Information and Communications University

Displaying 1-5 of 5 results

  • White Papers // Jan 2011

    Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature

    A proxy signature protocol allows an original signer to delegate its signing power to another entity, called proxy signer, to sign messages on its behalf. The dele-gated proxy signer can compute a proxy signature that can be verified by anyone with access to the original signer's public key. Proxy signatures...

    Provided By Information and Communications University

  • White Papers // Jan 2011

    Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme

    Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosystems with a trusty server. However, in this paper, the authors will show that Lee-Hwang-Li's key authentication scheme is not secure, from the obtained public information,...

    Provided By Information and Communications University

  • White Papers // Jan 2010

    Clock and Data Recovery Circuit for 2.5Gb/s Burst-Mode Receiver

    This paper describes a 2.5Gb/s CDR for asynchronous burst-mode data transmission, such as ATM-PON. A CDR employing gated-oscillators was designed and simulated using AlGaAs/GaAs HBT. The gated-oscillator consumes 1.12 W of power with a single - 7 V supply, and the differential output voltage swing is 0.9 Vp-p into 50...

    Provided By Information and Communications University

  • White Papers // Dec 2009

    Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

    In this paper, the authors propose a grouping-proof protocol for RFID tags based on secret sharing. The proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. The authors also present a security...

    Provided By Information and Communications University

  • White Papers // May 2006

    Developing a Decision Model for Business Process Outsourcing

    Information Technology (IT) outsourcing has been one of the critical issues in organization management. Business Process Outsourcing (BPO) is an advanced type of IT outsourcing, which will be the next big wave in information technology services. Nevertheless, since prior studies have only examined issues related to traditional IS outsourcing, there...

    Provided By Information and Communications University

  • White Papers // Dec 2009

    Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

    In this paper, the authors propose a grouping-proof protocol for RFID tags based on secret sharing. The proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. The authors also present a security...

    Provided By Information and Communications University

  • White Papers // Jan 2010

    Clock and Data Recovery Circuit for 2.5Gb/s Burst-Mode Receiver

    This paper describes a 2.5Gb/s CDR for asynchronous burst-mode data transmission, such as ATM-PON. A CDR employing gated-oscillators was designed and simulated using AlGaAs/GaAs HBT. The gated-oscillator consumes 1.12 W of power with a single - 7 V supply, and the differential output voltage swing is 0.9 Vp-p into 50...

    Provided By Information and Communications University

  • White Papers // Jan 2011

    Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature

    A proxy signature protocol allows an original signer to delegate its signing power to another entity, called proxy signer, to sign messages on its behalf. The dele-gated proxy signer can compute a proxy signature that can be verified by anyone with access to the original signer's public key. Proxy signatures...

    Provided By Information and Communications University

  • White Papers // Jan 2011

    Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme

    Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosystems with a trusty server. However, in this paper, the authors will show that Lee-Hwang-Li's key authentication scheme is not secure, from the obtained public information,...

    Provided By Information and Communications University

  • White Papers // May 2006

    Developing a Decision Model for Business Process Outsourcing

    Information Technology (IT) outsourcing has been one of the critical issues in organization management. Business Process Outsourcing (BPO) is an advanced type of IT outsourcing, which will be the next big wave in information technology services. Nevertheless, since prior studies have only examined issues related to traditional IS outsourcing, there...

    Provided By Information and Communications University