Search the dblp DataBase
Min-Shiang Hwang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Min-Shiang Hwang , Ting Yi Chang , Shu-Chen Lin , Chwei-Shyong Tsai On the Security of an Enhanced Authentication Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:160-163 [Conf ] Chou Chen Yang , Min-Shiang Hwang , Jian Wei Li , Ting Yi Chang A Solution to Mobile IP Registration for AAA. [Citation Graph (0, 0)][DBLP ] CDMA International Conference, 2002, pp:329-337 [Conf ] Iuon-Chang Lin , Chin-Chen Chang , Min-Shiang Hwang Security Enhancement for the "Simple Authentication Key Agreement Algorithm". [Citation Graph (0, 0)][DBLP ] COMPSAC, 2000, pp:113-115 [Conf ] Min-Shiang Hwang , Cheng-Chi Lee , Yuan-Liang Tang Two Simple Batch Verifying Multiple Digital Signatures. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:233-237 [Conf ] Min-Shiang Hwang , Wen-Guey Tzeng A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:757-761 [Conf ] Chii-Hwa Lee , Min-Shiang Hwang , Wei-Pang Yang Phone Card Application and Authentication in Wireless Communications. [Citation Graph (0, 0)][DBLP ] IFIP World Conference on Mobile Communications, 1996, pp:323-329 [Conf ] I-En Liao , Cheng-Chi Lee , Min-Shiang Hwang Identity-based deniable authentication protocol from pairings. [Citation Graph (0, 0)][DBLP ] IMSA, 2006, pp:112-114 [Conf ] Min-Shiang Hwang Cryptanalysis of a remote login authentication scheme. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:8, pp:742-744 [Journal ] Min-Shiang Hwang , Jung-Wen Lo , Chia-Hsin Liu Improvement on the flexible tree-based key management framework. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:6, pp:500-504 [Journal ] Min-Shiang Hwang , Wen-Guey Tzeng , Wei-Pang Yang An access control scheme based on Chinese remainder theorem and time stamp concept. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:73-81 [Journal ] Li-Hua Li , Shiang-Feng Tzeng , Min-Shiang Hwang Generalization of proxy signature-based on discrete logarithms. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:3, pp:245-255 [Journal ] Jau-Ji Shen , Chih-Wei Lin , Min-Shiang Hwang Security enhancement for the timestamp-based password authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:7, pp:591-595 [Journal ] Shiang-Feng Tzeng , Min-Shiang Hwang , Cheng-Ying Yang An improvement of nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:2, pp:174-178 [Journal ] Iuon-Chang Lin , Min-Shiang Hwang , Chin-Chen Chang The General Pay-Word: A Micro-payment Scheme Based on n -dimension One-way Hash Chain. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2005, v:36, n:1, pp:53-67 [Journal ] Min-Shiang Hwang , Eric Jui-Lin Lu , Iuon-Chang Lin Adding timestamps to the secure electronic auction protocol. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:40, n:2, pp:155-162 [Journal ] Min-Shiang Hwang , Wei-Pang Yang A New Dynamic Access Control Scheme Based on Subject-Object List. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1994, v:14, n:1, pp:45-56 [Journal ] Min-Shiang Hwang , Wei-Pang Yang Multilevel Secure Database Encryption with Subkeys. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1997, v:22, n:2, pp:117-131 [Journal ] Ting Yi Chang , Chou Chen Yang , Min-Shiang Hwang A threshold signature scheme for group communications without a shared distribution center. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2004, v:20, n:6, pp:1013-1021 [Journal ] Iuon-Chang Lin , Min-Shiang Hwang , Chin-Chen Chang A new key assignment scheme for enforcing complicated access control policies in hierarchy. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2003, v:19, n:4, pp:457-462 [Journal ] Iuon-Chang Lin , Min-Shiang Hwang , Li-Hua Li A new remote user authentication scheme for multi-server architecture. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2003, v:19, n:1, pp:13-22 [Journal ] Shiang-Feng Tzeng , Cheng-Ying Yang , Min-Shiang Hwang A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2004, v:20, n:5, pp:887-893 [Journal ] Min-Shiang Hwang , Cheng-Chi Lee , Shin-Jia Hwang Cryptanalysis of the Hwang-Shi Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2002, v:53, n:2, pp:131-134 [Journal ] Min-Shiang Hwang , Jung-Wen Lo , Chia-Hsin Liu Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2004, v:61, n:3-4, pp:389-398 [Journal ] Cheng-Chi Lee , Wei-Pang Yang , Min-Shiang Hwang Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2003, v:55, n:3-4, pp:307-320 [Journal ] Hsien-Chu Wu , Min-Shiang Hwang , Chia-Hsin Liu A Secure Strong-Password Authentication Protocol. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2005, v:68, n:4, pp:399-406 [Journal ] Shiang-Feng Tzeng , Cheng-Ying Yang , Min-Shiang Hwang A new digital signature scheme based on factoring and discrete logarithms. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Math., 2004, v:81, n:1, pp:9-14 [Journal ] Chin-Chen Chang , Kuo-Feng Hwang , Min-Shiang Hwang A Feature-Oriented Copyright Owner Proving Technique for Still Images. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2002, v:12, n:3, pp:317-0 [Journal ] Min-Shiang Hwang , Iuon-Chang Lin , Eric Jui-Lin Lu A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2000, v:11, n:2, pp:137-144 [Journal ] Min-Shiang Hwang , Iuon-Chang Lin , Kuo-Feng Hwang Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2000, v:11, n:1, pp:15-19 [Journal ] Min-Shiang Hwang , Cheng-Chi Lee , Yuan-Liang Tang An Improvement of SPLICE/AS in WIDE against Guessing Attack. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2001, v:12, n:2, pp:297-302 [Journal ] Min-Shiang Hwang A New Redundancy Reducing Cipher. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2000, v:11, n:4, pp:435-440 [Journal ] Chwei-Shyong Tsai , Shiang-Feng Tzeng , Min-Shiang Hwang Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2003, v:14, n:3, pp:393-402 [Journal ] Chou Chen Yang , Ting Yi Chang , Min-Shiang Hwang Security of Improvement on Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2003, v:14, n:4, pp:551-558 [Journal ] Chou Chen Yang , Ting Yi Chang , Jian Wei Li , Min-Shiang Hwang Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2003, v:14, n:1, pp:111-120 [Journal ] Chin-Chen Chang , Kuo-Feng Hwang , Min-Shiang Hwang A Digital Watermarking Scheme Using Human Visual Effects. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2000, v:24, n:4, pp:- [Journal ] Min-Shiang Hwang Cryptanalysis of YCN key assignment scheme in a hierarchy. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2000, v:73, n:3-4, pp:97-101 [Journal ] I-En Liao , Cheng-Chi Lee , Min-Shiang Hwang A password authentication scheme over insecure networks. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2006, v:72, n:4, pp:727-740 [Journal ] Shin-Jia Hwang , Min-Shiang Hwang , Shiang-Feng Tzeng A New Digital Multisignature Scheme With Distinguished Signing Authorities. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2003, v:19, n:5, pp:881-887 [Journal ] Min-Shiang Hwang , Cheng-Chi Lee , Ting Yi Chang Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:373-379 [Journal ] Min-Shiang Hwang , Cheng-Chi Lee , Ting Yi Chang Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:373-379 [Journal ] Cheng-Chi Lee , Min-Shiang Hwang , Wei-Pang Yang A Novel Application of the Phone Card and Its Authentication in Mobile Communications. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1999, v:15, n:4, pp:471-484 [Journal ] Min-Shiang Hwang , Wei-Pang Yang Conference Key Distribution Schemes for Secure Digital Mobile Communications. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1995, v:13, n:2, pp:416-420 [Journal ] Chin-Chen Chang , Min-Shiang Hwang , Tung-Shou Chen A new encryption algorithm for image cryptosystems. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:58, n:2, pp:83-91 [Journal ] Min-Shiang Hwang , Iuon-Chang Lin , Li-Hua Li A simple micro-payment scheme. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:221-229 [Journal ] Min-Shiang Hwang , Wei-Pang Yang Controlling access in large partially ordered hierarchies using cryptographic keys. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2003, v:67, n:2, pp:99-107 [Journal ] Min-Shiang Hwang , Wei-Pang Yang A two-phase encryption scheme for enhancing database security. