Chien-Ming Chen
Chien-Ming Chen
Associate Prof. at Harbin Institute of Technology (Shenzhen)
Dirección de correo verificada de hit.edu.cn
TítuloCitado porAño
Stolen-verifier attack on two new strong-password authentication protocols
CM Chen, WC Ku
IEICE Transactions on communications 85 (11), 2519-2521, 2002
1532002
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
1492011
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
WC Ku, CM Chen, HL Lee
IEICE Transactions on Communications 86 (5), 1682-1684, 2003
1062003
An efficient countermeasure to the selective forwarding attack in wireless sensor networks
HM Sun, CM Chen, YC Hsiao
TENCON 2007-2007 IEEE Region 10 Conference, 1-4, 2007
632007
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74 (1), 65-70, 2018
592018
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol
CM Chen, L Xu, TY Wu, CR Li
Journal of Network Intelligence, 2016
492016
Flexible-pay-per-channel: A new model for content access control in pay-TV broadcasting systems
HM Sun, CM Chen, CZ Shieh
IEEE Transactions on Multimedia 10 (6), 1109-1120, 2008
462008
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
WC Ku, CM Chen, HL Lee
ACM SIGOPS Operating Systems Review 37 (4), 19-25, 2003
452003
A defence scheme against Identity Theft Attack based on multiple social networks
BZ He, CM Chen, YP Su, HM Sun
Expert Systems with Applications 41 (5), 2345-2352, 2014
442014
Mobile jamming attack and its countermeasure in wireless sensor networks
HM Sun, SP Hsu, CM Chen
21st International Conference on Advanced Information Networking and …, 2007
432007
An efficient and verifiable concealed data aggregation scheme in wireless sensor networks
HM Sun, YC Hsiao, YH Lin, CM Chen
2008 International Conference on Embedded Software and Systems, 19-26, 2008
412008
A multilevel model of team cultural diversity and creativity: The role of climate for inclusion
CR Li, CJ Lin, YH Tien, CM Chen
The Journal of Creative Behavior 51 (2), 163-179, 2017
392017
A scalable transitive human-verifiable authentication protocol for mobile devices
CM Chen, KH Wang, TY Wu, JS Pan, HM Sun
IEEE Transactions on Information Forensics and Security 8 (8), 1318-1330, 2013
392013
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
CT Li, TY Wu, CL Chen, CC Lee, CM Chen
Sensors 17 (7), 1482, 2017
382017
A provable authenticated group key agreement protocol for mobile environment
HM Sun, BZ He, CM Chen, TY Wu, CH Lin, H Wang
Information Sciences 321, 224-237, 2015
382015
A secure authentication protocol for Internet of vehicles
CM Chen, B Xiang, Y Liu, KH Wang
IEEE Access 7, 12047-12057, 2019
352019
An improved digital rights management system based on smart cards
HM Sun, CF Hung, CM Chen
2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, 308-313, 2007
282007
A secure authentication scheme for Internet of Things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
242017
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”
CM Chen, W Fang, KH Wang, TY Wu
Nonlinear Dynamics 87 (3), 2073-2075, 2017
232017
A native apis protection mechanism in the kernel mode against malicious code
HM Sun, H Wang, KH Wang, CM Chen
IEEE Transactions on Computers 60 (6), 813-823, 2011
222011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20