default search action
Wen-Chung Kuo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Zahid Ghaffar, Wen-Chung Kuo, Khalid Mahmood, Tayyaba Tariq, Ali Kashif Bashir, Marwan Omar:
A Machine Learning Attack Resilient and Low-Latency Authentication Scheme for AI-Driven Patient Health Monitoring System. IEEE Commun. Stand. Mag. 8(3): 36-42 (2024) - 2020
- [c32]Wen-Chung Kuo, Wan-Hsuan Kao, Chun-Cheng Wang, Yu-Chih Huang:
3D-Playfair Encrypted Message Verification Technology based on MD5. AsiaJCIS 2020: 110-114
2010 – 2019
- 2019
- [j25]Kai Chain, Wen-Chung Kuo:
A novel multisignature scheme based on chaotic maps. J. Intell. Fuzzy Syst. 36(2): 1023-1032 (2019) - [j24]Wen-Chung Kuo, Chun-Cheng Wang, Shao-Hung Kuo, Lih-Chyau Wuu:
Verifiable data hiding scheme with tamper detection. J. Intell. Fuzzy Syst. 36(2): 1311-1321 (2019) - [c31]Wen-Chung Kuo, Tsung-Ping Liu, Chun-Cheng Wang:
Study on Android Hybrid Malware Detection Based on Machine Learning. ICCCS 2019: 31-35 - 2018
- [j23]Chun-Cheng Wang, Wen-Chung Kuo, Yu-Chih Huang, Lih-Chyau Wuu:
A high capacity data hiding scheme based on re-adjusted GEMD. Multim. Tools Appl. 77(5): 6327-6341 (2018) - [c30]Wen-Chung Kuo, Yu-Pin Lin:
Malware Detection Method Based on CNN. ICS 2018: 608-617 - 2017
- [j22]Kai Chain, Kuei-Hu Chang, Wen-Chung Kuo, Jar-Ferr Yang:
Enhancement authentication protocol using zero-knowledge proofs and chaotic maps. Int. J. Commun. Syst. 30(1) (2017) - [j21]Wen-Chung Kuo, Po-Wei Shih, Yu-Chih Huang, Lih-Chyau Wuu:
Anonymous and Authentication Protocol For Multi-Server. Inf. Technol. Control. 46(2): 235-245 (2017) - [j20]Wen-Chung Kuo, Sheng-Yi Chang, Chun-Cheng Wang, Chin-Chen Chang:
Secure multi-group data hiding based on gemd map. Multim. Tools Appl. 76(2): 1901-1919 (2017) - 2016
- [j19]Wen-Chung Kuo, Chun-Cheng Wang, Hong-Ching Hou:
Signed digit data hiding scheme. Inf. Process. Lett. 116(2): 183-191 (2016) - [j18]Wen-Chung Kuo, Chi-Sheng Lin, Chen-Tsun Chuang, Ming-Chih Kao:
Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps. Inf. Technol. Control. 45(2): 208-213 (2016) - [c29]Wen-Chung Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu, Yu-Chih Huang:
An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method. AsiaJCIS 2016: 136-140 - 2015
- [j17]Wen-Chung Kuo, Ming-Chih Kao, Chin-Chen Chang:
A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme. J. Inf. Hiding Multim. Signal Process. 6(4): 718-727 (2015) - [j16]Wen-Chung Kuo, Po-Yu Lai, Chun-Cheng Wang, Lih-Chyau Wuu:
A Formula Diamond Encoding Data Hiding Scheme. J. Inf. Hiding Multim. Signal Process. 6(6): 1167-1176 (2015) - [c28]Wen-Chung Kuo, Hong-Ji Wei, Yu-Hui Chen, Jiin-Chiou Cheng:
An Enhanced Secure Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments. AsiaJCIS 2015: 1-5 - [c27]Wen-Chung Kuo, Shao-Hung Kuo, Hong-Yi Chang, Lih-Chyau Wuu:
Authenticated Secret Sharing Scheme Based on GMEMD. IWDW 2015: 395-405 - [c26]Ching-Nung Yang, Fu-Heng Wu, Sin-Yen Tsai, Wen-Chung Kuo:
E-Health Services for Elderly Care Based on Google Cloud Messaging. SmartCity 2015: 9-12 - 2014
