Publications in Cryptography
[Other Topics]
1. Related Papers of “Cryptography” in International Journal of Network Security [IJNS-Cry].
1. Shu-Fen Chiou, Min-Shiang Hwang, Song-Kong Chong, "A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS", International Journal of Advancements in Computing Technology (IJACT), vol. 4, no. 19, pp. 529-535, Oct. 2012. (EI) P223.pdf
2.Ting-Yi
Chang, Min-Shiang Hwang, Wei-Pang Yang, Kuo-Cheng Tsou, "A Modified
Ohta-Okamoto Digital Signature for Batch Verification and Its Multi-Signature
Version", International Journal of Engineering and Industries (IJEI), vol.
3, no. 3, pp. 75-83, Sep. 2012. (EI) P210.pdf
3. Cheng-Chi Lee, Min-Shiang Hwang and I-En Liao, “On the Security of Self-Certified Public Keys”, International Journal of Information Security and Privacy, vol. 5, no. 2, pp. 55-62, Apr. 2011. P084.ps P084.pdf
4. Ting-Yi
Chang and Min-Shiang Hwang, Wei-Pang Yang "An
Improved Multi-stage Secret Sharing Scheme Based on the Factorization
Problem", Information Technology and Control, vol.40, No.3, PP. 246-251,
2011. (SCIE) P130.ps P130.pdf
5. Cheng-Chi
Lee, Tzu-Chun Lin, Shiang-Feng Tzeng and Min-Shiang Hwang, “Generalization
of Proxy Signature Based on Factorization”, International Journal of Innovative
Computing, Information and Control, vol. 7, no. 3, pp. 1039-1054, Mar. 2011.
(SCI) P143.ps P143.pdf
6. Shiang-Feng
Tzeng, Cheng-Chi Lee, and Min-Shiang Hwang, “A Batch Verification for Multiple
Proxy Signature”, Parallel Processing Letters, vol. 21,
no. 1, pp. 77-84, March 2011. (EI) P128.ps P128.pdf
7. Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu, "An Efficient Key
Assignment Scheme for Access Control in a Class Hierarchy”, Information
Sciences, vol. 181, no. 4, pp. 917-925, Feb. 2011. (SCIE) P170.ps P170.pdf
8. Chun-Ta Li and Min-Shiang Hwang, Shih-Ming Chen, “A Batch Verifying and Detecting the Illegal Signatures”, International Journal of Innovative Computing, Information and Control, vol. 6, no. 12, pp. 5311-5320, Dec. 2010. (SCI) P245.ps P245.pdf
9. Cheng-Chi Lee, Ting-Yi Chang, Min-Shiang Hwang, “A New Group Signature Scheme Based on the Discrete Logarithm”, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 54-57, 2010. P112.ps P112.pdf
10.
Cheng-Chi Lee,
Min-Shiang Hwang, