Chunhua Su
Chunhua Su
Division of Computer Science, University of Aizu, Japan
Verified email at u-aizu.ac.jp
Title
Cited by
Cited by
Year
A blockchain connected gateway for BLE-based devices in the Internet of Things
SC Cha, JF Chen, C Su, KH Yeh
IEEE Access 6, 24639-24649, 2018
862018
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
802010
A novel certificateless signature scheme for smart objects in the Internet-of-Things
KH Yeh, C Su, KKR Choo, W Chiu
Sensors 17 (5), 1001, 2017
392017
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
Ieee Access 6, 7234-7243, 2017
362017
Lightweight IoT-based authentication scheme in cloud computing circumstance
L Zhou, X Li, KH Yeh, C Su, W Chiu
Future Generation Computer Systems 91, 244-251, 2019
342019
Privacy-preserving two-party k-means clustering via secure approximation
C Su, F Bao, J Zhou, T Takagi, K Sakurai
21st International Conference on Advanced Information Networking and …, 2007
272007
Special issue on advanced persistent threat
J Chen, C Su, KH Yeh, M Yung
Future Generation Computer Systems 79, 243-246, 2018
232018
I walk, therefore i am: continuous user authentication with plantar biometrics
KH Yeh, C Su, W Chiu, L Zhou
IEEE Communications Magazine 56 (2), 150-157, 2018
212018
Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data
K Liang, C Su, J Chen, JK Liu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
202016
A user-friendly privacy framework for users to achieve consents with nearby BLE devices
SC Cha, MS Chuang, KH Yeh, ZJ Huang, C Su
IEEE Access 6, 20779-20787, 2018
182018
You think, therefore you are: Transparent authentication system with brainwave-oriented bio-features for IoT networks
L Zhou, C Su, W Chiu, KH Yeh
IEEE Transactions on Emerging Topics in Computing, 2017
182017
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints
L Zhou, KH Yeh, G Hancke, Z Liu, C Su
IEEE Signal Processing Magazine 35 (5), 76-87, 2018
172018
A distributed privacy-preserving association rules mining scheme using frequent-pattern tree
C Su, K Sakurai
International Conference on Advanced Data Mining and Applications, 170-181, 2008
172008
Improved handover authentication and key pre‐distribution for wireless mesh networks
X Yang, X Huang, J Han, C Su
Concurrency and Computation: Practice and Experience 28 (10), 2978-2990, 2016
142016
Improved lightweight pseudo-random number generators for the low-cost rfid tags
J Chen, A Miyaj, H Sato, C Su
2015 IEEE Trustcom/BigDataSE/ISPA 1, 17-24, 2015
142015
Game theoretic security of quantum bit commitment
L Zhou, X Sun, C Su, Z Liu, KKR Choo
Information Sciences 479, 503-514, 2019
122019
Am I eclipsed? A smart detector of eclipse attacks for Ethereum
G Xu, B Guo, C Su, X Zheng, K Liang, DS Wong, H Wang
Computers & Security 88, 101604, 2020
112020
Lightweight implementations of NIST P-256 and SM2 ECC on 8-bit resource-constraint embedded device
L Zhou, C Su, Z Hu, S Lee, H Seo
ACM Transactions on Embedded Computing Systems (TECS) 18 (3), 1-13, 2019
102019
Towards false alarm reduction using fuzzy if-then rules for medical cyber physical systems
W Li, W Meng, C Su, LF Kwok
Ieee Access 6, 6530-6539, 2018
102018
Universally composable RFID mutual authentication
C Su, B Santoso, Y Li, RH Deng, X Huang
IEEE Transactions on Dependable and Secure Computing 14 (1), 83-94, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20