Publications in Cryptography  [Other Topics]

 

1. Related Papers of “Cryptography” in International Journal of Network Security [IJNS-Cry].

 

1. Shu-Fen Chiou, Min-Shiang Hwang, Song-Kong Chong, "A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS", International Journal of Advancements in Computing Technology (IJACT), vol. 4, no. 19, pp. 529-535, Oct. 2012. (EI)   P223.pdf

2.Ting-Yi Chang, Min-Shiang Hwang, Wei-Pang Yang, Kuo-Cheng Tsou, "A Modified Ohta-Okamoto Digital Signature for Batch Verification and Its Multi-Signature Version", International Journal of Engineering and Industries (IJEI), vol. 3, no. 3, pp. 75-83, Sep. 2012. (EI)  P210.pdf

3.  Cheng-Chi Lee, Min-Shiang Hwang and I-En Liao, “On the Security of Self-Certified Public Keys”, International Journal of Information Security and Privacy, vol. 5, no. 2, pp. 55-62, Apr. 2011.  P084.ps  P084.pdf

4.  Ting-Yi Chang and Min-Shiang Hwang, Wei-Pang Yang "An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem", Information Technology and Control, vol.40, No.3, PP. 246-251, 2011. (SCIE) P130.ps  P130.pdf

5.  Cheng-Chi Lee, Tzu-Chun Lin, Shiang-Feng Tzeng and Min-Shiang Hwang, “Generalization of Proxy Signature Based on Factorization”, International Journal of Innovative Computing, Information and Control, vol. 7, no. 3, pp. 1039-1054, Mar. 2011. (SCI)  P143.ps  P143.pdf

6.  Shiang-Feng Tzeng, Cheng-Chi Lee, and Min-Shiang Hwang, “A Batch Verification for Multiple Proxy Signature”, Parallel Processing Letters, vol. 21, no. 1, pp. 77-84, March 2011. (EI)  P128.ps  P128.pdf

7.  Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu, "An Efficient Key Assignment Scheme for Access Control in a Class Hierarchy”, Information Sciences, vol. 181, no. 4, pp. 917-925, Feb. 2011. (SCIE)  P170.ps  P170.pdf

8.  Chun-Ta Li and Min-Shiang Hwang, Shih-Ming Chen, “A Batch Verifying and Detecting the Illegal Signatures”, International Journal of Innovative Computing, Information and Control, vol. 6, no. 12, pp. 5311-5320, Dec. 2010. (SCI)  P245.ps  P245.pdf

9.  Cheng-Chi Lee, Ting-Yi Chang, Min-Shiang Hwang, “A New Group Signature Scheme Based on the Discrete Logarithm”, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 54-57, 2010.  P112.ps  P112.pdf

10.    Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng, "A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem", International Journal of Foundations of Computer Science, Vol. 20, Iss. 2, pp. 351-359, 2009. (SCI)  P161.ps  P161.pdf

11. Min-Shiang Hwang, Shiang-Feng Tzeng and Shu-Fen Chiou, "A Non-repudiable Multi-Proxy Multi-Signature Scheme", Innovative Computing, Information and Control Express Letters, Vol.3, No.3, pp. 259-264, September 2009.  P119.ps  P119.pdf

12. Song Han, Elizabeth Chang, Tharam Dillon, Min-Shiang Hwang, and Cheng-Chi Lee, "Identifying Attributes and Insecurity of A Public-channel Key Exchange Protocol Using Chaos Synchronization", Chaos Solitons & Fractals, Volume 40, Issue 5, Pages 2569-2575, June 2009,  (SCI)  P300.pdf

13. Cheng-Chi Lee, Min-Shiang Hwang, Shu-Yin Hsiao, "A Fair Non-transfer Exchange Protocol", International Journal of Electrical and Computer Engineering, vol. 4, no. 14, pp. 879-885, 2009. (EI)   P220.ps  P220.pdf

14. Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, "A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm", International Journal of Applied Mathematics and Computer Sciences, Volume 5, Issue 1, pp. 33-38, 2009.  P123.ps  P123.pdf

15. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments”, Computer Communications, Vol. 31, no. 18, pp. 4255-4258, Dec. 2008. (SCI)  P219.ps   P219.pdf

16. Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong and Jung-Wen Lo, “A Key Management for Wireless Communications”, International Journal of Innovative Computing, Information and Control, Vol. 4, No. 8, pp. 2045-2056, August 2008. (SCI)  P202.ps  P202.pdf

17. Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang, "A New Convertible Authenticated Encryption Scheme with Message Linkages", Computers and Electrical Engineering, vol. 33, no. 2, pp. 133-138, Mar. 2007. [SCI]  P160.ps  P160.pdf

18. Min-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, "Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows", IEICE Transactions on Information and Systems, vol. E89-D, no. 4, pp. 1575-1577, 2006. [SCI]  P198.ps  P198.pdf

19. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, "Security Enhancement on a New Authentication Scheme with Anonymity For Wireless Environments", IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683-1687, Oct. 2006. [SCI]  P261.ps  P261.pdf

20. Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures", Applied Mathematics and Computation, vol. 172, no. 2, pp. 1195-1200, Jan. 2006. [SCI]  P131.ps  P131.pdf

21. Min-Shiang Hwang and Ting-Yi Chang, "Threshold Signatures: Current Status and Key Issues", International Journal of Network Security, vol. 1, no. 3, pp. 123-137, Nov. 2005.  P269.pdf

22. Min Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, and Chao-Chen Yang, "A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography", Telecommunication Systems, vol. 29, no. 3, pp. 165-180, 2005. [SCI]  P145.ps  P145.pdf

23.    Min-Shiang Hwang and Chi-Yu Liu, "Authenticated Encryption Schemes: Current Status and Key Issues", International Journal of Network Security, vol. 1, no. 2, pp. 61-73, Sept. 2005.  P271.ps   P271pdf

24.    Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Improvement on the Flexible Tree-Based Key Management Framework", Computers & Security, vol. 24, pp. 500-504, 2005. [SCI]   P214.ps   P214.pdf

25.    Cheng-Chi Lee, Ting-Yi Chang, Min-Shiang Hwang, "A Simple Broadcasting Cryptosystem in Computer Networks Using Exclusive-OR", International Journal of Computer Applications in Technology, vol. 24, no. 3, pp. 180-183, 2005. [EI]  P219.ps  P219.pdf

26.    Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang, "Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys", Applied Mathematics and Computation, vol. 166, no. 1, pp. 118-122, July 2005. [SCI]  P181.ps   P181.pdf

27.    Min-Shiang Hwang and Cheng-Chi Lee, "Research Issues and Challenges for Multiple Digital Signatures", International Journal of Network Security, vol. 1, no. 1, pp. 1-7, July 2005.  P270.ps   P270.pdf

28.    Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Yang, "A New Blind Signature Based on the Discrete Logarithm Problem for Untraceability", Applied Mathematics and Computation, Vol. 164, no. 3, pp. 837-841, May 2005. [SCI]  P023.ps   P023.pdf

29.    Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, "An Improvement on the Lin-Wu (t, n) Threshold Verifiable Multi-secret Sharing Scheme", Applied Mathematics and Computation, Vol 163, no. 1, pp 169-178, 2005. [SCI]  P138.ps   P138.pdf

30.    Eric Jui-Lin Lu, Min-Shiang Hwang, and Cheng-Jian Huang, "A New Proxy Signature Scheme with Revocation", Applied Mathematics and Computation, Vol. 161, No. 3, PP. 799-806, Feb. 2005.   P255.pdf

31.    Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang, "Improvement of Signature Scheme Based on Factoring and Discrete Logarithms", Applied Mathematics and Computation, Vol. 161, no. 1, pp. 49-54, Feb. 2005. [SCI]  P159.ps   P159.pdf 

32.    Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, “A New Multi-stage Secret Sharing Scheme Using One-way Function”, ACM Operating Systems Review, vol. 39, no. 1, pp. 48-55, Jan. 2005. [EI]  P111.ps   P111.pdf

33.    Ting-Yi Chang, Min-Shiang Hwang, Wei-Pang Yang, "Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System without Using a One-way Hash Function", Information & Security: An International Journal, Vol. 15, No. 1, pp. 110-114, 2004.  P152.ps   P152.pdf

34.    Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang, "On the Efficiency of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", The Journal of Systems and Software, vol. 73, no. 3, pp. 507-514, Nov. 2004. [SCI]   P117.ps   P117.pdf

35.    Min-Shiang Hwang, Jung-Wen Lo, Shu-Chen Lin, "An Efficient User Identification Scheme Based on ID-based Cryptosystem", Computer Standards & Interfaces, vol. 26, no. 6, pp.565-569, Oct. 2004. [SCI]  P206.ps   p206.pdf

36.    Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang, “Cryptanalysis of an Efficient Secure Group Signature Scheme”, ACM Operating Systems Review, vol. 38, no. 4, pp. 67-69, Oct. 2004. [EI]  P218.ps   P218.pdf

