33 results on '"Chien-Lung Hsu"'
Search Results
2. A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems
- Author
-
Tuan-Vinh Le, Chung-Fu Lu, Chien-Lung Hsu, Trung K. Do, Yen-Fang Chou, and Wei-Cheng Wei
- Subjects
6G-IoE ,CL-UCSSO ,fast authentication ,intelligent healthcare ,multi-server ,patient privacy ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
6G technology is now attracting many scientific researchers due to its prominent features including high mobility, high data rate, high operating frequency, and ultra-low end-to-end delay. Compared to the 5G, 6G has certain advantages that can transform smart healthcare to a new advanced intelligent healthcare system, where multiple issues and concerns of the services (e.g., slow ambulance response) are effectively resolved. In such a communication system, patients and service providers communicate with each other via an open internet channel. Since the healthcare data is important and very sensitive, security and privacy in the healthcare network become prominent. In this paper, we introduce a 6G-aided intelligent healthcare environment. Our work also proposes a solution called Centerless User-Controlled Single Sign-On (CL-UCSSO) for achieving a convenient and cost-saving communication in a multi-server system constructed. A three-factor mechanism (combining smart card, password and biometrics) and time bound property are integrated to design the protocol with fast authentication that allows patients and providers to efficiently establish secure communications. Security proof of the proposed protocol is provided using well-known verification tools including RoR model, AVISPA simulation and BAN logic. Results of performance comparisons on various aspects show that our work provides more functionalities and incurs less cost compared with the related works.
- Published
- 2022
- Full Text
- View/download PDF
3. An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments
- Author
-
Tuan-Vinh Le and Chien-Lung Hsu
- Subjects
5G ,group key distribution ,e-health ,privacy ,SSO ,three-factor authentication ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Fifth generation (5G) mobile technology enables a new kind of network that provides high peak data rates, ultra-low latency communication and high user density. Electronic healthcare (e-health) allows the data to be stored and shared in a highly efficient and flexible manner. Group e-health services help in improving long-term results of the treatments due to its collaborative characteristic. The services including real-time remote patient monitoring and transmission of large health data files can be facilitated by e-health systems enabled with the 5G network. Since the communication channel is open, security and privacy in the system should be taken into account. Our work proposes a key distribution scheme for group healthcare services in 5G network environments. We construct various healthcare domains and apply the proposed scheme to the group services. The paper also introduces Single Sign-On (SSO), a cost-efficient solution, for multi-server architecture of the constructed system. Security and privacy of the scheme are enforced by a three-factor authentication mechanism (integrating smart card, password and biometrics) and strong user anonymity property. We provide security proof of the proposed scheme using various well-known tools including RoR model, BAN logic and AVISPA simulation. Results of various performance comparisons indicate that our scheme provides most functions and bears rational costs, compared with its related works.
- Published
- 2021
- Full Text
- View/download PDF
4. Privacy Concerns and Information Sharing: The Perspective of the U-Shaped Curve
- Author
-
Chien-Lung Hsu, Yi-Chuan Liao, Ching-Wen Lee, and Lin Kun Chan
- Subjects
privacy concern ,information sharing ,social network sites ,personal motivation ,system evaluation factor ,Psychology ,BF1-990 - Abstract
Privacy concerns are a key predictor of information sharing, yet some critical issues remain unclear. Based on social capital theory, this study argues that the relationship between privacy concerns and information sharing is a U-shaped curve. Users with privacy concerns would not share their private information; however, such users would eventually share their information as long as they trust the website and its members. Furthermore, this study provides a contingency perspective, suggesting that the curvilinear relationship between privacy concerns and information sharing varies with the system evaluation perception and personal motivation levels. The results show that at a high level of system evaluation, the relationship between privacy concerns squared and information sharing is non-significant. In contrast, at a low level of system evaluation, there is a U-shaped relationship between privacy concerns and information sharing. Regarding motivation, the results were congruent with our expectations.
