default search action
Chia-Hui Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Tzer-Long Chen, Chia-Hui Liu, Ya-Hui Ou, Yao-Min Huang, Zhen-Yu Wu:
An improved and efficient coercion-resistant measure for electronic voting system. Int. J. Inf. Sec. 23(4): 2637-2654 (2024) - [j14]Chia-Hui Liu, Zhen-Yu Wu:
Advanced authentication of IoT sensor network for industrial safety. Internet Things 27: 101297 (2024) - [j13]Chia-Hui Liu, Tzer-Long Chen, Chien-Yun Chang, Zhen-Yu Wu:
A reliable authentication scheme of personal health records in cloud computing. Wirel. Networks 30(5): 3759-3769 (2024) - 2022
- [j12]Shyh-Wei Chen, Po-Hsiang Chen, Ching-Tsorng Tsai, Chia-Hui Liu:
An Intelligent Based Symmetrical Classification of Online Shop Selling Counterfeit Products. Symmetry 14(10): 2132 (2022) - [c10]Shyh-Wei Chen, Po-Hsiang Chen, Ching-Tsorng Tsai, Chia-Hui Liu:
Development of Machine Learning Based Fraudulent Website Detection Scheme. ICKII 2022: 108-110 - 2021
- [j11]Hsuan-Yu Chen, Zhen-Yu Wu, Tzer-Long Chen, Yao-Min Huang, Chia-Hui Liu:
Security Privacy and Policy for Cryptographic Based Electronic Medical Information System. Sensors 21(3): 713 (2021) - [c9]Chia-Hui Liu:
Development of A Multi-functional Healthy Home Environment System. ICKII 2021: 115-117 - 2020
- [j10]Xianghu Liu, Chia-Hui Liu, Yang Li:
The Effects of Computer-Assisted Learning Based on Dual Coding Theory. Symmetry 12(5): 701 (2020) - [c8]Chin-Chia Hsu, Tzer-Long Chen, I Fang Chang, Zhen-Yu Wu, Chia-Hui Liu:
Design and Implementation a Smart Pillbox. 6GN 2020: 427-432 - [c7]Tzer-Long Chen, Chien-Yun Chang, Zhen-Yu Wu, Chia-Hui Liu:
Multi-function Electric Scooter Assistant System for Seniors. 6GN 2020: 433-438 - [c6]Zhan-Ping Su, Chin-Chia Hsu, Zhen-Yu Wu, Chia-Hui Liu:
The Development of Smart Home Disaster Prevention System. 6GN 2020: 445-451 - [c5]Hung-Jen Chen, Chin-Chia Hsu, Chia-Hui Liu:
An intelligent patrol system for Industry 4.0 Smart Factory. ICEA 2020: 8:1-8:2
2010 – 2019
- 2017
- [j9]Chia-Hui Liu, Yu-Fang Chung:
Secure user authentication scheme for wireless healthcare sensor networks. Comput. Electr. Eng. 59: 250-261 (2017) - 2016
- [j8]Shyh-Wei Chen, Dai-Lun Chiang, Chia-Hui Liu, Tzer-Shyong Chen, Feipei Lai, Huihui Wang, Wei Wei:
Confidentiality Protection of Digital Health Records in Cloud Computing. J. Medical Syst. 40(5): 124:1-124:12 (2016) - 2015
- [j7]Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen, Tzer-Shyong Chen:
Design of secure access control scheme for personal health record-based cloud healthcare service. Secur. Commun. Networks 8(7): 1332-1346 (2015) - 2013
- [j6]Yu-Fang Chung, Chia-Hui Liu:
Design of a Wireless Sensor Network Platform for Tele-Homecare. Sensors 13(12): 17156-17175 (2013) - [c4]Chia-Hui Liu, Fong-Qi Lin, Dai-Lun Chiang, Tzer-Long Chen, Chin-Sheng Chen, Han-Yu Lin, Yu-Fang Chung, Tzer-Shyong Chen:
Secure PHR Access Control Scheme for Healthcare Application Clouds. ICPP 2013: 1067-1076 - 2012
- [j5]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
Mobile Agent Application and Integration in Electronic Anamnesis System. J. Medical Syst. 36(3): 1009-1020 (2012) - [j4]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
The Enhancement of Security in Healthcare Information Systems. J. Medical Syst. 36(3): 1673-1688 (2012) - [j3]Chia-Hui Liu, Yu-Fang Chung, Te-Wei Chiang, Tzer-Shyong Chen, Sheng-De Wang:
A Mobile Agent Approach for Secure Integrated Medical Information Systems. J. Medical Syst. 36(5): 2731-2741 (2012) - [j2]Tzer-Shyong Chen, Chia-Hui Liu, Tzer-Long Chen, Chin-Sheng Chen, Jian-Guo Bau, Tzu-Ching Lin:
Secure Dynamic Access Control Scheme of PHR in Cloud Computing. J. Medical Syst. 36(6): 4005-4020 (2012)
2000 – 2009
- 2009
- [j1]Kuo-Hsuan Huang, Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen:
Efficient migration for mobile computing in distributed networks. Comput. Stand. Interfaces 31(1): 40-47 (2009) - [c3]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent. MUE 2009: 189-196 - 2008
- [c2]Yu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang:
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. AINA Workshops 2008: 650-655 - 2006
- [c1]Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen:
Threshold Signature Scheme Resistible for Conspiracy Attack. PDCAT 2006: 479-483
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint