Learn More
In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we observe that Lee et al.'s scheme is still vulnerable to stolen smart card(More)
In this paper, we consider a model of competition between plasmid-bearing and plasmid-free organisms in the chemostat, where the yield coefficients and growth rates are assumed to be general functions of the nutrient concentration. We give a characterization of the outcome of this competition in terms of the relevant parameters. Conditions of the existence(More)
In this paper, we propose a practical dynamic multi-secret sharing scheme based on the intractability of the discrete logarithm and one way hash functions, the exclusive OR operation. Security analysis shows that our scheme could correctly reconstruct the shared secret, and our scheme is as secure as Lin-Yeh's scheme. In addition, in our schemes, all(More)
Recently, Li et al. [20] proposed an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks to remedy the weaknesses of Rhee et al.’s scheme. Li et al.’s scheme not only achieves mutual authentication, but also provides the procedure for key agreement and updates of secrets for users and servers.(More)
  • 1