|
Search the dblp DataBase
Ren-Junn Hwang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chin-Chen Chang, Ren-Junn Hwang
A New Scheme to Protect Confidential Images. [Citation Graph (0, 0)][DBLP] AINA (1), 2004, pp:158-164 [Conf]
- Ren-Junn Hwang, Chin-Chen Chang
Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP] AINA (1), 2004, pp:208-212 [Conf]
- Ren-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai
An Enhanced Authentication Key Exchange Protocol . [Citation Graph (0, 0)][DBLP] AINA, 2003, pp:202-205 [Conf]
- Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen
An Efficient Decryption Method for RSA Cryptosystem. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:585-590 [Conf]
- Sheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin
Key Agreement Protocol Based on Weil Pairing. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:597-602 [Conf]
- Ying-Hong Wang, Ren-Junn Hwang, Wen-Nan Wang
An Agent-Based Consumer Recommendation Mechanism. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:143-148 [Conf]
- Ren-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai
Enhanced Authentication Key Agreement Protocol. [Citation Graph (0, 0)][DBLP] Applied Informatics, 2003, pp:1003-1006 [Conf]
- Ren-Junn Hwang, Timothy K. Shih, Chuan-Ho Kao, Tsung-Ming Chang
Lossy Compression Tolerant Steganography. [Citation Graph (0, 0)][DBLP] Human.Society@Internet, 2001, pp:427-435 [Conf]
- Ying-Hong Wang, Ren-Junn Hwang, Wen-Nan Wang
An Agent-Based Consumer Recommendation Mechanism. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2004, pp:228-233 [Conf]
- Ren-Junn Hwang, Chin-Chen Chang
A Method for Sending Confidential Messages to a Group without Trusted Parties. [Citation Graph (0, 0)][DBLP] ISPA, 2003, pp:375-381 [Conf]
- Ren-Junn Hwang, Rong-Chi Chang
Key Agreement in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ISPA, 2003, pp:382-390 [Conf]
- Ren-Junn Hwang, Rong-Chi Chang, Sheng-Hua Shiau, Tsung-Ming Chang, Chun-Chia Wang, Hui-Huang Hsu
Digital Watermarking Based on Pixels Relationships. [Citation Graph (0, 0)][DBLP] JCIS, 2002, pp:1025-1028 [Conf]
- Ren-Junn Hwang, Chuan-Ho Kao
The Improvement of Steganography Capacity. [Citation Graph (0, 0)][DBLP] MMM, 2003, pp:329-342 [Conf]
- Ren-Junn Hwang, Chin-Chen Chang
An on-line secret sharing scheme for multi-secrets. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:13, pp:1170-1176 [Journal]
- Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu
Crypographic key assignment scheme for access control in a hierarchy. [Citation Graph (0, 0)][DBLP] Inf. Syst., 1992, v:17, n:3, pp:243-247 [Journal]
- Chin-Chen Chang, Ren-Junn Hwang
Sharing Secret Omages using Shadow Codebooks. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1998, v:111, n:1-4, pp:335-345 [Journal]
- Ren-Junn Hwang, Chin-Chen Chang
An Improved Threshold Scheme Based on Modular ARithmetic. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 1999, v:15, n:5, pp:691-699 [Journal]
- Chin-Chen Chang, Ren-Junn Hwang
A new scheme to protect confidential images. [Citation Graph (0, 0)][DBLP] Journal of Interconnection Networks, 2004, v:5, n:3, pp:221-232 [Journal]
- Ren-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang
A concept of designing cheater identification methods for secret sharing. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1999, v:46, n:1, pp:7-11 [Journal]
- Ren-Junn Hwang, Sheng-Hua Shiau, Ding-Far Jan
A new mobile payment scheme for roaming services. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research and Applications, 2007, v:6, n:2, pp:184-191 [Journal]
Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|