Tzay-Farn Shih

428 total citations
19 papers, 310 citations indexed

About

Tzay-Farn Shih is a scholar working on Computer Networks and Communications, Information Systems and Media Technology. According to data from OpenAlex, Tzay-Farn Shih has authored 19 papers receiving a total of 310 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Computer Networks and Communications, 7 papers in Information Systems and 5 papers in Media Technology. Recurrent topics in Tzay-Farn Shih's work include Advanced Authentication Protocols Security (6 papers), Energy Efficient Wireless Sensor Networks (5 papers) and RFID technology advancements (5 papers). Tzay-Farn Shih is often cited by papers focused on Advanced Authentication Protocols Security (6 papers), Energy Efficient Wireless Sensor Networks (5 papers) and RFID technology advancements (5 papers). Tzay-Farn Shih collaborates with scholars based in Taiwan, China and South Korea. Tzay-Farn Shih's co-authors include Chin‐Ling Chen, Woongsup Lee, Hsu‐Chun Yen, Mao‐Lun Chiang, Yu-Ting Tsai, Yong‐Yuan Deng, Yuyi Chen, Yucheng Huang, Tzong‐Chen Wu and Woei-Jiunn Tsaur and has published in prestigious journals such as IEEE Transactions on Multimedia, Journal of Medical Systems and Wireless Networks.

In The Last Decade

Tzay-Farn Shih

18 papers receiving 285 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tzay-Farn Shih Taiwan 9 167 135 110 108 50 19 310
Boyeon Song South Korea 8 254 1.5× 210 1.6× 53 0.5× 276 2.6× 58 1.2× 12 333
Amna Mughees Malaysia 7 202 1.2× 94 0.7× 152 1.4× 25 0.2× 35 0.7× 10 338
Vilho Räisänen Finland 7 123 0.7× 36 0.3× 149 1.4× 33 0.3× 35 0.7× 24 246
Michael Roland Austria 10 135 0.8× 187 1.4× 32 0.3× 122 1.1× 63 1.3× 30 290
Dirk Henrici Germany 6 278 1.7× 261 1.9× 61 0.6× 331 3.1× 66 1.3× 13 405
Truong Khoa Phan United Kingdom 10 318 1.9× 123 0.9× 110 1.0× 25 0.2× 20 0.4× 24 381
Julian Hyde United States 5 55 0.3× 41 0.3× 143 1.3× 109 1.0× 15 0.3× 5 228
Marcelo A. Marotta Brazil 8 218 1.3× 74 0.5× 126 1.1× 13 0.1× 36 0.7× 31 298
Mikko Lehtonen Switzerland 8 49 0.3× 120 0.9× 36 0.3× 150 1.4× 33 0.7× 17 235
Hamed Shah‐Mansouri Iran 9 261 1.6× 52 0.4× 221 2.0× 22 0.2× 48 1.0× 29 408

Countries citing papers authored by Tzay-Farn Shih

Since Specialization
Citations

This map shows the geographic impact of Tzay-Farn Shih's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tzay-Farn Shih with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tzay-Farn Shih more than expected).

Fields of papers citing papers by Tzay-Farn Shih

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tzay-Farn Shih. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tzay-Farn Shih. The network helps show where Tzay-Farn Shih may publish in the future.

Co-authorship network of co-authors of Tzay-Farn Shih

This figure shows the co-authorship network connecting the top 25 collaborators of Tzay-Farn Shih. A scholar is included among the top collaborators of Tzay-Farn Shih based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tzay-Farn Shih. Tzay-Farn Shih is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
1.
Shih, Tzay-Farn, et al.. (2019). A Cloud-Based Crime Reporting System with Identity Protection. Symmetry. 11(2). 255–255. 16 indexed citations
2.
Chen, Chin‐Ling, et al.. (2018). An Investigator Unearths Illegal Behavior via a Subliminal Channel. 網際網路技術學刊. 19(2). 573–580. 1 indexed citations
3.
Chen, Chin‐Ling, et al.. (2015). A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks. Journal of Sensors. 2015. 1–14. 15 indexed citations
4.
Chen, Chin‐Ling, et al.. (2014). A Privacy Authentication Scheme Based on Cloud for Medical Environment. Journal of Medical Systems. 38(11). 143–143. 54 indexed citations
5.
Chen, Chin‐Ling, et al.. (2014). A Secure Medical Data Exchange Protocol Based on Cloud Environment. Journal of Medical Systems. 38(9). 112–112. 46 indexed citations
6.
Chen, Chin‐Ling, et al.. (2014). Design of a secure communication and handoff protocol for VANETs. Journal of High Speed Networks. 20(3). 179–192. 1 indexed citations
7.
Chen, Chin‐Ling, Yu-Ting Tsai, & Tzay-Farn Shih. (2012). A Novel Key Management of Two-Tier Dissemination for Wireless Sensor Network. 576–579. 4 indexed citations
8.
Chen, Chin‐Ling, et al.. (2012). An RFID Authentication and Anti-counterfeit Transaction Protocol. 3156. 419–422. 6 indexed citations
9.
Shih, Tzay-Farn, et al.. (2011). The Design of a Stride Query Tree Algorithm for RFID Systems. 108–113. 1 indexed citations
10.
Wu, Tzong‐Chen, et al.. (2010). Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks. 4. 827–832. 2 indexed citations
11.
Shih, Tzay-Farn, et al.. (2008). Hierarchical localization strategy for wireless sensor networks. WSEAS Transactions on Computers archive. 7(8). 1260–1269. 2 indexed citations
12.
Chen, Chin‐Ling, et al.. (2008). Anti-counterfeit ownership transfer protocol for low cost RFID system. WSEAS Transactions on Computers archive. 7(8). 1149–1158. 9 indexed citations
13.
Shih, Tzay-Farn, et al.. (2008). Location-based multicast routing protocol for mobile ad hoc networks. WSEAS Transactions on Computers archive. 7(8). 1270–1279. 9 indexed citations
14.
Shih, Tzay-Farn, et al.. (2008). Distributed multicast routing protocol for mobile ad hoc networks. 88–91. 1 indexed citations
15.
Shih, Tzay-Farn, et al.. (2008). Positioning strategy for wireless sensor networks. 83–87. 1 indexed citations
16.
Huang, Yucheng, et al.. (2008). (WSEAS Transactions on Computers, 07(8):1149-1158)Anti-counterfeit Ownership Transfer Protocol for Low Cost RFID System.
17.
Shih, Tzay-Farn & Hsu‐Chun Yen. (2006). Location-aware routing protocol with dynamic adaptation of request zone for mobile ad hoc networks. Wireless Networks. 14(3). 321–333. 34 indexed citations
18.
Lee, Woongsup, et al.. (2006). An Adaptive Memoryless Protocol for RFID Tag Collision Arbitration. IEEE Transactions on Multimedia. 8(5). 1096–1101. 96 indexed citations
19.
Shih, Tzay-Farn & Hsu‐Chun Yen. (2006). Core location-aided cluster-based routing protocol for mobile ad hoc networks. 223–228. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026