- Published
- 2022
- Full Text
- View/download PDF
5. A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks
- Author
-
Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu, Tzu-Wei Lin, and Tzu-Hsien Chuang
- Subjects
Edge computing ,IoT ,end-to-end ,privacy protection ,password-based ,key exchange ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Edge computing has played an important role in enabling 5G technology which supports a great number of connected narrow-band IoT devices. In an edge computing architecture enabled with global mobile network, edge or IoT devices are wirelessly connected to the edge of the network. Data acquisition and processing will be handled at or close to the edge of the network in a distributed way. Since edge computing is a heterogeneous distributed interactive system with multiple domains and entities, it might suffer from potential attacks and threats. To provide a trusted edge computing, there must have a robust scheme that allows all participants to mutually authenticate in a secure and privacy-preserved way. With the rapid development of IoT technologies, mobile networks and edge computing architecture, single server has been unable to meet the needs of users. In this paper, we propose a privacy-preserved end-to-end password-based authenticated key exchange protocol for multi-server architecture in edge computing networks. Our protocol allows an end user to use an easy-to-remember password to login to the server, then through foreign agent compute a shared key with another end user for specific use of services. The proposed protocol provides strong user anonymity during communication process. Besides, the proposed protocol is proved to be secure using BAN logic and AVISPA tool. Furthermore, performance analysis shows that the proposed protocol gains stronger security and better computational efficiency. Providing lightweight computation with short key size of ECC, our work is a solution to lower latency and improve efficiency in edge computing networks.
- Published
- 2020
- Full Text
- View/download PDF
6. Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems
- Author
-
Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, Kuo-Yu Tsai, Chung-Fu Lu, and Tzu-Wei Lin
- Subjects
Fast authentication ,privacy ,three-factor ,TMIS ,UCSSO ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Electronic healthcare (e-health) has gained more and more research attention in recent years, due to its flexibility and convenience. E-health is efficiently enabled by telecare medicine information system (TMIS). TMIS provides seamless transfer and timely sharing of medical information for specific healthcare services. Since communications in TMIS are carried out through unreliable channels, data security and user privacy concerns become prominent. With traditional single-server architecture, users must store massive credentials, which causes inefficient communication and significant overhead. Moreover, user credentials in previously proposed schemes are stored at server side, suffering potential risks. Our work proposes a three-factor user-controlled single sign-on (UCSSO) with fast authentication and privacy protection for TMIS. The contributions of this paper are as follows. Our work integrates three factors including password, smart card and biometrics in authentication procedure, for providing a high-security and privacy-preserved communication. We introduce single sign-on solution that allows users to log in to multiple servers using a single password. User-controlled mechanism is proposed to address insider attacks and the risk that registration center may be compromised. The proposed scheme is designed with fast authentication mechanism that helps to efficiently establishes new session key. Our work is proved secure using BAN logic, ROR model, and AVISPA toolset. The results of performance comparison show that our scheme provides more security properties and bears the least overhead, compared with competitive schemes.
- Published
- 2020
- Full Text
- View/download PDF
7. A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems
- Author
-
Tzu-Wei Lin, Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu, and Bo-Yu Huang
- Subjects
telemedicine systems ,user-controlled ,single sign-on ,multi-server ,BAN logic ,AVISPA ,Chemical technology ,TP1-1185 - Abstract
Healthcare is now an important part of daily life because of rising consciousness of health management. Medical professionals can know users’ health condition if they are able to access information immediately. Telemedicine systems, which provides long distance medical communication and services, is a multi-functional remote medical service that can help patients in bed in long-distance communication environments. As telemedicine systems work in public networks, privacy preservation issue of sensitive and private transmitted information is important. One of the means of proving a user’s identity are user-controlled single sign-on (UCSSO) authentication scheme, which can establish a secure communication channel using authenticated session keys between the users and servers of telemedicine systems, without threats of eavesdropping, impersonation, etc., and allow patients access to multiple telemedicine services with a pair of identity and password. In this paper, we proposed a smartcard-based user-controlled single sign-on (SC-UCSSO) for telemedicine systems that not only remains above merits but achieves privacy preservation and enhances security and performance compared to previous schemes that were proved with BAN logic and automated validation of internet security protocols and applications (AVISPA).
