Chia-Hui Wei

Learn More
S ecurity and privacy concerns present serious challenges in RFID systems. Traditional encryption methods are insufficient in such systems because RFID tags have limited processing and memory capabilities. Each tag has its own ID and is installed in an open environment to help retailers identify and locate trade items, logistical units, and assets. When a(More)
Radio Frequency Identification (RFID) system can be read by radio wave within several metres without having direct contact. Many research focus on improving security and privacy problem. Recently, Rizomiliotis et al. point out that Song-Mitchell protocol is vulnerable to the denial of service attack, since the attacker can easily modify the data to make the(More)
Grid computing has contributed to advances in computational and communication technologies-making economically feasible the conglomeration of multiple clusters of heterogeneous networked resources and services which, in turn, has lead to the development of large-scale distributed systems. It is in this context that available resources are allocated to where(More)
Grid computing has contributed to advances in computational and communication technologies, which has made economically feasible the conglomeration of multiple clusters of heterogeneous networked resources and services that, in turn, has lead to the development of large-scale distributed systems. However, available resources may be shortage. We propose a(More)
  • 1