This page has only limited features, please log in for full access.
Wei-Chen Wu is an assistant professor in department of finance at Feng Chia university. He received his Ph. D. degree in Information Management from National Central University in 2016. From 2004 to 2019, he was also the Director of the Computer Center at Hsin Sheng College of Medical Care and Management. His current research interests include Blockchain, Cryptography and Fintech Cybersecurity.
What this research may achieve points towards the need to progressively improve the reasonableness in establishing Social Welfare Agencies (SWAs). The service capacity of SWAs is far below the population of the level III extremely disabled. This is a serious problem. This evaluation can assist social welfare and public health departments to determine what locations to approve for establishing SWAs in the short term and plan for new SWAs more precisely, as well as rein in budgetary priorities. As an illustration, in considering the distance between SWAs and the extremely disabled, the service quality of SWAs and fairness in the planning have to be taken into account. Introducing a Service Quantity Needed-Index for SWAs (SNIS) into the current measure of approving and planning new SWAs shall assist the departments in distributing social welfare resources to areas most in need of help. In addition, using the modified data to recalculate SNIS can examine needs regularly. Employing basic statistical areas for short-term applications in Taipei City SWA projects, considering the distance between SWAs and the extremely disabled, the agencies’ service quality and fairness in the planning of SWAs need to receive more attention. Previous research mostly employed straight-line distances rather than road distances. To a certain extent, this overlooked the actual capacity of roads as well as led to some degree of discrepancies in evaluations. This essay focuses on calculating SNIS, mainly towards guiding the establishment of facilities and concretely proposing how to optimize their locations. Future research can add in needs at that time in accordance with current evaluation results to propose plans to optimize the locations, or maybe integrate weights of disability to adjust multiple requirements of SWAs.
Jui-Hung Kao; Wei-Chen Wu; Chen-Hu Chou; Horng-Twu Liaw. The Discussion of Potential Care Needs for Physically and Mentally Disabled Citizens in Taipei City by Using Spatial Analysis. Sustainability 2021, 13, 2665 .
AMA StyleJui-Hung Kao, Wei-Chen Wu, Chen-Hu Chou, Horng-Twu Liaw. The Discussion of Potential Care Needs for Physically and Mentally Disabled Citizens in Taipei City by Using Spatial Analysis. Sustainability. 2021; 13 (5):2665.
Chicago/Turabian StyleJui-Hung Kao; Wei-Chen Wu; Chen-Hu Chou; Horng-Twu Liaw. 2021. "The Discussion of Potential Care Needs for Physically and Mentally Disabled Citizens in Taipei City by Using Spatial Analysis." Sustainability 13, no. 5: 2665.
With the gradual development of the global information technology and mobile communication networks, medical system with information and network technologies has become an inevitable trend. All countries are also accelerating their efforts to replace traditional paper books with Electronic Medical Record (EMR). Medical records and electronic medical record implementation can save costs annually, increase economic efficiency by improving the efficiency and safety of medical systems, and accelerate innovation in the medical industry. The implementation of EHR will undoubtedly bring many conveniences, stakeholders who are concerned with EHR at this stage are still not satisfied with the privacy disclosure and information security regarding the possible implementation of electronic medical records. And the information between them still lacks good interoperability. Designing a personal health passbook exchange mechanism with high safety strength specifications to protect the special funds, two-factor identity card technology with smart cards, an authorization mechanism for applying real-name block chain system and digital signature to medical records, and the overall system integrate the existing electronic medical record signing mechanism with the overall personal health passbook exchange mechanism to identify users from the very beginning as empowered to grant users the right to personal health passbook exchange. According to the development vision of the Ministry of Health and Welfare, electronic medical records are stored through mobile carriers (health passbooks) to achieve a win-win situation of promoting universal health and medical progress from an information security point of view.
Jui-Hung Kao; Wei-Chen Wu; Li-Min Hsu; Horng-Twu Liaw. A Research on Real-Name Blockchain System Bind Health Passbook Electronic Medical Record Exchanges Mechanism. Lecture Notes in Electrical Engineering 2020, 1810 -1819.
