Name
Affiliation
Papers
JUNG-SAN LEE
Department of Information Engineering and Computer Science, Feng Chia University, No. 100, Wunhua Rd., Situn Dist., Taichung City 40724, Taiwan, ROC
56
Collaborators
Citations 
PageRank 
52
353
30.52
Referers 
Referees 
References 
770
935
577
Search Limit
100935
Title
Citations
PageRank
Year
CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training00.342022
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract00.342022
Learning salient seeds refer to the manifold ranking and background-prior strategy00.342020
AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS.00.342019
Visibility dehazing based on channel-weighted analysis and illumination tuning.10.352019
Refining irregular image illumination with concurrent ownership embedding.00.342018
Selective scalable secret image sharing with adaptive pixel-embedding technique.10.352018
SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks.00.342017
Renovating Contaminative Image Archives based on Patch Propagation and Adaptive Confidence Collation00.342016
Tele-micropayment scam prevention based on visual secret sharing technique10.362016
Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity.00.342016
Enhancing the Security of Credit Card Transaction based on Visual DSC.00.342015
Stable watermarking technique based on XNOR operation and scale relationship10.392015
Fast authentication mechanism with provable correctness for cluster-based VANETs00.342014
Self-Recognized Image Protection Technique that Resists Large-Scale Cropping60.592014
A wide-adapted bantam protocol for roaming across wireless areas00.342013
Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness00.342013
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy.30.422013
RII: Renovating the irregular illumination of digital image archives00.342013
Notes on \"Authentication protocol using an identifier in an ad hoc network environment\"10.512013
Preserving user-participation for insecure network communications with CAPTCHA and visual secret sharing technique10.352013
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.140.762013
An innovative electronic group-buying system for mobile commerce100.492013
HORME: hierarchical-object-relational medical management for electronic record.00.342013
A robust e-commerce service: Light-weight secure mail-order mechanism20.472012
Protecting the content integrity of digital imagery with fidelity preservation240.842011
An interactive mobile SMS confirmation method using secret sharing technique00.342011
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector40.392010
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs20.382010
Multicast Routing Scheme for Recipient Maximization in Wireless Relay Networks90.582010
Design of electronic t-out-of-n lotteries on the Internet90.752009
A novel illumination-balance technique for improving the quality of degraded text-photo images80.572009
Distortion-free secret image sharing mechanism using modulus operator381.352009
A Self-Reference Watermarking Scheme Based on Wet Paper Coding10.372009
Robust t-out-of-n oblivious transfer mechanism based on CRT150.712009
A Brand-New Mobile Value-Added Service: M-Check00.342009
Hybrid (2, n) Visual Secret Sharing Scheme for Color Images20.382009
Dual digital watermarking for internet media based on hybrid strategies170.832009
A Secure Multicast Framework In Large And High-Mobility Network Groups00.342009
An on-line electronic check system with mutual authentication151.002009
Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol00.342008
Security design for three-party encrypted key exchange protocol using smart cards50.452008
Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol00.342008
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques30.392008
Anonymous authentication scheme for wireless communications40.492007
Secure communications for cluster-based ad hoc networks using node identities281.102007
Security enhancement of an IC-card-based remote login mechanism40.442007
An anonymous voting mechanism based on the key exchange protocol80.592006
A secure and efficient authentication scheme for mobile users50.532006
Time-bounded based password authentication scheme00.342005
  • 1
  • 2