Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chou Chen Yang is active.

Publication


Featured researches published by Chou Chen Yang.


IEEE Transactions on Consumer Electronics | 2004

Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards

Chou Chen Yang; Hung-Wen Yang; Ren-Chiun Wang

Recently, Yang and Shieh proposed two password authentication schemes. In 2002, Chan and Cheng pointed out that Yang and Shiehs timestamp-based authentication scheme was vulnerable to the forgery attack. In 2003, Sun and Yeh pointed out that Yang and Shiehs scheme was vulnerable to the forgery attack and explained Chan and Chengs attack was unreasonable. Later, Shen et al. modified Yang and Shiehs scheme to resist Chan and Chengs attack. However, in this paper, we shall point out that Shen et al.s improvement is still vulnerable to the forgery attack.


Applied Mathematics and Computation | 2005

A secure and efficient authentication protocol for anonymous channel in wireless communications

Chou Chen Yang; Yuan-Liang Tang; Ren-Chiun Wang; Hung-Wen Yang

For enhancing the efficiency and the security in anonymous channel of wireless systems, many protocols were proposed. However, most of them employed asymmetric cryptosystems to protect the identity of the mobile user. As we know, the drawbacks of asymmetric cryptosystem are complex and high computation cost. Therefore, if the wireless system is based on asymmetric cryptosystem, that is not convenience for the mobile device and infrastructure. Not only that, an important problem also exists in the previous protocols. That is when the mobile user copies his anonymous ticket and shares it with friends, the visiting network cannot discriminate the copy of the ticket. That seriously effects the right of the visiting network. In this paper, we shall propose a secure and efficient authentication protocol to withstand the above weakness without employing any asymmetric cryptosystems.


Iet Information Security | 2013

Enhanced digital rights management authentication scheme based on smart card

Hung-Wen Yang; Chou Chen Yang; Woei Lin

As a result of the explosive growth in development for computer networks and information technologies in recent years, various activities take place on the Internet, such as the multimedia services. Today, the distribution of large scale digital content (such as audio, video and images) has become easier and more efficient than ever before. However, the intellectual property violation of copyright-protected content has emerged as a major concern. Therefore digital contents are generally encrypted to prevent unauthorised access. A technology of digital rights management (DRM) refers to any of several encryption technologies used to protect digital contents against unauthorised copying, and to control the distribution of the content. Recently, Zhang et al. proposed a DRM authentication scheme based on smart card to realise session key exchange and mutual authentication among all the parties in DRM environment. The proposed scheme is efficient at server side and compact in smart card design. However, the authors will show their proposed scheme cannot resist insider attack and stolen smart card attack, then the authors will propose an improved scheme to preclude above weaknesses.


international conference on wireless communications and mobile computing | 2010

Authorized file-sharing system on P2P networks

Chou Chen Yang; Yi-Ru Lin; Ju-Chun Hsiao

Bit-Torrent is a well-known P2P application used to exchange digital content with high scalability. However, many users do not get authorization but transmit files through Bit-Torrent illegally. In this paper, we propose a DRM system that is suitable for the Bit-Torrent environment to protect copyrights, and also improve Chen et al.s scheme in computational efficiency and security aspects.


intelligent information hiding and multimedia signal processing | 2009

Identity-Based DRM in Ubiquitous Multimedia System

Chou Chen Yang; Ju-Chun Hsiao; Hung-Wen Yang

We will propose a novel identity-based DRM system to protect multimedia content that will be delivered in ubiquitous computing environment. When users take mobile devices and roam to different wireless network domains, our scheme can help the domain manager to establish a reliable environment with the DRM module that installed on users’ mobile device. By using identity-based encryption as DRM system, we simplify the authentication processing and provide more suitable to ubiquitous computing environment.


international conference on wireless communications and mobile computing | 2010

A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks

Chou Chen Yang; Hung-Wen Yang; Hui-Chuan Huang


電腦學刊 | 2009

Trusted DRM on P2P Network

Chou Chen Yang; Jyun-Yi Jiang; Ju-Chun Hsiao


Journal of Internet Technology | 2013

A Traceable and Fair Transaction Mechanism for Digital Rights Management on P2P Networks

Yi-Ju Lin; Hung-Wen Yang; Chou Chen Yang; Woei Lin


International Journal of Digital Content Technology and Its Applications | 2011

A Novel DRM Solution Based on 3G Security Architecture

Hung-Wen Yang; Chou Chen Yang; Woei Lin


International Journal on Advances in Information Sciences and Service Sciences | 2012

A Novel Authorized File-Sharing Protocol for P2P Networks

Hung-Wen Yang; Chou Chen Yang; Yi-Ju Lin; Woei Lin

Collaboration


Dive into the Chou Chen Yang's collaboration.

Top Co-Authors

Avatar

Hung-Wen Yang

Chaoyang University of Technology

View shared research outputs
Top Co-Authors

Avatar

Woei Lin

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Ju-Chun Hsiao

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Ren-Chiun Wang

Chaoyang University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yi-Ru Lin

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Yuan-Liang Tang

Chaoyang University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge