Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Enhanced WPA2/PSK for Preventing Authentication Cracking

    With the popularization of mobile phones and Wi-Fi hotspots, the diversification of wireless communication applications has rapidly growing. Wi-Fi Protected Access (WPA), offered by network user authentication...

    Chin-Ling Chen, Supaporn Punya in Mobile Wireless Middleware, Operating Syst… (2020)

  2. No Access

    Chapter and Conference Paper

    A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System

    As wireless sensor networks (WSN) and Internet of things (IoT) have rapidly developed over recent years, the smart vehicular system is designed in the environment of WSN to provide vehicle related applications...

    Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen in Internet of Vehicles. Technologies and Ser… (2018)

  3. No Access

    Chapter and Conference Paper

    Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems

    Nowadays users can access various online services and resources from distributed information systems remotely via Internet or other public networks. However, remote online systems are vulnerable to many securi...

    Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee in Green, Pervasive, and Cloud Computing (2017)

  4. No Access

    Chapter and Conference Paper

    Design of a Secure Emergency Communication System Based on Cloud for Pregnancy

    Due to the high maternal mortality, it is particularly necessary to attend pregnant woman by emergency communication system as timely treatment to avoid maternal deaths. In this paper, we propose an emergency ...

    Guan-Chen Li, Chin-Ling Chen, Feng Lin in Green, Pervasive, and Cloud Computing (2017)

  5. No Access

    Article

    A secure ownership transfer protocol using EPCglobal Gen-2 RFID

    Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be ...

    Chin-Ling Chen, Yu-Chung Huang, Jehn-Ruey Jiang in Telecommunication Systems (2013)

  6. No Access

    Chapter and Conference Paper

    An IPv6 Multihomed Host for Outbound Traffic

    Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host arch...

    Chin-Ling Chen, Sheng-Lung Cao in Intelligent Computing and Information Science (2011)

  7. No Access

    Chapter and Conference Paper

    Enabling Two Levels of Adaptation: A Framework for Traffic-Aware and Context Management Deployment

    This paper presents a novel approach in that it provides both inter-service adaptation by reconfiguring current available services in reaction to environment changes and intra-service adaptation by selecting t...

    Chin-Ling Chen, Jia-Ching Wang in Intelligent Computing and Information Science (2011)