Search For:

Displaying 1-6 out of 6 total
A Mutual Authentication Protocol for RFID
Found in: IT Professional
By Chia-Hui Wei, Min-Shiang Hwang,A Y Chin
Issue Date:March 2011
pp. 20-24
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
 
On J-maximal and J-minimal Flow-Shop Schedules
Found in: Journal of the ACM (JACM)
By Francis Y. Chin, Long-Lieh Tsai
Issue Date:July 1981
pp. 462-476
It is shown that, given an arbitrary GO position on an n × n board, the problem of determining the winner is Pspace hard. New techniques are exploited to overcome the difficulties arising from the planar nature of board games. In particular, it is pro...
     
Statistical database design
Found in: ACM Transactions on Database Systems (TODS)
By Francis Y. Chin, Gultekin Ozsoyoglu
Issue Date:March 1981
pp. 113-139
The security problem of a statistical database is to limit the use of the database so that no sequence of statistical queries is sufficient to deduce confidential or private information. In this paper it is suggested that the problem be investigated at the...
     
Bounds on Schedules for Independent Tasks with Similar Execution Times
Found in: Journal of the ACM (JACM)
By Francis Y. Chin, James O. Achugbue
Issue Date:January 1981
pp. 81-99
It is shown that, given an arbitrary GO position on an n × n board, the problem of determining the winner is Pspace hard. New techniques are exploited to overcome the difficulties arising from the planar nature of board games. In particular, it is pro...
     
Security in statistical databases for queries with small counts
Found in: ACM Transactions on Database Systems (TODS)
By Francis Y. Chin
Issue Date:March 1978
pp. 92-104
The security problem of statistical databases containing anonymous but individual records which may be evaluated by queries about sums and averages is considered. A model, more realistic than the previous ones, is proposed, in which nonexisting records for...
     
A study on the protection of statistical data bases
Found in: Proceedings of the 1977 ACM SIGMOD international conference on Management of data (SIGMOD '77)
By C. T. Yu, F. Y. Chin
Issue Date:August 1977
pp. 169-181
We study a number of protection schemes with respect to their effectiveness in providing security for statistical data bases, their feasibility and their ease of implementation. A new method is proposed, and two implementations presented. One implementatio...
     
 1