Zi-Yao Cheng

Learn More
With the advancement of Internet network technologies, remote user authentication schemes using smart cards have been widely adopted. In order to satisfy the requirements of a remote user authentication scheme, the smart card has become an essential device, one that is widely used because of its low computation cost and expedient portability. To achieve(More)
Radio Frequency Identification (RFID), which can be implemented in various applications, has become one of the most popular technologies for remote, automatic identification. Currently, many scientific researchers are focused on this issue with the goal of achieving high security and privacy protection. Recently, Chen et al. proposed an RFID access control(More)
In recent years, several password authentication schemes for remote login and verification have been widely implemented for systems that control and access to Internet applications. Therefore, how to assure the security protection of these related operations in computer networks has been extensively investigated by many engineers in these two decades.(More)
  • 1