The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never ava...
Recently, Khan et al. proposed an enhancement on a remote authentication scheme designed by Wang et ...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user o...
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smar...
Abstract Regarding the official authentication method which is a strong encrypt method for financial...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
99學年度洪文斌升等參考著作[[abstract]]Anonymity is one of the important properties of remote authentication sche...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
This paper presents a new technique for anonymizing personal data for studies in which the real name...
Card-based physical access control systems are used by most people on a daily basis, for example, at...
Part 11: Privacy IIInternational audienceSmart cards are popular devices for storing authentication ...
Based on smart devices and wireless communication infrastructure, the Electronic Medical Records (EM...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
In this research, we propose an anonymous authentication e-health system and the use of RFID smart c...
AbstractSeveral biometric-based remote user authentication schemes using smart cards have been propo...
Recently, Khan et al. proposed an enhancement on a remote authentication scheme designed by Wang et ...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user o...
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smar...
Abstract Regarding the official authentication method which is a strong encrypt method for financial...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
99學年度洪文斌升等參考著作[[abstract]]Anonymity is one of the important properties of remote authentication sche...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
This paper presents a new technique for anonymizing personal data for studies in which the real name...
Card-based physical access control systems are used by most people on a daily basis, for example, at...
Part 11: Privacy IIInternational audienceSmart cards are popular devices for storing authentication ...
Based on smart devices and wireless communication infrastructure, the Electronic Medical Records (EM...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
In this research, we propose an anonymous authentication e-health system and the use of RFID smart c...
AbstractSeveral biometric-based remote user authentication schemes using smart cards have been propo...
Recently, Khan et al. proposed an enhancement on a remote authentication scheme designed by Wang et ...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user o...