|
Search the dblp DataBase
Shin-Jia Hwang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shin-Jia Hwang, Chin-Chen Chang
A dynamic secret sharing scheme with cheater detection. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:48-55 [Conf]
- Shin-Jia Hwang, Kuang-Hsi Chen
A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:649-654 [Conf]
- Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:215-227 [Conf]
- Shin-Jia Hwang, Ching-Chung Chan
Improvement on Li et al.'s generalization of proxy signature schemes. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:7, pp:615-619 [Journal]
- Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP] Fundam. Inform., 2002, v:53, n:2, pp:131-134 [Journal]
- Shin-Jia Hwang, Chiu-Chin Chen
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2003, v:14, n:2, pp:205-212 [Journal]
- Chin-Chen Chang, Shin-Jia Hwang
A Simple Approach for Generating RSA Keys. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1997, v:63, n:1, pp:19-21 [Journal]
- Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang
Autenticated Encryption Schemes with Message Linkage. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1996, v:58, n:4, pp:189-195 [Journal]
- Shin-Jia Hwang, Min-Shiang Hwang, Shiang-Feng Tzeng
A New Digital Multisignature Scheme With Distinguished Signing Authorities. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2003, v:19, n:5, pp:881-887 [Journal]
- Chin-Chen Chang, Shin-Jia Hwang, Daniel J. Buehrer
New concepts for multiple stack systems: Born and reborn. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1994, v:27, n:1, pp:45-54 [Journal]
- Shin-Jia Hwang, Chiu-Chin Chen
New threshold-proxy threshold-signature schemes. [Citation Graph (0, 0)][DBLP] Computers & Electrical Engineering, 2005, v:31, n:1, pp:69-80 [Journal]
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|