AMA StyleJui-Hung Kao, Wei-Chen Wu, Li-Min Hsu, Horng-Twu Liaw. A Research on Real-Name Blockchain System Bind Health Passbook Electronic Medical Record Exchanges Mechanism. Lecture Notes in Electrical Engineering. 2020; ():1810-1819.
Chicago/Turabian StyleJui-Hung Kao; Wei-Chen Wu; Li-Min Hsu; Horng-Twu Liaw. 2020. "A Research on Real-Name Blockchain System Bind Health Passbook Electronic Medical Record Exchanges Mechanism." Lecture Notes in Electrical Engineering , no. : 1810-1819.
Due to the growth of the broadband and wireless communications network, it has been increasingly popular in recent years to promote the Internet of Vehicles (IoV) as a research topic. The IoV is different from Vehicular Ad hoc NETworks (VANETs). The IoV requires more security considerations than a VANET would. For example, the services provided must be effectively managed. Some vehicles must allow different drivers to use them, and are given different service rights (In a taxi fleet, the same car is driven by different people in shifts) and the identities of vehicles and drivers must be protected by anonymity. Given the above security considerations, we present a method of privacy-preserving authentication and services access control in the IoV. In this system, only the Certificate Authority (CA) can perform the revocation process when a vehicle or driver is judged as invalid. To achieve this purpose of services access control, we propose a new Service Rights Management (SRM) scheme that is given their different services depending on the different objects and then assign different digital rights for managing services and access rights separately. In threats and at-tacks analysis, our scheme is compared to other mechanisms of preventing all kinds of wireless network attacks.
Wei-Chen Wu; Horng-Twu Liaw. Privacy-Preserving Authentication and Service Rights Management for the Internet of Vehicles. Lecture Notes in Electrical Engineering 2019, 1904 -1912.
AMA StyleWei-Chen Wu, Horng-Twu Liaw. Privacy-Preserving Authentication and Service Rights Management for the Internet of Vehicles. Lecture Notes in Electrical Engineering. 2019; ():1904-1912.
Chicago/Turabian StyleWei-Chen Wu; Horng-Twu Liaw. 2019. "Privacy-Preserving Authentication and Service Rights Management for the Internet of Vehicles." Lecture Notes in Electrical Engineering , no. : 1904-1912.
This study will propose a HealthCoin scheme that can provide hospitals, doctors and patients to exchange health information with each other. The HealthCoin also is a transaction certificate for health information exchange. The study is based on block chain and cryptography and there are three rules: hospitals, doctors and patients that are nodes on our proposed block chain scheme. However, medical records relate to the privacy of patients and medical institutions must not only have the electronic health information exchange mechanism, but also pay more attention to the network security and patients’ data protection. So there was a third-party fair association to integrate the health information exchange mechanism and many associations want to be third parties fair. As a result, many hospitals or medical institutions do not know who to integrate or exchange with. Therefore, the project will use block chain technology and cryptography to solve the problem of third-party fairness and exchange health information with each other using HealthCoin.
Wei-Chen Wu; Yu-Chih Wei. A Health Information Exchange Based on Block Chain and Cryptography. Lecture Notes in Electrical Engineering 2019, 1985 -1990.
AMA StyleWei-Chen Wu, Yu-Chih Wei. A Health Information Exchange Based on Block Chain and Cryptography. Lecture Notes in Electrical Engineering. 2019; ():1985-1990.
Chicago/Turabian StyleWei-Chen Wu; Yu-Chih Wei. 2019. "A Health Information Exchange Based on Block Chain and Cryptography." Lecture Notes in Electrical Engineering , no. : 1985-1990.
The IoV integrates many important features of the IoT in order to provide numerous new services with advantages for humans and society, in which many sensor nodes are developed for the IoT, such as home appliances, including televisions and refrigerators, and health-related equipment, including heart rate sensors and foot pod meters. However, the IoV products are less developed at present. Hence, we should survey related sensor devices to implement on the vehicles in the future works and then integrate the current research on SDMS and MFSS to achieve vehicle-to-sensor interactions. In order to achieve the desired goal of zero traffic accidents, all information in the vehicle is collected through sensor devices, included in safety messages and forwarded to other vehicles or drivers. The future scheme should be extented to gather, share, process, compute, and release secure information to other humans, vehicles, devices and roadside services. The development and deployment of fully connected vehicles requires a combination of various IoT technologies. From the perspective of commercial value we can see that the future of economies of scale is to be expected, and from the perspective of extending technological development we can see that there are further contributions to be made.
Wei-Chen Wu; Homg-Twu Liaw. The Next Generation of Internet of Things: Internet of Vehicles. Lecture Notes in Electrical Engineering 2018, 278 -282.
AMA StyleWei-Chen Wu, Homg-Twu Liaw. The Next Generation of Internet of Things: Internet of Vehicles. Lecture Notes in Electrical Engineering. 2018; ():278-282.
Chicago/Turabian StyleWei-Chen Wu; Homg-Twu Liaw. 2018. "The Next Generation of Internet of Things: Internet of Vehicles." Lecture Notes in Electrical Engineering , no. : 278-282.
In this paper, we propose an efficient remote user authentication scheme for multi-server environments with hash function. Compared with the Lin et al. scheme that takes several modular operations, our scheme achieves results more efficiently yet keeps the merits. The important merits include the following: the scheme can be used in multi-server environments; the system does not need to maintain any verification table; the users who have registered with various servers do not need to remember different login passwords for each. Our scheme can also withstand replay and modification attacks. Therefore, it allows users to choose their passwords freely. Although the Lin et al. scheme proposed a new remote user authentication scheme for multi-server architecture, a security problem exists where the password change protocol is vulnerable to a denial of service attack. Thus, we shall alter the Lin et al. scheme to avoid these problems.
Wei-Chen Wu. Multi-server Authentication Scheme with Hash Function. Lecture Notes in Electrical Engineering 2017, 422, 799 -808.
AMA StyleWei-Chen Wu. Multi-server Authentication Scheme with Hash Function. Lecture Notes in Electrical Engineering. 2017; 422 ():799-808.
Chicago/Turabian StyleWei-Chen Wu. 2017. "Multi-server Authentication Scheme with Hash Function." Lecture Notes in Electrical Engineering 422, no. : 799-808.
The aim of this article is compare Yahoo mall to Ruten mall website. The study used questionnaire and experiment to find the user’s satisfaction and operation performance of two websites. One questionnaire study, it’s found user’s feel is different in before and after experiments. On experiment study, we compare two times for user finding merchandise on yahoo mall and ruten mall. The two goods of user research are Hair dryer and I Phone 6S in study. In this study find: 1. The “word size” and “advertisement” are effected user’s feel in website. 2. The “gender” and “category merchandise” are effected the performance of user operation on website.
Cheng-Yueh Tsai; Kang-Wei Chai; Wei-Ming Ou. Evaluation of Shopping Website. Lecture Notes in Electrical Engineering 2017, 873 -877.
AMA StyleCheng-Yueh Tsai, Kang-Wei Chai, Wei-Ming Ou. Evaluation of Shopping Website. Lecture Notes in Electrical Engineering. 2017; ():873-877.
Chicago/Turabian StyleCheng-Yueh Tsai; Kang-Wei Chai; Wei-Ming Ou. 2017. "Evaluation of Shopping Website." Lecture Notes in Electrical Engineering , no. : 873-877.
The vehicular ad hoc network (VANET) is related to the very nature of wireless communications and the rapid movement of the vehicles; therefore, network security is a critical concern for designers of VANET clouds. The main issues to be addressed in this paper are how to provide future VANET clouds with more safety, more effectiveness and more correct messaging services—especially when there is traffic congestion and accidents, message effectiveness and correct transfer. Even though tens of kilometers away from the accident, other vehicles are informed of situations with road traffic accidents through the on-board unit devices and then given recommended travel routes and related suggestions. This will significantly improve traffic flow and provide better quality of traffic. Cryptography in this paper will be discussed to meet the vehicle privacy and information security needs, as well as bilinear pairing function to solve security problems. In performance, it is expected to reduce more than 25% of the message delivery times, and when the vehicle passes through more roadside units, more than half of the message can reduce delivery times if the number of RSUs is more than 50. In security, the key is effective protection, with only authorized vehicles verified to get the message and meet forward secrecy, backward security and avoid replay attack, Sybil attack and other threats.
Wei-Chen Wu. A secret push messaging service in VANET clouds. The Journal of Supercomputing 2016, 73, 3085 -3097.
AMA StyleWei-Chen Wu. A secret push messaging service in VANET clouds. The Journal of Supercomputing. 2016; 73 (7):3085-3097.
Chicago/Turabian StyleWei-Chen Wu. 2016. "A secret push messaging service in VANET clouds." The Journal of Supercomputing 73, no. 7: 3085-3097.
In mobile ad hoc networks (MANETs), the more applications we use, the more security is required. In this paper, we propose a high secure and efficient routing scheme that not only satisfies the properties of anonymity, security, authentication, nonrepudiation, and unforgeability that the previous paper achieved for ad hoc networks, but also satisfies other necessary properties such as confidentiality, traceability, and flexibility for multipaths in order to make the ad hoc environment more secure and practicable.
Wei-Chen Wu; Horng-Twu Liaw. A Study on High Secure and Efficient MANET Routing Scheme. Journal of Sensors 2015, 2015, 1 -10.
AMA StyleWei-Chen Wu, Horng-Twu Liaw. A Study on High Secure and Efficient MANET Routing Scheme. Journal of Sensors. 2015; 2015 ():1-10.
Chicago/Turabian StyleWei-Chen Wu; Horng-Twu Liaw. 2015. "A Study on High Secure and Efficient MANET Routing Scheme." Journal of Sensors 2015, no. : 1-10.
In 2011, Yeh et al. proposed a PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s Authorized Credential (AC) is not secure and private even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that a simple authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.
Wei-Chen Wu; Yi-Ming Chen. A Simple Authentication Scheme and Access Control Protocol for VANETs. Lecture Notes in Electrical Engineering 2015, 259 -272.
AMA StyleWei-Chen Wu, Yi-Ming Chen. A Simple Authentication Scheme and Access Control Protocol for VANETs. Lecture Notes in Electrical Engineering. 2015; ():259-272.
Chicago/Turabian StyleWei-Chen Wu; Yi-Ming Chen. 2015. "A Simple Authentication Scheme and Access Control Protocol for VANETs." Lecture Notes in Electrical Engineering , no. : 259-272.
Because of the more and more services wireless communication technology can offer nowadays, the quality of wireless communication became an important key. In this research, 3G/UMTS and WLAN, which are two major wireless communication techniques will be mentioned mainly. The former offers a wide-range, high-movability, complete and safe record of accounting; the latter offers a narrow-range, low-movability, high-speed-transmission access on the Internet. The complementary between these two techniques can not only enhance the quality of wireless communication but offer more services for customers to choose, and customers can use wireless application services regardless of any environmental limit. This research will focus on the problem of fast-handover when 3G/UMTS and WLAN is interworking, such as authentication and authorization. About the two formers, we will use W-SKE to accomplish authentication procedure, and achieve safer Mutual Full Authentication and Fast-Authentication.
Wei-Chen Wu; Horng-Twu Liaw. A Study on High Security Authentication Mechanism for 3G/WLAN Networks. Lecture Notes in Electrical Engineering 2015, 247 -257.
AMA StyleWei-Chen Wu, Horng-Twu Liaw. A Study on High Security Authentication Mechanism for 3G/WLAN Networks. Lecture Notes in Electrical Engineering. 2015; ():247-257.
Chicago/Turabian StyleWei-Chen Wu; Horng-Twu Liaw. 2015. "A Study on High Security Authentication Mechanism for 3G/WLAN Networks." Lecture Notes in Electrical Engineering , no. : 247-257.
Privacy and security are very important in vehicular ad hoc networks (VANETs). VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC) is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.
Wei-Chen Wu; Yi-Ming Chen. Improving the Authentication Scheme and Access Control Protocol for VANETs. Entropy 2014, 16, 6152 -6165.
AMA StyleWei-Chen Wu, Yi-Ming Chen. Improving the Authentication Scheme and Access Control Protocol for VANETs. Entropy. 2014; 16 (11):6152-6165.
Chicago/Turabian StyleWei-Chen Wu; Yi-Ming Chen. 2014. "Improving the Authentication Scheme and Access Control Protocol for VANETs." Entropy 16, no. 11: 6152-6165.
Both computer and telecommunication networks have developed rapidly and become much more popular recently. On the basis of the characteristics of the two networks, we can see that they are complementary. If we can integrate the most popular technologies of these two kinds of networks, the integration will result in a new, attractive network access method. From the viewpoints of both the user and the service provider, the advantages of the integration include increased profits and better support for services. However, the integration of the two heterogeneous networks still presents many problems, the most critical of which concern authentication and billing. In this paper, we propose a practical, efficient, and secure authentication, authorization, and accounting mechanism within the interworking architecture proposed by Third Generation Partnership Project (3GPP). Copyright © 2013 John Wiley & Sons, Ltd.
Wei-Chen Wu; Horng-Twu Liaw. An authentication, authorization, and accounting mechanism for 3G/WLAN networks. Security and Communication Networks 2013, 9, 468 -480.
AMA StyleWei-Chen Wu, Horng-Twu Liaw. An authentication, authorization, and accounting mechanism for 3G/WLAN networks. Security and Communication Networks. 2013; 9 (6):468-480.
Chicago/Turabian StyleWei-Chen Wu; Horng-Twu Liaw. 2013. "An authentication, authorization, and accounting mechanism for 3G/WLAN networks." Security and Communication Networks 9, no. 6: 468-480.
In this paper, an Anonymous Conditional Purchase Order (ACPO) payment system is proposed which is an electronic payment system suitable for the real world. It not only keeps the high efficiency of previous buyer-driven systems but also strengthens the anonymity between customers and banks. The customers can advertise and put ACPO on the web according to their requirements, and then the merchants can evaluate which ACPO is appropriate for trade in any particular web site. Besides, timestamp will solve the problem of non-dispute and make our scheme more flexible. For example, customers can modify their ACPO to suit the merchant if they are not getting any response from the merchant with whom they want to trade.
Wei-Chen Wu; Horng-Twu Liaw. Secure Anonymous Conditional Purchase Order Payment Mechanism. Lecture Notes in Electrical Engineering 2012, 291 -300.
AMA StyleWei-Chen Wu, Horng-Twu Liaw. Secure Anonymous Conditional Purchase Order Payment Mechanism. Lecture Notes in Electrical Engineering. 2012; ():291-300.
Chicago/Turabian StyleWei-Chen Wu; Horng-Twu Liaw. 2012. "Secure Anonymous Conditional Purchase Order Payment Mechanism." Lecture Notes in Electrical Engineering , no. : 291-300.
Peer-to-Peer (P2P) systems enable efficient multimedia file sharing and are inherently scalable on the Internet. However, the absence of a centralized authority and a suitable Digital Right Management (DRM) mechanism prompts many securities-related challenges and discourages the widespread use of P2P networks for distributing copyright-protected multimedia files. To address these issues, we adopt the concept of a group Diffie-Hellman group key and threshold scheme to propose a novel anonymous DRM scheme for P2P users that wish to share multimedia files. Our scheme has four features: (1) the P2P users remain anonymous while sharing their files, (2) no online server is needed to perform the DRM operations, (3) an adjustable mechanism exists for efficiently distributing multimedia files with different popularities, and (4) users enjoy low communication and computation costs. In addition to explaining the operations of this scheme, we also compare its performance and security with Zhang et al.’s design, TLMS and Lua’s Scheme within the context of this study.
Yi-Ming Chen; Wei-Chen Wu. An anonymous DRM scheme for sharing multimedia files in P2P networks. Multimedia Tools and Applications 2012, 69, 1041 -1065.
AMA StyleYi-Ming Chen, Wei-Chen Wu. An anonymous DRM scheme for sharing multimedia files in P2P networks. Multimedia Tools and Applications. 2012; 69 (3):1041-1065.
Chicago/Turabian StyleYi-Ming Chen; Wei-Chen Wu. 2012. "An anonymous DRM scheme for sharing multimedia files in P2P networks." Multimedia Tools and Applications 69, no. 3: 1041-1065.
