2009 |
82 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
Shiang-Feng Tzeng:
A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem.
Int. J. Found. Comput. Sci. 20(2): 351-359 (2009) |
2008 |
81 | EE | Chun-Ta Li,
Min-Shiang Hwang,
Chi-Yu Liu:
An electronic voting protocol with deniable authentication for mobile ad hoc networks.
Computer Communications 31(10): 2534-2540 (2008) |
80 | EE | Chun-Ta Li,
Min-Shiang Hwang,
Yen-Ping Chu:
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks.
Computer Communications 31(12): 2803-2814 (2008) |
79 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Song-Kong Chong:
An improved address ownership in mobile IPv6.
Computer Communications 31(14): 3250-3252 (2008) |
78 | EE | Chun-Ta Li,
Min-Shiang Hwang,
Yen-Ping Chu:
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments.
Computer Communications 31(18): 4255-4258 (2008) |
77 | EE | Chung-Ming Wang,
Nan-I Wu,
Chwei-Shyong Tsai,
Min-Shiang Hwang:
A high quality steganographic method with pixel-value differencing and modulus function.
Journal of Systems and Software 81(1): 150-158 (2008) |
76 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
I-En Liao:
A new authentication protocol based on pointer forwarding for mobile communications.
Wireless Communications and Mobile Computing 8(5): 661-672 (2008) |
2007 |
75 | EE | Min-Shiang Hwang,
Shiang-Feng Tzeng,
Chun-Ta Li:
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period.
ICCSA (3) 2007: 273-284 |
74 | EE | Hsia-Hung Ou,
Min-Shiang Hwang,
Jinn-ke Jan:
A simple mobile communication billing system among charged parties.
Applied Mathematics and Computation 192(2): 487-495 (2007) |
73 | EE | Shiang-Feng Tzeng,
Yuan-Liang Tang,
Min-Shiang Hwang:
A new convertible authenticated encryption scheme with message linkages.
Computers & Electrical Engineering 33(2): 133-138 (2007) |
2006 |
72 | | I-En Liao,
Cheng-Chi Lee,
Min-Shiang Hwang:
Identity-based deniable authentication protocol from pairings.
IMSA 2006: 112-114 |
71 | EE | Feng Bao,
Cheng-Chi Lee,
Min-Shiang Hwang:
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.
Applied Mathematics and Computation 172(2): 1195-1200 (2006) |
70 | EE | Min-Shiang Hwang,
Jung-Wen Lo,
Shu-Yin Hsiao,
Yen-Ping Chu:
Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows.
IEICE Transactions 89-D(4): 1575-1577 (2006) |
69 | EE | I-En Liao,
Cheng-Chi Lee,
Min-Shiang Hwang:
A password authentication scheme over insecure networks.
J. Comput. Syst. Sci. 72(4): 727-740 (2006) |
2005 |
68 | EE | Li-Hua Li,
Shiang-Feng Tzeng,
Min-Shiang Hwang:
Improvement of signature scheme based on factoring and discrete logarithms.
Applied Mathematics and Computation 161(1): 49-54 (2005) |
67 | EE | Eric Jui-Lin Lu,
Min-Shiang Hwang,
Cheng-Jian Huang:
A new proxy signature scheme with revocation.
Applied Mathematics and Computation 161(3): 799-806 (2005) |
66 | EE | Ting Yi Chang,
Min-Shiang Hwang,
Wei-Pang Yang:
An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme.
Applied Mathematics and Computation 163(1): 169-178 (2005) |
65 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
Wei-Pang Yang:
A new blind signature based on the discrete logarithm problem for untraceability.
Applied Mathematics and Computation 164(3): 837-841 (2005) |
64 | EE | Chwei-Shyong Tsai,
Shu-Chen Lin,
Min-Shiang Hwang:
Cryptanalysis of an authenticated encryption scheme using self-certified public keys.
Applied Mathematics and Computation 166(1): 118-122 (2005) |
63 | EE | Min-Shiang Hwang,
Kuo-Feng Hwang,
Chin-Chen Chang:
A time-stamping protocol for digital watermarking.
Applied Mathematics and Computation 169(2): 1276-1284 (2005) |
62 | EE | Min-Shiang Hwang,
Jung-Wen Lo,
Chia-Hsin Liu:
Improvement on the flexible tree-based key management framework.
Computers & Security 24(6): 500-504 (2005) |
61 | EE | Iuon-Chang Lin,
Min-Shiang Hwang,
Chin-Chen Chang:
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain.
Des. Codes Cryptography 36(1): 53-67 (2005) |
60 | EE | Hsien-Chu Wu,
Min-Shiang Hwang,
Chia-Hsin Liu:
A Secure Strong-Password Authentication Protocol.
Fundam. Inform. 68(4): 399-406 (2005) |
59 | EE | Cheng-Chi Lee,
Ting Yi Chang,
Min-Shiang Hwang:
A simple broadcasting cryptosystem in computer networks using eXclusive-OR.
IJCAT 24(3): 180-183 (2005) |
58 | EE | Iuon-Chang Lin,
Hsia-Hung Ou,
Min-Shiang Hwang:
A user authentication system using back-propagation network.
Neural Computing and Applications 14(3): 243-249 (2005) |
57 | EE | Ting Yi Chang,
Min-Shiang Hwang,
Wei-Pang Yang:
A new multi-stage secret sharing scheme using one-way function.
Operating Systems Review 39(1): 48-55 (2005) |
56 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Ji-Zhe Lee,
Chao-Chen Yang:
A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography.
Telecommunication Systems 29(3): 165-180 (2005) |
2004 |
55 | EE | Min-Shiang Hwang,
Ting Yi Chang,
Shu-Chen Lin,
Chwei-Shyong Tsai:
On the Security of an Enhanced Authentication Key Exchange Protocol.
AINA (2) 2004: 160-163 |
54 | EE | Shiang-Feng Tzeng,
Min-Shiang Hwang,
Cheng-Ying Yang:
An improvement of nonrepudiable threshold proxy signature scheme with known signers.
Computers & Security 23(2): 174-178 (2004) |
53 | EE | Min-Shiang Hwang,
Jung-Wen Lo,
Chia-Hsin Liu:
Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack.
Fundam. Inform. 61(3-4): 389-398 (2004) |
52 | EE | Shiang-Feng Tzeng,
Cheng-Ying Yang,
Min-Shiang Hwang:
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Future Generation Comp. Syst. 20(5): 887-893 (2004) |
51 | EE | Ting Yi Chang,
Chou Chen Yang,
Min-Shiang Hwang:
A threshold signature scheme for group communications without a shared distribution center.
Future Generation Comp. Syst. 20(6): 1013-1021 (2004) |
50 | EE | Shiang-Feng Tzeng,
Cheng-Ying Yang,
Min-Shiang Hwang:
A new digital signature scheme based on factoring and discrete logarithms.
Int. J. Comput. Math. 81(1): 9-14 (2004) |
49 | EE | Cheng-Ying Yang,
Shiang-Feng Tzeng,
Min-Shiang Hwang:
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers.
Journal of Systems and Software 73(3): 507-514 (2004) |
48 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
I-En Liao:
A server assisted authentication protocol for detecting error vectors.
Operating Systems Review 38(2): 93-96 (2004) |
47 | EE | Min-Shiang Hwang,
Li-Hua Li,
Cheng-Chi Lee:
A key authentication scheme with non-repudiation.
Operating Systems Review 38(3): 75-78 (2004) |
46 | EE | Li-Hua Li,
Chi-Yu Liu,
Min-Shiang Hwang:
Cryptanalysis of an efficient secure group signature scheme.
Operating Systems Review 38(4): 66-69 (2004) |
2003 |
45 | EE | Min-Shiang Hwang,
Wen-Guey Tzeng:
A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy.
ICOIN 2003: 757-761 |
44 | EE | Li-Hua Li,
Shiang-Feng Tzeng,
Min-Shiang Hwang:
Generalization of proxy signature-based on discrete logarithms.
Computers & Security 22(3): 245-255 (2003) |
43 | EE | Jau-Ji Shen,
Chih-Wei Lin,
Min-Shiang Hwang:
Security enhancement for the timestamp-based password authentication scheme using smart cards.
Computers & Security 22(7): 591-595 (2003) |
42 | EE | Cheng-Chi Lee,
Wei-Pang Yang,
Min-Shiang Hwang:
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem.
