Skip to main content

and
  1. No Access

    Article

    Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain

    Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...

    Hui Tian, Jia Wang, Chin-Chen Chang, Hanyu Quan in Mobile Networks and Applications (2023)

  2. No Access

    Article

    Public auditing of log integrity for shared cloud storage systems via blockchain

    Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...

    Hui Tian, Jia Wang, Chin-Chen Chang, Hanyu Quan in Wireless Networks (2020)

  3. No Access

    Article

    A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks

    Satellite systems have been integrating into worldwide networks to improve the quality of services, including mobility, reliability, and coverage. Such systems offer tremendous advantages to end users at any t...

    Ngoc-Tu Nguyen, Chin-Chen Chang in Wireless Personal Communications (2019)

  4. No Access

    Article

    Untraceable biometric-based three-party authenticated key exchange for dynamic systems

    An authenticated key exchange (AKE) between two end-users is a crucial procedure to ensure data integrity and confidentiality while they communicate through a public channel. The existing three-party AKE schem...

    Ngoc-Tu Nguyen, Chin-Chen Chang in Peer-to-Peer Networking and Applications (2018)

  5. No Access

    Article

    Security Issues in Ultralightweight RFID Authentication Protocols

    Ultralightweight RFID authentication protocols have attracted much attention from both fields of science and industry in recent years due to their high efficiencies and extensive applicab...

    Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng in Wireless Personal Communications (2018)

  6. No Access

    Article

    An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation

    Online access has been widely adopted to distribute diversified services to customers. In this architecture, public channels are utilized to exchange information between end users and remote servers at anytime...

    Chin-Chen Chang, Ngoc-Tu Nguyen in Wireless Personal Communications (2016)

  7. No Access

    Article

    A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks

    Currently, wireless sensor networks are a novel technology industry with various applications. The nodes deployed in such an environment are uncontrolled by anyone. Therefore, any security flaws can threaten f...

    Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng in Wireless Personal Communications (2016)

  8. No Access

    Article

    A New Ultralightweight RFID Protocol for Low-Cost Tags: R \(^{2}\) AP

    Several ultralightweight radio frequency identification (RFID) authentication protocols have been proposed in recent years. However, all of these protocols are reported later that they are vulnerable to variou...

    Xu Zhuang, Yan Zhu, Chin-Chen Chang in Wireless Personal Communications (2014)

  9. No Access

    Article

    Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication

    Communication network has grown to the stage where it becomes ubiquitous. It allows us to access to on-line services at anytime, anywhere and by any devices. This brings out new services, that was previous onl...

    Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang in Wireless Personal Communications (2013)

  10. No Access

    Article

    A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users

    The electronic transactions on wireless mobile networks, which are also called mobile commerce, become more and more popular in recent years. In mobile commerce, the electronic payment is the most important co...

    Jen-Ho Yang, Chin-Chen Chang in Wireless Personal Communications (2012)

  11. No Access

    Article

    Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs

    The third generation partner project (3GPP) has standardized general packet radio service (GPRS) and the universal mobile telecommunications system (UMTS) to provide cell phone communications and wireless Inte...

    Jung-San Lee, Pei-Yu Lin, Chin-Chen Chang in Wireless Personal Communications (2010)

  12. No Access

    Article

    A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System

    How to reduce location updating traffic is a critical issue for tracking the current locations of users in a personal communication system. Traditional location management approaches usually bring about networ...

    Chin-Chen Chang, Iuon-Chang Lin, Chia-Chen Lin in Wireless Personal Communications (2008)

  13. No Access

    Article

    A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment

    Instead of the traditional credit card payment system, we propose a new electronic payment system for use in a mobile environment. The idea behind this payment service is that a user (customer) applies a messa...

    Iuon-Chang Lin, Chin-Chen Chang in Wireless Personal Communications (2007)

  14. No Access

    Article

    End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication

    As great progress has been made in mobile communications, many related researches on this topic have been proposed. In most of the proposed protocols so far, it has been assumed that the person using the mobil...

    Chin-Chen Chang, Kuo-Lun Chen, Min-Shiang Hwang in Wireless Personal Communications (2004)