2008 |
12 | EE | Ren-Chiun Wang,
Wen-Shenq Juang,
Chin-Laung Lei:
An Anonymous and Deniable Conversation for a Thin Client.
AINA Workshops 2008: 416-421 |
2007 |
11 | EE | Ren-Chiun Wang,
Wen-Shenq Juang,
Chin-Laung Lei:
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem.
EUC Workshops 2007: 728-744 |
10 | EE | Ren-Chiun Wang,
Wen-Shenq Juang,
Chen-Chi Wu,
Chin-Laung Lei:
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments.
MUE 2007: 313-318 |
2005 |
9 | EE | Chou Chen Yang,
Ren-Chiun Wang:
Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function.
Applied Mathematics and Computation 162(1): 211-214 (2005) |
8 | EE | Chou Chen Yang,
Ren-Chiun Wang,
Ting Yi Chang:
An improvement of the Yang-Shieh password authentication schemes.
Applied Mathematics and Computation 162(3): 1391-1396 (2005) |
7 | EE | Chou Chen Yang,
Yuan-Liang Tang,
Ren-Chiun Wang,
Hung-Wen Yang:
A secure and efficient authentication protocol for anonymous channel in wireless communications.
Applied Mathematics and Computation 169(2): 1431-1439 (2005) |
6 | EE | Ren-Chiun Wang,
Chou Chen Yang,
Kun-Ru Mo:
A protected password change protocol
CoRR abs/cs/0506105: (2005) |
5 | EE | Hung-Yu Chien,
Ren-Chiun Wang,
Chou Chen Yang:
Note on Robust and Simple Authentication Protocol.
Comput. J. 48(1): 27-29 (2005) |
4 | EE | Chou Chen Yang,
Ren-Chiun Wang,
Wei-Ting Liu:
Secure authentication scheme for session initiation protocol.
Computers & Security 24(5): 381-386 (2005) |
3 | EE | Chou Chen Yang,
Ren-Chiun Wang:
Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
IEICE Transactions 88-B(11): 4370-4372 (2005) |
2004 |
2 | EE | Chou Chen Yang,
Ren-Chiun Wang:
Cryptanalysis of a user friendly remote authentication scheme with smart cards.
Computers & Security 23(5): 425-427 (2004) |
1 | EE | Chou Chen Yang,
Ren-Chiun Wang:
An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards.
Operating Systems Review 38(3): 91-96 (2004) |