A random wrapping encryption method

Yi-Li Huang , Fang-Yie Leu , Jung-Chun Liu , Ilsun You
consumer communications and networking conference 151 -156

1
2014
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme

Yi‐Li Huang , Fang‐Yie Leu , Ruey‐Kai Sheu , Jung‐Chun Liu
Concurrency and Computation: Practice and Experience 32 ( 18)

1
2020
7
2014
TTP Based High-Efficient Multi-Key Exchange Protocol

IEEE) KUN-LIN TSAI , (Member , IEEE) , YI-LI HUANG
IEEE Access 4 6261 -6271

14
2016
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.

Fang-Yie Leu , Yi-Li Huang , I-Long Lin , Chao-Hong Chiu
Journal of Universal Computer Science 17 891 -911

15
2011
13
2011
Verification of a Batch of Bad Signatures by Using the Matrix-Detection Algorithm

Yi-Li Huang , Chu-Hsing Lin , Fang-Yie Leu
data compression, communications and processing 299 -306

2
2011
A block cipher mode of operation with two keys

Yi-Li Huang , Fang-Yie Leu , Jung-Chun Liu , Jing-Hao Yang
international conference on information and communication technology 392 -398

2
2013
A Group File Encryption Method using Dynamic System Environment Key

Kun-Lin Tsai , Jiu-Soon Tan , Fang-Yie Leu , Yi-Li Huang
2014 17th International Conference on Network-Based Information Systems 476 -483

3
2014
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments

Kun-Lin Tsai , Yi-Li Huang , Fang-Yie Leu , Ilsun You
IEEE Access 6 45325 -45334

38
2018
The simulation of an emotional robot implemented with fuzzy logic

Fang-Yie Leu , Jung-chun Liu , Ya-Ting Hsu , Yi-Li Huang
Soft Computing 18 ( 9) 1729 -1743

9
2014
Square Key Matrix Management Scheme in Wireless Sensor Networks

Jung-Chun Liu , Yi-Li Huang , Fang-Yie Leu , Feng-Ching Chiang
Computing and Informatics \/ Computers and Artificial Intelligence 36 ( 1) 169 -185

1
2017
Designing A Healthcare Authorization Model Based On Cloud Authentication

Chin-Ling Chen , Tsai-Tung Yang , Fang-Yie Leu , Yi-Li Huang
Intelligent Automation and Soft Computing 20 ( 3) 365 -379

9
2014
A handover security mechanism employing diffie-Hellman PKDS for IEEE802.16e wireless networks

Fang-Yie Leu , Yi-Fu Ciou , Yi-Li Huang
availability reliability and security 255 -270

2011
Random Cladding with Feedback Mechanism for encrypting mobile messages

Yi-Li Huang , Fang-Yie Leu , Ilsun You , Hsing-Chung Chen
conference on computer communications workshops 970 -975

2016
A true Random-Number Encryption Method employing block cipher and PRNG

Yi-Li Huang , Fang-Yie Leu , Jian-Hong Chen , Chu William Cheng-Chung
Computer Science and Information Systems 11 ( 3) 905 -924

2
2014
A Secure Communication over Wireless Environments by Using a Data Connection Core

Ko-Chung Wei , Yi-Li Huang , Fang-Yie Leu
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 570 -575

1
2012
A True Random-Number Encryption Method

Yi-Li Huang , Fang-Yie Leu , Jian-Hong Chen , Cheng-Chung Chu
2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 654 -659

1
2013
A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix

Yi-Li Huang , Fang-Yie Leu , Po-Hao Su , Ti-Hsun Sung
2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) 470 -475

4
2016
A secure communication over wireless environments by using a data connection core

Yi-Li Huang , Fang-Yie Leu , Ko-Chung Wei
Mathematical and Computer Modelling 58 1459 -1474

18
2013