A new untraceable off-line electronic cash system

Z Eslami, M Talebi - Electronic Commerce Research and Applications, 2011 - Elsevier
Digital content transactions through e-commerce will grow tremendously in the coming
years. In this respect, well-designed electronic payment schemes and high-quality digital …

Ulcer detection in wireless capsule endoscopy images

L Yu, PC Yuen, J Lai - … of the 21st international conference on …, 2012 - ieeexplore.ieee.org
The invention of wireless capsule endoscopy greatly helps physician to view small intestine
images without causing much pain to patients. It becomes very popular around the world for …

An ID-based mutual authentication and key exchange protocol for low-power mobile devices

TY Wu, YM Tseng - The Computer Journal, 2010 - academic.oup.com
The identity (ID)-based public-key system using bilinear pairings defined on elliptic curves
offers a flexible approach to simplify the certificate management. In 2006, the IEEE P1363. 3 …

Towards generalized ID‐based user authentication for mobile multi‐server environment

YH Chuang, YM Tseng - International Journal of …, 2012 - Wiley Online Library
With the popularity of Internet and wireless networks, more and more network architectures
are used in multi‐server environment, in which mobile users remotely access servers …

A provable and secure patient electronic health record fair exchange scheme for health information systems

MT Chen, TH Lin - Applied Sciences, 2021 - mdpi.com
In recent years, several hospitals have begun using health information systems to maintain
electronic health records (EHRs) for each patient. Traditionally, when a patient visits a new …

RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings

WS Juang - Journal of Systems and Software, 2010 - Elsevier
Nowadays, various electronic commerce services can be found and are widely used in the
Internet due to the mature of information and network technologies. A practical and flexible …

A double or triple module redundancy model exploiting dynamic reconfigurations

K Shinohara, M Watanabe - 2008 NASA/ESA Conference on …, 2008 - ieeexplore.ieee.org
Majority voting is a commonly used approach to increase system reliability. Standard triple-
module-redundancy (TMR) methods are frequently used in space applications. Using these …

Securing first response coordination with dynamic attribute-based encryption

SG Weber - 2009 World Congress on Privacy, Security, Trust …, 2009 - ieeexplore.ieee.org
Every minute saved in emergency management processes can save additional lives of
affected victims. Therefore, an effective coordination of the incident reactions of mobile first …

A fault-based secret key retrieval method for ECDSA: analysis and countermeasure

A Barenghi, GM Bertoni, L Breveglieri… - ACM Journal on …, 2016 - dl.acm.org
Elliptic curve cryptosystems proved to be well suited for securing systems with constrained
resources like embedded and portable devices. In a fault-based attack, errors are induced …

A practical and efficient node blind signcryption scheme for the iot device network

MT Chen, HC Huang - Applied Sciences, 2021 - mdpi.com
In recent years, Internet of Things (IoT for short) research has become one of the top ten
most popular research topics. IoT devices also embed many sensing chips for detecting …