default search action
Yu-Fang Chung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Chih-Wei Chung, Seng-Cho Chou, Tzu-Hung Hsiao, Grace Joyce Zhang, Yu-Fang Chung, Yi-Ming Chen:
Machine learning approaches to identify systemic lupus erythematosus in anti-nuclear antibody-positive patients using genomic data and electronic health records. BioData Min. 17(1) (2024) - 2021
- [j48]Chih-Wei Chung, Tzu-Hung Hsiao, Chih-Jen Huang, Yen-Ju Chen, Hsin-Hua Chen, Ching-Heng Lin, Seng-Cho Chou, Tzer-Shyong Chen, Yu-Fang Chung, Hwai-I Yang, Yi-Ming Chen:
Machine learning approaches for the genomic prediction of rheumatoid arthritis and systemic lupus erythematosus. BioData Min. 14(1) (2021) - 2020
- [c16]Nan-Kai Hsieh, Tsan-Ching Kang, Tzer-Long Chen, Jhih-Chung Chang, Min Chien Wang, Tzer-Shyong Chen, Yu-Fang Chung:
The Implementation of IoT-based Smart Laboratory Management System. ICEA 2020: 1:1-1:3
2010 – 2019
- 2019
- [j47]Tsung-Chih Hsiao, Yu-Min Huang, Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen:
Efficient Hierarchical Key Management Scheme for VR/AR Database Systems. Int. J. Netw. Secur. 21(4): 551-555 (2019) - 2018
- [j46]Shyh-Wei Chen, Dai-Lun Chiang, Tzer-Shyong Chen, Han-Yu Lin, Yu-Fang Chung, Feipei Lai:
An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples. IEEE Access 6: 71651-71661 (2018) - [j45]Tsung-Chih Hsiao, Zhen Yu Wu, Tzer-Long Chen, Yu-Fang Chung, Tzer-Shyong Chen:
A hierarchical access control scheme based on Lagrange interpolation for mobile agents. Int. J. Distributed Sens. Networks 14(7) (2018) - 2017
- [j44]Chia-Hui Liu, Yu-Fang Chung:
Secure user authentication scheme for wireless healthcare sensor networks. Comput. Electr. Eng. 59: 250-261 (2017) - 2016
- [j43]Yu-Ting Liao, Tzer-Shyong Chen, Tzer-Long Chen, Yu-Fang Chung, Yu-Xin Chen, Jen-Hung Hwang, Huihui Wang, Wei Wei:
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information. J. Medical Syst. 40(5): 119:1-119:7 (2016) - [j42]Tzer-Shyong Chen, Tzer-Long Chen, Yu-Fang Chung, Yao-Min Huang, Tao-Chieh Chen, Huihui Wang, Wei Wei:
Implementation of Online Veterinary Hospital on Cloud Platform. J. Medical Syst. 40(6): 147:1-147:7 (2016) - 2014
- [j41]Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen, Dai-Lun Chiang, Yu-Ting Chen:
An Agent-Based Auction Protocol on Mobile Devices. J. Appl. Math. 2014: 314180:1-314180:11 (2014) - [j40]Lichin Chen, Chih-Min Chan, Hung-Chang Lee, Yu-Fang Chung, Feipei Lai:
Development of a Decision Support Engine to Assist Patients with Hospital Selection. J. Medical Syst. 38(6): 59 (2014) - [j39]Yu-Fang Chung:
The design of authentication key protocol in certificate-free public key cryptosystem. Secur. Commun. Networks 7(11): 2125-2133 (2014) - [j38]Jian-Guo Bau, Taipau Chia, Yu-Fang Chung, Kun-Hao Chen, Shyi-Kuen Wu:
A Novel Assessment of Flexibility by Microcirculatory Signals. Sensors 14(1): 478-491 (2014) - [j37]Yu-Fang Chung, Tsung-Chih Hsiao, Shu-Chen Chen:
The Application of RFID Monitoring Technology to Patrol Management System in Petrochemical Industry. Wirel. Pers. Commun. 79(2): 1063-1088 (2014) - [c15]Lichin Chen, Hui-Chu Yu, Hung-Chang Lee, Yu-Fang Chung, Rung-Ji Shang, Hsiu-Yun Liu, Ching-Ting Tan, Feipei Lai:
Improving Inpatient Fall Prevention Strategies Using Interactive Data Repository Information System. Nursing Informatics 2014: 87-93 - 2013
- [j36]Victor R. L. Shen, Yu-Fang Chung, Shyi-Ming Chen, Jhong-Yi Guo:
A novel reduction approach for Petri net systems based on matching theory. Expert Syst. Appl. 40(11): 4562-4576 (2013) - [j35]Jen-Yan Huang, I-En Liao, Yu-Fang Chung, Kuen-Tzung Chen:
Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Inf. Sci. 231: 32-44 (2013) - [j34]Lichin Chen, Hui-Chu Yu, Hao-Chun Li, Yi-Van Wang, Huang-Jen Chen, I-Ching Wang, Chiou-Shiang Wang, Hui-Yu Peng, Yu-Ling Hsu, Chi-Huang Chen, Lee-Ming Chuang, Hung-Chang Lee, Yu-Fang Chung, Feipei Lai:
