Tzay-Farn Shih

Learn More
In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is(More)
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many(More)
Abstract. Radio-frequency identification (RFID) is an automatic identification technology. In recent years, more and more applications have been found for its use. However, there are still many security issues worth discussing. In this paper, we propose a mutual authentication scheme, which can solve problems such as privacy, replay attack, forward(More)
This paper proposes a novel key management of two-tier dissemination for wireless sensor network. In our scheme, a sensor node is selected to be a cluster node in each grid. The responsibility of cluster node is to aggregate the events from sensor node and respond to base station. The base station obtains the occurred event information from its cluster(More)
In 2004, Bresson et al. proposed an authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.’s protocol. However, both protocols are insecure against the so-called impersonation attacks. This paper proposes a mutual authenticated group key agreement(More)