default search action
Ruei-Hau Hsu
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Donghyun Yu, Sungho Lee, Ruei-Hau Hsu, Jemin Lee:
Ensuring End-to-End Security With Fine-Grained Access Control for Connected and Autonomous Vehicles. IEEE Trans. Inf. Forensics Secur. 19: 6962-6977 (2024) - 2023
- [j16]Ruei-Hau Hsu, Lu-Chin Wang, Hsiang-Shian Fan:
Universally Secure Device-to-Device Communications with Privacy Protection and Fine-grained Access Control Based on 5G-enabled Multi-access Edge Computing. J. Inf. Sci. Eng. 39(3): 507-524 (2023) - [j15]Sungho Lee, Minsu Kim, Jemin Lee, Ruei-Hau Hsu, Min-Soo Kim, Tony Q. S. Quek:
Facing to Latency of Hyperledger Fabric for Blockchain-Enabled IoT: Modeling and Analysis. IEEE Netw. 37(6): 232-239 (2023) - [c14]Ruei-Hau Hsu, Hsuan-Cheng Su, Yi-An Yu:
Poster: Verifiable Data Valuation with Strong Fairness in Horizontal Federated Learning. CCS 2023: 3642-3644 - [i7]Donghyun Yu, Sungho Lee, Ruei-Hau Hsu, Jemin Lee:
Ensuring End-to-End Security with Fine-grained Access Control for Connected and Autonomous Vehicles. CoRR abs/2312.07898 (2023) - 2022
- [j14]Donghyun Yu, Ruei-Hau Hsu, Jemin Lee, Sungjin Lee:
EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing. IEEE Trans. Inf. Forensics Secur. 17: 1388-1403 (2022) - [c13]Ruei-Hau Hsu, Ting-Yun Huang:
Private Data Preprocessing for Privacy-preserving Federated Learning. ICKII 2022: 173-178 - 2021
- [j13]Sungho Lee, Minsu Kim, Jemin Lee, Ruei-Hau Hsu, Tony Q. S. Quek:
Is Blockchain Suitable for Data Freshness? An Age-of-Information Perspective. IEEE Netw. 35(2): 96-103 (2021) - [c12]Ruei-Hau Hsu, Hsiang-Shian Fan, Lu-Chin Wang:
SGD2: Secure Group-based Device-to-Device Communications with Fine-grained Access Control for IoT in 5G. DSC 2021: 1-8 - [i6]Sungho Lee, Minsu Kim, Jemin Lee, Ruei-Hau Hsu, Tony Q. S. Quek:
Latency Modeling of Hyperledger Fabric for Blockchain-based IoT (BC-IoT) Networks. CoRR abs/2102.09166 (2021) - 2020
- [j12]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks. Int. J. Inf. Sec. 19(3): 245-255 (2020) - [j11]Chun-I Fan, Jheng-Jia Huang, Min-Zhe Zhong, Ruei-Hau Hsu, Wen-Tsuen Chen, Jemin Lee:
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications. IEEE Trans. Inf. Forensics Secur. 15: 927-942 (2020) - [c11]Ruei-Hau Hsu, Yu-Hsaing Hu, Guan-Wei Lin, Bing-Cheng Ko:
Privacy-preserving Data Sharing with Attribute-based Private Matching Based on Edge Computation in the Internet-of-Things. APSIPA 2020: 1578-1587 - [c10]Ruei-Hau Hsu, Yi-Cheng Wang, Chun-I Fan, Bo Sun, Tao Ban, Takeshi Takahashi, Ting-Wei Wu, Shang-Wei Kao:
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing. AsiaJCIS 2020: 128-136 - [i5]Sungho Lee, Minsu Kim, Jemin Lee, Ruei-Hau Hsu, Tony Q. S. Quek:
Is Blockchain Suitable for Data Freshness? - Age-of-Information Perspective. CoRR abs/2006.02735 (2020) - [i4]Donghyun Yu, Ruei-Hau Hsu, Jemin Lee:
EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing. CoRR abs/2010.14747 (2020)
2010 – 2019
- 2019
- [j10]Prosanta Gope, Jemin Lee, Ruei-Hau Hsu, Tony Q. S. Quek:
Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions. IEEE Consumer Electron. Mag. 8(3): 10-16 (2019) - [j9]Arijit Karati, Chun-I Fan, Ruei-Hau Hsu:
Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices. IEEE Internet Things J. 6(6): 10431-10440 (2019) - 2018
- [j8]Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek, Jyh-Cheng Chen:
Reconfigurable Security: Edge-Computing-Based Framework for IoT. IEEE Netw. 32(5): 92-99 (2018) - [j7]Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek, Jyh-Cheng Chen:
GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks. IEEE Trans. Inf. Forensics Secur. 13(2): 449-464 (2018) - [c9]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. DSC 2018: 1-8 - [c8]Ruei-Hau Hsu, Chun-I Fan, Tony Q. S. Quek, Jemin Lee:
CORE: Cooperative Encryption with its Applications to Controllable Security Services. DSC 2018: 1-8 - [c7]Arijit Karati, Chun-I Fan, Ruei-Hau Hsu:
Enhancement of FTP-NDN Supporting Nondesignated Receivers. ICS 2018: 590-598 - [i3]Chun-I Fan, Jheng-Jia Huang, Min-Zhe Zhong, Ruei-Hau Hsu, Wen-Tsuen Chen, Jemin Lee:
ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G. CoRR abs/1806.03406 (2018) - 2017
- [i2]Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek, Jyh-Cheng Chen:
GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks. CoRR abs/1703.04262 (2017) - [i1]Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek, Jyh-Cheng Chen:
Reconfigurable Security: Edge Computing-based Framework for IoT. CoRR abs/1709.06223 (2017) - 2016
- [c6]Prosanta Gope, Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek:
Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services. ARES 2016: 247-252 - 2015
- [j6]Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, Ruei-Hau Hsu:
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes. J. Inf. Sci. Eng. 31(1): 297-314 (2015) - [c5]Ruei-Hau Hsu, Jemin Lee:
Group anonymous D2D communication with end-to-end security in LTE-A. CNS 2015: 451-459 - 2013
- [j5]Chun-I Fan, Yi-Hui Lin, Ruei-Hau Hsu:
Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs. IEEE Trans. Parallel Distributed Syst. 24(4): 672-680 (2013) - 2012
- [j4]Chun-I Fan, Ruei-Hau Hsu, Wei-Kuei Chen:
Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme. Secur. Commun. Networks 5(5): 462-478 (2012) - 2011
- [j3]Chun-I Fan, Ruei-Hau Hsu, Pei-Hsiu Ho:
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. J. Inf. Sci. Eng. 27(3): 969-982 (2011) - [c4]Chun-I Fan, Ruei-Hau Hsu, Mark Manulis:
Group Signature with Constant Revocation Costs for Signers and Verifiers. CANS 2011: 214-233 - 2010
- [j2]Chun-I Fan, Pei-Hsiu Ho, Ruei-Hau Hsu:
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. IEEE/ACM Trans. Netw. 18(3): 996-1009 (2010)
2000 – 2009
- 2008
- [c3]Chun-I Fan, Ruei-Hau Hsu, Chun-Hao Tseng:
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks. Mobility Conference 2008: 82 - 2006
- [c2]Chun-I Fan, Yi-Hui Lin, Ruei-Hau Hsu:
Remote Password Authentication Scheme with Smart Cards and Biometrics. GLOBECOM 2006 - 2005
- [j1]Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn:
Improved DSA variant for batch verification. Appl. Math. Comput. 169(1): 75-81 (2005) - 2003
- [c1]Yi-Fung Huang, Kun-Li Wen, Ruei-Hau Hsu, Chu-Hsing Lin:
Infinite generating keys based on publish system. SMC 2003: 3238-3243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint