Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, ''A Cocktail Protocol with the Authentication and Key Agreement on the UMTS '', JSS, Vol. 83, No. 2, PP. 316-325, 2, 2010.【PDF】 |
Chun-Ta Li, Min-Shiang Hwang, ''An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards '', IJICIC, Vol. 6, No. 5, PP. 2181-2188, 5, 2010.【PDF】 |
Chun-Ta Li and Min-Shiang Hwang, ''An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards '', JNCA, Vol. 33, No. 1, PP. 1-5, 1, 2010.【PDF】 |
Min-Shiang Hwang,, Song-Kong Chong, and Te-Yu Chen, ''DoS-resistant ID-based Password Authentication Scheme Using Smart Cards '', JSS, Vol. 83, PP. 163-172, 1, 2010.【PDF】 |
Te-Yu Chen, Min-Shiang Hwang and Jinn-Ke Jan, ''Adaptive Authentication Schemes for 3D Mesh Models '', IJICIC, Vol. 5, No. 12, PP. 4561-4572, 12, 2009.【PDF】 |
Hsia-Hung Ou, Min-Shiang Hwang, and Jinn-Ke Jan, ''A provable billing protocol on the current UMTS '', WPC, 9, 2009.【PDF】 |
Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, and Jinn-Ke Jan, ''TK-AKA: Using Temporary Key on Authentication and Key Agreement Protocol on UMTS '', IJNM, Vol. 19, No. 4, PP. 291-303, 7, 2009.【PDF】 |
Chia-Chun Wu, Min-Shiang Hwang, and S-J. Kao, ''A New Approach to the Secret Image Sharing with Steganography and Authentication '', ISJ, Vol. 57, No. 3, PP. 140-151, 6, 2009.【PDF】 |
Meng-Hsiun Tsai, Shu-Fen Chiou and Min-Shiang Hwang, ''A Simple Method for Detecting Protein Spots in 2D-GE Images Using Image Contrast '', IJICIC, Vol. 5, No. 12, PP. 4617-4626, 12, 2009.【PDF】 |
Meng-Hsiun Tsai, Shu-Fen Chiou, and Min-Shiang Hwang, ''A Progressive Image Transmission Method for 2D-GE Image Based on Context Feature '', IJICIC, Vol. 5, No. 2, PP. 379-386, 2, 2009.【PDF】 |
Hsia-Hung Ou, Min-Shiang Hwang, and Jinn-Ke Jan, ''The UMTS-AKA protocols for Intelligent Transportation Systems '', EJWCN, Vol. 2009, PP. 1-12, , 2009.【PDF】 |
Cheng-Chi Lee, Pi-Fang Ho, and Min-Shiang Hwang, ''A Secure E-Auction Scheme Based on Group Signatures '', ISF, Vol. 11, No. 3, PP. 335-343, 7, 2009.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng, ''A Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem '', IJFCS, Vol. 20, No. 2, PP. 351-359, 2009.【PDF】 |
Chun-Ta Li, Min-Shiang Hwang, and Yen-Ping Chu, ''An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications '', IJICIC, Vol. 5, No. 8, PP. 2107-2124, 8, 2009.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin, ''A New English Auction Scheme Using The Bulletin Board System '', IMCS, Vol. 17, No. 5, PP. 408-417, 11, 2009.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, ''A New Knapsack Public-Key Cryptosystem Based on the Permutation Combination Algorithm '', IEEE-TIFS, Vol. 5, No. 1, PP. 33-38, 2009.【PDF】 |
Min-Shiang Hwang, Shiang-Feng Tzeng and Shu-Fen Chiou, ''A Nonrepudiable Multi-Proxy Multi-Signature Scheme '', ICIC, Vol. 3, No. 3, PP. 259-264, 9, 2009.【PDF】 |
Min-Shiang Hwang, Chia-Hui Wei, and Cheng-Yee Lee , ''Privacy and Security Requirements for RFID Applications '', 電腦學刊, Vol. 3, No. 20, PP. 55-60, 10, 2009.【PDF】 |
Cheng-Chi Lee, I-En Liao, and Min-Shiang Hwang, ''An Extended Certificate-based Authentication and Security Protocol for Mobile Networks '', ITC, Vol. 38, No. 1, PP. 61-66, 2009.【PDF】 |
Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, and Min-Shiang Hwang, ''Reversible Secret Image Sharing Based on Shamir's Scheme '', ISJ, Vol. 57, No. 3, PP. 140-151, 6, 2009.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Song-Kong Chong, ''An Improved Address Ownership in Mobile IPv6 '', CC, Vol. 31, No. 14, PP. 3250-3252, 9, 2008.【PDF】 |
