Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Hui-Feng
    Last name: Huang
    DBLP: 62/4409
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 44 of 44  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Hui-Feng Huang, Pin-Han Lin, Min-Hsuan Tsai.
    Convertible Multi-authenticated Encryption Scheme for Data Communication.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Hui-Feng Huang, Hong-Wei Chang, Po-Kai Yu.
    Enhancement of Timestamp-based User Authentication Scheme with Smart Card.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Chia-Chen Chen, Hui-Feng Huang, Cheng-Yi Liu, Chi-Wen Lai.
    User Authentication with Anonymity for Roaming Service with Smart Cards in Global Mobility Networks.
    Ad Hoc Sensor Wireless Networks 2014, Volume 20 (0) 2014
    Conference paper
    Hui-Feng Huang, Hong-Wei Chang, Po-Kai Yu.
    Enhancement of Timestamp-based User Authentication Scheme with Smart Card.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Der-Chyuan Lou, Hui-Feng Huang.
    An efficient
    Int. J. Communication Systems 2014, Volume 27 (0) 2014
    Conference paper
    Hui-Feng Huang, Po-Kai Yu, Kuo-Ching Liu.
    A privacy and authentication protocol for mobile RFID system.
    2014 IEEE International Symposium on Independent Computing, ISIC 2014, Orlando, FL, USA, December 9-12, 2014 2014 (0) 2014
    Journal article
    Der-Chyuan Lou, Kuo-Ching Liu, Hui-Feng Huang.
    Efficient Mobile Conference Scheme for Wireless Communication.
    Informatica, Lith. Acad. Sci. 2013, Volume 24 (0) 2013
    Conference paper
    Der-Chyuan Lou, Chao-Lung Chou, Hung-Yuan Wei, Hui-Feng Huang.
    Active steganalysis for interpolation-error based reversible data hiding.
    Pattern Recognition Letters 2013, Volume 34 (0) 2013
    Conference paper
    Hui-Feng Huang, Pin-Han Lin.
    Enhancement of Dynamic ID Based User Authentication for Multi-server Environment.
    2012 Sixth International Conference on Genetic and Evolutionary Computing, ICGEC 2012, Kitakyushu, Japan, August 25-28, 2012 2012 (0) 2012
    Conference paper
    Min-Hsuan Fan, Mu-Yen Chen, Hui-Feng Huang, Tai-Ying Huang.
    The Case Study of Adaptive Network-Based Fuzzy Inference System Modeling for TAIEX Prediction.
    2012 Sixth International Conference on Genetic and Evolutionary Computing, ICGEC 2012, Kitakyushu, Japan, August 25-28, 2012 2012 (0) 2012
    Journal article
    Hui-Feng Huang, Kuo-Ching Liu.
    Efficient key management for preserving HIPAA regulations.
    Journal of Systems and Software 2011, Volume 84 (0) 2011
    Conference paper
    Der-Chyuan Lou, Hui-Feng Huang.
    Efficient three-party password-based key exchange scheme.
    Int. J. Communication Systems 2011, Volume 24 (0) 2011
    Conference paper
    Hui-Feng Huang.
    A New Design of Access Control in Wireless Sensor Networks.
    IJDSN 2011, Volume 2011 (0) 2011
    Journal article
    Kuo-Ching Liu, Hui-Feng Huang.
    A New Design of Encryption/Decryption for Field Applications.
    JCIT 2010, Volume 5 (0) 2010
    Journal article
    Kuo-Ching Liu, Hui-Feng Huang.
    Efficient Access Control in a Hierarchy for Hardware-limited Users.
    JCIT 2010, Volume 5 (0) 2010
    Conference paper
    Hui-Feng Huang, Su-E. Liu, Hui-Fang Chen.
    Designing a New Mutual Authentication Scheme Based on Nonce and Smart Cards.
    IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, Taipei, Taiwan, 6-9 September 2010 2010 (0) 2010
    Conference paper
    Hui-Feng Huang, Ya-Fen Chang, Chun-Hung Liu.
    Enhancement of Two-Factor User Authentication in Wireless Sensor Networks.
    Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings 2010 (0) 2010
    Conference paper
    Hui-Feng Huang.
    A simple three-party password-based key exchange protocol.
