Chu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin, Y. Lai
{"title":"On the security of ID-based password authentication scheme using smart cards and fingerprints","authors":"Chu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin, Y. Lai","doi":"10.1109/ITRE.2005.1503110","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503110","url":null,"abstract":"In 2003 (ACM Operating Systems Review, Vol.37), Kim, Lee and Yoo proposed an ID-based password authentication scheme for log-on to a remote server using smart card, password and fingerprint. In this paper, we show that the KLY protocol is vulnerable to an active adversary who can extract some information embedded in the smart card by using existing smart cards attack methods. By getting the information and eavesdropping the previous login messages of a legal user, an attacker without any password or fingerprint can successfully forge the legal user to obtain services from the system. In this case, the protocol is not sufficient for systems with high level security requirements.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134441093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CuMPE: Cluster-Management and Power-Efficient protocol for wireless sensor networks","authors":"Shen Ben Ho, Xiao Su","doi":"10.1109/ITRE.2005.1503067","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503067","url":null,"abstract":"A wireless sensor network (WSN), a type of distributed wireless ad-hoc network, is characterized by large amount of sensors and low power supply. In WSN, it is important for sensor nodes to have low transmission delay (due to large number of sensor nodes) and low power consumption (due to limited power supply). In this paper, we propose a new routing and MAC protocol $Cluster-Management and Power Efficient (CuMPE) protocol, to meet the above objectives. The routing part of CuMPE is cluster-based and uses a selective flooding algorithm to propagate transmission cost. Based on the cost information, every sensor in the network tries to establish the minimum cost path to the cluster head. The MAC part of CuMPE first finds the critical path that has the longest transmission delay to a cluster head and schedules sensor nodes using TDMA scheduling to avoid extending the critical path. Simulation results have shown that CuMPE protocol is more power efficient and has shorter transmission delay than existing protocols, such as LEACH, PEGASIS, and HIT.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"565 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123480368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On implementation of an enhanced and integrated parallel programming web-based toolkit","authors":"Kuan-Ching Li, Chao-Tung Yang","doi":"10.1109/itre.2005.1503140","DOIUrl":"https://doi.org/10.1109/itre.2005.1503140","url":null,"abstract":"","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122117082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent home video management system","authors":"Szu-Hao Huang, Qi-Jiunn Wu, Kai-yeuh Chang, Wen-Hao Wang, Yu-Sheng Tsai, Chia-Lun Chen, Hsin-Cheang Lin, Shang-Hong Lai, Guan-Rong Chen","doi":"10.1109/itre.2005.1503094","DOIUrl":"https://doi.org/10.1109/itre.2005.1503094","url":null,"abstract":"","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}