Follow
Yi-Li Huang
Yi-Li Huang
東海大學資訊工程學系
Verified email at thu.edu.tw - Homepage
Title
Cited by
Cited by
Year
AES-128 based secure low power communication for LoRaWAN IoT environments
KL Tsai, YL Huang, FY Leu, I You, YL Huang, CH Tsai
Ieee Access 6, 45325-45334, 2018
1582018
TTP based High-efficient Multi-Key Exchange Protocol
I KUN-LIN TSAI, (Member, IEEE), YI-LI HUANG, (Member, IEEE), FANG-YIE LEU ...
IEEE Access 4, 6261–6271, 2016
312016
A Secure M-Commerce System based on credit card transaction
FY Leu, YL Huang, SM Wang
Electronic Commerce Research and Applications 14 (5), 351-360, 2015
222015
A secure communication over wireless environments by using a data connection core
YL Huang, FY Leu, KC Wei
Mathematical and Computer Modelling 58 (5-6), 1459-1474, 2013
222013
A secure data encryption method employing a sequential–logic style mechanism for a cloud system
YL Huang, CR Dai, FY Leu, I You
International Journal of Web and Grid Services 11 (1), 102-124, 2015
202015
Improving security level of LTE authentication and key agreement procedure
FY Leu, I You, YL Huang, K Yim, CR Dai
2012 IEEE Globecom Workshops, 1032-1036, 2012
192012
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.
YL Huang, FY Leu
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 96-107, 2011
192011
A handover scheme for LTE wireless networks under the assistance of GPS
YS Huang, FY Leu, JC Liu, YL Huang, WCC Chu
2013 Eighth International Conference on Broadband and Wireless Computing …, 2013
182013
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802. 16e wireless networks
YF Ciou, FY Leu, YL Huang, K Yim
Mobile Information Systems 7 (3), 241-269, 2011
182011
Designing a healthcare authorization model based on cloud authentication
CL Chen, TT Yang, FY Leu, YL Huang
Intelligent Automation & Soft Computing 20 (3), 365-379, 2014
162014
Improving Security Levels of IEEE802. 16e Authentication by Involving Diffie-Hellman PKDS.
YL Huang, FY Leu, CH Chiu, IL Lin
J. Univers. Comput. Sci. 17 (6), 891-911, 2011
162011
The simulation of an emotional robot implemented with fuzzy logic
FY Leu, J Liu, YT Hsu, YL Huang
Soft Computing 18, 1729-1743, 2014
122014
A secure wireless communication system integrating PRNG and Diffie-Hellman PKDS by using a data connection core
YL Huang, FY Leu, JC Liu, LJ Lo, WCC Chu
2013 Eighth International Conference on Broadband and Wireless Computing …, 2013
122013
A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment
YL Huang, FY Leu, I You, YK Sun, CC Chu
The Journal of Supercomputing 67, 635-652, 2014
112014
A group file encryption method using dynamic system environment key
KL Tsai, JS Tan, FY Leu, YL Huang
2014 17th International Conference on Network-Based Information Systems, 476-483, 2014
92014
Building a block cipher mode of operation with feedback keys
YL Huang, FY Leu, JC Liu, JH Yang, CW Yu, CC Chu, CT Yang
2013 IEEE International Symposium on Industrial Electronics, 1-4, 2013
92013
Controlling traffic lights for ambulances
FY Leu, MH Chen, YL Huang, CC Lin
2012 Seventh International Conference on Broadband, Wireless Computing …, 2012
92012
High-efficient multi-key exchange protocol based on three-party authentication
KL Tsai, YL Huang, FY Leu, JS Tan, M Ye
2014 Eighth International Conference on Innovative Mobile and Internet …, 2014
72014
Generating dynamic box by using an input string
JJ Liu, YL Huang, FY Leu, XY Pan, LR Chen
Mobile Internet Security: Second International Symposium, MobiSec 2017, Jeju …, 2019
62019
A secure and high performance wireless sensor network based on symmetric key matrix
YL Huang, FY Leu, PH Su, TH Sung, SC Liu
2016 10th International Conference on Innovative Mobile and Internet …, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20