Learn More
In a world with RFID carriers everywhere, the coexistence proof of multiple RFIDtagged objects shown at the same time and the same place can become a very useful mechanism and be adopted in many application areas such as computer forensics, evidences in law, valuables security, and warning or notification systems, etc. In order to support the correctness of(More)
Medication error can easily cause serious health damage to inpatients in hospital. Consequently, the whole society has to spend huge amount of extra resources for additional therapies and medication on those affected inpatients. In order to prevent medication errors, secure inpatient medication administration system is required in a hospital. Using RFID(More)
Smart card based authentication scheme has been widely utilized for various transaction-oriented services such as electronic currency exchange, social insurance payment and e-commerce payment charge in modern society. How to develop a smart card based authentication scheme to support initiator untraceability and defend against major security threats for a(More)
Traffic safety applications on vehicular ad hoc networks (VANETs) have drawn a lot of attention in recent years with their promising functions on car accident reduction, real-time traffic information support, and enhancement of comfortable driving experience on roadways. However, an inaccurate traffic warning message will impact drivers’ decisions, waste(More)
Authenticated key agreement protocols play an important role for network-connected servers to authenticate remote users in Internet environment. In recent years, several authenticated key agreement protocols for singleserver environment have been developed based on chaotic maps. In modern societies, people usually have to access multiple websites or(More)