Learn More
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper The scheme attempts to achieve both efficiency and non-iteration in deriving the successor secret key. Besides, the other issues in relation with dynamic access control problems,(More)
In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new(More)
Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor(More)
The core competencies of a mobile agent include free-roaming between different environment and autonomous environment detection and simultaneous adaptation to environment. Because of these competencies, the concept of mobile agent is widely used in many different fields, such as the Internet business, wireless communication and information security(More)
In recent years, the average life expectancy of people is extended and total fertility rate is dropped, bring our country into an aged society. Due to this phenomenon, how to provide the aged people and the patients with chronic diseases a suitable environment of health care has become a critical issue currently. Therefore, we propose a new scheme that(More)
  • 1