Wei-Chen Wu; Yi-Ming Chen. A Simple and Efficient Multi-Authentication Scheme on Space Geometry. International Conference on Mechanical and Electrical Technology, 3rd, (ICMET-London 2011), Volumes 1–3 2012, 483 -487.
AMA StyleWei-Chen Wu, Yi-Ming Chen. A Simple and Efficient Multi-Authentication Scheme on Space Geometry. International Conference on Mechanical and Electrical Technology, 3rd, (ICMET-London 2011), Volumes 1–3. 2012; ():483-487.
Chicago/Turabian StyleWei-Chen Wu; Yi-Ming Chen. 2012. "A Simple and Efficient Multi-Authentication Scheme on Space Geometry." International Conference on Mechanical and Electrical Technology, 3rd, (ICMET-London 2011), Volumes 1–3 , no. : 483-487.
Traditional remote password authentication schemes allow a user submits his/her identity and its corresponding password. Then, through a specific algorithm, the server authenticates its users alone. Due to these schemes are independent and each scheme develop a specific algorithm by their self, the development cost and time cost are very high. To avoid the costs rise, we present a novel authentication scheme using a polynomial for multi-server environments. The scheme can generate a public polynomial that contains a specific Access Right (AR). The AR means the legal user has different authorized level based on which server in the multi-server environment. Furthermore, the scheme can verify without password table. The environment can authorize many servers at one time so that the users who have registered with various servers do not need to remember different login passwords for each. For changing password, the scheme allows users to choose their passwords freely and update it off-line.
Wei-Chen Wu. A Novel Authentication Scheme Using Polynomial for Multi-server Environments. Advances in Intelligent and Soft Computing 2012, 133, 785 -790.
AMA StyleWei-Chen Wu. A Novel Authentication Scheme Using Polynomial for Multi-server Environments. Advances in Intelligent and Soft Computing. 2012; 133 ():785-790.
Chicago/Turabian StyleWei-Chen Wu. 2012. "A Novel Authentication Scheme Using Polynomial for Multi-server Environments." Advances in Intelligent and Soft Computing 133, no. : 785-790.
A Three Layer Multimedia Sharing (TLMS) for managing access right of user in a P2P network is proposed in this paper. The features of TLMS include: 1) a novel DRM scheme for P2P networks, 2) a digital content protection without the need of an on-line server, and 3) low communication and computation cost. In addition to introducing the operation of TLMS model, we also compare its performance and security with Zhang et al's design in the context.
Wei-Chen Wu; Yi-Ming Chen. TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks. 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2009, 873 -876.
AMA StyleWei-Chen Wu, Yi-Ming Chen. TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks. 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 2009; ():873-876.
Chicago/Turabian StyleWei-Chen Wu; Yi-Ming Chen. 2009. "TLMS: A Novel DRM Scheme for Multimedia Sharing in P2P Networks." 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing , no. : 873-876.
Traditional remote password authentication schemes allow a user to submit his identity and its corresponding password. Then, through a specific algorithm, the server authenticates its users alone. Because these schemes are independent and each scheme develops a specific algorithm by itself, the development cost and computing cost are very high. To avoid the rise in costs, we present a simple password authentication scheme for multi-server environments. The scheme can generate a public polynomial that contains a specific Access Right (AR). The AR means the legal users have different level of authorization based on which server in the multi-server environment in used. Furthermore, the scheme can verify the authorization without a password table. The scheme can authorize many servers at one time so that the users who have registered with various servers do not need to remember different login passwords for each. The scheme also allows users to choose their passwords freely and update it off-line.
Horng-Twu Liaw; Shiou-Wei Fan; Wei-Chen Wu. A simple password authentication using a polynomial. ACM SIGOPS Operating Systems Review 2004, 38, 74 -79.
AMA StyleHorng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu. A simple password authentication using a polynomial. ACM SIGOPS Operating Systems Review. 2004; 38 (4):74-79.
Chicago/Turabian StyleHorng-Twu Liaw; Shiou-Wei Fan; Wei-Chen Wu. 2004. "A simple password authentication using a polynomial." ACM SIGOPS Operating Systems Review 38, no. 4: 74-79.