37.    Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "Cryptanalysis of Simple Authenticated Key Agreement Protocols", IEICE Transactions on Foundations, vol. E87-A, no. 8, pp. 2174-2176, Aug. 2004. [SCI]  P167.ps   P167.pdf

38.    Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "A Threshold Signature Scheme for Group Communications without a Shared Distribution Center", Future Generation Computer Systems, vol. 20, no. 6, pp. 1013-1021, Aug. 2004. [SCI]   P146.ps   P146.pdf

39.    Chwei-Shyong Tsai, Min-Shiang Hwang, Pei-Chen Sung, "Blind Signature Scheme Based on Elliptic Curve Cryptography", Journal of Computer Society of India, vol. 34, no. 3, pp. 58-60, July 2004. [EI]  P191.pdf

40.    Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, "A New Anonymous Channel Protocol in Wireless Communications", International Journal of Electronics and Communications, vol. 58, pp. 218-222, 2004. [SCI]  P171.ps   P171.pdf

41.    Chou-Chen Yang, Jian-Wei Li, Min-Shiang Hwang, "A New Mutual Authentication and Key Exchange Protocol with Balanced Computational Power for Wireless Settings", European Transactions on Telecommunications, vol. 15, no. 2, pp. 91-99, 2004. [SCI]  P141.ps   P141.pdf

42.    Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack", Fundamenta Informaticae, vol. 61, no. 3, pp. 389-398, July 2004. [SCI]  P200.ps   P200.pdf

43.    Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee, “A Key Authentication Scheme With Non-repudiation”, ACM Operating Systems Review, vol. 38, no. 3, pp. 75-78, July. 2004. [EI]  P031.ps   P031.pdf

44.    Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "Cryptanalysis of Publicly Verifiable Authenticated Encryption", IEICE Transactions on Foundations, vol. E87-A, no. 6, pp. 1645-1646, June 2004. [SCI]  P194.ps   P194.pdf

45.    Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A Nonrepudiable Threshold Multi-Proxy Multi-Signature Scheme with Shared Verification", Future Generation Computer Systems, vol. 20, no. 5, PP. 887-893, June 2004. [SCI]  P122.ps   P122.pdf

46.    Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "Threshold Untraceable Signature for Group Communications", IEE Proceedings – Communications, vol. 151, no. 2, pp. 179-184, April 2004. [SCI] P069.ps P069.pdf

47.    Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang, "An Improvement of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", Computers & Security, vol. 23, no. 2, pp. 174-178, April 2004. [SCI]  P132.ps   P132.pdf

48.    Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, “A Server-Assissted Authentication Protocol for Detecting Error Vectors”, ACM Operating Systems Review, vol. 38, no. 2, pp. 93-96, Apr. 2004. [EI]  P113.ps  P113.pdf

49.    Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A (t,n) Multi-secret Sharing Scheme", Applied Mathematics and Computation, Vol. 151, No. 2 , pp. 483-490, April 2004. [SCI]  P120.ps   P120.pdf

50.    Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong Tsai, "Generalization of Proxy Signature Based on Elliptic Curves", Computer Standards & Interfaces, vol. 26, no. 2, pp. 73-84, March 2004. [SCI]  P149.ps   P149.pdf

51.    Shiang-Feng Tzeng, Min-Shiang Hwang, "Digital Signature with Message Recovery and Its Variants Based on Elliptic Curve Discrete Logarithm Problem", Computer Standards & Interfaces, vol. 26, no. 2, pp. 61-71, March 2004. [SCI]  P162.ps   P162.pdf

52.    Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A New Digital Signature Scheme Based on Factoring and Discrete Logarithms", International Journal of Computer Mathematics, vol. 81, no. 1, pp. 9-14, 2004. [SCI]  P127.pdf

53.    Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on RSA-Based Partially Signature with Low Computation", Applied Mathematics and Computation, vol. 145, no. 2-3, pp. 465-468, Dec. 2003. [SCI]  P106.ps  P106.pdf

54.    Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin, "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem", IEEE Transactions on Knowledge and Data Engineering, vol. 15. no. 6, pp. 1552-1560, Nov./Dec. 2003. [SCI]  P049.ps   P049.pdf  

55.    Shin-Jia Hwang, Min-Shiang Hwang, Shiang-Feng Tzeng, "A New Digital Multisignature Scheme with Distinguished Signing Authorities", Journal of Information Science and Engineering, vol. 19, no. 5, pp. 881-887, Sep. 2003. [SCI]  P107.pdf

56.    Min-Shiang Hwang, Wei-Pang Yang, "Controlling Access in Large Partially-Ordered Hierarchies Using Cryptographic Keys", The Journal of Systems and Software, vol. 67, no. 2, pp. 99-107, Aug. 2003. [SCI]  P005.ps   P005.pdf

57.    Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang, “Improved Non-repudiable Threshold Proxy Signature Scheme with Known Signers”, Informatica, vol. 14, no. 3, pp. 393-402, 2003. [SCI]  P155.ps  P155.pdf

58.    Cheng-Chi Lee, Min-Shiang Hwang, Li-Hua Li, "A New Key Authentication Scheme Based on Discrete Logarithms", Applied Mathematics and Computation, vol. 139, no. 2, pp. 343-349, July 2003. [SCI]  P035.ps  P035.pdf

59.    Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "An Untraceable Blind Signature Scheme", IEICE Transactions on Foundations, vol. E86-A, no. 7, pp. 1902-1906, July 2003. [SCI]  P108.ps  P108.pdf

60.    Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang, "Generalization of Proxy Signature Based on Discrete Logarithms", Computers & Security, Vol. 22, No. 3, pp. 245-255, 2003. [SCI]  P147.ps  P147.pdf

61.    Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "Untractable Blind Signature Schemes Based on Discrete Logarithm Problem", Fundamenta Informaticae, Vol. 55, Issue 3-4, pp. 307-320, June 2003. [SCI] (ISSN:0169-2968)  P115.ps   P115.pdf

62.    Iuon-Chung Lin, Min-Shiang Hwang, Chin-Chen Chang, "A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy", Future Generation Computer Systems, Vol. 19, no. 4, pp 457-462, May 2003. [SCI]  P018.ps  P018.pdf

63.    Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A New Anonymous Conference Key Distribution System Based on the Elliptic Curve Discrete Logarithm Problem", Computer Standards and Interfaces, Vol 25, No. 2, pp 141-145, May 2003. [SCI]  P156.ps  P156.pdf

64.    Eric Jui-Lin Lu, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis of Some Authenticated Key Agreement Protocols", International Journal of Computational and Numerical Analysis and Applications, Vol. 3, no. 2, pp. 151-157, Apr. 2003.  P092.ps  P092.pdf

65.    Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, Min-Shiang Hwang, "Simple Generalized Group-oriented Cryptosystems Using ElGamal Cryptosystem", Informatica, vol. 14, no. 1, pp. 111-120, 2003. [SCI] (ISSN:0868-4952)  P151.ps  P151.pdf

66.    Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on Stadler et al.'s Fair Blind Signature Scheme", IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences, Vol. E86-A, no. 2, pp. 513-514, Feb. 2003. [SCI]  P102.ps  P102.pdf

67.    Min-Shiang Hwang, Wei-Pang Yang, "An Authentication Protocol for Multicast Communications", Pakistan Journal of Applied Sciences, vol. 2, no. 12, pp. 1082-1083, Dec. 2002.  P030.ps  P030.pdf

68.    Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang, "Cryptanalysis of the Hwang-Shi Proxy Signature Scheme", Fundamenta Informaticae, Vol. 53, No. 2, pp. 131-134, Nov. 2002. (SCI)  P099.ps  P099.pdf

69.    Min-Shiang Hwang, Chih-Wei Lin, Cheng-Chi Lee, "Improved Yen-Joye's Authenticated Multiple-key Agreement Protocol", IEE Electronics Letters, vol. 38, no. 23, pp. 1429-1431, Nov. 2002. [SCI]  P121.ps   P121.pdf

70.    Min-Shiang Hwang, S. Wesley Changchien, Cheng-Chi Lee, "A New Method to Strengthen Ciphers", International Journal of Pure and Applied Mathematics, vol. 3, no. 2, pp. 187-192, 2002.  P021.ps  P021.pdf

71.    S. Wesley Changchien, Min-Shiang Hwang, "A Batch Verifying and Detecting Multiple RSA Digital Signatures", International Journal of Computational and Numerical Analysis and Applications, vol. 2, no. 3, pp. 303-307, Oct. 2002.  P050.ps  P050.pdf

72.    Min-Shiang Hwang, Chao-Chen Yang, Shiang-Feng Tzeng, "Improved Digital Signature Scheme Based on Factoring and Discrete Logarithms", Journal of Discrete Mathematical Sciences & Cryptography, vol. 5, no. 2, pp. 151-155, Aug. 2002.  P052.ps  P052.pdf

73.    Min-Shiang Hwang, Cheng-Chi Lee, Ting-Yi Chang, "Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines", Journal of Information Science and Engineering, Vol. 18, No. 3, pp. 373-379, May 2002. [SCI]  P027.ps  P027.pdf