- Published
- 2021
- Full Text
- View/download PDF
8. FAIDM for Medical Privacy Protection in 5G Telemedicine Systems
- Author
-
Tzu-Wei Lin and Chien-Lung Hsu
- Subjects
telemedicine ,5G ,anonymity ,identity management ,medical privacy preservation ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
5G networks have an efficient effect in energy consumption and provide a quality experience to many communication devices. Device-to-device communication is one of the key technologies of 5G networks. Internet of Things (IoT) applying 5G infrastructure changes the application scenario in many fields especially real-time communication between machines, data, and people. The 5G network has expanded rapidly around the world including in healthcare. Telemedicine provides long-distance medical communication and services. Patient can get help with ambulatory care or other medical services in remote areas. 5G and IoT will become important parts of next generation smart medical healthcare. Telemedicine is a technology of electronic message and telecommunication related to healthcare, which is implemented in public networks. Privacy issue of transmitted information in telemedicine is important because the information is sensitive and private. In this paper, 5G-based federated anonymous identity management for medical privacy protection is proposed, and it can provide a secure way to protect medical privacy. There are some properties below. (i) The proposed scheme provides federated identity management which can manage identity of devices in a hierarchical structure efficiently. (ii) Identity authentication will be achieved by mutual authentication. (iii) The proposed scheme provides session key to secure transmitted data which is related to privacy of patients. (iv) The proposed scheme provides anonymous identities for devices in order to reduce the possibility of leaking transmitted medical data and real information of device and its owner. (v) If one of devices transmit abnormal data, proposed scheme provides traceability for servers of medical institute. (vi) Proposed scheme provides signature for non-repudiation.
- Published
- 2021
- Full Text
- View/download PDF
9. An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things
- Author
-
Chien-Lung Hsu, Wei-Xin Chen, and Tuan-Vinh Le
- Subjects
attribute-based access control ,digital forensics ,evidence legality ,sensor log ,signature chain ,Chemical technology ,TP1-1185 - Abstract
As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur. However, evidence legality and internal security issues in existing works were not properly addressed. This paper proposes an autonomous log storage management protocol with blockchain mechanism and access control for the IoT. Autonomous model allows sensors to encrypt their logs before sending it to gateway and server, so that the logs are not revealed to the public during communication process. Along with blockchain, we introduce the concept “signature chain”. The integration of blockchain and signature chain provides efficient management functions with valuable security properties for the logs, including robust identity verification, data integrity, non-repudiation, data tamper resistance, and the legality. Our work also employs attribute-based encryption to achieve fine-grained access control and data confidentiality. The results of security analysis using AVSIPA toolset, GNY logic and semantic proof indicate that the proposed protocol meets various security requirements. Providing good performance with elliptic curve small key size, short BLS signature, efficient signcryption method, and single sign-on solution, our work is suitable for the IoT.
- Published
- 2020
- Full Text
- View/download PDF
10. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks
- Author
-
Alice May-Kuen Wong, Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, and Tzu-Wei Lin
- Subjects
5G-based WSN ,biometrics ,multi-server ,privacy protection ,time bound ,Chemical technology ,TP1-1185 - Abstract
The fifth generation (5G) mobile network delivers high peak data rates with ultra-low latency and massive network capacity. Wireless sensor network (WSN) in Internet of Thing (IoT) architecture is of prominent use in 5G-enabled applications. The electronic healthcare (e-health) system has gained a lot of research attention since it allows e-health users to store and share data in a convenient way. By the support of 5G technology, healthcare data produced by sensor nodes are transited in the e-health system with high efficiency and reliability. It helps in reducing the treatment cost, providing efficient services, better analysis reports, and faster access to treatment. However, security and privacy issues become big concerns when the number of sensors and mobile devices is increasing. Moreover, existing single-server architecture requires to store a massive number of identities and passwords, which causes a significant database cost. In this paper, we propose a three-factor fast authentication scheme with time bound and user anonymity for multi-server e-health systems in 5G-based wireless sensor networks. In our work, the three-factor authentication scheme integrating biometrics, password, and smart card ensures a high-security sensor-enabled environment for communicating parties. User anonymity is preserved during communication process. Besides, time bound authentication can be applied to various healthcare scenarios to enhance security. The proposed protocol includes fast authentication, which can provide a fast communication for participating parties. Our protocol is also designed with multi-server architecture to simplify network load and significantly save database cost. Furthermore, security proof and performance analysis results show that our proposed protocol can resist various attacks and bear a rational communication cost.
- Published
- 2020
- Full Text
- View/download PDF
11. Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model
- Author
-
Chien-Lung Hsu and Yi-Chuan Liao
- Subjects
perceived usefulness ,perceived ease of use ,emotional connection ,adaptivity ,customer stickiness ,moderated mediation ,Information technology ,T58.5-58.64 - Abstract
This study develops a contingent mediation model to investigate whether user perception enhances customer stickiness through emotional connection and further assess such mediating effect varies with different adaptivity. A moderated mediation approach is adopted to test the hypotheses. Findings reveal the mediating role of emotional connection on the link between perceived usefulness and customer stickiness, but not moderated by adaptivity. On the other hand, the results showed that the relationship between perceived ease of use and customer stickiness is not mediated by emotional connection; however, after considering the moderating effect, our results show that moderated mediation exists.
