Feng Chia University

Displaying 1-15 of 15 results

  • White Papers // Jul 2013

    The Key Factors Affecting Business Model for Enterprises Adopting Cloud Computing Technology

    Now-a-days the mobile devices, social communities and cloud computing provide the impetus of driving forces in the market of Information Technology (IT) industry. The technology of cloud computing brings huge business opportunities and potentials; however, most of the research of cloud computing focus merely on the theoretical concepts and technologies...

    Provided By Feng Chia University

  • White Papers // Mar 2013

    Generalized Secret Sharing with Linear Hierarchical Secrets

    Generalized secret sharing is a method of constructing secret sharing from the perspective of access structure. In this paper, the authors propose a novel solution for achieving generalized secret sharing with linear hierarchical secrets. They use a matrix to model the relationship related to the access structure and transfer the...

    Provided By Feng Chia University

  • White Papers // Oct 2012

    Omnibone: An Efficient Service Data Circulation and Discovery Scheme in VANETs

    Due to recent developments in wireless communication networks, Vehicular Ad-hoc NETworks (VANETs) technologies have received a lot of attention in the fields of information sharing and service discovery. However, due to the ever-shifting mobility of vehicle topology, vehicles moving along non-fixed routes may not find suitable next-hop vehicles. This paper...

    Provided By Feng Chia University

  • White Papers // Oct 2012

    A Novel Distributed RSA Blind and Weakly Undeniable Multi-Signature Scheme

    Digital signature is extensively used in many practical applications as numerous cryptographic services have been proposed. In this paper, the authors will be the first to propose a signature scheme that integrates the following properties. It is a distributed RSA-type multi-signature. It is a blind and weakly undeniable signature. The...

    Provided By Feng Chia University

  • White Papers // Mar 2012

    A Novel Digital Signature Scheme Based on Cubic Residue with Provable Security

    Since a single computationally hard problem today may possibly be solved efficiently in the future, many researchers endeavored in recent years to base their cryptosystem security on solving two or more hard problems simultaneously to enhance the system security. However, it is found that many previously suggested signature schemes with...

    Provided By Feng Chia University

  • White Papers // Dec 2011

    A Secure Solution on Hierarchical Access Control

    Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.'s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access...

    Provided By Feng Chia University

  • White Papers // Oct 2011

    Provably Secure High Entropy Three-Party Authenticated Key Exchange Scheme for Network Environments

    In 2008, Chen et al. proposed a round, efficient, Three-Party Authenticated, Key-Exchange (3PAKE) scheme. Although the authors claimed that their scheme is superior to the previous schemes in terms of security and efficiency, later Yang and Chang pointed out that Chen et al.'s scheme can suffer from a stolen-verifier attack....

    Provided By Feng Chia University

  • White Papers // Sep 2011

    A Secure E-Mail Protocol for Mobile Devices

    Electronic mail (e-mail) is one of the most important and widely-used applications for network environments. In recent years, e-mail has become a popular medium for various types of data transmission. The Pretty Good Privacy (PGP) program is one solution that ensures the confidentiality of e-mail. Unfortunately, PGP does not provide...

    Provided By Feng Chia University

  • White Papers // May 2010

    A Secure Protocol for Three-Party Authenticated Key Exchange With Provable Belief

    Three-Party Authenticated Key Exchange (3PAKE) protocol is an important cryptographic mechanism in which two clients can request the session key for communicating with each other and one trusted server takes the responsibility for authenticating users and key agreements. In 2007, Lu and Cao proposed a simple 3PAKE protocol. Nevertheless, the...

    Provided By Feng Chia University

  • White Papers // Dec 2009

    Does A Threshold Inflation Rate Exist? Quantile Inferences For Inflation And Its Variability

    Using quantile regressions and cross-sectional data from 152 countries, the authors examine the relationship between inflation and its variability. They consider two measures of inflation - the mean and median - and three different measures of inflation variability - the standard deviation, relative variation, and median deviation. All results from...

