7 research outputs found

    Comments on Micorpayment Schemes for Multi-Merchants with Anonymity and Untraceability

    Get PDF
    [[conferencetype]]國內[[conferencedate]]20120530~20120531[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]Taichung, Taiwa

    Security Flaws in Zhang and Xu Improved Concurrent Signature Scheme

    Get PDF
    [[conferencetype]]國內[[conferencedate]]20120530~20120531[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]Taichung, Taiwa

    A Unlinkable Delegation-based Authentication Protocol with Users’ Non-repudiation for Portable Communication Systems

    Get PDF
    [[abstract]]For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, user privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an unreasonable assumption that home location registers are always trusted. To weaken this assumption and enhance the nonrepudiation of mobile users, a new delegation-based authentication protocol is proposed. The new protocol also removes the exhaustive search problem of the subsequent login authentication to improve the subsequent login authentication performance. Moreover, the user unlinkability in the subsequent login authentication is also provided to enhance the user identity privacy protection.[[incitationindex]]EI[[incitationindex]]CEPS[[booktype]]紙

    Security Flaws of Off-Line Micro Payment Scheme with Dual Signatures

    No full text
    Advanced Technologies, Embedded and Multimedia for Human-centric Computing, Vol. 2, LNEE 260[[conferencetype]]國際[[conferencedate]]20130823~20130825[[booktype]]紙本[[conferencelocation]]台北, 台

    A Delegation-based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation

    No full text
    [[conferencetype]]國際[[conferencedate]]20130823~20130825[[booktype]]紙本[[iscallforpapers]]Y[[conferencelocation]]台北, 台

    A Ring Signature Scheme with Anonymous Strong-Designated Verifiers

    No full text
    [[sponsorship]]中華民國資訊安全學會/National Kaohsiung First University of Science and Technology[[conferencetype]]國內[[conferencedate]]20150528~20150529[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]National Kaohsiung First University of Science and Technology, Kaohsiung, Taiwa

    Dynamic Group Weakness in Yu et al.’s Identity Privacy-Preserving Public Mobile Cloud Storage Auditing

    No full text
    [[conferencetype]]國內[[conferencedate]]20150528~20150529[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]National Kaohsiung First University of Science and Technology, Kaohsiung, Taiwa
    corecore