- Published
- 2019
- Full Text
- View/download PDF
12. Security, Privacy, and Applications in Mobile Healthcare
- Author
-
Chien-Lung Hsu, Atsuo Inomata, Sk. Md. Mizanur Rahman, Fatos Xhafa, and Laurence T. Yang
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Published
- 2015
- Full Text
- View/download PDF
13. Research on a community-based platform for promoting health and physical fitness in the elderly community.
- Author
-
Tsai-Hsuan Tsai, Alice May-Kuen Wong, Chien-Lung Hsu, and Kevin C Tseng
- Subjects
Medicine ,Science - Abstract
This study aims to assess the acceptability of a fitness testing platform (iFit) for installation in an assisted living community with the aim of promoting fitness and slowing the onset of frailty. The iFit platform develops a means of testing Bureau of Health Promotion mandated health assessment items for the elderly (including flexibility tests, grip strength tests, balance tests, and reaction time tests) and integrates wireless remote sensors in a game-like environment to capture and store subject response data, thus providing individuals in elderly care contexts with a greater awareness of their own physical condition. In this study, we specifically evaluated the users' intention of using the iFit using a technology acceptance model (TAM). A total of 101 elderly subjects (27 males and 74 females) were recruited. A survey was conducted to measure technology acceptance, to verify that the platform could be used as intended to promote fitness among the elderly. Results indicate that perceived usefulness, perceived ease of use and usage attitude positively impact behavioral intention to use the platform. The iFit platform can offer user-friendly solutions for a community-based fitness care and monitoring of elderly subjects. In summary, iFit was determined by three key drivers and discussed as follows: risk factors among the frail elderly, mechanism for slowing the advance frailty, and technology acceptance and support for promoting physical fitness.
- Published
- 2013
- Full Text
- View/download PDF
14. ID-Based Deniable Authentication Protocol with Key Agreement and Time-Bound Properties for 6G-Based WBAN Healthcare Environments
- Author
-
Cheng, Chien-Lung Hsu, Anh-Tuan Nguyen, and Guan-Lin
- Subjects
ID-based ,deniability ,authentication ,mutual key agreement ,time-bound ,6G ,WBAN ,healthcare environment - Abstract
The advent of 6G technology is expected to bring a paradigm shift in the field of wireless communication. With its faster data transfer rates and lower latency, 6G could be an ideal solution for the challenges faced by Wireless Body Area Networks (WBANs) in terms of efficient data bandwidth and edge computing. Smart healthcare systems with 6G-based WBANs might provide more efficient and higher-quality healthcare services. However, 6G-based WBAN healthcare systems might face potential security and safety challenges from cybersecurity threats. This paper will propose an ID-based deniable authentication protocol with key agreement and time-bound properties for 6G-based WBAN healthcare environments by considering user privacy, secure communications, authentication, authorization, and scalability of 6G-based WBANs. As compared with previously proposed protocols, the proposed protocol will achieve the following security requirements: mutual authentication, key agreement for secure communication, deniability, time-bound access privilege control, and identity-based public key management for scalable wearable devices and 6G-based WBAN Service Providers. We proved the claimed security requirements of the proposed protocol by using AVISPA simulation and discussed its computational complexities. As compared with previous works, the proposed protocol can gain better contributions in terms of security requirements and performance evaluations for 6G-based WBAN healthcare environments.
- Published
- 2023
- Full Text
- View/download PDF
15. Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems
- Author
-
Tuan-Vinh Le, Chien-Lung Hsu, Mei-Chen Hsieh, Chung-Fu Lu, Tzu-Wei Lin, and Kuo-Yu Tsai
- Subjects
020205 medical informatics ,General Computer Science ,UCSSO ,Computer science ,Data security ,02 engineering and technology ,Fast authentication ,Login ,Computer security ,computer.software_genre ,privacy ,Server ,TMIS ,0202 electrical engineering, electronic engineering, information engineering ,Session key ,Overhead (computing) ,General Materials Science ,Password ,Authentication ,business.industry ,General Engineering ,020206 networking & telecommunications ,three-factor ,Smart card ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,lcsh:TK1-9971 - Abstract
Electronic healthcare (e-health) has gained more and more research attention in recent years, due to its flexibility and convenience. E-health is efficiently enabled by telecare medicine information system (TMIS). TMIS provides seamless transfer and timely sharing of medical information for specific healthcare services. Since communications in TMIS are carried out through unreliable channels, data security and user privacy concerns become prominent. With traditional single-server architecture, users must store massive credentials, which causes inefficient communication and significant overhead. Moreover, user credentials in previously proposed schemes are stored at server side, suffering potential risks. Our work proposes a three-factor user-controlled single sign-on (UCSSO) with fast authentication and privacy protection for TMIS. The contributions of this paper are as follows. Our work integrates three factors including password, smart card and biometrics in authentication procedure, for providing a high-security and privacy-preserved communication. We introduce single sign-on solution that allows users to log in to multiple servers using a single password. User-controlled mechanism is proposed to address insider attacks and the risk that registration center may be compromised. The proposed scheme is designed with fast authentication mechanism that helps to efficiently establishes new session key. Our work is proved secure using BAN logic, ROR model, and AVISPA toolset. The results of performance comparison show that our scheme provides more security properties and bears the least overhead, compared with competitive schemes.