    Provided By Feng Chia University

  • White Papers // Nov 2009

    An Overall Cost-effective Authentication Technique for the Global Mobility Network

    Designing an efficient and secure authentication technique to detect fraudulent behavior is a very important subject in mobile network systems. However, treating each transaction as a suspect seems to contradict the fact that most communication behaviors are honest. Based on this fact, it is reasonable to design a more efficient...

    Provided By Feng Chia University

  • White Papers // Oct 2009

    Efficient Key Management Scheme for Hierarchical Access Control in Mobile Agents

    Mobile agents have great potential for increasing the realized benefit for a variety of e-commerce applications. However, enabling the mobile agent to safely travel over the open and uncontrollable Internet is necessary to protect the contents of a mobile agent. Recently, many agent structures that manage the keys needed to...

    Provided By Feng Chia University

  • White Papers // Jun 2009

    An Efficient Data Mining Approach on Compressed Transactions

    In an era of knowledge explosion, the growth of data increases rapidly day by day. Since data storage is a limited resource, how to reduce the data space in the process becomes a challenge issue. Data compression provides a good solution which can lower the required space. Data mining has...

    Provided By Feng Chia University

  • White Papers // Mar 2009

    Comments on Wei's Digital Signature Scheme Based on Two Hard Problems

    In 1998, Shao proposed two digital signature schemes and claimed that the security of which is based on the difficulties of computing both integer factorization and discrete logarithm. However, at the same year, Li and Xiao demonstrated that Shao's schemes are insecure are not based on any hard problem. Recently,...

    Provided By Feng Chia University

  • White Papers // Jan 2009

    VERTAF/Multi-Core: A SysML-based Application Framework for Multi-Core Embedded Software Development

    Multi-core processors are becoming prevalent rapidly in personal computing and embedded systems. Nevertheless, the programming environment for multi-core processor based systems is still quite immature and lacks efficient tools. In this paper, the authors present a new VERTAF/multi-core framework and show how software code can be automatically generated from SysML...

    Provided By Feng Chia University

  • White Papers // Oct 2009

    Efficient Key Management Scheme for Hierarchical Access Control in Mobile Agents

    Mobile agents have great potential for increasing the realized benefit for a variety of e-commerce applications. However, enabling the mobile agent to safely travel over the open and uncontrollable Internet is necessary to protect the contents of a mobile agent. Recently, many agent structures that manage the keys needed to...

    Provided By Feng Chia University

  • White Papers // Oct 2012

    A Novel Distributed RSA Blind and Weakly Undeniable Multi-Signature Scheme

    Digital signature is extensively used in many practical applications as numerous cryptographic services have been proposed. In this paper, the authors will be the first to propose a signature scheme that integrates the following properties. It is a distributed RSA-type multi-signature. It is a blind and weakly undeniable signature. The...

    Provided By Feng Chia University

  • White Papers // Mar 2012

    A Novel Digital Signature Scheme Based on Cubic Residue with Provable Security

    Since a single computationally hard problem today may possibly be solved efficiently in the future, many researchers endeavored in recent years to base their cryptosystem security on solving two or more hard problems simultaneously to enhance the system security. However, it is found that many previously suggested signature schemes with...

    Provided By Feng Chia University

  • White Papers // Oct 2011

    Provably Secure High Entropy Three-Party Authenticated Key Exchange Scheme for Network Environments

    In 2008, Chen et al. proposed a round, efficient, Three-Party Authenticated, Key-Exchange (3PAKE) scheme. Although the authors claimed that their scheme is superior to the previous schemes in terms of security and efficiency, later Yang and Chang pointed out that Chen et al.'s scheme can suffer from a stolen-verifier attack....

    Provided By Feng Chia University

  • White Papers // Sep 2011

    A Secure E-Mail Protocol for Mobile Devices

    Electronic mail (e-mail) is one of the most important and widely-used applications for network environments. In recent years, e-mail has become a popular medium for various types of data transmission. The Pretty Good Privacy (PGP) program is one solution that ensures the confidentiality of e-mail. Unfortunately, PGP does not provide...

    Provided By Feng Chia University

  • White Papers // Oct 2012

    Omnibone: An Efficient Service Data Circulation and Discovery Scheme in VANETs

    Due to recent developments in wireless communication networks, Vehicular Ad-hoc NETworks (VANETs) technologies have received a lot of attention in the fields of information sharing and service discovery. However, due to the ever-shifting mobility of vehicle topology, vehicles moving along non-fixed routes may not find suitable next-hop vehicles. This paper...

    Provided By Feng Chia University

  • White Papers // Mar 2009

    Comments on Wei's Digital Signature Scheme Based on Two Hard Problems

    In 1998, Shao proposed two digital signature schemes and claimed that the security of which is based on the difficulties of computing both integer factorization and discrete logarithm. However, at the same year, Li and Xiao demonstrated that Shao's schemes are insecure are not based on any hard problem. Recently,...

    Provided By Feng Chia University

  • White Papers // Jun 2009

    An Efficient Data Mining Approach on Compressed Transactions

    In an era of knowledge explosion, the growth of data increases rapidly day by day. Since data storage is a limited resource, how to reduce the data space in the process becomes a challenge issue. Data compression provides a good solution which can lower the required space. Data mining has...

    Provided By Feng Chia University

  • White Papers // Dec 2009

    Does A Threshold Inflation Rate Exist? Quantile Inferences For Inflation And Its Variability

    Using quantile regressions and cross-sectional data from 152 countries, the authors examine the relationship between inflation and its variability. They consider two measures of inflation - the mean and median - and three different measures of inflation variability - the standard deviation, relative variation, and median deviation. All results from...

    Provided By Feng Chia University

  • White Papers // May 2010

    A Secure Protocol for Three-Party Authenticated Key Exchange With Provable Belief

    Three-Party Authenticated Key Exchange (3PAKE) protocol is an important cryptographic mechanism in which two clients can request the session key for communicating with each other and one trusted server takes the responsibility for authenticating users and key agreements. In 2007, Lu and Cao proposed a simple 3PAKE protocol. Nevertheless, the...

    Provided By Feng Chia University

  • White Papers // Dec 2011

    A Secure Solution on Hierarchical Access Control

    Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.'s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access...

    Provided By Feng Chia University

  • White Papers // Jan 2009

    VERTAF/Multi-Core: A SysML-based Application Framework for Multi-Core Embedded Software Development

    Multi-core processors are becoming prevalent rapidly in personal computing and embedded systems. Nevertheless, the programming environment for multi-core processor based systems is still quite immature and lacks efficient tools. In this paper, the authors present a new VERTAF/multi-core framework and show how software code can be automatically generated from SysML...

    Provided By Feng Chia University

  • White Papers // Jul 2013

    The Key Factors Affecting Business Model for Enterprises Adopting Cloud Computing Technology

    Now-a-days the mobile devices, social communities and cloud computing provide the impetus of driving forces in the market of Information Technology (IT) industry. The technology of cloud computing brings huge business opportunities and potentials; however, most of the research of cloud computing focus merely on the theoretical concepts and technologies...

    Provided By Feng Chia University

  • White Papers // Nov 2009

    An Overall Cost-effective Authentication Technique for the Global Mobility Network

    Designing an efficient and secure authentication technique to detect fraudulent behavior is a very important subject in mobile network systems. However, treating each transaction as a suspect seems to contradict the fact that most communication behaviors are honest. Based on this fact, it is reasonable to design a more efficient...

    Provided By Feng Chia University

  • White Papers // Mar 2013

    Generalized Secret Sharing with Linear Hierarchical Secrets

    Generalized secret sharing is a method of constructing secret sharing from the perspective of access structure. In this paper, the authors propose a novel solution for achieving generalized secret sharing with linear hierarchical secrets. They use a matrix to model the relationship related to the access structure and transfer the...

    Provided By Feng Chia University