default search action
Iuon-Chang Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, Chin-Chen Chang:
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality. Symmetry 16(2): 147 (2024) - [j63]Chit-Jie Chew, Wei-Bin Lee, Tzu Hao Chen, Iuon-Chang Lin, Jung-San Lee:
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle. IEEE Trans. Netw. Sci. Eng. 11(4): 3495-3511 (2024) - [c35]Chin-Feng Lee, Ting-Yu Kang, Iuon-Chang Lin:
Dual Medical-Image Reversible Data Embedding Method with Vector Directions. ICMHI 2024: 244-250 - [c34]Chin-Feng Lee, Tzu-Ching Tsai, Iuon-Chang Lin:
The Study of Reversible Data Hiding with Contrast Enhancement for Medical Images. ICMHI 2024: 275-280 - 2023
- [j62]Iuon-Chang Lin, Yu-Wen Wang, Ting-Xuan Tai:
A Grid-Based Key Pre-Distribution Scheme Using Dependent Keys in Wireless Sensor Networks. J. Inf. Sci. Eng. 39(3): 459-472 (2023) - [c33]Iuon-Chang Lin, Jing-Yuan Huang, Jason Lin:
A Certificate Management Mechanism Using Distributed Ledger. AsiaJCIS 2023: 66-72 - [c32]Chin-Feng Lee, Chung-Wei Hsu, Iuon-Chang Lin:
A Novel Reversible Data Hiding Method with Contrast Enhancement for Color Medical Images. ICMHI 2023: 287-292 - 2022
- [j61]Iuon-Chang Lin, Chin-Chen Chang, Hsiao-Chi Chiang:
A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things. IEICE Trans. Inf. Syst. 105-D(12): 2092-2103 (2022) - [j60]Iuon-Chang Lin, Ching-Chun Chang, Chih-Hsiang Peng:
An Anomaly-Based IDS Framework Using Centroid-Based Classification. Symmetry 14(1): 105 (2022) - [j59]Iuon-Chang Lin, Chin-Chen Chang, Yu-Sung Chang:
Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA. Symmetry 14(2): 237 (2022) - [c31]Pai-Ching Tseng, Yi-Li Liou, Iuon-Chang Lin, Tzu-Ching Weng:
The Impact of Live Streaming on Personal Purchase Behavior. ICS 2022: 533-544 - 2021
- [j58]Iuon-Chang Lin, Chen-Yang Cheng, Yen-Ting Lin:
Improved location filtering using a context-aware approach. J. Ambient Intell. Smart Environ. 13(1): 55-72 (2021) - 2020
- [j57]Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, Min-Shiang Hwang:
Research on the Secure Financial Surveillance Blockchain Systems. Int. J. Netw. Secur. 22(4): 708-716 (2020)
2010 – 2019
- 2019
- [j56]Iuon-Chang Lin, Chen-Yang Cheng, Hsiang-Yu Chen:
A real-time parking service with proxy re-encryption in vehicular cloud computing. Eng. Appl. Artif. Intell. 85: 208-213 (2019) - [c30]Iuon-Chang Lin, Hsiao-Chi Chiang:
A Novel Sharing M-Coupons with Lightweight Computations via Cloud Computing. AINA Workshops 2019: 459-470 - 2018
- [j55]Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, Min-Shiang Hwang:
A Survey of E-book Digital Right Management. Int. J. Netw. Secur. 20(5): 998-1004 (2018) - [j54]Iuon-Chang Lin, Chen-Yang Cheng:
Case study of physical internet for improving efficiency in solar cell industry. J. Ambient Intell. Humaniz. Comput. 9(2): 285-294 (2018) - [c29]Ping-Kun Hsu, Mu-Ting Lin, Iuon-Chang Lin:
Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage. ICS 2018: 599-607 - 2017
- [j53]Iuon-Chang Lin, Tzu-Chun Liao:
A Survey of Blockchain Security Issues and Challenges. Int. J. Netw. Secur. 19(5): 653-659 (2017) - [j52]Jen-Ho Yang, Iuon-Chang Lin, Po-Ching Chien:
Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery. Informatica 28(2): 375-386 (2017) - [c28]Chin-Chen Chang, Iuon-Chang Lin, Yu-Wei Su, Yanjun Liu:
A Digital Gift Certificate Scheme with Conditional Anonymity. ICMSS 2017: 139-144 - 2016
- [j51]Iuon-Chang Lin, Yi-Lun Chi, Hung-Chieh Chuang, Min-Shiang Hwang:
The Novel Features for Phishing Based on User Device Detection. J. Comput. 11(2): 109-115 (2016) - [j50]Iuon-Chang Lin, Yung-Wang Lin, Yu-Syuan Wu:
Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process. J. Comput. 11(2): 124-131 (2016) - 2015
- [j49]Chen-Yang Cheng, Iuon-Chang Lin, Shu-Yan Huang:
