Chien-Ming Chen
Chien-Ming Chen
SMIEEE, Associate Professor, Shandong University of Science and Technology
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
A secure authentication protocol for Internet of vehicles
CM Chen, B Xiang, Y Liu, KH Wang
IEEE Access 7, 12047-12057, 2019
1872019
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
1822011
Stolen-verifier attack on two new strong-password authentication protocols
CM Chen, WC Ku
IEICE Transactions on communications 85 (11), 2519-2521, 2002
1692002
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019
1252019
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
WC Ku, CM Chen, HL Lee
IEICE Transactions on Communications 86 (5), 1682-1684, 2003
1192003
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
1172019
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74 (1), 65-70, 2018
1092018
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
CT Li, TY Wu, CL Chen, CC Lee, CM Chen
Sensors 17 (7), 1482, 2017
912017
A multilevel model of team cultural diversity and creativity: The role of climate for inclusion
CR Li, CJ Lin, YH Tien, CM Chen
The Journal of Creative Behavior 51 (2), 163-179, 2017
842017
An efficient countermeasure to the selective forwarding attack in wireless sensor networks
HM Sun, CM Chen, YC Hsiao
TENCON 2007-2007 IEEE Region 10 Conference, 1-4, 2007
702007
A secure authentication scheme for Internet of Things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
642017
PoRX: A reputation incentive scheme for blockchain consensus of IIoT
EK Wang, Z Liang, CM Chen, S Kumari, MK Khan
Future Generation Computer Systems 102, 140-151, 2020
592020
A defence scheme against Identity Theft Attack based on multiple social networks
BZ He, CM Chen, YP Su, HM Sun
Expert Systems with Applications 41 (5), 2345-2352, 2014
592014
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol
CM Chen, L Xu, TY Wu, CR Li
Journal of Network Intelligence, 2016
582016
A secure authenticated and key exchange scheme for fog computing
CM Chen, Y Huang, KH Wang, S Kumari, ME Wu
Enterprise Information Systems 15 (9), 1200-1215, 2021
572021
Flexible-pay-per-channel: A new model for content access control in pay-TV broadcasting systems
HM Sun, CM Chen, CZ Shieh
IEEE Transactions on Multimedia 10 (6), 1109-1120, 2008
522008
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks
TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar, CM Chen
IEEE Access 8, 28096-28108, 2020
512020
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
WC Ku, CM Chen, HL Lee
ACM SIGOPS Operating Systems Review 37 (4), 19-25, 2003
502003
Mobile jamming attack and its countermeasure in wireless sensor networks
HM Sun, SP Hsu, CM Chen
21st International Conference on Advanced Information Networking and …, 2007
492007
An efficient and verifiable concealed data aggregation scheme in wireless sensor networks
HM Sun, YC Hsiao, YH Lin, CM Chen
2008 International Conference on Embedded Software and Systems, 19-26, 2008
442008
The system can't perform the operation now. Try again later.
Articles 1–20