The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Min-Shiang Hwang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Min-Shiang Hwang, Ting Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai
    On the Security of an Enhanced Authentication Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:160-163 [Conf]
  2. Chou Chen Yang, Min-Shiang Hwang, Jian Wei Li, Ting Yi Chang
    A Solution to Mobile IP Registration for AAA. [Citation Graph (0, 0)][DBLP]
    CDMA International Conference, 2002, pp:329-337 [Conf]
  3. Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang
    Security Enhancement for the "Simple Authentication Key Agreement Algorithm". [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:113-115 [Conf]
  4. Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang
    Two Simple Batch Verifying Multiple Digital Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:233-237 [Conf]
  5. Min-Shiang Hwang, Wen-Guey Tzeng
    A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:757-761 [Conf]
  6. Chii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang
    Phone Card Application and Authentication in Wireless Communications. [Citation Graph (0, 0)][DBLP]
    IFIP World Conference on Mobile Communications, 1996, pp:323-329 [Conf]
  7. I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang
    Identity-based deniable authentication protocol from pairings. [Citation Graph (0, 0)][DBLP]
    IMSA, 2006, pp:112-114 [Conf]
  8. Min-Shiang Hwang
    Cryptanalysis of a remote login authentication scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:742-744 [Journal]
  9. Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu
    Improvement on the flexible tree-based key management framework. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:500-504 [Journal]
  10. Min-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang
    An access control scheme based on Chinese remainder theorem and time stamp concept. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:1, pp:73-81 [Journal]
  11. Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang
    Generalization of proxy signature-based on discrete logarithms. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:3, pp:245-255 [Journal]
  12. Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang
    Security enhancement for the timestamp-based password authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:591-595 [Journal]
  13. Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang
    An improvement of nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:2, pp:174-178 [Journal]
  14. Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang
    The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:1, pp:53-67 [Journal]
  15. Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin
    Adding timestamps to the secure electronic auction protocol. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:40, n:2, pp:155-162 [Journal]
  16. Min-Shiang Hwang, Wei-Pang Yang
    A New Dynamic Access Control Scheme Based on Subject-Object List. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1994, v:14, n:1, pp:45-56 [Journal]
  17. Min-Shiang Hwang, Wei-Pang Yang
    Multilevel Secure Database Encryption with Subkeys. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1997, v:22, n:2, pp:117-131 [Journal]
  18. Ting Yi Chang, Chou Chen Yang, Min-Shiang Hwang
    A threshold signature scheme for group communications without a shared distribution center. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:6, pp:1013-1021 [Journal]
  19. Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang
    A new key assignment scheme for enforcing complicated access control policies in hierarchy. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2003, v:19, n:4, pp:457-462 [Journal]
  20. Iuon-Chang Lin, Min-Shiang Hwang, Li-Hua Li
    A new remote user authentication scheme for multi-server architecture. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2003, v:19, n:1, pp:13-22 [Journal]
  21. Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang
    A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:5, pp:887-893 [Journal]
  22. Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang
    Cryptanalysis of the Hwang-Shi Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2002, v:53, n:2, pp:131-134 [Journal]
  23. Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu
    Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2004, v:61, n:3-4, pp:389-398 [Journal]
  24. Cheng-Chi Lee, Wei-Pang Yang, Min-Shiang Hwang
    Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:55, n:3-4, pp:307-320 [Journal]
  25. Hsien-Chu Wu, Min-Shiang Hwang, Chia-Hsin Liu
    A Secure Strong-Password Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2005, v:68, n:4, pp:399-406 [Journal]
  26. Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang
    A new digital signature scheme based on factoring and discrete logarithms. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2004, v:81, n:1, pp:9-14 [Journal]
  27. Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang
    A Feature-Oriented Copyright Owner Proving Technique for Still Images. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2002, v:12, n:3, pp:317-0 [Journal]
  28. Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu
    A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2000, v:11, n:2, pp:137-144 [Journal]
  29. Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang
    Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2000, v:11, n:1, pp:15-19 [Journal]
  30. Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang
    An Improvement of SPLICE/AS in WIDE against Guessing Attack. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2001, v:12, n:2, pp:297-302 [Journal]
  31. Min-Shiang Hwang
    A New Redundancy Reducing Cipher. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2000, v:11, n:4, pp:435-440 [Journal]
  32. Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang
    Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:3, pp:393-402 [Journal]
  33. Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang
    Security of Improvement on Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:4, pp:551-558 [Journal]
  34. Chou Chen Yang, Ting Yi Chang, Jian Wei Li, Min-Shiang Hwang
    Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:1, pp:111-120 [Journal]
  35. Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang
    A Digital Watermarking Scheme Using Human Visual Effects. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2000, v:24, n:4, pp:- [Journal]
  36. Min-Shiang Hwang
    Cryptanalysis of YCN key assignment scheme in a hierarchy. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:73, n:3-4, pp:97-101 [Journal]
  37. I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang
    A password authentication scheme over insecure networks. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:4, pp:727-740 [Journal]
  38. Shin-Jia Hwang, Min-Shiang Hwang, Shiang-Feng Tzeng
    A New Digital Multisignature Scheme With Distinguished Signing Authorities. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2003, v:19, n:5, pp:881-887 [Journal]
  39. Min-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang
    Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:373-379 [Journal]
  40. Min-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang
    Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:373-379 [Journal]
  41. Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang
    A Novel Application of the Phone Card and Its Authentication in Mobile Communications. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:4, pp:471-484 [Journal]
  42. Min-Shiang Hwang, Wei-Pang Yang
    Conference Key Distribution Schemes for Secure Digital Mobile Communications. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1995, v:13, n:2, pp:416-420 [Journal]
  43. Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen
    A new encryption algorithm for image cryptosystems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:58, n:2, pp:83-91 [Journal]
  44. Min-Shiang Hwang, Iuon-Chang Lin, Li-Hua Li
    A simple micro-payment scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:55, n:3, pp:221-229 [Journal]
  45. Min-Shiang Hwang, Wei-Pang Yang
    Controlling access in large partially ordered hierarchies using cryptographic keys. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:67, n:2, pp:99-107 [Journal]
  46. Min-Shiang Hwang, Wei-Pang Yang
    A two-phase encryption scheme for enhancing database security. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1995, v:31, n:3, pp:257-265 [Journal]
  47. Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang
    On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:73, n:3, pp:507-514 [Journal]
  48. Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang
    A user authentication system using back-propagation network. [Citation Graph (0, 0)][DBLP]
    Neural Computing and Applications, 2005, v:14, n:3, pp:243-249 [Journal]
  49. Min-Shiang Hwang
    A Dynamic Key Generation Scheme for Access Control in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 1999, v:6, n:4, pp:363-371 [Journal]
  50. Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang
    A new multi-stage secret sharing scheme using one-way function. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:48-55 [Journal]
  51. Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee
    A key authentication scheme with non-repudiation. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:3, pp:75-78 [Journal]
  52. Min-Shiang Hwang, Chao-Chen Yang, Cheng-Yeh Shiu
    An authentication scheme for mobile satellite communication systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2003, v:37, n:4, pp:42-47 [Journal]
  53. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao
    A server assisted authentication protocol for detecting error vectors. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:2, pp:93-96 [Journal]
  54. Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang
    A flexible remote user authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:3, pp:46-52 [Journal]
  55. Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang
    Security enhancement for Optimal Strong-Password Authentication protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2003, v:37, n:2, pp:7-12 [Journal]
  56. Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang
    Security enhancement for optimal strong-password authentication protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2003, v:37, n:3, pp:12-16 [Journal]
  57. Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang
    A remote user authentication scheme using hash functions. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:23-29 [Journal]
  58. Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang
    Cryptanalysis of an efficient secure group signature scheme. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:66-69 [Journal]
  59. Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, Chao-Chen Yang
    A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2005, v:29, n:3, pp:165-180 [Journal]
  60. Tung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang
    A virtual image cryptosystem based upon vector quantization. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1998, v:7, n:10, pp:1485-1488 [Journal]
  61. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang
    An ElGamal-Like Cryptosystem for Enciphering Large Messages. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:445-446 [Journal]
  62. Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin
    A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:6, pp:1552-1560 [Journal]
  63. Chii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang
    Enhanced privacy and authentication for the global system for mobile communications. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1999, v:5, n:4, pp:231-243 [Journal]
  64. Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang
    Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:172, n:2, pp:1195-1200 [Journal]
  65. Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li
    A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:273-284 [Conf]
  66. Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang
    A new convertible authenticated encryption scheme with message linkages. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2007, v:33, n:2, pp:133-138 [Journal]

  67. An Ordered Multi-proxy Multi-signature Scheme. [Citation Graph (, )][DBLP]


  68. An Exchangeable E-Cash Scheme by E-Mint. [Citation Graph (, )][DBLP]


  69. Improving the Security of Non-PKI Methods for Public Key Distribution. [Citation Graph (, )][DBLP]


  70. A Verifiable Electronic Voting Scheme over the Internet. [Citation Graph (, )][DBLP]


  71. An Improvement of Strong Proxy Signature and Its Applications. [Citation Graph (, )][DBLP]


  72. An electronic voting protocol with deniable authentication for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  73. An improved address ownership in mobile IPv6. [Citation Graph (, )][DBLP]


  74. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. [Citation Graph (, )][DBLP]


  75. Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.494secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002