Chun-Ta Li, Min-Shiang Hwang , and Yen-Ping Chu, ''A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserv '', CC, Vol. 31, No. 12, PP. 2803-2814, 7, 2008.【PDF】 |
Chun-Ta Li, Min-Shiang Hwang, and Yen-Ping Chu, ''Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Perva '', CC, Vol. 31, No. 18, PP. 4255-4258, 12, 2008.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong, and Jung-Wen Lo, ''A Key Management for Wireless Communications '', IJICIC, Vol. 4, No. 8, PP. 2045-2056, 8, 2008.【PDF】 |
Nan-I Wu, Chung-Ming Wang, Chwei-Shyong Tsai, and Min-Shiang Hwang, ''A Certificate-based Watermarking Scheme for Coloured Images '', ISJ, Vol. 56, No. 6, PP. 326-332, 12, 2008.【PDF】 |
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, ''Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad '', IJCSSE, Vol. 23, No. 3, PP. 227-234, 5, 2008.【PDF】 |
Chun-Ta Li, Min-Shiang Hwang, and Chi-Yu Liu, ''An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks '', CC, Vol. 31, No. 10, PP. 2534-2540, 6, 2008.【PDF】 |
A Simple Mobile Communication Billing System Among Charged Parties, ''A Simple Mobile Communication Billing System Among Charged Parties '', AMC, Vol. 192, No. 2, PP. 487-495, 9, 2007.【PDF】 |
Shiang-Feng Tzeng, Yuan-Liang Tang, and Min-Shiang Hwang, ''A New Convertible Authenticated Encryption Scheme with Message Linkages '', CEE, Vol. 33, No. 2, PP. 133-138, 3, 2007.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, and Chih-Wei Lin, ''An Efficient Multi-Round Anonymous Auction Protocol '', JDMSC, Vol. 10, No. 4, PP. 547-557, 8, 2007.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, and I-En Liao, ''A New Authentication Protocol Based on Pointer Forwarding for Mobile Communications '', WCMC, Vol. 8, No. 5, PP. 661-672, 1, 2007.【PDF】 |
Chwei-Shyong Tsai, Cheng-Chi Lee, and Min-Shiang Hwang, ''Password Authentication Schemes: Current Status and Key Issues '', IJNS, Vol. 3, No. 2, PP. 101-115, 9, 2006.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, and I-En Liao, ''Security Enhancement on a New Authentication Scheme With Anonymity For Wireless Environments '', IEEE-IE, Vol. 53, No. 5, PP. 1683-1687, 10, 2006.【PDF】 |
I-En Liao, Cheng-Chi Leea, and Min-Shiang Hwang, ''A Password Authentication Scheme Over Insecure Networks '', JCSS, Vol. 72, No. 4, PP. 727-740, 6, 2006.【PDF】 |
Min-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, and Yen-Ping Chu, ''Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows '', IEICE-IS, Vol. E89-D, No. 4, PP. 1575-1577, 4, 2006.【PDF】 |
Chih-Wei Lin, Chwei-Shyong Tsai, and Min-Shiang Hwang, ''A New Strong-Password Authentication Scheme Using One-way Hash Functions '', IJCSS, Vol. 45, No. 4, PP. 623-626, 7, 2006.【PDF】 |
Hui-Chieh Lu, Yen-Ping Chu, and Min-Shiang Hwang, ''New steganographic method of pixel value differencing '', TJIST, Vol. 50, No. 5, PP. 424-426, 9/10, 2006.【PDF】 |
Feng Bao, Cheng-Chi Lee, and Min-Shiang Hwang, ''Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures '', AMC, Vol. 172, No. 2, PP. 1195-1200, 1, 2006.【PDF】 |
Min-Shiang Hwang and Chi-Yu Liu, ''Authenticated Encryption Schemes: Current Status and Key Issues '', IJNS, Vol. 1, No. 2, PP. 61-73, 9, 2005.【PDF】 |
Hsien-Chu Wu, Chi-Yu Liu, and Shu-Fen Chiou, ''Cryptanalysis of a Secure One-Time Password Authentication Scheme with Low-Communication for Mobile '', IJNS, Vol. 1, No. 2, PP. 74-76, 9, 2005.【PDF】 |
Shiang-Feng Tzeng, Min-Shiang Hwang, and Hsing-Bai Chen, ''A Secure On-Line Software Transaction Scheme '', CSI, Vol. 27, No. 3, PP. 303-312, 3, 2005.【PDF】 |
