學術著作


國際&國內期刊論文   國際&國內會議論文   編書/著書   雜誌文章   專利   登錄會員(即可下載PDF)   回首頁

國際&國內期刊論文(International & Local Journal Papers)
Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, ''A Cocktail Protocol with the Authentication and Key Agreement on the UMTS '', JSS, Vol. 83, No. 2, PP. 316-325, 2, 2010.【PDF】
Chun-Ta Li, Min-Shiang Hwang, ''An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards '', IJICIC, Vol. 6, No. 5, PP. 2181-2188, 5, 2010.【PDF】
Chun-Ta Li and Min-Shiang Hwang, ''An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards '', JNCA, Vol. 33, No. 1, PP. 1-5, 1, 2010.【PDF】
Min-Shiang Hwang,, Song-Kong Chong, and Te-Yu Chen, ''DoS-resistant ID-based Password Authentication Scheme Using Smart Cards '', JSS, Vol. 83, PP. 163-172, 1, 2010.【PDF】
Te-Yu Chen, Min-Shiang Hwang and Jinn-Ke Jan, ''Adaptive Authentication Schemes for 3D Mesh Models '', IJICIC, Vol. 5, No. 12, PP. 4561-4572, 12, 2009.【PDF】
Hsia-Hung Ou, Min-Shiang Hwang, and Jinn-Ke Jan, ''A provable billing protocol on the current UMTS '', WPC, 9, 2009.【PDF】
Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, and Jinn-Ke Jan, ''TK-AKA: Using Temporary Key on Authentication and Key Agreement Protocol on UMTS '', IJNM, Vol. 19, No. 4, PP. 291-303, 7, 2009.【PDF】
Chia-Chun Wu, Min-Shiang Hwang, and S-J. Kao, ''A New Approach to the Secret Image Sharing with Steganography and Authentication '', ISJ, Vol. 57, No. 3, PP. 140-151, 6, 2009.【PDF】
Meng-Hsiun Tsai, Shu-Fen Chiou and Min-Shiang Hwang, ''A Simple Method for Detecting Protein Spots in 2D-GE Images Using Image Contrast '', IJICIC, Vol. 5, No. 12, PP. 4617-4626, 12, 2009.【PDF】
Meng-Hsiun Tsai, Shu-Fen Chiou, and Min-Shiang Hwang, ''A Progressive Image Transmission Method for 2D-GE Image Based on Context Feature '', IJICIC, Vol. 5, No. 2, PP. 379-386, 2, 2009.【PDF】
Hsia-Hung Ou, Min-Shiang Hwang, and Jinn-Ke Jan, ''The UMTS-AKA protocols for Intelligent Transportation Systems '', EJWCN, Vol. 2009, PP. 1-12, , 2009.【PDF】
Cheng-Chi Lee, Pi-Fang Ho, and Min-Shiang Hwang, ''A Secure E-Auction Scheme Based on Group Signatures '', ISF, Vol. 11, No. 3, PP. 335-343, 7, 2009.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng, ''A Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem '', IJFCS, Vol. 20, No. 2, PP. 351-359, 2009.【PDF】
Chun-Ta Li, Min-Shiang Hwang, and Yen-Ping Chu, ''An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications '', IJICIC, Vol. 5, No. 8, PP. 2107-2124, 8, 2009.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin, ''A New English Auction Scheme Using The Bulletin Board System '', IMCS, Vol. 17, No. 5, PP. 408-417, 11, 2009.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, ''A New Knapsack Public-Key Cryptosystem Based on the Permutation Combination Algorithm '', IEEE-TIFS, Vol. 5, No. 1, PP. 33-38, 2009.【PDF】
Min-Shiang Hwang, Shiang-Feng Tzeng and Shu-Fen Chiou, ''A Nonrepudiable Multi-Proxy Multi-Signature Scheme '', ICIC, Vol. 3, No. 3, PP. 259-264, 9, 2009.【PDF】
Min-Shiang Hwang, Chia-Hui Wei, and Cheng-Yee Lee , ''Privacy and Security Requirements for RFID Applications '', 電腦學刊, Vol. 3, No. 20, PP. 55-60, 10, 2009.【PDF】
Cheng-Chi Lee, I-En Liao, and Min-Shiang Hwang, ''An Extended Certificate-based Authentication and Security Protocol for Mobile Networks '', ITC, Vol. 38, No. 1, PP. 61-66, 2009.【PDF】
Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, and Min-Shiang Hwang, ''Reversible Secret Image Sharing Based on Shamir's Scheme '', ISJ, Vol. 57, No. 3, PP. 140-151, 6, 2009.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Song-Kong Chong, ''An Improved Address Ownership in Mobile IPv6 '', CC, Vol. 31, No. 14, PP. 3250-3252, 9, 2008.【PDF】
Chun-Ta Li, Min-Shiang Hwang , and Yen-Ping Chu, ''A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserv '', CC, Vol. 31, No. 12, PP. 2803-2814, 7, 2008.【PDF】
Chun-Ta Li, Min-Shiang Hwang, and Yen-Ping Chu, ''Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Perva '', CC, Vol. 31, No. 18, PP. 4255-4258, 12, 2008.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong, and Jung-Wen Lo, ''A Key Management for Wireless Communications '', IJICIC, Vol. 4, No. 8, PP. 2045-2056, 8, 2008.【PDF】
Nan-I Wu, Chung-Ming Wang, Chwei-Shyong Tsai, and Min-Shiang Hwang, ''A Certificate-based Watermarking Scheme for Coloured Images '', ISJ, Vol. 56, No. 6, PP. 326-332, 12, 2008.【PDF】
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, ''Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad '', IJCSSE, Vol. 23, No. 3, PP. 227-234, 5, 2008.【PDF】
Chun-Ta Li, Min-Shiang Hwang, and Chi-Yu Liu, ''An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks '', CC, Vol. 31, No. 10, PP. 2534-2540, 6, 2008.【PDF】
A Simple Mobile Communication Billing System Among Charged Parties, ''A Simple Mobile Communication Billing System Among Charged Parties '', AMC, Vol. 192, No. 2, PP. 487-495, 9, 2007.【PDF】
Shiang-Feng Tzeng, Yuan-Liang Tang, and Min-Shiang Hwang, ''A New Convertible Authenticated Encryption Scheme with Message Linkages '', CEE, Vol. 33, No. 2, PP. 133-138, 3, 2007.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, and Chih-Wei Lin, ''An Efficient Multi-Round Anonymous Auction Protocol '', JDMSC, Vol. 10, No. 4, PP. 547-557, 8, 2007.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, and I-En Liao, ''A New Authentication Protocol Based on Pointer Forwarding for Mobile Communications '', WCMC, Vol. 8, No. 5, PP. 661-672, 1, 2007.【PDF】
Chwei-Shyong Tsai, Cheng-Chi Lee, and Min-Shiang Hwang, ''Password Authentication Schemes: Current Status and Key Issues '', IJNS, Vol. 3, No. 2, PP. 101-115, 9, 2006.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, and I-En Liao, ''Security Enhancement on a New Authentication Scheme With Anonymity For Wireless Environments '', IEEE-IE, Vol. 53, No. 5, PP. 1683-1687, 10, 2006.【PDF】
I-En Liao, Cheng-Chi Leea, and Min-Shiang Hwang, ''A Password Authentication Scheme Over Insecure Networks '', JCSS, Vol. 72, No. 4, PP. 727-740, 6, 2006.【PDF】
Min-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, and Yen-Ping Chu, ''Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows '', IEICE-IS, Vol. E89-D, No. 4, PP. 1575-1577, 4, 2006.【PDF】
Chih-Wei Lin, Chwei-Shyong Tsai, and Min-Shiang Hwang, ''A New Strong-Password Authentication Scheme Using One-way Hash Functions '', IJCSS, Vol. 45, No. 4, PP. 623-626, 7, 2006.【PDF】
Hui-Chieh Lu, Yen-Ping Chu, and Min-Shiang Hwang, ''New steganographic method of pixel value differencing '', TJIST, Vol. 50, No. 5, PP. 424-426, 9/10, 2006.【PDF】
Feng Bao, Cheng-Chi Lee, and Min-Shiang Hwang, ''Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures '', AMC, Vol. 172, No. 2, PP. 1195-1200, 1, 2006.【PDF】
Min-Shiang Hwang and Chi-Yu Liu, ''Authenticated Encryption Schemes: Current Status and Key Issues '', IJNS, Vol. 1, No. 2, PP. 61-73, 9, 2005.【PDF】
Hsien-Chu Wu, Chi-Yu Liu, and Shu-Fen Chiou, ''Cryptanalysis of a Secure One-Time Password Authentication Scheme with Low-Communication for Mobile '', IJNS, Vol. 1, No. 2, PP. 74-76, 9, 2005.【PDF】
Shiang-Feng Tzeng, Min-Shiang Hwang, and Hsing-Bai Chen, ''A Secure On-Line Software Transaction Scheme '', CSI, Vol. 27, No. 3, PP. 303-312, 3, 2005.【PDF】
Min-Shiang Hwang, Jung-Wen Lo, and Chia-Hsin Liu, ''Improvement on the Flexible Tree-Based Key Management Framework '', CS, Vol. 24, No. 6, PP. 500-504, 9, 2005.【PDF】
Nan-I Wu, H.-C. Wu, Chwei-Shyong Tsai, and Min-Shiang Hwang, ''Image Steganographic Scheme Based on Pixel-value Differencing and LSB Replacement Methods '', IEE-VISP, Vol. 152, No. 5, PP. 611-615, 10, 2005.【PDF】
Hsien-Chu Wu, Min-Shiang Hwang, and Chia-Hsin Liu, ''A Secure Strong-Password Authentication Protocol '', FI, Vol. 68, No. 4, PP. 399-406, 6, 2005.【PDF】
Chwei-Shyong Tsai, Shu-Chen Lin, and Min-Shiang Hwang, ''Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys '', AMC, Vol. 166, No. 1, PP. 118-122, 7, 2005.【PDF】
Ting-Yi Chang, Wei-Pang Yang, and Min-Shiang Hwang, ''Simple Authenticated Key Agreement and Protected Password Change Protocols '', CMA, Vol. 49, No. 5-6, PP. 703-714, 4, 2005.【PDF】
Li-Hua Li, Shiang-Feng Tzeng, and Min-Shiang Hwang, ''Improvement of Signature Scheme Based on Factoring and Discrete Logarithms '', AMC, Vol. 161, No. 1, PP. 49-54, 2, 2005.【PDF】
Min-Shiang Hwang, Jung-Wen Lo, Chi-Yu Liu, and Shu-Chen Lin, ''Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card '', PJAS, Vol. 5, No. 1, PP. 99-100, 2005.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, and Chao-Chen Yang, ''A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography '', TS, Vol. 29, No. 3, PP. 165-180, 7, 2005.【PDF】
Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, ''An Improvement on the Lin-Wu (t, n) Threshold Verifiable Multi-secret Sharing Scheme '', AMC, Vol. 163, No. 1, PP. 169-178, 4, 2005.【PDF】
Cheng-Chi Lee, Ting-Yi Chang, and Min-Shiang Hwang, ''A Simple Broadcasting Cryptosystem in Computer Networks Using Exclusive-OR '', IJCAT, Vol. 24, No. 3, PP. 180-183, 7, 2005.【PDF】
Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, ''A New Multistage Secret Sharing Scheme Based on One-way Function '', ACM-OSR, Vol. 39, No. 1, PP. 48-55, 1, 2005.【PDF】
Iuon-Chang Lin, Hsia-Hung Ou, and Min-Shiang Hwang, ''A User Authentication System Using Back-Propagation Network '', NCA, Vol. 146, No. 3, PP. 243-249, 9, 2005.【PDF】
Iuon-Chang Lin, Min-Shiang Hwang, and Chin-Chen Chang, ''The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain '', DCC, Vol. 36, No. 1, PP. 53-67, 7, 2005.【PDF】
Min-Shiang Hwang, Kuo-Feng Hwang, and Chin-Chen Chang, ''A Time-Stamping Protocol for Digital Watermarking '', AMC, Vol. 169, No. 2, PP. 1276-1284, 10, 2005.【PDF】
Min-Shiang Hwang, Chun-Ta Li, Jau-Ji Shen, and Yen-Ping Chu, ''Challenges in e-Government and Security of Information '', I&S, Vol. 15, No. 1, PP. 9-20, 2004.【PDF】
Li-Hua Li, Chi-Yu Liu, and Min-Shiang Hwang, ''Cryptanalysis of An Efficient Secure Group Signature Scheme '', ACM-OSR, Vol. 38, No. 4, PP. 66-69, 10, 2004.【PDF】
Min-Shiang Hwang, Jung-Wen Lo, and Shu-Chen Lin, ''An Efficient User Identification Scheme Based on ID-based Cryptosystem '', CSI, Vol. 26, No. 6, PP. 565-569, 10, 2004.【PDF】
Min-Shiang Hwang, Jung-Wen Lo, and Chia-Hsin Liu , ''Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack '', FI, Vol. 61, No. 3-4, PP. 389-398, 2004.【PDF】
Ting-Yi Chang, Chao-Chen Yang, and Min-Shiang Hwang, ''Cryptanalysis of Publicly Verifiable Authenticated Encryption '', IEICE-F, Vol. E87-A, No. 6, PP. 1645-1646, 6, 2004.【PDF】
Chwei-Shyong Tsai, Min-Shiang Hwang, and Pei-Chen Sung , ''Blind Signature Scheme Based on Elliptic Curve Cryptography '', CSCI, Vol. 34, No. 3, 2004.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Ji-Zhe Lee, ''A New Anonymous Channel Protocol in Wireless Communications '', IJEC, Vol. 58, No. 3, PP. 218-222, 5, 2004.【PDF】
Ting-Yi Chang, Chou-Chen Yang, and Min-Shiang Hwang, ''Cryptanalysis of Simple Authenticated Key Agreement Protocols '', IEICE-F, Vol. E87-A, No. 8, PP. 2174-2176, 8, 2004.【PDF】
Shiang-Feng Tzeng and Min-Shiang Hwang , ''Digital Signature with Message Recovery and Its Variants Based on Elliptic Curve Discrete Logarithm '', CSI, Vol. 26, No. 2, PP. 61-71, 3, 2004.【PDF】
Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, ''Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System without Using a One-way '', I&S, Vol. 15, No. 1, PP. 110-114, 2004.【PDF】
Min-Shiang Hwang, Shiang-Feng Tzeng, and Chwei-Shyong Tsai, ''Generalization of Proxy Signature Based on Elliptic Curves '', CSI, Vol. 26, No. 2, PP. 73-84, 3, 2004.【PDF】
Ting-Yi Chang, Chou-Chen Yang, and Min-Shiang Hwang, ''A Threshold Signature Scheme for Group Communications without a Shared Distribution Center '', FGCS, Vol. 20, No. 6, PP. 1013-1021, 8, 2004.【PDF】
Chou-Chen Yang, Jian-Wei Li, and Min-Shiang Hwang, ''A New Mutual Authentication and Key Exchange Protocol with Balanced Computational Power for Wireless '', ETT, Vol. 15, No. 2, PP. 91-99, 4, 2004.【PDF】
