National Chung Hsing University

Displaying 1-39 of 39 results

  • White Papers // Apr 2014

    (k, n)-Image Reversible Data Hiding

    Dual-images reversible data hiding methods can embed massive confidential messages and generate an excellent stego image. However, each confidential message and the cover image cannot be recovered if any stego image is missed. In order to overcome this drawback, the authors proposed a (k, n)-image reversible hiding method that can...

    Provided By National Chung Hsing University

  • White Papers // Jul 2013

    Security Analysis of Choi et al.'s Certificateless Short Signature Scheme

    In traditional public key cryptography, a certificate must be provided along with a public key. The purpose of a certificate is to make sure that the public key belongs to the specific user and has not been tampered with or replaced by any third party. Those certificates are issued by...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    Cryptanalysis of a User Friendly Remote Authentication Scheme with Smart Card

    At present, if the authors desire any service, the just remote login to a server which provides the service. The password authentication schemes are the well known and the most accepted mechanisms. These schemes use the correct password to authenticate the right user who wants to login the system. Only...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks

    Path-key establishment has become accepted as a commonly used solution in Wireless Sensor Networks (WSNs) for protecting node-to-node communications from malicious attacks. Unfortunately, traditional security approaches are not well suited to WSNs due to their limited computational/communication abilities and memory, and their vulnerable-to-attack structure. Moreover, to extend lifetime and usability...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography

    In this paper, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    An Efficient Key Assignment Scheme for Access Control in a Large Leaf Class Hierarchy

    The employees of an organization are usually divided into different security classes to authorize the information retrieval, and the number of leaf classes is substantially larger than the number of non-leaf classes. Additionally, the alternations in leaf classes are more frequent than in non-leaf classes. The authors proposed a new...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    Relay Selection in Multiuser Two-Way Cooperative Relaying Systems

    In this paper, the authors study a Relay Selection (RS) problem in multi-user two-way cooperative relaying systems. They consider a more practical scenario in which multiple users, multiple relays and a single destination are involved in the two-way network. In this paper, the Code Division Multiple Access (CDMA) system with...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    Data Hiding in DNA Sequences Based on Table Lookup Substitution

    Hiding secret messages in DNA sequences has become a popular research in recent years. In this paper, the authors propose an improved algorithm named the Table Lookup Substitution Method (TLSM) to enhance the performance of an existing data hiding method called the substitution method. Moreover, a general form of the...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication

    As great progress has been made in mobile communications, many related researches on this topic have been proposed. In most of the proposed protocols so far, it has been assumed that the person using the mobile station is the registrar of the SIM card; as a matter of, the previous...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    A Secure Routing Protocol with Node Selfishness Resistance in MANETs

    In Mobile Ad hoc NETworks (MANETs), available nodes must act as their own router and also rely on other nodes to relay communication packets. However, some intermediate nodes may refuse to forward packets to other nodes or discard route-discovery requests from others to save power, as much as those consumed...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol

    In this paper, the authors propose a practical and secure authentication and key agreement scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, \"Home network should be partially trusted in an authentication scheme\" to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    Study of Intrusion Detection Systems

    Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, Personal Digital Assistants (PDAs), and sensors have become economically feasible because of technological...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    Secure Digital Contents Distributing System on P2P Networks

    In recent years, the file-sharing applications of Peer-To-Peer (P2P) systems, such as Napster, Bit-Torrent (BT), Gnutella, have become very popular, with BT offering particularly high scalability and efficiency service to transmit files. But BT does not enforce the access control process, so a lot of unauthorized files are freely shared....

    Provided By National Chung Hsing University

  • White Papers // Jan 2012

    Predicting Sequential Pattern Changes in Data Streams

    Data streams are utilized in an increasing number of real-time information technology applications. Unlike traditional datasets, data streams are temporally ordered, fast changing and massive. Due to their tremendous volume, performing multiple scans of the entire data stream is impractical. Thus, traditional sequential pattern mining algorithms cannot be applied. Accordingly,...

    Provided By National Chung Hsing University

  • White Papers // Nov 2011

    A Novel DRM Solution Based on 3G Security Architecture

    With the rapid growth of the Internet, acquiring digital contents over the Internet has become a commonplace. Most traditional items can be translated into digital form and distributed easily and rapidly over the Internet. Thus, the piracy problems are getting more and more serious. Therefore, the concept of the Digital...

    Provided By National Chung Hsing University

  • White Papers // May 2011

    A Secure and Efficient One-Time Password Authentication Scheme for Wireless Sensor Networks

    An algorithm that a user has authenticated over remote devices should be designed to consider the limitations of computation and lower power in a wireless sensor networks. The password authentication scheme is the most convenient mechanism. Lamport first proposed a one-time password authentication scheme which the password was different in...

    Provided By National Chung Hsing University

  • White Papers // May 2011

    A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping

    RFID has been regarded as a time and money-saving solution for a wide variety of applications, such as manufacturing, supply chain management, and inventory control, etc. However, there are some security problems on RFID in the product managements. The most concerned issues are the tracking and the location privacy. Numerous...

    Provided By National Chung Hsing University

  • White Papers // May 2011

    On the Security of Self-Certified Public Keys

    Many cryptosystems have been developed to solve the problem of information security and some of the approaches were based on the self-certified public key proposed by Girault. In Girault's scheme, the public key is computed cooperatively by both the System Authority (SA) and the user. One of the advantages is...

    Provided By National Chung Hsing University

  • White Papers // Dec 2010

    An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks

    Less computational load and better efficiency on password authenticated key exchange between a low-power client and a powerful server is very important, especially in a wireless communication environment due to the constraints on the electricity supply. The proposed scheme is based on the RSA cryptography and the concept of key...

    Provided By National Chung Hsing University

  • White Papers // Nov 2010

    A Lightweight Anonymous Routing Protocol without Public Key En/Decryptions for Wireless Ad Hoc Networks

    More attention should be paid to anonymous routing protocols in secure wireless ad hoc networks. However, as far as the authors know, only a few papers on secure routing protocols have addressed both issues of anonymity and efficiency. Most recent protocols adopted Public Key Infrastructure (PKI) solutions to ensure the...

    Provided By National Chung Hsing University

  • White Papers // Oct 2010

    A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless...

    Provided By National Chung Hsing University

  • White Papers // Aug 2010

    A Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol

    Three-party Password Authenticated Key Exchange (3PAKE) protocols allow two users (clients) to establish a session key through an authentication server over an insecure channel. Clients only share an easy-to-remember password with the trusted server. In the related literature, most schemes employ the server public keys to ensure the identities of...

    Provided By National Chung Hsing University

  • White Papers // Jun 2010

    A Batch Verification for Multiple Proxy Signature

    In this paper, the authors have proposed an efficient and secure scheme to verify multiple proxy signatures and proxy multi-signatures. Instead of verifying each individual proxy signature or proxy multi-signature separately, their new scheme can verify the multiple proxy signatures or proxy multi-signatures simultaneously. Furthermore, the proposed batch verification scheme...

    Provided By National Chung Hsing University

  • White Papers // Jun 2010

    A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments

    The Internet is widely used in the world and has influenced people's daily lives tremendously. It is a kind of open environments, so the secret information has the possibility to be wiretapped by the malevolent third party. Therefore, to ensure the information securely transmitted over the internet is an important...

    Provided By National Chung Hsing University

  • White Papers // Mar 2010

    On Autonomous Clustering in Wireless Sensor Networks With Directional Antennas

    This paper proposes a decentralized algorithm for organizing an ad-hoc sensor network into clusters with directional antennas. The proposed autonomous clustering scheme aims to reduce the sensing redundancy and maintain sufficient sensing coverage and network connectivity in sensor networks. With directional antennas, random waiting timers, and local criterions, cluster performance...

    Provided By National Chung Hsing University

  • White Papers // Feb 2010

    A Batch Verifying and Detecting the Illegal Signatures

    In this paper, the authors have introduced three authentication methods including RSA, Harn's, and their improved scheme. They also introduce the performance of these three schemes and some illegal signature detections in their scheme. According to the experiment result shows, the performance of Harn's scheme is the best when there...

    Provided By National Chung Hsing University

  • White Papers // Oct 2009

    Convertible DRM System Based on Identity-Based Encryption

    With the rapid growth of the Internet, acquiring digital contents over the Internet has become commonplace. Most traditional items can be translated into digital form. That is to say the digital contents can be distributed easily and rapidly to users over the Internet. Unfortunately, situations of piracy are common and...

    Provided By National Chung Hsing University

  • White Papers // Aug 2009

    A Cocktail Protocol with the Authentication and Key Agreement on the UMTS

    At present, the Universal Mobile Telecommunications System (UMTS) is very popular in most parts of the world. It is a third-generation mobile communication technique known for its ability to conduct user authentication and for its security of communication with the use of Authentication and Key Agreement (AKA) protocol. A Mobile...

