The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ren-Junn Hwang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chin-Chen Chang, Ren-Junn Hwang
    A New Scheme to Protect Confidential Images. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:158-164 [Conf]
  2. Ren-Junn Hwang, Chin-Chen Chang
    Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:208-212 [Conf]
  3. Ren-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai
    An Enhanced Authentication Key Exchange Protocol . [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:202-205 [Conf]
  4. Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen
    An Efficient Decryption Method for RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:585-590 [Conf]
  5. Sheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin
    Key Agreement Protocol Based on Weil Pairing. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:597-602 [Conf]
  6. Ying-Hong Wang, Ren-Junn Hwang, Wen-Nan Wang
    An Agent-Based Consumer Recommendation Mechanism. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:143-148 [Conf]
  7. Ren-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai
    Enhanced Authentication Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    Applied Informatics, 2003, pp:1003-1006 [Conf]
  8. Ren-Junn Hwang, Timothy K. Shih, Chuan-Ho Kao, Tsung-Ming Chang
    Lossy Compression Tolerant Steganography. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2001, pp:427-435 [Conf]
  9. Ying-Hong Wang, Ren-Junn Hwang, Wen-Nan Wang
    An Agent-Based Consumer Recommendation Mechanism. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2004, pp:228-233 [Conf]
  10. Ren-Junn Hwang, Chin-Chen Chang
    A Method for Sending Confidential Messages to a Group without Trusted Parties. [Citation Graph (0, 0)][DBLP]
    ISPA, 2003, pp:375-381 [Conf]
  11. Ren-Junn Hwang, Rong-Chi Chang
    Key Agreement in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISPA, 2003, pp:382-390 [Conf]
  12. Ren-Junn Hwang, Rong-Chi Chang, Sheng-Hua Shiau, Tsung-Ming Chang, Chun-Chia Wang, Hui-Huang Hsu
    Digital Watermarking Based on Pixels Relationships. [Citation Graph (0, 0)][DBLP]
    JCIS, 2002, pp:1025-1028 [Conf]
  13. Ren-Junn Hwang, Chuan-Ho Kao
    The Improvement of Steganography Capacity. [Citation Graph (0, 0)][DBLP]
    MMM, 2003, pp:329-342 [Conf]
  14. Ren-Junn Hwang, Chin-Chen Chang
    An on-line secret sharing scheme for multi-secrets. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:13, pp:1170-1176 [Journal]
  15. Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu
    Crypographic key assignment scheme for access control in a hierarchy. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1992, v:17, n:3, pp:243-247 [Journal]
  16. Chin-Chen Chang, Ren-Junn Hwang
    Sharing Secret Omages using Shadow Codebooks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1998, v:111, n:1-4, pp:335-345 [Journal]
  17. Ren-Junn Hwang, Chin-Chen Chang
    An Improved Threshold Scheme Based on Modular ARithmetic. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:5, pp:691-699 [Journal]
  18. Chin-Chen Chang, Ren-Junn Hwang
    A new scheme to protect confidential images. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2004, v:5, n:3, pp:221-232 [Journal]
  19. Ren-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang
    A concept of designing cheater identification methods for secret sharing. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1999, v:46, n:1, pp:7-11 [Journal]
  20. Ren-Junn Hwang, Sheng-Hua Shiau, Ding-Far Jan
    A new mobile payment scheme for roaming services. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2007, v:6, n:2, pp:184-191 [Journal]

  21. Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002