default search action
Min-Shiang Hwang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j197]Kurnia Anggriani, Shu-Fen Chiou, Nan-I Wu, Min-Shiang Hwang:
A Robust and High-Capacity Coverless Information Hiding Based on Combination Theory. Informatica 34(3): 449-464 (2023) - [c28]Jong-Shin Chen, Cheng-Ying Yang, Jenq-Foung J. F. Yao, Min-Shiang Hwang:
Secrecy Rate Analysis for the Cooperative Communications. iCAST 2023: 96-99 - [c27]Jong-Shin Chen, Cheng-Ying Yang, Jenq-Foung J. F. Yao, Chin-En Yen, Min-Shiang Hwang:
Secure Communication with Physical Layer Coding Scheme. ICCE-Taiwan 2023: 599-600 - [c26]Min-Shiang Hwang, Hou-Wen Li, Cheng-Ying Yang:
An Improvement of A Lightweight NFC Authentication Algorithm Based on Modified Hash Function. ICTC 2023: 1904-1907 - 2022
- [j196]Eko Fajar Cahyadi, Min-Shiang Hwang:
A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs. IEEE Access 10: 133869-133882 (2022) - [j195]Lanxiang Chen, Qingxiao Fu, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Min-Shiang Hwang:
Blockchain-based random auditor committee for integrity verification. Future Gener. Comput. Syst. 131: 183-193 (2022) - [j194]Eko Fajar Cahyadi, Tzu-Wei Su, Chou Chen Yang, Min-Shiang Hwang:
A certificateless aggregate signature scheme for security and privacy protection in VANET. Int. J. Distributed Sens. Networks 18(5): 155013292210806 (2022) - [j193]Eko Fajar Cahyadi, Min-Shiang Hwang:
An improved efficient authentication scheme for vehicular ad hoc networks with batch verification using bilinear pairings. Int. J. Embed. Syst. 15(2): 139-148 (2022) - 2021
- [j192]Li-Chin Huang, Shu-Fen Chiou, Min-Shiang Hwang:
A Reversible Data Hiding Based on Histogram Shifting of Prediction Errors for Two-Tier Medical Images. Informatica 32(1): 69-84 (2021) - [c25]Cheng-Ying Yang, Jenq-Foung J. F. Yao, Chin-En Yen, Min-Shiang Hwang:
Overview on Physical Layer Security in Low Earth Orbit (LEO) Satellite System. ICCE-TW 2021: 1-2 - 2020
- [j191]Hsieh-Tsen Pan, Hung-Wei Yang, Min-Shiang Hwang:
An Enhanced Secure Smart Card-based Password Authentication Scheme. Int. J. Netw. Secur. 22(2): 358-363 (2020) - [j190]Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, Min-Shiang Hwang:
Research on the Secure Financial Surveillance Blockchain Systems. Int. J. Netw. Secur. 22(4): 708-716 (2020) - [j189]Li-Chin Huang, Chun-Hsien Chang, Min-Shiang Hwang:
Research on Malware Detection and Classification Based on Artificial Intelligence. Int. J. Netw. Secur. 22(5): 717-727 (2020) - [j188]Min-Shiang Hwang, Ming-Ru Xie, Chia-Chun Wu:
A Reversible Hiding Technique Using LSB Matching for Relational Databases. Informatica 31(3): 481-497 (2020)
2010 – 2019
- 2019
- [j187]Min-Shiang Hwang, Cheng-Chi Lee, Shih-Ting Hsu:
An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme. Int. J. Found. Comput. Sci. 30(2): 255-273 (2019) - [j186]Shu-Fen Chiou, Hsieh-Tsen Pan, Eko Fajar Cahyadi, Min-Shiang Hwang:
Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. Int. J. Netw. Secur. 21(1): 100-104 (2019) - [j185]Tzu-Chun Lin, Ting-Yi Yeh, Min-Shiang Hwang:
Cryptanalysis of an ID-based Deniable Threshold Ring Authentication. Int. J. Netw. Secur. 21(2): 298-302 (2019) - [j184]Hsieh-Tsen Pan, Eko Fajar Cahyadi, Shu-Fen Chiou, Min-Shiang Hwang:
Research on Batch Verification Schemes for Identifying Illegal Signatures. Int. J. Netw. Secur. 21(6): 1062-1070 (2019) - [j183]Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang:
Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks. J. Supercomput. 75(8): 4601-4616 (2019) - 2018
- [j182]Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
A Survey of Reversible Data Hiding for VQ-Compressed Images. Int. J. Netw. Secur. 20(1): 1-8 (2018) - [j181]Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang:
A Secure Group Signature Scheme. Int. J. Netw. Secur. 20(2): 201-205 (2018) - [j180]Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching. Int. J. Netw. Secur. 20(4): 801-804 (2018) - [j179]Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, Min-Shiang Hwang:
A Survey of E-book Digital Right Management. Int. J. Netw. Secur. 20(5): 998-1004 (2018) - [j178]Li-Chin Huang, Ting-Yi Chang, Min-Shiang Hwang:
A Conference Key Scheme Based on the Diffie-Hellman Key Exchange. Int. J. Netw. Secur. 20(6): 1221-1226 (2018) - [c24]Min-Shiang Hwang, Eko Fajar Cahyadi, Yuen-Cheng Chou, Cheng-Ying Yang:
Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart Card. CIS 2018: 416-420 - [c23]Hsin-Ying Liang, Cheng-Ying Yang, Min-Shiang Hwang:
