Chien-Ming Chen
Chien-Ming Chen
SMIEEE, Associate Professor, Shandong University of Science and Technology
Verified email at
Cited by
Cited by
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
A secure authentication protocol for Internet of vehicles
CM Chen, B Xiang, Y Liu, KH Wang
IEEE Access 7, 12047-12057, 2019
Stolen-verifier attack on two new strong-password authentication protocols
CM Chen, WC Ku
IEICE Transactions on communications 85 (11), 2519-2521, 2002
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
WC Ku, CM Chen, HL Lee
IEICE Transactions on Communications 86 (5), 1682-1684, 2003
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74 (1), 65-70, 2018
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
CT Li, TY Wu, CL Chen, CC Lee, CM Chen
Sensors 17 (7), 1482, 2017
A multilevel model of team cultural diversity and creativity: The role of climate for inclusion
CR Li, CJ Lin, YH Tien, CM Chen
The Journal of Creative Behavior 51 (2), 163-179, 2017
An efficient countermeasure to the selective forwarding attack in wireless sensor networks
HM Sun, CM Chen, YC Hsiao
TENCON 2007-2007 IEEE Region 10 Conference, 1-4, 2007
A secure authentication scheme for Internet of Things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
A defence scheme against Identity Theft Attack based on multiple social networks
BZ He, CM Chen, YP Su, HM Sun
Expert Systems with Applications 41 (5), 2345-2352, 2014
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol
CM Chen, L Xu, TY Wu, CR Li
Journal of Network Intelligence, 2016
Flexible-pay-per-channel: A new model for content access control in pay-TV broadcasting systems
HM Sun, CM Chen, CZ Shieh
IEEE Transactions on Multimedia 10 (6), 1109-1120, 2008
PoRX: A reputation incentive scheme for blockchain consensus of IIoT
EK Wang, Z Liang, CM Chen, S Kumari, MK Khan
Future Generation Computer Systems 102, 140-151, 2020
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
WC Ku, CM Chen, HL Lee
ACM SIGOPS Operating Systems Review 37 (4), 19-25, 2003
Mobile jamming attack and its countermeasure in wireless sensor networks
HM Sun, SP Hsu, CM Chen
21st International Conference on Advanced Information Networking and …, 2007
A secure authenticated and key exchange scheme for fog computing
CM Chen, Y Huang, KH Wang, S Kumari, ME Wu
Enterprise Information Systems, 1-16, 2020
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks
TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar, CM Chen
IEEE Access 8, 28096-28108, 2020
An efficient and verifiable concealed data aggregation scheme in wireless sensor networks
HM Sun, YC Hsiao, YH Lin, CM Chen
2008 International Conference on Embedded Software and Systems, 19-26, 2008
The system can't perform the operation now. Try again later.
Articles 1–20