2007 |
23 | EE | Ren-Junn Hwang,
Sheng-Hua Shiau:
Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers.
Comput. J. 50(5): 602-615 (2007) |
22 | EE | Ren-Junn Hwang,
Sheng-Hua Shiau,
Ding-Far Jan:
A new mobile payment scheme for roaming services.
Electronic Commerce Research and Applications 6(2): 184-191 (2007) |
2005 |
21 | EE | Ren-Junn Hwang,
Feng-Fu Su,
Yi-Shiung Yeh,
Chia-Yao Chen:
An Efficient Decryption Method for RSA Cryptosystem.
AINA 2005: 585-590 |
20 | EE | Sheng-Hua Shiau,
Ren-Junn Hwang,
Ming-Fuu Lin:
Key Agreement Protocol Based on Weil Pairing.
AINA 2005: 597-602 |
19 | EE | Ren-Junn Hwang,
Chih-Hua Lai,
Feng-Fu Su:
An efficient signcryption scheme with forward secrecy based on elliptic curve.
Applied Mathematics and Computation 167(2): 870-881 (2005) |
18 | EE | Ren-Junn Hwang,
Feng-Fu Su:
Cryptanalysis on stream ciphers for GSM networks.
IJIPT 1(1): 30-33 (2005) |
2004 |
17 | EE | Chin-Chen Chang,
Ren-Junn Hwang:
A New Scheme to Protect Confidential Images.
AINA (1) 2004: 158-164 |
16 | EE | Ren-Junn Hwang,
Chin-Chen Chang:
Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme.
AINA (1) 2004: 208-212 |
15 | EE | Ying-Hong Wang,
Ren-Junn Hwang,
Wen-Nan Wang:
An Agent-Based Consumer Recommendation Mechanism.
AINA (2) 2004: 143-148 |
14 | EE | Ying-Hong Wang,
Ren-Junn Hwang,
Wen-Nan Wang:
An Agent-Based Consumer Recommendation Mechanism.
ICDCS Workshops 2004: 228-233 |
13 | EE | Chin-Chen Chang,
Ren-Junn Hwang:
A new scheme to protect confidential images.
Journal of Interconnection Networks 5(3): 221-232 (2004) |
2003 |
12 | EE | Ren-Junn Hwang,
Sheng-Hua Shiau,
Chih-Hua Lai:
An Enhanced Authentication Key Exchange Protocol .
AINA 2003: 202-205 |
11 | | Ren-Junn Hwang,
Sheng-Hua Shiau,
Chih-Hua Lai:
Enhanced Authentication Key Agreement Protocol.
Applied Informatics 2003: 1003-1006 |
10 | EE | Ren-Junn Hwang,
Chin-Chen Chang:
A Method for Sending Confidential Messages to a Group without Trusted Parties.
ISPA 2003: 375-381 |
9 | EE | Ren-Junn Hwang,
Rong-Chi Chang:
Key Agreement in Ad Hoc Networks.
ISPA 2003: 382-390 |
8 | | Ren-Junn Hwang,
Chuan-Ho Kao:
The Improvement of Steganography Capacity.
MMM 2003: 329-342 |
2002 |
7 | | Ren-Junn Hwang,
Rong-Chi Chang,
Sheng-Hua Shiau,
Tsung-Ming Chang,
Chun-Chia Wang,
Hui-Huang Hsu:
Digital Watermarking Based on Pixels Relationships.
JCIS 2002: 1025-1028 |
2001 |
6 | EE | Ren-Junn Hwang,
Timothy K. Shih,
Chuan-Ho Kao,
Tsung-Ming Chang:
Lossy Compression Tolerant Steganography.
Human.Society@Internet 2001: 427-435 |
1999 |
5 | EE | Ren-Junn Hwang,
Chin-Chen Chang:
An Improved Threshold Scheme Based on Modular ARithmetic.
J. Inf. Sci. Eng. 15(5): 691-699 (1999) |
4 | EE | Ren-Junn Hwang,
Wei-Bin Lee,
Chin-Chen Chang:
A concept of designing cheater identification methods for secret sharing.
Journal of Systems and Software 46(1): 7-11 (1999) |
1998 |
3 | EE | Ren-Junn Hwang,
Chin-Chen Chang:
An on-line secret sharing scheme for multi-secrets.
Computer Communications 21(13): 1170-1176 (1998) |
2 | | Chin-Chen Chang,
Ren-Junn Hwang:
Sharing Secret Omages using Shadow Codebooks.
Inf. Sci. 111(1-4): 335-345 (1998) |
1992 |
1 | | Chin-Chen Chang,
Ren-Junn Hwang,
Tzong-Chen Wu:
Crypographic key assignment scheme for access control in a hierarchy.
Inf. Syst. 17(3): 243-247 (1992) |