Secrecy Analysis in the AF Mode Cooperative Communication System. ICISA 2018: 285-293 - [c22]Min-Shiang Hwang, Hung-Wei Yang, Cheng-Ying Yang:
An Improved Hou-Wang's User Authentication Scheme. ICISA 2018: 295-301 - 2017
- [j177]Nan-I Wu, Min-Shiang Hwang:
Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images. Displays 49: 116-123 (2017) - [j176]Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin:
A secure privacy and authentication protocol for passive RFID tags. Int. J. Mob. Commun. 15(3): 266-277 (2017) - [j175]Shih-Ming Chen, Ching-Rong Yang, Min-Shiang Hwang:
Using a New Structure in Group Key Management for Pay-TV. Int. J. Netw. Secur. 19(1): 112-117 (2017) - [j174]Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang:
A Secure and Efficient One-time Password Authentication Scheme for WSN. Int. J. Netw. Secur. 19(2): 177-181 (2017) - [j173]Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, Min-Shiang Hwang:
A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms. Int. J. Netw. Secur. 19(3): 443-448 (2017) - [j172]Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang:
An Improved Key-Management Scheme for Hierarchical Access Control. Int. J. Netw. Secur. 19(4): 639-643 (2017) - [j171]Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching. Int. J. Netw. Secur. 19(5): 858-862 (2017) - [j170]Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang:
The Capacity Analysis in the Secure Cooperative Communication System. Int. J. Netw. Secur. 19(6): 863-869 (2017) - [j169]Min-Shiang Hwang, Tsuei-Hung Sun, Cheng-Chi Lee:
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service. J. Circuits Syst. Comput. 26(5): 1750072:1-1750072:16 (2017) - [j168]Ting Yi Chang, Min-Shiang Hwang, Chou Chen Yang:
Password Authenticated Key Exchange and Protected Password Change Protocols. Symmetry 9(8): 134 (2017) - [c21]Cheng-Ying Yang, Tsai-Yuan Chung, Min-Shiang Hwang, Cheng-Yi Li, Jenq-Foung J. F. Yao:
Learning Performance Evaluation in eLearning with the Web-Based Assessment. ICISA 2017: 645-651 - 2016
- [j167]Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:
A Survey of Public Auditing for Secure Data Storage in Cloud Computing. Int. J. Netw. Secur. 18(1): 133-142 (2016) - [j166]Chung-Huei Ling, Wei-Fu Hsien, Min-Shiang Hwang:
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach. Int. J. Netw. Secur. 18(2): 397-400 (2016) - [j165]Chung-Huei Ling, Shih-Ming Chen, Min-Shiang Hwang:
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol. Int. J. Netw. Secur. 18(3): 590-593 (2016) - [j164]Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:
A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing. Int. J. Netw. Secur. 18(4): 650-666 (2016) - [j163]Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage. Int. J. Netw. Secur. 18(5): 900-916 (2016) - [j162]Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang:
A Survey of Data Distortion Watermarking Relational Databases. Int. J. Netw. Secur. 18(6): 1022-1033 (2016) - [j161]Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou:
The Moderately Hard DoS-Resistant Authentication Protocol on Client Puzzles. Informatica 27(1): 31-48 (2016) - [j160]Tung-Huang Feng, Min-Shiang Hwang, Liang-Wei Syu:
An Authentication Protocol for Lightweight NFC Mobile Sensors Payment. Informatica 27(4): 723-732 (2016) - [j159]Iuon-Chang Lin, Yi-Lun Chi, Hung-Chieh Chuang, Min-Shiang Hwang:
The Novel Features for Phishing Based on User Device Detection. J. Comput. 11(2): 109-115 (2016) - [c20]Hsieh-Tsen Pan, Chiu-Shu Pan, Shyh-Chang Tsaur, Min-Shiang Hwang:
Cryptanalysis of Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-Server Environment Using Smart Card. CIS 2016: 590-593 - [c19]Chiu-Shu Pan, Cheng-Yi Tsai, Shyh-Chang Tsaur, Min-Shiang Hwang:
Cryptanalysis of an efficient password authentication scheme. ICSAI 2016: 743-748 - 2015
- [j158]Heri Wijayanto, Min-Shiang Hwang:
Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance. Int. J. Netw. Secur. 17(2): 160-164 (2015) - [j157]Yi-Lun Chi, Cheng Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang:
The Secure Transaction Protocol in NFC Card Emulation Mode. Int. J. Netw. Secur. 17(4): 431-438 (2015) - [j156]Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang:
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures. Int. J. Netw. Secur. 17(4): 463-470 (2015) - [j155]Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang:
A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure. Int. J. Netw. Secur. 17(5): 497-509 (2015) - [j154]Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang:
