Netw. 2023(1): 36 (2023) - [j71]Chien-Ming Chen, Qingkai Miao, Sachin Kumar, Tsu-Yang Wu:
Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - 2022
- [j70]Pei-Cheng Song, Shu-Chuan Chu, Jeng-Shyang Pan, Tsu-Yang Wu:
An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 39(1/2): 1-19 (2022) - [j69]Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen, Yu-Xi Hu, Tsu-Yang Wu:
Simple multi-scale human abnormal behaviour detection based on video. Int. J. Inf. Comput. Secur. 17(3/4): 310-320 (2022) - [j68]Jianqing Gao, Haiyang Zou, Fuquan Zhang, Tsu-Yang Wu:
An intelligent stage light-based actor identification and positioning system. Int. J. Inf. Comput. Secur. 18(1/2): 204-218 (2022) - [j67]Yingran Ma, Yanjun Peng, Tsu-Yang Wu:
Transfer learning model for false positive reduction in lymph node detection via sparse coding and deep learning. J. Intell. Fuzzy Syst. 43(2): 2121-2133 (2022) - [j66]Naidan Feng, Tsu-Yang Wu, Yongquan Liang:
A deep dynamic neural network model and its application for ECG classification. J. Intell. Fuzzy Syst. 43(2): 2147-2154 (2022) - [j65]Tsu-Yang Wu, Qian Meng, Saru Kumari, Peng Zhang:
Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments. Sensors 22(10): 3858 (2022) - [j64]Tsu-Yang Wu, Fangfang Kong, Liyang Wang, Yeh-Cheng Chen, Saru Kumari, Jeng-Shyang Pan:
Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm. Sensors 22(23): 9174 (2022) - [j63]Tsu-Yang Wu, Xinglan Guo, Yeh-Cheng Chen, Saru Kumari, Chien-Ming Chen:
SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing. Symmetry 14(7): 1393 (2022) - [j62]Tsu-Yang Wu, Qian Meng, Lei Yang, Xinglan Guo, Saru Kumari:
A provably secure lightweight authentication protocol in mobile edge computing environments. J. Supercomput. 78(12): 13893-13914 (2022) - 2021
- [j61]Tsu-Yang Wu, Xinglan Guo, Lei Yang, Qian Meng, Chien-Ming Chen:
A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles. Mob. Inf. Syst. 2021: 3277113:1-3277113:14 (2021) - [j60]Tsu-Yang Wu, Lei Yang, Jia-Ning Luo, Jimmy Ming-Tai Wu:
A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments. Secur. Commun. Networks 2021: 2299632:1-2299632:15 (2021) - [j59]Tsu-Yang Wu, Lei Yang, Zhiyuan Lee, Chien-Ming Chen, Jeng-Shyang Pan, SK Hafizul Islam:
Improved ECC-Based Three-Factor Multiserver Authentication Scheme. Secur. Commun. Networks 2021: 6627956:1-6627956:14 (2021) - [j58]Tsu-Yang Wu, Tao Wang, Yu-Qi Lee, Weimin Zheng, Saru Kumari, Sachin Kumar:
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System. Secur. Commun. Networks 2021: 6658041:1-6658041:16 (2021) - [j57]Tsu-Yang Wu, Zhiyuan Lee, Lei Yang, Chien-Ming Chen:
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks. Secur. Commun. Networks 2021: 9944460:1-9944460:17 (2021) - [j56]Tsu-Yang Wu, Zhiyuan Lee, Lei Yang, Jia-Ning Luo, Raylin Tso:
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J. Supercomput. 77(7): 6992-7020 (2021) - [j55]Tsu-Yang Wu, Lei Yang, Zhiyuan Lee, Shu-Chuan Chu, Saru Kumari, Sachin Kumar:
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2021: 5537018:1-5537018:15 (2021) - 2020
- [j54]Tsu-Yang Wu, Zhiyuan Lee, Mohammad S. Obaidat, Saru Kumari, Sachin Kumar, Chien-Ming Chen:
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks. IEEE Access 8: 28096-28108 (2020) - [j53]Fuquan Zhang, Tsu-Yang Wu, Yiou Wang, Rui Xiong, Gangyi Ding, Peng Mei, Laiyang Liu:
Application of Quantum Genetic Optimization of LVQ Neural Network in Smart City Traffic Network Prediction. IEEE Access 8: 104555-104564 (2020) - [j52]Raylin Tso, Kaibin Huang, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Tsu-Yang Wu:
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing. IEEE Access 8: 152551-152564 (2020) - [j51]Jianneng Chen, Zhen-Jie Huang, Yu-Ping Zhou, Fumin Zou, Chien-Ming Chen, Jimmy Ming-Tai Wu, Tsu-Yang Wu:
Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks. IET Networks 9(6): 290-297 (2020) - [j50]Tsu-Yang Wu, Jerry Chun-Wei Lin, Unil Yun, Chun-Hao Chen, Gautam Srivastava, Xianbiao Lv:
An efficient algorithm for fuzzy frequent itemset mining. J. Intell. Fuzzy Syst. 38(5): 5787-5797 (2020) - [c42]Zhaoshan Sun, Jeng-Shyang Pan, Chi-Hua Chen, Tsu-Yang Wu:
A Probability-Based Analytical Model Based on Deep Learning for Traffic Information Estimation. ICCE-TW 2020: 1-2 - [c41]Yan Wang, Jeng-Shyang Pan, Chi-Hua Chen, Tsu-Yang Wu:
Data Filtering Method for the Optimization of Mobile Positioning Based on Deep Learning. ICCE-TW 2020: 1-2
2010 – 2019
- 2019
- [j49]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu:
Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments. IEEE Access 7: 49232-49239 (2019) - [j48]Eric Ke Wang, Xun Zhang, Fan Wang, Tsu-Yang Wu, Chien-Ming Chen:
Multilayer Dense Attention Model for Image Caption. IEEE Access 7: 66358-66368 (2019) - [j47]Lanlan Kang, Ruey-Shun Chen, Yeh-Cheng Chen, Chung-Chei Wang, Xingguan Li, Tsu-Yang Wu:
Using Cache Optimization Method to Reduce Network Traffic in Communication Systems Based on Cloud Computing. IEEE Access 7: 124397-124409 (2019) - [j46]Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Chin-Feng Lai, Naixue Xiong, Jimmy Ming-Tai Wu:
A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems. IEEE Access 7: 181434-181443 (2019) - [j45]Fuquan Zhang, Tsu-Yang Wu, Guangyuan Zheng:
Video salient region detection model based on wavelet transform and feature comparison. EURASIP J. Image Video Process. 2019: 58 (2019) - [j44]Fuquan Zhang, Tsu-Yang Wu, Jeng-Shyang Pan, Gangyi Ding, Zuoyong Li:
Human motion recognition based on SVM in VR art media interaction environment. Hum. centric Comput. Inf. Sci. 9: 40 (2019) - [j43]Chien-Ming Chen, King-Hang Wang, Kuo-Hui Yeh, Bin Xiang, Tsu-Yang Wu:
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J. Ambient Intell. Humaniz. Comput. 10(8): 3133-3142 (2019) - [j42]Trong-The Nguyen, Jeng-Shyang Pan, Tsu-Yang Wu, Thi-Kien Dao, Trinh-Dong Nguyen:
Node Coverage Optimization Strategy Based on Ions Motion Optimization. J. Netw. Intell. 4(1): 1-9 (2019) - [j41]Shun-Miao Zhang, Xin Su, Xin-hua Jiang, Ming-long Chen, Tsu-Yang Wu:
A Traffic Prediction Method of Bicycle-sharing based on Long and Short term Memory Network. J. Netw. Intell. 4(2): 17-29 (2019) - [c40]Tsu-Yang Wu, Zhiyuan Lee, Yanyu Huang, Chien-Ming Chen, Yeh-Cheng Chen:
Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing. ICCE-TW 2019: 1-2 - [c39]Xiao-Cong Liang, Tsu-Yang Wu, Yu-Qi Lee, Tao Wang, Chien-Ming Chen, Yeh-Cheng Chen:
Cryptanalysis of an Anonymous Message Authentication Scheme for Smart Grid. ICGEC 2019: 455-461 - [c38]Lei Yang, Tsu-Yang Wu, Zhiyuan Lee, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Shu-Chuan Chu, Mu-En Wu:
Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks. ICGEC 2019: 462-467 - [c37]Zhiyuan Lee, Tsu-Yang Wu, Lei Yang, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Shu-Chuan Chu, Yeh-Cheng Chen:
A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks. ICGEC 2019: 468-473 - 2018
- [j40]Chun-Ta Li, Tsu-Yang Wu, Chien-Ming Chen:
A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps. IEEE Access 6: 66742-66753 (2018) - [j39]Tsu-Yang Wu, Chao Meng, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan:
Comments on Recent Proposed Cui Et Al.'s KASE and Lu Et Al.'s dIBEKS Schemes. J. Inf. Hiding Multim. Signal Process. 9(1): 162-169 (2018) - [j38]Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Jeng-Shyang Pan, Chien-Ming Chen, Jimmy Ming-Tai Wu:
Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map. J. Inf. Hiding Multim. Signal Process. 9(4): 1050-1057 (2018) - [j37]Jianneng Chen, Fumin Zou, Tsu-Yang Wu, Yu-Ping Zhou:
A New Certificate-Based Aggregate Signature Scheme for Wireless Sensor Networks. J. Inf. Hiding Multim. Signal Process. 9(5): 1264-1280 (2018) - [j36]Chien-Ming Chen, Guangjie Wang, Weicheng Fang, Tsu-Yang Wu:
A New Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. J. Inf. Hiding Multim. Signal Process. 9(6): 1595-1602 (2018) - [j35]Chien-Ming Chen, Weicheng Fang, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, King-Hang Wang:
Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol. J. Inf. Sci. Eng. 34(2): 371-390 (2018) - [j34]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Weimin Zheng, Shu-Chuan Chu, John F. Roddick:
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review. J. Netw. Intell. 3(1): 16-25 (2018) - [j33]King-Hang Wang, Chien-Ming Chen, Weicheng Fang, Tsu-Yang Wu:
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J. Supercomput. 74(1): 65-70 (2018) - [c36]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, Jeng-Shyang Pan:
A Public Auditing Scheme with Data Recovery. ICGEC 2018: 595-602 - [c35]Jimmy Ming-Tai Wu, Meng-Hsiun Tsai, Sheng-Han Xiao, Tsu-Yang Wu:
Construct Left Ventricular Hypertrophy Prediction Model Based on Random Forest. IIH-MSP (1) 2018: 142-150 - [c34]Chien-Ming Chen, Yanyu Huang, Xiaoting Deng, Tsu-Yang Wu:
On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor. IIH-MSP (1) 2018: 171-177 - [c33]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, Jeng-Shyang Pan:
Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme. IIH-MSP (1) 2018: 178-183 - 2017
- [j32]Chien-Ming Chen, Chun-Ta Li, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan:
A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System. IEEE Access 5: 3410-3422 (2017) - [j31]Tsu-Yang Wu, Yuh-Min Tseng, Sen-Shan Huang, Yi-Chen Lai:
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems. IEEE Access 5: 19333-19341 (2017) - [j30]Hong Ma, Tsu-Yang Wu, Min Chen, Rong-Hua Yang, Jeng-Shyang Pan:
A Parse Tree-Based NoSQL Injection Attacks Detection Mechanism. J. Inf. Hiding Multim. Signal Process. 8(4): 916-928 (2017) - [j29]King-Hang Wang, Chien-Ming Chen, Weicheng Fang, Tsu-Yang Wu:
A secure authentication scheme for Internet of Things. Pervasive Mob. Comput. 42: 15-26 (2017) - [j28]Chun-Ta Li, Tsu-Yang Wu, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen:
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors 17(7): 1482 (2017) - [j27]Tsu-Yang Wu, Chien-Ming Chen, Xiuyang Sun, Shuai Liu, Jerry Chun-Wei Lin:
A Countermeasure to SQL Injection Attack for Cloud Environment. Wirel. Pers. Commun. 96(4): 5279-5293 (2017) - [c32]Tsu-Yang Wu, Yueshan Lin, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan:
Comments on Yu et al's Shared Data Integrity Verification Protocol. ECC 2017: 73-78 - [c31]Tsu-Yang Wu, Weicheng Fang, Chien-Ming Chen, Eric Ke Wang:
Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards. ECC 2017: 79-87 - [c30]Tsu-Yang Wu, Jerry Chun-Wei Lin, Yuyu Zhang:
Mining of Multiple Fuzzy Frequent Itemsets with Transaction Insertion. ECC 2017: 137-144 - [c29]Tsu-Yang Wu, Jerry Chun-Wei Lin, Yinan Shao, Philippe Fournier-Viger, Tzung-Pei Hong:
Updating the Discovered High Average-Utility Patterns with Transaction Insertion. ICGEC 2017: 66-73 - [c28]Tsu-Yang Wu, Bin Xiang, Guangjie Wang, Chien-Ming Chen, Eric Ke Wang:
Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. ICGEC 2017: 191-198 - [c27]Tsu-Yang Wu, Chao Meng, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan:
Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme. ICGEC 2017: 199-205 - [c26]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen:
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System". ICISA 2017: 282-289 - [c25]Tsu-Yang Wu, Chao Meng, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan:
On the Security of a Certificateless Public Key Encryption with Keyword Search. IIH-MSP (1) 2017: 191-197 - [c24]Tsu-Yang Wu, Jerry Chun-Wei Lin, Shifeng Ren:
Efficient Mining of High Average-Utility Itemsets with Multiple Thresholds. IIH-MSP (1) 2017: 198-205 - [c23]Tsu-Yang Wu, Weicheng Fang, Chien-Ming Chen, Guangjie Wang:
Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks. IIH-MSP (1) 2017: 206-213 - [c22]Tsu-Yang Wu, Yueshan Lin, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan, Mu-En Wu:
Comments on a privacy preserving public auditing mechanism for shared cloud data. MISNC 2017: 48:1-48:6 - 2016
- [j26]Jerry Chun-Wei Lin, Tsu-Yang Wu, Philippe Fournier-Viger, Guo Lin, Justin Zhan, Miroslav Voznák:
Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining. Eng. Appl. Artif. Intell. 55: 269-284 (2016) - [j25]Yu Chen, Chien-Ming Chen, Jeng-Shyang Pan, Tsu-Yang Wu, Shuai Liu:
Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps. J. Inf. Hiding Multim. Signal Process. 7(6): 1365-1372 (2016) - [j24]Chien-Ming Chen, Linlin Xu, Tsu-Yang Wu, Ci-Rong Li:
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol. J. Netw. Intell. 1(2): 61-66 (2016) - [c21]Jerry Chun-Wei Lin, Xianbiao Lv, Philippe Fournier-Viger, Tsu-Yang Wu, Tzung-Pei Hong:
Efficient Mining of Fuzzy Frequent Itemsets with Type-2 Membership Functions. ACIIDS (2) 2016: 191-200 - [c20]Chien-Ming Chen, Xiaojie Zhang, Tsu-Yang Wu:
A Secure Condition-Based Location Authentication Protocol for Mobile Devices. CMCSN 2016: 146-149 - [c19]Tsu-Yang Wu, Fanya Meng, Chien-Ming Chen, Shuai Liu, Jeng-Shyang Pan:
On the Security of a Certificateless Searchable Public Key Encryption Scheme. ICGEC 2016: 113-119 - 2015
- [j23]Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang:
A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321: 224-237 (2015) - [j22]Eric Ke Wang, Zhenjie Cao, Tsu-Yang Wu, Chien-Ming Chen:
MAPMP: A Mutual Authentication Protocol for Mobile Payment. J. Inf. Hiding Multim. Signal Process. 6(4): 697-707 (2015) - [j21]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks. J. Univers. Comput. Sci. 21(3): 406-418 (2015) - [c18]Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang:
An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme. ICGEC (2) 2015: 3-9 - [c17]Jerry Chun-Wei Lin, Tsu-Yang Wu, Philippe Fournier-Viger, Guo Lin, Tzung-Pei Hong, Jeng-Shyang Pan:
A Sanitization Approach of Privacy Preserving Utility Mining. ICGEC (2) 2015: 47-57 - [c16]Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang:
Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme. IIH-MSP 2015: 203-206 - [c15]Eric Ke Wang, Huan Liu, Gang Wang, Yuming Ye, Tsu-Yang Wu, Chien-Ming Chen:
Context recognition for adaptive hearing-aids. INDIN 2015: 1102-1107 - [c14]Eric Ke Wang, Chun-Wei Lin, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye:
Privacy Protection Framework in Social Networked Cars. MISNC 2015: 553-561 - [c13]Chien-Ming Chen, Linlin Xu, Xiaojie Zhang, Tsu-Yang Wu, Jeng-Shyang Pan:
On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps. RVSP 2015: 143-146 - 2014
- [j20]Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng:
Efficient searchable ID-based encryption with a designated server. Ann. des Télécommunications 69(7-8): 391-402 (2014) - [j19]Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu:
RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE. Informatica 25(2): 299-326 (2014) - [c12]Tsu-Yang Wu, Chengxiang Zhou, Eric Ke Wang, Jeng-Shyang Pan, Chien-Ming Chen:
Towards Time-Bound Hierarchical Key Management in Cloud Computing. ECC (1) 2014: 31-38 - [c11]Xinying Zheng, Chien-Ming Chen, Tsu-Yang Wu, Eric Ke Wang, Tsui-Ping Chung:
Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID. ECC (1) 2014: 145-153 - [c10]Tsu-Yang Wu, Jeng-Shyang Pan, Chien-Ming Chen, Chun-Wei Lin:
Towards SQL Injection Attacks Detection Mechanism Using Parse Tree. ICGEC 2014: 371-380 - [c9]Eric Ke Wang, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye, Zhujin Zhang, Futai Zou:
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things. ICGEC 2014: 389-397 - [c8]Chun-Wei Lin, Tsu-Yang Wu, Guo Lin, Tzung-Pei Hong:
Maintenance algorithm for updating the discovered multiple fuzzy frequent itemsets for transaction deletion. ICMLC 2014: 475-480 - [c7]Tsu-Yang Wu, Chengxiang Zhou, Chien-Ming Chen, Eric Ke Wang, Jeng-Shyang Pan:
Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control. MISNC 2014: 437-444 - [c6]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu:
Security Analysis and Improvement of Femtocell Access Control. NSS 2014: 223-232 - 2013
- [j18]Tsu-Yang Wu, Yuh-Min Tseng:
Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Inf. Secur. 7(3): 239-246 (2013) - [j17]Yuh-Min Tseng, Tung-Tso Tsai, Tsu-Yang Wu:
Efficient Revocable Multi-Receiver ID-Based Encryption. Inf. Technol. Control. 42(2): 159-169 (2013) - [j16]Tsu-Yang Wu, Yuh-Min Tseng:
Further analysis of pairing-based traitor tracing schemes for broadcast encryption. Secur. Commun. Networks 6(1): 28-32 (2013) - [j15]Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu:
Provably secure revocable ID-based signature in the standard model. Secur. Commun. Networks 6(10): 1250-1260 (2013) - [j14]Chien-Ming Chen, King-Hang Wang, Tsu-Yang Wu, Jeng-Shyang Pan, Hung-Min Sun:
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices. IEEE Trans. Inf. Forensics Secur. 8(8): 1318-1330 (2013) - [c5]Wei Kan, Tsu-Yang Wu, Tao Han, Chun-Wei Lin, Chien-Ming Chen, Jeng-Shyang Pan:
An Efficient Detecting Mechanism for Cross-Site Script Attacks in the Cloud. EMC/HumanCom 2013: 663-672 - 2012
- [j13]Tsu-Yang Wu, Yuh-Min Tseng, Tung-Tso Tsai:
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants. Comput. Networks 56(12): 2994-3006 (2012) - [j12]Tsu-Yang Wu, Yuh-Min Tseng:
Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants. Informatica 23(2): 315-334 (2012) - [j11]Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu:
A Fully Secure Revocable ID-Based Encryption in the Standard Model. Informatica 23(3): 487-505 (2012) - [j10]Yuh-Min Tseng, Chen-Hung Yu, Tsu-Yang Wu:
Towards scalable key management for secure multicast communication. Inf. Technol. Control. 41(2): 173-182 (2012) - [j9]Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng:
A Revocable ID-based Signcryption Scheme. J. Inf. Hiding Multim. Signal Process. 3(3): 240-251 (2012) - [c4]Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng:
Revocable ID-based Signature Scheme with Batch Verifications. IIH-MSP 2012: 49-54 - 2011
- [j8]Tsu-Yang Wu, Yuh-Min Tseng, Ching-Wen Yu:
Two-round contributory group key exchange protocol for wireless network environments. EURASIP J. Wirel. Commun. Netw. 2011: 12 (2011) - [j7]Tsu-Yang Wu, Yuh-Min Tseng, Ching-Wen Yu:
A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks. J. Inf. Sci. Eng. 27(3): 915-932 (2011) - [j6]Tsu-Yang Wu, Yuh-Min Tseng:
A pairing-based publicly verifiable secret sharing scheme. J. Syst. Sci. Complex. 24(1): 186-194 (2011) - 2010
- [j5]