2009 | ||
---|---|---|
82 | EE | Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng: A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. Int. J. Found. Comput. Sci. 20(2): 351-359 (2009) |
2008 | ||
81 | EE | Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu: An electronic voting protocol with deniable authentication for mobile ad hoc networks. Computer Communications 31(10): 2534-2540 (2008) |
80 | EE | Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications 31(12): 2803-2814 (2008) |
79 | EE | Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong: An improved address ownership in mobile IPv6. Computer Communications 31(14): 3250-3252 (2008) |
78 | EE | Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu: Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications 31(18): 4255-4258 (2008) |
77 | EE | Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang: A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software 81(1): 150-158 (2008) |
76 | EE | Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao: A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communications and Mobile Computing 8(5): 661-672 (2008) |
2007 | ||
75 | EE | Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li: A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. ICCSA (3) 2007: 273-284 |
74 | EE | Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan: A simple mobile communication billing system among charged parties. Applied Mathematics and Computation 192(2): 487-495 (2007) |
73 | EE | Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang: A new convertible authenticated encryption scheme with message linkages. Computers & Electrical Engineering 33(2): 133-138 (2007) |
2006 | ||
72 | I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang: Identity-based deniable authentication protocol from pairings. IMSA 2006: 112-114 | |
71 | EE | Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang: Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Applied Mathematics and Computation 172(2): 1195-1200 (2006) |
70 | EE | Min-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, Yen-Ping Chu: Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows. IEICE Transactions 89-D(4): 1575-1577 (2006) |
69 | EE | I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang: A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4): 727-740 (2006) |
2005 | ||
68 | EE | Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang: Improvement of signature scheme based on factoring and discrete logarithms. Applied Mathematics and Computation 161(1): 49-54 (2005) |
67 | EE | Eric Jui-Lin Lu, Min-Shiang Hwang, Cheng-Jian Huang: A new proxy signature scheme with revocation. Applied Mathematics and Computation 161(3): 799-806 (2005) |
66 | EE | Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang: An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme. Applied Mathematics and Computation 163(1): 169-178 (2005) |
65 | EE | Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang: A new blind signature based on the discrete logarithm problem for untraceability. Applied Mathematics and Computation 164(3): 837-841 (2005) |
64 | EE | Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang: Cryptanalysis of an authenticated encryption scheme using self-certified public keys. Applied Mathematics and Computation 166(1): 118-122 (2005) |
63 | EE | Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang: A time-stamping protocol for digital watermarking. Applied Mathematics and Computation 169(2): 1276-1284 (2005) |
62 | EE | Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu: Improvement on the flexible tree-based key management framework. Computers & Security 24(6): 500-504 (2005) |
61 | EE | Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang: The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Des. Codes Cryptography 36(1): 53-67 (2005) |
60 | EE | Hsien-Chu Wu, Min-Shiang Hwang, Chia-Hsin Liu: A Secure Strong-Password Authentication Protocol. Fundam. Inform. 68(4): 399-406 (2005) |
59 | EE | Cheng-Chi Lee, Ting Yi Chang, Min-Shiang Hwang: A simple broadcasting cryptosystem in computer networks using eXclusive-OR. IJCAT 24(3): 180-183 (2005) |
58 | EE | Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang: A user authentication system using back-propagation network. Neural Computing and Applications 14(3): 243-249 (2005) |
57 | EE | Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang: A new multi-stage secret sharing scheme using one-way function. Operating Systems Review 39(1): 48-55 (2005) |
56 | EE | Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, Chao-Chen Yang: A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography. Telecommunication Systems 29(3): 165-180 (2005) |