An Architecture Model for Multiple Disease Management Information Systems. J. Medical Syst. 37(2): 9931 (2013) - [j33]Yu-Fang Chung, Chia-Hui Liu:
Design of a Wireless Sensor Network Platform for Tele-Homecare. Sensors 13(12): 17156-17175 (2013) - [c14]Chia-Hui Liu, Fong-Qi Lin, Dai-Lun Chiang, Tzer-Long Chen, Chin-Sheng Chen, Han-Yu Lin, Yu-Fang Chung, Tzer-Shyong Chen:
Secure PHR Access Control Scheme for Healthcare Application Clouds. ICPP 2013: 1067-1076 - [c13]Sung-Chiang Lin, Charlotte Wang, Zhen Yu Wu, Yu-Fang Chung:
Detect Rare Events via MICE Algorithm with Optimal Threshold. IMIS 2013: 70-75 - 2012
- [j32]Yu-Fang Chung, Zhen Yu Wu:
Casting Ballots over Internet Connection Against Bribery and Coercion. Comput. J. 55(10): 1169-1179 (2012) - [j31]Zhen Yu Wu, Yu-Fang Chung, Feipei Lai, Tzer-Shyong Chen:
A Password-Based User Authentication Scheme for the Integrated EPR Information System. J. Medical Syst. 36(2): 631-638 (2012) - [j30]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
Mobile Agent Application and Integration in Electronic Anamnesis System. J. Medical Syst. 36(3): 1009-1020 (2012) - [j29]Tzer-Long Chen, Yu-Fang Chung, Frank Y. S. Lin:
A Study on Agent-Based Secure Scheme for Electronic Medical Record System. J. Medical Syst. 36(3): 1345-1357 (2012) - [j28]Zhen Yu Wu, Yueh-Chun Lee, Feipei Lai, Hung-Chang Lee, Yu-Fang Chung:
A Secure Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 36(3): 1529-1535 (2012) - [j27]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
The Enhancement of Security in Healthcare Information Systems. J. Medical Syst. 36(3): 1673-1688 (2012) - [j26]Zhen Yu Wu, Chih-Wen Hsueh, Cheng-Yu Tsai, Feipei Lai, Hung-Chang Lee, Yu-Fang Chung:
Redactable Signatures for Signed CDA Documents. J. Medical Syst. 36(3): 1795-1808 (2012) - [j25]Tzer-Long Chen, Yu-Fang Chung, Frank Y. S. Lin:
Deployment of Secure Mobile Agents for Medical Information Systems. J. Medical Syst. 36(4): 2493-2503 (2012) - [j24]Zhen Yu Wu, Yi-Ju Tseng, Yu-Fang Chung, Yee-Chun Chen, Feipei Lai:
A Reliable User Authentication and Key Agreement Scheme for Web-Based Hospital-Acquired Infection Surveillance Information System. J. Medical Syst. 36(4): 2547-2555 (2012) - [j23]Chia-Hui Liu, Yu-Fang Chung, Te-Wei Chiang, Tzer-Shyong Chen, Sheng-De Wang:
A Mobile Agent Approach for Secure Integrated Medical Information Systems. J. Medical Syst. 36(5): 2731-2741 (2012) - [j22]Tsung-Chih Hsiao, Zhen Yu Wu, Yu-Fang Chung, Tzer-Shyong Chen, Gwoboa Horng:
A Secure Integrated Medical Information System. J. Medical Syst. 36(5): 3103-3113 (2012) - [j21]Hwan-Jeu Yu, Chia-Ping Shen, Sarangerel Dorjgochoo, Chi-Huang Chen, Jin-Ming Wu, Mei-Shu Lai, Ching-Ting Tan, Chinburen Jigjidsuren, Erdenebaatar Altangerel, Hung-Chang Lee, Chih-Wen Hsueh, Yu-Fang Chung, Feipei Lai:
A Physician Order Category-Based Clinical Guideline Comparison System. J. Medical Syst. 36(6): 3741-3753 (2012) - [c12]Zhen Yu Wu, Dai-Lun Chiang, Tzu-Ching Lin, Yu-Fang Chung, Tzer-Shyong Chen:
A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network. AINA Workshops 2012: 25-28 - 2011
- [j20]Yu-Fang Chung, Yu-Ting Chen, Tzer-Long Chen, Tzer-Shyong Chen:
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce. Expert Syst. Appl. 38(8): 9900-9907 (2011) - 2010
- [j19]Tzer-Long Chen, Yu-Fang Chung, Frank Y. S. Lin:
An efficient date-constraint hierarchical key management scheme for mobile agents. Expert Syst. Appl. 37(12): 7721-7728 (2010)
2000 – 2009
- 2009
- [j18]Kuo-Hsuan Huang, Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen:
Efficient migration for mobile computing in distributed networks. Comput. Stand. Interfaces 31(1): 40-47 (2009) - [j17]Victor R. L. Shen, Yu-Fang Chung, Tzer-Shyong Chen:
A novel application of grey system theory to information security (Part I). Comput. Stand. Interfaces 31(2): 277-281 (2009) - [j16]Yu-Fang Chung, Kuo-Hsuan Huang, Tzer-Shyong Chen:
