King Hang Wang, Kevin
King Hang Wang, Kevin
Verified email at
Cited by
Cited by
A secure authentication protocol for internet of vehicles
CM Chen, B Xiang, Y Liu, KH Wang
Ieee Access 7, 12047-12057, 2019
On the security of Chien's ultralightweight RFID authentication protocol
HM Sun, WC Ting, KH Wang
IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009
A secure authenticated and key exchange scheme for fog computing
CM Chen, Y Huang, KH Wang, S Kumari, ME Wu
Enterprise Information Systems 15 (9), 1200-1215, 2021
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10, 3133-3142, 2019
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74, 65-70, 2018
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
A review of contemporary e-voting: Requirements, technology, systems and usability
KHK Wang, SK Mondal, KC Chan, X Xie
Data Science and Pattern Recognition 1 (1), 31, 2017
A secure authentication scheme for internet of things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks
CM Chen, B Xiang, TY Wu, KH Wang
Applied Sciences 8 (7), 1074, 2018
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 annual computer security applications conference, 105-114, 2009
Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments
TY Wu, CM Chen, KH Wang, JMT Wu
IEEE Access 7, 49232-49239, 2019
A scalable transitive human-verifiable authentication protocol for mobile devices
CM Chen, KH Wang, TY Wu, JS Pan, HM Sun
IEEE Transactions on Information Forensics and Security 8 (8), 1318-1330, 2013
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”
CM Chen, W Fang, KH Wang, TY Wu
Nonlinear Dynamics 87, 2073-2075, 2017
On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci
CM Chen, KH Wang, TY Wu, EK Wang
Pattern Recognit 1 (2), 1-10, 2017
A robust mutual authentication with a key agreement scheme for session initiation protocol
CM Chen, B Xiang, KH Wang, KH Yeh, TY Wu
Applied Sciences 8 (10), 1789, 2018
On the security of an efficient time-bound hierarchical key management scheme
HM Sun, KH Wang, CM Chen
IEEE transactions on dependable and secure computing 6 (2), 159-160, 2009
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
TY Wu, CM Chen, KH Wang, JS Pan, W Zheng, SC Chu, JF Roddick
J. Netw. Intell. 3 (1), 16-25, 2018
A native apis protection mechanism in the kernel mode against malicious code
HM Sun, H Wang, KH Wang, CM Chen
IEEE Transactions on Computers 60 (6), 813-823, 2011
Cryptanalysis and improvements on three-party-authenticated key agreement protocols based on chaotic maps
CM Chen, L Xu, KH Wang, S Liu, TY Wu
Journal of Internet Technology 19 (3), 679-687, 2018
The system can't perform the operation now. Try again later.
Articles 1–20