default search action
Hsing-Bai Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j7]Tzung-Her Chen, Wei-Bin Lee, Hsing-Bai Chen, Chien-Lung Wang:
Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security. Symmetry 13(5): 855 (2021)
2010 – 2019
- 2019
- [j6]Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Tzungher Chen:
Secure and efficient protection for HTTP cookies with self-verification. Int. J. Commun. Syst. 32(2) (2019) - 2018
- [j5]Hsing-Bai Chen, Wei-Bin Lee, Tzungher Chen:
A novel DRM scheme for accommodating expectations of personal use. Multim. Tools Appl. 77(18): 23099-23114 (2018) - 2011
- [c6]Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Chia-Chi Yang:
An Anti-phishing User Authentication Scheme without Using a Sensitive Key Table. IIH-MSP 2011: 141-144 - 2010
- [c5]Wei-Bin Lee, Hsing-Bai Chen, Ching-Chih Cheng:
Secure communication between set-top box and smart card for fair use in DTV broadcasting. ISI 2010: 156-158
2000 – 2009
- 2009
- [j4]Tzungher Chen, Wei-Bin Lee, Hsing-Bai Chen:
A self-verification authentication mechanism for mobile satellite communication systems. Comput. Electr. Eng. 35(1): 41-48 (2009) - [c4]Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen:
Enhancement of the RFID security method with ownership transfer. ICUIMC 2009: 251-254 - 2008
- [j3]Hsing-Bai Chen, Tzungher Chen, Wei-Bin Lee, Chin-Chen Chang:
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. Comput. Stand. Interfaces 30(1-2): 95-99 (2008) - [j2]Tzungher Chen, Wei-Bin Lee, Hsing-Bai Chen:
A round- and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9): 1581-1590 (2008) - [c3]Ming-Way Huang, Hsing-Bai Chen, Wei-Bin Lee:
An Efficient Non-repudiation Mechanism for SIP-Based Services. IIH-MSP 2008: 1541-1544 - 2005
- [j1]Shiang-Feng Tzeng, Min-Shiang Hwang, Hsing-Bai Chen:
A secure on-line software transaction scheme. Comput. Stand. Interfaces 27(3): 303-312 (2005) - [c2]Wei-Bin Lee, Hsing-Bai Chen, Chyi-Ren Dow:
Remote User Authentication Scheme with User Anonymity. Security and Management 2005: 412-420 - [c1]Tzong-Jye Liu, Chia-Lin Lee, Chyi-Ren Dow, Wei-Bin Lee, Hsing-Bai Chen:
Self-Stabilization Neighborhood Synchronizer for Uniform Rings. PDPTA 2005: 346-352
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint