dblp.uni-trier.dewww.uni-trier.de

Ren-Junn Hwang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
23EERen-Junn Hwang, Sheng-Hua Shiau: Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers. Comput. J. 50(5): 602-615 (2007)
22EERen-Junn Hwang, Sheng-Hua Shiau, Ding-Far Jan: A new mobile payment scheme for roaming services. Electronic Commerce Research and Applications 6(2): 184-191 (2007)
2005
21EERen-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen: An Efficient Decryption Method for RSA Cryptosystem. AINA 2005: 585-590
20EESheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin: Key Agreement Protocol Based on Weil Pairing. AINA 2005: 597-602
19EERen-Junn Hwang, Chih-Hua Lai, Feng-Fu Su: An efficient signcryption scheme with forward secrecy based on elliptic curve. Applied Mathematics and Computation 167(2): 870-881 (2005)
18EERen-Junn Hwang, Feng-Fu Su: Cryptanalysis on stream ciphers for GSM networks. IJIPT 1(1): 30-33 (2005)
2004
17EEChin-Chen Chang, Ren-Junn Hwang: A New Scheme to Protect Confidential Images. AINA (1) 2004: 158-164
16EERen-Junn Hwang, Chin-Chen Chang: Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. AINA (1) 2004: 208-212
15EEYing-Hong Wang, Ren-Junn Hwang, Wen-Nan Wang: An Agent-Based Consumer Recommendation Mechanism. AINA (2) 2004: 143-148
14EEYing-Hong Wang, Ren-Junn Hwang, Wen-Nan Wang: An Agent-Based Consumer Recommendation Mechanism. ICDCS Workshops 2004: 228-233
13EEChin-Chen Chang, Ren-Junn Hwang: A new scheme to protect confidential images. Journal of Interconnection Networks 5(3): 221-232 (2004)
2003
12EERen-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai: An Enhanced Authentication Key Exchange Protocol . AINA 2003: 202-205
11 Ren-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai: Enhanced Authentication Key Agreement Protocol. Applied Informatics 2003: 1003-1006
10EERen-Junn Hwang, Chin-Chen Chang: A Method for Sending Confidential Messages to a Group without Trusted Parties. ISPA 2003: 375-381
9EERen-Junn Hwang, Rong-Chi Chang: Key Agreement in Ad Hoc Networks. ISPA 2003: 382-390
8 Ren-Junn Hwang, Chuan-Ho Kao: The Improvement of Steganography Capacity. MMM 2003: 329-342
2002
7 Ren-Junn Hwang, Rong-Chi Chang, Sheng-Hua Shiau, Tsung-Ming Chang, Chun-Chia Wang, Hui-Huang Hsu: Digital Watermarking Based on Pixels Relationships. JCIS 2002: 1025-1028
2001
6EERen-Junn Hwang, Timothy K. Shih, Chuan-Ho Kao, Tsung-Ming Chang: Lossy Compression Tolerant Steganography. Human.Society@Internet 2001: 427-435
1999
5EERen-Junn Hwang, Chin-Chen Chang: An Improved Threshold Scheme Based on Modular ARithmetic. J. Inf. Sci. Eng. 15(5): 691-699 (1999)
4EERen-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang: A concept of designing cheater identification methods for secret sharing. Journal of Systems and Software 46(1): 7-11 (1999)
1998
3EERen-Junn Hwang, Chin-Chen Chang: An on-line secret sharing scheme for multi-secrets. Computer Communications 21(13): 1170-1176 (1998)
2 Chin-Chen Chang, Ren-Junn Hwang: Sharing Secret Omages using Shadow Codebooks. Inf. Sci. 111(1-4): 335-345 (1998)
1992
1 Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu: Crypographic key assignment scheme for access control in a hierarchy. Inf. Syst. 17(3): 243-247 (1992)

Coauthor Index

1Chin-Chen Chang [1] [2] [3] [4] [5] [10] [13] [16] [17]
2Rong-Chi Chang [7] [9]
3Tsung-Ming Chang [6] [7]
4Chia-Yao Chen [21]
5Hui-Huang Hsu [7]
6Ding-Far Jan [22]
7Chuan-Ho Kao [6] [8]
8Chih-Hua Lai [11] [12] [19]
9Wei-Bin Lee [4]
10Ming-Fuu Lin [20]
11Sheng-Hua Shiau [7] [11] [12] [20] [22] [23]
12Timothy K. Shih [6]
13Feng-Fu Su [18] [19] [21]
14Chun-Chia Wang [7]
15Wen-Nan Wang [14] [15]
16Ying-Hong Wang [14] [15]
17Tzong-Chen Wu [1]
18Yi-Shiung Yeh [21]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)