Threshold authenticated encryption scheme using labor-division signature. Comput. Stand. Interfaces 31(2): 300-304 (2009) - [j15]Kuo-Hsuan Huang, Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen:
A conference key agreement protocol with fault-tolerant capability. Comput. Stand. Interfaces 31(2): 401-405 (2009) - [j14]Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen:
Ring signature scheme for ECC-based anonymous signcryption. Comput. Stand. Interfaces 31(4): 669-674 (2009) - [j13]Yu-Fang Chung, Tzer-Shyong Chen, Ming-Wei Lai:
Efficient migration access control for mobile agents. Comput. Stand. Interfaces 31(6): 1061-1068 (2009) - [j12]Yu-Fang Chung, Zhen Yu Wu:
Approach to designing bribery-free and coercion-free electronic voting scheme. J. Syst. Softw. 82(12): 2081-2090 (2009) - [c11]Yu-Fang Chung, Tzer-Shyong Chen, Yu-Ting Chen, Chiu-Chan Lee, Szu-Wen Wang:
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce. ICA3PP 2009: 214-225 - [c10]Yu-Fang Chung, Tzer-Shyong Chen, Chia-Chao Ho, Yi-Hsuan Yeh, Hsiu-Chia Ko:
Hierarchical Time-Bound Key Management for Mobile Agents. ICA3PP 2009: 242-253 - [c9]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent. MUE 2009: 189-196 - 2008
- [j11]Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen:
Access control in user hierarchy based on elliptic curve cryptosystem. Inf. Sci. 178(1): 230-243 (2008) - [j10]Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen:
Unconditionally secure cryptosystems based on quantum cryptography. Inf. Sci. 178(8): 2044-2058 (2008) - [j9]Yu-Fang Chung, Kuo-Hsuan Huang, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen:
Bidder-anonymous English auction scheme with privacy and public verifiability. J. Syst. Softw. 81(1): 113-119 (2008) - [c8]Yu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang:
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. AINA Workshops 2008: 650-655 - 2007
- [j8]Yu-Fang Chung, Kuo-Hsuan Huang, Feipei Lai, Tzer-Shyong Chen:
ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Stand. Interfaces 29(6): 601-604 (2007) - 2006
- [c7]Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen:
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. CIS 2006: 502-512 - [c6]Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen:
Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem. JCIS 2006 - [c5]Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen:
Unconditionally Secure Cryptosystem Based on Quantum Cryptography. JCIS 2006 - [c4]Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen:
Threshold Signature Scheme Resistible for Conspiracy Attack. PDCAT 2006: 479-483 - 2004
- [j7]Tzer-Shyong Chen, Yu-Fang Chung, Kuo-Hsuan Huang:
A traceable proxy multisignature scheme based on the elliptic curve cryptosystem. Appl. Math. Comput. 159(1): 137-145 (2004) - [j6]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme. Appl. Math. Comput. 159(1): 147-155 (2004) - [j5]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
A practical authenticated encryption scheme based on the elliptic curve cryptosystem. Comput. Stand. Interfaces 26(5): 461-469 (2004) - [j4]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem. J. Comput. Sci. Technol. 19(4): 570-573 (2004) - [c3]Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian:
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. COMPSAC 2004: 396-397 - [c2]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. EEE 2004: 106-112 - [c1]Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. EEE 2004: 569-572 - 2003
- [j3]Tzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang:
Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. Comput. Secur. 22(6): 527-534 (2003) - [j2]Tzer-Shyong Chen, Yu-Fang Chung:
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy. J. Comput. Sci. Technol. 18(2): 210-213 (2003) - 2002
- [j1]Tzer-Shyong Chen, Yu-Fang Chung:
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. Comput. Secur. 21(6): 565-570 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint