![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks
The remote nodes using a selecting relay algorithm (SRA) transmit its dates on wireless sensor networks (WSNs). The algorithm can enhance the network life cycle. It selects an appropriate cooperation node as a...
-
Article
Data error locations reported by public auditing in cloud storage service
Public auditing is an important issue in cloud storage service because a cloud service provider may try to hide management mistakes and system errors from users or even steal or tamper with a user’s data for m...
-
Article
Towards secure and efficient user authentication scheme using smart card for multi-server environments
Two user authentication schemes for multi-server environments have been proposed by Tsai and Wang et al., respectively. However, there are some flaws existing in both schemes. Therefore, a new scheme for impro...
-
Chapter and Conference Paper
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period
In the (t, n) proxy signature scheme, the signature, signed by a signer originally, can be signed by t or more proxy signers out of a proxy group of n proxy signers. In this paper, we propose a new secure non-rep...
-
Article
A user authentication system using back-propagation network
Information security has been a critical issue in the field of information systems. One of the key factors in the security of a computer system is how to identify the authorization of users. Password-based use...
-
Article
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain
In this paper, we extend the Pay-Word micro-payment scheme using the 1-dimension one-way hash chain to generate an n-dimension one-way hash chain. According to the system requirements, a user can flexibly choose ...
-
Chapter and Conference Paper
A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy
A new conference key distribution scheme in a in a totally-ordered Hierarchy is proposed in this study. A group of users with a different security class can generate a common secret key over a public channel s...