A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks. Int. J. Netw. Secur. 17(6): 712-721 (2015) - 2014
- [j153]Min-Shiang Hwang, Cheng-Chi Lee, Tsuei-Hung Sun:
Data error locations reported by public auditing in cloud storage service. Autom. Softw. Eng. 21(3): 373-390 (2014) - [j152]Pei-Shan Chung, Chi-Wei Liu, Min-Shiang Hwang:
A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments. Int. J. Netw. Secur. 16(1): 1-13 (2014) - [j151]Tung-Huang Feng, Chung-Huei Ling, Min-Shiang Hwang:
Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments. Int. J. Netw. Secur. 16(4): 318-321 (2014) - [j150]Wei Teng Li, Tung-Huang Feng, Min-Shiang Hwang:
Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey. Int. J. Netw. Secur. 16(5): 323-330 (2014) - [j149]Wei Teng Li, Chung-Huei Ling, Min-Shiang Hwang:
Group Rekeying in Wireless Sensor Networks: A Survey. Int. J. Netw. Secur. 16(6): 400-410 (2014) - [j148]Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee:
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme. Inf. Technol. Control. 43(3): 277-288 (2014) - [c18]Jia-Rong Sun, Min-Shiang Hwang:
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server. ICS 2014: 850-857 - 2013
- [j147]Li-Chin Huang, Cheng-Chi Lee, Min-Shiang Hwang:
A n2+n MQV key agreement protocol. Int. Arab J. Inf. Technol. 10(2): 137-142 (2013) - [j146]Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang:
Guessing Attacks on Strong-Password Authentication Protocol. Int. J. Netw. Secur. 15(1): 64-67 (2013) - [j145]Shih-Ting Hsu, Chou Chen Yang, Min-Shiang Hwang:
A Study of Public Key Encryption with Keyword Search. Int. J. Netw. Secur. 15(2): 71-79 (2013) - [j144]Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang:
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. Int. J. Netw. Secur. 15(4): 231-240 (2013) - [j143]Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang:
A Study of Conjunctive Keyword Searchable Schemes. Int. J. Netw. Secur. 15(5): 321-330 (2013) - [j142]Min-Yu Chen, Chou Chen Yang, Min-Shiang Hwang:
Privacy Protection Data Access Control. Int. J. Netw. Secur. 15(6): 411-419 (2013) - [j141]Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng:
A new proxy signature scheme for a specified group of verifiers. Inf. Sci. 227: 102-115 (2013) - [j140]Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang:
A New Group Signature Scheme Based on RSA Assumption. Inf. Technol. Control. 42(1): 61-66 (2013) - [j139]Li-Chin Huang, Min-Shiang Hwang, Lin-Yu Tseng:
Reversible and High-Capacity Data Hiding in High Quality Medical Images. KSII Trans. Internet Inf. Syst. 7(1): 132-148 (2013) - [j138]Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang:
A reversible data hiding method by histogram shifting in high quality medical images. J. Syst. Softw. 86(3): 716-727 (2013) - [j137]Song-Kong Chong, Cheng-Chi Lee, Min-Shiang Hwang:
An Authentication Scheme for the Global Mobility Network. Parallel Process. Lett. 23(3) (2013) - [j136]Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan:
Towards secure and efficient user authentication scheme using smart card for multi-server environments. J. Supercomput. 66(2): 1008-1032 (2013) - [j135]Hsia-Hung Ou, Min-Shiang Hwang:
Double Delegation-Based Authentication and Key Agreement Protocol for PCSs. Wirel. Pers. Commun. 72(1): 437-446 (2013) - [c17]Min-Yu Chen, Chi-Wei Liu, Min-Shiang Hwang:
SecureDropbox: a file encryption system suitable for cloud storage services. CAC 2013: 21:1-21:2 - [c16]Cheng-Ying Yang, Yi-Shan Lin, Min-Shiang Hwang:
Downlink Relay Selection Algorithm for Amplify-and-Forward Cooperative Communication Systems. CISIS 2013: 331-334 - 2012
- [j134]Chun-Ta Li, Chou Chen Yang, Min-Shiang Hwang:
A secure routing protocol with node selfishness resistance in MANETs. Int. J. Mob. Commun. 10(1): 103-118 (2012) - [j133]Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang:
An effective AKA protocol for UMTS. Int. J. Mob. Commun. 10(4): 427-448 (2012) - [j132]Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin:
An improved authentication protocol for mobile agent device in RFID environment. Int. J. Mob. Commun. 10(5): 508-520 (2012) - [j131]Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang:
The Study of Data Hiding in Medical Images. Int. J. Netw. Secur. 14(6): 301-309 (2012) - [j130]Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages. Informatica 23(4): 537-562 (2012) - 2011
- [j129]Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou:
On the security of an enhanced UMTS authentication and key agreement protocol. Eur. Trans. Telecommun. 22(3): 99-112 (2011) - [j128]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
On the Security of Self-Certified Public Keys. Int. J. Inf. Secur. Priv. 5(2): 54-60 (2011) - [j127]Ting Yi Chang, Min-Shiang Hwang:
User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications. Int. J. Mob. Commun. 9(2): 144-158 (2011) - [j126]Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin:
An authentication protocol for low-cost RFID tags. Int. J. Mob. Commun. 9(2): 208-223 (2011) - [j125]Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
A communication-efficient three-party password authenticated key exchange protocol. Inf. Sci. 181(1): 217-226 (2011) - [j124]Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu:
An efficient key assignment scheme for access control in a large leaf class hierarchy. Inf. Sci. 181(4): 917-925 (2011) - [j123]Chun-Ta Li, Min-Shiang Hwang:
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks. Inf. Sci. 181(23): 5333-5347 (2011) - [j122]Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem. Inf. Technol. Control. 40(3): 246-251 (2011) - [j121]Chia-Hui Wei, Min-Shiang Hwang, A. Y. Chin:
A Mutual Authentication Protocol for RFID. IT Prof. 13(2): 20-24 (2011) - [j120]Chia-Chun Wu, Shang-Juh Kao, Min-Shiang Hwang:
A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 84(12): 2196-2207 (2011) - [j119]Shiang-Feng Tzeng, Cheng-Chi Lee, Min-Shiang Hwang:
A Batch Verification for Multiple Proxy Signature. Parallel Process. Lett. 21(1): 77-84 (2011) - [j118]Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang:
An efficient authentication protocol for mobile communications. Telecommun. Syst. 46(1): 31-41 (2011) - 2010
- [j117]Chun-Ta Li, Min-Shiang Hwang:
An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1): 1-5 (2010) - [j116]Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen:
DoS-resistant ID-based password authentication scheme using smart cards. J. Syst. Softw. 83(1): 163-172 (2010) - [j115]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
A cocktail protocol with the Authentication and Key Agreement on the UMTS. J. Syst. Softw. 83(2): 316-325 (2010) - [j114]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-Ke Jan:
A Provable Billing Protocol on the Current UMTS. Wirel. Pers. Commun. 55(4): 551-566 (2010)
2000 – 2009
- 2009
- [j113]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
The UMTS-AKA Protocols for Intelligent Transportation Systems. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j112]Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng:
A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. Int. J. Found. Comput. Sci. 20(2): 351-359 (2009) - [j111]Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, Jinn-ke Jan:
TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS. Int. J. Netw. Manag. 19(4): 291-303 (2009) - [j110]Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin:
A new English auction scheme using the bulletin board system. Inf. Manag. Comput. Secur. 17(5): 408-417 (2009) - [j109]Cheng-Chi Lee, Pi-Fang Ho, Min-Shiang Hwang:
A secure e-auction scheme based on group signatures. Inf. Syst. Frontiers 11(3): 335-343 (2009) - [j108]Hao-Ju Wu, Yi-Hsin Chang, Min-Shiang Hwang, Iuon-Chang Lin:
Flexible RFID location system based on artificial neural networks for medical care facilities. SIGBED Rev. 6(2): 12 (2009) - [c15]Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang:
Reversible Secret Image Sharing Based on Shamir's Scheme. IIH-MSP 2009: 1014-1017 - [c14]Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai:
A Verifiable Electronic Voting Scheme over the Internet. ITNG 2009: 449-454 - [c13]Chun-Ta Li, Min-Shiang Hwang:
Improving the Security of Non-PKI Methods for Public Key Distribution. ITNG 2009: 1695-1696 - 2008
- [j107]Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu:
An electronic voting protocol with deniable authentication for mobile ad hoc networks. Comput. Commun. 31(10): 2534-2540 (2008) - [j106]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12): 2803-2814 (2008) - [j105]Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong:
An improved address ownership in mobile IPv6. Comput. Commun. 31(14): 3250-3252 (2008) - [j104]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Comput. Commun. 31(18): 4255-4258 (2008) - [j103]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Comput. Syst. Sci. Eng. 23(3) (2008) - [j102]Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang:
