![]() In terms of convenience requirements, mobile communications have become one of the most important roam-ing services for wireless environments. Other opportunities include understanding the pricing and competitive effects in the perishable goods category sold in specialty, discount, and convenience stores. The areas that show high promise/opportunity are in the online setting for all types of goods-fashion, perishable and packaged staples, and durables-particularly with respect to pricing for profitability and understanding the impact of competition. We attempt to construct a general framework that enhances our understanding of the emerging research issues in the area of pricing and competitive effects, and we examine their implications for practice. In this paper, we focus on how pricing and competitive effects interact as a general phenomenon, particularly as it applies to retailing. Today, however, firms make a concerted effort to determine and quantify competitive effects. Until recently, retailers have taken an either/or approach to competition: either reacting fiercely to competitive price changes or ignoring them altogether. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency. ![]() Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. proposed a hash based RFID tag authentication protocol in TMIS. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. To prevent security weaknesses of Chang-Lee's e-voting scheme, in this paper, an improved version on their e-voting scheme is proposed that not only keeps the merits of Chang-Lee's e-voting scheme but also enhances the security of their e-voting scheme. Unfortunately, we found that Chang-Lee's e-voting scheme suffers from susceptibility to security attacks and some critical security requirements of their e-voting scheme may be compromised. They claimed that numerous essential requirements of general electronic voting can be ensured in their e-voting scheme. Recently, Chang and Lee presented an electronic voting (e-voting) scheme based on the blind signature and the Diffie-Hellman key exchange methods for ensuring voter anonymity and performance efficiency. Therefore, convenience and mobility make electronic voting become more and more popular and electronic voting can be adopted in the real world with higher feasibility. Compared electronic voting with traditional 1elections, an electronic voter is able to cast his/her ballot through the Internet in any place and at any time if he/she can access the network. Voter anonymity and voting correctness are important issues for electronic voting mechanisms.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |