A survey on mobile social networks: Applications, platforms, system architectures, and future research directions

X Hu, THS Chu, VCM Leung, ECH Ngai… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Mobile social networks (MSNs) have become increasingly popular in supporting many novel
applications since emerging in the recent years. Their applications and services are of great …

An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics

MC Chuang, MC Chen - Expert Systems with Applications, 2014 - Elsevier
Password-based remote user authentication schemes are widely investigated, with recent
research increasingly combining a user's biometrics with a password to design a remote …

S-aframe: agent-based multilayer framework with context-aware semantic service for vehicular social networks

X Hu, J Zhao, BC Seet, VCM Leung… - … on Emerging Topics …, 2015 - ieeexplore.ieee.org
This paper presents S-Aframe, an agent-based multilayer framework with context-aware
semantic service (CSS) to support the development and deployment of context-aware …

SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks

MC Chuang, JF Lee, MC Chen - IEEE Systems Journal, 2012 - ieeexplore.ieee.org
The Internet Engineering Task Force NETLMM Working Group recently proposed a network-
based localized mobility management protocol called Proxy Mobile IPv6 (PMIPv6) to support …

Seamless handover for high-speed trains using femtocell-based multiple egress network interfaces

CW Lee, MC Chuang, MC Chen… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
High-speed rail systems are becoming increasingly popular among long-distance travelers.
With the explosive growth in the number of mobile devices, the provision of high-quality …

HOTA: Handover optimized ticket-based authentication in network-based mobility management

JH Lee, JM Bonnin - Information Sciences, 2013 - Elsevier
Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, has clearly
different perceptions compared with host-based mobility management protocols. In PMIPv6 …

Leakage-resilient and lightweight authenticated key exchange for e-health

W Zeng, J Zhang - 2020 6th International Conference on …, 2020 - ieeexplore.ieee.org
E-Health applications generally involve human users' privacy information such as identity
and medical data. To protect these data, authenticated key exchange (AKE) protocols are …

Enhanced inter‐access service network handover authentication scheme for IEEE 802.16 m network

WI Khedr, MI Abdalla, AA Elsheikh - IET Information Security, 2015 - Wiley Online Library
The 802.16 m mobile worldwide interoperability for microwave access (WiMAX) standard is
the amendment to the 802.16 e standard. It introduced high mobility features that enable …

The quality of electronic markets

SS Zhang, M Wagener, A Storkenmaier… - 2011 44th Hawaii …, 2011 - ieeexplore.ieee.org
Technical progress in information and communication technologies, increased competition
through alternative trading systems, and regulatory actions have significantly changed the …

A highly efficient and secure electronic cash system based on secure sharing in cloud environment

CC Chang, WY Chen, SC Chang - Security and …, 2016 - Wiley Online Library
Online electronic transactions have become more and more popular in recent years.
Electronic cash (e‐cash) has acted an important role, but e‐cash is digital data that can be …