Zobrazeno 1 - 10
of 456
pro vyhledávání: '"Tzong-Chen Wu"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
In recent years, many researches have demonstrated several RFID-based solutions to enhance patient medication safety and avoid human errors. Although RFID-based procedure is more efficient than traditional process, patient's information may be attack
Externí odkaz:
https://doaj.org/article/3d0d02850af74d4cad705a4000bb5ad1
Publikováno v:
Abstract and Applied Analysis, Vol 2013 (2013)
We investigate the optimal scheduling of retrieval jobs for double-deep type Automated Storage and Retrieval Systems (AS/RS) in the Flexible Manufacturing System (FMS) used in modern industrial production. Three types of evolutionary algorithms, the
Externí odkaz:
https://doaj.org/article/ba244d4683d746c0a869c65cfb81b26a
Autor:
Lynn Batten, Tzong-Chen Wu, Yu Yu, Henry B. Wolfe, Siu-Ming Yiu, Steven D. Galbraith, Bo-Yin Yang, Lucas Hui, Dingyi Pei, Mitsuru Matsui, Raphaël Cw Phan, Jian Guo, Ed Dawson, Duncan S. Wong, Huaxiong Wang, Dong Hoon Lee, Shiho Moriai, Kwangjo Kim, Xuejia Lai, Masayuki Abe, Duong Hieu Phan, Jianying Zhou, Tsutomu Matsumoto, Josef Pieprzyk, Jung Hee Cheon, Phong Q. Nguyen
Publikováno v:
Communications of the ACM
Communications of the ACM, 2020, 63 (4), pp.76-81. ⟨10.1145/3378428⟩
Communications of the ACM, 2020, 63 (4), pp.76-81. ⟨10.1145/3378428⟩
International audience; Members of the International Association for Cryptologic Research explore regional work and collaboration activities.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5983206cb9e2733055f03095aeb18d47
https://hal.science/hal-03540244
https://hal.science/hal-03540244
Publikováno v:
NTMS
Policy-controlled signature (PCS) was introduced by Pairat Thorncharoensri et al. at ICICS 2009, and improved at Computer Standards & Interfaces 2017. In this type of digital signature, signer can sign a message with some policies. Any verifier who d
RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model
Publikováno v:
IEICE Transactions on Information and Systems. :750-759
Secure authentication of low cost Radio Frequency Identification (RFID) tag with limited resources is a big challenge, especially when we simultaneously consider anonymity, un-traceability, and forward secrecy. The popularity of Internet of Things (I
Publikováno v:
2017 International Conference on Soft Computing, Intelligent System and Information Technology (ICSIIT).
This paper presents a secure anonymous authentic-cation scheme for roaming service in global mobility networks based on our previous work. In this paper, the home agent does not have to maintain any verification table for authenticating the mobile us
Developing a Not-Reached Adaptive Test with K-Nearest Neighbor Method to Evaluate Examinees' Ability
Autor:
Tzong-Chen Wu, Yu-Chang Chang
Publikováno v:
Sensor Letters. 12:1545-1551
Publikováno v:
International Journal of Satellite Communications and Networking. 32:443-452
SUMMARY An authentication scheme is one of the most basic and important security mechanisms for satellite communication systems because it prevents illegal access by an adversary. Lee et al. recently proposed an efficient authentication scheme for mo
Publikováno v:
IEEE Transactions on Industrial Informatics. 9:2004-2013
Smart card based authentication scheme has been widely utilized for various transaction-oriented services such as electronic currency exchange, social insurance payment and e-commerce payment charge in modern society. How to develop a smart card base
Publikováno v:
Wireless Personal Communications. 73:1037-1047
Handover authentication protocol enables a mobile node to switch from one base station to another without loss or interruption of service when the node exits the transmission area of his or her current base station. This paper proposes a secure prime