A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. 81(1): 150-158 (2008) - [j101]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
A new authentication protocol based on pointer forwarding for mobile communications. Wirel. Commun. Mob. Comput. 8(5): 661-672 (2008) - [c12]Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang:
Enhance the Image Sharing with Steganography and Authentication. IIH-MSP 2008: 1177-1181 - [c11]Jung-Wen Lo, Min-Shiang Hwang, Yen-Ping Chu:
An Exchangeable E-Cash Scheme by E-Mint. ISDA (3) 2008: 246-251 - [c10]Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou:
An Ordered Multi-proxy Multi-signature Scheme. ISDA (3) 2008: 308-313 - [c9]Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou:
An Improvement of Strong Proxy Signature and Its Applications. SECRYPT 2008: 95-98 - 2007
- [j100]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
A simple mobile communication billing system among charged parties. Appl. Math. Comput. 192(2): 487-495 (2007) - [j99]Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang:
A new convertible authenticated encryption scheme with message linkages. Comput. Electr. Eng. 33(2): 133-138 (2007) - [j98]Nan-I Wu, Min-Shiang Hwang:
Data Hiding: Current Status and Key Issues. Int. J. Netw. Secur. 4(1): 1-9 (2007) - [c8]Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li:
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. ICCSA (3) 2007: 273-284 - 2006
- [j97]Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang:
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Appl. Math. Comput. 172(2): 1195-1200 (2006) - [j96]Min-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, Yen-Ping Chu:
Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows. IEICE Trans. Inf. Syst. 89-D(4): 1575-1577 (2006) - [j95]Min-Shiang Hwang, Pei-Chen Sung:
A Study of Micro-payment Based on One-way Hash Chain. Int. J. Netw. Secur. 2(2): 81-90 (2006) - [j94]Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang:
Password Authentication Schemes: Current Status and Key Issues. Int. J. Netw. Secur. 3(2): 101-115 (2006) - [j93]I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang:
A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4): 727-740 (2006) - [j92]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments. IEEE Trans. Ind. Electron. 53(5): 1683-1687 (2006) - [c7]I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang:
Identity-based deniable authentication protocol from pairings. IMSA 2006: 112-114 - 2005
- [j91]Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang:
Improvement of signature scheme based on factoring and discrete logarithms. Appl. Math. Comput. 161(1): 49-54 (2005) - [j90]Eric Jui-Lin Lu, Min-Shiang Hwang, Cheng-Jian Huang:
A new proxy signature scheme with revocation. Appl. Math. Comput. 161(3): 799-806 (2005) - [j89]Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme. Appl. Math. Comput. 163(1): 169-178 (2005) - [j88]Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang:
A new blind signature based on the discrete logarithm problem for untraceability. Appl. Math. Comput. 164(3): 837-841 (2005) - [j87]Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang:
Cryptanalysis of an authenticated encryption scheme using self-certified public keys. Appl. Math. Comput. 166(1): 118-122 (2005) - [j86]Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang:
A time-stamping protocol for digital watermarking. Appl. Math. Comput. 169(2): 1276-1284 (2005) - [j85]Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu:
Improvement on the flexible tree-based key management framework. Comput. Secur. 24(6): 500-504 (2005) - [j84]Shiang-Feng Tzeng, Min-Shiang Hwang, Hsing-Bai Chen:
A secure on-line software transaction scheme. Comput. Stand. Interfaces 27(3): 303-312 (2005) - [j83]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Des. Codes Cryptogr. 36(1): 53-67 (2005) - [j82]Hsien-Chu Wu, Min-Shiang Hwang, Chia-Hsin Liu:
A Secure Strong-Password Authentication Protocol. Fundam. Informaticae 68(4): 399-406 (2005) - [j81]Cheng-Chi Lee, Ting Yi Chang, Min-Shiang Hwang:
A simple broadcasting cryptosystem in computer networks using eXclusive-OR. Int. J. Comput. Appl. Technol. 24(3): 180-183 (2005) - [j80]Min-Shiang Hwang, Cheng-Chi Lee:
Research Issues and Challenges for Multiple Digital Signatures. Int. J. Netw. Secur. 1(1): 1-7 (2005) - [j79]Min-Shiang Hwang, Chi-Yu Liu:
Authenticated Encryption Schemes: Current Status and Key Issues. Int. J. Netw. Secur. 1(2): 61-73 (2005) - [j78]Min-Shiang Hwang, Ting Yi Chang:
