Kuo-Hui Yeh
Cited by
Cited by
A secure IoT-based healthcare system with body sensor networks
KH Yeh
IEEE access 4, 10288-10299, 2016
A blockchain connected gateway for BLE-based devices in the internet of things
SC Cha, JF Chen, C Su, KH Yeh
ieee access 6, 24639-24649, 2018
Lightweight IoT-based authentication scheme in cloud computing circumstance
L Zhou, X Li, KH Yeh, C Su, W Chiu
Future generation computer systems 91, 244-251, 2019
Security and privacy in IoT-cloud-based e-health systems—A comprehensive review
C Butpheng, KH Yeh, H Xiong
Symmetry 12 (7), 1191, 2020
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10, 3133-3142, 2019
On the design of blockchain-based ECDSA with fault-tolerant batch verification protocol for blockchain-enabled IoMT
H Xiong, C Jin, M Alazab, KH Yeh, H Wang, TR Gadekallu, W Wang, C Su
IEEE journal of biomedical and health informatics 26 (5), 1977-1986, 2021
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
H Xiong, Y Zhao, L Peng, H Zhang, KH Yeh
Future Generation Computer Systems 97, 453-461, 2019
Privacy enhancing technologies in the Internet of Things: Perspectives and challenges
SC Cha, TY Hsu, Y Xiang, KH Yeh
IEEE Internet of Things Journal 6 (2), 2159-2187, 2018
Novel authentication schemes for IoT based healthcare systems
JL Hou, KH Yeh
International Journal of Distributed Sensor Networks 11 (11), 183659, 2015
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
A novel certificateless signature scheme for smart objects in the Internet-of-Things
KH Yeh, C Su, KKR Choo, W Chiu
Sensors 17 (5), 1001, 2017
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints
L Zhou, KH Yeh, G Hancke, Z Liu, C Su
IEEE Signal Processing Magazine 35 (5), 76-87, 2018
A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments
KH Yeh
IEEE Systems Journal 12 (2), 2027-2038, 2017
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
NW Lo, KH Yeh
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops …, 2007
Special issue on advanced persistent threat
J Chen, C Su, KH Yeh, M Yung
Future Generation Computer Systems 79, 243-246, 2018
Anonymous coexistence proofs for RFID tags
NW Lo, KH Yeh
Journal of Information Science and Engineering 26 (4), 1213-1230, 2010
An efficient certificateless signature scheme without bilinear pairings
KH Yeh, KY Tsai, CY Fan
Multimedia Tools and Applications 74, 6519-6530, 2015
A user-friendly privacy framework for users to achieve consents with nearby BLE devices
SC Cha, MS Chuang, KH Yeh, ZJ Huang, C Su
IEEE Access 6, 20779-20787, 2018
I walk, therefore i am: continuous user authentication with plantar biometrics
KH Yeh, C Su, W Chiu, L Zhou
IEEE Communications Magazine 56 (2), 150-157, 2018
Cryptanalysis of two three-party encrypted key exchange protocols
NW Lo, KH Yeh
Computer Standards & Interfaces 31 (6), 1167-1174, 2009
The system can't perform the operation now. Try again later.
Articles 1–20