Follow
Tsu-Yang Wu (吳祖揚)
Title
Cited by
Cited by
Year
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019
1512019
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
1502019
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74, 65-70, 2018
1472018
Application of quantum genetic optimization of LVQ neural network in smart city traffic network prediction
F Zhang, TY Wu*, Y Wang, R Xiong, G Ding, P Mei, L Liu
IEEE Access 8, 104555-104564, 2020
1452020
An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system
CT Li, TY Wu, CL Chen, CC Lee, CM Chen
Sensors 17 (7), 1482, 2017
1432017
An authenticated key exchange protocol for multi-server architecture in 5G networks
TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar, CM Chen
IEEE Access 8, 28096-28108, 2020
1252020
A secure authentication scheme for internet of things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
1152017
An efficient user authentication and key exchange protocol for mobile client–server environment
TY Wu, YM Tseng
Computer Networks 54 (9), 1520-1530, 2010
1132010
A pairing-based user authentication scheme for wireless clients with smart cards
YM Tseng, TY Wu, JD Wu
Informatica 19 (2), 285-302, 2008
972008
Human motion recognition based on SVM in VR art media interaction environment
F Zhang, TY Wu*, JS Pan, G Ding, Z Li
Human-centric Computing and Information Sciences 9 (1), 1-15, 2019
932019
An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks
CM Chen, B Xiang, TY Wu, KH Wang
Applied Sciences 8 (7), 1074, 2018
852018
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System
TY Wu, T Wang, YQ Lee, W Zheng, S Kumari, S Kumar
Security and Communication Networks 2021, 6658041, 2021
822021
Efficient searchable ID-based encryption with a designated server
TY Wu, TT Tsai, YM Tseng
annals of telecommunications-annales des télécommunications 69 (7-8), 391-402, 2014
752014
A grid-based swarm intelligence algorithm for privacy-preserving data mining
TY Wu, JCW Lin, Y Zhang, CH Chen
Applied Sciences 9 (4), 774, 2019
732019
Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining
JCW Lin, TY Wu, P Fournier-Viger, G Lin, J Zhan, M Voznak
Engineering Applications of Artificial Intelligence 55, 269-284, 2016
732016
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.
CM Chen, L Xu, TY Wu, CR Li
J. Netw. Intell. 1 (2), 61-66, 2016
732016
An ID-based mutual authentication and key exchange protocol for low-power mobile devices
TY Wu, YM Tseng
The Computer Journal 53 (7), 1062-1070, 2010
722010
Multilayer dense attention model for image caption
EK Wang, X Zhang, F Wang, TY Wu, CM Chen
IEEE Access 7, 66358-66368, 2019
712019
Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
TY Wu, X Guo, YC Chen, S Kumari, CM Chen
Drones 6 (1), 10, 2022
632022
Improved ECC-Based Three-Factor Multiserver Authentication Scheme
TY Wu, L Yang, Z Lee, CM Chen, JS Pan, SKH Lslam
Security and Communication Networks 2021, 6627956, 2021
632021
The system can't perform the operation now. Try again later.
Articles 1–20