    Provided By National Chung Hsing University

  • White Papers // Aug 2009

    DoS-Resistant ID-based Password Authentication Scheme Using Smart Cards

    In this paper, the authors provide a defense mechanism to Kim-Lee-Yoo's ID-based password authentication scheme, which is vulnerable to impersonation attacks and resource exhaustion attacks. Mutual authentication and communication privacy are regarded as essential requirements in today's client/server-based architecture; there-fore, a lightweight but secure mutual authentication method is introduced in...

    Provided By National Chung Hsing University

  • White Papers // Jul 2009

    An Efficient Biometrics-Based Remote User Authentication Scheme Using Smart Cards

    In this paper, the authors propose an efficient biometric-based remote user authentication scheme using smart cards, in which the computation cost is relatively low compared with other related schemes. The security of the proposed scheme is based on the one-way hash function, biometrics verification and smart card. Moreover, the proposed...

    Provided By National Chung Hsing University

  • White Papers // Jul 2009

    An Online Biometrics-Based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards

    In this paper, the authors propose an online (t, n) threshold secret sharing scheme, in which the system will disperse a primary secret sharing key K for n users, and at least t users together can reconstruct the secret K. The security of their scheme is based on biometric verification...

    Provided By National Chung Hsing University

  • White Papers // Jun 2009

    A Non-Repudiable Multi-Proxy Multi-Signature Scheme

    In this paper, the authors shall propose a multi-proxy multi-signature scheme which allows any u or more proxy signers from a designated group of v proxy signers to sign messages on behalf of any t or more original signers from a group of n original signers in total. The multi-proxy...

    Provided By National Chung Hsing University

  • White Papers // Mar 2009

    Modelling The Asymmetric Volatility In Hog Prices In Taiwan: The Impact Of Joining The WTO

    The hog industry, where prices are determined according to an auction system, is of vital importance to the agricultural industry in Taiwan by providing significant production and employment. In particular, there were significant impacts on daily hog prices in the periods before, during and after joining the WTO, which the...

    Provided By National Chung Hsing University

  • White Papers // Feb 2009

    The Effect Of Organizational Change On Team Creativity, Job Satisfaction, Organizational Commitment

    The purpose of this study is to examine the relationship of team creativity, job satisfaction, organizational commitment, and work performance under the impact of an on-going organizational change. A government-owned military-based R&D institute is selected to be the major target due to their recent reengineering process. 400 scientists distributed in...

    Provided By National Chung Hsing University

  • White Papers // Aug 2008

    TK-AKA: Using Temporary Key on Authentication and Key Agreement Protocol on UMTS

    Mobile communication is definitely one of the major high technology applications that offer present-day people a modern life of appropriate convenience. In recent years, the third generation cell-phone system has approached maturity. The Universal Mobile Telecommunication System (UMTS) is currently the most widely used system around the world. The 3rd...

    Provided By National Chung Hsing University

  • White Papers // May 2008

    Improving the Security of a Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks

    In recent years, several anonymous routing protocols for wireless ad hoc networks have been proposed. In 2007, Lu, Cao, Wang and Sun proposed a secure routing protocol with anonymity property and key exchange for ad hoc networks. However, in this paper, it is demonstrated that the so-called secure, anonymous key...

    Provided By National Chung Hsing University

  • White Papers // Dec 2007

    A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks

    Privacy and security should be paid much more attention in secure Vehicular Ad hoc NETworks (VANETs). However, as far as the authors know, few researches on secure VANET protocols have addressed both the privacy issues and authenticated key establishment. Therefore, in this paper, a lightweight authenticated key establishment scheme with...

    Provided By National Chung Hsing University

  • White Papers // Feb 2006

    Password Authentication Schemes: Current Status and Key Issues

    Password authentication scheme is one of the simplest and the most convenient authentication mechanisms over insecure networks. It is more frequently required in areas such as computer networks, wireless networks, remote login, operation systems and database management systems. In this paper, the authors survey all related password authentication schemes and...

    Provided By National Chung Hsing University

  • White Papers // Feb 2006

    Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures

    Public key cryptosystem was an epoch-creating approach of research in the last few decades, and it is still drawing hundreds and thousands of researcher's attention now. In such a cryptosystem, each valid user has a public key and a private key. One can either encrypt the content of the message...