Threshold Signatures: Current Status and Key Issues. Int. J. Netw. Secur. 1(3): 123-137 (2005) - [j77]Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang:
A user authentication system using back-propagation network. Neural Comput. Appl. 14(3): 243-249 (2005) - [j76]Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
A new multi-stage secret sharing scheme using one-way function. ACM SIGOPS Oper. Syst. Rev. 39(1): 48-55 (2005) - [j75]Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, Chao-Chen Yang:
A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography. Telecommun. Syst. 29(3): 165-180 (2005) - 2004
- [j74]Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang:
A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2): 483-490 (2004) - [j73]Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang:
An improvement of nonrepudiable threshold proxy signature scheme with known signers. Comput. Secur. 23(2): 174-178 (2004) - [j72]Shiang-Feng Tzeng, Min-Shiang Hwang:
Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem. Comput. Stand. Interfaces 26(2): 61-71 (2004) - [j71]Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong Tsai:
Generalization of proxy signature based on elliptic curves. Comput. Stand. Interfaces 26(2): 73-84 (2004) - [j70]Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang:
Efficient access control and key management schemes for mobile agents. Comput. Stand. Interfaces 26(5): 423-433 (2004) - [j69]Min-Shiang Hwang, Jung-Wen Lo, Shu-Chen Lin:
An efficient user identification scheme based on ID-based cryptosystem. Comput. Stand. Interfaces 26(6): 565-569 (2004) - [j68]Chou Chen Yang, Jian Wei Li, Min-Shiang Hwang:
A new mutual authentication and key exchange protocol with balanced computational power for wireless settings. Eur. Trans. Telecommun. 15(2): 91-99 (2004) - [j67]Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang:
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Future Gener. Comput. Syst. 20(5): 887-893 (2004) - [j66]Ting Yi Chang, Chou Chen Yang, Min-Shiang Hwang:
A threshold signature scheme for group communications without a shared distribution center. Future Gener. Comput. Syst. 20(6): 1013-1021 (2004) - [j65]Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu:
Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack. Fundam. Informaticae 61(3-4): 389-398 (2004) - [j64]Jau-Ji Shen, Iuon-Chang Lin, Min-Shiang Hwang:
A Secure LITESET Scheme. IEICE Trans. Inf. Syst. 87-D(11): 2509-2512 (2004) - [j63]Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang:
A new digital signature scheme based on factoring and discrete logarithms. Int. J. Comput. Math. 81(1): 9-14 (2004) - [j62]Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang:
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. J. Syst. Softw. 73(3): 507-514 (2004) - [j61]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
A server assisted authentication protocol for detecting error vectors. ACM SIGOPS Oper. Syst. Rev. 38(2): 93-96 (2004) - [j60]Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee:
A key authentication scheme with non-repudiation. ACM SIGOPS Oper. Syst. Rev. 38(3): 75-78 (2004) - [j59]Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang:
Cryptanalysis of an efficient secure group signature scheme. ACM SIGOPS Oper. Syst. Rev. 38(4): 66-69 (2004) - [j58]Chin-Chen Chang, Kuo-Lun Chen, Min-Shiang Hwang:
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication. Wirel. Pers. Commun. 28(2): 95-106 (2004) - [c6]Min-Shiang Hwang, Ting Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai:
On the Security of an Enhanced Authentication Key Exchange Protocol. AINA (2) 2004: 160-163 - 2003
- [j57]Cheng-Chi Lee, Min-Shiang Hwang, Li-Hua Li:
A new key authentication scheme based on discrete logarithms. Appl. Math. Comput. 139(2-3): 343-349 (2003) - [j56]Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai:
Traceability on RSA-based partially signature with low computation. Appl. Math. Comput. 145(2-3): 465-468 (2003) - [j55]Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang:
Generalization of proxy signature-based on discrete logarithms. Comput. Secur. 22(3): 245-255 (2003) - [j54]Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang:
Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput. Secur. 22(7): 591-595 (2003) - [j53]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