Min-Shiang Hwang, Jung-Wen Lo, and Chia-Hsin Liu, ''Improvement on the Flexible Tree-Based Key Management Framework '', CS, Vol. 24, No. 6, PP. 500-504, 9, 2005.【PDF】 |
Nan-I Wu, H.-C. Wu, Chwei-Shyong Tsai, and Min-Shiang Hwang, ''Image Steganographic Scheme Based on Pixel-value Differencing and LSB Replacement Methods '', IEE-VISP, Vol. 152, No. 5, PP. 611-615, 10, 2005.【PDF】 |
Hsien-Chu Wu, Min-Shiang Hwang, and Chia-Hsin Liu, ''A Secure Strong-Password Authentication Protocol '', FI, Vol. 68, No. 4, PP. 399-406, 6, 2005.【PDF】 |
Chwei-Shyong Tsai, Shu-Chen Lin, and Min-Shiang Hwang, ''Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys '', AMC, Vol. 166, No. 1, PP. 118-122, 7, 2005.【PDF】 |
Ting-Yi Chang, Wei-Pang Yang, and Min-Shiang Hwang, ''Simple Authenticated Key Agreement and Protected Password Change Protocols '', CMA, Vol. 49, No. 5-6, PP. 703-714, 4, 2005.【PDF】 |
Li-Hua Li, Shiang-Feng Tzeng, and Min-Shiang Hwang, ''Improvement of Signature Scheme Based on Factoring and Discrete Logarithms '', AMC, Vol. 161, No. 1, PP. 49-54, 2, 2005.【PDF】 |
Min-Shiang Hwang, Jung-Wen Lo, Chi-Yu Liu, and Shu-Chen Lin, ''Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card '', PJAS, Vol. 5, No. 1, PP. 99-100, 2005.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, and Chao-Chen Yang, ''A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography '', TS, Vol. 29, No. 3, PP. 165-180, 7, 2005.【PDF】 |
Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, ''An Improvement on the Lin-Wu (t, n) Threshold Verifiable Multi-secret Sharing Scheme '', AMC, Vol. 163, No. 1, PP. 169-178, 4, 2005.【PDF】 |
Cheng-Chi Lee, Ting-Yi Chang, and Min-Shiang Hwang, ''A Simple Broadcasting Cryptosystem in Computer Networks Using Exclusive-OR '', IJCAT, Vol. 24, No. 3, PP. 180-183, 7, 2005.【PDF】 |
Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, ''A New Multistage Secret Sharing Scheme Based on One-way Function '', ACM-OSR, Vol. 39, No. 1, PP. 48-55, 1, 2005.【PDF】 |
Iuon-Chang Lin, Hsia-Hung Ou, and Min-Shiang Hwang, ''A User Authentication System Using Back-Propagation Network '', NCA, Vol. 146, No. 3, PP. 243-249, 9, 2005.【PDF】 |
Iuon-Chang Lin, Min-Shiang Hwang, and Chin-Chen Chang, ''The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain '', DCC, Vol. 36, No. 1, PP. 53-67, 7, 2005.【PDF】 |
Min-Shiang Hwang, Kuo-Feng Hwang, and Chin-Chen Chang, ''A Time-Stamping Protocol for Digital Watermarking '', AMC, Vol. 169, No. 2, PP. 1276-1284, 10, 2005.【PDF】 |
Min-Shiang Hwang, Chun-Ta Li, Jau-Ji Shen, and Yen-Ping Chu, ''Challenges in e-Government and Security of Information '', I&S, Vol. 15, No. 1, PP. 9-20, 2004.【PDF】 |
Li-Hua Li, Chi-Yu Liu, and Min-Shiang Hwang, ''Cryptanalysis of An Efficient Secure Group Signature Scheme '', ACM-OSR, Vol. 38, No. 4, PP. 66-69, 10, 2004.【PDF】 |
Min-Shiang Hwang, Jung-Wen Lo, and Shu-Chen Lin, ''An Efficient User Identification Scheme Based on ID-based Cryptosystem '', CSI, Vol. 26, No. 6, PP. 565-569, 10, 2004.【PDF】 |
Min-Shiang Hwang, Jung-Wen Lo, and Chia-Hsin Liu , ''Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack '', FI, Vol. 61, No. 3-4, PP. 389-398, 2004.【PDF】 |
Ting-Yi Chang, Chao-Chen Yang, and Min-Shiang Hwang, ''Cryptanalysis of Publicly Verifiable Authenticated Encryption '', IEICE-F, Vol. E87-A, No. 6, PP. 1645-1646, 6, 2004.【PDF】 |