Shiang-Feng Tzeng, Min-Shiang Hwang, and Cheng-Ying Yang, ''An Improvement of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers '', CS, Vol. 23, No. 2, PP. 174-178, 3, 2004.【PDF】
Shiang-Feng Tzeng, Cheng-Ying Yang, and Min-Shiang Hwang, ''A New Digital Signature Scheme Based on Factoring and Discrete Logarithms '', IJCM, Vol. 81, No. 1, PP. 9-14, 1, 2004.【PDF】
Shiang-Feng Tzeng, Cheng-Ying Yang, and Min-Shiang Hwang, ''A Nonrepudiation Threshold Multi-Proxy Multi-Signature with Shared Verification '', FGCS, Vol. 20, No. 5, PP. 887-893, 6, 2004.【PDF】
Cheng-Ying Yang, Shiang-Feng Tzeng, and Min-Shiang Hwang, ''On the Efficiency of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers '', JSS, Vol. 73, No. 3, PP. 507-514, 9-12, 2004.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, and I-En Liao, ''A Server Assisted Authentication Protocol for Detecting Error Vectors '', ACM-OSR, Vol. 38, No. 2, PP. 93-96, 4, 2004.【PDF】
Iuon-Chang Lin, Hsia-Hung Ou, and Min-Shiang Hwang, ''Efficient Access Control and Key Management Schemes for Mobile Agents '', CSI, Vol. 26, No. 5, PP. 423-433, 9, 2004.【PDF】
Ting-Yi Chang, Chao-Chen Yang, and Min-Shiang Hwang, ''Threshold Untraceable Signature for Group Communications '', IEE-Comm, Vol. 151, No. 2, PP. 179-184, 4, 2004.【PDF】
Chin-Chen Chang, Kuo-Lun Chen, and Min-Shiang Hwang , ''End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication '', WPC, Vol. 28, No. 2, PP. 95-106, 1, 2004.【PDF】
Jau-Ji Shan, Iuon-Chang Lin, and Min-Shiang Hwang , ''A Secure LITESET Scheme '', IEICE-IS, Vol. E87-D, No. 11, PP. 2509-2512, 11, 2004.【PDF】
Min-Shiang Hwang, Li-Hua Li, and Cheng-Chi Lee, ''A Key Authentication Scheme with Non-repudiation '', ACM-OSR, Vol. 38, No. 3, PP. 75-78, 7, 2004.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Yang, ''A New Blind Signature based on the Discrete Logarithm Problem for Untraceability '', AMC, Vol. 164, No. 3, PP. 837-841, 7, 2004.【PDF】
Chih-Wei Lin, Jau-Ji Shen, and Min-Shiang Hwang, ''Security Enhancement for Optimal Strong-Password Authentication Protocol '', ACM-OSR, Vol. 37, No. 2, PP. 7-12, 4, 2003.【PDF】
Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, and Min-Shiang Hwang , ''Security Enhancement for Protecting Password Transmission '', IEICE-F, Vol. E86-B, No. 7, PP. 2178-2181, 7, 2003.【PDF】
Chou-Chen Yang, Ting-Yi Chang, and Min-Shiang Hwang, ''Security of Improvement on Methods for Protecting Password Transmission '', INFO, Vol. 14, No. 4, PP. 551-558, 12, 2003.【PDF】
Jau-Ji Shen, Chih-Wei Lin, and Min-Shiang Hwang, ''Security Enhancement for the Timestamp-Based Password Authentication Scheme Using Smart Cards '', CS, Vol. 22, No. 7, PP. 591-595, 2003.【PDF】
Chou-Chen Yang, Ting-Yi Chang, and Min-Shiang Hwang, ''A New Anonymous Conference Key Distribution System based on the Elliptic Curve Discrete Logarithm Pr '', CSI, Vol. 25, No. 2, PP. 141-145, 5, 2003.【PDF】
Chwei-Shyong Tsai, Shiang-Feng Tzeng, and Min-Shiang Hwang, ''Improved Non-repudiable Threshold Proxy Signature Scheme with Known Signers '', INFO, Vol. 14, No. 3, PP. 393-402, 2003.【PDF】
Jau-Ji Shen, Chih-Wei Lin, and Min-Shiang Hwang, ''A Modified Remote User Authentication Scheme Using Smart Cards '', IEEE-CE, Vol. 49, No. 2, PP. 414-416, 5, 2003.【PDF】
Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, and Min-Shiang Hwang, ''Simple Generalized Group-oriented Cryptosystems Using ElGamal Cryptosystem '', INFO, Vol. 11, No. 4, PP. 111-120, 2003.【PDF】
Li-Hua Lia, Shiang-Feng Tzeng, and Min-Shiang Hwang, ''Generalization of Proxy Signature Based on Discrete Logarithms '', CS, Vol. 22, No. 3, PP. 245-255, 4, 2003.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Yan-Chi Lai, ''An Untraceable Blind Signature Scheme '', IEICE-F, Vol. E86-A, No. 7, PP. 1902-1906, 7, 2003.【PDF】
Shin-Jia Hwang, Min-Shiang Hwang, and Shiang-Feng Tzeng , ''A New Digital Multisignature Scheme with Distinguished Signing Authorities '', IPL, Vol. 19, No. 5, PP. 881-887, 9, 2003.【PDF】
Min-Shiang Hwang, Chen-Chi Lee, and Yan-Chi Lai , ''Traceability on RSA-Based Partially Signature with Low Computation '', AMC, Vol. 145, No. 2-, PP. 465-468, 12, 2003.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Yan-Chi Lai , ''Traceability on Stadler et al.'s Fair Blind Signature Scheme '', IEICE-F, Vol. E86-A, No. 2, PP. 513-514, 2, 2003.【PDF】
Eric Jui-Lin Lu, Cheng-Chi Lee, and Min-Shiang Hwang, ''Cryptanalysis of Some Authenticated Key Agreement Protocols '', IJCNAA, Vol. 3, No. 2, PP. 151-157, 4, 2003.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Yang, ''Extension of Authentication Protocol for GSM '', IEE-Comm, Vol. 150, No. 2, PP. 91-95, 4, 2003.【PDF】
Iuon-Chang Lin, Min-Shiang Hwang, and Chin-Chen Chang, ''Security Enhancement for Anonymous Secure E-voting Over a Network '', CSI, Vol. 25, No. 2, PP. 131-139, 3, 2003.【PDF】
Min-Shiang Hwang, Cheng-Yeh Shiu, and Chao-Chen Yang, ''An Authentication Scheme for Mobile Satellite Communication Systems '', ACM-OSR, Vol. 37, No. 4, PP. 42-47, 10, 2003.【PDF】
Cheng-Chi Lee, Chao-Chen Yang, and Min-Shiang Hwang, ''A New Privacy and Authentication Protocol for End-to-End Mobile Users '', IJCS, Vol. 16, No. 9, PP. 799-808, 11, 2003.【PDF】
Iuon-Chung Lin, Min-Shiang Hwang, and Li-Hua Li, ''A New Remote User Authentication Scheme for Multi-Server Architecture '', FGCS, Vol. 19, No. 1, PP. 13-22, 2003.【PDF】
Min-Shiang Hwang, Eric Jui-Lin Lu, and Iuon-Chang Lin, ''A Practical (t, n) Threshold Proxy Signature Scheme Based on The RSA Cryptosystem '', IEEE-TKDE, Vol. 15, No. 5, PP. 1-9, 9-10, 2003.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, and Li-Hua Li, ''A new key authentication scheme based on discrete logarithms '', AMC, Vol. 139, No. 2-, PP. 343-349, 7, 2003.【PDF】
Iuon-Chung Lin, Min-Shiang Hwang, and Chin-Chen Chang, ''A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy '', FGCS, Vol. 19, No. 4, PP. 457-462, 5, 2003.【PDF】
Min-Shiang Hwang and Wei-Pang Yang, ''Controlling Access in Large Partially-Ordered Hierarchies Using Cryptographic Keys '', JSS, Vol. 67, No. 2, PP. 99-107, 8, 2003.【PDF】
