Chunhua Su
Chunhua Su
Division of Computer Science, University of Aizu, Japan
Verified email at u-aizu.ac.jp
TitleCited byYear
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
772010
A blockchain connected gateway for BLE-based devices in the internet of things
SC Cha, JF Chen, C Su, KH Yeh
IEEE Access 6, 24639-24649, 2018
462018
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
Ieee Access 6, 7234-7243, 2017
252017
Privacy-preserving two-party k-means clustering via secure approximation
C Su, F Bao, J Zhou, T Takagi, K Sakurai
21st International Conference on Advanced Information Networking and …, 2007
212007
A novel certificateless signature scheme for smart objects in the Internet-of-Things
KH Yeh, C Su, KKR Choo, W Chiu
Sensors 17 (5), 1001, 2017
202017
A distributed privacy-preserving association rules mining scheme using frequent-pattern tree
C Su, K Sakurai
International Conference on Advanced Data Mining and Applications, 170-181, 2008
172008
Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data
K Liang, C Su, J Chen, JK Liu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
162016
You think, therefore you are: Transparent authentication system with brainwave-oriented bio-features for IoT networks
L Zhou, C Su, W Chiu, KH Yeh
IEEE Transactions on Emerging Topics in Computing, 2017
152017
Special issue on advanced persistent threat
J Chen, C Su, KH Yeh, M Yung
Future Generation Computer Systems 79, 243-246, 2018
142018
I walk, therefore i am: continuous user authentication with plantar biometrics
KH Yeh, C Su, W Chiu, L Zhou
IEEE Communications Magazine 56 (2), 150-157, 2018
132018
Improved handover authentication and key pre‐distribution for wireless mesh networks
X Yang, X Huang, J Han, C Su
Concurrency and Computation: Practice and Experience 28 (10), 2978-2990, 2016
132016
Lightweight IoT-based authentication scheme in cloud computing circumstance
L Zhou, X Li, KH Yeh, C Su, W Chiu
Future Generation Computer Systems 91, 244-251, 2019
112019
Improved lightweight pseudo-random number generators for the low-cost rfid tags
J Chen, A Miyaj, H Sato, C Su
2015 IEEE Trustcom/BigDataSE/ISPA 1, 17-24, 2015
102015
Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
C Su, F Bao, J Zhou, T Takagi, K Sakurai
IEICE transactions on fundamentals of electronics, communications and …, 2009
102009
Two-party privacy-preserving agglomerative document clustering
C Su, J Zhou, F Bao, T Takagi, K Sakurai
International Conference on Information Security Practice and Experience …, 2007
102007
Secure computation over distributed databases
C Su, K Sakurai
IPSJ journal, 2005
102005
Game theoretic security of quantum bit commitment
L Zhou, X Sun, C Su, Z Liu, KKR Choo
Information Sciences 479, 503-514, 2019
72019
A user-friendly privacy framework for users to achieve consents with nearby BLE devices
SC Cha, MS Chuang, KH Yeh, ZJ Huang, C Su
IEEE Access 6, 20779-20787, 2018
72018
Universally composable RFID mutual authentication
C Su, B Santoso, Y Li, RH Deng, X Huang
IEEE Transactions on Dependable and Secure Computing 14 (1), 83-94, 2015
72015
A new scheme for distributed density estimation based privacy-preserving clustering
C Su, F Bao, J Zhou, T Takagi, K Sakurai
2008 Third International Conference on Availability, Reliability and …, 2008
72008
The system can't perform the operation now. Try again later.
Articles 1–20