- [j15]Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu:
Robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst. 27(2): 377-389 (2014) - [j14]Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng:
An efficient and secure anonymous mobility network authentication scheme. J. Inf. Secur. Appl. 19(1): 18-24 (2014) - [j13]Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng:
Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks. Inf. Technol. Control. 43(2): 151-156 (2014) - [j12]Lih-Chyau Wuu, Chi-Hsiang Hung, Wen-Chung Kuo:
Group Key Management based on (2, 2) Secret Sharing. KSII Trans. Internet Inf. Syst. 8(3): 1144-1156 (2014) - [j11]Wen-Chung Kuo, Sheng-Yi Chang:
Hybrid GEMD Data Hiding. J. Inf. Hiding Multim. Signal Process. 5(3): 420-430 (2014) - [j10]Kai Chain, Wen-Chung Kuo, Jyun-Pei Siang, Jiin-Chiou Cheng:
A DoS-Resistant Robust Identification and Key Agreement Protocol with User Anonymity. J. Inf. Hiding Multim. Signal Process. 5(4): 666-671 (2014) - [c25]Yu-Chih Huang, Wen-Chung Kuo, Ching-Nung Yang:
Data Hiding Based on Radix-2. AsiaJCIS 2014: 170-174 - [c24]Wen-Chung Kuo, Hong-Ji Wei, Yu-Hui Chen, Jiin-Chiou Cheng:
Cryptanalysis of Anonymous Authenticated and Key Agreement Scheme Based on Biometric for Multi-Server Environment. ICS 2014: 782-787 - [c23]Wen-Chung Kuo, Chun-Cheng Wang, Hong-Ching Hou, Chen-Tsun Chuang:
Reversible Shared Data Hiding Based on Modified Signed Digit EMD. IWDW 2014: 266-275 - 2013
- [j9]Wen-Chung Kuo, Ming-Chih Kao:
A Steganographic Scheme Based on Formula Fully Exploiting Modification Directions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(11): 2235-2243 (2013) - [j8]Wen-Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu:
Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy. Inf. Technol. Control. 42(2): 124-130 (2013) - [j7]Wen-Chung Kuo:
Secure Modulus Data Hiding Scheme. KSII Trans. Internet Inf. Syst. 7(3): 600-612 (2013) - [j6]Wen-Chung Kuo:
Image Hiding by Square Fully Exploiting Modification Directions. J. Inf. Hiding Multim. Signal Process. 4(3): 128-137 (2013) - [c22]Ming-Chih Kao, Wen-Chung Kuo, Yu-Hsuan Pan:
Automatic Adding License Management Functionality for Android Applications. AsiaJCIS 2013: 122-126 - [c21]Wen-Chung Kuo, Sheng-Yi Chang:
A GEMD Data Hiding by Pixel Segmentation Strategy. IMIS 2013: 149-152 - 2012
- [j5]Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu:
A Secure Password-Based Remote User Authentication Scheme without Smart Cards. Inf. Technol. Control. 41(1): 53-59 (2012) - [c20]Wen-Chung Kuo, Shao-Hung Kuo:
Reversible Data Hiding for JPEG Based on EMD. AsiaJCIS 2012: 1-5 - [c19]Wen-Chung Kuo, Yi-Heng Chen, Yu-Chih Huang:
High-Capacity Steganographic Method Based on Division Arithmetic and LSB Replacement. ITCS 2012: 285-291 - 2011
- [c18]Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu:
Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response. ICGEC 2011: 9-12 - [c17]Wen-Chung Kuo, Yi-Lin Chen, Shuen-Chih Tsai, Jung-Shian Li:
Single-Packet IP Traceback with Less Logging. IIH-MSP 2011: 97-100 - 2010
- [j4]Bae-Ling Chen, Wen-Chung Kuo, Yu-Shuan Chu:
Weaknesses of a Secure Dynamic ID Based Remote User Authentication Scheme. J. Convergence Inf. Technol. 5(4): 84-89 (2010) - [c16]Lih-Chyau Wuu, Wen-Bin Li, Wen-Chung Kuo:
Detour Routing Protocol for Geographic Sensor Networks. BWCCA 2010: 505-510 - [c15]Wen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu:
High Flexible Sanitizing Signature Scheme Based on Bilinear Maps. FGIT 2010: 402-412 - [c14]Wen-Chung Kuo, Shao-Hung Kuo, Lih-Chyau Wuu:
High Embedding Reversible Data Hiding Scheme for JPEG. IIH-MSP 2010: 74-77 - [c13]Wen-Chung Kuo, Po-Yu Lai, Lih-Chyau Wuu:
Adaptive reversible data hiding based on histogram. ISDA 2010: 1376-1381 - [c12]Wen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu:
Digitally signed document flexible sanitizing scheme based on bilinear maps. ISI 2010: 172
2000 – 2009
- 2009
- [j3]Shang-Ming Jen, Chi-Sung Laih, Wen-Chung Kuo:
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET. Sensors 9(6): 5022-5039 (2009) - [c11]Lih-Chyau Wuu, Yen-Ju Chen, Chi-Hsiang Hung, Wen-Chung Kuo:
Zero-Collision RFID Tags Identification Based on CDMA. IAS 2009: 513-516 - [c10]Yung-Cheng Lee, Wen-Chung Kuo, Yi-Chih Hsieh, Ta-Cheng Chen:
Security Enhancement of the Authentication Protocol for RFID Systems. IAS 2009: 521-524 - [c9]Wen-Chung Kuo, Lih-Chyau Wuu, Chia-Nian Shyi, Shao-Hung Kuo:
A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method. HIS (3) 2009: 69-72 - [c8]Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang:
Reversible Secret Image Sharing Based on Shamir's Scheme. IIH-MSP 2009: 1014-1017 - 2008
- [c7]Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang:
Enhance the Image Sharing with Steganography and Authentication. IIH-MSP 2008: 1177-1181 - 2007
- [j2]Wen-Chung Kuo:
Comments on "A Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation". IEEE Trans. Multim. 9(2): 420-421 (2007) - [c6]Wen-Chung Kuo:
On ElGamal Signature Scheme. FGCN (2) 2007: 151-153 - [c5]Wen-Chung Kuo, Dong-Jin Jiang, Yu-Chih Huang:
Reversible Data Hiding Based on Histogram. ICIC (2) 2007: 1152-1161 - 2006
- [c4]Chi-Sung Laih, Chun-Ju Fu, Wen-Chung Kuo:
Design a Secure and Practical Metering Scheme. International Conference on Internet Computing 2006: 443-447 - 2005
- [c3]Yung-Cheng Lee, Wen-Chung Kuo:
Attack and Improvement on the Lee-Chiu Remote Authentication Schem. DMS 2005: 357-360 - [c2]Wen-Chung Kuo, Ming-Yang Chen:
A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. ICITA (2) 2005: 576-579
1990 – 1999
- 1999
- [j1]Wen-Chung Kuo, Chi-Sung Laih, Min-Jea Gau:
On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes. J. Inf. Sci. Eng. 15(5): 701-713 (1999) - 1995
- [c1]Chi-Sung Laih, Wen-Chung Kuo:
Cryptanalysis of the Enhanced ElGamal's Signature Scheme. Cryptography: Policy and Algorithms 1995: 228-231
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 01:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint