Kai Chain
R.O.C Military Academy
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kai Chain.
International Journal of Communication Systems | 2017
Kai Chain; Kuei-Hu Chang; Wen Chung Kuo; Jar-Ferr Yang
SUMMARY Application of authentication protocol and key exchange scheme are major research issues in current internet, and entity identification (users or servers) accuracy and security are thereby safeguarded by various types of verification programs. Therefore, in the last 10 years, it was accompanied with productive discussions, but those discussions mainly focus on single issues, and because of the lack of security, there still existed improvements. The concept of zero-knowledge proofs is well suited for the identification and signing within network system, which has been widely used since proposed in 1985. However, common identification methods are only fit for individual user. In an increasingly complex network environment of today, information is usually conveyed through many unidentified servers, as a result, we have to encrypt messages by adopting different kinds of session keys. As for the chaotic maps technology, it also serves as a new encryption technology, widely adopted in communication protocols and key agreements over the years. As a consequence, in this study, we are going to propose an authentication protocol with key exchange function by taking advantage of characters of zero-knowledge proofs and chaotic maps, as well as adopt the BAN-logic to prove the security of this protocol. This study also compares the results of the security analysis of our protocol and related works. As a result, our proposed protocol has more security than others. Copyright
PLOS ONE | 2016
Kuei-Hu Chang; Yung-Chia Chang; Kai Chain; Hsiang-Yu Chung
The advancement of high technologies and the arrival of the information age have caused changes to the modern warfare. The military forces of many countries have replaced partially real training drills with training simulation systems to achieve combat readiness. However, considerable types of training simulation systems are used in military settings. In addition, differences in system set up time, functions, the environment, and the competency of system operators, as well as incomplete information have made it difficult to evaluate the performance of training simulation systems. To address the aforementioned problems, this study integrated analytic hierarchy process, soft set theory, and the fuzzy linguistic representation model to evaluate the performance of various training simulation systems. Furthermore, importance–performance analysis was adopted to examine the influence of saving costs and training safety of training simulation systems. The findings of this study are expected to facilitate applying military training simulation systems, avoiding wasting of resources (e.g., low utility and idle time), and providing data for subsequent applications and analysis. To verify the method proposed in this study, the numerical examples of the performance evaluation of training simulation systems were adopted and compared with the numerical results of an AHP and a novel AHP-based ranking technique. The results verified that not only could expert-provided questionnaire information be fully considered to lower the repetition rate of performance ranking, but a two-dimensional graph could also be used to help administrators allocate limited resources, thereby enhancing the investment benefits and training effectiveness of a training simulation system.
Journal of Testing and Evaluation | 2016
Kuei-Hu Chang; Kai Chain; Ta-Chun Wen; Gino K. Yang
Due to the progress of information technology and the era of globalization, supply chain management (SCM) is now the key activity to obtaining and maintaining the competitive advantage of firms in the global competitive environment. In order to maximize total supply chain profitability, supplier selection plays a very important role in supply chain management. However, the supplier selection process is a complex multiple-criteria decision making (MCDM) problem where both qualitative and quantitative aspects need to be considered. Moreover, there are many unknown, partly known, missing, or inexistent data in the process of collecting data from the supplier selection, increasing the difficulty of supplier selection. It cannot be fully solved by the traditional analytical hierarchy process (AHP) method. Therefore, this study integrated the AHP and the soft set approach for solving the supplier selection problem. The advantage of this proposed method in research is that it has not lost any expertise in providing useful information. A numerical example of the application was also presented. This study compared the results with the traditional AHP method for dealing with incomplete data. The results of the comparison showed that the approaches presented in this paper are preferable in terms of reflecting practical feasibility.
International Journal of Computers and Applications | 2015
Kai Chain; Wen-Chung Kuo; Kuei-Hu Chang
Abstract Due to certain subtle and intimate links between the properties of traditional cryptosystems and chaotic systems, the application of chaotic systems to cryptography has received much attention from researchers in various disciplines. Key agreement schemes ensure secure communication and help two or more communicating parties establish a shared secure session key. Recently, many key agreement schemes that are based on chaotic maps have been proposed, some of which still require verification tables and remain insecure. Thus, we proposed an enhancement scheme to overcome these weaknesses – a concrete key agreement scheme that is based on the special properties of chaotic maps. This scheme provides secret and authenticated communication session keys and prevents known-key attacks.
全國資訊安全會議 | 2011
Kai Chain; Jiin-Chiou Cheng; Jar-Ferr Yang
To avoid the overload or low usage rate of a single intrusion detection system (IDS) in network traffic flow over backbone networks, or campus networks, we design a distributed architecture system. We use active analysis to achieve intelligent assignment of work distribution by using game theory contrasting against the passive distribution methods proposed by previous works. The active mechanism improves the division of labor by dynamically loading the slave IDSs and can account for sudden increases in traffic or slave IDS crashes. The experimental results show that distributed architecture system maintains stable loading as a result of using the game theory. This feature allows better performance in the efficient use of IDS capacity.
International journal of security and its applications | 2012
Wen Chung Kuo; Kai Chain; Jiin Chiou Cheng; Jar-Ferr Yang
Applied Sciences | 2016
Kai Chain; Wen-Chung Kuo; Jiin-Chiou Cheng
Archive | 2013
Kai Chain; Wen-Chung Kuo; Jiin-Chiou Cheng
Archive | 2012
Kai Chain; Wen-Chung Kuo; Jiin-Chiou Cheng
international conference on applied system innovation | 2018
Kai Chain; Cheng-Chung Kuo; I-Hsien Liu; Jung-Shian Li; Chu-Sing Yang