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 743623:1-743623:11 (2015) - [j48]Yi-Lun Chi, Cheng Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang:
The Secure Transaction Protocol in NFC Card Emulation Mode. Int. J. Netw. Secur. 17(4): 431-438 (2015) - [j47]Iuon-Chang Lin, Hung-Huei Hsu, Chen-Yang Cheng:
A Cloud-Based Authentication Protocol for RFID Supply Chain Systems. J. Netw. Syst. Manag. 23(4): 978-997 (2015) - [j46]Chin-Chen Chang, Iuon-Chang Lin, Chia-Chi Wu:
A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments. Mob. Inf. Syst. 2015: 934716:1-934716:7 (2015) - [c27]Chin-Chen Chang, Iuon-Chang Lin, Yi-Lun Chi:
Secure Electronic Coupons. AsiaJCIS 2015: 104-109 - 2014
- [j45]Jen-Ho Yang, Iuon-Chang Lin:
A source authentication scheme based on message recovery digital signature for multicast. Int. J. Commun. Syst. 27(11): 2616-2627 (2014) - [c26]Cheng-Hao Chen, Iuon-Chang Lin, Chou Chen Yang:
NFC Attacks Analysis and Survey. IMIS 2014: 458-462 - 2013
- [j44]Yung-Chen Chou, Ping-Kun Hsu, Iuon-Chang Lin:
Data Hiding for HTML Files Using Character Coding Table and Index Coding Table. KSII Trans. Internet Inf. Syst. 7(11): 2913-2927 (2013) - 2012
- [j43]Chi-Tung Chen, Shu-Yan Huang, Iuon-Chang Lin:
Providing perfect forward secrecy for location-aware wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2012: 241 (2012) - [j42]Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang:
An effective AKA protocol for UMTS. Int. J. Mob. Commun. 10(4): 427-448 (2012) - [c25]Ting-Kuang Wu, Yung-Wang Lin, Iuon-Chang Lin:
A Cloud-User Access Control Mechanism Based on Data Masking. ICGEC 2012: 165-168 - 2011
- [j41]Shiguo Lian, Stefanos Gritzalis, Nadia Nedjah, Iuon-Chang Lin:
Special issue on soft computing for information system security. Appl. Soft Comput. 11(7): 4257-4259 (2011) - [c24]Chia-Min Lin, Shyh-Chang Tsaur, Yeong-Chin Chen, Iuon-Chang Lin:
HB Family RFID Mutual Authentication Protocol. IIH-MSP 2011: 230-235 - [c23]Iuon-Chang Lin, Rui-Kun Luo, Shyh-Chang Tsaur:
A Dynamic Join-leave Multi-purpose Scheme for RFID Infrastructure. PECCS 2011: 537-540 - 2010
- [j40]Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu, Shyh-Chang Tsaur:
Resampling Halftone Images Using Interpolation and Error-Diffusion. Comput. J. 53(6): 802-813 (2010) - [j39]Iuon-Chang Lin, Shih-Shan Tang, Chung-Ming Wang:
Multicast Key Management without Rekeying Processes. Comput. J. 53(7): 939-950 (2010) - [j38]Yu-An Ho, Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:
A least-significant-bit substitution data hiding scheme by using modulus function and optimal permutation refining. Int. J. Multim. Intell. Secur. 1(2): 139-152 (2010) - [c22]Iuon-Chang Lin, Chia-Chang Sung:
An Efficient Source Authentication for Multicast Based on Merkle Hash Tree. IIH-MSP 2010: 5-8 - [c21]Iuon-Chang Lin, Hsing-Lei Wang:
An Improved Digital Signature Scheme with Fault Tolerance in RSA. IIH-MSP 2010: 9-12 - [c20]Iuon-Chang Lin, Ping-Kun Hsu:
A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System. IIH-MSP 2010: 31-33
2000 – 2009
- 2009
- [j37]Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang:
Hiding data in spatial domain images with distortion tolerance. Comput. Stand. Interfaces 31(2): 458-464 (2009) - [j36]Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin:
A novel key management scheme for dynamic multicast communications. Int. J. Commun. Syst. 22(1): 53-66 (2009) - [j35]Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, Jinn-ke Jan:
TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS. Int. J. Netw. Manag. 19(4): 291-303 (2009) - [j34]Iuon-Chang Lin, Chin-Chen Chang:
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Inf. Sci. 179(9): 1269-1277 (2009) - [j33]Hao-Ju Wu, Yi-Hsin Chang, Min-Shiang Hwang, Iuon-Chang Lin:
Flexible RFID location system based on artificial neural networks for medical care facilities. SIGBED Rev. 6(2): 12 (2009) - [c19]Iuon-Chang Lin, Shu-Yan Huang:
A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks. IAS 2009: 41-44 - [c18]Iuon-Chang Lin, Rui-Kun Luo, Shih-Chang Tsao:
An Efficient Mutual Authentication Protocol for RFID Systems. HIS (3) 2009: 41-45 - 2008
- [j32]Iuon-Chang Lin:
A neural network system for authenticating remote users in multi-server architecture. Int. J. Commun. Syst. 21(4): 435-445 (2008) - [j31]Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin:
New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency. J. Comput. Sci. Technol. 23(2): 253-264 (2008) - [j30]Chin-Chen Chang, Iuon-Chang Lin, Chia-Chen Lin:
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System. Wirel. Pers. Commun. 44(2): 139-152 (2008) - [c17]Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:
Halftone image resampling by interpolation and error-diffusion. ICUIMC 2008: 409-413 - [c16]Iuon-Chang Lin, Chin-Chen Chang:
A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization. IIH-MSP 2008: 1367-1370 - [c15]Iuon-Chang Lin, Chin-Chen Chang, Jen-Ho Yang:
An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy. IIH-MSP 2008: 1537-1540 - 2007
- [j29]Yuan-Hui Yu, Chin-Chen Chang, Iuon-Chang Lin:
A new steganographic method for color and grayscale image hiding. Comput. Vis. Image Underst. 107(3): 183-194 (2007) - [j28]Iuon-Chang Lin, Chin-Chen Chang:
Security enhancement for digital signature schemes with fault tolerance in RSA. Inf. Sci. 177(19): 4031-4039 (2007) - [j27]Iuon-Chang Lin, Chin-Chen Chang:
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment. Wirel. Pers. Commun. 42(2): 247-261 (2007) - [c14]Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin:
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. Inscrypt 2007: 457-462 - [c13]Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:
An Edge Enhanced Technique for Digital Halftoning Using Error Diffusion. IIH-MSP 2007: 81-86 - [c12]Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang:
An Efficient Steganography Scheme for M-Commerce. IIH-MSP 2007: 122-125 - [c11]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Iuon-Chang Lin:
A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility. IIH-MSP 2007: 501-504 - [c10]Chin-Chen Chang, Yu-Wei Su, Iuon-Chang Lin:
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. Infoscale 2007: 69 - 2006
- [j26]Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao:
An Access Control System with Time-constraint Using Support Vector Machines. Int. J. Netw. Secur. 2(2): 150-159 (2006) - [j25]Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, Yen-Ping Chu:
Reversible Watermarking: Current Status and Key Issues. Int. J. Netw. Secur. 2(3): 161-170 (2006) - [j24]Ching-Yun Chang, Iuon-Chang Lin:
An Efficient Progressive Image Transmission Scheme for Chinese Calligraphy. Int. J. Pattern Recognit. Artif. Intell. 20(7): 1077-1092 (2006) - [j23]Chin-Chen Chang, Iuon-Chang Lin:
A new solution for assigning cryptographic keys to control access in mobile agent environments. Wirel. Commun. Mob. Comput. 6: 137-146 (2006) - [c9]Iuon-Chang Lin, Chin-Chen Chang:
An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. ATC 2006: 601-610 - [c8]Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang:
A Secure and Efficient Scheme for Authenticating Remote Users using Smart Card. JCIS 2006 - [c7]Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang:
An Improvement on Secure E-mail Protocols Providing Perfect Forward Secrecy. JCIS 2006 - 2005
- [j22]Iuon-Chang Lin, Chin-Chen Chang:
A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters. Comput. Artif. Intell. 24(5): 529-541 (2005) - [j21]Chin-Chen Chang, Iuon-Chang Lin, Kwok-Yan Lam:
An ID-based multisignature scheme without reblocking and predetermined signing order. Comput. Stand. Interfaces 27(4): 407-413 (2005) - [j20]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Des. Codes Cryptogr. 36(1): 53-67 (2005) - [j19]Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai:
A dynamic mechanism for determining relationships in a partially ordered user hierarchy. Int. J. High Perform. Comput. Netw. 3(5/6): 378-384 (2005) - [j18]Chin-Chen Chang, Iuon-Chang Lin:
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach. Informatica 16(1): 37-44 (2005) - [j17]Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang:
A user authentication system using back-propagation network. Neural Comput. Appl. 14(3): 243-249 (2005) - 2004
- [j16]Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang:
Efficient access control and key management schemes for mobile agents. Comput. Stand. Interfaces 26(5): 423-433 (2004) - [j15]Jau-Ji Shen, Iuon-Chang Lin, Min-Shiang Hwang:
A Secure LITESET Scheme. IEICE Trans. Inf. Syst. 87-D(11): 2509-2512 (2004) - [j14]Chin-Chen Chang, Iuon-Chang Lin:
Novel full-search schemes for speeding up image coding using vector quantization. Real Time Imaging 10(2): 95-102 (2004) - [j13]Chin-Chen Chang, Iuon-Chang Lin:
An improvement of delegated multisignature scheme with document decomposition. ACM SIGOPS Oper. Syst. Rev. 38(4): 52-57 (2004) - [j12]Chin-Chen Chang, Iuon-Chang Lin:
Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Oper. Syst. Rev. 38(4): 91-96 (2004) - [c6]Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai:
A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy. AINA (1) 2004: 133-138 - [c5]Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang:
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. AINA (2) 2004: 376-379 - [c4]Chin-Chen Chang, Chien-Fa Li, Iuon-Chang Lin:
A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively. Eurographics Multimedia Workshop 2004: 95-103 - 2003
- [j11]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
Security enhancement for anonymous secure e-voting over a network. Comput. Stand. Interfaces 25(2): 131-139 (2003) - [j10]Chin-Chen Chang, Iuon-Chang Lin:
The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture. Comput. Stand. Interfaces 25(5): 501-513 (2003) - [j9]Iuon-Chang Lin, Min-Shiang Hwang, Li-Hua Li:
A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst. 19(1): 13-22 (2003) - [j8]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Gener. Comput. Syst. 19(4): 457-462 (2003) - [j7]Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin:
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Trans. Knowl. Data Eng. 15(6): 1552-1560 (2003) - [j6]Chin-Chen Chang, Timothy K. Shih, Iuon-Chang Lin:
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively. Vis. Comput. 19(5): 342-353 (2003) - 2002
- [j5]Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin:
Adding timestamps to the secure electronic auction protocol. Data Knowl. Eng. 40(2): 155-162 (2002) - [c3]Chin-Chen Chang, Iuon-Chang Lin, Timothy K. Shih:
An Efficient Edge Detection Technique for Chinese Calligraphy. JCIS 2002: 960-963 - 2001
- [j4]Min-Shiang Hwang, Iuon-Chang Lin, Li-Hua Li:
A simple micro-payment scheme. J. Syst. Softw. 55(3): 221-229 (2001) - [j3]Li-Hua Li, Iuon-Chang Lin, Min-Shiang Hwang:
A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Networks 12(6): 1498-1504 (2001) - [c2]Chin-Chen Chang, Iuon-Chang Lin:
Cryptanalysis of the Improved User Efficient Blind Signatures. ICICS 2001: 42-46 - 2000
- [j2]Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang:
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures. Informatica 11(1): 15-19 (2000) - [j1]Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu:
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 11(2): 137-144 (2000) - [c1]Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang:
Security Enhancement for the "Simple Authentication Key Agreement Algorithm". COMPSAC 2000: 113-115
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint