Woei-Jiunn Tsaur

Learn More
In this paper, we develop an efficient ECC-based self-certified public key cryptosystem (ECCSCPKC) quite suitable for efficiently securing electronic transactions. The proposed ECCSCPKC is constructed based on the elliptic curve cryptosystems (ECC) and the ID-based self-certified public key cryptosystems. The approaches proposed in this paper possess the(More)
A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Consequently, many interactive and non-interactive deniable authentication protocols have been proposed. However,(More)
Online social networks (OSNs) such as Facebook and MySpace are flourishing because more and more people are using OSNs to share their interests with friends. Because security and privacy issues on OSNs are major concerns, we propose a security framework for simultaneously authenticating multiple users to improve the efficiency and security of peer-to-peer(More)
The growing popularity of mobile devices such as smartphones and handsets has made mobile devices a more attractive target for mobile malware. Thus, the role of an anti-malware detector for effectively detecting mobile malware is becoming extremely important. In our previous work, we focused on constructing an ontology-based behavioral analysis for mobile(More)
More and more malware writers are taking advantage of rootkits to shield their illegal activities. Any computer security products that are not equipped with the anti-rootkit functionality may not identify this kind of threat. Thus, the role of a rootkit detector is becoming extremely important. Though much research has been focused on kernel data to develop(More)