Security enhancement for anonymous secure e-voting over a network. Comput. Stand. Interfaces 25(2): 131-139 (2003) - [j52]Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang:
A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem. Comput. Stand. Interfaces 25(2): 141-145 (2003) - [j51]Iuon-Chang Lin, Min-Shiang Hwang, Li-Hua Li:
A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst. 19(1): 13-22 (2003) - [j50]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Gener. Comput. Syst. 19(4): 457-462 (2003) - [j49]Cheng-Chi Lee, Wei-Pang Yang, Min-Shiang Hwang:
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem. Fundam. Informaticae 55(3-4): 307-320 (2003) - [j48]Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai:
Traceability on Stadler et al.'s Fair Blind Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(2): 513-514 (2003) - [j47]Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai:
An Untraceable Blind Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(7): 1902-1906 (2003) - [j46]Cheng-Chi Lee, Chao-Chen Yang, Min-Shiang Hwang:
A new privacy and authentication protocol for end-to-end mobile users. Int. J. Commun. Syst. 16(9): 799-808 (2003) - [j45]Chou Chen Yang, Ting Yi Chang, Jian Wei Li, Min-Shiang Hwang:
Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem. Informatica 14(1): 111-120 (2003) - [j44]Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang:
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 14(3): 393-402 (2003) - [j43]Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang:
Security of Improvement on Methods for Protecting Password Transmission. Informatica 14(4): 551-558 (2003) - [j42]Shin-Jia Hwang, Min-Shiang Hwang, Shiang-Feng Tzeng:
A New Digital Multisignature Scheme With Distinguished Signing Authorities. J. Inf. Sci. Eng. 19(5): 881-887 (2003) - [j41]Min-Shiang Hwang, Wei-Pang Yang:
Controlling access in large partially ordered hierarchies using cryptographic keys. J. Syst. Softw. 67(2): 99-107 (2003) - [j40]Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang:
Security enhancement for Optimal Strong-Password Authentication protocol. ACM SIGOPS Oper. Syst. Rev. 37(2): 7-12 (2003) - [j39]Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang:
Security enhancement for optimal strong-password authentication protocol. ACM SIGOPS Oper. Syst. Rev. 37(3): 12-16 (2003) - [j38]Min-Shiang Hwang, Chao-Chen Yang, Cheng-Yeh Shiu:
An authentication scheme for mobile satellite communication systems. ACM SIGOPS Oper. Syst. Rev. 37(4): 42-47 (2003) - [j37]Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang:
A modified remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 49(2): 414-416 (2003) - [j36]Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin:
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Trans. Knowl. Data Eng. 15(6): 1552-1560 (2003) - [c5]Min-Shiang Hwang, Wen-Guey Tzeng:
A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. ICOIN 2003: 757-761 - 2002
- [j35]Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin:
Adding timestamps to the secure electronic auction protocol. Data Knowl. Eng. 40(2): 155-162 (2002) - [j34]Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang:
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme. Fundam. Informaticae 53(2): 131-134 (2002) - [j33]Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai:
Traceability on Low-Computation Partially Blind Signatures for Electronic Cash. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(5): 1181-1182 (2002) - [j32]Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang:
A Feature-Oriented Copyright Owner Proving Technique for Still Images. Int. J. Softw. Eng. Knowl. Eng. 12(3): 317-330 (2002) - [j31]Min-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang:
Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. J. Inf. Sci. Eng. 18(3): 373-379 (2002) - [j30]Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang:
A flexible remote user authentication scheme using smart cards. ACM SIGOPS Oper. Syst. Rev. 36(3): 46-52 (2002) - [j29]Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang:
A remote user authentication scheme using hash functions. ACM SIGOPS Oper. Syst. Rev. 36(4): 23-29 (2002) - [j28]Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang:
An ElGamal-Like Cryptosystem for Enciphering Large Messages. IEEE Trans. Knowl. Data Eng. 14(2): 445-446 (2002) - [c4]Chou Chen Yang, Min-Shiang Hwang, Jian Wei Li, Ting Yi Chang:
A Solution to Mobile IP Registration for AAA. CDMA International Conference 2002: 329-337 - 2001
- [j27]Min-Shiang Hwang, Chii-Hwa Lee:
