


default search action
King-Hang Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j18]Chien-Ming Chen
, Yanyu Huang, King-Hang Wang, Saru Kumari
, Mu-En Wu:
A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 15(9): 1200-1215 (2021)
2010 – 2019
- 2019
- [j17]Chien-Ming Chen
, Bin Xiang, Yining Liu, King-Hang Wang
:
A Secure Authentication Protocol for Internet of Vehicles. IEEE Access 7: 12047-12057 (2019) - [j16]Tsu-Yang Wu
, Chien-Ming Chen
, King-Hang Wang, Jimmy Ming-Tai Wu
:
Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments. IEEE Access 7: 49232-49239 (2019) - [j15]Tsu-Yang Wu
, Xiaoning Fan, King-Hang Wang, Chin-Feng Lai
, Naixue Xiong
, Jimmy Ming-Tai Wu
:
A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems. IEEE Access 7: 181434-181443 (2019) - [j14]Chien-Ming Chen
, King-Hang Wang
, Kuo-Hui Yeh, Bin Xiang, Tsu-Yang Wu
:
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J. Ambient Intell. Humaniz. Comput. 10(8): 3133-3142 (2019) - [c11]Lei Yang, Tsu-Yang Wu
, Zhiyuan Lee, Chien-Ming Chen
, King-Hang Wang, Jeng-Shyang Pan
, Shu-Chuan Chu
, Mu-En Wu:
Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks. ICGEC 2019: 462-467 - [c10]Zhiyuan Lee, Tsu-Yang Wu
, Lei Yang, Chien-Ming Chen
, King-Hang Wang, Jeng-Shyang Pan
, Shu-Chuan Chu
, Yeh-Cheng Chen:
A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks. ICGEC 2019: 468-473 - 2018
- [j13]Tsu-Yang Wu, Chao Meng, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan:
Comments on Recent Proposed Cui Et Al.'s KASE and Lu Et Al.'s dIBEKS Schemes. J. Inf. Hiding Multim. Signal Process. 9(1): 162-169 (2018) - [j12]Tsu-Yang Wu, Xiaoning Fan, King-Hang Wang, Jeng-Shyang Pan, Chien-Ming Chen, Jimmy Ming-Tai Wu:
Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map. J. Inf. Hiding Multim. Signal Process. 9(4): 1050-1057 (2018) - [j11]Chien-Ming Chen, Weicheng Fang, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, King-Hang Wang:
Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol. J. Inf. Sci. Eng. 34(2): 371-390 (2018) - [j10]Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Weimin Zheng, Shu-Chuan Chu, John F. Roddick:
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review. J. Netw. Intell. 3(1): 16-25 (2018) - [j9]King-Hang Wang
, Chien-Ming Chen
, Weicheng Fang, Tsu-Yang Wu
:
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J. Supercomput. 74(1): 65-70 (2018) - [c9]Tsu-Yang Wu
, Chien-Ming Chen
, King-Hang Wang, Jimmy Ming-Tai Wu, Jeng-Shyang Pan
:
A Public Auditing Scheme with Data Recovery. ICGEC 2018: 595-602 - [c8]Tsu-Yang Wu
, Chien-Ming Chen
, King-Hang Wang
, Jimmy Ming-Tai Wu, Jeng-Shyang Pan
:
Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme. IIH-MSP (1) 2018: 178-183 - 2017
- [j8]King-Hang Wang
, Chien-Ming Chen
, Weicheng Fang, Tsu-Yang Wu
:
A secure authentication scheme for Internet of Things. Pervasive Mob. Comput. 42: 15-26 (2017) - [c7]Tsu-Yang Wu
, Yueshan Lin, King-Hang Wang
, Chien-Ming Chen
, Jeng-Shyang Pan
:
Comments on Yu et al's Shared Data Integrity Verification Protocol. ECC 2017: 73-78 - [c6]Tsu-Yang Wu
, Chao Meng, King-Hang Wang
, Chien-Ming Chen
, Jeng-Shyang Pan
:
Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme. ICGEC 2017: 199-205 - [c5]Tsu-Yang Wu
, Chao Meng, Chien-Ming Chen
, King-Hang Wang
, Jeng-Shyang Pan
:
On the Security of a Certificateless Public Key Encryption with Keyword Search. IIH-MSP (1) 2017: 191-197 - [c4]Tsu-Yang Wu
, Yueshan Lin, King-Hang Wang
, Chien-Ming Chen
, Jeng-Shyang Pan
, Mu-En Wu:
Comments on a privacy preserving public auditing mechanism for shared cloud data. MISNC 2017: 48:1-48:6 - 2014
- [j7]Shuai-Min Chen, Mu-En Wu, Hung-Min Sun, King-Hang Wang
:
CRFID: An RFID system with a cloud database as a back-end server. Future Gener. Comput. Syst. 30: 155-161 (2014) - 2013
- [j6]Chien-Ming Chen
, King-Hang Wang
, Tsu-Yang Wu
, Jeng-Shyang Pan
, Hung-Min Sun:
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices. IEEE Trans. Inf. Forensics Secur. 8(8): 1318-1330 (2013) - 2011
- [j5]Hung-Min Sun, Hsun Wang, King-Hang Wang
, Chien-Ming Chen
:
A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code. IEEE Trans. Computers 60(6): 813-823 (2011) - [j4]Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
:
On the Security of Chien's Ultralightweight RFID Authentication Protocol. IEEE Trans. Dependable Secur. Comput. 8(2): 315-317 (2011) - 2010
- [j3]Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao
, Eric Li-Hsiang Kuo, Jonathan M. McCune, King-Hang Wang
, Maxwell N. Krohn, Adrian Perrig, Bo-Yin Yang, Hung-Min Sun, Phen-Lan Lin, Jason Lee:
SPATE: Small-Group PKI-Less Authenticated Trust Establishment. IEEE Trans. Mob. Comput. 9(12): 1666-1681 (2010)
2000 – 2009
- 2009
- [j2]Hung-Min Sun, King-Hang Wang
, Chien-Ming Chen
:
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. IEEE Trans. Dependable Secur. Comput. 6(2): 159-160 (2009) - [j1]Hung-Min Sun, King-Hang Wang
, Wei-Chih Ting:
On the security of the secure arithmetic code. IEEE Trans. Inf. Forensics Secur. 4(4): 781-789 (2009) - [c3]Hsu-Chun Hsiao
, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang
, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
A Study of User-Friendly Hash Comparison Schemes. ACSAC 2009: 105-114 - [c2]Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao
, Jonathan M. McCune, King-Hang Wang
, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
SPATE: small-group PKI-less authenticated trust establishment. MobiSys 2009: 1-14 - 2008
- [c1]Hung-Min Sun, King-Hang Wang
:
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. ISECS 2008: 385-389 - [i1]Hung-Min Sun, Wei-Chih Ting, King-Hang Wang:
On the Security of Chien's Ultralightweight RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2008: 83 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint