Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    A Mobile Ticket System Based on Personal Trusted Device

    Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. In this paper...

    Yu-Yi Chen, Chin-Ling Chen, **n-Ke Jan in Wireless Personal Communications (2007)

  2. Article

    Open Access

    Dynamic Session-Key Generation for Wireless Sensor Networks

    Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must b...

    Chin-Ling Chen, Cheng-Ta Li in EURASIP Journal on Wireless Communications and Networking (2008)

  3. No Access

    Article

    A Non-repudiated Self-service Store System Based on Portable Trusted Device

    Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. However, the ...

    Chin-Ling Chen, Yu-Yi Chen in Wireless Personal Communications (2009)

  4. No Access

    Article

    An extended chaotic maps-based key agreement protocol with user anonymity

    A key agreement protocol is used to derive a shared secure session key by two or more parties, but no party can predetermine the resulting value. Users can securely exchange information over an open network by...

    Cheng-Chi Lee, Chin-Ling Chen, Chia-Ying Wu, Shiow-Yuan Huang in Nonlinear Dynamics (2012)

  5. No Access

    Article

    A Non-Repudiated and Traceable Authorization System Based on Electronic Health Insurance Cards

    Since anamnesis management in health care is directly relative to patients’ privacy protection, how to resist malicious behaviors is an important issue in information security. In recent years, the developed e...

    Chin-Ling Chen, Ming-Shaw Lu, Zong-Min Guo in Journal of Medical Systems (2012)

  6. No Access

    Article

    Using RFID Yoking Proof Protocol to Enhance Inpatient Medication Safety

    The low birth rate has led to an aging society; the burgeoning number of elderly patients may affect the medical quality and result in negative medical incidents. There are many factors that lead to medical er...

    Chin-Ling Chen, Chun-Yi Wu in Journal of Medical Systems (2012)

  7. No Access

    Article

    Extension of an Efficient 3GPP Authentication and Key Agreement Protocol

    Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of 3GPP authentication and key agreement protocol i...

    Cheng-Chi Lee, Chin-Ling Chen, Hsia-Hung Ou in Wireless Personal Communications (2013)

  8. No Access

    Article

    An Ownership Transfer Scheme Using Mobile RFIDs

    RFID reader equipment is widely used in hand-held devices; thus, the security of the connection between mobile readers and RFID servers is an important issue. In this paper, we propose a novel scheme with low ...

    Chin-Ling Chen, Chih-Feng Chien in Wireless Personal Communications (2013)

  9. No Access

    Article

    A secure ownership transfer protocol using EPCglobal Gen-2 RFID

    Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be ...

    Chin-Ling Chen, Yu-Chung Huang, Jehn-Ruey Jiang in Telecommunication Systems (2013)

  10. No Access

    Article

    A Secure Ambulance Communication Protocol for VANET

    Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANET’s main applications are enhancing road safety and reducing traffic accidents. Moreover, the VANET system can also reduce the...

    Chin-Ling Chen, Ing-Chau Chang, Chun-Hsin Chang in Wireless Personal Communications (2013)

  11. No Access

    Article

    A Secure Medical Data Exchange Protocol Based on Cloud Environment

    In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. ...

    Chin-Ling Chen, Tsai-Tung Yang, Tzay-Farn Shih in Journal of Medical Systems (2014)

  12. No Access

    Article

    Design and analysis of a secure and effective emergency system for mountaineering events

    In recent years, the sport of mountaineering has become increasingly popular in many countries. Notably, during this activity, mountaineers are likely to enter into dangerous situations. In this paper, we prop...

    Chin-Ling Chen, Yu-Yi Chen, Cheng-Chi Lee, Cheng-Hsun Wu in The Journal of Supercomputing (2014)

  13. No Access

    Article

    A Privacy Authentication Scheme Based on Cloud for Medical Environment

    With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resource...

    Chin-Ling Chen, Tsai-Tung Yang, Mao-Lun Chiang in Journal of Medical Systems (2014)

  14. No Access

    Article

    A secure key authentication scheme for cryptosystems based on GDLP and IFP

    The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fi...

    Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen in Soft Computing (2017)

  15. No Access

    Article

    A fair and secure group buying system based on arbitration computing mechanism

    Trading is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain a reasonable profit. If friends or family of a b...

    Chin-Ling Chen, Yong-Yuan Deng in Soft Computing (2018)

  16. No Access

    Article

    A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps

    Three-party authenticated key exchange (3PAKE) protocol allows two communication users to authenticate each other and to establish a secure common session key with the help of a trusted remote server. Recently...

    Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen in Soft Computing (2018)

  17. No Access

    Article

    Influence of the barrier layer on the flexural properties of nanoporous alumina film

    This study evaluated the influence that the barrier layer has on the flexural properties of anodic aluminium oxide (AAO) film. The flexural properties, including the bending strength and the bending modulus we...

    Jung-Hsuan Chen, Wen-Shiang Luo, Chin-Ling Chen in Microsystem Technologies (2018)

  18. No Access

    Article

    Research on effect of rings on coupling vibration in a rigid-disk rotor

    This paper uses new deductions of the equation of motion and obtains new modes of change that differ from the authors’ previous research. The blade-bending, shaft-torsion and ring-bending coupled vibration inf...

    Yi-Jui Chiu, **ao-Yun Li, Guo-Fei Yu in Journal of Mechanical Science and Technolo… (2020)

  19. Article

    Open Access

    A secure electronic medical record authorization system for smart device application in cloud computing environments

    As cloud computing technology matures, along with an increased application of distributed networks, increasingly larger amounts of data are being stored in the cloud, and are thus available for pervasive appli...

    Chin-Ling Chen, Po-Tsun Huang in Human-centric Computing and Information Sc… (2020)

  20. No Access

    Article

    A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing

    In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because the...

    Chin-Ling Chen, Mao-Lun Chiang, Hui-Ching Hsieh in Wireless Personal Communications (2020)

previous disabled Page of 2