Chern-Tang Lin

Learn More
In this paper, we motivate the need for efficient multisignature schemes in delegated mobile services. With the schemes, delegates can be identified and delegated accesses can be controlled. First, we give a new digital signature scheme with message recovery. Based on the digital signature scheme, two digital multisignature schemes are proposed: the(More)
Digital mobile telecommunication systems have become a future trend in personal communications services (PCS) networks. To satisfy the demand for high quality services, security functions, including the authentications of communication parties and the confidentiality of communication channels, must be embedded into mobile communication systems. This work(More)
The digital cellular mobile telecommunication systems have become the trend of future personal communications services (PCS). In order to satisfy the high quality of services, security functions have been embedded into new mobile communication systems. In this paper, we investigate the security issues in the mobile communication systems and focus especially(More)
MasterCard and VisaCard use credit cards to support a number of services, such as Masterphone or Visaphone, which allow cardholders to make phone calls from any telephone. However, these services take little or no security precautions. Although SET protocol has defined a secure payment method for card transactions over open networks, it cannot fit in(More)
In this paper, a model for software authorization and protection in mobile code systems is proposed. In the model, a software is partitioned into objects, called mobile agents, and the privileges to access these agents are separated and distributed to the user’s local system and a number of trusted servers called trusted computational proxies. The execution(More)
In this paper, a model for software authorization and protection in mobile code systems is proposed. In the model, a software is partitioned into objects, called mobile agents, and the privileges to access these agents are separated and distributed to the user’s local system and a number of trusted servers called trusted computational proxies. The execution(More)
  • 1