Min-Shiang Hwang, Chih-Wei Lin, and Cheng-Chi Lee, ''Improved Yen-Joye's Authenticated Multiple-key Agreement Protocol '', EL, Vol. 38, No. 23, PP. 1429 -1431, 11, 2002.【PDF】
Chou-Chen Yang, Ting-Yi Chang, and Min-Shiang Hwang, ''A (t, n) Multi-Secret Sharing Scheme '', AMC, Vol. 151, No. 2, PP. 483-490, 4, 2002.【PDF】
Shiang-Feng Tzeng, Cheng-Ying Yang, and Min-Shiang Hwang, ''A New Multi-Proxy Multi-Signature Scheme '', 電腦學刊, 2002.【PDF】
Cheng-Chi Lee, Wei-Pang Yang, and Min-Shiang Hwang, ''Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem '', FI, Vol. 55, No. 3-, PP. 307-320, 9, 2002.【PDF】
Min-Shiang Hwang, Chen-Chi Lee, and Yan-Chi Lai , ''Traceability on Low-Computation Partially Blind Signatures for Electronic Cash '', IEICE-F, Vol. E85-A, No. 5, PP. 1181-1182, 5, 2002.【PDF】
Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Peng Yang, ''A Flexible Remote User Authentication Scheme Using Smart Cards '', ACM-OSR, Vol. 36, No. 3, PP. 46-52, 7, 2002.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Shin-Jia Hwang , ''Cryptanalysis of the Hwang-Shi Proxy Signature Scheme '', FI, Vol. 53, No. 2, PP. 131-134, 5, 2002.【PDF】
Cheng-Chi Lee, Li-Hua Li, and Min-Shiang Hwang , ''A Remote User Authentication Scheme Using Hash Functions '', ACM-OSR, Vol. 36, No. 4, PP. 23-29, 10, 2002.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Wei-Pang Yang, ''An Improvement of Mobile Users Authentication in the Integration Environments '', IJEC, Vol. 56, No. 5, PP. 293-297, 9, 2002.【PDF】
Iuon-Chang Lin, Hsia-Hung Ou, and Min-Shiang Hwang, ''Two Secure Transportation Schemes for Mobile Agents '', I&S, Vol. 8, No. 1, PP. 87-97, 2002.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Yuan-Liang Tang, ''A Simple Remote User Authentication Scheme '', MCM, Vol. 36, No. 1-, PP. 103-107, 10, 2002.【PDF】
Eric Jui-Lin Lu and Min-Shiang Hwang, ''An Improvement of a Simple Authenticated Key Agreement Algorithm '', PJAS, Vol. 2, No. 1, PP. 64-65, 2002.【PDF】
Chin-Chen Chang, Kuo-Feng Hwang, and Min-Shiang Hwang, ''A Feature-Oriented Copyright Owner Proving Technique for Still Images '', IJSEKE, Vol. 12, No. 3, PP. 317-330, 6, 2002.【PDF】
Yuan-Liang Tang, Min-Shiang Hwang, and Ching-Rong Yang, ''An Image Authentication Scheme Based on Digital Signatures '', PJAS, Vol. 2, No. 5, PP. 553-557, 2002.【PDF】
Chin-Chen Chang, Kuo-Feng Hwang, and Min-Shiang Hwang, ''Robust authentication scheme for protecting copyrights of images and graphics '', IEE-VISP, Vol. 149, No. 1, PP. 43-50, 2, 2002.【PDF】
Min-Shiang Hwang, Chao-Chen Yang, and Shiang-Feng Tzeng, ''Improved digital signature scheme based on factoring and discrete logarithms '', JDMSC, Vol. 5, No. 2, PP. 151-155, 8, 2002.【PDF】
S. Wesley Changchien, Min-Shiang Hwang, and Kuo-Feng Hwang, ''A Batch Verifying and Detecting Multiple RSA Digital Signatures '', IJCNAA, Vol. 2, No. 3, PP. 303-307, 10, 2002.【PDF】
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''An ElGamal-like Cryptosystem for Enciphering Large Messages '', IEEE TKDE, Vol. 14, No. 2, PP. 445-446, 3-4, 2002.【PDF】
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''An Improved Authentication Protocol Without Trusted Third Party '', IJCNAA, Vol. 1, No. 4, PP. 407-412, 4, 2002.【PDF】
Min-Shiang Hwang, Eric Jui-Lin Lu, and Iuon-Chung Lin, ''Adding Timestamps to the Secure Electronic Auction Protocol '', DKE, Vol. 40, No. 2, PP. 155-162, 2, 2002.【PDF】
Min-Shiang Hwang and Wei-Pang Yang, ''An Authentication Protocol for Multicast Communications '', PJAS, Vol. 2, No. 12, PP. 1082-1083, 12, 2002.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Ting-Yi Chang, ''Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines '', JISE, Vol. 18, No. 3, PP. 373-379, 5, 2002.【PDF】
Min-Shiang Hwang, S. Wesley Changchien, and Cheng-Chi Lee, ''A New Method to Strengthen Ciphers '', IJPAM, Vol. 3, No. 2, PP. 187-192, 2002.【PDF】
Min-Shiang Hwang and Wei-Pang Yang, ''Integrated Different Semantics Classification Levels in Multidatabase Systems '', PJIT, Vol. 1, No. 1, PP. 1-4, 4, 2002.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Eric Jui-Lin Lu, ''Cryptanalysis of the Batch Verifying Multiple DSA-type Digital Signatures '', PJAS, Vol. 1, No. 3, PP. 287-288, 7, 2001.【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Yuan-Liang Tang, ''An Improvement of SPLICE/AS in WIDE against Guessing Attack '', INFO, Vol. 12, No. 2, PP. 297-302, 4, 2001.【PDF】
Min-Shiang Hwang, Iuon-Chung Lin, and Li-Hua Li, ''A Simple Micro-Payment Scheme '', JSS, Vol. 55, No. 3, PP. 221-229, 1, 2001.【PDF】
Chin-Chen Chang, Min-Shian Hwang, and Tung-Shou Chen, ''A new encryption algorithm for image cryptosystems '', JSS, Vol. 58, No. 2, PP. 83-91, 9, 2001.【PDF】
Li-Hua Li, Iuon-Chung Lin, and Min-Shiang Hwang, ''A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural Networks '', IEEE-NN, Vol. 12, No. 6, PP. 1498-1504, 11, 2001.【PDF】
Ching-Yung Liu and Min-Shiang Hwang, ''Integrated IP/ATM Security Services over ADSL Access Networks '', 電腦學刊, Vol. 12, No. 1, 5, 2000.【PDF】
Min-Shiang Hwang, Iuon-Chung Lin, and Eric Jui-Lin Lu, ''A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers '', INFO, Vol. 11, No. 2, PP. 1-8, 4, 2000.【PDF】
Min-Shiang Hwang, ''Cryptanalysis of YCN Key Assignment Scheme in a Hierarchy '', IPL, Vol. 73, No. 3, PP. 97-101, 2, 2000.【PDF】
Min-Shiang Hwang, Kuo-Feng Hwang, and Iuon-Chung Lin, ''Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures '', INFO, Vol. 11, No. 1, PP. 1-4, 1, 2000.【PDF】
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''Digital Watermarking of Images Using Neural Networks '', JEI, Vol. 9, No. 4, PP. 548-555, 1, 2000.【PDF】
Chin-Chen Chang, Kuo-Feng Hwang, and Min-Shiang Hwang, ''A Digital Watermarking Scheme Using Human Visual Effects '', Informatica, Vol. 24, No. 4, PP. 505-511, 12, 2000.【PDF】
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''An Efficient Threshold Decryption Scheme without Session Keys '', CEE, Vol. 27, No. 1, PP. 29-35, 11, 2000.【PDF】
Min-Shiang Hwang, ''A New Redundancy Reducing Cipher '', INFO, Vol. 11, No. 4, PP. 435-440, 10, 2000.【PDF】
Min-Shiang Hwang and Li-Hua Li, ''A New Remote User Authentication Scheme Using Smart Cards '', IEEE-CE, Vol. 46, No. 1, PP. 28-30, 2, 2000.【PDF】
Min-Shiang Hwang, ''An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Totally-Ordered Hierarchies '', IJCM, Vol. 73, No. 4, PP. 463-468, 10, 2000.【PDF】
Min-Shiang Hwang, ''Extension of CHW Cyptographic Key Assignment Scheme in a Hierarchy '', IEE-CDT, Vol. 146, No. 4, PP. 219, 7, 1999.【PDF】
Min-Shiang Hwang, ''Cryptanalysis of Remote Login Authentication Scheme '', CC, Vol. 22, No. 8, PP. 742-744, 5, 1999.【PDF】
Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, ''A Watermarking Technique Based on One-way Hash Functions '', IEEE-CE, Vol. 45, No. 2, PP. 286-294, 5, 1999.【PDF】
Min-Shiang Hwang, ''An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarch '', IEICE-F, Vol. E82-A, No. 3, PP. 548-550, 3, 1999.【PDF】
Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, ''A Novel Application of the Phone Card and Its Authentication in Mobile Communications '', JISE, Vol. 15, No. 4, PP. 471-484, 7, 1999.【PDF】
Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, ''Enhanced privacy and authentication for the global system for mobile communications '', WINET, Vol. 5, No. 4, PP. 231-243, 7, 1999.【PDF】
Min-Shiang Hwang, ''Dynamic Participation in a Secure Conference Scheme for Mobile Communications '', IEEE-VT, Vol. 48, No. 5, PP. 1469-1474, 9, 1999.【PDF】
Min-Shiang Hwang and Li-Hua Li, ''A Remote Password Authentication Scheme Based on the Digital Signature Method '', IJCM, Vol. 70, No. 4, PP. 657-666, 10, 1999.【PDF】
Min-Shiang Hwang, ''An Improvement of a Dynamic Cryptographic Key Assignment Schemes in a Tree Hierarchy '', CAM, Vol. 37, No. 3, PP. 19-22, 2, 1999.【PDF】
Min-Shiang Hwang, ''A New Dynamic Cryptographic Key Generation Scheme for a Hierarchy '', NJC, Vol. 6, No. 4, PP. 363-371, 8, 1999.【PDF】
Min-Shiang Hwang, ''Improved Attack on Server Assisted Authentication Protocols '', 朝陽學報, Vol. 4, PP. 93-100, , 1999.【PDF】
Tung-Shou Chen, Chin-Chen Chang, and Min-Shiang Hwang, ''A Virtual Image Cryptosystem Based upon Vector Quantization '', IEEE-IP, Vol. 7, No. 10, PP. 1485-1488, 10, 1998.【PDF】
Min-Shiang Hwang and Chii-Hwa Lee, ''Authenticated Key-Exchange in a Mobile Radio Network '', ETT, Vol. 8, No. 3, PP. 265-269, 5, 1997.【PDF】
Min-Shiang Hwang, ''A Cryptographic Key Assignment Scheme in a Hierarchy for Access Control '', MCM, Vol. 26, No. 2, PP. 27-31, 6, 1997.【PDF】
Min-Shiang Hwang and Wei-Pang Yang, ''A Multilevel Database Encryption System with Subkeys '', DKE, Vol. 22, PP. 117-131, , 1997.【PDF】
Chin-Chen Chang and Min-Shiang Hwang, ''Parallel Computation of the Generating Keys for RSA Cryptosystems '', EL, Vol. 32, No. 15, PP. 1365-1366, 7, 1996.【PDF】
Min-Shiang Hwang, Wen-Guey Tzeng, and Wei-Pang Yang, ''An Access Control Scheme Based on Chinese Remainder Theorem and Time Stamp Concept '', CS, Vol. 15, No. 1, PP. 73-81, 1996.【PDF】
Min-Shiang Hwang and Wei-Pang Yang, ''Conference Key Distribution Protocols for Digital Mobile Communication Systems '', IEEE-JSAC, Vol. 13, No. 2, PP. 416-420, 2, 1995.【PDF】
Min-Shiang Hwang and Wei-Pang Yang, ''A Two-Phase Encryption Scheme for Enhancing Database Security '', JSS, Vol. 31, No. 12, PP. 257-265, 12, 1995.【PDF】
Min-Shiang Hwang, Wen-Guey Tzeng, and Wei-Pang Yang, ''A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp '', IEICE, Vol. E77-D, No. 9, PP. 1042-1046, 9, 1994.【PDF】
Min-Shiang Hwang and Wei-Pang Yang, ''A New Dynamic Access Control Scheme Based on Subject-Object List '', DKE, Vol. 14, No. 1, PP. 45-56, 11, 1994.【PDF】
Min-Shiang Hwang, Chin-Chen Chang, and Wei-Pang Yang, ''Modified Chang-Hwang-Wu Access Control Scheme '', IEE-EL, Vol. 29, No. 24, PP. 2095-2096, 11, 1993.【PDF】
Chun-Ta Li and Min-Shiang Hwang, Shih-Ming Chen, ''A Batch Verifying and Detecting the Illegal Signatures '', IJICIC, .【PDF】
Jung-Wen Lo, Cheng-Chi Lee, Min-Shiang Hwang, Yen-Ping Chu, ''An ECC-based AKA protocol for wireless mobile communication '', IJICIC, .【PDF】
  【下列為國內期刊論文】--------------------------------------------------------------------------------------------------
Kwo-Jean Fran, Min-Shiang Hwang, "決策輔助支援系統 - 人機介面", 資訊與教育, pp. 21-28, Dec. 1989.
Kwo-Jean Fran, Min-Shiang Hwang, "A Natural Language Discourse Model to Explain Dialogue Module in Decision Support System", Vol.1, No.2, 電腦學刊, 1989.
Min-Shiang Hwang, "Improved Attack on Server Assisted Authentication Protocols", Journal of Chaoyang (朝陽學報), vol. 4, pp.93-100, 1999.
林詠章, 黃明祥, "網路系統安全之技術", 資訊安全通訊, Vol.5, No. 3, June, pp.12-22, 1999.
楊清榮, 黃明祥, "MPEG資訊安全技術探討", 資訊安全通訊, Vol.5, No. 4, Sep. 1999, pp.37-42.
黃國峰, 張真誠, 黃明祥, "漫談數位浮水印技術", 資訊安全通訊, Vol.5, No. 4, Sep. 1999, pp.11-17.
Ching-Yung Liu and Min-Shiang Hwang, "Integrated IP/ATM Security Services over ADSL Access Networks", Journal of Computers (電腦學刊), ROC, Vol. 12, no. 1, March 2000.
林詠章, 黃明祥, "資訊系統之安全技術", 資訊與教育, Vol.78, pp.15-28, Aug. 2000.
李正吉, 林詠章, 黃明祥, "電子檔案之安全技術", 檔案季刊, Vol.1, No. 2, pp. 48-57, June 2002.
黃明祥, 楊朝成, 李季哲, "藍芽微網之私密性及驗證性(Privacy and Authentication for Bluetooth Piconet)",上海大學學報(自然科學版), Vol.8, pp. 373-376, Oct. 2002.

國際&國內會議論文(International & Local Conference Papers)
Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, and Min-Shiang Hwang, ''Reversible Secret Image Sharing Based on Shamir's Scheme '', IIH-MSP, PP. 1014-1017, Kyoto, Japan , 2009-09-12 .【PDF】
Chun-Ta Li and Min-Shiang Hwang, ''Improving the Security of Non-PKI Methods for Public Key Distribution '', ITNG, PP. 1695-1696, Las Vegas, Nevada , 2009-04-27 .【PDF】
Chun-Ta Li, Min-Shiang Hwang, and Yan-Chi Lai , ''A Verifiable Electronic Voting Scheme Over the Internet '', ITNG, PP. 449-454, 2009-04-27 .【PDF】
Jung-Wen Lo, Min-Shiang Hwang, and Yen-Ping Chu, ''An Exchangeable E-Cash Scheme by E-mint '', ISDA, PP. 246-251, 2008-11-26 .【PDF】