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1995, v:31, n:3, pp:257-265 [Journal ] Cheng-Ying Yang , Shiang-Feng Tzeng , Min-Shiang Hwang On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2004, v:73, n:3, pp:507-514 [Journal ] Iuon-Chang Lin , Hsia-Hung Ou , Min-Shiang Hwang A user authentication system using back-propagation network. [Citation Graph (0, 0)][DBLP ] Neural Computing and Applications, 2005, v:14, n:3, pp:243-249 [Journal ] Min-Shiang Hwang A Dynamic Key Generation Scheme for Access Control in a Hierarchy. [Citation Graph (0, 0)][DBLP ] Nord. J. Comput., 1999, v:6, n:4, pp:363-371 [Journal ] Ting Yi Chang , Min-Shiang Hwang , Wei-Pang Yang A new multi-stage secret sharing scheme using one-way function. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2005, v:39, n:1, pp:48-55 [Journal ] Min-Shiang Hwang , Li-Hua Li , Cheng-Chi Lee A key authentication scheme with non-repudiation. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:3, pp:75-78 [Journal ] Min-Shiang Hwang , Chao-Chen Yang , Cheng-Yeh Shiu An authentication scheme for mobile satellite communication systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2003, v:37, n:4, pp:42-47 [Journal ] Cheng-Chi Lee , Min-Shiang Hwang , I-En Liao A server assisted authentication protocol for detecting error vectors. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:2, pp:93-96 [Journal ] Cheng-Chi Lee , Min-Shiang Hwang , Wei-Pang Yang A flexible remote user authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2002, v:36, n:3, pp:46-52 [Journal ] Chih-Wei Lin , Jau-Ji Shen , Min-Shiang Hwang Security enhancement for Optimal Strong-Password Authentication protocol. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2003, v:37, n:2, pp:7-12 [Journal ] Chih-Wei Lin , Jau-Ji Shen , Min-Shiang Hwang Security enhancement for optimal strong-password authentication protocol. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2003, v:37, n:3, pp:12-16 [Journal ] Cheng-Chi Lee , Li-Hua Li , Min-Shiang Hwang A remote user authentication scheme using hash functions. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2002, v:36, n:4, pp:23-29 [Journal ] Li-Hua Li , Chi-Yu Liu , Min-Shiang Hwang Cryptanalysis of an efficient secure group signature scheme. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:4, pp:66-69 [Journal ] Min-Shiang Hwang , Cheng-Chi Lee , Ji-Zhe Lee , Chao-Chen Yang A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2005, v:29, n:3, pp:165-180 [Journal ] Tung-Shou Chen , Chin-Chen Chang , Min-Shiang Hwang A virtual image cryptosystem based upon vector quantization. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1998, v:7, n:10, pp:1485-1488 [Journal ] Min-Shiang Hwang , Chin-Chen Chang , Kuo-Feng Hwang An ElGamal-Like Cryptosystem for Enciphering Large Messages. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:445-446 [Journal ] Min-Shiang Hwang , Eric Jui-Lin Lu , Iuon-Chang Lin A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2003, v:15, n:6, pp:1552-1560 [Journal ] Chii-Hwa Lee , Min-Shiang Hwang , Wei-Pang Yang Enhanced privacy and authentication for the global system for mobile communications. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 1999, v:5, n:4, pp:231-243 [Journal ] Feng Bao , Cheng-Chi Lee , Min-Shiang Hwang Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2006, v:172, n:2, pp:1195-1200 [Journal ] Min-Shiang Hwang , Shiang-Feng Tzeng , Chun-Ta Li A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2007, pp:273-284 [Conf ] Shiang-Feng Tzeng , Yuan-Liang Tang , Min-Shiang Hwang A new convertible authenticated encryption scheme with message linkages. [Citation Graph (0, 0)][DBLP ] Computers & Electrical Engineering, 2007, v:33, n:2, pp:133-138 [Journal ] An Ordered Multi-proxy Multi-signature Scheme. [Citation Graph (, )][DBLP ] An Exchangeable E-Cash Scheme by E-Mint. [Citation Graph (, )][DBLP ] Improving the Security of Non-PKI Methods for Public Key Distribution. [Citation Graph (, )][DBLP ] A Verifiable Electronic Voting Scheme over the Internet. [Citation Graph (, )][DBLP ] An Improvement of Strong Proxy Signature and Its Applications. [Citation Graph (, )][DBLP ] An electronic voting protocol with deniable authentication for mobile ad hoc networks. [Citation Graph (, )][DBLP ] An improved address ownership in mobile IPv6. [Citation Graph (, )][DBLP ] A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. [Citation Graph (, )][DBLP ] Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.494secs