Skip to main content

Page of 2 next disabled
and
  1. Chapter and Conference Paper

    A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

    Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agr...

    Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee in NETWORKING 2008 Ad Hoc and Sensor Networks… (2008)

  2. Article

    Open Access

    Activity-Oriented Design of Health Pal: A Smart Phone for Elders' Healthcare Support

    Wireless telephones and personal digital assistants are emerging, as the information hubs connect their human users with assorted electronic devices and the World Wide Web. As such, they quickly become the de fac...

    John K. Zao, Shih-Chen Fan, Ming-Hui Wen in EURASIP Journal on Wireless Communications… (2007)

  3. Chapter and Conference Paper

    Critical Success Factors for ERP Life Cycle Implementation

    ERP implementations are complex undertakings. The purpose of this study is to establish ERP implementation model in China firms based on project life cycle theory. ERP implementation is an information system p...

    Guang-hui Chen, Chun-qing Li, Yun-xiu Sai in Research and Practical Issues of Enterpris… (2006)

  4. Chapter and Conference Paper

    Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks

    Owing to the inflexibility of the structure, the conventional layered protocols suffer from the inability to distinguish between losses due to route failures and congestion. Recently, in efforts to overcome th...

    Ming-Hui Tsai, Tzu-Chiang Chiang in Emerging Directions in Embedded and Ubiqui… (2006)

  5. Chapter and Conference Paper

    On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks

    With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of exte...

    Ming-Hui Tsai, Tzu-Chiang Chiang in Embedded and Ubiquitous Computing – EUC 20… (2005)

Page of 2 next disabled