Min-Shiang Hwang, Shiang-Feng Tzeng, and Shu-Fen Chiou , ''An Ordered Multi-proxy Multi-signature Scheme '', ISDA, PP. 308-313, 2008-11-26 .【PDF】
Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, and Min-Shiang Hwang, ''Enhance the Image Sharing with Steganography and Authentication '', IIHMSP, PP. 1177-1181, 2008-08-00 .【PDF】
Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, and Min-Shiang Hwang;, ''A Robust-Fragile Watermarking Scheme for Image Authentication '', ICICIC, PP. 176, Dalian, China , 2008-06-18 .【PDF】
Li, Chun-Ta; Lai, Yan-Chi; Hwang, Min-Shiang; Chu, and Yen-Ping, ''An Electronic Cash Scheme with Crime-Resistance '', ICS, PP. 926-930, 2007-01-29 .【PDF】
Min-Shiang Hwang, Shiang-Feng Tzeng, and Chun-Ta Li, ''A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period '', ICCSA, PP. 273-284, 2007-00-00 .【PDF】
I-En Liao, Cheng-Chi Lee, and Min-Shiang Hwang, ''Security Enhancement for a Dynamic ID-based Remote User Authentication Scheme '', NweSP, Seoul, Korea , 2005-08-22 .【PDF】
Min-Shiang Hwang, Ting-Yi Chang, Shu-Chen Lin, and Chwei-Shyong Tsai, ''On the Security of an Enhanced Authentication Key Exchange Protocol '', AINA, PP. 160 - 163, 2004-00-00 .【PDF】
Cheng-Chi Lee, and Li-Hua Li, and Min-Shiang Hwang, ''Digital Signature for Diffie-Hellman Public Keys Using Time Stamp '', IMSA, Kauai, Hawaii, USA , 2004-00-00 .【PDF】
Min-Shiang Hwang, Shiang-Feng Tzeng, and Chwei-Shyong Tsai;, ''A New Secure Generalization of Threshold Signature Scheme '', ITRE, PP. 282-285, 2003-08-11 .【PDF】
Ting-Yi Chang, Shu-Jean Lin, Chou-Chen Yang, and Min-Shiang Hwang, ''An Efficient Identification Scheme Based on the Elliptic Curve Discrete Logarithm Problem '', ICACT, PP. 752-754, Korea , 2003-02-00 .【PDF】
Min-Shiang Hwang and Shiang-Feng Tzeng, ''Deniable Authentication Protocol Based on Elliptic Curve Cryptography '', SCI, Orlando,Florida,USA , 2003-01-01 .【PDF】
Yuan-Liang Tang, Min-Shiang Hwang, and Chin-Rong Yang, ''A New Image Authentication Scheme Based on One-Way Hash Functions '', ICACT, PP. 6-8, Korea , 2002-02-00 .【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Yan-Chi Lai, ''Detecting the Illegal Signature in Multiple Signatures '', ICACT, PP. 6-8, Korea , 2002-02-00 .【PDF】
Min-Shiang Hwang, Yuan-Liang Tang, and Cheng-Chi Lee, ''An Authentication Scheme with Subscriber Anonymity in Personal Communication System '', ICACT, PP. 33-37, Korea , 2001-02-00 .【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Iuon-Chung Lin, ''An Improvement of Proxy Multi-Signature Scheme '', Yuforic, PP. 125-126, Spain,Valencia , 2001-00-00 .【PDF】
Min-Shiang Hwang, Cheng-Chi Lee, and Yuan-Liang Tang , ''Two Simple Batch Verifying Multiple Digital Signatures '', ICICS, PP. 233-237, 2001-00-00 .【PDF】
Iuon-Chung Lin, Chin-Chen Chang, and Min-Shiang Hwang, ''Security Enhancement for the 'Simple Authentication Key Agreement Algorithm' '', COMPSAC, PP. 113-115, Taipei , 2000-10-00 .【PDF】
Min-Shiang Hwang and Xhing-Yung Liu, ''Traffic Control in an ATM Network Using Distributed Key Techniques '', IS, PP. 197-201, Taipei , 2000-05-00 .【PDF】
Chin-Chen Chang, Kuo-Feng Hwang, and Min-Shiang Hwang, ''A Block Based Digital Watermarks for Copy Protection of Images '', APCC, PP. 977-980, Beijing, China , 1999-10-00 .【PDF】
Min-Shiang Hwang and Wei-Pang Yang, ''A Conference Key Distribution Scheme for Multilevel Security '', ICOIN2003, Taipei , 1995-05-00 .【PDF】
  【下列為國內會議論文】---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Shu-Fen Chiou, I-En Liao, and Min-Shiang Hwang,“Peers Assisted Authentication Protocol in P2P Networking Systems”, 第十九屆資訊安全會議(CISC 2009), 台灣科技大學, June 3-5, 2009.
吳佳駿,郭文中,黃明祥,“具安全性的多人浮水印系統”, 第十九屆資訊安全會議(CISC 2009), 台灣科技大學, June 3-5, 2009.
黃明祥,黃湘珺,李俊達,“應用無線感測器於教學環境之研究 ─ 以國內某校資管系為例”, 2008全球運籌管理產業實務研討暨論文發表會, 台南科技大學, Dec. 25, 2008.
黃明祥,曾雅筠,邱淑芬,“基於數位浮水印技術之數位內容與產權管理系統”, 2008第十四屆海峽兩岸資訊管理發展策略研討會, 國立中央大學, July 15-16, 2008.
李政毅、洪正杉、吳佳駿、黃明祥,「整合無線射頻辨識與生物辨識技術之身份識別系統」,2008 RFID科技論文研討會, pp. , Feb. 1, 2008, 台北科技大學
蕭舒尹,洪宗杰,黃明祥,“具高安全性之電子投票機制”, 2004數位生活與網際網路科技研討會, 成功大學, June 24, 2004.
Song-Kong Chong, Min-Shiang Hwang and Hui-Jie Lu, “Extension to Self-Encryption Mechanism for Authentication of Roaming Services”, 2004第十四屆全國資訊安全會議, 台灣科技大學, June 10, 2004.
Chi-Yu Liu, Min-Shiang Hwang, Jung-Wen Lo and Shu-Chen Lin, “Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card”, 2004第十四屆全國資訊安全會議, 台灣科技大學, June 10, 2004.
林淑真,林士強,林慧珊,黃明祥,“應用於無線網路環境上之密碼金鑰認證交換協定”, 2004通信電子科技與應用研討會(CECA2004), 樹德科技大學, May 28, 2004.
Chou-Chen Yang, Min-Shiang Hwang, Jian-Wei Li, and Wei-Ting Liu,“Study and Implementation of All IP-based AAA Security Infrastructure”, 2003網路與通訊技術發展與應用研討會, pp. 24-30, Taichung, Dec 25, 2003.
鐘松剛,劉家欣,黃明祥,“行動電話小額付款機制整合零售業之研發”, 2003網路與通訊技術發展與應用研討會, pp. 31-35, Taichung, Dec 25, 2003.
Min-Shiang Hwang, Hui-Chieh Lu and Na-I Wu,“A Fast and Efficient Watermarking for Color Image”, 2003網路與通訊技術發展與應用研討會, pp. 61-67, Taichung, Dec 25, 2003.
蕭舒尹,蘇建豪,黃明祥,“WAP就診預約掛號系統設計及實作”, 2003網路與通訊技術發展與應用研討會, pp. 75-78, Taichung, Dec 25, 2003.
何碧芳,吳男益,黃明祥,“成績查詢系統在WAP平台之服務與應用”, 2003網路與通訊技術發展與應用研討會, pp. 83-88, Taichung, Dec 25, 2003.
Min-Shiang Hwang, June-Wen Lo, Chia-Hsin Liu,“Enhanced of Key Agreement Protocol Resistant to a Denial-of-Service Attack”, 2003網路與通訊技術發展與應用研討會, pp. 89-94, Taichung, Dec 25, 2003.
Min-Shiang Hwang, Jung-Wen Lo, Song-Kong Chong,“New Authentication Method for Wireless Communications”, 2003網路與通訊技術發展與應用研討會, pp. 105-113, Taichung, Dec 25, 2003.
張庭毅,謝東宏,黃明祥,“隱藏式附加日期電子現金”, 2003年電子商務經營管理研討會, 逢甲大學, pp. 465-470, Dec. 13, 2003.
蕭舒尹,林卿雅,林晶瑩,黃明祥,“Ma-Chen公開驗證鑑別加密法之攻擊”, 第九屆資訊管理暨實務研討會, 大葉大學, Dec. 13, 2003.
宋佩貞,黃麗錦,鄭國民,黃明祥,“用戶申裝ADSL滿意度之研究探討:以中華電信公司為例”, 第一屆流通與全球運籌論文研討會, 國立台中技術學院, Oct. 31, 2003.
曾祥峰,林晶瑩,林卿雅,趙雅雯,黃明祥,“有效的雙向驗證電子投票協定之研究”, 2003年台灣網際網路研討會(TANET), 國立政治大學, Oct. 29-31, 2003.
邱思齊,李健三,黃明祥,“消費者對無線網路產品接受意願之研究”, 2003年第二屆管理新思維學術研討會, 國立台灣科技大學, Nov. 7, 2003.
黃明祥,曾祥峰,楊昱宸,陳建宏,“架構於迷袋系統之認證加密系統機制研究及實作開發”, 2003年產學合作產業電子化研討會, 經濟部工業局, 台北國際會議中心, Oct. 3, 2003.
何俊德,白上勤,陳榮靜,黃明祥,“支援向量機應用於防止信用卡的盜刷”, 2003資訊管理技術與實務應用發展專題研討會, 新埔技術學院, Sep. 17, 2003.
