<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zi-Yao Cheng</style></author><author><style face="normal" font="default" size="100%">Yun Liu</style></author><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Chen-Xu Liu</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Novel Biometric-Based Remote User Authentication Scheme Using Quadratic Residues</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information and Electronics Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July 2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">3</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zi-Yao Cheng</style></author><author><style face="normal" font="default" size="100%">Yun Liu</style></author><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Shih-Chang Chang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Improved Protocol for Password Authentication Using Smart Cards</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jung-San Lee</style></author><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Choosing t-out-of-n Secrets by Oblivious Transfer</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Communications</style></keyword><keyword><style  face="normal" font="default" size="100%">Generalized Chinese Remainder Theorem</style></keyword><keyword><style  face="normal" font="default" size="100%">Oblivious Transfer</style></keyword><keyword><style  face="normal" font="default" size="100%">Secrets Exchange.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">67-84</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Oblivious Transfer (OT) has been regarded as one of the most significant cryptography tools in recent decades. Since the mechanism of OT is widely used in many applications such as e-commerce, secret information exchange, and games, various OT schemes have been proposed to improve its functionality and efficiency. In 2001, Naor and Pinkas proposed a secure 1-out-of-n OT protocol, in which the sender has n messages and the chooser can get one of these n messages in each protocol run. What is more, the sender cannot find which message has been chosen by the chooser and the chooser knows only the correct message. In 2004, Wakaha and Ryota proposed a secure t-out-of-n OT protocol, which is an extension of the 1-out-of-n OT protocol proposed by Naor and Pinkas. Wakaha and Ryota’s t-out-of-n OT protocol allows the chooser to get t messages from the sender simultaneously in each protocol run. Besides, the sender cannot know what the chooser has chosen and the chooser can only know the exact t messages. However, getting deep understanding of Wakaha and Ryota’s protocol, it could be concluded that it still lacks efficiency such that it is hard to be applied in real-world applications. In this article, a secure and efficient t-out-of-n OT protocol based on the Generalized Chinese Remainder Theorem is proposed, in which the chooser can securely get t messages from the sender simultaneously in each protocol run. The efficiency of the proposed t-out-of-n OT protocol is higher than that of Wakaha and Ryota’s protocol in terms of practical application.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Jung-San Lee</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Efficient and Secure Remote Authentication Scheme Using Smart Cards</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Communications</style></keyword><keyword><style  face="normal" font="default" size="100%">Remote Authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Resource Protection</style></keyword><keyword><style  face="normal" font="default" size="100%">Smart Cards</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">122-133</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Security of data communication becomes a crucial challenge due to the rapid development of computer and information technologies. To ensure security of resource transmission, engineers have proposed numerous schemes for protection. Among them, the remote password authentication schemes using smart cards are regarded as very efficient. As a result, smart-card based authentication schemes has become a popular research topic in recent years. In 2000, Hwang and Li proposed a new remote authentication scheme using smart cards based on ElGamal’s crypto-system. Unfortunately, the scheme Hwang and Li propose suffers from some security flaws. In this article, the authors propose a practical and secure version providing mutual authentication, increasing the authentication efficiency, and allowing the user to choose and change his/her password at will.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ya-Fen Chang</style></author><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Efficient and Practical Remote User Authentication Scheme</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Password Authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Password Guessing Attacks.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">75-88</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In 2000, Peyravian and Zunic proposed a simple and efficient password authentication scheme based on the collision-resistant hash function. Later, Hwang and Yeh indicated that Peyravian and Zunic’s scheme is insecure and proposed an improvement by using the server’s public key. Nevertheless, in practice, services that do not use public keys are quite often superior to PKIs. At the same time, Lee, Li and Hwang indicated that Peyravian and Zunic’s scheme suffers from off-line password guessing attacks and presented an improved version. However, Lee-Li-Hwang’s proposed scheme is still vulnerable to the same attacks and denial-of-service attacks. Therefore, this article presents a secure and efficient improvement.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chao-Wen Chan</style></author><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Novel Lower Cost Crypto-Scheme Based on the Theory of Sharing Secrets</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Entropy</style></keyword><keyword><style  face="normal" font="default" size="100%">One-Way Hash Function</style></keyword><keyword><style  face="normal" font="default" size="100%">One-Way Property</style></keyword><keyword><style  face="normal" font="default" size="100%">Pseudo-Random Number Generator.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">89-109</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents an information permutation and breaking scheme to construct a low-cost encryption scheme. The proposed encryption scheme preserves the security requirements of a general encryption scheme. The presented research uses information entropy to depict the one-way property and tries to use entropy to study the one-way property. The authors also present an estimation of the reasonable size of the seed set of a pseudo-random number generator.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yeu-Pong Lai</style></author><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Parallel Computational Algorithms for Generalized Chinese Remainder Theorem</style></title><secondary-title><style face="normal" font="default" size="100%">Computers and Electrical Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">801-811</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">8</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iuon-Chang Lin</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Enhancement for Anonymous Secure e-Voting over a Network</style></title><secondary-title><style face="normal" font="default" size="100%">Computer Standards &amp; Interfaces</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><volume><style face="normal" font="default" size="100%">25</style></volume><pages><style face="normal" font="default" size="100%">131-139</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Kuo-Feng Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards</style></title><secondary-title><style face="normal" font="default" size="100%">Informatica</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">14</style></volume><pages><style face="normal" font="default" size="100%">289-294</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Ju Yuan Hsiao</style></author><author><style face="normal" font="default" size="100%">Jyh-Chiang Yeh</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform</style></title><secondary-title><style face="normal" font="default" size="100%">The Imaging Science Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><pages><style face="normal" font="default" size="100%">133-140</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Kuo-Feng Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Digital Watermarking of Images Using Neural Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Electronic Imaging</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">548-555</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Kuo-Feng Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Digital Watermarking Scheme Using Human Visual Effects</style></title><secondary-title><style face="normal" font="default" size="100%">Informatica: An International Journal of Computing and Informatics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><volume><style face="normal" font="default" size="100%">24</style></volume><pages><style face="normal" font="default" size="100%">505-511</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Wen-Yuan Liao</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Remote Password Authentication Scheme Based upon ElGamal’s Signature Scheme</style></title><secondary-title><style face="normal" font="default" size="100%">Computers &amp; Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1994</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 1994</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">13</style></volume><pages><style face="normal" font="default" size="100%">137-144</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Shin-Jia Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Using Smart Cards to Authenticate Remote Passwords</style></title><secondary-title><style face="normal" font="default" size="100%">Computers and Mathematics with Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1993</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1993</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">26</style></volume><pages><style face="normal" font="default" size="100%">19-27</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">7</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">C. S. Liah</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Comment on Remote Password Authentication with Smart Cards</style></title><secondary-title><style face="normal" font="default" size="100%">IEE Proceedings-E</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1992</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1992</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">139</style></volume><pages><style face="normal" font="default" size="100%">372-372</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chin-Chen Chang</style></author><author><style face="normal" font="default" size="100%">Tzong-Chen Wu</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Remote Password Authentication with Smart Cards</style></title><secondary-title><style face="normal" font="default" size="100%">IEE Proceedings – Part E</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1991</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1991</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">138</style></volume><pages><style face="normal" font="default" size="100%">165-168</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record></records></xml>