default search action
Zhen Yu Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Tzer-Long Chen, Chia-Hui Liu, Ya-Hui Ou, Yao-Min Huang, Zhen-Yu Wu:
An improved and efficient coercion-resistant measure for electronic voting system. Int. J. Inf. Sec. 23(4): 2637-2654 (2024) - [j19]Chia-Hui Liu, Zhen-Yu Wu:
Advanced authentication of IoT sensor network for industrial safety. Internet Things 27: 101297 (2024) - [j18]Chia-Hui Liu, Tzer-Long Chen, Chien-Yun Chang, Zhen-Yu Wu:
A reliable authentication scheme of personal health records in cloud computing. Wirel. Networks 30(5): 3759-3769 (2024) - 2021
- [j17]Hsuan-Yu Chen, Zhen-Yu Wu, Tzer-Long Chen, Yao-Min Huang, Chia-Hui Liu:
Security Privacy and Policy for Cryptographic Based Electronic Medical Information System. Sensors 21(3): 713 (2021) - 2020
- [c13]Chin-Chia Hsu, Tzer-Long Chen, I Fang Chang, Zhen-Yu Wu, Chia-Hui Liu:
Design and Implementation a Smart Pillbox. 6GN 2020: 427-432 - [c12]Tzer-Long Chen, Chien-Yun Chang, Zhen-Yu Wu, Chia-Hui Liu:
Multi-function Electric Scooter Assistant System for Seniors. 6GN 2020: 433-438 - [c11]Hsuan-Yu Chen, Yao-Min Huang, Zhen-Yu Wu, Yin-Tzu Huang:
On the Security Policy and Privacy Protection in Electronic Health Information System. 6GN 2020: 439-444 - [c10]Zhan-Ping Su, Chin-Chia Hsu, Zhen-Yu Wu, Chia-Hui Liu:
The Development of Smart Home Disaster Prevention System. 6GN 2020: 445-451 - [c9]Rui Ge, Hsuan-Yu Chen, Tsung-Chih Hsiao, Yu-Tzu Chang, Zhen-Yu Wu:
Virtual Reality, Augmented Reality and Mixed Reality on the Marketing of Film and Television Creation Industry. 6GN 2020: 464-468 - [c8]Minqi Guo, Hsuan-Yu Chen, Tsung-Chih Hsiao, Zhen-Yu Wu, Huan-Chieh Tseng, Yu-Tzu Chang, Tzer-Shyong Chen:
VR and AR Technology on Cultural Communication. 6GN 2020: 469-474 - [c7]Ya-Hui Ou, Yu-Hsin Yu, Yu-Xi Chen, Zhen-Yu Wu:
Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks. ICEA 2020: 4:1-4:2
2010 – 2019
- 2019
- [j16]Zhen-Yu Wu:
Group-Oriented Cryptosystem for Personal Health Records Exchange and Sharing. IEEE Access 7: 146495-146505 (2019) - [j15]Zhen-Yu Wu:
An radio-frequency identification security authentication mechanism for Internet of things applications. Int. J. Distributed Sens. Networks 15(7) (2019) - [j14]Zhen-Yu Wu:
A Secure and Efficient Digital-Data-Sharing System for Cloud Environments. Sensors 19(12): 2817 (2019) - 2018
- [j13]Tsung-Chih Hsiao, Zhen Yu Wu, Tzer-Long Chen, Yu-Fang Chung, Tzer-Shyong Chen:
A hierarchical access control scheme based on Lagrange interpolation for mobile agents. Int. J. Distributed Sens. Networks 14(7) (2018) - 2014
- [j12]Zhen Yu Wu, Ju-Chuan Wu, Sung-Chiang Lin, Charlotte Wang:
An electronic voting mechanism for fighting bribery and coercion. J. Netw. Comput. Appl. 40: 139-150 (2014) - 2013
- [j11]Lin Feng, Sheng-lan Liu, Zhen-Yu Wu, Bo Jin:
Maximal Similarity Embedding. Neurocomputing 99: 423-438 (2013) - [j10]Zhen Yu Wu, Lichin Chen, Ju-Chuan Wu:
A Reliable RFID Mutual Authentication Scheme for Healthcare Environments. J. Medical Syst. 37(2): 9917 (2013) - [c6]Sung-Chiang Lin, Charlotte Wang, Zhen Yu Wu, Yu-Fang Chung:
Detect Rare Events via MICE Algorithm with Optimal Threshold. IMIS 2013: 70-75 - [c5]Zhen Yu Wu, Tzer-Long Chen, Sung-Chiang Lin, Charlotte Wang:
A Secure RFID Authentication Scheme for Medicine Applications. IMIS 2013: 175-181 - 2012
- [j9]Yu-Fang Chung, Zhen Yu Wu:
Casting Ballots over Internet Connection Against Bribery and Coercion. Comput. J. 55(10): 1169-1179 (2012) - [j8]Zhen Yu Wu, Yu-Fang Chung, Feipei Lai, Tzer-Shyong Chen:
A Password-Based User Authentication Scheme for the Integrated EPR Information System. J. Medical Syst. 36(2): 631-638 (2012) - [j7]Zhen Yu Wu, Yueh-Chun Lee, Feipei Lai, Hung-Chang Lee, Yu-Fang Chung:
A Secure Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 36(3): 1529-1535 (2012) - [j6]Zhen Yu Wu, Chih-Wen Hsueh, Cheng-Yu Tsai, Feipei Lai, Hung-Chang Lee, Yu-Fang Chung:
Redactable Signatures for Signed CDA Documents. J. Medical Syst. 36(3): 1795-1808 (2012) - [j5]Zhen Yu Wu, Yi-Ju Tseng, Yu-Fang Chung, Yee-Chun Chen, Feipei Lai:
A Reliable User Authentication and Key Agreement Scheme for Web-Based Hospital-Acquired Infection Surveillance Information System. J. Medical Syst. 36(4): 2547-2555 (2012) - [j4]Tsung-Chih Hsiao, Zhen Yu Wu, Yu-Fang Chung, Tzer-Shyong Chen, Gwoboa Horng:
A Secure Integrated Medical Information System. J. Medical Syst. 36(5): 3103-3113 (2012) - [c4]Zhen Yu Wu, Dai-Lun Chiang, Tzu-Ching Lin, Yu-Fang Chung, Tzer-Shyong Chen:
A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network. AINA Workshops 2012: 25-28
2000 – 2009
- 2009
- [j3]Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen:
Ring signature scheme for ECC-based anonymous signcryption. Comput. Stand. Interfaces 31(4): 669-674 (2009) - [j2]Yu-Fang Chung, Zhen Yu Wu:
Approach to designing bribery-free and coercion-free electronic voting scheme. J. Syst. Softw. 82(12): 2081-2090 (2009) - 2008
- [j1]Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen:
Unconditionally secure cryptosystems based on quantum cryptography. Inf. Sci. 178(8): 2044-2058 (2008) - 2006
- [c3]Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen:
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. CIS 2006: 502-512 - [c2]Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen:
Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem. JCIS 2006 - [c1]Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen:
Unconditionally Secure Cryptosystem Based on Quantum Cryptography. JCIS 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint