A secure authentication scheme with anonymity for wireless communications CC Wu, WB Lee, WJ Tsaur IEEE Communications Letters 12 (10), 722-723, 2008 | 243 | 2008 |
A smart card-based remote scheme for password authentication in multi-server Internet services WJ Tsaur, CC Wu, WB Lee Computer Standards & Interfaces 27 (1), 39-51, 2004 | 120 | 2004 |
An efficient and secure multi-server authentication scheme with key agreement WJ Tsaur, JH Li, WB Lee Journal of Systems and Software 85 (4), 876-882, 2012 | 90 | 2012 |
An enhanced user authentication scheme for multi-server internet services WJ Tsaur, CC Wu, WB Lee Applied Mathematics and Computation 170 (1), 258-266, 2005 | 76 | 2005 |
A novel deniable authentication protocol using generalized ElGamal signature scheme WB Lee, CC Wu, WJ Tsaur Information Sciences 177 (6), 1376-1381, 2007 | 70 | 2007 |
Enterprise data sharing with privacy-preserved based on hyperledger fabric blockchain in IIOT’s application CL Chen, J Yang, WJ Tsaur, W Weng, CM Wu, X Wei Sensors 22 (3), 1146, 2022 | 67 | 2022 |
A flexible user authentication scheme for multi-server internet services WJ Tsaur Networking—ICN 2001: First International Conference on Networking Colmar …, 2001 | 65 | 2001 |
Internet of Things (IoT) based design of a secure and lightweight body area network (BAN) healthcare system YY Deng, CL Chen, WJ Tsaur, YW Tang, JH Chen Sensors 17 (12), 2919, 2017 | 52 | 2017 |
Several security schemes constructed using ECC-based self-certified public key cryptosystems WJ Tsaur Applied Mathematics and Computation 168 (1), 447-464, 2005 | 49 | 2005 |
A batch-authenticated and key agreement framework for P2P-based online social networks LY Yeh, YL Huang, AD Joseph, SW Shieh, WJ Tsaur IEEE transactions on vehicular technology 61 (4), 1907-1924, 2012 | 47 | 2012 |
A traceable online insurance claims system based on blockchain and smart contract technology CL Chen, YY Deng, WJ Tsaur, CT Li, CC Lee, CM Wu Sustainability 13 (16), 9386, 2021 | 46 | 2021 |
Hierarchical and dynamic elliptic curve cryptosystem based self-certified public key scheme for medical data protection CH Tseng, SH Wang, WJ Tsaur IEEE Transactions on Reliability 64 (3), 1078-1085, 2015 | 34 | 2015 |
A highly secure IoT firmware update mechanism using blockchain WJ Tsaur, JC Chang, CL Chen Sensors 22 (2), 530, 2022 | 30 | 2022 |
Mobile malware behavioral analysis and preventive strategy using ontology HS Chiang, WJ Tsaur 2010 IEEE Second International Conference on Social Computing, 1080-1085, 2010 | 30 | 2010 |
Exploring Rootkit detectors' vulnerabilities using a new windows hidden driver based Rootkit WJ Tsaur, YC Chen 2010 IEEE Second International Conference on Social Computing, 842-848, 2010 | 26 | 2010 |
Identifying smartphone malware using data mining technology HS Chiang, WJ Tsaur 2011 proceedings of 20th international conference on computer communications …, 2011 | 25 | 2011 |
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems WJ Tsaur, CH Chou Applied Mathematics and Computation 168 (2), 1045-1064, 2005 | 24 | 2005 |
An anti-counterfeit and traceable management system for brand clothing with hyperledger fabric framework CL Chen, X Shang, WJ Tsaur, W Weng, YY Deng, CM Wu, J Cui Symmetry 13 (11), 2048, 2021 | 20 | 2021 |
Blockchain-based anti-counterfeiting management system for traceable luxury products CL Chen, LH Guo, M Zhou, WJ Tsaur, H Sun, W Zhan, YY Deng, CT Li Sustainability 14 (19), 12814, 2022 | 19 | 2022 |
A secure and efficient authentication scheme for access control in mobile pay-TV systems LY Yeh, WJ Tsaur IEEE transactions on multimedia 14 (6), 1690-1693, 2012 | 18 | 2012 |