Learn More
Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This article shows an existential replication attack on the scheme and, as a result, an attacker can obtain the communication key between a mobile(More)
An authenticated encryption scheme with (t, n) shared verification was published in 1998 by Hsu and Wu under the assumption that all participant verifiers were honest. An improvement to Hsu-Wu’s scheme is proposed in this paper. This improvement can prevent some verifier from cheating others. If also requires fewer transmitted messages. The security of the(More)
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, design issues for efficient and secure biometrics-based remote user authentication scheme have been extensively investigated by research community in these years.(More)
This paper presents a parallel nonlinear finite element program, ParCYCLIC, which is designed for the analysis of cyclic seismically-induced liquefaction problems. Key elements of the computational strategy employed in ParCYCLIC include the deployment of an automatic domain decomposer, the use of the multilevel nested dissection algorithm for the ordering(More)
Mobile communication network has brought us great convenience. However, network security issues are outstanding increasingly. Authentication is the most essential procedure for preventing illegitimate, unauthorized or insecure devices from making access to the network. Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and(More)
Remote user authentications are an essential tool for e-commerce in Internet environment. In these systems, identity privacy is provided by concealing user's identity. In this article, we introduce the identity privacy study of this setting, and explore a secure and efficient dynamic ID-based remote user authentication protocol with untraceability. We adapt(More)
In 2008, Tang and Wu designed a one-time alias mechanism for protecting the mobile privacy of a user. Recently, Youn and Lim proposed an improved delegation-based authentication protocol to provide private roaming service. In this article, we show that a link between requests may disclose information about the mobile privacy of a sender, and that the(More)
  • 1