Tzay-Farn Shih

Learn More
In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is(More)
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many(More)
Instead of blindly searching for a route in the entire network, the location-based routing protocol uses the location information of mobile nodes to confine routing space into a smaller range that reduces routing overhead and broadcast storm. In this paper, we propose a location-aided cluster-based routing protocol called Core Location-Aided Cluster-based(More)
Radio-frequency identification (RFID) is an automatic identification technology. In recent years, more and more applications have been found for its use. However, there are still many security issues worth discussing. In this paper, we propose a mutual authentication scheme, which can solve problems such as privacy, replay attack, forward security, and user(More)
Radio Frequency Identification (RFID) is a new technology. In recent years, it is convenient and feasible in many applications. However, it also addresses many security issues which are worth discussing. The Counterfeit imposes a menace to industry worldwide, and the problem is not specific for certain products or countries. In 2003, Koh et al. describe a(More)