Institution
Tainan University of Technology
Education•Tainan City, Taiwan•
About: Tainan University of Technology is a education organization based out in Tainan City, Taiwan. It is known for research contribution in the topics: Password & Authentication. The organization has 311 authors who have published 641 publications receiving 10826 citations.
Topics: Password, Authentication, Smart card, Landau quantization, Supply chain
Papers published on a yearly basis
Papers
More filters
••
03 Aug 2014TL;DR: This work aims at the application of fuzzy Gantt chart and genetic algorithm to calculate optimal activity in project scheduling to reduce the maximum resource input from 94 to 40 men with similar project makespan.
Abstract: Project scheduling with resource constraints is one of the most challenging optimization problems because of the complexity in estimating the resource requirement. This work aims at the application of fuzzy Gantt chart (FGC) and genetic algorithm (GA) to calculate optimal activity in project scheduling. Activity durations are considered adjustable for the optimal resource assignment under the constraints. GA determines not only the activity priority but also the activity duration within resource constraints. Numerical results of an example show that this application can effectively reduce the maximum resource input from 94 to 40 men with similar project makespan.
3 citations
••
TL;DR: In this article, the authors show that management, process innovation, and resource infusion play a major role in the performance of Taiwanese SMEs to implement e-business, and therefore have the potential to promote e-Business growth.
Abstract: The adoption and implementation of e-business by small and medium sized enterprises (SMEs) in Taiwan has become increasingly important in order to stay competitive. Due to the disparities between industries and the differing maturity levels of e-business, SMEs must apply diverse strategies and activities to deploy their e-business projects. Employing questionnaire surveys and interviews, this study demonstrates that management, process innovation, and resource infusion play a major role in the performance of Taiwanese SMEs to implement e-business, and, therefore, have the potential to promote e-business growth. Results revealed that implementation of cost reduction along with revenue increments during the midterm of the e-business project had good benefits. The factors of management, process innovation, and resource infusion were statistically significant and this implies that they have positive influences on e-business when applied in different industries.
Keywords: E-Business, Small and Medium Sized Enterprises (SMEs)
3 citations
••
TL;DR: A quantitative mathematical model is proposed to compute product complexity based on product features, and then link product complexity to product attractiveness to the customer and the results of the example demonstrate the proposed model can help enterprises design the most attractive products for customers.
Abstract: One of the decisions determining whether customers will admire the product is the degree of product complexity to most attractive customers. Product complexity results from the overall product feat...
3 citations
••
TL;DR: It is demonstrated that Nam et al.'s improved S-3PAKE protocol, unfortunately, is still vulnerable to an undetectable on-line password guessing attack, and a simple and powerful method is proposed to address this issue.
Abstract: Three-party key exchange protocol is one of the most essential cryptographic technique in the secure communication areas. In this protocol, two clients, each shares a human-memorable password, working with a trusted server, can agree a secure session key. Recently, Lu and Cao proposed a new simple three-party key exchange S-3PAKE protocol and claimed that it is not only very simple and efficient, but also can survive against various known attacks. However, Nam et al. pointed out that S-3PAKE is vulnerable to both off-line password guessing attack and undetectable on-line password guessing attack. Based on their finding, Nam et al. proposed an improved method to resolve this weakness. They further claimed that so far no off-line password guessing attack has been successful against their proposed protocol. In this paper, we demonstrate that Nam et al.'s improved protocol, unfortunately, is still vulnerable to an undetectable on-line password guessing attack. We therefore propose a simple and powerful method to address this issue. Which results in an improved three-party key exchange protocol that can protect against an undetectable on-line password guessing attack.
3 citations
••
27 Apr 2009TL;DR: This paper finds that Peyravian et al. second scheme suffers from the masquerade attack and this paper will propose a slight improvement to their scheme to resist this weakness.
Abstract: In 2004, Peyravian et al presented three simple solutions to X509 PKI method that these three solutions could save storage, bandwidth and reduce the complexity of the operations However, we find that Peyravian et al second scheme suffers from the masquerade attack and this paper will propose a slight improvement to their scheme to resist this weakness
3 citations
Authors
Showing all 311 results
Name | H-index | Papers | Citations |
---|---|---|---|
Chun-Ta Li | 27 | 106 | 2801 |
Chia-Cheng Tsai | 22 | 55 | 1099 |
Cheng-Peng Chang | 22 | 80 | 1803 |
Hung-Jung Lin | 21 | 121 | 1730 |
Chia-Jui Weng | 21 | 34 | 1684 |
Jen-Fa Huang | 15 | 126 | 1026 |
Jiann-Wen Huang | 13 | 13 | 328 |
Wan-Sheng Su | 13 | 62 | 1005 |
Chen-Tsang (Simon) Tsai | 12 | 17 | 1071 |
Kuohsiang Chen | 10 | 42 | 543 |
Yi-Chung Cheng | 9 | 18 | 418 |
Se Ping Chien | 8 | 9 | 128 |
Chih-Yuan Yang | 8 | 13 | 185 |
Wei Min Lin | 8 | 17 | 197 |
Tso-Jen Chen | 7 | 11 | 249 |