Abstract Regarding the official authentication method which is a strong encrypt method for financial transactions, there has recently been a concern for the problem of storage. As a solution for such problems, this study provides the anonymous authentication method based on the smart card used for such a purpose by utilizing the pseudo ID replacing the user’s personal data. Such an anonymous authentication method makes it possible to prevent any inside leakage, intermediary attack, limited re-transmission attack, service-denying attack, directional safety attack and secret inspector attack in regard to the user’s personal data. As a result, there would be no concern for the leakage of any personal data. In comparative analysis, after execut...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
This thesis deals with Basic Card problém and their analysis in terms of the offered features crypto...
Abstract- Now a day’s smart card based application are prevalent. strong cryptographic algorithm are...
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smar...
99學年度洪文斌升等參考著作[[abstract]]Anonymity is one of the important properties of remote authentication sche...
This paper presents a new technique for anonymizing personal data for studies in which the real name...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
Based on smart devices and wireless communication infrastructure, the Electronic Medical Records (EM...
20 pages. Extended version of an article by the same authors with the same title, presented at the 4...
Abstract. In this paper, we propose to replace the national identity card, currently used in many co...
AbstractSeveral biometric-based remote user authentication schemes using smart cards have been propo...
Part 11: Privacy IIInternational audienceSmart cards are popular devices for storing authentication ...
International audienceIn this paper, we propose to replace the national identity card, currently use...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
A smart card is a pocket sized card embedded with integrated circuits. Smart Cards are used in a wid...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
This thesis deals with Basic Card problém and their analysis in terms of the offered features crypto...
Abstract- Now a day’s smart card based application are prevalent. strong cryptographic algorithm are...
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smar...
99學年度洪文斌升等參考著作[[abstract]]Anonymity is one of the important properties of remote authentication sche...
This paper presents a new technique for anonymizing personal data for studies in which the real name...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
Based on smart devices and wireless communication infrastructure, the Electronic Medical Records (EM...
20 pages. Extended version of an article by the same authors with the same title, presented at the 4...
Abstract. In this paper, we propose to replace the national identity card, currently used in many co...
AbstractSeveral biometric-based remote user authentication schemes using smart cards have been propo...
Part 11: Privacy IIInternational audienceSmart cards are popular devices for storing authentication ...
International audienceIn this paper, we propose to replace the national identity card, currently use...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
A smart card is a pocket sized card embedded with integrated circuits. Smart Cards are used in a wid...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
This thesis deals with Basic Card problém and their analysis in terms of the offered features crypto...
Abstract- Now a day’s smart card based application are prevalent. strong cryptographic algorithm are...