Fundam. Inform. 55(3-4): 307-320 (2003) |
41 | EE | Iuon-Chang Lin,
Min-Shiang Hwang,
Li-Hua Li:
A new remote user authentication scheme for multi-server architecture.
Future Generation Comp. Syst. 19(1): 13-22 (2003) |
40 | EE | Iuon-Chang Lin,
Min-Shiang Hwang,
Chin-Chen Chang:
A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Generation Comp. Syst. 19(4): 457-462 (2003) |
39 | EE | Min-Shiang Hwang,
Eric Jui-Lin Lu,
Iuon-Chang Lin:
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IEEE Trans. Knowl. Data Eng. 15(6): 1552-1560 (2003) |
38 | EE | Chou Chen Yang,
Ting Yi Chang,
Jian Wei Li,
Min-Shiang Hwang:
Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem.
Informatica, Lith. Acad. Sci. 14(1): 111-120 (2003) |
37 | EE | Chwei-Shyong Tsai,
Shiang-Feng Tzeng,
Min-Shiang Hwang:
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci. 14(3): 393-402 (2003) |
36 | EE | Chou Chen Yang,
Ting Yi Chang,
Min-Shiang Hwang:
Security of Improvement on Methods for Protecting Password Transmission.
Informatica, Lith. Acad. Sci. 14(4): 551-558 (2003) |
35 | EE | Shin-Jia Hwang,
Min-Shiang Hwang,
Shiang-Feng Tzeng:
A New Digital Multisignature Scheme With Distinguished Signing Authorities.
J. Inf. Sci. Eng. 19(5): 881-887 (2003) |
34 | EE | Min-Shiang Hwang,
Wei-Pang Yang:
Controlling access in large partially ordered hierarchies using cryptographic keys.
Journal of Systems and Software 67(2): 99-107 (2003) |
33 | EE | Chih-Wei Lin,
Jau-Ji Shen,
Min-Shiang Hwang:
Security enhancement for Optimal Strong-Password Authentication protocol.
Operating Systems Review 37(2): 7-12 (2003) |
32 | EE | Chih-Wei Lin,
Jau-Ji Shen,
Min-Shiang Hwang:
Security enhancement for optimal strong-password authentication protocol.
Operating Systems Review 37(3): 12-16 (2003) |
31 | EE | Min-Shiang Hwang,
Chao-Chen Yang,
Cheng-Yeh Shiu:
An authentication scheme for mobile satellite communication systems.
Operating Systems Review 37(4): 42-47 (2003) |
2002 |
30 | EE | Chou Chen Yang,
Min-Shiang Hwang,
Jian Wei Li,
Ting Yi Chang:
A Solution to Mobile IP Registration for AAA.
CDMA International Conference 2002: 329-337 |
29 | EE | Min-Shiang Hwang,
Eric Jui-Lin Lu,
Iuon-Chang Lin:
Adding timestamps to the secure electronic auction protocol.
Data Knowl. Eng. 40(2): 155-162 (2002) |
28 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Shin-Jia Hwang:
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme.
Fundam. Inform. 53(2): 131-134 (2002) |
27 | EE | Min-Shiang Hwang,
Chin-Chen Chang,
Kuo-Feng Hwang:
An ElGamal-Like Cryptosystem for Enciphering Large Messages.
IEEE Trans. Knowl. Data Eng. 14(2): 445-446 (2002) |
26 | EE | Chin-Chen Chang,
Kuo-Feng Hwang,
Min-Shiang Hwang:
A Feature-Oriented Copyright Owner Proving Technique for Still Images.
International Journal of Software Engineering and Knowledge Engineering 12(3): 317- (2002) |
25 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Ting Yi Chang:
Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines.
J. Inf. Sci. Eng. 18(3): 373-379 (2002) |
24 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Ting Yi Chang:
Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines.
J. Inf. Sci. Eng. 18(3): 373-379 (2002) |
23 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
Wei-Pang Yang:
A flexible remote user authentication scheme using smart cards.
Operating Systems Review 36(3): 46-52 (2002) |
22 | EE | Cheng-Chi Lee,
Li-Hua Li,
Min-Shiang Hwang:
A remote user authentication scheme using hash functions.
Operating Systems Review 36(4): 23-29 (2002) |
2001 |
21 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Yuan-Liang Tang:
Two Simple Batch Verifying Multiple Digital Signatures.
ICICS 2001: 233-237 |
20 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Yuan-Liang Tang:
An Improvement of SPLICE/AS in WIDE against Guessing Attack.
Informatica, Lith. Acad. Sci. 12(2): 297-302 (2001) |
19 | EE | Min-Shiang Hwang,
Iuon-Chang Lin,
Li-Hua Li:
A simple micro-payment scheme.
Journal of Systems and Software 55(3): 221-229 (2001) |
18 | EE | Chin-Chen Chang,
Min-Shiang Hwang,
Tung-Shou Chen:
A new encryption algorithm for image cryptosystems.
Journal of Systems and Software 58(2): 83-91 (2001) |
2000 |
17 | EE | Iuon-Chang Lin,
Chin-Chen Chang,
Min-Shiang Hwang:
Security Enhancement for the "Simple Authentication Key Agreement Algorithm".
COMPSAC 2000: 113-115 |
16 | EE | Min-Shiang Hwang:
Cryptanalysis of YCN key assignment scheme in a hierarchy.
Inf. Process. Lett. 73(3-4): 97-101 (2000) |
15 | | Chin-Chen Chang,
Kuo-Feng Hwang,
Min-Shiang Hwang:
A Digital Watermarking Scheme Using Human Visual Effects.
Informatica (Slovenia) 24(4): (2000) |
14 | EE | Min-Shiang Hwang,
Iuon-Chang Lin,
Kuo-Feng Hwang:
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures.
Informatica, Lith. Acad. Sci. 11(1): 15-19 (2000) |
13 | EE | Min-Shiang Hwang,
Iuon-Chang Lin,
Eric Jui-Lin Lu:
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci. 11(2): 137-144 (2000) |
12 | EE | Min-Shiang Hwang:
A New Redundancy Reducing Cipher.
Informatica, Lith. Acad. Sci. 11(4): 435-440 (2000) |
1999 |
11 | EE | Min-Shiang Hwang:
Cryptanalysis of a remote login authentication scheme.
Computer Communications 22(8): 742-744 (1999) |
10 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
Wei-Pang Yang:
A Novel Application of the Phone Card and Its Authentication in Mobile Communications.
J. Inf. Sci. Eng. 15(4): 471-484 (1999) |
9 | | Min-Shiang Hwang:
A Dynamic Key Generation Scheme for Access Control in a Hierarchy.
Nord. J. Comput. 6(4): 363-371 (1999) |
8 | EE | Chii-Hwa Lee,
Min-Shiang Hwang,
Wei-Pang Yang:
Enhanced privacy and authentication for the global system for mobile communications.
Wireless Networks 5(4): 231-243 (1999) |
1998 |
7 | EE | Tung-Shou Chen,
Chin-Chen Chang,
Min-Shiang Hwang:
A virtual image cryptosystem based upon vector quantization.
IEEE Transactions on Image Processing 7(10): 1485-1488 (1998) |
1997 |
6 | EE | Min-Shiang Hwang,
Wei-Pang Yang:
Multilevel Secure Database Encryption with Subkeys.
Data Knowl. Eng. 22(2): 117-131 (1997) |
1996 |
5 | | Chii-Hwa Lee,
Min-Shiang Hwang,
Wei-Pang Yang:
Phone Card Application and Authentication in Wireless Communications.
IFIP World Conference on Mobile Communications 1996: 323-329 |
4 | EE | Min-Shiang Hwang,
Wen-Guey Tzeng,
Wei-Pang Yang:
An access control scheme based on Chinese remainder theorem and time stamp concept.
Computers & Security 15(1): 73-81 (1996) |
1995 |
3 | | Min-Shiang Hwang,
Wei-Pang Yang:
Conference Key Distribution Schemes for Secure Digital Mobile Communications.
IEEE Journal on Selected Areas in Communications 13(2): 416-420 (1995) |
2 | EE | Min-Shiang Hwang,
Wei-Pang Yang:
A two-phase encryption scheme for enhancing database security.
Journal of Systems and Software 31(3): 257-265 (1995) |
1994 |
1 | | Min-Shiang Hwang,
Wei-Pang Yang:
A New Dynamic Access Control Scheme Based on Subject-Object List.
Data Knowl. Eng. 14(1): 45-56 (1994) |