• Publications
  • Influence
Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems
TLDR
We proposed a novel and efficient mutual authentication scheme based on quadratic residues for RFID systems. Expand
  • 80
  • 6
  • PDF
A novel electronic cash system with trustee-based anonymity revocation from pairing
TLDR
We construct an identity-based blind signature scheme, in which a bank can blindly sign on a message containing a trustee-approved token that includes the user's identity. Expand
  • 41
  • 5
  • PDF
ECC-based untraceable authentication for large-scale active-tag RFID systems
TLDR
This paper examines several elliptic-curve-cryptography-based full-fledged tag authentication protocols and proposes two novel protocols, PI and PII, which outperform previous ECC-based proposals in communication efficiency, and provide mutual authentication function and scalability. Expand
  • 31
  • 4
A ID-Based Deniable Authentication Protocol on pairings
TLDR
We propose a new identity-based deniable authentication protocol on pairings which can not only attain the desired deniable property but also can prevent attacks. Expand
  • 34
  • 3
  • PDF
A modified MOEA/D approach to the solution of multi-objective optimal power flow problem
TLDR
A modified multi-objective evolutionary algorithm based decomposition (MOEA/D) approach is applied to solve MOOPF problems with multiple and competing objectives . Expand
  • 61
  • 2
Improvement of Manik et al.¡¦s remote user authentication scheme
TLDR
In 2005, Manik et al. propose a novel remote user authentication scheme using bilinear pairings which allows a valid user to login to the remote system but prohibits too many users to login with the same login-ID. Expand
  • 35
  • 2
  • PDF
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
TLDR
In this paper we propose a novel one which not only anonymously authenticates the remote user by using only two passes but also satisfies the ten requirements of an authentication scheme using smart card mentioned by Liao et al.. Expand
  • 11
  • 2
  • PDF
A novel multi-server authentication protocol
TLDR
We propose a multi-server authentication protocol based on Lagrange interpolating polynomial which can withstand the server spoofing attack. Expand
  • 7
  • 2
  • PDF
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. By usingExpand
  • 25
  • 1
  • PDF
A hybrid particle swarm optimization with small population size to solve the optimal short-term hydro-thermal unit commitment problem
Hydro-thermal unit commitment (HTUC) is an extension of unit commitment (UC) problems. The hydro-thermal unit commitment problem considered in this study aims at minimizing the total fuel cost ofExpand
  • 35
  • 1
...
1
2
3
4
5
...