default search action
Hua-Yi Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Hua-Yi Lin:
Secure cloud internet of vehicles based on blockchain and data transmission scheme of map/reduce. Comput. Sci. Inf. Syst. 20(1): 137-156 (2023) - 2022
- [j11]Hua-Yi Lin:
Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks. Connect. Sci. 34(1): 274-300 (2022) - [j10]Hua-Yi Lin, Meng-Yen Hsieh:
A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles. Connect. Sci. 34(1): 1089-1118 (2022) - 2021
- [c12]Hua-Yi Lin, Meng-Yen Hsieh, Kuan-Ching Li:
A Multi-level Security Key Management Protocol Based on Dynamic M-tree Structures for Internet of Vehicles. SPECTS 2021: 1-5
2010 – 2019
- 2018
- [c11]Hua-Yi Lin, Meng-Yen Hsieh, Kuan-Ching Li:
The Secure Vehicle-to-Vehicle and Vehicle-to-Group Communication Mechanisms in Smart City. BigDataService 2018: 186-192 - [c10]Su-Shiang Lee, Hua-Yi Lin, Kok How Teo, Wei-Peng Tan, Chih-Wei Lin:
Discussion on The Consumers Motivation to Watch E-sports Game and The Follow-up Behaviors Intention. ICEEL 2018: 181-186 - 2017
- [j9]Hua-Yi Lin, Jiann-Gwo Doong, Meng-Yen Hsieh, Kuan-Ching Li:
A real time vehicle management system implementation on cloud computing platform. Int. J. High Perform. Comput. Netw. 10(3): 168-178 (2017) - [c9]Hua-Yi Lin, Meng-Yen Hsieh, Kuan-Ching Li:
Researches on secure data transmission mechanisms in cloud Internet of Things architectures. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-4 - 2016
- [j8]Hua-Yi Lin, Meng-Yen Hsieh, Kuan-Ching Li:
Flexible group key management and secure data transmission in mobile device communications using elliptic curve Diffie-Hellman cryptographic system. Int. J. Comput. Sci. Eng. 12(1): 47-52 (2016) - 2015
- [j7]Hua-Yi Lin, Meng-Yen Hsieh, Kuan-Ching Li:
Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments. Telecommun. Syst. 60(2): 303-313 (2015) - 2012
- [c8]Meng-Yen Hsieh, Hua-Yi Lin, Ching-Hung Yeh, Kuan-Ching Li, Bo-Shiung Wu:
A Mobile Application Framework for Rapid Integration of Ubiquitous Web Services. UIC/ATC 2012: 136-142 - 2011
- [j6]Meng-Yen Hsieh, Hua-Yi Lin, Chin-Feng Lai, Kuan-Ching Li:
Secure protocols for data propagation and group communication in vehicular networks. EURASIP J. Wirel. Commun. Netw. 2011: 167 (2011) - [j5]Hua-Yi Lin, Tzu-Chiang Chiang:
Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j4]Meng-Yen Hsieh, Hua-Yi Lin, Kuan-Ching Li:
A web-based travel system using mashup in the RESTful design. Int. J. Comput. Sci. Eng. 6(3): 185-191 (2011) - 2010
- [c7]Hua-Yi Lin, Tzu-Chiang Chiang:
Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements. ICA3PP (1) 2010: 538-548 - [c6]Hua-Yi Lin, Tzu-Chiang Chiang, Che-Yu Yang, Jia-Lin Chang:
Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks. IRI 2010: 55-58 - [c5]Che-Yu Yang, Hua-Yi Lin:
An automated semantic annotation based-on Wordnet ontology. NCM 2010: 682-687
2000 – 2009
- 2009
- [j3]Hua-Yi Lin:
High Effect Secure Data Transmission Mechanisms in Wireless Sensor Networks Using ID-Based Key Management Scheme. J. Convergence Inf. Technol. 4(1): 77-83 (2009) - [c4]Hua-Yi Lin, Tzu-Chiang Chiang:
Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. CDVE 2009: 384-387 - [c3]Hua-Yi Lin:
High-Effect Key Management Associated with Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-Based Cluster Elliptic Curve Key Agreement. NCM 2009: 308-314 - 2007
- [c2]Hua-Yi Lin, Zhi-Ren Qiu, De-Jun Pan, Xin-Xiang Zha:
Constructing a Cluster-Based M-Learning Architecture in Mobile Ad Hoc Networks Using MPEG-21. ICCSA Workshops 2007: 165-170 - 2006
- [j2]Yueh-Min Huang, Hua-Yi Lin, Tzone-I Wang:
Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme. J. Comput. Sci. Technol. 21(6): 997-1011 (2006) - [c1]Hua-Yi Lin, Yueh-Min Huang, Tzone-I Wang:
Building a Multi-purposes Digital Media System Using MPEG-21 and XML. Edutainment 2006: 1383-1389 - 2005
- [j1]Hua-Yi Lin, Yueh-Min Huang, Tzone-I Wang:
Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks. IEICE Trans. Commun. 88-B(9): 3598-3613 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint