![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
RLP-Net: A Recursive Light Propagation Network for 3-D Virtual Refocusing
High-speed optical 3-D fluorescence microscopy is an essential tool for capturing the rapid dynamics of biological systems such as cellular signaling and complex movements. Designing such an optical system is ...
-
Chapter and Conference Paper
Efficient Neural Network Approximation of Robust PCA for Automated Analysis of Calcium Imaging Data
Calcium imaging is an essential tool to study the activity of neuronal populations. However, the high level of background fluorescence in images hinders the accurate identification of neurons and the extractio...
-
Article
Thermal energy harvesting circuit with maximum power point tracking control for self-powered sensor node applications
We present a simple implementation of a thermal energy harvesting circuit with the maximum power point tracking (MPPT) control for self-powered miniature-sized sensor nodes. Complex start-up circuitry and dire...
-
Article
Reversible data hiding scheme with edge-direction predictor and modulo operation
Since the first histogram shifting technique was proposed by Ni et al., many histogram based data hiding methods were proposed to improve their scheme. One of the methods is using difference value between cove...
-
Article
A real-time secret image sharing with fairness
When traditional secret image sharing techniques reconstructed the secret, they input the shares over t. While less than t shares can know nothing about the secret, the problem arises when there are more than t s...
-
Chapter and Conference Paper
A Pairing Based Authentication and Key Establishment Scheme for Remote Patient Monitoring Systems
With the evolution of Wireless Medical Sensor Networks (WMSNs), real-time remote patient monitoring has become more feasible than ever before. Different sensors can be used e.g. at home to monitor patient’s vi...
-
Article
An Efficient and Spam-Robust Proximity Measure Between Communication Entities
Electronic communication service providers are obliged to retain communication data for a certain amount of time by their local laws. The retained communication data or the communication logs are used in vario...
-
Chapter and Conference Paper
On the Security of Lv et al.’s Three-Party Authenticated Key Exchange Protocol Using One-Time Key
In 2012, Lv et al. proposed a new three-party authenticated key exchange (3PAKE) protocol using one-time key which aims to achieve more efficiency with the same security level of other existing 3PAKE protocols...
-
Chapter and Conference Paper
New ID-Based Proxy Signature Scheme with Message Recovery
In 2012, Singh-Verma proposed an ID-based proxy signature scheme with message recovery. Unfortunately, by giving two concrete attacks, Tian et al. showed that Singh-Verma’s scheme is not secure. This paper pro...
-
Article
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
Conventional single-server authentication schemes suffer a significant shortcoming. If a remote user wishes to use numerous network services, he/she must register his/her identity and password at these servers...
-
Chapter and Conference Paper
Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader
RFID tag search system can be used to find a particular tag among numerous tags. In 2011, Chun et al. proposed an RFID tag search protocol preserving privacy of mobile reader holders. Chun et al. claimed that ...
-
Chapter and Conference Paper
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme
Recently, many user authentication schemes with bilinear pairings have been proposed for client-server environment. In 2009, Goriparthi et al. proposed an improved bilinear pairing based remote user authentica...
-
Chapter and Conference Paper
Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol
A simple three-party password-based authenticated key exchange (S-3PAKE) protocols are extremely important to secure communications and are now extensively adopted in network communications. In 2009, Nam et al...
-
Chapter and Conference Paper
Replay Attacks on Han et al.’s Chaotic Map Based Key Agreement Protocol Using Nonce
In 2008, Han et al. proposed two key agreement protocols based on chaotic maps; timestamp based protocol and nonce based protocol. The current paper, however, demonstrates the vulnerability of Han et al.’s non...
-
Chapter and Conference Paper
A New Key Agreement Protocol Based on Chaotic Maps
In 2007, **ao et al.’s proposed a novel key agreement protocol based on chaotic maps. Recently, Han et al., however, pointed out that **ao et al.’s protocol is not secure against their developed new attacks wh...
-
Chapter and Conference Paper
An Efficient Authentication and Key Agreement Protocol in RFID System
Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in th...
-
Chapter and Conference Paper
Enhanced Three-Round Smart Card-Based Key Exchange Protocol
In 2007, Kwon et al. proposed a three-round protocol, SKE, for smart card-based key exchange in the three-party setting which provides both key independence and forward secrecy. This paper demonstrates the vul...
-
Chapter and Conference Paper
A Generic Network Interface Architecture for a Networked Processor Array (NePA)
Recently Network-on-Chip (NoC) technique has been proposed as a promising solution for on-chip interconnection network. However, different interface specification of integrated components raises a considerable...
-
Chapter and Conference Paper
Improving the Sun-Cao’s Public Key Authentication Scheme for Non-repudiation
In 2005, Sun-Cao pointed out that Peinado’s key authentication scheme does not achieve non-repudiation of the user’s public key, like its previous versions. Then, they proposed an improved public key authentic...
-
Chapter and Conference Paper
Traffic Speed Prediction Under Weekday, Time, and Neighboring Links’ Speed: Back Propagation Neural Network Approach
The ATIS (Advanced Traveler Information System) provides travelers with real-time and precise information about the shortest path to the destination, the traffic condition, travel time estimation, and so on. T...