default search action
Woei-Jiunn Tsaur
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Chin-Ling Chen, Wanbing Zhan, Woei-Jiunn Tsaur, Der-Chen Huang, Ling-Chun Liu:
Constructing a Secure Charity NFT Auction Platform Using Fisco Bcos Blockchain for Enhancing Transparency and Traceability. IEEE Access 12: 36924-36941 (2024) - [j30]Chinyang Henry Tseng, Woei-Jiunn Tsaur, Yueh-Mao Shen:
Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection. Future Internet 16(1): 25 (2024) - [j29]Chin-Ling Chen, Yong-Yuan Deng, Shunzhi Zhu, Woei-Jiunn Tsaur, Wei Weng:
An IoT and blockchain based logistics application of UAV. Multim. Tools Appl. 83(1): 655-684 (2024) - 2023
- [j28]Chinyang Henry Tseng, Woei-Jiunn Tsaur:
FFK: Fourier-Transform Fuzzy-c-means Kalman-Filter Based RSSI Filtering Mechanism for Indoor Positioning. Sensors 23(19): 8274 (2023) - [j27]Zongli Ye, Chin-Ling Chen, Wei Weng, Hongyu Sun, Woei-Jiunn Tsaur, Yong-Yuan Deng:
An anonymous and fair auction system based on blockchain. J. Supercomput. 79(13): 13909-13951 (2023) - 2022
- [j26]Woei-Jiunn Tsaur, Jen-Chun Chang, Chin-Ling Chen:
A Highly Secure IoT Firmware Update Mechanism Using Blockchain. Sensors 22(2): 530 (2022) - [j25]Chin-Ling Chen, Jiaxin Yang, Woei-Jiunn Tsaur, Wei Weng, Chih-Ming Wu, Xiaojun Wei:
Enterprise Data Sharing with Privacy-Preserved Based on Hyperledger Fabric Blockchain in IIOT's Application. Sensors 22(3): 1146 (2022) - [j24]Chin-Ling Chen, Zhi-Peng Zhu, Ming Zhou, Woei-Jiunn Tsaur, Chih-Ming Wu, Hongyu Sun:
A Secure and Traceable Vehicles and Parts System Based on Blockchain and Smart Contract. Sensors 22(18): 6754 (2022) - [j23]Chin-Ling Chen, Cheng-Chen Fang, Ming Zhou, Woei-Jiunn Tsaur, Hongyu Sun, Wanbing Zhan, Yong-Yuan Deng:
A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System. Symmetry 14(9): 1827 (2022) - 2021
- [j22]Chin-Ling Chen, Xin Shang, Woei-Jiunn Tsaur, Wei Weng, Yong-Yuan Deng, Chih-Ming Wu, Jianfeng Cui:
An Anti-Counterfeit and Traceable Management System for Brand Clothing with Hyperledger Fabric Framework. Symmetry 13(11): 2048 (2021)
2010 – 2019
- 2019
- [j21]Woei-Jiunn Tsaur, Lo-Yao Yeh:
DANS: A Secure and Efficient Driver-Abnormal Notification Scheme With IoT Devices Over IoV. IEEE Syst. J. 13(2): 1628-1639 (2019) - 2018
- [c19]Chin-Ling Chen, Chang-Cheng Ku, Yong-Yuan Deng, Woei-Jiunn Tsaur:
Automatic detection for online games bot with APP. FMEC 2018: 289-294 - 2017
- [j20]Yong-Yuan Deng, Chin-Ling Chen, Woei-Jiunn Tsaur, Yung-Wen Tang, Jung-Hsuan Chen:
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System. Sensors 17(12): 2919 (2017) - [j19]Lo-Yao Yeh, Woei-Jiunn Tsaur, Hsin-Han Huang:
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control. ACM Trans. Intell. Syst. Technol. 9(1): 10:1-10:23 (2017) - 2015
- [j18]Chinyang Henry Tseng, Shiau-Huey Wang, Woei-Jiunn Tsaur:
Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection. IEEE Trans. Reliab. 64(3): 1078-1085 (2015) - 2014
- [j17]Chin-Ling Chen, Woei-Jiunn Tsaur, Yu-Yi Chen, Yao-Chung Chang:
A secure mobile DRM system based on cloud architecture. Comput. Sci. Inf. Syst. 11(3): 925-941 (2014) - 2013
- [j16]Chin-Ling Chen, Wei-Chen Tsai, Yu-Yi Chen, Woei-Jiunn Tsaur:
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET. Inf. Technol. Control. 42(4): 369-379 (2013) - 2012
- [j15]Woei-Jiunn Tsaur:
Secure communication for electronic business applications in mobile agent networks. Expert Syst. Appl. 39(1): 1046-1054 (2012) - [j14]Woei-Jiunn Tsaur, Jia-Hong Li, Wei-Bin Lee:
An efficient and secure multi-server authentication scheme with key agreement. J. Syst. Softw. 85(4): 876-882 (2012) - [j13]Woei-Jiunn Tsaur:
Strengthening digital rights management using a new driver-hidden rootkit. IEEE Trans. Consumer Electron. 58(2): 479-483 (2012) - [j12]Lo-Yao Yeh, Woei-Jiunn Tsaur:
A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems. IEEE Trans. Multim. 14(6): 1690-1693 (2012) - [j11]Lo-Yao Yeh, Yu-Lun Huang, Anthony D. Joseph, Shiuhpyng Winston Shieh, Woei-Jiunn Tsaur:
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks. IEEE Trans. Veh. Technol. 61(4): 1907-1924 (2012) - 2011
- [c18]Hsiu-Sen Chiang, Woei-Jiunn Tsaur:
Identifying Smartphone Malware Using Data Mining Technology. ICCCN 2011: 1-6 - 2010