    Provided By National Chung Hsing University

  • White Papers // Feb 2006

    Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures

    Public key cryptosystem was an epoch-creating approach of research in the last few decades, and it is still drawing hundreds and thousands of researcher's attention now. In such a cryptosystem, each valid user has a public key and a private key. One can either encrypt the content of the message...

    Provided By National Chung Hsing University

  • White Papers // Jun 2010

    A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments

    The Internet is widely used in the world and has influenced people's daily lives tremendously. It is a kind of open environments, so the secret information has the possibility to be wiretapped by the malevolent third party. Therefore, to ensure the information securely transmitted over the internet is an important...

    Provided By National Chung Hsing University

  • White Papers // Aug 2009

    A Cocktail Protocol with the Authentication and Key Agreement on the UMTS

    At present, the Universal Mobile Telecommunications System (UMTS) is very popular in most parts of the world. It is a third-generation mobile communication technique known for its ability to conduct user authentication and for its security of communication with the use of Authentication and Key Agreement (AKA) protocol. A Mobile...

    Provided By National Chung Hsing University

  • White Papers // Aug 2008

    TK-AKA: Using Temporary Key on Authentication and Key Agreement Protocol on UMTS

    Mobile communication is definitely one of the major high technology applications that offer present-day people a modern life of appropriate convenience. In recent years, the third generation cell-phone system has approached maturity. The Universal Mobile Telecommunication System (UMTS) is currently the most widely used system around the world. The 3rd...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    Study of Intrusion Detection Systems

    Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, Personal Digital Assistants (PDAs), and sensors have become economically feasible because of technological...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    Secure Digital Contents Distributing System on P2P Networks

    In recent years, the file-sharing applications of Peer-To-Peer (P2P) systems, such as Napster, Bit-Torrent (BT), Gnutella, have become very popular, with BT offering particularly high scalability and efficiency service to transmit files. But BT does not enforce the access control process, so a lot of unauthorized files are freely shared....

    Provided By National Chung Hsing University

  • White Papers // Jul 2013

    Security Analysis of Choi et al.'s Certificateless Short Signature Scheme

    In traditional public key cryptography, a certificate must be provided along with a public key. The purpose of a certificate is to make sure that the public key belongs to the specific user and has not been tampered with or replaced by any third party. Those certificates are issued by...

    Provided By National Chung Hsing University

  • White Papers // Apr 2014

    (k, n)-Image Reversible Data Hiding

    Dual-images reversible data hiding methods can embed massive confidential messages and generate an excellent stego image. However, each confidential message and the cover image cannot be recovered if any stego image is missed. In order to overcome this drawback, the authors proposed a (k, n)-image reversible hiding method that can...

    Provided By National Chung Hsing University

  • White Papers // Feb 2009

    The Effect Of Organizational Change On Team Creativity, Job Satisfaction, Organizational Commitment

    The purpose of this study is to examine the relationship of team creativity, job satisfaction, organizational commitment, and work performance under the impact of an on-going organizational change. A government-owned military-based R&D institute is selected to be the major target due to their recent reengineering process. 400 scientists distributed in...

    Provided By National Chung Hsing University

  • White Papers // Mar 2009

    Modelling The Asymmetric Volatility In Hog Prices In Taiwan: The Impact Of Joining The WTO

    The hog industry, where prices are determined according to an auction system, is of vital importance to the agricultural industry in Taiwan by providing significant production and employment. In particular, there were significant impacts on daily hog prices in the periods before, during and after joining the WTO, which the...

    Provided By National Chung Hsing University

  • White Papers // Oct 2009

    Convertible DRM System Based on Identity-Based Encryption

    With the rapid growth of the Internet, acquiring digital contents over the Internet has become commonplace. Most traditional items can be translated into digital form. That is to say the digital contents can be distributed easily and rapidly to users over the Internet. Unfortunately, situations of piracy are common and...

    Provided By National Chung Hsing University

  • White Papers // Oct 2010

    A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless...

    Provided By National Chung Hsing University

  • White Papers // Nov 2011

    A Novel DRM Solution Based on 3G Security Architecture

    With the rapid growth of the Internet, acquiring digital contents over the Internet has become a commonplace. Most traditional items can be translated into digital form and distributed easily and rapidly over the Internet. Thus, the piracy problems are getting more and more serious. Therefore, the concept of the Digital...

    Provided By National Chung Hsing University

  • White Papers // May 2011

    A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping

    RFID has been regarded as a time and money-saving solution for a wide variety of applications, such as manufacturing, supply chain management, and inventory control, etc. However, there are some security problems on RFID in the product managements. The most concerned issues are the tracking and the location privacy. Numerous...

    Provided By National Chung Hsing University

  • White Papers // Mar 2010

    On Autonomous Clustering in Wireless Sensor Networks With Directional Antennas

    This paper proposes a decentralized algorithm for organizing an ad-hoc sensor network into clusters with directional antennas. The proposed autonomous clustering scheme aims to reduce the sensing redundancy and maintain sufficient sensing coverage and network connectivity in sensor networks. With directional antennas, random waiting timers, and local criterions, cluster performance...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    Data Hiding in DNA Sequences Based on Table Lookup Substitution

    Hiding secret messages in DNA sequences has become a popular research in recent years. In this paper, the authors propose an improved algorithm named the Table Lookup Substitution Method (TLSM) to enhance the performance of an existing data hiding method called the substitution method. Moreover, a general form of the...

    Provided By National Chung Hsing University

  • White Papers // Jan 2012

    Predicting Sequential Pattern Changes in Data Streams

    Data streams are utilized in an increasing number of real-time information technology applications. Unlike traditional datasets, data streams are temporally ordered, fast changing and massive. Due to their tremendous volume, performing multiple scans of the entire data stream is impractical. Thus, traditional sequential pattern mining algorithms cannot be applied. Accordingly,...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    Relay Selection in Multiuser Two-Way Cooperative Relaying Systems

    In this paper, the authors study a Relay Selection (RS) problem in multi-user two-way cooperative relaying systems. They consider a more practical scenario in which multiple users, multiple relays and a single destination are involved in the two-way network. In this paper, the Code Division Multiple Access (CDMA) system with...

    Provided By National Chung Hsing University

  • White Papers // Aug 2009

    DoS-Resistant ID-based Password Authentication Scheme Using Smart Cards

    In this paper, the authors provide a defense mechanism to Kim-Lee-Yoo's ID-based password authentication scheme, which is vulnerable to impersonation attacks and resource exhaustion attacks. Mutual authentication and communication privacy are regarded as essential requirements in today's client/server-based architecture; there-fore, a lightweight but secure mutual authentication method is introduced in...

    Provided By National Chung Hsing University

  • White Papers // Dec 2010

    An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks

    Less computational load and better efficiency on password authenticated key exchange between a low-power client and a powerful server is very important, especially in a wireless communication environment due to the constraints on the electricity supply. The proposed scheme is based on the RSA cryptography and the concept of key...

    Provided By National Chung Hsing University

  • White Papers // Jul 2009

    An Online Biometrics-Based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards

    In this paper, the authors propose an online (t, n) threshold secret sharing scheme, in which the system will disperse a primary secret sharing key K for n users, and at least t users together can reconstruct the secret K. The security of their scheme is based on biometric verification...

    Provided By National Chung Hsing University

  • White Papers // Jul 2009

    An Efficient Biometrics-Based Remote User Authentication Scheme Using Smart Cards

    In this paper, the authors propose an efficient biometric-based remote user authentication scheme using smart cards, in which the computation cost is relatively low compared with other related schemes. The security of the proposed scheme is based on the one-way hash function, biometrics verification and smart card. Moreover, the proposed...

    Provided By National Chung Hsing University

  • White Papers // Feb 2006

    Password Authentication Schemes: Current Status and Key Issues

    Password authentication scheme is one of the simplest and the most convenient authentication mechanisms over insecure networks. It is more frequently required in areas such as computer networks, wireless networks, remote login, operation systems and database management systems. In this paper, the authors survey all related password authentication schemes and...

    Provided By National Chung Hsing University

  • White Papers // May 2011

    A Secure and Efficient One-Time Password Authentication Scheme for Wireless Sensor Networks

    An algorithm that a user has authenticated over remote devices should be designed to consider the limitations of computation and lower power in a wireless sensor networks. The password authentication scheme is the most convenient mechanism. Lamport first proposed a one-time password authentication scheme which the password was different in...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    Cryptanalysis of a User Friendly Remote Authentication Scheme with Smart Card

    At present, if the authors desire any service, the just remote login to a server which provides the service. The password authentication schemes are the well known and the most accepted mechanisms. These schemes use the correct password to authenticate the right user who wants to login the system. Only...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication

    As great progress has been made in mobile communications, many related researches on this topic have been proposed. In most of the proposed protocols so far, it has been assumed that the person using the mobile station is the registrar of the SIM card; as a matter of, the previous...

    Provided By National Chung Hsing University

  • White Papers // May 2008

    Improving the Security of a Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks

    In recent years, several anonymous routing protocols for wireless ad hoc networks have been proposed. In 2007, Lu, Cao, Wang and Sun proposed a secure routing protocol with anonymity property and key exchange for ad hoc networks. However, in this paper, it is demonstrated that the so-called secure, anonymous key...

    Provided By National Chung Hsing University

  • White Papers // Dec 2007

    A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks

    Privacy and security should be paid much more attention in secure Vehicular Ad hoc NETworks (VANETs). However, as far as the authors know, few researches on secure VANET protocols have addressed both the privacy issues and authenticated key establishment. Therefore, in this paper, a lightweight authenticated key establishment scheme with...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks

    Path-key establishment has become accepted as a commonly used solution in Wireless Sensor Networks (WSNs) for protecting node-to-node communications from malicious attacks. Unfortunately, traditional security approaches are not well suited to WSNs due to their limited computational/communication abilities and memory, and their vulnerable-to-attack structure. Moreover, to extend lifetime and usability...

    Provided By National Chung Hsing University

  • White Papers // Nov 2010

    A Lightweight Anonymous Routing Protocol without Public Key En/Decryptions for Wireless Ad Hoc Networks

    More attention should be paid to anonymous routing protocols in secure wireless ad hoc networks. However, as far as the authors know, only a few papers on secure routing protocols have addressed both issues of anonymity and efficiency. Most recent protocols adopted Public Key Infrastructure (PKI) solutions to ensure the...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    A Secure Routing Protocol with Node Selfishness Resistance in MANETs

    In Mobile Ad hoc NETworks (MANETs), available nodes must act as their own router and also rely on other nodes to relay communication packets. However, some intermediate nodes may refuse to forward packets to other nodes or discard route-discovery requests from others to save power, as much as those consumed...

    Provided By National Chung Hsing University

  • White Papers // Jun 2010

    A Batch Verification for Multiple Proxy Signature

    In this paper, the authors have proposed an efficient and secure scheme to verify multiple proxy signatures and proxy multi-signatures. Instead of verifying each individual proxy signature or proxy multi-signature separately, their new scheme can verify the multiple proxy signatures or proxy multi-signatures simultaneously. Furthermore, the proposed batch verification scheme...

    Provided By National Chung Hsing University

  • White Papers // Aug 2010

    A Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol

    Three-party Password Authenticated Key Exchange (3PAKE) protocols allow two users (clients) to establish a session key through an authentication server over an insecure channel. Clients only share an easy-to-remember password with the trusted server. In the related literature, most schemes employ the server public keys to ensure the identities of...

    Provided By National Chung Hsing University

  • White Papers // Sep 2012

    On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol

    In this paper, the authors propose a practical and secure authentication and key agreement scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, \"Home network should be partially trusted in an authentication scheme\" to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such...

    Provided By National Chung Hsing University

  • White Papers // Jun 2009

    A Non-Repudiable Multi-Proxy Multi-Signature Scheme

    In this paper, the authors shall propose a multi-proxy multi-signature scheme which allows any u or more proxy signers from a designated group of v proxy signers to sign messages on behalf of any t or more original signers from a group of n original signers in total. The multi-proxy...

    Provided By National Chung Hsing University

  • White Papers // May 2011

    On the Security of Self-Certified Public Keys

    Many cryptosystems have been developed to solve the problem of information security and some of the approaches were based on the self-certified public key proposed by Girault. In Girault's scheme, the public key is computed cooperatively by both the System Authority (SA) and the user. One of the advantages is...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    An Efficient Key Assignment Scheme for Access Control in a Large Leaf Class Hierarchy

    The employees of an organization are usually divided into different security classes to authorize the information retrieval, and the number of leaf classes is substantially larger than the number of non-leaf classes. Additionally, the alternations in leaf classes are more frequent than in non-leaf classes. The authors proposed a new...

    Provided By National Chung Hsing University

  • White Papers // Feb 2010

    A Batch Verifying and Detecting the Illegal Signatures

    In this paper, the authors have introduced three authentication methods including RSA, Harn's, and their improved scheme. They also introduce the performance of these three schemes and some illegal signature detections in their scheme. According to the experiment result shows, the performance of Harn's scheme is the best when there...

    Provided By National Chung Hsing University

  • White Papers // Oct 2012

    A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography

    In this paper, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently...

    Provided By National Chung Hsing University