Ren-Chiun Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

12EERen-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei: An Anonymous and Deniable Conversation for a Thin Client. AINA Workshops 2008: 416-421
11EERen-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei: A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. EUC Workshops 2007: 728-744
10EERen-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei: A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. MUE 2007: 313-318
9EEChou Chen Yang, Ren-Chiun Wang: Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function. Applied Mathematics and Computation 162(1): 211-214 (2005)
8EEChou Chen Yang, Ren-Chiun Wang, Ting Yi Chang: An improvement of the Yang-Shieh password authentication schemes. Applied Mathematics and Computation 162(3): 1391-1396 (2005)
7EEChou Chen Yang, Yuan-Liang Tang, Ren-Chiun Wang, Hung-Wen Yang: A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation 169(2): 1431-1439 (2005)
6EERen-Chiun Wang, Chou Chen Yang, Kun-Ru Mo: A protected password change protocol CoRR abs/cs/0506105: (2005)
5EEHung-Yu Chien, Ren-Chiun Wang, Chou Chen Yang: Note on Robust and Simple Authentication Protocol. Comput. J. 48(1): 27-29 (2005)
4EEChou Chen Yang, Ren-Chiun Wang, Wei-Ting Liu: Secure authentication scheme for session initiation protocol. Computers & Security 24(5): 381-386 (2005)
3EEChou Chen Yang, Ren-Chiun Wang: Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. IEICE Transactions 88-B(11): 4370-4372 (2005)
2EEChou Chen Yang, Ren-Chiun Wang: Cryptanalysis of a user friendly remote authentication scheme with smart cards. Computers & Security 23(5): 425-427 (2004)
1EEChou Chen Yang, Ren-Chiun Wang: An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. Operating Systems Review 38(3): 91-96 (2004)

Coauthor Index

1Ting Yi Chang [8]
2Hung-Yu Chien [5]
3Wen-Shenq Juang [10] [11] [12]
4Chin-Laung Lei [10] [11] [12]
5Wei-Ting Liu [4]
6Kun-Ru Mo [6]
7Yuan-Liang Tang [7]
8Chen-Chi Wu [10]
9Chou Chen Yang [1] [2] [3] [4] [5] [6] [7] [8] [9]
10Hung-Wen Yang [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)