| Taxonomy and survey of RFID anti-collision protocols DH Shih, PL Sun, DC Yen, SM Huang Computer communications 29 (11), 2150-2166, 2006 | 426 | 2006 |
| An implementation framework for E-Government 2.0 PL Sun, CY Ku, DH Shih Telematics and Informatics 32 (3), 504-520, 2015 | 191 | 2015 |
| Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems CT Li, DH Shih, CC Wang Computer methods and programs in biomedicine 157, 191-203, 2018 | 119 | 2018 |
| Security aspects of mobile phone virus: a critical survey DH Shih, B Lin, HS Chiang, MH Shih Industrial Management & Data Systems 108 (4), 478-494, 2008 | 108 | 2008 |
| An embedded mobile ECG reasoning system for elderly patients DH Shih, HS Chiang, B Lin, SB Lin IEEE Transactions on Information Technology in Biomedicine 14 (3), 854-865, 2009 | 101 | 2009 |
| An empirical study of factors affecting RFID's adoption in Taiwan DH Shih, YW Chiu, SI Chang, DC Yen Journal of Global Information Management (JGIM) 16 (2), 58-80, 2008 | 88 | 2008 |
| A blockchain based data aggregation and group authentication scheme for electronic medical system CT Li, DH Shih, CC Wang, CL Chen, CC Lee IEEE Access 8, 173904-173917, 2020 | 80 | 2020 |
| Deconstructing mobile commerce service with continuance intention YM Lin, DH Shih International Journal of Mobile Communications 6 (1), 67-87, 2008 | 78 | 2008 |
| Bluetooth technology: an exploratory study of the analysis and implementation frameworks A Dursch, DC Yen, DH Shih Computer standards & interfaces 26 (4), 263-277, 2004 | 54 | 2004 |
| Dysarthria speech detection using convolutional neural networks with gated recurrent unit DH Shih, CH Liao, TW Wu, XY Xu, MH Shih Healthcare 10 (10), 1956, 2022 | 53 | 2022 |
| Classification methods in the detection of new malicious emails DH Shih, HS Chiang, CD Yen Information Sciences 172 (1-2), 241-261, 2005 | 49 | 2005 |
| RFID tags: privacy and security aspects DH Shih, CY Lin, B Lin International Journal of Mobile Communications 3 (3), 214-230, 2005 | 46 | 2005 |
| Securing industry‐wide EPCglobal network with WS‐security DH Shih, PL Sun, B Lin Industrial Management & Data Systems 105 (7), 972-996, 2005 | 45 | 2005 |
| A generalized associative Petri net for reasoning DH Shih, HS Chiang, B Lin IEEE Transactions on Knowledge and Data Engineering 19 (9), 1241-1251, 2007 | 43 | 2007 |
| A simulated organic vegetable production and marketing environment by using ethereum DH Shih, KC Lu, YT Shih, PY Shih Electronics 8 (11), 1341, 2019 | 39 | 2019 |
| Exploring the individual's behavior on self-disclosure online DH Shih, SF Hsu, DC Yen, CC Lin International Journal of Human-Computer Interaction 28 (10), 627-645, 2012 | 39 | 2012 |
| Preventing return fraud in reverse logistics—A case study of ESPRES solution by Ethereum DH Shih, FC Huang, CY Chieh, MH Shih, TW Wu Journal of Theoretical and Applied Electronic Commerce Research 16 (6), 2170 …, 2021 | 36 | 2021 |
| A new reverse auction agent system for m-commerce using mobile agents DH Shih, SY Huang, DC Yen Computer standards & interfaces 27 (4), 383-395, 2005 | 36 | 2005 |
| Eco-innovation in circular agri-business DH Shih, CM Lu, CH Lee, SY Cai, KJ Wu, ML Tseng Sustainability 10 (4), 1140, 2018 | 33 | 2018 |
| A secure reverse Vickrey auction scheme with bid privacy DH Shih, HY Huang, DC Yen Information Sciences 176 (5), 550-564, 2006 | 33 | 2006 |