Chwei-Shyong Tsai, Min-Shiang Hwang, and Pei-Chen Sung , ''Blind Signature Scheme Based on Elliptic Curve Cryptography '', CSCI, Vol. 34, No. 3, 2004.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Ji-Zhe Lee, ''A New Anonymous Channel Protocol in Wireless Communications '', IJEC, Vol. 58, No. 3, PP. 218-222, 5, 2004.【PDF】 |
Ting-Yi Chang, Chou-Chen Yang, and Min-Shiang Hwang, ''Cryptanalysis of Simple Authenticated Key Agreement Protocols '', IEICE-F, Vol. E87-A, No. 8, PP. 2174-2176, 8, 2004.【PDF】 |
Shiang-Feng Tzeng and Min-Shiang Hwang , ''Digital Signature with Message Recovery and Its Variants Based on Elliptic Curve Discrete Logarithm '', CSI, Vol. 26, No. 2, PP. 61-71, 3, 2004.【PDF】 |
Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, ''Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System without Using a One-way '', I&S, Vol. 15, No. 1, PP. 110-114, 2004.【PDF】 |
Min-Shiang Hwang, Shiang-Feng Tzeng, and Chwei-Shyong Tsai, ''Generalization of Proxy Signature Based on Elliptic Curves '', CSI, Vol. 26, No. 2, PP. 73-84, 3, 2004.【PDF】 |
Ting-Yi Chang, Chou-Chen Yang, and Min-Shiang Hwang, ''A Threshold Signature Scheme for Group Communications without a Shared Distribution Center '', FGCS, Vol. 20, No. 6, PP. 1013-1021, 8, 2004.【PDF】 |
Chou-Chen Yang, Jian-Wei Li, and Min-Shiang Hwang, ''A New Mutual Authentication and Key Exchange Protocol with Balanced Computational Power for Wireless '', ETT, Vol. 15, No. 2, PP. 91-99, 4, 2004.【PDF】 |
Shiang-Feng Tzeng, Min-Shiang Hwang, and Cheng-Ying Yang, ''An Improvement of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers '', CS, Vol. 23, No. 2, PP. 174-178, 3, 2004.【PDF】 |
Shiang-Feng Tzeng, Cheng-Ying Yang, and Min-Shiang Hwang, ''A New Digital Signature Scheme Based on Factoring and Discrete Logarithms '', IJCM, Vol. 81, No. 1, PP. 9-14, 1, 2004.【PDF】 |
Shiang-Feng Tzeng, Cheng-Ying Yang, and Min-Shiang Hwang, ''A Nonrepudiation Threshold Multi-Proxy Multi-Signature with Shared Verification '', FGCS, Vol. 20, No. 5, PP. 887-893, 6, 2004.【PDF】 |
Cheng-Ying Yang, Shiang-Feng Tzeng, and Min-Shiang Hwang, ''On the Efficiency of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers '', JSS, Vol. 73, No. 3, PP. 507-514, 9-12, 2004.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, and I-En Liao, ''A Server Assisted Authentication Protocol for Detecting Error Vectors '', ACM-OSR, Vol. 38, No. 2, PP. 93-96, 4, 2004.【PDF】 |
Iuon-Chang Lin, Hsia-Hung Ou, and Min-Shiang Hwang, ''Efficient Access Control and Key Management Schemes for Mobile Agents '', CSI, Vol. 26, No. 5, PP. 423-433, 9, 2004.【PDF】 |
Ting-Yi Chang, Chao-Chen Yang, and Min-Shiang Hwang, ''Threshold Untraceable Signature for Group Communications '', IEE-Comm, Vol. 151, No. 2, PP. 179-184, 4, 2004.【PDF】 |
Chin-Chen Chang, Kuo-Lun Chen, and Min-Shiang Hwang , ''End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication '', WPC, Vol. 28, No. 2, PP. 95-106, 1, 2004.【PDF】 |
Jau-Ji Shan, Iuon-Chang Lin, and Min-Shiang Hwang , ''A Secure LITESET Scheme '', IEICE-IS, Vol. E87-D, No. 11, PP. 2509-2512, 11, 2004.【PDF】 |
Min-Shiang Hwang, Li-Hua Li, and Cheng-Chi Lee, ''A Key Authentication Scheme with Non-repudiation '', ACM-OSR, Vol. 38, No. 3, PP. 75-78, 7, 2004.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Yang, ''A New Blind Signature based on the Discrete Logarithm Problem for Untraceability '', AMC, Vol. 164, No. 3, PP. 837-841, 7, 2004.【PDF】 |
Chih-Wei Lin, Jau-Ji Shen, and Min-Shiang Hwang, ''Security Enhancement for Optimal Strong-Password Authentication Protocol '', ACM-OSR, Vol. 37, No. 2, PP. 7-12, 4, 2003.【PDF】 |
Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, and Min-Shiang Hwang , ''Security Enhancement for Protecting Password Transmission '', IEICE-F, Vol. E86-B, No. 7, PP. 2178-2181, 7, 2003.【PDF】 |
Chou-Chen Yang, Ting-Yi Chang, and Min-Shiang Hwang, ''Security of Improvement on Methods for Protecting Password Transmission '', INFO, Vol. 14, No. 4, PP. 551-558, 12, 2003.【PDF】 |
Jau-Ji Shen, Chih-Wei Lin, and Min-Shiang Hwang, ''Security Enhancement for the Timestamp-Based Password Authentication Scheme Using Smart Cards '', CS, Vol. 22, No. 7, PP. 591-595, 2003.【PDF】 |
Chou-Chen Yang, Ting-Yi Chang, and Min-Shiang Hwang, ''A New Anonymous Conference Key Distribution System based on the Elliptic Curve Discrete Logarithm Pr '', CSI, Vol. 25, No. 2, PP. 141-145, 5, 2003.【PDF】 |
Chwei-Shyong Tsai, Shiang-Feng Tzeng, and Min-Shiang Hwang, ''Improved Non-repudiable Threshold Proxy Signature Scheme with Known Signers '', INFO, Vol. 14, No. 3, PP. 393-402, 2003.【PDF】 |
Jau-Ji Shen, Chih-Wei Lin, and Min-Shiang Hwang, ''A Modified Remote User Authentication Scheme Using Smart Cards '', IEEE-CE, Vol. 49, No. 2, PP. 414-416, 5, 2003.【PDF】 |
Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, and Min-Shiang Hwang, ''Simple Generalized Group-oriented Cryptosystems Using ElGamal Cryptosystem '', INFO, Vol. 11, No. 4, PP. 111-120, 2003.【PDF】 |
Li-Hua Lia, Shiang-Feng Tzeng, and Min-Shiang Hwang, ''Generalization of Proxy Signature Based on Discrete Logarithms '', CS, Vol. 22, No. 3, PP. 245-255, 4, 2003.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Yan-Chi Lai, ''An Untraceable Blind Signature Scheme '', IEICE-F, Vol. E86-A, No. 7, PP. 1902-1906, 7, 2003.【PDF】 |
Shin-Jia Hwang, Min-Shiang Hwang, and Shiang-Feng Tzeng , ''A New Digital Multisignature Scheme with Distinguished Signing Authorities '', IPL, Vol. 19, No. 5, PP. 881-887, 9, 2003.【PDF】 |
Min-Shiang Hwang, Chen-Chi Lee, and Yan-Chi Lai , ''Traceability on RSA-Based Partially Signature with Low Computation '', AMC, Vol. 145, No. 2-, PP. 465-468, 12, 2003.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Yan-Chi Lai , ''Traceability on Stadler et al.'s Fair Blind Signature Scheme '', IEICE-F, Vol. E86-A, No. 2, PP. 513-514, 2, 2003.【PDF】 |
Eric Jui-Lin Lu, Cheng-Chi Lee, and Min-Shiang Hwang, ''Cryptanalysis of Some Authenticated Key Agreement Protocols '', IJCNAA, Vol. 3, No. 2, PP. 151-157, 4, 2003.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Yang, ''Extension of Authentication Protocol for GSM '', IEE-Comm, Vol. 150, No. 2, PP. 91-95, 4, 2003.【PDF】 |
Iuon-Chang Lin, Min-Shiang Hwang, and Chin-Chen Chang, ''Security Enhancement for Anonymous Secure E-voting Over a Network '', CSI, Vol. 25, No. 2, PP. 131-139, 3, 2003.【PDF】 |
Min-Shiang Hwang, Cheng-Yeh Shiu, and Chao-Chen Yang, ''An Authentication Scheme for Mobile Satellite Communication Systems '', ACM-OSR, Vol. 37, No. 4, PP. 42-47, 10, 2003.【PDF】 |
Cheng-Chi Lee, Chao-Chen Yang, and Min-Shiang Hwang, ''A New Privacy and Authentication Protocol for End-to-End Mobile Users '', IJCS, Vol. 16, No. 9, PP. 799-808, 11, 2003.【PDF】 |
Iuon-Chung Lin, Min-Shiang Hwang, and Li-Hua Li, ''A New Remote User Authentication Scheme for Multi-Server Architecture '', FGCS, Vol. 19, No. 1, PP. 13-22, 2003.【PDF】 |
Min-Shiang Hwang, Eric Jui-Lin Lu, and Iuon-Chang Lin, ''A Practical (t, n) Threshold Proxy Signature Scheme Based on The RSA Cryptosystem '', IEEE-TKDE, Vol. 15, No. 5, PP. 1-9, 9-10, 2003.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, and Li-Hua Li, ''A new key authentication scheme based on discrete logarithms '', AMC, Vol. 139, No. 2-, PP. 343-349, 7, 2003.【PDF】 |
