scispace - formally typeset
Search or ask a question
Institution

Tainan University of Technology

EducationTainan City, Taiwan
About: Tainan University of Technology is a education organization based out in Tainan City, Taiwan. It is known for research contribution in the topics: Password & Authentication. The organization has 311 authors who have published 641 publications receiving 10826 citations.


Papers
More filters
Proceedings ArticleDOI
17 Dec 2016
TL;DR: The authors shall point out some weak-nesses of Dimitriou's RFID systems including the mutual authentication part of the basic authentication scheme, the backward privacy problem of the key update scheme, as well as backward privacy for controlled delegation and authorization recovery.
Abstract: In the last decade, the technology of Radio Frequency Identification (RFID) has boomed in the wireless communication environment. Applications of RFID have matured and reached far into various fields such as smart building, healthcare, supply chain management, etc. However, along with the rapid advancement of RFID systems have come many security issues, among which stands the transfer of ownership. Generally speaking, RFID tags can be reused multiple times, and the identity of the owner of a tag can vary in different scenarios. Recently, Tassos Dimitriou published a study that presented several key evolving schemes and discussed the issue of how the ownership of RFID tags could be properly transferred with some security requirements met. Unfortunately, Dimitriou's systems have some security vulnerabilities. In this paper, the authors shall point out some weak-nesses of Dimitriou's RFID systems including the mutual authentication part of the basic authentication scheme, the backward privacy problem of the key update scheme, as well as backward privacy for controlled delegation and authorization recovery.

5 citations

Journal ArticleDOI
TL;DR: The authors investigated the effects of an 8-week horticultural activity intervention on attitudes toward aging, sense of hope, and hand-eye coordination in 88 older adults in residential care facilities.
Abstract: This study investigated the effects of an 8-week horticultural activity intervention on attitudes toward aging, sense of hope, and hand–eye coordination in 88 older adults in residential care facilities. In the experimental group, the mean score for “attitudes toward aging” increased from 3.81 before the intervention to 4.74 points after the intervention (standard deviation SD = 0.24 and 0.27, respectively), and the control group dropped from 3.75 to 3.70 (standard deviations, respectively SD = 0.27 and 0.28). The mean score for “sense of hope” increased from 3.28 before the intervention to 3.81 points after the intervention (SD = 0.49 and 0.26, respectively). In contrast to the control group, the mean score gradually declined from 3.26 to 3.16 points (standard deviation SD = 0.54 and 0.48, respectively). In the test of hand–eye coordination, the time required to complete the cup stacking test significantly decreased from 33.56 to 25.38 s in the experimental group but did not significantly change in the control group. Generalized estimating equation analysis revealed a significant interaction between group and time (p < 0.001). The data trends revealed significant differences in outcomes between the experimental group and the control group. At 3 months after the end of the study, the effect size in the experimental group remained higher than that in the control group.

5 citations

Journal ArticleDOI
TL;DR: In this paper, Sun et al. used a tree data structure to identify structural motifs for the BC2N superlattices from a systematic search based on a greedy algorithm.

5 citations

01 Jan 2013
TL;DR: An improved version of Chang and Lee's e-voting scheme based on the blind signature and the Diffie-Hellman key exchange methods for ensuring voter anonymity and performance efficiency is proposed that enhances the security of their e-Voting scheme.
Abstract: Voter anonymity and voting correctness are important issues for electronic voting mechanisms. Compared electronic voting with traditional 1elections, an electronic voter is able to cast his/her ballot through the Internet in any place and at any time if he/she can access the network. Therefore, convenience and mobility make electronic voting become more and more popular and electronic voting can be adopted in the real world with higher feasibility. Recently, Chang and Lee presented an electronic voting (e-voting) scheme based on the blind signature and the Diffie-Hellman key exchange methods for ensuring voter anonymity and performance efficiency. They claimed that numerous essential requirements of general electronic voting can be ensured in their e-voting scheme. Unfortunately, we found that Chang-Lee's e-voting scheme suffers from susceptibility to security attacks and some critical security requirements of their e-voting scheme may be compromised. To prevent security weaknesses of Chang-Lee's e-voting scheme, in this paper, an improved version on their e-voting scheme is proposed that not only keeps the merits of Chang-Lee's e-voting scheme but also enhances the security of their e-voting scheme.

5 citations

Book ChapterDOI
13 Nov 2013
TL;DR: An improved scheme that not only inherits the advantages of Li’s password authentication scheme but also remedies the serious security weakness of not being able to withstand insider attack is proposed.
Abstract: Remote password authentication has been widely used in network systems and it aims to provide secure remote access control. In 2013, Li proposed a novel password authentication scheme based on elliptic curve cryptography and smart card [17]. However, we found that Li’s authentication scheme has a serious security problem in that all registered users’ sensitive passwords can be easily derived by the privileged-insider of remote server. Therefore, in this paper, we propose a slight modification on Li’s scheme to prevent the shortcomings. Our improved scheme not only inherits the advantages of Li’s password authentication scheme but also remedies the serious security weakness of not being able to withstand insider attack.

5 citations


Authors

Showing all 311 results

Network Information
Related Institutions (5)
Hong Kong Polytechnic University
72.1K papers, 1.9M citations

85% related

National Cheng Kung University
69.7K papers, 1.4M citations

81% related

National Chiao Tung University
52.4K papers, 956.2K citations

81% related

City University of Hong Kong
60.1K papers, 1.7M citations

81% related

National Tsing Hua University
50.3K papers, 1.1M citations

80% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20222
202138
202034
201934
201832
201734