Institution
Tainan University of Technology
Education•Tainan City, Taiwan•
About: Tainan University of Technology is a education organization based out in Tainan City, Taiwan. It is known for research contribution in the topics: Password & Authentication. The organization has 311 authors who have published 641 publications receiving 10826 citations.
Topics: Password, Authentication, Smart card, Landau quantization, Supply chain
Papers published on a yearly basis
Papers
More filters
••
17 Dec 2016TL;DR: The authors shall point out some weak-nesses of Dimitriou's RFID systems including the mutual authentication part of the basic authentication scheme, the backward privacy problem of the key update scheme, as well as backward privacy for controlled delegation and authorization recovery.
Abstract: In the last decade, the technology of Radio Frequency Identification (RFID) has boomed in the wireless communication environment. Applications of RFID have matured and reached far into various fields such as smart building, healthcare, supply chain management, etc. However, along with the rapid advancement of RFID systems have come many security issues, among which stands the transfer of ownership. Generally speaking, RFID tags can be reused multiple times, and the identity of the owner of a tag can vary in different scenarios. Recently, Tassos Dimitriou published a study that presented several key evolving schemes and discussed the issue of how the ownership of RFID tags could be properly transferred with some security requirements met. Unfortunately, Dimitriou's systems have some security vulnerabilities. In this paper, the authors shall point out some weak-nesses of Dimitriou's RFID systems including the mutual authentication part of the basic authentication scheme, the backward privacy problem of the key update scheme, as well as backward privacy for controlled delegation and authorization recovery.
5 citations
••
TL;DR: The authors investigated the effects of an 8-week horticultural activity intervention on attitudes toward aging, sense of hope, and hand-eye coordination in 88 older adults in residential care facilities.
Abstract: This study investigated the effects of an 8-week horticultural activity intervention on attitudes toward aging, sense of hope, and hand–eye coordination in 88 older adults in residential care facilities. In the experimental group, the mean score for “attitudes toward aging” increased from 3.81 before the intervention to 4.74 points after the intervention (standard deviation SD = 0.24 and 0.27, respectively), and the control group dropped from 3.75 to 3.70 (standard deviations, respectively SD = 0.27 and 0.28). The mean score for “sense of hope” increased from 3.28 before the intervention to 3.81 points after the intervention (SD = 0.49 and 0.26, respectively). In contrast to the control group, the mean score gradually declined from 3.26 to 3.16 points (standard deviation SD = 0.54 and 0.48, respectively). In the test of hand–eye coordination, the time required to complete the cup stacking test significantly decreased from 33.56 to 25.38 s in the experimental group but did not significantly change in the control group. Generalized estimating equation analysis revealed a significant interaction between group and time (p < 0.001). The data trends revealed significant differences in outcomes between the experimental group and the control group. At 3 months after the end of the study, the effect size in the experimental group remained higher than that in the control group.
5 citations
••
TL;DR: In this paper, Sun et al. used a tree data structure to identify structural motifs for the BC2N superlattices from a systematic search based on a greedy algorithm.
5 citations
01 Jan 2013
TL;DR: An improved version of Chang and Lee's e-voting scheme based on the blind signature and the Diffie-Hellman key exchange methods for ensuring voter anonymity and performance efficiency is proposed that enhances the security of their e-Voting scheme.
Abstract: Voter anonymity and voting correctness are important issues for electronic voting mechanisms. Compared electronic voting with traditional 1elections, an electronic voter is able to cast his/her ballot through the Internet in any place and at any time if he/she can access the network. Therefore, convenience and mobility make electronic voting become more and more popular and electronic voting can be adopted in the real world with higher feasibility. Recently, Chang and Lee presented an electronic voting (e-voting) scheme based on the blind signature and the Diffie-Hellman key exchange methods for ensuring voter anonymity and performance efficiency. They claimed that numerous essential requirements of general electronic voting can be ensured in their e-voting scheme. Unfortunately, we found that Chang-Lee's e-voting scheme suffers from susceptibility to security attacks and some critical security requirements of their e-voting scheme may be compromised. To prevent security weaknesses of Chang-Lee's e-voting scheme, in this paper, an improved version on their e-voting scheme is proposed that not only keeps the merits of Chang-Lee's e-voting scheme but also enhances the security of their e-voting scheme.
5 citations
••
13 Nov 2013
TL;DR: An improved scheme that not only inherits the advantages of Li’s password authentication scheme but also remedies the serious security weakness of not being able to withstand insider attack is proposed.
Abstract: Remote password authentication has been widely used in network systems and it aims to provide secure remote access control. In 2013, Li proposed a novel password authentication scheme based on elliptic curve cryptography and smart card [17]. However, we found that Li’s authentication scheme has a serious security problem in that all registered users’ sensitive passwords can be easily derived by the privileged-insider of remote server. Therefore, in this paper, we propose a slight modification on Li’s scheme to prevent the shortcomings. Our improved scheme not only inherits the advantages of Li’s password authentication scheme but also remedies the serious security weakness of not being able to withstand insider attack.
5 citations
Authors
Showing all 311 results
Name | H-index | Papers | Citations |
---|---|---|---|
Chun-Ta Li | 27 | 106 | 2801 |
Chia-Cheng Tsai | 22 | 55 | 1099 |
Cheng-Peng Chang | 22 | 80 | 1803 |
Hung-Jung Lin | 21 | 121 | 1730 |
Chia-Jui Weng | 21 | 34 | 1684 |
Jen-Fa Huang | 15 | 126 | 1026 |
Jiann-Wen Huang | 13 | 13 | 328 |
Wan-Sheng Su | 13 | 62 | 1005 |
Chen-Tsang (Simon) Tsai | 12 | 17 | 1071 |
Kuohsiang Chen | 10 | 42 | 543 |
Yi-Chung Cheng | 9 | 18 | 418 |
Se Ping Chien | 8 | 9 | 128 |
Chih-Yuan Yang | 8 | 13 | 185 |
Wei Min Lin | 8 | 17 | 197 |
Tso-Jen Chen | 7 | 11 | 249 |