Secure access schemes in mobile database systems. Eur. Trans. Telecommun. 12(4): 303-310 (2001) - [j26]Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang:
An Improvement of SPLICE/AS in WIDE against Guessing Attack. Informatica 12(2): 297-302 (2001) - [j25]Min-Shiang Hwang, Iuon-Chang Lin, Li-Hua Li:
A simple micro-payment scheme. J. Syst. Softw. 55(3): 221-229 (2001) - [j24]Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen:
A new encryption algorithm for image cryptosystems. J. Syst. Softw. 58(2): 83-91 (2001) - [j23]Li-Hua Li, Iuon-Chang Lin, Min-Shiang Hwang:
A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Networks 12(6): 1498-1504 (2001) - [c3]Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang:
Two Simple Batch Verifying Multiple Digital Signatures. ICICS 2001: 233-237 - 2000
- [j22]Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang:
A threshold decryption scheme without session keys. Comput. Electr. Eng. 27(1): 29-35 (2000) - [j21]Min-Shiang Hwang:
An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies. Int. J. Comput. Math. 73(4): 463-468 (2000) - [j20]Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang:
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures. Informatica 11(1): 15-19 (2000) - [j19]Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu:
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 11(2): 137-144 (2000) - [j18]Min-Shiang Hwang:
A New Redundancy Reducing Cipher. Informatica 11(4): 435-440 (2000) - [j17]Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang:
A Digital Watermarking Scheme Using Human Visual Effects. Informatica (Slovenia) 24(4) (2000) - [j16]Min-Shiang Hwang:
Cryptanalysis of YCN key assignment scheme in a hierarchy. Inf. Process. Lett. 73(3-4): 97-101 (2000) - [j15]Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang:
Digital watermarking of images using neural networks. J. Electronic Imaging 9(4): 548-555 (2000) - [j14]Min-Shiang Hwang, Li-Hua Li:
A new remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46(1): 28-30 (2000) - [c2]Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang:
Security Enhancement for the "Simple Authentication Key Agreement Algorithm". COMPSAC 2000: 113-115
1990 – 1999
- 1999
- [j13]Min-Shiang Hwang:
Cryptanalysis of a remote login authentication scheme. Comput. Commun. 22(8): 742-744 (1999) - [j12]Min-Shiang Hwang:
A remote password authentication scheme based on the digital signature method. Int. J. Comput. Math. 70(4): 657-666 (1999) - [j11]Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang:
A Novel Application of the Phone Card and Its Authentication in Mobile Communications. J. Inf. Sci. Eng. 15(4): 471-484 (1999) - [j10]Min-Shiang Hwang:
A Dynamic Key Generation Scheme for Access Control in a Hierarchy. Nord. J. Comput. 6(4): 363-371 (1999) - [j9]Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang:
A watermarking technique based on one-way hash functions. IEEE Trans. Consumer Electron. 45(2): 286-294 (1999) - [j8]Chii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang:
Enhanced privacy and authentication for the global system for mobile communications. Wirel. Networks 5(4): 231-243 (1999) - 1998
- [j7]Tung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang:
A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7(10): 1485-1488 (1998) - 1997
- [j6]Min-Shiang Hwang, Wei-Pang Yang:
Multilevel Secure Database Encryption with Subkeys. Data Knowl. Eng. 22(2): 117-131 (1997) - [j5]Min-Shiang Hwang, Chii-Hwa Lee:
Authenticated key-exchange in a mobile radio network. Eur. Trans. Telecommun. 8(3): 265-269 (1997) - 1996
- [j4]Min-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang:
An access control scheme based on Chinese remainder theorem and time stamp concept. Comput. Secur. 15(1): 73-81 (1996) - [c1]Chii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang:
Phone Card Application and Authentication in Wireless Communications. IFIP World Conference on Mobile Communications 1996: 323-329 - 1995
- [j3]Min-Shiang Hwang, Wei-Pang Yang:
Conference Key Distribution Schemes for Secure Digital Mobile Communications. IEEE J. Sel. Areas Commun. 13(2): 416-420 (1995) - [j2]Min-Shiang Hwang, Wei-Pang Yang:
A two-phase encryption scheme for enhancing database security. J. Syst. Softw. 31(3): 257-265 (1995) - 1994
- [j1]Min-Shiang Hwang, Wei-Pang Yang:
A New Dynamic Access Control Scheme Based on Subject-Object List. Data Knowl. Eng. 14(1): 45-56 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint