Skip to main content

and
  1. Article

    Open Access

    Machine learning for trust, security, and privacy in computing and communications

    Chin-Ling Chen, Haishuai Wang in EURASIP Journal on Wireless Communications… (2023)

  2. No Access

    Chapter and Conference Paper

    An Early Detection of Distributed Denial of Service Attack

    attacks are arduous to detect because they can generate the attack traffic to flood the victim host from a large number of zombie machines. In this paper, we have designed and implemented an early attack de...

    Chin-Ling Chen, Chieh-Min Chen in Advanced Computational Paradigms and Hybri… (2022)

  3. No Access

    Article

    A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing

    In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because the...

    Chin-Ling Chen, Mao-Lun Chiang, Hui-Ching Hsieh in Wireless Personal Communications (2020)

  4. No Access

    Chapter and Conference Paper

    A Survey of Authentication Protocols in Logistics System

    E-commerce has developed rapidly in recent years. Many services and applications integrate IOT technologies are offered. Logistics is a representative application which focuses on rapid delivery, integrity of ...

    Chin-Ling Chen, Dong-Peng Lin, Chin-Feng Lee in Advances in Intelligent Information Hiding… (2020)

  5. No Access

    Chapter and Conference Paper

    An ECC Based Secure and Convenient Rural Medical Care System

    As hardware and software technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come to form the Internet of Things. At the sa...

    Yong-Yuan Deng, Chin-Ling Chen in Mobile and Wireless Technology 2018 (2019)

  6. No Access

    Chapter and Conference Paper

    Development of Audio and Visual Attention Assessment System in Combination with Brain Wave Instrument: Apply to Children with Attention Deficit Hyperactivity Disorder

    The main purpose of this study mainly for children with attention deficit hyperactivity disorder (ADHD) to attention test, combined the development of the Visual and Audio Attention Test System (VAAT). We use ...

    Chin-Ling Chen, Yung-Wen Tang, Yong-Feng Zhou in Genetic and Evolutionary Computing (2018)

  7. No Access

    Article

    A Secure Ambulance Communication Protocol for VANET

    Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANET’s main applications are enhancing road safety and reducing traffic accidents. Moreover, the VANET system can also reduce the...

    Chin-Ling Chen, Ing-Chau Chang, Chun-Hsin Chang in Wireless Personal Communications (2013)

  8. No Access

    Article

    Extension of an Efficient 3GPP Authentication and Key Agreement Protocol

    Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of 3GPP authentication and key agreement protocol i...

    Cheng-Chi Lee, Chin-Ling Chen, Hsia-Hung Ou in Wireless Personal Communications (2013)

  9. No Access

    Article

    An Ownership Transfer Scheme Using Mobile RFIDs

    RFID reader equipment is widely used in hand-held devices; thus, the security of the connection between mobile readers and RFID servers is an important issue. In this paper, we propose a novel scheme with low ...

    Chin-Ling Chen, Chih-Feng Chien in Wireless Personal Communications (2013)

  10. No Access

    Article

    A Non-repudiated Self-service Store System Based on Portable Trusted Device

    Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. However, the ...

    Chin-Ling Chen, Yu-Yi Chen in Wireless Personal Communications (2009)

  11. Article

    Open Access

    Dynamic Session-Key Generation for Wireless Sensor Networks

    Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must b...

    Chin-Ling Chen, Cheng-Ta Li in EURASIP Journal on Wireless Communications and Networking (2008)

  12. No Access

    Article

    A Mobile Ticket System Based on Personal Trusted Device

    Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. In this paper...

    Yu-Yi Chen, Chin-Ling Chen, **n-Ke Jan in Wireless Personal Communications (2007)