Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kai Chain is active.

Publication


Featured researches published by Kai Chain.


International Journal of Communication Systems | 2017

Enhancement authentication protocol using zero-knowledge proofs and chaotic maps

Kai Chain; Kuei-Hu Chang; Wen Chung Kuo; Jar-Ferr Yang

SUMMARY Application of authentication protocol and key exchange scheme are major research issues in current internet, and entity identification (users or servers) accuracy and security are thereby safeguarded by various types of verification programs. Therefore, in the last 10 years, it was accompanied with productive discussions, but those discussions mainly focus on single issues, and because of the lack of security, there still existed improvements. The concept of zero-knowledge proofs is well suited for the identification and signing within network system, which has been widely used since proposed in 1985. However, common identification methods are only fit for individual user. In an increasingly complex network environment of today, information is usually conveyed through many unidentified servers, as a result, we have to encrypt messages by adopting different kinds of session keys. As for the chaotic maps technology, it also serves as a new encryption technology, widely adopted in communication protocols and key agreements over the years. As a consequence, in this study, we are going to propose an authentication protocol with key exchange function by taking advantage of characters of zero-knowledge proofs and chaotic maps, as well as adopt the BAN-logic to prove the security of this protocol. This study also compares the results of the security analysis of our protocol and related works. As a result, our proposed protocol has more security than others. Copyright


PLOS ONE | 2016

Integrating Soft Set Theory and Fuzzy Linguistic Model to Evaluate the Performance of Training Simulation Systems

Kuei-Hu Chang; Yung-Chia Chang; Kai Chain; Hsiang-Yu Chung

The advancement of high technologies and the arrival of the information age have caused changes to the modern warfare. The military forces of many countries have replaced partially real training drills with training simulation systems to achieve combat readiness. However, considerable types of training simulation systems are used in military settings. In addition, differences in system set up time, functions, the environment, and the competency of system operators, as well as incomplete information have made it difficult to evaluate the performance of training simulation systems. To address the aforementioned problems, this study integrated analytic hierarchy process, soft set theory, and the fuzzy linguistic representation model to evaluate the performance of various training simulation systems. Furthermore, importance–performance analysis was adopted to examine the influence of saving costs and training safety of training simulation systems. The findings of this study are expected to facilitate applying military training simulation systems, avoiding wasting of resources (e.g., low utility and idle time), and providing data for subsequent applications and analysis. To verify the method proposed in this study, the numerical examples of the performance evaluation of training simulation systems were adopted and compared with the numerical results of an AHP and a novel AHP-based ranking technique. The results verified that not only could expert-provided questionnaire information be fully considered to lower the repetition rate of performance ranking, but a two-dimensional graph could also be used to help administrators allocate limited resources, thereby enhancing the investment benefits and training effectiveness of a training simulation system.


Journal of Testing and Evaluation | 2016

A Novel General Approach for Solving a Supplier Selection Problem

Kuei-Hu Chang; Kai Chain; Ta-Chun Wen; Gino K. Yang

Due to the progress of information technology and the era of globalization, supply chain management (SCM) is now the key activity to obtaining and maintaining the competitive advantage of firms in the global competitive environment. In order to maximize total supply chain profitability, supplier selection plays a very important role in supply chain management. However, the supplier selection process is a complex multiple-criteria decision making (MCDM) problem where both qualitative and quantitative aspects need to be considered. Moreover, there are many unknown, partly known, missing, or inexistent data in the process of collecting data from the supplier selection, increasing the difficulty of supplier selection. It cannot be fully solved by the traditional analytical hierarchy process (AHP) method. Therefore, this study integrated the AHP and the soft set approach for solving the supplier selection problem. The advantage of this proposed method in research is that it has not lost any expertise in providing useful information. A numerical example of the application was also presented. This study compared the results with the traditional AHP method for dealing with incomplete data. The results of the comparison showed that the approaches presented in this paper are preferable in terms of reflecting practical feasibility.


International Journal of Computers and Applications | 2015

Enhancement key agreement scheme based on chaotic maps

Kai Chain; Wen-Chung Kuo; Kuei-Hu Chang

Abstract Due to certain subtle and intimate links between the properties of traditional cryptosystems and chaotic systems, the application of chaotic systems to cryptography has received much attention from researchers in various disciplines. Key agreement schemes ensure secure communication and help two or more communicating parties establish a shared secure session key. Recently, many key agreement schemes that are based on chaotic maps have been proposed, some of which still require verification tables and remain insecure. Thus, we proposed an enhancement scheme to overcome these weaknesses – a concrete key agreement scheme that is based on the special properties of chaotic maps. This scheme provides secret and authenticated communication session keys and prevents known-key attacks.


全國資訊安全會議 | 2011

Game Theory Based Distributed Intrusion Detection System for Network Traffic Distribution

Kai Chain; Jiin-Chiou Cheng; Jar-Ferr Yang

To avoid the overload or low usage rate of a single intrusion detection system (IDS) in network traffic flow over backbone networks, or campus networks, we design a distributed architecture system. We use active analysis to achieve intelligent assignment of work distribution by using game theory contrasting against the passive distribution methods proposed by previous works. The active mechanism improves the division of labor by dynamically loading the slave IDSs and can account for sudden increases in traffic or slave IDS crashes. The experimental results show that distributed architecture system maintains stable loading as a result of using the game theory. This feature allows better performance in the efficient use of IDS capacity.


International journal of security and its applications | 2012

An enhanced robust and efficient password-authenticated key agreement using smart cards

Wen Chung Kuo; Kai Chain; Jiin Chiou Cheng; Jar-Ferr Yang


Applied Sciences | 2016

A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

Kai Chain; Wen-Chung Kuo; Jiin-Chiou Cheng


Archive | 2013

A Secure Password-Authenticated Key Agreement Using Smart Cards

Kai Chain; Wen-Chung Kuo; Jiin-Chiou Cheng


Archive | 2012

An Improved Secure Anonymous Protocol for Distributed Computer Networks

Kai Chain; Wen-Chung Kuo; Jiin-Chiou Cheng


international conference on applied system innovation | 2018

Design and implement of capture the flag based on cloud offense and defense platform

Kai Chain; Cheng-Chung Kuo; I-Hsien Liu; Jung-Shian Li; Chu-Sing Yang

Collaboration


Dive into the Kai Chain's collaboration.

Top Co-Authors

Avatar

Jar-Ferr Yang

National Cheng Kung University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wen-Chung Kuo

National Formosa University

View shared research outputs
Top Co-Authors

Avatar

Wen Chung Kuo

National Yunlin University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Cheng-Chung Kuo

National Cheng Kung University

View shared research outputs
Top Co-Authors

Avatar

Chu-Sing Yang

National Cheng Kung University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hsiang-Yu Chung

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

I-Hsien Liu

National Cheng Kung University

View shared research outputs
Top Co-Authors

Avatar

Jiin Chiou Cheng

National Taiwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge