dblp.uni-trier.dewww.uni-trier.de

Min-Shiang Hwang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
82EECheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng: A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. Int. J. Found. Comput. Sci. 20(2): 351-359 (2009)
2008
81EEChun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu: An electronic voting protocol with deniable authentication for mobile ad hoc networks. Computer Communications 31(10): 2534-2540 (2008)
80EEChun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications 31(12): 2803-2814 (2008)
79EEMin-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong: An improved address ownership in mobile IPv6. Computer Communications 31(14): 3250-3252 (2008)
78EEChun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu: Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications 31(18): 4255-4258 (2008)
77EEChung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang: A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software 81(1): 150-158 (2008)
76EECheng-Chi Lee, Min-Shiang Hwang, I-En Liao: A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communications and Mobile Computing 8(5): 661-672 (2008)
2007
75EEMin-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li: A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. ICCSA (3) 2007: 273-284
74EEHsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan: A simple mobile communication billing system among charged parties. Applied Mathematics and Computation 192(2): 487-495 (2007)
73EEShiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang: A new convertible authenticated encryption scheme with message linkages. Computers & Electrical Engineering 33(2): 133-138 (2007)
2006
72 I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang: Identity-based deniable authentication protocol from pairings. IMSA 2006: 112-114
71EEFeng Bao, Cheng-Chi Lee, Min-Shiang Hwang: Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Applied Mathematics and Computation 172(2): 1195-1200 (2006)
70EEMin-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, Yen-Ping Chu: Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows. IEICE Transactions 89-D(4): 1575-1577 (2006)
69EEI-En Liao, Cheng-Chi Lee, Min-Shiang Hwang: A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4): 727-740 (2006)
2005
68EELi-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang: Improvement of signature scheme based on factoring and discrete logarithms. Applied Mathematics and Computation 161(1): 49-54 (2005)
67EEEric Jui-Lin Lu, Min-Shiang Hwang, Cheng-Jian Huang: A new proxy signature scheme with revocation. Applied Mathematics and Computation 161(3): 799-806 (2005)
66EETing Yi Chang, Min-Shiang Hwang, Wei-Pang Yang: An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme. Applied Mathematics and Computation 163(1): 169-178 (2005)
65EECheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang: A new blind signature based on the discrete logarithm problem for untraceability. Applied Mathematics and Computation 164(3): 837-841 (2005)
64EEChwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang: Cryptanalysis of an authenticated encryption scheme using self-certified public keys. Applied Mathematics and Computation 166(1): 118-122 (2005)
63EEMin-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang: A time-stamping protocol for digital watermarking. Applied Mathematics and Computation 169(2): 1276-1284 (2005)
62EEMin-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu: Improvement on the flexible tree-based key management framework. Computers & Security 24(6): 500-504 (2005)
61EEIuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang: The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Des. Codes Cryptography 36(1): 53-67 (2005)
60EEHsien-Chu Wu, Min-Shiang Hwang, Chia-Hsin Liu: A Secure Strong-Password Authentication Protocol. Fundam. Inform. 68(4): 399-406 (2005)
59EECheng-Chi Lee, Ting Yi Chang, Min-Shiang Hwang: A simple broadcasting cryptosystem in computer networks using eXclusive-OR. IJCAT 24(3): 180-183 (2005)
58EEIuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang: A user authentication system using back-propagation network. Neural Computing and Applications 14(3): 243-249 (2005)
57EETing Yi Chang, Min-Shiang Hwang, Wei-Pang Yang: A new multi-stage secret sharing scheme using one-way function. Operating Systems Review 39(1): 48-55 (2005)
56EEMin-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, Chao-Chen Yang: A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography. Telecommunication Systems 29(3): 165-180 (2005)
2004
55EEMin-Shiang Hwang, Ting Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai: On the Security of an Enhanced Authentication Key Exchange Protocol. AINA (2) 2004: 160-163
54EEShiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang: An improvement of nonrepudiable threshold proxy signature scheme with known signers. Computers & Security 23(2): 174-178 (2004)
53EEMin-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu: Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack. Fundam. Inform. 61(3-4): 389-398 (2004)
52EEShiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang: A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Future Generation Comp. Syst. 20(5): 887-893 (2004)
51EETing Yi Chang, Chou Chen Yang, Min-Shiang Hwang: A threshold signature scheme for group communications without a shared distribution center. Future Generation Comp. Syst. 20(6): 1013-1021 (2004)
50EEShiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang: A new digital signature scheme based on factoring and discrete logarithms. Int. J. Comput. Math. 81(1): 9-14 (2004)
49EECheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang: On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software 73(3): 507-514 (2004)
48EECheng-Chi Lee, Min-Shiang Hwang, I-En Liao: A server assisted authentication protocol for detecting error vectors. Operating Systems Review 38(2): 93-96 (2004)
47EEMin-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee: A key authentication scheme with non-repudiation. Operating Systems Review 38(3): 75-78 (2004)
46EELi-Hua Li, Chi-Yu Liu, Min-Shiang Hwang: Cryptanalysis of an efficient secure group signature scheme. Operating Systems Review 38(4): 66-69 (2004)
2003
45EEMin-Shiang Hwang, Wen-Guey Tzeng: A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. ICOIN 2003: 757-761
44EELi-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang: Generalization of proxy signature-based on discrete logarithms. Computers & Security 22(3): 245-255 (2003)
43EEJau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang: Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security 22(7): 591-595 (2003)
42EECheng-Chi Lee, Wei-Pang Yang, Min-Shiang Hwang: Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem. Fundam. Inform. 55(3-4): 307-320 (2003)
41EEIuon-Chang Lin, Min-Shiang Hwang, Li-Hua Li: A new remote user authentication scheme for multi-server architecture. Future Generation Comp. Syst. 19(1): 13-22 (2003)
40EEIuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang: A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Comp. Syst. 19(4): 457-462 (2003)
39EEMin-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin: A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Trans. Knowl. Data Eng. 15(6): 1552-1560 (2003)
38EEChou Chen Yang, Ting Yi Chang, Jian Wei Li, Min-Shiang Hwang: Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem. Informatica, Lith. Acad. Sci. 14(1): 111-120 (2003)
37EEChwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang: Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. Informatica, Lith. Acad. Sci. 14(3): 393-402 (2003)
36EEChou Chen Yang, Ting Yi Chang, Min-Shiang Hwang: Security of Improvement on Methods for Protecting Password Transmission. Informatica, Lith. Acad. Sci. 14(4): 551-558 (2003)
35EEShin-Jia Hwang, Min-Shiang Hwang, Shiang-Feng Tzeng: A New Digital Multisignature Scheme With Distinguished Signing Authorities. J. Inf. Sci. Eng. 19(5): 881-887 (2003)
34EEMin-Shiang Hwang, Wei-Pang Yang: Controlling access in large partially ordered hierarchies using cryptographic keys. Journal of Systems and Software 67(2): 99-107 (2003)
33EEChih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang: Security enhancement for Optimal Strong-Password Authentication protocol. Operating Systems Review 37(2): 7-12 (2003)
32EEChih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang: Security enhancement for optimal strong-password authentication protocol. Operating Systems Review 37(3): 12-16 (2003)
31EEMin-Shiang Hwang, Chao-Chen Yang, Cheng-Yeh Shiu: An authentication scheme for mobile satellite communication systems. Operating Systems Review 37(4): 42-47 (2003)
2002
30EEChou Chen Yang, Min-Shiang Hwang, Jian Wei Li, Ting Yi Chang: A Solution to Mobile IP Registration for AAA. CDMA International Conference 2002: 329-337
29EEMin-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin: Adding timestamps to the secure electronic auction protocol. Data Knowl. Eng. 40(2): 155-162 (2002)
28EEMin-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang: Cryptanalysis of the Hwang-Shi Proxy Signature Scheme. Fundam. Inform. 53(2): 131-134 (2002)
27EEMin-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang: An ElGamal-Like Cryptosystem for Enciphering Large Messages. IEEE Trans. Knowl. Data Eng. 14(2): 445-446 (2002)
26EEChin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang: A Feature-Oriented Copyright Owner Proving Technique for Still Images. International Journal of Software Engineering and Knowledge Engineering 12(3): 317- (2002)
25EEMin-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang: Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. J. Inf. Sci. Eng. 18(3): 373-379 (2002)
24EEMin-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang: Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. J. Inf. Sci. Eng. 18(3): 373-379 (2002)
23EECheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang: A flexible remote user authentication scheme using smart cards. Operating Systems Review 36(3): 46-52 (2002)
22EECheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang: A remote user authentication scheme using hash functions. Operating Systems Review 36(4): 23-29 (2002)
2001
21EEMin-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang: Two Simple Batch Verifying Multiple Digital Signatures. ICICS 2001: 233-237
20EEMin-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang: An Improvement of SPLICE/AS in WIDE against Guessing Attack. Informatica, Lith. Acad. Sci. 12(2): 297-302 (2001)
19EEMin-Shiang Hwang, Iuon-Chang Lin, Li-Hua Li: A simple micro-payment scheme. Journal of Systems and Software 55(3): 221-229 (2001)
18EEChin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen: A new encryption algorithm for image cryptosystems. Journal of Systems and Software 58(2): 83-91 (2001)
2000
17EEIuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang: Security Enhancement for the "Simple Authentication Key Agreement Algorithm". COMPSAC 2000: 113-115
16EEMin-Shiang Hwang: Cryptanalysis of YCN key assignment scheme in a hierarchy. Inf. Process. Lett. 73(3-4): 97-101 (2000)
15 Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang: A Digital Watermarking Scheme Using Human Visual Effects. Informatica (Slovenia) 24(4): (2000)
14EEMin-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang: Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures. Informatica, Lith. Acad. Sci. 11(1): 15-19 (2000)
13EEMin-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu: A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica, Lith. Acad. Sci. 11(2): 137-144 (2000)
12EEMin-Shiang Hwang: A New Redundancy Reducing Cipher. Informatica, Lith. Acad. Sci. 11(4): 435-440 (2000)
1999
11EEMin-Shiang Hwang: Cryptanalysis of a remote login authentication scheme. Computer Communications 22(8): 742-744 (1999)
10EECheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang: A Novel Application of the Phone Card and Its Authentication in Mobile Communications. J. Inf. Sci. Eng. 15(4): 471-484 (1999)
9 Min-Shiang Hwang: A Dynamic Key Generation Scheme for Access Control in a Hierarchy. Nord. J. Comput. 6(4): 363-371 (1999)
8EEChii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang: Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks 5(4): 231-243 (1999)
1998
7EETung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang: A virtual image cryptosystem based upon vector quantization. IEEE Transactions on Image Processing 7(10): 1485-1488 (1998)
1997
6EEMin-Shiang Hwang, Wei-Pang Yang: Multilevel Secure Database Encryption with Subkeys. Data Knowl. Eng. 22(2): 117-131 (1997)
1996
5 Chii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang: Phone Card Application and Authentication in Wireless Communications. IFIP World Conference on Mobile Communications 1996: 323-329
4EEMin-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang: An access control scheme based on Chinese remainder theorem and time stamp concept. Computers & Security 15(1): 73-81 (1996)
1995
3 Min-Shiang Hwang, Wei-Pang Yang: Conference Key Distribution Schemes for Secure Digital Mobile Communications. IEEE Journal on Selected Areas in Communications 13(2): 416-420 (1995)
2EEMin-Shiang Hwang, Wei-Pang Yang: A two-phase encryption scheme for enhancing database security. Journal of Systems and Software 31(3): 257-265 (1995)
1994
1 Min-Shiang Hwang, Wei-Pang Yang: A New Dynamic Access Control Scheme Based on Subject-Object List. Data Knowl. Eng. 14(1): 45-56 (1994)

Coauthor Index

1Feng Bao [71]
2Chin-Chen Chang [7] [15] [17] [18] [26] [27] [40] [61] [63]
3Ting Yi Chang [24] [25] [30] [36] [38] [51] [55] [57] [59] [66]
4Tung-Shou Chen [7] [18]
5Song-Kong Chong [79]
6Yen-Ping Chu [70] [78] [80]
7Shu-Yin Hsiao [70]
8Cheng-Jian Huang [67]
9Kuo-Feng Hwang [14] [15] [26] [27] [63]
10Shin-Jia Hwang [28] [35]
11Jinn-ke Jan [74]
12Cheng-Chi Lee [10] [20] [21] [22] [23] [24] [25] [28] [42] [47] [48] [56] [59] [65] [69] [71] [72] [76] [79] [82]
13Chii-Hwa Lee [5] [8]
14Ji-Zhe Lee [56]
15Chun-Ta Li [75] [78] [80] [81]
16Jian Wei Li [30] [38]
17Li-Hua Li [19] [22] [41] [44] [46] [47] [68]
18I-En Liao [48] [69] [72] [76]
19Chih-Wei Lin [32] [33] [43]
20Iuon-Chang Lin [13] [14] [17] [19] [29] [39] [40] [41] [58] [61]
21Shu-Chen Lin [55] [64]
22Chi-Yu Liu [46] [81]
23Chia-Hsin Liu [53] [60] [62]
24Jung-Wen Lo [53] [62] [70]
25Eric Jui-Lin Lu [13] [29] [39] [67]
26Hsia-Hung Ou [58] [74]
27Jau-Ji Shen [32] [33] [43]
28Cheng-Yeh Shiu [31]
29Yuan-Liang Tang [20] [21] [73]
30Chwei-Shyong Tsai [37] [55] [64] [77]
31Shiang-Feng Tzeng [35] [37] [44] [49] [50] [52] [54] [68] [73] [75] [82]
32Wen-Guey Tzeng [4] [45]
33Chung-Ming Wang [77]
34Hsien-Chu Wu [60]
35Nan-I Wu [77]
36Chao-Chen Yang [31] [56]
37Cheng-Ying Yang [49] [50] [52] [54]
38Chou Chen Yang [30] [36] [38] [51]
39Wei-Pang Yang [1] [2] [3] [4] [5] [6] [8] [10] [23] [34] [42] [57] [65] [66]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)