2004 | ||
55 | EE | Min-Shiang Hwang, Ting Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai: On the Security of an Enhanced Authentication Key Exchange Protocol. AINA (2) 2004: 160-163 |
54 | EE | Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang: An improvement of nonrepudiable threshold proxy signature scheme with known signers. Computers & Security 23(2): 174-178 (2004) |
53 | EE | Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu: Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack. Fundam. Inform. 61(3-4): 389-398 (2004) |
52 | EE | Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang: A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Future Generation Comp. Syst. 20(5): 887-893 (2004) |
51 | EE | Ting Yi Chang, Chou Chen Yang, Min-Shiang Hwang: A threshold signature scheme for group communications without a shared distribution center. Future Generation Comp. Syst. 20(6): 1013-1021 (2004) |
50 | EE | Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang: A new digital signature scheme based on factoring and discrete logarithms. Int. J. Comput. Math. 81(1): 9-14 (2004) |
49 | EE | Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang: On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software 73(3): 507-514 (2004) |
48 | EE | Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao: A server assisted authentication protocol for detecting error vectors. Operating Systems Review 38(2): 93-96 (2004) |
47 | EE | Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee: A key authentication scheme with non-repudiation. Operating Systems Review 38(3): 75-78 (2004) |
46 | EE | Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang: Cryptanalysis of an efficient secure group signature scheme. Operating Systems Review 38(4): 66-69 (2004) |
2003 | ||
45 | EE | Min-Shiang Hwang, Wen-Guey Tzeng: A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. ICOIN 2003: 757-761 |
44 | EE | Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang: Generalization of proxy signature-based on discrete logarithms. Computers & Security 22(3): 245-255 (2003) |
43 | EE | Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang: Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security 22(7): 591-595 (2003) |
42 | EE | Cheng-Chi Lee, Wei-Pang Yang, Min-Shiang Hwang: Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem. Fundam. Inform. 55(3-4): 307-320 (2003) |
41 | EE | Iuon-Chang Lin, Min-Shiang Hwang, Li-Hua Li: A new remote user authentication scheme for multi-server architecture. Future Generation Comp. Syst. 19(1): 13-22 (2003) |
40 | EE | Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang: A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Comp. Syst. 19(4): 457-462 (2003) |
39 | EE | Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin: A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Trans. Knowl. Data Eng. 15(6): 1552-1560 (2003) |
38 | EE | Chou Chen Yang, Ting Yi Chang, Jian Wei Li, Min-Shiang Hwang: Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem. Informatica, Lith. Acad. Sci. 14(1): 111-120 (2003) |
37 | EE | Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang: Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. Informatica, Lith. Acad. Sci. 14(3): 393-402 (2003) |
36 | EE | Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang: Security of Improvement on Methods for Protecting Password Transmission. Informatica, Lith. Acad. Sci. 14(4): 551-558 (2003) |
35 | EE | Shin-Jia Hwang, Min-Shiang Hwang, Shiang-Feng Tzeng: A New Digital Multisignature Scheme With Distinguished Signing Authorities. J. Inf. Sci. Eng. 19(5): 881-887 (2003) |
34 | EE | Min-Shiang Hwang, Wei-Pang Yang: Controlling access in large partially ordered hierarchies using cryptographic keys. Journal of Systems and Software 67(2): 99-107 (2003) |
33 | EE | Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang: Security enhancement for Optimal Strong-Password Authentication protocol. Operating Systems Review 37(2): 7-12 (2003) |
32 | EE | Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang: Security enhancement for optimal strong-password authentication protocol. Operating Systems Review 37(3): 12-16 (2003) |
31 | EE | Min-Shiang Hwang, Chao-Chen Yang, Cheng-Yeh Shiu: An authentication scheme for mobile satellite communication systems. Operating Systems Review 37(4): 42-47 (2003) |
2002 | ||
30 | EE | Chou Chen Yang, Min-Shiang Hwang, Jian Wei Li, Ting Yi Chang: A Solution to Mobile IP Registration for AAA. CDMA International Conference 2002: 329-337 |
29 | EE | Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin: Adding timestamps to the secure electronic auction protocol. Data Knowl. Eng. 40(2): 155-162 (2002) |
28 | EE | Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang: Cryptanalysis of the Hwang-Shi Proxy Signature Scheme. Fundam. Inform. 53(2): 131-134 (2002) |
27 | EE | Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang: An ElGamal-Like Cryptosystem for Enciphering Large Messages. IEEE Trans. Knowl. Data Eng. 14(2): 445-446 (2002) |
26 | EE | Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang: A Feature-Oriented Copyright Owner Proving Technique for Still Images. International Journal of Software Engineering and Knowledge Engineering 12(3): 317- (2002) |
25 | EE | Min-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang: Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. J. Inf. Sci. Eng. 18(3): 373-379 (2002) |
24 | EE | Min-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang: Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. J. Inf. Sci. Eng. 18(3): 373-379 (2002) |
23 | EE | Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang: A flexible remote user authentication scheme using smart cards. Operating Systems Review 36(3): 46-52 (2002) |
22 | EE | Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang: A remote user authentication scheme using hash functions. Operating Systems Review 36(4): 23-29 (2002) |
2001 | ||
21 | EE | Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang: Two Simple Batch Verifying Multiple Digital Signatures. ICICS 2001: 233-237 |
20 | EE | Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang: An Improvement of SPLICE/AS in WIDE against Guessing Attack. Informatica, Lith. Acad. Sci. 12(2): 297-302 (2001) |
19 | EE | Min-Shiang Hwang, Iuon-Chang Lin, Li-Hua Li: A simple micro-payment scheme. Journal of Systems and Software 55(3): 221-229 (2001) |
18 | EE | Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen: A new encryption algorithm for image cryptosystems. Journal of Systems and Software 58(2): 83-91 (2001) |
2000 | ||
17 | EE | Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang: Security Enhancement for the "Simple Authentication Key Agreement Algorithm". COMPSAC 2000: 113-115 |
16 | EE | Min-Shiang Hwang: Cryptanalysis of YCN key assignment scheme in a hierarchy. Inf. Process. Lett. 73(3-4): 97-101 (2000) |
15 | Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang: A Digital Watermarking Scheme Using Human Visual Effects. Informatica (Slovenia) 24(4): (2000) | |
14 | EE | Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang: Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures. Informatica, Lith. Acad. Sci. 11(1): 15-19 (2000) |
13 | EE | Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu: A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica, Lith. Acad. Sci. 11(2): 137-144 (2000) |
12 | EE | Min-Shiang Hwang: A New Redundancy Reducing Cipher. Informatica, Lith. Acad. Sci. 11(4): 435-440 (2000) |
1999 | ||
11 | EE | Min-Shiang Hwang: Cryptanalysis of a remote login authentication scheme. Computer Communications 22(8): 742-744 (1999) |
10 | EE | Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang: A Novel Application of the Phone Card and Its Authentication in Mobile Communications. J. Inf. Sci. Eng. 15(4): 471-484 (1999) |
9 | Min-Shiang Hwang: A Dynamic Key Generation Scheme for Access Control in a Hierarchy. Nord. J. Comput. 6(4): 363-371 (1999) | |
8 | EE | Chii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang: Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks 5(4): 231-243 (1999) |
1998 | ||
7 | EE | Tung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang: A virtual image cryptosystem based upon vector quantization. IEEE Transactions on Image Processing 7(10): 1485-1488 (1998) |
1997 | ||
6 | EE | Min-Shiang Hwang, Wei-Pang Yang: Multilevel Secure Database Encryption with Subkeys. Data Knowl. Eng. 22(2): 117-131 (1997) |
1996 | ||
5 | Chii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang: Phone Card Application and Authentication in Wireless Communications. IFIP World Conference on Mobile Communications 1996: 323-329 | |
4 | EE | Min-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang: An access control scheme based on Chinese remainder theorem and time stamp concept. Computers & Security 15(1): 73-81 (1996) |
1995 | ||
3 | Min-Shiang Hwang, Wei-Pang Yang: Conference Key Distribution Schemes for Secure Digital Mobile Communications. IEEE Journal on Selected Areas in Communications 13(2): 416-420 (1995) | |
2 | EE | Min-Shiang Hwang, Wei-Pang Yang: A two-phase encryption scheme for enhancing database security. Journal of Systems and Software 31(3): 257-265 (1995) |
1994 | ||
1 | Min-Shiang Hwang, Wei-Pang Yang: A New Dynamic Access Control Scheme Based on Subject-Object List. Data Knowl. Eng. 14(1): 45-56 (1994) |