The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications...
Traditional Chinese medicine (TCM) is developed from clinical practice. Rich information can be obtained from the medical record of TCM. National clinical research data center of TCM is constructed to collect the clinical medical data of TCM from hospitals all over the country. The construction framework of national clinical data center of TCM includes infrastructure construction, software construction,...
The success of online social networking and of mobile phone services has resulted in increased attention to mobile social networking. Matchmaking is a key component of mobile social networking. It notifies users of nearby people who fulfil some criteria, such as having shared interests, and who are therefore good candidates for being added to a user's social network. Unfortunately, the existing matchmaking...
To use the network services provided by multiple servers in mobile wireless network, a hash function and smart card based multi-server authentication scheme without verification tables and servers' public keys is proposed. The new protocol has many advantages, such as no encryption, signature, verification tables, timestamp, and public keys directory.
Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. We propose FaceCloak, an architecture that protects user privacy on a social networking site by...
Recently, Lu and Cao proposed a novel three-party key exchange protocol. Guo et al pointed out that their protocol cannot resist man-in-the-middle attack and undetectable on-line dictionary attack, and then an improved protocol was proposed in 2008.However, we show that Guo et alpsilas protocol is still vulnerable to undetectable on-line dictionary attack. To overcome the security flaw, an improved...
Most remote user authentication schemes are designed by encryption or hash-function techniques. In terms of computational cost, the hash-function-based scheme is more simple and efficient. In 2008, under the conditions of using tamper-resistant smart card device and the verifier table storage technique, Chen-Lee proposed a novel mutual authentication protocol using hash function to solve remote user...
Recently, Das et al. proposed a dynamic ID-based remote user authentication scheme using smart cards. Liao et al. pointed out some weaknesses of Das et al.psilas scheme, and presented an improved scheme. However, an impersonate attack on Liao et al.psilas scheme is proposed, it proves that their scheme is also insecure. To overcome the weakness, the new scheme is presented. The advantage of the proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.