黃明祥,林志偉,李佳芬,郭靜怡,“更具安全性的電子競標機制”, 2003 資訊管理技術與實務應用發展專題研討會, 新埔技術學院, Sep. 17, 2003.
江茂綸,蔡君聖,洪宗良,黃明祥,“資料探勘於客服中心之應用與研究─以手機維修為例”, 2003資訊管理技術與實務應用發展專題研討會, 新埔技術學院, Sep. 17, 2003.
曾祥峰,林志偉,陳星百,黃明祥,“線上軟體交易安全之研究”, 2003產業電子化運籌管理學術暨實務研討會, 逢甲大學, July 12, 2003.
楊宗裕,王仁群,林淑真,薛夙珍,黃明祥,“校園無線區域網路使用現況暨提昇使用率之研究探討”, 2003年管理思維與實務學術研討會, 銘傳大學, June 14, 2003.
黃明祥,楊政穎,劉家欣,“具彈性的樹狀金鑰管理系統”, 2003年資訊技術應用與發展研討會, 國立屏東商業技術學院, pp. 84-88, June 28, 2003.
劉曜彰,陳保孝,曾玉玓,黃明祥,“使用者介面與軟硬體支援度對Linux的接受程度之影響”, 第二屆資訊與管理應用研討會, 元培科學技術學院, pp.300-307, May 31, 2003.
李季哲,陳俊宏,黃渝臻,黃明祥,“首頁廣告型式吸引度之分析-以入口網站為例”, 第二屆資訊與管理應用研討會, 元培科學技術學院, pp. 66-76, May 31, 2003.
蔡宸玄,陳俊宇,蔡易呈,羅有隆,黃明祥,“電玩系所成立所帶來衝擊之探討”, 2003年產業管理創新研討會, 修平技術學院, May 16, 2003.
劉後欣,林文慶,黃建榮,林芳昌,黃明祥,“圖書館資訊系統的使用者滿意度之研究”,2003年管理創新與新願景研討會, 真理大學, pp. 22, May 16, 2003.
謝正嘉,林合成,陳榮靜,黃明祥,“客戶服務中心員工生涯錨探討-以中華電信行動通信公司臺中營運處為例”, 2003年管理創新與新願景研討會, 真理大學, pp. 37, May 16, 2003.
Min-Shiang Hwang, Chih-Wei Lin, Li-Chin Hwang,“An MQV Key Agreement Protocol for Establishing (n2+1) Keys”, 第十三屆全國資訊安全會議, May, 2003.
廖虹雲,林怡君,劉瓊雙,楊朝成,黃明祥,“透過動態資料探勘輔助教學決策”, 2003第七屆資訊管理學術暨警政資訊實務研討會, 中央警察大學, pp. 245-253, May 9, 2003.
賴美娟,林恆正,沈肇基,黃明祥,“系統版本更新之顧客滿意度相關因素研究”, 2003第七屆資訊管理學術暨警政資訊實務研討會,中央警察大學,pp. 396-403, May 9, 2003.
廖彩雲,周淑蓉,曾偉育,黃明祥,“商用車裝載量及即時資訊下動態車輛路徑選擇問題之研究”,第四屆管理學域學術研討會, 朝陽科技大學, pp. 219-232, May 6, 2003.
柳建良,洪志榮,陳靜婷,唐元亮,黃明祥,“網路同步教學之使用意願調查”,2003年全球化運籌管理學術研討會, 國立高雄海洋技術學院, May 16, 2003.
沈肇基,李俊達,黃明祥,“企業實施知識管理與競爭力提昇關連性之實例探討”,2003年全球化運籌管理學術研討會, 國立高雄海洋技術學院,May 16, 2003.
陳星琳,李金鳳,黃明祥,“電子市集的發展現況與未來趨勢”,第四屆電子化企業經營管理理論與實務研討會, 大葉大學, May 10, 2003.
陳宜惠,藍君琪,莊博允,呂瑞麟,廖彩雲,黃明祥,“協同設計與網路服務上的整合應用”,第四屆電子化企業經營管理理論與實務研討會, 大葉大學, May 10, 2003.
詹啟琳,吳志宏,黃如慧,李金鳳,李麗華,張簡尚偉,黃明祥,“理商托播成本為基礎,進行高效度網路廣告推薦之研究”,第四屆網際網路應用與發展學術研討會, 遠東技術學院, pp. 229-234, May 9, 2003.
謝依蓓,李政雄,沈肇基,薛夙珍,黃明祥,“行動式顧客關係管理之研究—以電信業者為例”,第四屆網際網路應用與發展學術研討會, 遠東技術學院, pp. 448-454, May 9, 2003.
Yuan-Liang Tang, Min-Shiang Hwang, Chun-Hung Chen, “Robust Image Authentication Based on Wavelet Transforms”, The 8th CSIM Conference on Information Management Research and Practice (CSIM 2002), (第八屆資訊管理研究暨實務研討會), Kaohsiung, Taiwan, pp. 1015-1022.
黃明祥,“確保檔案資訊安全,拓展檔案資訊加值運用 - 子議題一:推動電子檔案管理機制”,檔案管理策略研討會, 行政院研考會, Aug. 29-30, 2002, pp.2.1-2.9.
黃明祥,“確保檔案資訊安全,拓展檔案資訊加值運用 - 子議題二:建立檔案資訊安全機制”,檔案管理策略研討會, 行政院研考會, Aug. 29-30, 2002, pp.2.10-2.18.
黃明祥,“確保檔案資訊安全,拓展檔案資訊加值運用 - 子議題三:提升檔案目錄及全文資訊檢索效能”,檔案管理策略研討會, 行政院研考會, Aug. 29-30, 2002, pp.2.19-2.30.
黃明祥,李正吉,孫耀國,關華蓉,江岡旻,黎凡煒,陳志維,“分散式智慧財產權管理系統之電子檔案儲存機制”,第一屆數位典藏技術研討會, 中央研究院資訊科學研究所, July 25-26, 2002, pp.318-324.
楊朝成, 張庭毅, 李建緯, 黃明祥,“A New Authentication Scheme for Mobile IP Networks”, 2002 Symposium on Digital Life and Internet Technologies, Chen-Kung University, pp. 50, June 27-28, 2002.
黃明祥,何雪桃,李宗豪,林明玉,劉家欣,張瑞文,“網際網路安全交談系統”,九十一年朝陽資訊管理實務專題研討會, 朝陽科技大學資管系, May 7-11, 2002, pp.19-24.
黃明祥,劉信義,鄭懋樺,林家仁,蔡馥羽,黃曉玫,“智慧型題庫發展系統”,九十一年朝陽資訊管理實務專題研討會, 朝陽科技大學資管系, May 7-11, 2002, pp.13-18.
黃明祥,孫耀國,關華蓉,江岡旻,黎凡煒,陳志維,“電子檔案儲存安全認證系統”,九十一年朝陽資訊管理實務專題研討會, 朝陽科技大學資管系, May 7-11, 2002, pp.7-12.
黃明祥,盧怡真,陳惠君,陳曉婷,林慧瓊,賴美雯,“以下一代加密標準(AES)為基礎的網路書店”,九十一年朝陽資訊管理實務專題研討會, 朝陽科技大學資管系, May 7-11, 2002, pp.1-6.
黃明祥,陳世明, “整批驗證多重簽章錯誤偵測之研究”, 2002年第六屆資訊管理學術暨警政資訊實務研討會, 中央警察大學, pp. 230-234, May 10, 2002.
Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang,“A Nonrepudiable Threshold Multi-Proxy Multi-Signature Scheme with Shared Verification”, Proceedings of National Information Security Conference 2002, Taichung, May 2002.
黃明祥,陳曉萍,“二維檢查法之多層次資料庫”, e世紀的挑戰國際學術研討會, 銘傳大學, March 23, 2002.
黃明祥,林詠章,李正吉,“電子檔案認證與安全管理”, 數位時代檔案管理研討會, pp.190-206, Taipei, Nov. 30, 2001.
黃明祥,賴彥池,“可驗證錯誤之批次簽章驗證法”, 2001年資訊管理學術暨實務研討會, pp.271-273, June 8, 2001.
Ching-Yung Liu and Min-Shiang Hwang,“ADSL網路之服務調訂技術及應用”, 2001 Annual Conference of the National Defense Integrated Logistics Support, Taipei, May 29, 2001.
