scispace - formally typeset
C

Chin-Ling Chen

Researcher at Chaoyang University of Technology

Publications -  242
Citations -  2279

Chin-Ling Chen is an academic researcher from Chaoyang University of Technology. The author has contributed to research in topics: Authentication & Mutual authentication. The author has an hindex of 21, co-authored 209 publications receiving 1674 citations. Previous affiliations of Chin-Ling Chen include Xiamen University of Technology & Changchun University of Science and Technology.

Papers
More filters
Journal ArticleDOI

Semi-Online Computational Offloading by Dueling Deep-Q Network for User Behavior Prediction

TL;DR: This paper proposes soCoM, a semi-online Computational Offloading Model, and explores the user behaviors in sophisticated action space by reinforcement learning for catching unknown environment information, and proposes Dueling Deep-Q Network.
Journal ArticleDOI

Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks

TL;DR: This work proposes a dynamic location-aware key management scheme based on the bivariate polynomial key predistribution, where the aggregation cluster nodes can easily find their best routing path to the base station, by containing the energy consumption, storage and computation demands in both the cluster nodes and the sensor nodes.
Proceedings ArticleDOI

A Fair Transaction Model in Mobile Commerce

TL;DR: This paper combines some cryptology (such as a digital signature, one-way hash function etc.) and proposes a mobile commerce protocol based on PTDs that satisfies the security requirements, and presents a simple and reliable mobile transaction protocol that is independent of specific payment system.
Journal ArticleDOI

A Cloud-Based Crime Reporting System with Identity Protection

TL;DR: An online illegal event reporting scheme based on cloud technology, which combines digital certificates, symmetric keys, asymmetric Keys, and digital signatures is proposed, which provides a convenient and secure platform for reporting and fighting crime.
Journal ArticleDOI

A Verifiable and Secret Buyer–Seller Watermarking Protocol

TL;DR: The proposed buyer–seller watermarking protocol can trace piracy and protect the customer's rights without a TTP, and can protect the anonymity of the buyer and bind the buyer's watermark to digital content.