Volume 9 Issue 2 April 2011


Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue

Tzong-Sun Wu, Han-Yu Lin, Ming-Lun Lee, Won-Yi Chen

https://doi.org/

Abstract There are many kinds of online services in our daily life, such as e-mail and messenger. When we link to a remote host, we are required to login first, supplying a username and the corresponding password, and then obtain the resources or have services. Most commonly, we might use a smart card to assistant us to login a remote site.... Read More


A Refined Methodology for Automatic Keyphrase Assignment to Digital Documents

Sharifullah Khan, Iram Fatima, Rabia Irfan, Khalid Latif

https://doi.org/

Abstract Keyphrases precisely express the primary top-ics and themes of documents and are valuable for cataloging and classification. Manually assigning keyphrases to existing documents is a tedious task; therefore, automatic keyphrase generation has been extensively used to classify digital docu-ments. Existing automatic keyphrase generation algorithms are limited in assigning semantically relevant keyphrases to documents. In this paper we have proposed a... Read More


Elementary Patterns for Converting Textual and Visual Formalisms based on Set Theory and ORM

Sietse Overbeek, Patrick van Bommel

https://doi.org/

Abstract Textual formalisms, visual formalisms, or both types of formalisms can be used to develop a formal model. The exact syntax and semantics of textual formalisms reduce ambiguity and increase formulation precision. This has as side effect that textual formalisms can become complex and suitable for limited audiences only. Visual formalisms consist of graphical notations with formal semantics. The intuitive and... Read More


Password Based Anonymous Authentication with Private Information Retrieval

Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura

https://doi.org/

Abstract This paper focuses on authentication with three types of entities: a user who sends an authentication request, a service provider who receives and verifies the request, and a database who supplies the service provider with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) se-cure against replay attacks and (2) the... Read More


A Practical U-Healthcare Network with Security and QoS1

Shiow-Yuan Huang, Cheng-Chan Hung, Cheng-Chi Lee

https://doi.org/

Abstract As a consequence of rapid technological de-velopment, the normally isolated medical sensor platform is gradually being integrated into networks. However, most ubiq-uitous or mobile health systems are lacking a system that com-bines both network security and QoS (Quality of Service). This paper investigates the possible security and QoS methods of a ubiquitous healthcare network platform in OSI (Open System... Read More