Learn More
In this paper, we describe the construction of picture archiving and communication system (PACS) in Tri-Service General Hospital (TSGH) of Taiwan, and apply fuzzy technique to process medical images gotten from this system. A PACS consists of image and data acquisition, storage, and display subsystems integrated by various digital networks. Based on PACS,(More)
In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID (Radio-Frequency Identification) based on ECC (Elliptic Curve Cryptography). Recently, Lv et al. have shown that Batina et al.'s protocol is not secure against the tracking attack. Lv et al. also proposed an enhancement protocol based on Batina et al.'s work to against the(More)
RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or(More)
An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof(More)
In this paper we describe a novel ECC protocol for public key cryptosystem in non-PKI environment. The proposed protocol is designed to avoid the expensive infrastructure of PKI and the key escrow problem of the id-based cryptosystem. We based on elliptic curve discrete logarithm problem to build a practice key exchanging protocol in short key, low power,(More)
  • 1