Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Feng-Fu Su"'
Autor:
Feng-Fu Su, 蘇豐富
94
In mobile communications nowadays, personal privacy and security are of top concern to mobile phone subscribers. In protecting the confidential and sensitive data in mobile networks, cryptosystem can be considered as an important technique. Y
In mobile communications nowadays, personal privacy and security are of top concern to mobile phone subscribers. In protecting the confidential and sensitive data in mobile networks, cryptosystem can be considered as an important technique. Y
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/14397586654544342220
Publikováno v:
Journal of Convergence Information Technology. 8:837-844
Publikováno v:
Applied Mechanics and Materials. :2075-2079
This paper proposes a three-party authenticated key exchange protocol using two-factor including a password and a token. The proposed protocol allows two users to establish a session key through a trusted server with whom they both share a human-memo
Publikováno v:
Wireless Personal Communications. 42:213-223
In modern mobile communications, personal privacy and security are of top concern to mobile phone subscribers. Yet, owing to the limit of their processing capability, mainstream mobile manufacturers are still unable to apply advanced security protoco
Autor:
Feng-Fu Su, Ren-Junn Hwang
Publikováno v:
Computer Standards & Interfaces. 28:241-252
This paper proposes a new efficient authentication protocol for mobile networks. The user, service provider and key distribution center authenticate mutually in the proposed protocol. In addition, the user and service provider will generate a secret
Publikováno v:
Applied Mathematics and Computation. 167:870-881
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed scheme takes lower computation and communication cost to provide security fu
Publikováno v:
Commun. Math. Sci. 5, iss. 2 (2007), 383-389
Modular multiplication plays an important role to several public-key cryptosystems such as the RSA cryptosystem. This paper proposes an efficient modulo $p$ multiplication algorithm with moderate factors of $p$+1 and $p$-1. In order to improve the RS
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9ddcf5dcc775f98773bb91c79c6babd5
http://projecteuclid.org/euclid.cms/1183990371
http://projecteuclid.org/euclid.cms/1183990371
Autor:
Feng-Fu, Su.
Thesis (Ph. D.)--Tamkang University Dept. of Computer Science and Information Engineering.
Includes bibliographical references.
Includes bibliographical references.
Publikováno v:
AINA
This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is the most attractive and popular security technique for many applications, such as electronic commerce and secure Internet access. It has to perform mod
Publikováno v:
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
As the rapid progressing of mobile communication systems, personal communication systems have been brought new problems on the security aspects by the new communication technologies. Public-key cryptography technologies offer solutions to many of the