Iuon-Chung Lin, Min-Shiang Hwang, and Chin-Chen Chang, ''A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy '', FGCS, Vol. 19, No. 4, PP. 457-462, 5, 2003.【PDF】 |
Min-Shiang Hwang and Wei-Pang Yang, ''Controlling Access in Large Partially-Ordered Hierarchies Using Cryptographic Keys '', JSS, Vol. 67, No. 2, PP. 99-107, 8, 2003.【PDF】 |
Min-Shiang Hwang, Chih-Wei Lin, and Cheng-Chi Lee, ''Improved Yen-Joye's Authenticated Multiple-key Agreement Protocol '', EL, Vol. 38, No. 23, PP. 1429 -1431, 11, 2002.【PDF】 |
Chou-Chen Yang, Ting-Yi Chang, and Min-Shiang Hwang, ''A (t, n) Multi-Secret Sharing Scheme '', AMC, Vol. 151, No. 2, PP. 483-490, 4, 2002.【PDF】 |
Shiang-Feng Tzeng, Cheng-Ying Yang, and Min-Shiang Hwang, ''A New Multi-Proxy Multi-Signature Scheme '', 電腦學刊, 2002.【PDF】 |
Cheng-Chi Lee, Wei-Pang Yang, and Min-Shiang Hwang, ''Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem '', FI, Vol. 55, No. 3-, PP. 307-320, 9, 2002.【PDF】 |
Min-Shiang Hwang, Chen-Chi Lee, and Yan-Chi Lai , ''Traceability on Low-Computation Partially Blind Signatures for Electronic Cash '', IEICE-F, Vol. E85-A, No. 5, PP. 1181-1182, 5, 2002.【PDF】 |
Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Peng Yang, ''A Flexible Remote User Authentication Scheme Using Smart Cards '', ACM-OSR, Vol. 36, No. 3, PP. 46-52, 7, 2002.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Shin-Jia Hwang , ''Cryptanalysis of the Hwang-Shi Proxy Signature Scheme '', FI, Vol. 53, No. 2, PP. 131-134, 5, 2002.【PDF】 |
Cheng-Chi Lee, Li-Hua Li, and Min-Shiang Hwang , ''A Remote User Authentication Scheme Using Hash Functions '', ACM-OSR, Vol. 36, No. 4, PP. 23-29, 10, 2002.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Wei-Pang Yang, ''An Improvement of Mobile Users Authentication in the Integration Environments '', IJEC, Vol. 56, No. 5, PP. 293-297, 9, 2002.【PDF】 |
Iuon-Chang Lin, Hsia-Hung Ou, and Min-Shiang Hwang, ''Two Secure Transportation Schemes for Mobile Agents '', I&S, Vol. 8, No. 1, PP. 87-97, 2002.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Yuan-Liang Tang, ''A Simple Remote User Authentication Scheme '', MCM, Vol. 36, No. 1-, PP. 103-107, 10, 2002.【PDF】 |
Eric Jui-Lin Lu and Min-Shiang Hwang, ''An Improvement of a Simple Authenticated Key Agreement Algorithm '', PJAS, Vol. 2, No. 1, PP. 64-65, 2002.【PDF】 |
Chin-Chen Chang, Kuo-Feng Hwang, and Min-Shiang Hwang, ''A Feature-Oriented Copyright Owner Proving Technique for Still Images '', IJSEKE, Vol. 12, No. 3, PP. 317-330, 6, 2002.【PDF】 |
Yuan-Liang Tang, Min-Shiang Hwang, and Ching-Rong Yang, ''An Image Authentication Scheme Based on Digital Signatures '', PJAS, Vol. 2, No. 5, PP. 553-557, 2002.【PDF】 |
Chin-Chen Chang, Kuo-Feng Hwang, and Min-Shiang Hwang, ''Robust authentication scheme for protecting copyrights of images and graphics '', IEE-VISP, Vol. 149, No. 1, PP. 43-50, 2, 2002.【PDF】 |
Min-Shiang Hwang, Chao-Chen Yang, and Shiang-Feng Tzeng, ''Improved digital signature scheme based on factoring and discrete logarithms '', JDMSC, Vol. 5, No. 2, PP. 151-155, 8, 2002.【PDF】 |
S. Wesley Changchien, Min-Shiang Hwang, and Kuo-Feng Hwang, ''A Batch Verifying and Detecting Multiple RSA Digital Signatures '', IJCNAA, Vol. 2, No. 3, PP. 303-307, 10, 2002.【PDF】 |
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''An ElGamal-like Cryptosystem for Enciphering Large Messages '', IEEE TKDE, Vol. 14, No. 2, PP. 445-446, 3-4, 2002.【PDF】 |
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''An Improved Authentication Protocol Without Trusted Third Party '', IJCNAA, Vol. 1, No. 4, PP. 407-412, 4, 2002.【PDF】 |
Min-Shiang Hwang, Eric Jui-Lin Lu, and Iuon-Chung Lin, ''Adding Timestamps to the Secure Electronic Auction Protocol '', DKE, Vol. 40, No. 2, PP. 155-162, 2, 2002.【PDF】 |
Min-Shiang Hwang and Wei-Pang Yang, ''An Authentication Protocol for Multicast Communications '', PJAS, Vol. 2, No. 12, PP. 1082-1083, 12, 2002.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Ting-Yi Chang, ''Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines '', JISE, Vol. 18, No. 3, PP. 373-379, 5, 2002.【PDF】 |
Min-Shiang Hwang, S. Wesley Changchien, and Cheng-Chi Lee, ''A New Method to Strengthen Ciphers '', IJPAM, Vol. 3, No. 2, PP. 187-192, 2002.【PDF】 |
Min-Shiang Hwang and Wei-Pang Yang, ''Integrated Different Semantics Classification Levels in Multidatabase Systems '', PJIT, Vol. 1, No. 1, PP. 1-4, 4, 2002.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Eric Jui-Lin Lu, ''Cryptanalysis of the Batch Verifying Multiple DSA-type Digital Signatures '', PJAS, Vol. 1, No. 3, PP. 287-288, 7, 2001.【PDF】 |
Min-Shiang Hwang, Cheng-Chi Lee, and Yuan-Liang Tang, ''An Improvement of SPLICE/AS in WIDE against Guessing Attack '', INFO, Vol. 12, No. 2, PP. 297-302, 4, 2001.【PDF】 |
Min-Shiang Hwang, Iuon-Chung Lin, and Li-Hua Li, ''A Simple Micro-Payment Scheme '', JSS, Vol. 55, No. 3, PP. 221-229, 1, 2001.【PDF】 |
Chin-Chen Chang, Min-Shian Hwang, and Tung-Shou Chen, ''A new encryption algorithm for image cryptosystems '', JSS, Vol. 58, No. 2, PP. 83-91, 9, 2001.【PDF】 |
Li-Hua Li, Iuon-Chung Lin, and Min-Shiang Hwang, ''A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural Networks '', IEEE-NN, Vol. 12, No. 6, PP. 1498-1504, 11, 2001.【PDF】 |
Ching-Yung Liu and Min-Shiang Hwang, ''Integrated IP/ATM Security Services over ADSL Access Networks '', 電腦學刊, Vol. 12, No. 1, 5, 2000.【PDF】 |
Min-Shiang Hwang, Iuon-Chung Lin, and Eric Jui-Lin Lu, ''A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers '', INFO, Vol. 11, No. 2, PP. 1-8, 4, 2000.【PDF】 |
Min-Shiang Hwang, ''Cryptanalysis of YCN Key Assignment Scheme in a Hierarchy '', IPL, Vol. 73, No. 3, PP. 97-101, 2, 2000.【PDF】 |
Min-Shiang Hwang, Kuo-Feng Hwang, and Iuon-Chung Lin, ''Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures '', INFO, Vol. 11, No. 1, PP. 1-4, 1, 2000.【PDF】 |
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''Digital Watermarking of Images Using Neural Networks '', JEI, Vol. 9, No. 4, PP. 548-555, 1, 2000.【PDF】 |
Chin-Chen Chang, Kuo-Feng Hwang, and Min-Shiang Hwang, ''A Digital Watermarking Scheme Using Human Visual Effects '', Informatica, Vol. 24, No. 4, PP. 505-511, 12, 2000.【PDF】 |
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''An Efficient Threshold Decryption Scheme without Session Keys '', CEE, Vol. 27, No. 1, PP. 29-35, 11, 2000.【PDF】 |
Min-Shiang Hwang, ''A New Redundancy Reducing Cipher '', INFO, Vol. 11, No. 4, PP. 435-440, 10, 2000.【PDF】 |
Min-Shiang Hwang and Li-Hua Li, ''A New Remote User Authentication Scheme Using Smart Cards '', IEEE-CE, Vol. 46, No. 1, PP. 28-30, 2, 2000.【PDF】 |
Min-Shiang Hwang, ''An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Totally-Ordered Hierarchies '', IJCM, Vol. 73, No. 4, PP. 463-468, 10, 2000.【PDF】 |
Min-Shiang Hwang, ''Extension of CHW Cyptographic Key Assignment Scheme in a Hierarchy '', IEE-CDT, Vol. 146, No. 4, PP. 219, 7, 1999.【PDF】 |
Min-Shiang Hwang, ''Cryptanalysis of Remote Login Authentication Scheme '', CC, Vol. 22, No. 8, PP. 742-744, 5, 1999.【PDF】 |
