Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks TY Wu, Z Lee, L Yang, JN Luo, R Tso The Journal of Supercomputing 77 (7), 6992-7020, 2021 | 48 | 2021 |
Network address translators: effects on security protocols and applications in the TCP/IP stack SP Shieh, FS Ho, YL Huang, JN Luo IEEE Internet computing 4 (6), 42-49, 2000 | 37 | 2000 |
An Unlinkable Anonymous Payment Scheme based on near field communication JN Luo, MH Yang, SY Huang Computers & Electrical Engineering 49, 198-206, 2016 | 31 | 2016 |
A Provably Secure Authentication and Key Agreement Protocol in Cloud‐Based Smart Healthcare Environments TY Wu, L Yang, JN Luo, J Ming-Tai Wu Security and Communication Networks 2021 (1), 2299632, 2021 | 20 | 2021 |
Contactless Credit Cards Payment Fraud Protection by Ambient Authentication MH Yang, JN Luo, M Vijayalakshmi, SM Shalinie Sensors 22 (5), 1989, 2022 | 18 | 2022 |
A novel multilayered RFID tagged cargo integrity assurance scheme MH Yang, JN Luo, SY Lu Sensors 15 (10), 27087-27115, 2015 | 18 | 2015 |
A can-bus lightweight authentication scheme JN Luo, CM Wu, MH Yang Sensors 21 (21), 7069, 2021 | 17 | 2021 |
A secure partial RFID ownership transfer protocol with multi-owners JN Luo, MH Yang Sensors 20 (1), 22, 2019 | 15 | 2019 |
Authentication protocol in mobile RFID network MH Yang, JN Luo 2009 Fourth International Conference on Systems, 108-113, 2009 | 14 | 2009 |
Mobile RFID mutual authentication and ownership transfer MH Yang, JN Luo transfer 1, 2, 2011 | 13 | 2011 |
A mobile authentication system resists to shoulder-surfing attacks JN Luo, MH Yang Multimedia Tools and Applications 75, 14075-14087, 2016 | 12 | 2016 |
Novel designated ownership transfer with grouping proof KY Tsai, MH Yang, JN Luo, WT Liew Applied Sciences 9 (4), 724, 2019 | 11 | 2019 |
Ambient audio authentication JN Luo, MH Tsai, NW Lo, CY Kao, MH Yang Mathematical Biosciences and Engineering 16 (6), 6562-6586, 2019 | 10 | 2019 |
Offline transferable E-cash mechanism JN Luo, MH Yang 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-2, 2018 | 10 | 2018 |
Designing authentication protocols for third generation mobile communication systems SM Cheng, SP Shieh, WH Yang, FY Lee, JN Luo Journal of information science and engineering 21 (2), 361-378, 2005 | 10 | 2005 |
An anonymous car rental system based on NFC JN Luo, MH Yang, MC Yang 2013 International Symposium on Biometrics and Security Technologies, 97-104, 2013 | 9 | 2013 |
A Blockchain‐Based Secure Radio Frequency Identification Ownership Transfer Protocol M Vijayalakshmi, SM Shalinie, MH Yang, SC Lai, JN Luo Security and Communication Networks 2022 (1), 9377818, 2022 | 8 | 2022 |
Location Tracking and Forensic Analysis of Criminal Suspects’ Footprints MH Tsai, JN Luo, MH Yang, NW Lo 2019 IEEE 2nd International Conference on Information and Computer …, 2019 | 8 | 2019 |
Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location‐Based Service Queries JN Luo, MH Yang Wireless Communications and Mobile Computing 2017 (1), 7391982, 2017 | 8 | 2017 |
Hybrid multilayer network traceback to the real sources of attack devices MH Yang, JN Luo, M Vijayalakshmi, SM Shalinie Ieee Access 8, 201087-201097, 2020 | 7 | 2020 |