default search action
Chien-Lung Hsu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Tsai-Hsuan Tsai, Hsin-Yu Lo, Shih-Lin Wu, Yueh-Peng Chen, Chien-Lung Hsu:
Technological Empowerment for Aging Workforce in Elderly Care Programs: Service Model Design and Development of an Elderly Care Shared Service Platform. HCI (15) 2024: 334-344 - 2022
- [j66]Tuan-Vinh Le, Chung-Fu Lu, Chien-Lung Hsu, Trung K. Do, Yen-Fang Chou, Wei-Cheng Wei:
A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems. IEEE Access 10: 28975-28990 (2022) - [j65]Tuan-Vinh Le, Chien-Lung Hsu, Wei-Xin Chen:
A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids. IEEE Trans. Ind. Informatics 18(9): 5771-5782 (2022) - 2021
- [j64]Tuan-Vinh Le, Chien-Lung Hsu:
An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments. IEEE Access 9: 53408-53422 (2021) - [j63]Tzu-Wei Lin, Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu, Bo-Yu Huang:
A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems. Sensors 21(8): 2880 (2021) - 2020
- [j62]Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu, Tzu-Wei Lin, Tzu-Hsien Chuang:
A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks. IEEE Access 8: 40791-40808 (2020) - [j61]Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, Kuo-Yu Tsai, Chung-Fu Lu, Tzu-Wei Lin:
Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems. IEEE Access 8: 196553-196566 (2020) - [j60]Alice May-Kuen Wong, Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, Tzu-Wei Lin:
Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks. Sensors 20(9): 2511 (2020) - [j59]Chien-Lung Hsu, Wei-Xin Chen, Tuan-Vinh Le:
An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things. Sensors 20(22): 6471 (2020) - [c14]Chien-Lung Hsu, Tuan-Vinh Le:
A Time Bound Dynamic Group key Distribution Scheme with Anonymous Three-factor Identification for IoT-Based Multi-Server Environments. AsiaJCIS 2020: 59-65
2010 – 2019
- 2019
- [j58]Chien-Lung Hsu, Yi-Chuan Liao:
Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model. Future Internet 11(6): 134 (2019) - 2018
- [j57]Tzu-Wei Lin, Chien-Lung Hsu:
Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps. J. Supercomput. 74(9): 4521-4541 (2018) - 2017
- [j56]Liang-Chun Chen, Chien-Lung Hsu, Nai-Wei Lo, Kuo-Hui Yeh, Ping-Hsien Lin:
Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks. IEICE Trans. Inf. Syst. 100-D(10): 2267-2274 (2017) - [j55]Chien-Lung Hsu, Chun-Hao Chiang:
Electronic Commerce Research Profiles: Comparing E-Commerce and Information Systems Journals. Pac. Asia J. Assoc. Inf. Syst. 9(3): 4 (2017) - [c13]Chien-Lung Hsu, Tzu-Wei Lin, Huang-Chia Lu, Tzu-Hsien Chuang, Yu-Han Chen:
Privacy-preserved conference key distribution protocol. ICDIM 2017: 127-132 - [c12]Chien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen, Tzu-Wei Lin, Huang-Chia Lu:
A dynamic identity end-to-end authentication key exchange protocol for IoT environments. ICDIM 2017: 133-138 - 2016
- [c11]Kuo-Hui Yeh, Chunhua Su, Chien-Lung Hsu, Wayne Chiu, Yu-Fan Hsueh:
Transparent authentication scheme with adaptive biometrie features for IoT networks. GCCE 2016: 1-2 - 2015
- [j54]Chien-Lung Hsu, J. Christopher Westland, Chun-Hao Chiang:
Editorial: Electronic Commerce Research in seven maps. Electron. Commer. Res. 15(2): 147-158 (2015) - [j53]Hung-Yu Chien, Tzong-Chen Wu, Chien-Lung Hsu:
RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model. IEICE Trans. Inf. Syst. 98-D(4): 750-759 (2015) - [j52]Chien-Lung Hsu, Atsuo Inomata, Sk. Md. Mizanur Rahman, Fatos Xhafa, Laurence T. Yang:
Security, Privacy, and Applications in Mobile Healthcare. Int. J. Distributed Sens. Networks 11: 675129:1-675129:2 (2015) - [j51]Chien-Lung Hsu, Chun-Hao Chiang:
A bibliometric study of SSME in information systems research. Scientometrics 102(3): 1835-1865 (2015) - [j50]Chien-Lung Hsu, Yu-Hao Chuang, Chen-li Kuo:
A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet. Wirel. Pers. Commun. 83(1): 163-174 (2015) - [c10]Chien-Lung Hsu, Tzu-Wei Lin:
Privacy-Preserved Key Agreement with User Authentication. AsiaJCIS 2015: 12-17 - [p1]Yu-Hao Chuang, Chien-Lung Hsu, Wesley Shu, Kevin C. Hsu, Min-Wen Liao:
A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography. New Trends in Intelligent Information and Database Systems 2015: 183-190 - 2014
- [j49]Chien-Lung Hsu, Yu-Li Lin:
Improved migration for mobile computing in distributed networks. Comput. Stand. Interfaces 36(3): 577-584 (2014) - [j48]Arthur J. Lin, Chien-Lung Hsu, Eldon Y. Li:
Improving the effectiveness of experiential decisions by recommendation systems. Expert Syst. Appl. 41(10): 4904-4914 (2014) - [j47]Chien-Lung Hsu, Han-Yu Lin:
Universal forgery attack on a strong designated verifier signature scheme. Int. Arab J. Inf. Technol. 11(5): 425-428 (2014) - [j46]Chien-Lung Hsu, Yi-Chuan Liao:
Exploring the linkages between perceived information accessibility and microblog stickiness: The moderating role of a sense of community. Inf. Manag. 51(7): 833-844 (2014) - [j45]Chien-Lung Hsu, Yu-Hao Chuang, Pei-Ling Tsai, Atif Alamri, Sk. Md. Mizanur Rahman:
Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions. Inf. Technol. Control. 43(4): 381-389 (2014) - [c9]Chien-Lung Hsu, Yu-Hao Chuang, Pei-Ling Tsai:
Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings. ICS 2014: 914-924 - 2013
- [j44]Chien-Lung Hsu, Arthur J. Lin:
The effect of community identity on continuance intention of microblogging. Int. J. Electron. Bus. 10(4): 355-382 (2013) - [j43]Chien-Lung Hsu, Han-Yu Lin:
An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network. KSII Trans. Internet Inf. Syst. 7(11): 2928-2940 (2013) - [j42]Chien-Lung Hsu, Ming-Ren Lee, Chien-Hui Su:
The Role of Privacy Protection in Healthcare Information Systems Adoption. J. Medical Syst. 37(5): 9966 (2013) - [j41]Kevin C. Tseng, Chien-Lung Hsu, Yu-Hao Chuang:
Designing an Intelligent Health Monitoring System and Exploring User Acceptance for the Elderly. J. Medical Syst. 37(6): 9967 (2013) - [j40]Kevin C. Tseng, Alice May-Kuen Wong, Chien-Lung Hsu, Tsai-Hsuan Tsai, Chang-Mu Han, Ming-Ren Lee:
The iFit: An Integrated Physical Fitness Testing System to Evaluate the Degree of Physical Fitness of the Elderly. IEEE Trans. Biomed. Eng. 60(1): 184-188 (2013) - [c8]Chien-Lung Hsu, Ming-Ren Lee:
User Acceptance of a Community-Based Healthcare Information System Preserving User Privacy. HCI (8) 2013: 453-462 - [c7]Chien-Lung Hsu, Tzu-Wei Lin:
Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map. PerCom Workshops 2013: 90-95 - 2012
- [j39]Chien-Lung Hsu, Kevin C. Tseng, Yu-Hao Chuang:
A secure IRB system for assisting the development of intelligent medical devices. Expert Syst. Appl. 39(16): 12512-12521 (2012) - [j38]Chung-Fu Lu, Chien-Lung Hsu, Han-Yu Lin:
Provably convertible multi-authenticated encryption scheme for generalized group communications. Inf. Sci. 199: 154-166 (2012) - [j37]Chien-Lung Hsu, Chung-Fu Lu:
