- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Cloud Data Security Solutions
- Biometric Identification and Security
- Security in Wireless Sensor Networks
- RFID technology advancements
- Advanced Steganography and Watermarking Techniques
- Cryptography and Residue Arithmetic
- Mobile Ad Hoc Networks
- Digital Rights Management and Security
- Cryptographic Implementations and Security
- IoT and Edge/Fog Computing
- Wireless Body Area Networks
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- Vehicular Ad Hoc Networks (VANETs)
- Millimeter-Wave Propagation and Modeling
- Advanced Malware Detection Techniques
- Privacy-Preserving Technologies in Data
- Privacy, Security, and Data Protection
- UAV Applications and Optimization
- Advanced MIMO Systems Optimization
- Digital Media Forensic Detection
Fu Jen Catholic University
2016-2025
Tainan University of Technology
2013-2022
Asia University
2016-2018
National Taiwan University
2018
National Chung Hsing University
2007-2018
Pandit Ravishankar Shukla University
2016
National Chung Cheng University
2013
Hsiuping University of Science and Technology
2011
The rapid growth in the number of vehicles has led to traffic congestion, pollution, and delays logistic transportation metropolitan areas. IoT been an emerging innovation, moving universe towards automated processes intelligent management systems. This is a critical contribution automation smart civilizations. Effective reliable congestion control help save many precious resources. An IoT-based ITM system set sensors embedded automatic devices recognize, obtain, transmit data. Machine...
With less human involvement, the Industrial Internet of Things (IIoT) connects billions heterogeneous and self-organized smart sensors devices. Recently, IIoT-based technologies are now widely employed to enhance user experience across numerous application domains. However, heterogeneity in node source poses security concerns affecting IIoT system, due device vulnerabilities, has encountered several attacks. Therefore, features, such as encryption, authorization control, verification, have...
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh unattended environment only authorized users are allowed to access reliable nodes WSNs with the aid of gateways (GWNs). Secure authentication models among users, GWN important research issues for ensuring communication security data privacy WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual key agreement scheme However, this paper, we point out that al.'s cannot resist stolen-verifier,...
In recent years, with the increase in degenerative diseases and aging population advanced countries, demands for medical care of older or solitary people have increased continually hospitals healthcare institutions. Applying wireless sensor networks IoT-based telemedicine system enables doctors, caregivers families to monitor patients' physiological conditions at anytime anyplace according acquired information. However, transmitting data through Internet concerns personal privacy patients....
Cassava is a crucial food and nutrition security crop cultivated by small-scale farmers it can survive in brutal environment. It significant source of carbohydrates African countries. Sometimes, crops be infected leaf diseases, affecting the overall production reducing farmers’ income. The existing disease research encounters several challenges, such as poor detection rate, higher processing time, accuracy. This provides comprehensive learning strategy for real-time identification based on...
Modern cellular communication networks are already being perturbed by large and steadily increasing mobile subscribers in high demand for better service quality. To constantly reliably deploy optimally manage such networks, the radio signal attenuation loss between path lengths of a base transmitter station receiver must be appropriately estimated. Although many log-distance-based linear models prediction wireless exist, frequency planning requires advanced non-linear more accurate...
Password authentication has been widely used in computer networks to provide secure remote access control. In this study, the authors show that improved password and update scheme based on elliptic curve cryptography proposed by Islam Biswas is vulnerable offline guessing, stolen-verifier insider attacks. We propose an advanced smart card-based extend privacy of client. By comparing criteria with other related schemes, our not only solves several hard security threats but also satisfies more...
In recent years, due to the rapid development of information techniques and network technologies, more medical documents have been replaced by electronic files for sharing transmitting in real time. However, data transmitted over public communication channels may suffer from security attacks privacy threats. Blockchain technology has gotten many attentions different areas its unique properties such as anonymity, verifiability, immutability decentralization. order secure patient provide...
In the current medical insurance claims process, there are problems of low efficiency and complex services. When a patient applies for claims, he/she must go to hospital apply diagnosis certificate receipt then send relevant application documents company. The will not receive compensation until company completes verification with patient’s hospital. However, we can improve dilemma through blockchain technology. Blockchain technology effectively open up information channels industry...
SUMMARY In this article, the authors shall propose a simple and efficient authentication scheme for mobile satellite communication systems. The proposed can achieve following security requirements: (S1) withstand impersonation attacks; (S2) denial server (S3) smart card loss (S4) replay (S5) stolen‐verifier attacks, functionality (F1) freely choose identity; (F2) provide mutual authentication; (F3) session key agreement; (F4) user anonymity; (F5) perfect forward secrecy. additional, does not...
Atmospheric impairment-induced attenuation is the prominent source of signal degradation in radio wave communication channels. The computation-based modeling over atmosphere stepwise application relevant propagation models, data, and procedures to effectively prognostically estimate losses propagated signals that have been induced by atmospheric constituents. This contribution aims perform a detailed prognostic evaluation due rain, free space, gases, cloud at ultra-high frequency band. aim...
Mobile edge computing (MEC) supported by non-orthogonal multiple access (NOMA) has recently gained a lot of interest due to its improved ability lessen power consumption and MEC offload delay. In recent decades, the need for wireless communications increased tremendously. Fifth-generation (5G) will soon be widely used offer much more functionality than fourth generation (4G). Between 2027 2030, an innovative communication paradigm is known as sixth (6G) system projected introduced with full...