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''A Watermarking Technique Based on One-way Hash Functions '', IEEE-CE, Vol. 45, No. 2, PP. 286-294, 5, 1999.【PDF】 |
Min-Shiang Hwang, ''An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarch '', IEICE-F, Vol. E82-A, No. 3, PP. 548-550, 3, 1999.【PDF】 |
Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, ''A Novel Application of the Phone Card and Its Authentication in Mobile Communications '', JISE, Vol. 15, No. 4, PP. 471-484, 7, 1999.【PDF】 |
Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, ''Enhanced privacy and authentication for the global system for mobile communications '', WINET, Vol. 5, No. 4, PP. 231-243, 7, 1999.【PDF】 |
Min-Shiang Hwang, ''Dynamic Participation in a Secure Conference Scheme for Mobile Communications '', IEEE-VT, Vol. 48, No. 5, PP. 1469-1474, 9, 1999.【PDF】 |
Min-Shiang Hwang and Li-Hua Li, ''A Remote Password Authentication Scheme Based on the Digital Signature Method '', IJCM, Vol. 70, No. 4, PP. 657-666, 10, 1999.【PDF】 |
Min-Shiang Hwang, ''An Improvement of a Dynamic Cryptographic Key Assignment Schemes in a Tree Hierarchy '', CAM, Vol. 37, No. 3, PP. 19-22, 2, 1999.【PDF】 |
Min-Shiang Hwang, ''A New Dynamic Cryptographic Key Generation Scheme for a Hierarchy '', NJC, Vol. 6, No. 4, PP. 363-371, 8, 1999.【PDF】 |
Min-Shiang Hwang, ''Improved Attack on Server Assisted Authentication Protocols '', 朝陽學報, Vol. 4, PP. 93-100, , 1999.【PDF】 |
Tung-Shou Chen, Chin-Chen Chang, and Min-Shiang Hwang, ''A Virtual Image Cryptosystem Based upon Vector Quantization '', IEEE-IP, Vol. 7, No. 10, PP. 1485-1488, 10, 1998.【PDF】 |
Min-Shiang Hwang and Chii-Hwa Lee, ''Authenticated Key-Exchange in a Mobile Radio Network '', ETT, Vol. 8, No. 3, PP. 265-269, 5, 1997.【PDF】 |
Min-Shiang Hwang, ''A Cryptographic Key Assignment Scheme in a Hierarchy for Access Control '', MCM, Vol. 26, No. 2, PP. 27-31, 6, 1997.【PDF】 |
Min-Shiang Hwang and Wei-Pang Yang, ''A Multilevel Database Encryption System with Subkeys '', DKE, Vol. 22, PP. 117-131, , 1997.【PDF】 |
Chin-Chen Chang and Min-Shiang Hwang, ''Parallel Computation of the Generating Keys for RSA Cryptosystems '', EL, Vol. 32, No. 15, PP. 1365-1366, 7, 1996.【PDF】 |
Min-Shiang Hwang, Wen-Guey Tzeng, and Wei-Pang Yang, ''An Access Control Scheme Based on Chinese Remainder Theorem and Time Stamp Concept '', CS, Vol. 15, No. 1, PP. 73-81, 1996.【PDF】 |
Min-Shiang Hwang and Wei-Pang Yang, ''Conference Key Distribution Protocols for Digital Mobile Communication Systems '', IEEE-JSAC, Vol. 13, No. 2, PP. 416-420, 2, 1995.【PDF】 |
Min-Shiang Hwang and Wei-Pang Yang, ''A Two-Phase Encryption Scheme for Enhancing Database Security '', JSS, Vol. 31, No. 12, PP. 257-265, 12, 1995.【PDF】 |
Min-Shiang Hwang, Wen-Guey Tzeng, and Wei-Pang Yang, ''A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp '', IEICE, Vol. E77-D, No. 9, PP. 1042-1046, 9, 1994.【PDF】 |
Min-Shiang Hwang and Wei-Pang Yang, ''A New Dynamic Access Control Scheme Based on Subject-Object List '', DKE, Vol. 14, No. 1, PP. 45-56, 11, 1994.【PDF】 |
Min-Shiang Hwang, Chin-Chen Chang, and Wei-Pang Yang, ''Modified Chang-Hwang-Wu Access Control Scheme '', IEE-EL, Vol. 29, No. 24, PP. 2095-2096, 11, 1993.【PDF】 |
Chun-Ta Li and Min-Shiang Hwang, Shih-Ming Chen, ''A Batch Verifying and Detecting the Illegal Signatures '', IJICIC, .【PDF】 |
Jung-Wen Lo, Cheng-Chi Lee, Min-Shiang Hwang, Yen-Ping Chu, ''An ECC-based AKA protocol for wireless mobile communication '', IJICIC, .【PDF】 |