黃明祥,王威澤,張益峰,蕭雅齡,楊舒雯,白芳怡,“以XML/EDI為基礎的安全性電子商務系統”, 九十年朝陽資訊管理實務專題研討會, pp.214-219, Taichung, May 8, 2001.
Ching-Yung Liu and Min-Shiang Hwang,“A Lightweight ATM Security Service Mechanism”, Proceedings of National Information Security Conference 2001, Cheng-Kung University, May 2001, pp. 39-45.
唐元亮,蔡中瑋,黃明祥,“電子影像完整性之偵測技術”, 第二屆管理學域學術研討會, pp.177-182, Taichung, May 8, 2001.
Hsia-Hung Ou, Min-Shiang Hwang, Li-Hua Li,“以類神經網路為基礎之使用者認證系統”, 中華民國第八屆模糊理論及其應用會議, Dec.1-2, 2000, Taipei, pp. 89.
Min-Shiang Hwang, Hsia-Hung Ou, S. Wesley Changchien,“安全的行動代理程式傳輸協定(A Secure Mobile Agent Protocol)”, Proceedings of the Fifth Symposium on Computer & Communication Technology, Oct. 2000, Da Yeh University, pp. 3C25-3C29.
Min-Shiang Hwang, Yuan-Liang Tang, Cheng-Chi Lee,“An Efficient Authentication Protocol for GSM Networks”, EuroComm'2000, Munich, Germany, pp.326-329, May 2000.
Min-Shiang Hwang, Cheng-Yeh Shiu, and Chao-Chen Yang,“An Authentication Scheme for Mobile Satellite Communication Systems”, Proceedings of National Information Security Conference 2000, Dong-Hwa University, May 2000, pp. 428-439.
黃明祥,林妙琦,林廷隆,劉俞青,林淑麗,陳元泰,“社區網路系統”, 八十九年朝陽資訊管理實務專題研討會, pp.139-144, Taichung, May 9, 2000.
黃明祥,姚吉峰,黃祥德,林律菁,吳忠傑,李華洋,“防火牆與電腦病毒防疫系統”, 八十九年朝陽資訊管理實務專題研討會, pp.145-150, Taichung, May 9, 2000.
Min-Shiang Hwang, Yuan-Liang Tang, Cheng-Chi Lee,“A New Protocol Using Time-stamp for Mobile Network Authentication and Security”, The 6th Mobile Computing Workshop, Providence University, pp. 61-65, Mar. 24, 2000.
Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee,“A Key Authentication Scheme for Non-repudiation”, 1999 National Computer Symposium (NCS'99), Taipei, pp. C.215-C.218, Dec. 1999.
Ching-Rong Yang, Min-Shiang Hwang, Yuan-Liang Tang,“偵測影像的被破壞點之研究--縱橫偵測法”, Eighth National Conference on Science and Technology of National Defense, Tao-Yuan, Nov. 1999.
Min-Shiang Hwang, Iuon-Chung Lin, and Kuo-Feng Hwang,“Cryptanalysis and Improvement of LITESET”, Proceedings of 1999 Workshop on Distributed System Technologies & Applications, pp. 35-42, Chen-Kung University, ROC. May 13-14, 1999.
Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang,“New Application of Phone Card and Its Authentication in Wireless Communications”, Proceedings of National Information Security Conference 1997, Taipei, May 1997, pp.83-88.
Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang,“Privacy and Authentication in GSM System”, Proceedings of National Information Security Conference 1996, Taichung, May 1996, pp.188-196.
Chii-Yuan Hwang, Kuen-Fang Jea, and Min-Shiang Hwang,“New Access Control Methods Using Compression Techniques”, Proceedings of National Information Security Conference 1996, Taichung, May 1996, pp.107-114.
Min-Shiang Hwang and Wei-Pang Yang,“A New Service for Digital Mobile Communications”, IEEE APCCAS'94, Taipei, December 1994.
Min-Shiang Hwang and Wei-Pang Yang,“Authenticating Multicast Electronic Documents”, International Symposium on Environmental Information Management and EDI, Taipei, December 1994.
Min-Shiang Hwang and Wei-Pang Yang,“Privacy and Authentication for Mobile Communications”, Intelligent Network Technology Conference INTC'94, Taipei, October 1994, pp.380-390.
Wei-Pang Yang, Min-Shiang Hwang, and Chin-Lieh Lee,“A Cryptographic Key Assignment Scheme for Access Control in Partially-Ordered Hierarchies”, Proceedings of the Third Conference on Information Security, May 1993, pp.A.2-2.1--A.2-2.13.

編書/著書(Books or Chapters)
謝俊雄,黃明祥等九位, “食品工廠經營管理”, 2008, 華格那出版.
黃明祥,林詠章, “資訊與網路安全”, 第二版, 2007, McGraw-Hill出版(第一版,2005).
網路安全理論與實務(教育部通訊科技改進計畫初審通過補助/預訂2004年6月出版).
當代網路安全(教育部通訊科技改進計畫初審通過補助/預訂2004年底出版).
Min-hiang Hwang, Wen-Guey Tzeng, “A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy”, Lecture Notes in Computer Science, The International Conference on Information Networking (ICOIN’2003), Korea, pp. 742-746, Feb. 12-14, 2003 (Lecture Notes in Computer Science, vol. 2662, pp. 757-761, Springer, 2003).
黃明祥, “資料庫安全”, 資通安全專輯之四:系統安全(主編:王旭正教授), Chap. 6, pp. 284-310, Dec. 2002.
黃明祥, “金鑰管理”, 資通安全專輯之二:資通安全概論(主編:張真誠教授), pp. 63-67, Dec. 2002.
黃明祥, “資料庫安全”, 資通安全專輯之二:資通安全概論(主編:張真誠教授), pp. 60-63, Dec. 2002.
Chou-Chen Yang, Chien-Wei Lee, Ting-Yi Chang, Min-hiang Hwang, “A Solution to Mobile IP Registration for AAA”, Lecture Notes in Computer Science, The 7th CDMA International Conference Proceeding, Vol. 2, pp. 417-421, Oct. 2002.
Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang, “Two Simple Batch Verifying Multiple Digital Signatures”, Lecture Notes in Computer Science (S. Qing and T. Okamoto, eds.), The Third International Conference on Information and Communications Security, ICICS 2001, Xian, China, Nov. 13-16, 2001.
Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, “Phone card application and authentication in wireless communications”, IFIP World Conference on Mobile Communications, Australia, Sep. 1996, pp.323-329.
當代資料庫安全(預計2002年底出版)
Advances in Information Security(近年來之研究成果彙編成冊,1999).
博士論文:A Study on Cryptography-Based Database Security(Jan. 1995).
碩士論文:A Natural Language Discourse Model to Explain Dialogue Module in Decision Support System (June 1998).
短篇小說:落花殘夢

雜誌文章
Min-Shiang Hwang, "淺談企業資訊網(Intranet)", InfoNet (朝陽資管系學會), 1996.

專利(Patents)
張真誠、黃明祥、黃國峰,「具強韌性之多媒體數位浮水印技術」,中華民國專利,TW00451170,自中華民國九十年八月一日至一零八年七月十八日止。
張真誠、黃國峰、黃明祥,「植基於類神經網路之數位浮水印技術」,中華民國專利,發明第145485號,自中華民國九十一年十月二十日至一零九年七月十八日止。
Tung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang, "Cryptosystem for Encrypting Digital Image or Voice File", United States Patent, Patent Number: 6,023,511, Feb. 8, 2000.
張真誠、黃明祥、黃國峰,「特徵導向式多媒體數位浮水印技術」,中華民國專利,發明第140057號,自中華民國九十年八月一日至一零八年七月十八日止。
張真誠、黃明祥、陳國倫,「具雙重驗證功能之端對端無線通訊安全協定」,中華民國專利,中華民國專利,發明第140313號,自中華民國九十年八月一日至一零八年七月十八日止。
陳同孝、張真誠、黃明祥,「用於數位影像檔或數位聲音檔之加密裝置」,中華民國專利,發明第103202號,自中華民國八十八年五月十一日至一零六年十一月二十七日止。