A Security and Privacy Preserving E-Prescription System Based on Smart Cards. J. Medical Syst. 36(6): 3637-3647 (2012) - [j36]Chien-Lung Hsu, Han-Yu Lin:
Pairing-based strong designated verifier proxy signature scheme with low cost. Secur. Commun. Networks 5(5): 517-522 (2012) - 2011
- [j35]Arthur J. Lin, Chien-Lung Hsu, Tsui-Hsu Tsai:
The Influences of National Images on Marketing Performance: A Mediated Model Link. Int. J. Electron. Bus. Manag. 9(3): 171-186 (2011) - [j34]Han-Yu Lin, Chien-Lung Hsu:
A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme. Int. J. Found. Comput. Sci. 22(3): 739-756 (2011) - [j33]Han-Yu Lin, Chien-Lung Hsu, Shih-Kun Huang:
Improved convertible authenticated encryption scheme with provable security. Inf. Process. Lett. 111(13): 661-666 (2011) - [j32]Chien-Lung Hsu, Han-Yu Lin:
New identity-based key-insulated convertible multi-authenticated encryption scheme. J. Netw. Comput. Appl. 34(5): 1724-1731 (2011) - [j31]Yu-Li Lin, Chien-Lung Hsu:
Secure key management scheme for dynamic hierarchical access control based on ECC. J. Syst. Softw. 84(4): 679-685 (2011) - [j30]Chung-Fu Lu, Tzong-Chen Wu, Chien-Lung Hsu:
A three-level authenticated conference key establishment protocol for UMTS networks. J. Zhejiang Univ. Sci. C 12(5): 371-378 (2011) - [c6]Chien-Lung Hsu, Kevin C. Tseng, Chin-Lung Tseng, Boo-Chen Liu:
Design and Development a Social Networks Platform for Older People. HCI (6) 2011: 186-195 - [c5]Kevin C. Tseng, Chien-Lung Hsu, Yu-Hao Chuang:
A Telehealthcare System to Care for Older People Suffering from Metabolic Syndrome. HCI (6) 2011: 234-242 - [c4]Chien-Lung Hsu, Boo-Chen Liu, Yu-Li Lin:
A digital evidence protection method with hierarchical access control mechanisms. ICCST 2011: 1-9 - [c3]Chien-Lung Hsu, Yi-Shun Chan, Tzu-Wei Lin:
Security Analysis of an eSeal Used in Taiwan Customs Officials. ICPADS 2011: 668-675 - 2010
- [j29]Kuang-Hui Chiu, Chien-Lung Hsu:
Research on the Connections Between Corporate Social Responsibility and Corporation Image in the Risk Society: Take the Mobile Telecommunication Industry as an Example. Int. J. Electron. Bus. Manag. 8(3): 183-194 (2010) - [j28]Chien-Lung Hsu, Chia-Chang Liu, Yuan-Duen Lee:
Effect of Commitment and Trust towards Micro-blogs on Consumer Behavioral Intention: A Relationship Marketing Perspective. Int. J. Electron. Bus. Manag. 8(4): 292-303 (2010) - [j27]Kuo-Yu Tsai, Chien-Lung Hsu, Tzong-Chen Wu:
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. Int. J. Secur. Networks 5(1): 45-52 (2010) - [c2]Chien-Lung Hsu, Yu-Li Lin, Tzong-Chen Wu, Chain-Hui Su:
Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations. FGIT-FGCN (1) 2010: 23-36
2000 – 2009
- 2009
- [j26]Chien-Lung Hsu, Yu-Hao Chuang:
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks. Inf. Sci. 179(4): 422-429 (2009) - 2008
- [j25]Chien-Lung Hsu:
Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme. Comput. Syst. Sci. Eng. 23(6) (2008) - [j24]Tzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu:
Convertible multi-authenticated encryption scheme. Inf. Sci. 178(1): 256-263 (2008) - [j23]Tzong-Chen Wu, Thsia-Tzu Huang, Chien-Lung Hsu, Kuo-Yu Tsai:
Recursive protocol for group-oriented authentication with key distribution. J. Syst. Softw. 81(7): 1227-1239 (2008) - 2007
- [j22]Chien-Lung Hsu, Kuo-Yu Tsai, Pei-Ling Tsai:
