Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection CL Chen, YY Deng Engineering Applications of Artificial Intelligence 22 (8), 1284-1291, 2009 | 159 | 2009 |
An extended chaotic maps-based key agreement protocol with user anonymity CC Lee, CL Chen, CY Wu, SY Huang Nonlinear Dynamics 69 (1-2), 79-87, 2012 | 115 | 2012 |
Mobile device integration of a fingerprint biometric remote authentication scheme CL Chen, CC Lee, CY Hsu International Journal of Communication Systems 25 (5), 585-597, 2012 | 93 | 2012 |
A privacy authentication scheme based on cloud for medical environment CL Chen, TT Yang, ML Chiang, TF Shih Journal of medical systems 38 (11), 1-16, 2014 | 80 | 2014 |
The design of a secure anonymous Internet voting system YY Chen, JK Jan, CL Chen Computers & Security 23 (4), 330-337, 2004 | 76 | 2004 |
Compositional tailored sol-gel SiO 2–TiO 2 thin films: Crystallization, chemical bonding configuration, and optical properties LL Yang, YS Lai, JS Chen, PH Tsai, CL Chen, CJ Chang Journal of materials research 20 (11), 3141-3149, 2005 | 75 | 2005 |
A secure medical data exchange protocol based on cloud environment CL Chen, TT Yang, TF Shih Journal of medical systems 38 (9), 1-12, 2014 | 69 | 2014 |
A secure and traceable E-DRM system based on mobile device CL Chen Expert Systems with Applications 35 (3), 878-886, 2008 | 58 | 2008 |
RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards. CL Chen, YL Lai, CC Chen, YY Deng, YC Hwang IJ Network Security 13 (1), 41-48, 2011 | 55 | 2011 |
An ownership transfer scheme using mobile RFIDs CL Chen, CF Chien Wireless personal communications 68 (3), 1093-1119, 2013 | 41 | 2013 |
Using RFID yoking proof protocol to enhance inpatient medication safety CL Chen, CY Wu Journal of medical systems 36 (5), 2849-2864, 2012 | 38 | 2012 |
Dynamic session-key generation for wireless sensor networks CL Chen, CT Li EURASIP Journal on Wireless Communications and Networking 2008 (1), 1-10, 2008 | 35 | 2008 |
A mobile ticket system based on personal trusted device YY Chen, CL Chen, JK Jan Wireless Personal Communications 40 (4), 569-578, 2007 | 34 | 2007 |
A fair and secure mobile billing system YY Chen, JK Jan, CL Chen Computer Networks 48 (4), 517-524, 2005 | 34 | 2005 |
A secure anonymous e-voting system based on discrete logarithm problem CL Chen, YY Chen, JK Jan, CC Chen, 陳金鈴 Applied Mathematics & Information Sciences 8 (5), 2571-2578, 2014 | 33 | 2014 |
Group-based authentication to protect digital content for business applications CL Chen, YY Chen, YH Chen | 32 | 2009 |
A secure ownership transfer protocol using EPCglobal Gen-2 RFID CL Chen, YC Huang, JR Jiang Telecommunication Systems 53 (4), 387-399, 2013 | 28 | 2013 |
A location-dependent data encryption approach for enhancing mobile information system security HC Liao, PC Lee, YH Chao, CL Chen The 9th International Conference on Advanced Communication Technology 1, 625-628, 2007 | 28 | 2007 |
Extension of an efficient 3GPP authentication and key agreement protocol CC Lee, CL Chen, HH Ou, LA Chen Wireless Personal Communications 68 (3), 861-872, 2013 | 24 | 2013 |
A computation-efficient three-party encrypted key exchange protocol CC Lee, SD Chen, CL Chen Applied Mathematics & Information Sciences 6 (3), 573-579, 2012 | 22 | 2012 |