Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage,International Computer Symposium EI 2019 林詠章*
An Efficient and Secure RFID Authentication Scheme for C1G2 Standard,Journal of Internet Technology SCI 2019 林詠章*
Recommendation System to Identify Collusive Users in Online Auctions Using the Pollution Diffusion Method,Journal of Internet Technology SCI 2019 林詠章
A Real-time Parking Service with Proxy Re-encryption in Vehicular Cloud Computing,ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE SCI 2019 林詠章*
Case study of physical internet for improving efficiency in solar cell industry,Journal of Ambient Intelligence and Humanized Computing SCI 2018 林詠章*
(r,QI)-transform: Reversible Data Anonymity Base on Numeric Type of Data in Outsourced Database,Journal of Electronic Science and Technology EI 2017 林詠章*
A Survey of Blockchain Security Issues and Challenges,International Journal of Network Security EI 2017 林詠章*
Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery,ACTA INFORMATICA SCI 2017 林詠章*
Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process,Journal of Computers, vol.11 no.2 pp.124-131 EI 2016 林詠章*、Lin, Y.W.、Wu, Y.S
Development of Comment Correlation Matrix for Mobile Application Recommendation,Journal of Electronic Science and Technology EI 2016 林詠章
The Novel Features for Phishing Based on User Device Detection,Journal of Computers, vol.11 no.2 pp.109-115 EI 2016 林詠章*、Chi, Y.L、Chuang HC、Hwang MS
The Secure Transaction Protocol in NFC Card Emulation Mode,International Journal of Network Security, vol.17 no.4 pp.431-438 EI 2015 紀逸倫(Chi, Y.L)、林詠章*、Chen, C. H.
A Multi-Purpose Key Agreement Scheme in Ubiquitous Computing Environments,Mobile Information Systems SCI 2015 張真誠(Chang CC)、林詠章*、Wu CC
An RSA-Like Scheme for Multi-User Broadcast Authentication in Wireless Sensor Networks,International Journal of Distributed Sensor Networks SCI 2015 鄭辰仰(Cheng CY)、林詠章*、Huang SY
A Cloud-based Authentication Protocol for RFID Supply Chain Systems,Journal of Network and Systems Management SCI 2015 林詠章*
A Cloud-Based Authentication Protocol for RFID Supply Chain Systems,Journal of Network and Systems Management SCI 2014 林詠章、Hsu, H. H.、Cheng, C. Y.
Preserving Privacy in Outsourced Database,International Journal of Computer and Communication Engineering, vol.3 no.5 pp.361-366 EI 2014 Yung-Wang Lin、Li-Cheng Yang、林詠章、陳永欽(YEONG-CHIN CHEN)
Critical Factors of Educational Institutions Adoption for BS 10012: Personal Information Management Systems ,International Journal of Network Security, vol.16 no.3 pp.161-167 EI 2014 Liu, C. Y.、Yang, S. S.、林詠章
A Survey of Botnet Architecture and Batnet Detection Techniques,International Journal of Network Security, vol.16 no.2 pp.81-89 EI 2014 Liu, C. Y.、Peng, C. H.、林詠章
Data Hiding for HTML Files Using Character Coding Table and Index Coding Table,KSII Transactions on Internet and Information Systems, vol.7 no.11 pp.2913-2927 SCI 2013 Chou, Y. C.、Hsu, P. K、林詠章
A Blocking Prediction for Volleyball Using Neural Networks,Journal of Applied Mechanics and Materials, vol.373-375 pp.1224-1230 EI 2013 Chien-Hsun Chen、Chin-Fa Chen、Ming-Hua Hsu、林詠章
The Analysis of Key Attributes Influencing the User Satisfaction towards Applications,Journal of Electronic Science and Technology, vol.11 no.2 EI 2013 Yu-Fan Ho、Yi-Lun Chi、林詠章
A Watermarking for HTML Files Based on Multi-channel System,International Journal of Security and its Applications, vol.7 no.3 pp.163-174 EI 2013 Chou, Y. C.、林詠章、Hsu, P. K
A Verifiable Key Management Scheme in Hierarchical Ad Hoc Networks,Information-An International Interdisciplinary Journal, vol.16 no.3(A) pp.1929-1944 SCI 2013 Chin-Chen Chang、Chia-Chi Wu、林詠章
A Source Authentication scheme Based on Message Recovery Digital Signature for Multicast,INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS SCI 2013 Yan, J. H.、林詠章
Using Hasing Tree for Delegation Revocation in Grids,Journal of Electronic Science and Technology, vol.10 no.3 pp.256-262 EI 2012 Chen, C. T.、Lin, M. T.、林詠章
Improving Computation Efficiency of Source Authentication by Elliptic Curve Cryptosystem,Journal of Electronic Science and Technology EI 2012 林詠章、Yang, J. H.
Providing perfect forward secrecy for location-aware wireless sensor networks,EURASIP Journal on Wireless Communications and Networking SCI 2012 Chen, C. T.、Huang, S. Y.、林詠章
An Effective AKA Protocol for UMTS,International Journal of Mobile Communications, vol.10 no.4 pp.427-448 SSCI 2012 Ou, H. H.、林詠章、Hwang, M. S.
A cloud-user access control mechanism based on data masking - The Sixth International Conference on Genetic and Evolutionary Computing Kitakyushu, Japan 2012.08 Wu, T. K.、Lin, Y. W.、林詠章