Skip to main content

and
  1. No Access

    Article

    Quantified emotion analysis based on design principles of color feature recognition in pictures

    When people observe pictures, different pictures will generate different emotions, and the painters often convey emotional energy to the audience through the media. Through the effect of this emotional transfe...

    Chin-Ling Chen, Qing-Yang Huang, Ming Zhou in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS

    With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage, but has also extended to cloud database storage methods. To ...

    Der-Chen Huang, Ling-Chun Liu, Yong-Yuan Deng, Chin-Ling Chen in Cluster Computing (2024)

  3. No Access

    Article

    An IoT and blockchain based logistics application of UAV

    With the increasing number of online consumers, the relationship between the Internet of things and the Internet is becoming closer. Logistics transportation plays an important role in the whole online shoppin...

    Chin-Ling Chen, Yong-Yuan Deng, Shunzhi Zhu in Multimedia Tools and Applications (2024)

  4. No Access

    Article

    A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing

    In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because the...

    Chin-Ling Chen, Mao-Lun Chiang, Hui-Ching Hsieh in Wireless Personal Communications (2020)

  5. No Access

    Chapter and Conference Paper

    Enhanced WPA2/PSK for Preventing Authentication Cracking

    With the popularization of mobile phones and Wi-Fi hotspots, the diversification of wireless communication applications has rapidly growing. Wi-Fi Protected Access (WPA), offered by network user authentication...

    Chin-Ling Chen, Supaporn Punya in Mobile Wireless Middleware, Operating Syst… (2020)

  6. No Access

    Chapter and Conference Paper

    A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System

    As wireless sensor networks (WSN) and Internet of things (IoT) have rapidly developed over recent years, the smart vehicular system is designed in the environment of WSN to provide vehicle related applications...

    Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen in Internet of Vehicles. Technologies and Ser… (2018)

  7. No Access

    Chapter and Conference Paper

    Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems

    Nowadays users can access various online services and resources from distributed information systems remotely via Internet or other public networks. However, remote online systems are vulnerable to many securi...

    Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee in Green, Pervasive, and Cloud Computing (2017)

  8. No Access

    Chapter and Conference Paper

    Design of a Secure Emergency Communication System Based on Cloud for Pregnancy

    Due to the high maternal mortality, it is particularly necessary to attend pregnant woman by emergency communication system as timely treatment to avoid maternal deaths. In this paper, we propose an emergency ...

    Guan-Chen Li, Chin-Ling Chen, Feng Lin in Green, Pervasive, and Cloud Computing (2017)

  9. No Access

    Article

    A Secure Ambulance Communication Protocol for VANET

    Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANET’s main applications are enhancing road safety and reducing traffic accidents. Moreover, the VANET system can also reduce the...

    Chin-Ling Chen, Ing-Chau Chang, Chun-Hsin Chang in Wireless Personal Communications (2013)

  10. No Access

    Article

    A secure ownership transfer protocol using EPCglobal Gen-2 RFID

    Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be ...

    Chin-Ling Chen, Yu-Chung Huang, Jehn-Ruey Jiang in Telecommunication Systems (2013)

  11. No Access

    Article

    Extension of an Efficient 3GPP Authentication and Key Agreement Protocol

    Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of 3GPP authentication and key agreement protocol i...

    Cheng-Chi Lee, Chin-Ling Chen, Hsia-Hung Ou in Wireless Personal Communications (2013)

  12. No Access

    Article

    An Ownership Transfer Scheme Using Mobile RFIDs

    RFID reader equipment is widely used in hand-held devices; thus, the security of the connection between mobile readers and RFID servers is an important issue. In this paper, we propose a novel scheme with low ...

    Chin-Ling Chen, Chih-Feng Chien in Wireless Personal Communications (2013)

  13. No Access

    Chapter and Conference Paper

    An IPv6 Multihomed Host for Outbound Traffic

    Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host arch...

    Chin-Ling Chen, Sheng-Lung Cao in Intelligent Computing and Information Science (2011)

  14. No Access

    Chapter and Conference Paper

    Enabling Two Levels of Adaptation: A Framework for Traffic-Aware and Context Management Deployment

    This paper presents a novel approach in that it provides both inter-service adaptation by reconfiguring current available services in reaction to environment changes and intra-service adaptation by selecting t...

    Chin-Ling Chen, Jia-Ching Wang in Intelligent Computing and Information Science (2011)

  15. No Access

    Article

    A Non-repudiated Self-service Store System Based on Portable Trusted Device

    Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. However, the ...

    Chin-Ling Chen, Yu-Yi Chen in Wireless Personal Communications (2009)

  16. No Access

    Article

    A Mobile Ticket System Based on Personal Trusted Device

    Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. In this paper...

    Yu-Yi Chen, Chin-Ling Chen, **n-Ke Jan in Wireless Personal Communications (2007)

  17. No Access

    Chapter and Conference Paper

    A Secure Authentication Scheme for a Public Terminal Before a Transaction

    Due to the fast progress of the Internet, and with the increasing numbers of public terminals spread everywhere, people can access personal sensitive data or perform transactions easily through these public te...

    Chin-Ling Chen, Yu-Yi Chen, **n-Ke Jan in Network-Based Information Systems (2007)