NEWS
Print Your Certificate
The 2025 AD Scientific Index is here—explore updated university and researcher rankings!
New! Young University / Institution Rankings 2025
New! The 2025 Edition of the AD Scientific Index is now live!
New! Art & Humanities Rankings 2025
New! Social Sciences and Humanities Rankings 2025
"Exciting Update! The 2025 Edition of the AD Scientific Index is now live!
AD
Scientific Index 2025
Scientist Rankings
University Rankings
Subject Rankings
Country Rankings
login
Login
person_add
Register
insights
H-Index Rankings
insights
i10 Productivity Rankings
format_list_numbered
Citation Rankings
subject
University Subject Rankings
school
Young Universities
format_list_numbered
Top 100 Scientists
format_quote
Top 100 Institutions
format_quote
Compare & Choose
local_fire_department
Country Reports
Jim Wu
Trend Micro Research - / Japan
Others
AD Scientific Index ID: 5105918
トレンドマイクロリサーチ
Registration, Add Profile,
Premium Membership
Print Your Certificate
Ranking &
Analysis
Job
Experiences (0)
Education
Information (0)
Published Books (0)
Book Chapters (0)
Articles (0)
Presentations (0)
Lessons (0)
Projects (0)
Congresses (0)
Editorship, Referee &
Scientific Board (0 )
Patents /
Designs (0)
Academic Grants
& Awards (0)
Artistic
Activities (0)
Certificate / Course
/ Trainings (0)
Association &
Society Memberships (0)
Contact, Office
& Social Media
person_outline
Jim Wu's MOST POPULAR ARTICLES
1-)
Two efficient two-factor authenticated key exchange protocols in public wireless LANs WS Juang, JL Wu Computers & Electrical Engineering 35 (1), 33-40, 2009 562009
2-)
Efficient 3GPP authentication and key agreement with robust user privacy protection WS Juang, JL Wu 2007 IEEE Wireless Communications and Networking Conference, 2720-2725, 2007 402007
3-)
Efficient User Authentication and Key Agreement with User Privacy Protection. WS Juang, JL Wu Int. J. Netw. Secur. 7 (1), 120-129, 2008 272008
4-)
Robust and efficient authenticated key agreement in mobile communicationsWS Juang, JL WuInternational Journal of Mobile Communications 7 (5), 562-579, 2009112009
5-)
An efficient two-factor authenticated key exchange protocol based on elliptic curve cryptosystemsWS Juang, JL WuProc. of The 11th information management and implementation conference (IMI …, 200572005
ARTICLES
Add your articles
We use cookies to personalize our website and offer you a better experience. If you accept cookies, we can offer you special services.
Cookie Policy
Accept