default search action
Nai-Wei Lo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Jheng-Jia Huang, Guan-Yu Chen, Nai-Wei Lo:
Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key. CCS 2024: 5006-5008 - 2023
- [c38]Jheng-Jia Huang, Wei-Hsueh Wang, Yi-Fan Tseng, Guan-Yu Chen, Hao-Hsiang Chang Chien, Wen-Yan Dai, Nai-Wei Lo:
Anonymous and Unlinkable Identity Scheme in Open Data Environment. AsiaJCIS 2023: 73-80 - 2022
- [c37]Bo-An Lai, Yi-Hsiu Yeh, Guan-Yu Chen, Jheng-Jia Huang, Nai-Wei Lo:
A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments. ICS 2022: 387-397 - 2021
- [e3]Debasis Giri, Anthony T. S. Ho, S. Ponnusamy, Nai-Wei Lo:
Proceedings of the Fifth International Conference on Mathematics and Computing - ICMC 2019, Bhubaneswar, India, February 6-9, 2019. Advances in Intelligent Systems and Computing 1170, Springer 2021, ISBN 978-981-15-5410-0 [contents] - 2020
- [j44]Alexander Yohan, Nai-Wei Lo:
FOTB: a secure blockchain-based firmware update framework for IoT environment. Int. J. Inf. Sec. 19(3): 257-278 (2020) - [j43]Nai-Wei Lo, Alexander Yohan:
BLE-Based Authentication Protocol for Micropayment Using Wearable Device. Wirel. Pers. Commun. 112(4): 2351-2372 (2020) - [c36]Meng-Hsuan Tsai, Yu-Cheng Hsu, Nai-Wei Lo:
An Efficient Blockchain-based Firmware Update Framework for IoT Environment. AsiaJCIS 2020: 121-127 - [i2]Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo, Nai-Wei Lo, Ernesto Damiani:
Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms. CoRR abs/2012.00348 (2020)
2010 – 2019
- 2019
- [j42]Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo:
A Machine Learning Framework for Biometric Authentication Using Electrocardiogram. IEEE Access 7: 94858-94868 (2019) - [c35]Alexander Yohan, Nai-Wei Lo, Liem Peter Santoso:
Secure and Lightweight Firmware Update Framework for IoT Environment. GCCE 2019: 684-685 - [c34]Nai-Wei Lo, Sheng-Hsiang Hsu:
A Secure IoT Firmware Update Framework Based on MQTT Protocol. ISAT (1) 2019: 187-198 - [c33]Chuan-Kai Yang, Chiun-How Kao, Yuan-Cheng Lai, Nai-Wei Lo:
Privacy-Preserving Encryption-Domain Video Retrieval over the Cloud via Block Transformations of Key Frames. MIPRO 2019: 1150-1153 - [c32]Yuan-Cheng Lai, Kai-Zhong Zhou, Si-Ru Lin, Nai-Wei Lo:
F1ow-based Anomaly Detection Using Multilayer Perceptron in Software Defined Networks. MIPRO 2019: 1154-1158 - [c31]Chao-Lung Yang, Chen-Yi Yang, Zhi-Xuan Chen, Nai-Wei Lo:
Multivariate Time Series Data Transformation for Convolutional Neural Network. SII 2019: 188-192 - [i1]Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo:
A Machine Learning Framework for Biometric Authentication using Electrocardiogram. CoRR abs/1903.12340 (2019) - 2018
- [j41]Kuo-Hui Yeh, Nai-Wei Lo, Chun-Kai Wang:
A robust NFC-based personalized IPTV service system. Multim. Tools Appl. 77(5): 5129-5148 (2018) - [j40]Alexander Yohan, Nai-Wei Lo, Doni Winata:
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology. Sensors 18(4): 974 (2018) - [j39]Yo-Hsuan Chuang, Nai-Wei Lo, Cheng-Ying Yang, Ssu-Wei Tang:
A Lightweight Continuous Authentication Protocol for the Internet of Things. Sensors 18(4): 1104 (2018) - [c30]Alexander Yohan, Nai-Wei Lo:
An Over-the-Blockchain Firmware Update Framework for IoT Devices. DSC 2018: 1-8 - [c29]Chao-Lung Yang, Hendri Sutrisno, Nai-Wei Lo, Zhi-Xuan Chen, Ching-Chih Wei, Han-Wei Zhang, Chin-Teng Lin, Chen-Lung Wei, Shang-Heng Hsieh:
Streaming data analysis framework for cyber-physical system of metal machining processes. ICPS 2018: 546-551 - 2017
- [j38]Liang-Chun Chen, Chien-Lung Hsu, Nai-Wei Lo, Kuo-Hui Yeh, Ping-Hsien Lin:
Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks. IEICE Trans. Inf. Syst. 100-D(10): 2267-2274 (2017) - [j37]Ta Chih Yang, Nai-Wei Lo, Horng-Twu Liaw, Wei-Chen Wu:
A secure smart card authentication and authorization framework using in multimedia cloud. Multim. Tools Appl. 76(9): 11715-11737 (2017) - [c28]Kuo-Hui Yeh, Nai-Wei Lo, Chun-Kai Wang:
A NFC-Based Authentication Scheme for Personalized IPTV Services. IIH-MSP (2) 2017: 273-281 - 2016
- [j36]Jia-Lun Tsai, Nai-Wei Lo:
Provably secure anonymous authentication with batch verification for mobile roaming services. Ad Hoc Networks 44: 19-31 (2016) - [j35]Nai-Wei Lo, Kuo-Hui Yeh, Chuan-Yen Fan:
Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid. IEEE Syst. J. 10(4): 1361-1369 (2016) - [j34]Nai-Wei Lo, Jia-Lun Tsai:
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings. IEEE Trans. Intell. Transp. Syst. 17(5): 1319-1328 (2016) - [j33]Jia-Lun Tsai, Nai-Wei Lo:
Secure Anonymous Key Distribution Scheme for Smart Grid. IEEE Trans. Smart Grid 7(2): 906-914 (2016) - [c27]Nai-Wei Lo, Shau-Kang Lu, Yo-Hsuan Chuang:
A Framework for Third Party Android Marketplaces to Identify Repackaged Apps. DASC/PiCom/DataCom/CyberSciTech 2016: 475-482 - [c26]Alexander Yohan, Nai-Wei Lo, Vincentius Randy, Shih-Jen Chen, Ming-Yuan Hsu:
A Novel Authentication Protocol for Micropayment with Wearable Devices. IMCOM 2016: 18:1-18:7 - [c25]Alexander Yohan, Nai-Wei Lo, Henry Roes Lie:
Dynamic multi-factor authentication for smartphone. PIMRC 2016: 1-6 - 2015
- [j32]Jia-Lun Tsai, Nai-Wei Lo:
A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card. Int. J. Commun. Syst. 28(13): 1955-1963 (2015) - [j31]Jia-Lun Tsai, Nai-Wei Lo:
Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments. Secur. Commun. Networks 8(11): 1971-1978 (2015) - [j30]Jia-Lun Tsai, Nai-Wei Lo:
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. IEEE Syst. J. 9(3): 805-815 (2015) - [j29]Jia-Lun Tsai, Nai-Wei Lo:
Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings. Wirel. Pers. Commun. 83(2): 1273-1286 (2015) - [j28]Nai-Wei Lo, Ta Chih Yang, Ming-Huang Guo:
An Attribute-Role Based Access Control Mechanism for Multi-tenancy Cloud Environment. Wirel. Pers. Commun. 84(3): 2119-2134 (2015) - [c24]Nai-Wei Lo, Chi-Kai Yu, Chao Yang Hsu:
Intelligent Display Auto-Lock Scheme for Mobile Devices. AsiaJCIS 2015: 48-54 - [c23]Nai-Wei Lo, Meng-Chih Chiang, Chao Yang Hsu:
Hash-Based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks. AsiaJCIS 2015: 55-62 - [c22]Kuo-Hui Yeh, Nai-Wei Lo, Lin-Chih Chen, Ping-Hsien Lin:
A fraud detection system for real-time messaging communication on Android Facebook messenger. GCCE 2015: 361-363 - [c21]Nai-Wei Lo, Cheng-Tsung Liu:
An Accountable Identity-Based Billing Protocol for Cloud Environment. IIH-MSP 2015: 223-226 - 2014
- [j27]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int. J. Commun. Syst. 27(7): 1083-1090 (2014) - [j26]Chih-Ta Yen, Horng-Twu Liaw, Nai-Wei Lo:
Digital rights management system with user privacy, usage transparency, and superdistribution support. Int. J. Commun. Syst. 27(10): 1714-1730 (2014) - [j25]Hung-Yu Chien, Yingjiu Li, Nai-Wei Lo:
Innovative Applications and Security of Internet of Things. Int. J. Distributed Sens. Networks 10 (2014) - [j24]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
Secure anonymous authentication scheme without verification table for mobile satellite communication systems. Int. J. Satell. Commun. Netw. 32(5): 443-452 (2014) - [j23]Nai-Wei Lo, Jia-Lun Tsai:
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings. J. Appl. Math. 2014: 454393:1-454393:10 (2014) - [j22]Kuo-Hui Yeh, Nai-Wei Lo, Kuo-Yu Tsai, Yingjiu Li, Enrico Winata:
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration. Wirel. Pers. Commun. 77(3): 1775-1800 (2014) - [c20]Nai-Wei Lo, Alexander Yohan:
Danger Theory-based Privacy Protection Model for Social Networks. FedCSIS 2014: 1397-1406 - [c19]Kuo-Hui Yeh, Nai-Wei Lo, Chuan-Yen Fan:
An analysis framework for information loss and privacy leakage on Android applications. GCCE 2014: 216-218 - [c18]Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chao Cha, Nai-Wei Lo, Gary Chung, Chun-Kun Liu:
Motivations, Deployment, and Assessment of Taiwan's E-Invoicing System: An Overview. HICSS 2014: 2200-2209 - [c17]Nai-Wei Lo, I-Fan Wang, Yo-Hsuan Chuang:
RFID Multi-Ownership Transfer Protocol in VMI Environments. RFIDSec Asia 2014: 51-66 - [e2]Nai-Wei Lo, Yingjiu Li, Kuo-Hui Yeh:
Radio Frequency Identification System Security - RFIDsec'14 Asia Workshop Proceedings, Hualien, Taiwan, November 27-28, 2014. Cryptology and Information Security Series 12, IOS Press 2014, ISBN 978-1-61499-461-9 [contents] - 2013
- [j21]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices. Ad Hoc Sens. Wirel. Networks 17(3-4): 221-231 (2013) - [j20]Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Chieh Wang:
Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care. Int. J. Distributed Sens. Networks 9 (2013) - [j19]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings. Inf. Technol. Control. 42(4): 309-314 (2013) - [j18]Chih-Ta Yen, Ming-Huang Guo, Nai-Wei Lo, Der-Jiunn Deng:
Authentication with low-cost RFID tags in mobile networks. Secur. Commun. Networks 6(8): 1021-1027 (2013) - [j17]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
Novel Anonymous Authentication Scheme Using Smart Cards. IEEE Trans. Ind. Informatics 9(4): 2004-2013 (2013) - [j16]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks. Wirel. Pers. Commun. 71(3): 1977-1988 (2013) - [j15]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
Secure Handover Authentication Protocol Based on Bilinear Pairings. Wirel. Pers. Commun. 73(3): 1037-1047 (2013) - [c16]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
New Identity-Based Sequential Aggregate Signature Scheme from RSA. ISBAST 2013 - 2012
- [j14]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
Secure Delegation-Based Authentication Protocol for Wireless Roaming Service. IEEE Commun. Lett. 16(7): 1100-1102 (2012) - [j13]Yi-Chung Yen, Tzong-Chen Wu, Nai-Wei Lo, Kuo-Yu Tsai:
A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability. KSII Trans. Internet Inf. Syst. 6(11): 2956-2979 (2012) - [j12]Yi-Chung Yen, Nai-Wei Lo, Tzong-Chen Wu:
Two RFID-Based Solutions for Secure Inpatient Medication Administration. J. Medical Syst. 36(5): 2769-2778 (2012) - [c15]Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Ta-Chi Yang, Horng-Twu Liaw:
Analysis of an eHealth Care System with Smart Card Based Authentication. AsiaJCIS 2012: 59-61 - [c14]Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications. ISBAST 2012: 54-58 - [c13]Nai-Wei Lo, Kuo-Hui Yeh, Hsuan-Yu Chen:
Cryptanalyses of Two Ultralightweight RFID Authentication Protocols. RFIDSec Asia 2012: 85-93 - [c12]Kuo-Hui Yeh, Nai-Wei Lo, Chieh Wang:
A Patient Privacy-Aware E-health System Based on Passive RFID. UIC/ATC 2012: 967-972 - [e1]Nai-Wei Lo, Yingjiu Li:
Radio Frequency Identification System Security - RFIDsec'12 Asia Workshop Proceedings, Taipei, Taiwan, November 8-9, 2012. Cryptology and Information Security Series 8, IOS Press 2012, ISBN 978-1-61499-142-7 [contents] - 2011
- [j11]Yung-Chun Chen, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li, Enrico Winata:
Adaptive collision resolution for efficient RFID tag identification. EURASIP J. Wirel. Commun. Netw. 2011: 139 (2011) - [j10]Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li:
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. Int. J. Commun. Syst. 24(7): 829-836 (2011) - [j9]Kuo-Hui Yeh, Nai-Wei Lo, Enrico Winata:
CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems. J. Inf. Sci. Eng. 27(2): 777-788 (2011) - [c11]Nai-Wei Lo, Shiou-Huei Ruan, Tzong-Chen Wu:
Ownership transfer protocol for RFID objects using lightweight computing operators. ICITST 2011: 484-489 - 2010
- [j8]Nai-Wei Lo, Kuo-Hui Yeh:
Anonymous Coexistence Proofs for RFID Tags. J. Inf. Sci. Eng. 26(4): 1213-1230 (2010) - [j7]Nai-Wei Lo, Kuo-Hui Yeh:
Mutual RFID Authentication Scheme for Resource-constrained Tags. J. Inf. Sci. Eng. 26(5): 1875-1889 (2010) - [j6]Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung:
Two robust remote user authentication protocols using smart cards. J. Syst. Softw. 83(12): 2556-2565 (2010) - [c10]Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li, Enrico Winata:
An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. AINA Workshops 2010: 335-338 - [c9]Nai-Wei Lo, Kuo-Hui Yeh:
A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems. AINA Workshops 2010: 562-566 - [c8]Chih-Ta Yen, Horng-Twu Liaw, Nai-Wei Lo, Ting-Chun Liu, Jay Stu:
Transparent Digital Rights Management System with Superdistribution. BWCCA 2010: 435-440 - [c7]Nai-Wei Lo, Kuo-Hui Yeh:
De-synchronization attack on RFID authentication protocols. ISITA 2010: 566-570
2000 – 2009
- 2009
- [j5]Nai-Wei Lo, Kuo-Hui Yeh:
Cryptanalysis of two three-party encrypted key exchange protocols. Comput. Stand. Interfaces 31(6): 1167-1174 (2009) - [j4]Nai-Wei Lo, Hsiao-Chien Tsai:
A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j3]Hsiao-Chien Tsai, Nai-Wei Lo, Tzong-Chen Wu:
A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks. IEICE Trans. Inf. Syst. 92-D(5): 777-786 (2009) - [c6]Kuo-Hui Yeh, Nai-Wei Lo:
Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. IAS 2009: 532-535 - 2008
- [j2]Nai-Wei Lo, Kuo-Hui Yeh, Chan Yeob Yeun:
New mutual agreement protocol to secure mobile RFID-enabled devices. Inf. Secur. Tech. Rep. 13(3): 151-157 (2008) - [c5]Kuo-Hui Yeh, Nai-Wei Lo, Enrico Winata:
An Efficient Tree-Based Tag Identification Protocol for RFID Systems. AINA Workshops 2008: 966-970 - 2007
- [c4]Nai-Wei Lo, Kuo-Hui Yeh:
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. EUC Workshops 2007: 43-56 - [c3]Nai-Wei Lo, Kuo-Hui Yeh:
Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. Secure Data Management 2007: 203-212 - 2006
- [c2]Nai-Wei Lo, Eu-Shing Chen:
ezBusiness - A Novel Mobile Business Application Architecture. EuroIMSA 2006: 96-101
1990 – 1999
- 1998
- [c1]Yen-Fu Liu, Nai-Wei Lo, Murali Subbarao, Bradley S. Carlson:
Parallel implementation of a unified approach to image focus and defocus analysis on the Parallel Virtual Machine. Visual Information Processing 1998: 100-111 - 1997
- [j1]Nai-Wei Lo, Bradley S. Carlson, D. L. Tao:
Fault Tolerant Algorithms for Broadcasting on the Star Graph Network. IEEE Trans. Computers 46(12): 1357-1362 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint