{"title":"Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme","authors":"Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung","doi":"10.1109/EEE.2004.1287367","DOIUrl":null,"url":null,"abstract":"Although the improved cryptographic key assignment scheme by Wen et al. resolved the inaccuracy and security leak in the CHW scheme, another kind of security leak was neglected, for which a solution is proposed herein.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EEE.2004.1287367","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Although the improved cryptographic key assignment scheme by Wen et al. resolved the inaccuracy and security leak in the CHW scheme, another kind of security leak was neglected, for which a solution is proposed herein.