Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    KEP: Keystroke Evoked Potential for EEG-Based User Authentication

    In recent years, the rapid proliferation of Brain-Computer Interface (BCI) applications has made the issue of security increasingly important. User authentication serves as the cornerstone of any secure BCI sy...

    Jiaxuan Wu, Wei-Yang Chiu, Weizhi Meng in Artificial Intelligence Security and Privacy (2024)

  2. No Access

    Chapter and Conference Paper

    Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation

    In the research society, many solutions to solving blockchain scaling have been tried historically, usually by compromising on decentralisation. Ethereum has chosen to scale by switching to Proof of Stake (PoS...

    Johan Hagelskjar Sjursen, Weizhi Meng in Information and Communications Security (2023)

  3. No Access

    Chapter and Conference Paper

    A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security

    Public transportation not only has a high utilization rate but also has a high density of population on-board. Kee** these facilities safe-to-use and well-functioned is the highest priority since it is heavi...

    Wictor Lang Jensen, Sille Jessing, Wei-Yang Chiu, Weizhi Meng in Science of Cyber Security (2022)

  4. No Access

    Chapter and Conference Paper

    Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System

    In recent years, with the fast development of autonomous driving technology, the Internet of Vehicles (IoV) has received much more attention regarding the security aspect. The traditional security defense stra...

    Bodi Bodi, Wei-Yang Chiu, Weizhi Meng in Information Security Practice and Experience (2022)

  5. No Access

    Chapter and Conference Paper

    Designing Enhanced Robust 6G Connection Strategy with Blockchain

    With the rapid evolution of wireless communication technologies, the new generation of 6G is already under development, due to the next step-change in performance from Gigabit to Terabit capacities as well as ...

    August Lykke Thomsen, Bastian Preisel in Information Security Practice and Experien… (2022)

  6. No Access

    Chapter and Conference Paper

    FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks

    Electronic Identity (eID) is a solution toward solving the identity problem when deploying e-Government. Such solution should not only be secure, but also have to be robust enough under adversarial conditions....

    Wei-Yang Chiu, Weizhi Meng, Wenjuan Li, Liming Fang in Provable and Practical Security (2022)

  7. No Access

    Article

    EdgeTC - a PBFT blockchain-based ETC scheme for smart cities

    To improve the quality of mobility and transportation in a smart city, Electronic Toll Collection (ETC) system has been widely implemented along toll roads, which can automatically collect the usage fee from v...

    Wei-Yang Chiu, Weizhi Meng in Peer-to-Peer Networking and Applications (2021)

  8. No Access

    Chapter and Conference Paper

    I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication

    In the coming period of Internet of Things (IoT), user authentication is one important and essential security mechanism to protect assets from unauthorized access. Textual passwords are the most widely adopted...

    Wei-Yang Chiu, Weizhi Meng, Wenjuan Li in Security, Privacy, and Anonymity in Comput… (2021)

  9. No Access

    Chapter and Conference Paper

    Mind the Scraps: Attacking Blockchain Based on Selfdestruct

    A smart contract is a program that resides its binary code and states in blockchain to provide contract-like functionality. The binary code is unchangeable once it is deployed into the chain. This can ensure t...

    Wei-Yang Chiu, Weizhi Meng in Information Security and Privacy (2021)

  10. No Access

    Chapter and Conference Paper

    ActAnyware - Blockchain-Based Software Licensing Scheme

    Software validation is a long battle between software developers and software pirates. License validation is proposed as the protection of both developer’s revenue and intellectual properties. However, as the ...

    Wei-Yang Chiu, Lu Zhou, Weizhi Meng, Zhe Liu in Blockchain and Trustworthy Systems (2021)

  11. No Access

    Chapter and Conference Paper

    NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm

    The increasingly interconnected network results in the change of information flow between users and service providers, hence there is an emerging need for building a secure channel for connections. Currently, ...

    Wei-Yang Chiu, Weizhi Meng, Christian D. Jensen in Frontiers in Cyber Security (2020)