• Publications
  • Influence
Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection
Radio frequency identification (RFID) technology has recently aroused great interest due to its convenience and economic efficiency. Through RFID become popular worldwide, it is susceptible toExpand
  • 111
  • 10
  • PDF
RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards
Radio-frequency identification (RFID) has become the center of attention in automatic identification technology. However, many security problems still could be found in the system design. RecentExpand
  • 39
  • 2
  • PDF
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as anExpand
  • 13
  • PDF
A Traceable and Privacy-Preserving Authentication for UAV Communication Control System
In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) fromExpand
  • 6
Automatic detection for online games bot with APP
With the growing of the popularity of online games, the potential risks are also increasing. Attacks usually take various means to defraud players in order to get the players' virtual property orExpand
  • 2
An Improvement on Remote User Authentication Schemes Using Smart Cards
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectableExpand
  • 3
  • PDF
A fair and secure group buying system based on arbitration computing mechanism
Trading is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain a reasonable profit. If friends orExpand
  • 1
An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems
With the recent rapid increase in the number of motor vehicles on roads, traffic accidents have increased, and emergency reporting processes have become essential. In this paper, a key agreementExpand
  • 1
Design of a Logistics System with Privacy and Lightweight Verification
Presently, E-commerce has developed rapidly as a result of many services and applications integrating e-commerce technologies offered online. Buyers can buy goods online and sellers can then deliverExpand
  • 2
  • PDF
Robot Identification and Authentication in a Robot Cloud Service System
In recent years, information technology has become a focus of attention. All hardware, software, and communication technologies are growing rapidly. Nowadays, we can’t live without technology. We useExpand
  • 1