- Published
- 2020
16. FAIDM for Medical Privacy Protection in 5G Telemedicine Systems
- Author
-
Chien-Lung Hsu and Tzu-Wei Lin
- Subjects
Telemedicine ,Computer science ,02 engineering and technology ,Medical privacy ,identity management ,Computer security ,computer.software_genre ,lcsh:Technology ,Identity management ,lcsh:Chemistry ,medical privacy preservation ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Session key ,General Materials Science ,Instrumentation ,lcsh:QH301-705.5 ,Fluid Flow and Transfer Processes ,Authentication ,anonymity ,lcsh:T ,Process Chemistry and Technology ,General Engineering ,020206 networking & telecommunications ,Mutual authentication ,lcsh:QC1-999 ,Computer Science Applications ,lcsh:Biology (General) ,lcsh:QD1-999 ,lcsh:TA1-2040 ,Key (cryptography) ,020201 artificial intelligence & image processing ,telemedicine ,lcsh:Engineering (General). Civil engineering (General) ,computer ,lcsh:Physics ,5G - Abstract
5G networks have an efficient effect in energy consumption and provide a quality experience to many communication devices. Device-to-device communication is one of the key technologies of 5G networks. Internet of Things (IoT) applying 5G infrastructure changes the application scenario in many fields especially real-time communication between machines, data, and people. The 5G network has expanded rapidly around the world including in healthcare. Telemedicine provides long-distance medical communication and services. Patient can get help with ambulatory care or other medical services in remote areas. 5G and IoT will become important parts of next generation smart medical healthcare. Telemedicine is a technology of electronic message and telecommunication related to healthcare, which is implemented in public networks. Privacy issue of transmitted information in telemedicine is important because the information is sensitive and private. In this paper, 5G-based federated anonymous identity management for medical privacy protection is proposed, and it can provide a secure way to protect medical privacy. There are some properties below. (i) The proposed scheme provides federated identity management which can manage identity of devices in a hierarchical structure efficiently. (ii) Identity authentication will be achieved by mutual authentication. (iii) The proposed scheme provides session key to secure transmitted data which is related to privacy of patients. (iv) The proposed scheme provides anonymous identities for devices in order to reduce the possibility of leaking transmitted medical data and real information of device and its owner. (v) If one of devices transmit abnormal data, proposed scheme provides traceability for servers of medical institute. (vi) Proposed scheme provides signature for non-repudiation.
- Published
- 2021
- Full Text
- View/download PDF
17. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks
- Author
-
Tuan-Vinh Le, Mei-Chen Hsieh, Chien-Lung Hsu, Tzu-Wei Lin, and Alice M. K. Wong
- Subjects
biometrics ,Biometrics ,Computer science ,privacy protection ,02 engineering and technology ,time bound ,lcsh:Chemical technology ,Biochemistry ,Article ,Analytical Chemistry ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Instrumentation ,Password ,Authentication ,business.industry ,020206 networking & telecommunications ,Atomic and Molecular Physics, and Optics ,multi-server ,Cellular network ,5G-based WSN ,020201 artificial intelligence & image processing ,Smart card ,business ,Wireless sensor network ,Mobile device ,5G ,Anonymity ,Computer network - Abstract
The fifth generation (5G) mobile network delivers high peak data rates with ultra-low latency and massive network capacity. Wireless sensor network (WSN) in Internet of Thing (IoT) architecture is of prominent use in 5G-enabled applications. The electronic healthcare (e-health) system has gained a lot of research attention since it allows e-health users to store and share data in a convenient way. By the support of 5G technology, healthcare data produced by sensor nodes are transited in the e-health system with high efficiency and reliability. It helps in reducing the treatment cost, providing efficient services, better analysis reports, and faster access to treatment. However, security and privacy issues become big concerns when the number of sensors and mobile devices is increasing. Moreover, existing single-server architecture requires to store a massive number of identities and passwords, which causes a significant database cost. In this paper, we propose a three-factor fast authentication scheme with time bound and user anonymity for multi-server e-health systems in 5G-based wireless sensor networks. In our work, the three-factor authentication scheme integrating biometrics, password, and smart card ensures a high-security sensor-enabled environment for communicating parties. User anonymity is preserved during communication process. Besides, time bound authentication can be applied to various healthcare scenarios to enhance security. The proposed protocol includes fast authentication, which can provide a fast communication for participating parties. Our protocol is also designed with multi-server architecture to simplify network load and significantly save database cost. Furthermore, security proof and performance analysis results show that our proposed protocol can resist various attacks and bear a rational communication cost.
- Published
- 2020
- Full Text
- View/download PDF
18. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
- Author
-
Tzong-Sun Wu and Chien-Lung Hsu
- Subjects
Network access ,Computer networks -- Safety and security measures ,Information networks -- Safety and security measures ,Access control (Computers) - Published
- 2004
19. Electronic Commerce Research Profiles: Comparing E-Commerce and Information Systems Journals.
- Author
-
Chien-Lung Hsu and Chun-Hao Chiang
- Subjects
ELECTRONIC commerce ,BIBLIOMETRICS ,INFORMATION storage & retrieval systems - Abstract
The rapid diffusion of information and mobile technologies has revolutionized the way we do business and how we conduct our daily lives. Electronic commerce (e-commerce or EC) has had an enormous impact on business practices and has become a new area of study for researchers in related fields. Thousands of papers on this subject have been published in the past two decades, most of which have been published in e-commerce (EC) journals. However, many such papers have been published in information systems (IS) journals. Information systems have become the core discipline that drives e-commerce research. The purpose of this research is to report on the profiles of e-commerce papers published in major EC and IS journals, and to determine whether papers that have appeared in EC journals differ from those published in IS journals. We surveyed EC papers published in ten major journals and conducted a bibliometric analysis. Our findings indicate that (1) more EC papers are published in EC journals, but papers published in IS journals are cited more often; (2) collectively, authors in the U.S. are the most prolific, followed by those in China and Taiwan; (3) more theories were used in recent papers than in earlier ones, and the TAM has been the most popular model; (4) B2C and consumer behavior have been the most popular subject areas for EC research; and (5) the core knowledge measured by the co-citation network was provided by the same group of authors in EC and IS journal publications.en [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
20. The Usage Behavior and Intention Stability of Nurses: An Empirical Study of a Nursing Information System.
- Author
-
I-Chun Lin, Chihung Lin, Chien-Lung Hsu, Jinsheng Roan, Jehn-Shan Yeh, and Yu-Han Cheng
- Published
- 2016
- Full Text
- View/download PDF
21. A digital evidence protection method with hierarchical access control mechanisms.
- Author
-
Chien-Lung Hsu, Boo-Chen Liu, and Yu-Li Lin
- Published
- 2011
- Full Text
- View/download PDF
22. IRB system for assisting the development of intelligent medical devices.
- Author
-
Tseng, K.C. and Chien-Lung Hsu
- Published
- 2009
- Full Text
- View/download PDF
23. Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics.
- Author
-
Yu-Li Lin, Tzong-Chen Wu, Chien-Lung Hsu, and Yen-Chun Chou
- Published
- 2007
- Full Text
- View/download PDF
24. Universal Forgery Attack on a Strong Designated Verifier Signature Scheme.
- Author
-
Chien-Lung Hsu and Han-Yu Lin
- Subjects
FORGERY ,BILINEAR forms ,BELIEF & doubt ,DIGITAL signatures ,COMPUTER security ,ORACLE software ,EMAIL - Abstract
Based on the bilinear Diffie-Hellman assumption, in 2009, Kang et al. proposed an identity-based strong Designated Verifier Signature (DVS) scheme which only allows the intended verifier to verify the signature. Besides, the designated verifier is not capable of transferring the conviction to any third party. Their scheme was proved secure in the random oracle model. In this paper, however, we will demonstrate that their scheme is still vulnerable to the universal forgery attack for arbitrarily chosen messages. Moreover, an efficient and provably secure improvement to eliminate the security weakness is presented. [ABSTRACT FROM AUTHOR]
- Published
- 2014
25. An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network.
- Author
-
Chien-Lung Hsu and Han-Yu Lin
- Subjects
IDENTITY-based organizations ,DATA encryption ,EMAIL ,PEER-to-peer architecture (Computer networks) ,PROBLEM solving - Abstract
Key exposure is a major threat to secure cryptosystems. To mitigate the impact caused by key-compromise attacks, a key-insulated cryptographic mechanism is a better alternative. For securing the large message communication in peer-to-peer networks, in this paper, we propose the first novel identity-based key-insulated encryption (IB-KIE) scheme with message linkages. Our scheme has the properties of unbounded time periods and random-access key-updates. In the proposed scheme, each client can periodically update his private key while the corresponding public one remains unchanged. The essential security assumption of our proposed scheme is based on the well-known bilinear Diffie-Hellman problem (BDHP). To ensure the practical feasibility, we also formally prove that the proposed scheme achieves the security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) in the random oracle model. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
26. ACCEPTANCE OF INFORMATION TECHNOLOGY AND THE INTERNET BY PEOPLE AGED OVER FIFTY IN TAIWAN.
- Author
-
Tseng, Kevin C., Chien-Lung Hsu, and Yu-Hao Chuang
- Subjects
- *
TECHNOLOGY Acceptance Model , *TECHNOLOGY & older people , *INFORMATION technology , *INTERNET & psychology , *OLDER people , *THEORY of reasoned action , *GERIATRIC psychology , *PSYCHOLOGY - Abstract
Information technology and the Internet are becoming increasingly important in daily life for acquiring knowledge or information. Unfortunately, although the population aged over 50 is increasing, many current websites are not suitable for their use (Payne, 2002; Ryu, Kim, & Lee, 2009). We constructed a research model based on the technology acceptance model (TAM; Davis, 1986) and analyzed acceptance of accessible page systems by people aged over 50, using the Taoyuan Gueishan Township Office website as a representative sample. Results revealed a strong inclination toward using the websites and most users rated the webpage as easy to use and said it was a positive learning experience. The tangible benefits of this study are that the requirements for websites by those in the 50+ age group are identified, web developers can use the results to design a suitable website, and thus the results could lead to the development of more accessible pages for those ages 50 and over. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
27. PREDICTORS OF FUTURE USE OF TELEHOMECARE HEALTH SERVICES BY MIDDLE-AGED PEOPLE IN TAIWAN.
- Author
-
CHIEN-LUNG HSU, TSENG, KEVIN C., and YU-HAO CHUANG
- Subjects
- *
MIDDLE-aged persons , *HOME care services , *PATIENT monitoring , *POPULATION aging , *HEALTH of middle-aged persons , *SOCIAL influence , *HEALTH facilities utilization - Abstract
We reconstructed a model based on the unified theory of acceptance and use of technology to analyze the acceptance of intelligent vital monitoring products (IVMPs) by middle-aged people. Results revealed that the dimensions of performance expectancy, social influence, and facilitating condition all positively influenced the intentions of middle-aged people to use IVMPs. Our results may be of use for telehomecare health services when designing and developing IVMPs for people of all ages in the future. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
28. EFFECT OF COMMITMENT AND TRUST TOWARDS MICRO-BLOGS ON CONSUMER BEHAVIORAL INTENTION: A RELATIONSHIP MARKETING PERSPECTIVE.
- Author
-
Chien-Lung Hsu, Chia-Chang Liu, and Yuan-Duen Lee
- Subjects
CONSUMER behavior ,MARKETING ,MICROBLOGS ,CUSTOMER satisfaction ,CORPORATE image ,ECONOMIC competition ,CUSTOMER relations ,COMMUNICATION ,COMPUTER network resources - Abstract
The purpose of this study is to explore consumers' views on enterprises conducting relationship marketing through micro-blogging. The basis of this study is the base on commitment-trust theory with the influences of consumers' satisfaction with the micro-blog page of enterprises, corporate images, commitment, trust, and sense of community on consumers' behavioral intention. The result of this study can be used as principles for enterprises to manage their relationship marketing through micro-blogging and construct their micro-blog page. The result of this study shows that consumers' satisfaction has positive influences on commitment, trust, sense of community, and behavioral intentions. The influences of corporate images on commitment and trust are supported, but the influences on behavioral intentions must go through the mediators, commitment and trust. The influences of trust on commitment and sense of community exist, but the influences on behavioral intentions must go through the mediators, commitment and sense of community. Lastly, the influences of commitment and sense of community on behavioral intentions exist. [ABSTRACT FROM AUTHOR]
- Published
- 2010
29. Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes.
- Author
-
Chien-Lung Hsu, Tzong-Chen Wu, and Kuo-Yu Tsai
- Published
- 2010
30. Cryptanalysis and Enhancement of Two-pass Authenticated Key Agreement with Key Confirmation Protocols.
- Author
-
Zeyad Mohammad, Yaw-Chung Chen, Chien-Lung Hsu, and Chi-Chun Lo
- Subjects
PUBLIC key cryptography ,DIGITAL signatures ,DATA encryption ,CYBERTERRORISM ,ELECTRONIC data processing ,COMPUTER crimes ,COMPUTER security ,PUBLIC key infrastructure (Computer security) ,COMPUTATIONAL complexity - Abstract
In NRSC24, Elkamchouchi et al. proposed a new approach for key controlled agreement to provide key control in the Pour public key distribution system. In NRSC25, they further proposed an efficient and confirmed protocol for authenticated key agreement to provide forward secrecy in their previously proposed protocol. This paper, however, will show that Pour's protocol and Elkamchouchi et al.'s two protocols cannot withstand key compromise impersonation resilience, and man-in-the-middle attacks, and do not have perfect forward secrecy resilience. To eliminate the pointed out security leaks, we further propose a new two-pass authenticated key agreement with a key confirmation protocol. The proposed protocol has the following properties: (i) it is proved to be secure against above attacks and stronger adversary attacks, and provides the desirable security properties as a three-pass authenticated key agreement protocol. (ii) It can provide entity authentication and assurance for key reception in an indirect way. (iii) It can withstand denial of service attacks. In addition, we also propose a derivation one-pass protocol from the proposed two-pass protocol to fit a one-way communication channel, which is suitable for mobile stations and electronic business transactions. The security and the computational complexities of the proposed two protocols outperform those of previously proposed protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
31. Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme.
- Author
-
Chien-Lung Hsu
- Subjects
SMART cards ,AUTHENTICATION (Law) ,COMPUTER passwords ,COMPUTER security ,ELLIPTIC curves ,COMPUTER storage devices - Abstract
Elaborating on the merits of elliptic curve cryptosystems, smart cards, and secret sharing schemes, Wu recently proposed a smart card access control with threshold scheme, in which any k out of n users can cooperatively use their authenticated smart cards to unlock an access facility such as a door. By authenticating and recording the Iogin requests submitted by the smart cards, Wu's scheme can establish a complete on-line audit trail of all entry or exit events on a remote computer. In addition, Wu's scheme can achieve user friendliness, mutual authentication, cheating detection, and cheater identification. This paper, however, will show that Wu's scheme is vulnerable to the off-line password guessing attack, the impersonation attack, and the man-in-the-middle attack. Hence, Wu's scheme cannot achieve his claimed security requirements. [ABSTRACT FROM AUTHOR]
- Published
- 2008
32. Cryptanalysis of Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems.
- Author
-
Tzong-Chen Wu and Chien-Lung Hsu
- Subjects
- *
CRYPTOGRAPHY , *AUTHENTICATION (Law) - Abstract
Shows that Shieh et al.'s multisignature schemes are vulnerable to insider forgery attacks hence cannot achieve the security requirements they claimed. Shieh et al.'s proposed schemes; Cryptanalysis of Shieh et al's schemes; Conclusion.
- Published
- 2003
- Full Text
- View/download PDF
33. Security of Two Remote User Authentication Schemes Using Smart Cards.
- Author
-
Chien-Lung Hsu
- Subjects
- *
COMPUTER storage devices , *SMART cards , *HOUSEHOLD electronics industry , *KEYSTROKE timing authentication , *INTERNET users - Abstract
In 2000, Sun proposed an efficient remote user authentication scheme using smart cards (published in IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, 2000). Recently, Chien et at pointed out that Sun's scheme only achieve the unilateral authentication. That is, only the authentication server can authenticate the legitimacy of the remote user while the user cannot authenticate that of the server. Chien et at further proposed a new efficient and practical solution to achieve the mutual user authentication (published in Computers & Security, Vol. 21, No. 4, 2002). This paper, however, will demonstrate that Sun `s scheme is vulnerable to the off-line and the on-line password guessing attacks and Chien et at `s scheme is vulnerable to the parallel session attack. [ABSTRACT FROM AUTHOR]
- Published
- 2003
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.