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Inf. Sci. 177(2): 543-549 (2007) - [c1]Yu-Li Lin, Tzong-Chen Wu, Chien-Lung Hsu, Yen-Chun Chou:
Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics. FGCN (2) 2007: 154-158 - 2005
- [j21]Chien-Lung Hsu, Tzong-Sun Wu, Wei-Hua He:
New proxy multi-signature scheme. Appl. Math. Comput. 162(3): 1201-1206 (2005) - [j20]Chien-Lung Hsu, Tzong-Sun Wu:
Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability. Appl. Math. Comput. 164(1): 201-225 (2005) - [j19]Chien-Lung Hsu:
Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem. Appl. Math. Comput. 167(2): 882-890 (2005) - [j18]Chien-Lung Hsu, Tzong-Sun Wu:
Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack. Appl. Math. Comput. 168(1): 305-319 (2005) - [j17]Chien-Lung Hsu:
A user friendly remote authentication scheme with smart cards against impersonation attacks. Appl. Math. Comput. 170(1): 135-143 (2005) - 2004
- [j16]Chien-Lung Hsu, Tzong-Sun Wu:
Efficient proxy signature schemes using self-certified public keys. Appl. Math. Comput. 152(3): 807-820 (2004) - [j15]Tzong-Sun Wu, Chien-Lung Hsu:
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Comput. Secur. 23(2): 120-125 (2004) - [j14]Chien-Lung Hsu:
Security of Chien et al.'s remote user authentication scheme using smart cards. Comput. Stand. Interfaces 26(3): 167-169 (2004) - [j13]Tzong-Sun Wu, Chien-Lung Hsu:
Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers. Comput. Stand. Interfaces 26(5): 477-481 (2004) - [j12]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:
Group-oriented signature scheme with distinguished signing authoritie. Future Gener. Comput. Syst. 20(5): 865-873 (2004) - 2003
- [j11]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:
Improvement of threshold proxy signature scheme. Appl. Math. Comput. 136(2-3): 315-321 (2003) - [j10]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu, Chris J. Mitchell:
Improvement of modified authenticated key agreement protocol. Appl. Math. Comput. 142(2-3): 305-308 (2003) - [j9]Chien-Lung Hsu, Tzong-Sun Wu:
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Comput. Secur. 22(5): 453-456 (2003) - [j8]Tzong-Sun Wu, Chien-Lung Hsu, Han-Yu Lin, Po-Sheng Huang:
Improvement of the Miyazaki-Takaragi threshold digital signature scheme. Inf. Process. Lett. 88(4): 183-186 (2003) - [j7]Tzong-Sun Wu, Chien-Lung Hsu:
Threshold signature scheme using self-certified public keys. J. Syst. Softw. 67(2): 89-97 (2003) - [j6]Chien-Lung Hsu:
Security of two remote user authentication schemes using smart cards. IEEE Trans. Consumer Electron. 49(4): 1196-1198 (2003) - [j5]Tzong-Chen Wu, Chien-Lung Hsu:
Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Trans. Veh. Technol. 52(2): 462-464 (2003) - 2002
- [j4]Tzong-Sun Wu, Chien-Lung Hsu:
ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures. Appl. Math. Comput. 131(2-3): 349-356 (2002) - [j3]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:
Improvements of generalization of threshold signature and authenticated encryption for group communications. Inf. Process. Lett. 81(1): 41-45 (2002) - [j2]Tzong-Sun Wu, Chien-Lung Hsu:
Convertible authenticated encryption scheme. J. Syst. Softw. 62(3): 205-209 (2002) - 2001
- [j1]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:
New nonrepudiable threshold proxy signature scheme with known signers. J. Syst. Softw. 58(2): 119-124 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint