• Title/Summary/Keyword: Needham problem

Search Result 3, Processing Time 0.018 seconds

Needham Revisited : Chinese Medicine and Modernity (니덤을 다시 생각한다 : 중국의학과 근대성)

  • Song, Seok Mo;Lee, Kwang Gye;Lee, Sang Ryong
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.27 no.5
    • /
    • pp.520-529
    • /
    • 2013
  • Needham Problem(NP) is the influential question that English historian of Chinese science Joseph Needham raised, "Why modern science had not developed in the Chinese civilisation but only in that of Europe?" Our objectives in this paper are as follows: First, we will revisit NP in the broad context of the emergence of modernity rather than treating it just as an internal problem of Chinese science. After that, the problem of modernity in Chinese medicine will be discussed from the viewpoint of NP. After NP's intellectual backgrounds are summarized, its value and implications are examined, and then Needham's own answers are presented. Afterwards, we present supplementary hypotheses, adapted from Weber, as our solution to NP in Chinese science and medicine. Needham thought that the European scientific revolution would not have been possible without the rise of modern capitalism. He also believed that Chinese bureaucratism facilitated early development of Chinese science and in turn, inhibited later radical change by interrupting the rise of capitalism. According to our hypotheses, scientific changes are related to social changes, especially to the legitimation crises, which lead to the alternations of mode of justification in sciences. The Chinese society did not go through the legitimation crises as the European society did, and therefore it failed to produce a radically different kind of justification from the traditional one. This is the reason why there was no revolution in science and medicine in China.

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

  • Lu, Yanrong;Li, Lixiang;Peng, Haipeng;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1273-1288
    • /
    • 2016
  • With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari's scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.