74.    Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on Low-Computation Partially Blind Signatures for Electronic Cash", IEICE Fundamentals on Electronics, Communications and Computer Sciences, vol. E85-A, No. 5, pp. 1181-1182, May 2002. [SCI]  P105.ps  P105.pdf

75.    Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An Improved Authentication Protocol Without Trusted Third Party", International Journal of Computational and Numerical Analysis and Applications, vol. 1, no. 4, pp. 407-412, April 2002.  P042.ps  P042.pdf

76.    Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An ElGamal-like Cryptosystem For Enciphering Large Messages", IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 2, pp. 445-446, March/April 2002. [SCI]  P045.ps   P045.pdf  

77.    Eric Jui-Lin Lu, Min-Shiang Hwang, "An Improvement of a Simple Authenticated Key Agreement Algorithm", Pakistan Journal of Applied Sciences, Vol. 2, no. 1, pp. 64-65, Jan. 2002. P071.ps   P071.pdf

78.    Min-Shiang Hwang, Cheng-Chi Lee, Eric Jui-Lin Lu, "Cryptanalysis of the Batch Verifying Multiple DSA-type Digital Signatures", Pakistan Journal of Applied Sciences, vol. 1, no. 3, pp. 287-288, July 2001. P090.ps   P090.pdf

79. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An Efficient Threshold Decryption Scheme without Session Keys", Computers & Electrical Engineering, vol. 27, no. 1, pp. 29-35, Nov. 2000. [SCI]  P043.ps   P043.pdf

80.    Min-Shiang Hwang, "A New Redundancy Reducing Cipher", Informatica, vol. 11, no. 4, pp. 435-440, Oct. 2000. [SCI]  P025.ps   P025.pdf

81. Min-Shiang Hwang, "An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Totally-Ordered Hierarchies", International Journal of Computer Mathematics, vol. 73, no. 4, pp. 463-468, Oct. 2000. [SCI]  P004.ps   P004.pdf

82. Min-Shiang Hwang, Iuon-Chung Lin, Eric Jui-Lin Lu, "A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", Informatica, vol. 11, no. 2, pp. 137-144, Apr. 2000. [SCI]  P068.ps   P068.pdf

83. Min-Shiang Hwang, "Cryptanalysis of YCN Key Assignment Scheme in a Hierarchy", Information Processing Letters, vol. 73, no. 3, pp. 97-101, Feb. 2000. [SCI]  P055.ps   P055.pdf

84. Min-Shiang Hwang, Kuo-Feng Hwang, Iuon-Chung Lin, "Cryptanalysis of The Batch Verifying Multiple RSA Digital Signatures", Informatica, vol. 11, no. 1, pp. 1-4, Jan. 2000. [SCI]  P053.ps   P053.pdf

85. Min-Shiang Hwang, “Dynamic Participation in a Secure Conference Scheme for Mobile Communications”, IEEE Transactions on Vehicular Technology, vol. 48, no. 5, pp. 1469-1474, Sep. 1999. [SCI]  P029.pdf

86. Min-Shiang Hwang, "A New Dynamic Cryptographic Key Generation Scheme for a Hierarchy", Nordic Journal of Computing, vol. 6, no. 4, pp. 363-371, Aug. 1999. P009.ps   P009.pdf

87.    Min-Shiang Hwang, “Extension of CHW Cryptographic Key Assignment Scheme in a Hierarchy”, IEE Proceedings Computers and Digital Techniques, vol. 146, no. 4, pp. 219, July 1999. [SCI]  P054.ps   P054.pdf

88.    Min-Shiang Hwang, “An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E82-A, No.3, pp.548-550, March 1999. [SCI]  P044.ps   P044.pdf

89.    Min-Shiang Hwang, “An Improvement of a Dynamic Cryptographic Key Assignment Schemes in a Tree Hierarchy”, Computers Mathematics with Applications, vol.37, no.3, pp.19-22, Feb. 1999. [SCI] P014.ps   P014.pdf

90. Min-Shiang Hwang, “A Cryptographic Key Assignment Scheme in a Hierarchy for Access Control”, Mathematical and Computer Modeling, Vo1.26, No2, pp.27-31, June 25, 1997. [SCI]  P016.ps   P016.pdf

91. Chin-Chen Chang, Min-Shiang Hwang, “Parallel Computation of the Generating Keys for RSA Cryptosystems”, IEE Electronics Letters, vo1. 32, no. 15, July 1996, pp. 1365-1366. [SCI]  P036.ps   P036.pdf