    Int. J. Communication Systems 2009, Volume 22 (0) 2009
    Conference paper
    Hui-Feng Huang.
    A novel access control protocol for secure sensor networks.
    Computer Standards Interfaces 2009, Volume 31 (0) 2009
    Conference paper
    Hui-Feng Huang, Yi-Jia Chang, Kuo-Ching Liu.
    An Efficient Three Party Authenticated Key Exchange for Mobile Communications.
    The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, ISPAN 2009, Kaohsiung, Taiwan, December 14-16, 2009 2009 (0) 2009
    Conference paper
    Hui-Feng Huang.
    A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network.
    Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy.
    Fundam. Inform. 2008, Volume 84 (0) 2008
    Conference paper
    Hui-Feng Huang.
    A novel efficient conference scheme for mobile communications.
    IJMC 2008, Volume 6 (0) 2008
    Conference paper
    Hui-Feng Huang, Kuo-Ching Liu.
    A New Dynamic Access Control in Wireless Sensor Networks.
    Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008 2008 (0) 2008
    Conference paper
    Hui-Feng Huang.
    A New Design of Efficient Key Pre-distribution Scheme for Secure Wireless Sensor Networks.
    3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings 2007 (0) 2007
    Conference paper
    Kuo-Ching Liu, Hsin-Wei Wang, Hui-Feng Huang.
    Enhancement of the Mutual Authentication protocol on RFID Passive Tags.
    3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings 2007 (0) 2007
    Conference paper
    Hui-Feng Huang.
    An Efficient Mutual Authentication Protocol on RFID Tags.
    Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm.
    2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea 2007 (0) 2007
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    An Untraceable Electronic Cash System Using Fair Blind Signatures.
    2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 24-26 October 2006, Shanghai, China 2006 (0) 2006
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    An Untraceable Forward-Secure Blind Signature Scheme.
    Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, IMECS '06, June 20-22, 2006, Hong Kong, China 2006 (0) 2006
    Conference paper
    Hui-Feng Huang.
    A New Efficient Authentication Scheme for Session Initiation Protocol.
    Proceedings of the 2006 Joint Conference on Information Sciences, JCIS 2006, Kaohsiung, Taiwan, ROC, October 8-11, 2006 2006 (0) 2006
    Conference paper
    Hui-Feng Huang.
    A New Cryptographic Key Assignment Scheme using a One-way Hash Function.
    Proceedings of the 2006 Joint Conference on Information Sciences, JCIS 2006, Kaohsiung, Taiwan, ROC, October 8-11, 2006 2006 (0) 2006
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    A novel efficient (
    Inf. Sci. 2006, Volume 176 (0) 2006
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    A New Design for Efficient t-out-n Oblivious Transfer Scheme.
    19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan 2005 (0) 2005
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.
    Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II 2005 (0) 2005
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    An efficient deniable authentication protocol.
    4th International Conference on Cyberworlds (CW 2005), 23-25 November 2005, Singapore 2005 (0) 2005
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    A Novel Conference Key Distribution System with Re-keying Protocol.
    Web and Communication Technologies and Internet-Related Social Issues - HSI 2005, 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Ya-Fen Chang, Chin-Chen Chang, Hui-Feng Huang.
    Digital signature with message recovery using self-certified public keys without trustworthy system authority.
    Applied Mathematics and Computation 2005, Volume 161 (0) 2005
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    Multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
    Computer Standards Interfaces 2005, Volume 27 (0) 2005
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    A new design of efficient partially blind signature scheme.
    Journal of Systems and Software 2004, Volume 73 (0) 2004
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    A new cryptographic key assignment scheme with time-constraint access control in a hierarchy.
    Computer Standards Interfaces 2004, Volume 26 (0) 2004
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    An Efficient Convertible Authenticated Encryption Scheme and Its Variant.
    Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings 2003 (0) 2003
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers.
    Fundam. Inform. 2003, Volume 56 (0) 2003
    Conference paper
    Hui-Feng Huang, Chin-Chen Chang.
    Cryptanalysis of the WD Public-Key Cryptosystem.
    1st International Symposium on Cyber Worlds (CW 2002), 6-8 November 2002, Tokyo, JAPAN 2002 (0) 2002
    Show item 1 to 44 of 44  

    Your query returned 44 matches in the database.