Ming-Feng Lee

Learn More
In 2003, Hsu et al. showed that the Ku-Wang modified authentication key agreement scheme is vulnerable to the modification attack and further proposed an improvement of the Ku-Wang scheme. However, we find that the Hsu et al. scheme still suffers from the same modification attack. This paper will first show the security flaw in the Hsu et al. scheme, and(More)
-Mambo, et al. [3] discussed the delegation of signature power to a proxy signer. Lee, et al. [5] constructed a strong non-designated proxy signature scheme in which the proxy signer had strong nonrepudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be(More)
Data analysis and accurate forecasts of electricity demand are crucial to help both suppliers and consumers understand their detailed electricity footprints and improve their awareness about their impacts to the ecosystem. Several studies of the subject have been conducted in recent years, but they are either comprehension-oriented without practical merits;(More)
This paper investigates blind channel estimation and multiuser detection for quasi-synchronous multicarrier code-division multiple-access (MC-CDMA) multiple-input multiple-output (MIMO) systems with quasi-orthogonal space–time block codes (QO-STBC). Subspace-based blind channel estimation is proposed by considering a QO-STBC scheme that involves four(More)
The UMTS/LTE protocol for mobile phone networks has been designed to offer a limited form of anonymity for mobile phone users. In this paper, we quantify precisely what this limited form of anonymity actually provides via a formal security model. The model considers an execution where the home and roaming network providers are considered as one entity. We(More)
We study the meter data management systems (MDMS) with a focus on missing data handling, and propose two approaches, called Lookback-N and Sandwich-N, based on the historical data. Using a realistic dataset, we demonstrate that Lookback-N is effective for online processing, and Sandwich-N outperforms the conventional offline approach, in terms of estimation(More)
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signature scheme is secure (in the random oracle model) if and only if the identification protocol is secure against passive impersonators. A similar results holds for constructing(More)