scispace - formally typeset
T

Tzer-Shyong Chen

Researcher at Tunghai University

Publications -  56
Citations -  690

Tzer-Shyong Chen is an academic researcher from Tunghai University. The author has contributed to research in topics: Access control & Key management. The author has an hindex of 14, co-authored 55 publications receiving 623 citations. Previous affiliations of Tzer-Shyong Chen include University of Southampton.

Papers
More filters
Journal ArticleDOI

Secure Dynamic Access Control Scheme of PHR in Cloud Computing

TL;DR: A new PHR access control scheme under Cloud computing environments is proposed with Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, which allows to accurately access to PHR with security and is suitable for enormous multi-users.
Journal ArticleDOI

A Password-Based User Authentication Scheme for the Integrated EPR Information System

TL;DR: To tackle the illegal access and to prevent the information from theft during transmission over the insecure Internet, a password-based user authentication scheme suitable for information integration is proposed.
Journal ArticleDOI

Efficient migration for mobile computing in distributed networks

TL;DR: This study proposes a hierarchical mobile agent framework for handling key management and access control problems between mobile agent and host, and raises the security of key management, and also controls access to distributed environment in non-specific network.
Journal ArticleDOI

Confidentiality Protection of Digital Health Records in Cloud Computing

TL;DR: A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study, which helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions.
Journal ArticleDOI

A conference key agreement protocol with fault-tolerant capability

TL;DR: This paper is intended as a proposal of a new form of conference key agreement protocol that emphasizes the filtering of malicious participants at the beginning of the conference to ensure that all participants obtain the same conference key.