Wei-Chi Ting

Learn More
Security issues become more and more significant in RFID development. Recently, Chien proposed an ultralightweight RFID authentication protocol in order to achieve privacy and authenticity with limited computation and transmission resources. However, we find two desynchronization attacks to break the protocol. In order to repair the protocol, two patches(More)
EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable. Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable(More)
We present new variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents. This family of variants, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys. Two applications for dual RSA, blind(More)
In 2007, Kim et al. proposed a secure compression code called the secure arithmetic code (SAC). The code was claimed to be secure against chosen plaintext attacks. However, we find that the SAC is not as secure as the authors have claimed. In this paper, we show the code is prone to two attacks. The first attack completely breaks the code using an adaptive(More)
In this paper, we propose a novel integrated API service system as well as a Web API script to enable mobile mashup application developers to invoke Web APIs in a consistent way, and provide a consistent format for the responses of Web APIs, thereby relieving developers of striving to study the usage of various Web APIs.
Due to the rapid improvement in resolution and codec, the number of video sensing device grows fast in the recent years. Tremendous data need to be stored and processed. To meet such a need, we developed a video hosting and processing platform for near-real time applications. An intelligent device can obtain connection-less upload function from our(More)
With the advances of video streaming technology, live streaming services also become more and more popular. However, there may be thousands of online channels at the same time, and most viewers are not willing to go through one by one for finding the channels they are interested in. In view of this, we propose a hybrid preference-aware recommendation(More)
Mobile devices today such as netbooks, tablet PCs and smart phones provide user-friendly interfaces for people to capture live video. However as a viewer, they prefer not to share downloaded clips due to the limited computing power, upload bandwidth and mostly due to the high power consumption while scheduling segments. In this paper, we discuss the(More)
  • 1