- [c17]Woei-Jiunn Tsaur, Yuh-Chen Chen:
Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit. SocialCom/PASSAT 2010: 842-848 - [c16]Woei-Jiunn Tsaur, Chia Chun Wu:
A Secure Smart-Card-based Password Authenticated Key Agreement Scheme in Multi-server Environments. SocialCom/PASSAT 2010: 999-1003 - [c15]Hsiu-Sen Chiang, Woei-Jiunn Tsaur:
Mobile Malware Behavioral Analysis and Preventive Strategy Using Ontology. SocialCom/PASSAT 2010: 1080-1085
2000 – 2009
- 2009
- [c14]Woei-Jiunn Tsaur, You-Mine Lin:
An Agent-Based Single Sign-On Scheme for Web Services Environments. Security and Management 2009: 220-226 - [c13]Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai:
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. ICA3PP 2009: 202-213 - 2008
- [j10]Chia Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur:
A Secure Authentication Scheme with Anonymity for Wireless Communications. IEEE Commun. Lett. 12(10): 722-723 (2008) - [c12]Woei-Jiunn Tsaur, Ying-Jui Huang:
Constructing Secure Commercial Vehicle Operation Systems Based on XML and RFID Techniques. CSREA EEE 2008: 393-399 - 2007
- [j9]Wei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur:
A novel deniable authentication protocol using generalized ElGamal signature scheme. Inf. Sci. 177(6): 1376-1381 (2007) - [c11]Woei-Jiunn Tsaur, Haw-Tyng Pai:
Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks. ISPA Workshops 2007: 475-484 - [c10]Woei-Jiunn Tsaur, Haw-Tyng Pai:
A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks. ISPA Workshops 2007: 513-522 - [c9]Chia Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur:
A secure protocol for misbehavior-penalization-based fair digital signature exchange. IWCMC 2007: 138-139 - [c8]Woei-Jiunn Tsaur, Haw-Tyng Pai:
A new security scheme for on-demand source routing in mobile ad hoc networks. IWCMC 2007: 577-582 - 2005
- [j8]Woei-Jiunn Tsaur:
Several security schemes constructed using ECC-based self-certified public key cryptosystems. Appl. Math. Comput. 168(1): 447-464 (2005) - [j7]Woei-Jiunn Tsaur, Chih-Ho Chou:
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems. Appl. Math. Comput. 168(2): 1045-1064 (2005) - [j6]Woei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee:
An enhanced user authentication scheme for multi-server Internet services. Appl. Math. Comput. 170(1): 258-266 (2005) - [j5]Woei-Jiunn Tsaur, Chien-Hao Ho:
A mobile agent protected scheme using pairing-based cryptosystems. Int. J. Mob. Commun. 3(2): 183-196 (2005) - 2004
- [j4]Woei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee:
A smart card-based remote scheme for password authentication in multi-server Internet services. Comput. Stand. Interfaces 27(1): 39-51 (2004) - 2001
- [j3]Woei-Jiunn Tsaur, Shi-Jinn Horng:
Auditing Causal Relationships of Group Multicast Communications in Group-Oriented Distributed Systems. J. Supercomput. 18(1): 25-45 (2001) - [c7]Woei-Jiunn Tsaur:
A Flexible User Authentication Scheme for Multi-server Internet Services. ICN (1) 2001: 174-183
1990 – 1999
- 1998
- [j2]Woei-Jiunn Tsaur, Shi-Jinn Horng:
Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments. Comput. J. 41(2): 125-133 (1998) - [j1]Woei-Jiunn Tsaur, Shi-Jinn Horng:
A new generalized software complexity metric for distributed programs. Inf. Softw. Technol. 40(5-6): 259-269 (1998) - [c6]Woei-Jiunn Tsaur, Shi-Jinn Horng, R. Tsai:
A Scheme for Auditing Causal Relationships in Group Oriented Distributed Systems. PDSE 1998: 115- - 1997
- [c5]Woei-Jiunn Tsaur, Shi-Jinn Horng, Shung-Shing Lee, Ruey-Chang Tsai:
An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments. ICPADS 1997: 640-647 - [c4]Woei-Jiunn Tsaur, Shi-Jinn Horng, Chia-Ho Chen:
An authentication-combined access control scheme using a geometric approach in distributed systems. SAC 1997: 361-365 - 1996
- [c3]Woei-Jiunn Tsaur, Shi-Jinn Horng:
Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems. ISPAN 1996: 326-329 - [c2]Woei-Jiunn Tsaur, Shi-Jinn Horng:
On the design of secure group-oriented communication channels in Internet environments. PIMRC 1996: 1243-1247 - 1995
- [c1]Woei-Jiunn Tsaur, Shi-Jinn Horng:
Toward Software Metrics for Distributed Software. APSEC 1995: 209-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint