2009 |
20 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
Shiang-Feng Tzeng:
A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem.
Int. J. Found. Comput. Sci. 20(2): 351-359 (2009) |
2008 |
19 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Song-Kong Chong:
An improved address ownership in mobile IPv6.
Computer Communications 31(14): 3250-3252 (2008) |
18 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
I-En Liao:
A new authentication protocol based on pointer forwarding for mobile communications.
Wireless Communications and Mobile Computing 8(5): 661-672 (2008) |
2006 |
17 | | I-En Liao,
Cheng-Chi Lee,
Min-Shiang Hwang:
Identity-based deniable authentication protocol from pairings.
IMSA 2006: 112-114 |
16 | EE | Feng Bao,
Cheng-Chi Lee,
Min-Shiang Hwang:
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.
Applied Mathematics and Computation 172(2): 1195-1200 (2006) |
15 | EE | I-En Liao,
Cheng-Chi Lee,
Min-Shiang Hwang:
A password authentication scheme over insecure networks.
J. Comput. Syst. Sci. 72(4): 727-740 (2006) |
2005 |
14 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
Wei-Pang Yang:
A new blind signature based on the discrete logarithm problem for untraceability.
Applied Mathematics and Computation 164(3): 837-841 (2005) |
13 | EE | Cheng-Chi Lee,
Ting Yi Chang,
Min-Shiang Hwang:
A simple broadcasting cryptosystem in computer networks using eXclusive-OR.
IJCAT 24(3): 180-183 (2005) |
12 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Ji-Zhe Lee,
Chao-Chen Yang:
A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography.
Telecommunication Systems 29(3): 165-180 (2005) |
2004 |
11 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
I-En Liao:
A server assisted authentication protocol for detecting error vectors.
Operating Systems Review 38(2): 93-96 (2004) |
10 | EE | Min-Shiang Hwang,
Li-Hua Li,
Cheng-Chi Lee:
A key authentication scheme with non-repudiation.
Operating Systems Review 38(3): 75-78 (2004) |
2003 |
9 | EE | Cheng-Chi Lee,
Wei-Pang Yang,
Min-Shiang Hwang:
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem.
Fundam. Inform. 55(3-4): 307-320 (2003) |
2002 |
8 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Shin-Jia Hwang:
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme.
Fundam. Inform. 53(2): 131-134 (2002) |
7 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Ting Yi Chang:
Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines.
J. Inf. Sci. Eng. 18(3): 373-379 (2002) |
6 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Ting Yi Chang:
Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines.
J. Inf. Sci. Eng. 18(3): 373-379 (2002) |
5 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
Wei-Pang Yang:
A flexible remote user authentication scheme using smart cards.
Operating Systems Review 36(3): 46-52 (2002) |
4 | EE | Cheng-Chi Lee,
Li-Hua Li,
Min-Shiang Hwang:
A remote user authentication scheme using hash functions.
Operating Systems Review 36(4): 23-29 (2002) |
2001 |
3 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Yuan-Liang Tang:
Two Simple Batch Verifying Multiple Digital Signatures.
ICICS 2001: 233-237 |
2 | EE | Min-Shiang Hwang,
Cheng-Chi Lee,
Yuan-Liang Tang:
An Improvement of SPLICE/AS in WIDE against Guessing Attack.
Informatica, Lith. Acad. Sci. 12(2): 297-302 (2001) |
1999 |
1 | EE | Cheng-Chi Lee,
Min-Shiang Hwang,
Wei-Pang Yang:
A Novel Application of the Phone Card and Its Authentication in Mobile Communications.
J. Inf. Sci. Eng. 15(4): 471-484 (1999) |