oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 1 )

2018 ( 13 )

2017 ( 13 )

2016 ( 22 )

Custom range...

Search Results: 1 - 10 of 4131 matches for " Jue-Sam Chou "
All listed articles are free for downloading (OA Articles)
Page 1 /4131
Display every page Item
A Novel Anonymous Proxy Signature Scheme
Jue-Sam Chou
Advances in Multimedia , 2012, DOI: 10.1155/2012/427961
Abstract: Recently, several studies about proxy signature schemes have been conducted. In 2009, Yu et al. proposed an anonymous proxy signature scheme attempting to protect the proxy signer's privacy from outsiders. They claimed that their scheme can make the proxy signer anonymous. However, based on our research, we determined that this was not the case and the proxy signer's privacy was not anonymous. Hence, in this paper, we propose a new anonymous proxy signature scheme that truly makes the proxy signer anonymous while making it more secure and efficient when compared with Yu et al.'s scheme. Our proxy signature scheme consists of two contributions. First, we mainly use random numbers and bilinear pairings to attain the anonymous property. Secondly, we increase the security and efficiency of our proxy in the design.
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Jue-Sam Chou
Advances in Multimedia , 2012, DOI: 10.1155/2012/630610
Abstract: Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, and k-out-of-n OT. In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. Therefore, when used in certain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure the security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in terms of communicational cost, which is a significant concern for generic commercial transactions. Therefore, we propose a novel k-out-of-n oblivious transfer protocol based on bilinear pairing, which not only satisfies the requirements of a k-out-of-n OT protocol, but also provides mutual authentication to resist malicious attacks. Meanwhile, it is efficient in terms of communication cost. 1. Introduction An oblivious transfer (OT) is an important primitive for designing security services. It can be used in various applications like the signing of fair contracts, oblivious database searches, mental poker games, privacy-preserving auctions, secure multiparty computations [1], and so on. In 1981, Rabin [2] first proposed an interactive OT scheme in which the probability of the receiver’s capability to decrypt a message sent by the sender is 1/2. Rabin used the proposed OT to design a 3-pass secret exchange (EOS) protocol, hoping that two parties can exchange their secrets fairly. In 1985, Even et al. [3] presented a more generalized OT, called 1-out-of-2 OT ( ), in which a sender sends two encrypted messages to a chooser with only one of which the chooser can decrypt. They also presented a contract-signing protocol by evoking multiple times to prevent one party from obtaining the other party’s contract signature without first showing his own. In 1986, Brassard et al. [4] further extended into a 1-out-of-n OT ( , also known as “all-or-nothing”), in which only one out of n sent messages can actually be obtained by the chooser. The authors pointed out that their scheme can be used to implement a multiparty mental poker game [5] against a player coalition. In contrast to the interactive versions described above, Bellare and Micali [6] first proposed a noninteractive scheme in 1989. In this scheme, a user obliviously transfers two messages to another party equipped with two public keys to decrypt one of the messages. From 1999 to
Cryptanalysis on Four Two-Party Authentication Protocols
Yalin Chen,Jue-Sam Chou*,Chun-Hui Huang
Computer Science , 2010,
Abstract: In this paper, we analyze four authentication protocols of Bindu et al., Goriparthi et al., Wang et al. and H\"olbl et al.. After investigation, we reveal several weaknesses of these schemes. First, Bindu et al.'s protocol suffers from an insider impersonation attack if a malicious user obtains a lost smart card. Second, both Goriparthi et al.'s and Wang et al.'s protocols cannot withstand a DoS attack in the password change phase, i.e. an attacker can involve the phase to make user's password never be used in subsequent authentications. Third, H\"olbl et al.'s protocol is vulnerable to an insider attack since a legal but malevolent user can deduce KGC's secret key.
Comments on Five Smart Card Based Password Authentication Protocols
Yalin Chen,Jue-Sam Chou*,Chun-Hui Huang
Computer Science , 2010,
Abstract: In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.'s , Hsiang et al.'s, Kim et al.'s, and Li et al.'s all suffer from offline password guessing attack if the smart card is lost, and the protocol of Xu et al.'s is subjected to an insider impersonation attack.
The Value of Music in Children’s Enlightenment Education  [PDF]
Jue Zhou
Open Journal of Social Sciences (JSS) , 2015, DOI: 10.4236/jss.2015.312023
Abstract: A large number of theories and experiments have shown that music plays positive effect on children’s growth. Children who have received music education often show outstanding creativity and imagination in their school lives, compared with their peers who have not get any musical training. Just as famous educator Dr. Hans Gunther Bastian has once proposed: “music makes people smart”. Learning music can not only improve children’s intelligence and morality which contributes to the development of their personality, but also can improve their aesthetic ability. Cultivate music to children is an essential progress to promote all-ground education.
Service System Decoupling for Mass Customization: A Case Study in Catering Services  [PDF]
Jue CHEN, Yunhong HAO
Journal of Service Science and Management (JSSM) , 2009, DOI: 10.4236/jssm.2009.24030
Abstract: The paper examines the key issues on system decoupling in service operations of mass customization by conducting a case study in catering services. It firstly justifies the effectiveness of applying concept of mass customization into service system decoupling to deal with the operation dilemma and then reveals the nature of decoupling decisions for mass customization purpose after discussions on the importance of modularization and the role of technologies including IT in the decoupling process. Based on these analyses, a Judgment-Matrix-based model on how to make the decoupling decisions in balancing the multiple operation objectives is then proposed and further research directions are finally suggested.
Nonzero Solutions of Generalized Variational Inequalities  [PDF]
Jue Li, Yisheng Lai
Applied Mathematics (AM) , 2010, DOI: 10.4236/am.2010.11010
Abstract: The existence of nonzero solutions for a class of generalized variational inequalities is studied by ?xed point index approach for multivalued mappings in ?nite dimensional spaces and re?exive Banach spaces. Some new existence theorems of nonzero solutions for this class of generalized variational inequalities are established.
The Impact of Radical Prostatectomy on the Survival of Patients with Carcinosarcoma of the Prostate  [PDF]
Jue Wang, Fenwei Wang
Journal of Cancer Therapy (JCT) , 2011, DOI: 10.4236/jct.2011.24064
Abstract: Background: The objective of this study was to evaluate the impact of radical prostatectomy on carcinosarcoma of the prostate. Methods: Patients diagnosed with carcinosarcoma of the prostate from 1977 through 2007 were identified in the Surveillance, Epidemiology, and End Results (SEER) database. Outcomes were examined with Kaplan-Meier survival analysis and Cox models. The association between clinical and demographic characteristics and survival of carcinosarcoma of the prostate was examined. Results: A total of fifty-four cases of histology confirmed carcinosarcoma of the prostate were identified. Median age of the patients was 74 years (range 28 - 94). Of the patients with a known tumor stage, all but one patient had a locally advanced or distant stage; all of the patients with known histology grade had poorly or undifferentiated histology. Twenty (37%) patients underwent transurethral resection only and Fourteen (25.9%) patients underwent radical prostatectomy. Eight (14%) patients received radiation therapy in combination with surgery. The median cancer specific survival was 16 months (95% CI 0 - 32 months). 1-, 3-, and 5- year cancer specific survival rate were 55.1%, 32.3% and 21.1%. In a multivariate analysis, radical prostatectomy was found to be a significant prognostic factor for cancer-specific survival. Conclusions: Carcinosarcoma of the prostate commonly occurs in older patients and associated with aggressive disease and poor prognosis. Radical prostatectomy is the only treatment modality that significantly improves survival. Emphasis on early diagnosis and detection and multimodality therapy of this disease is needed to improve the outcome for patients with this malignancy.
The Asymptotic Eigenvalues of First-Order Spectral Differentiation Matrices  [PDF]
Jue Wang, Fabian Waleffe
Journal of Applied Mathematics and Physics (JAMP) , 2014, DOI: 10.4236/jamp.2014.25022
Abstract: We complete and extend the asymptotic analysis of the spectrum of Jacobi Tau approximations that were first considered by Dubiner. The asymptotic formulas for Jacobi polynomials PN(α ,β ) ,α ,β > -1 are derived and confirmed by numerical approximations. More accurate results for the slowest decaying mode are obtained. We explain where the large negative eigenvalues come from. Furthermore, we show that a large negative eigenvalue of order N2 appears for -1 <α < 0 ; there are no large negative eigenvalues for collocations at Gauss-Lobatto points. The asymptotic results indicate unstable eigenvalues for α > 1 . The eigenvalues for Legendre polynomials are directly related to the roots of the spherical Bessel and Hankel functions that are involved in solving Helmholtz equation inspherical coordinates.
Anti-Proliferation and Anti-Invasion Effects of Diosgenin on Gastric Cancer BGC-823 Cells with HIF-1α shRNAs
Zhu-Jun Mao,Qian-Jue Tang,Ci-An Zhang,Zhi-Feng Qin,Bin Pang,Pin-kang Wei,Bo Liu,Yuan-Neng Chou
International Journal of Molecular Sciences , 2012, DOI: 10.3390/ijms13056521
Abstract: Drug resistance is a major factor for the limited efficacy of chemotherapy in gastric cancer treatment. Hypoxia-inducible factor-1α (HIF-1α), a central transcriptional factor in hypoxia, is suggested to participate in the resistance. Here, we identified a hypoxia-mimic (cobalt chloride) sensitive gastric cell line BGC-823 to explore whether diosgenin, an aglycone of steroidal saponins, can inhibit cancer cell invasion and survival of solid tumor in a hypoxic mimic microenvironment. We have shown that diosgenin is a potent candidate for decreasing the ability of invasion and survival in cobalt chloride treated BGC-823 cells. In addition, when combined with HIF-1α specific short hairpin RNA (shRNA), diosgenin can inhibit BGC-823 cells more effectively. The anti-invasion role of diosgenin may be related to E-cadherin, integrinα5 and integrinβ6. These results suggest that diosgenin may be a useful compound in controlling gastric cancer cells in hypoxia condition, especially when combined with down-regulated HIF-1α.
Page 1 /4131
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.