Search For:

Displaying 1-2 out of 2 total
A Mutual Authentication Protocol for RFID
Found in: IT Professional
By Chia-Hui Wei, Min-Shiang Hwang,A Y Chin
Issue Date:March 2011
pp. 20-24
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
A Secure Billing Protocol for Grid Computing
Found in: Information Technology: New Generations, Third International Conference on
By Chia-Hui Wei, Yeo-Hao Chin, Chun-Ta Li
Issue Date:April 2009
pp. 320-325
Grid computing has contributed to advances in computational and communication technologies, which has made economically feasible the conglomeration of multiple clusters of heterogeneous networked resources and services that, in turn, has lead to the develo...