Chien-Ming Chen
Chien-Ming Chen
SMIEEE, Professor, Nanjing University of Information Science and Technology
Verified email at - Homepage
Cited by
Cited by
A secure authentication protocol for Internet of vehicles
CM Chen, B Xiang, Y Liu, KH Wang
IEEE Access 7, 12047-12057, 2019
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
Stolen-verifier attack on two new strong-password authentication protocols
CM Chen, WC Ku
IEICE Transactions on communications 85 (11), 2519-2521, 2002
PoRX: A reputation incentive scheme for blockchain consensus of IIoT
EK Wang, Z Liang, CM Chen, S Kumari, MK Khan
Future Generation Computer Systems 102, 140-151, 2020
A secure authenticated and key exchange scheme for fog computing
CM Chen, Y Huang, KH Wang, S Kumari, ME Wu
Enterprise Information Systems 15 (9), 1200-1215, 2021
A multilevel model of team cultural diversity and creativity: The role of climate for inclusion
CR Li, CJ Lin, YH Tien, CM Chen
The Journal of Creative Behavior 51 (2), 163-179, 2017
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10, 3133-3142, 2019
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74, 65-70, 2018
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
CT Li, TY Wu, CL Chen, CC Lee, CM Chen
Sensors 17 (7), 1482, 2017
A secure blockchain-based e-health records storage and sharing scheme
S Shamshad, K Mahmood, S Kumari, CM Chen
Journal of Information Security and Applications 55, 102590, 2020
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
WC Ku, CM Chen, HL Lee
IEICE Transactions on Communications 86 (5), 1682-1684, 2003
Decentralized E-voting systems based on the blockchain technology
JH Hsiao, R Tso, CM Chen, ME Wu
Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 17, 305-309, 2018
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain
EK Wang, CM Chen, MM Hassan, A Almogren
Future Generation Computer Systems 108, 135-144, 2020
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks
TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar, CM Chen
IEEE Access 8, 28096-28108, 2020
HDMA: hybrid D2D message authentication scheme for 5G-enabled VANETs
P Wang, CM Chen, S Kumari, M Shojafar, R Tafazolli, YN Liu
IEEE Transactions on Intelligent Transportation Systems 22 (8), 5071-5080, 2021
Selecting Hyper-Parameters of Gaussian Process Regression Based on Non-Inertial Particle Swarm Optimization in Internet of Things
L Kang, RS Chen, N Xiong, YC Chen, YX Hu, CM Chen
IEEE Access 7, 59504-59513, 2019
Discovering high utility-occupancy patterns from uncertain data
CM Chen, L Chen, W Gan, L Qiu, W Ding
Information Sciences 546, 1208-1229, 2021
A secure authentication scheme for Internet of Things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC
A Kumari, V Kumar, MY Abbasi, S Kumari, P Chaudhary, CM Chen
IEEE Access 8, 107838-107852, 2020
The system can't perform the operation now. Try again later.
Articles 1–20