Tsung-Hung Lin

Learn More
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients’ electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al.(More)
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition(More)
The mobile multimedia applications have recently generated much interest in wireless ad hoc networks with supporting the quality-of-service (QoS) communications. The QoS metric considered in this work is the reserved bandwidth, i.e., the time slot reservation. We approach this problem by assuming a common channel shared by all hosts under a TDMA (Time(More)
Increasingly, services operations which perform data sensing and data propagation in a dynamic environment are important tasks of wireless sensor networks. Therefore, increasing the network lifetime is the main contribution of this investigation. In this paper, we propose a novel power-aware chessboard-based adaptive routing (PCAR) protocol to support(More)
This paper presents a simple and effective method to fabricate a polydimethyl-siloxane (PDMS) microlens array with a high fill factor, which utilizes the UV proximity printing and photoresist replication methods. The concave microlens array mold was made using a printing gap in lithography process, which utilizes optical diffraction of UV light to deflect(More)
Secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems enables two users only store their verifiers computed from their actual password in authentication server’s database. Then the authentication server can verify the users’ verifiers and help them to exchange electronic medical records or(More)
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize(More)
This article presents a modified scheme named local search ant colony optimization algorithm on the basis of alternative ant colony optimization algorithm for solving flow shop scheduling problems. The flow shop problem (FSP) is confirmed to be an NP-hard sequencing scheduling problem, which has been studied by many researchers and applied to plenty of(More)
In this paper, a new channelization code tree structure, namely an ROVSF (rotated-orthogonal variable spreading factor) code tree, is defined and investigated. Most existing code assignment schemes are investigated on the OVSF (orthogonal variable spreading factor) code tree in WCDMA systems. The main work of this investigation is to exploit and justify the(More)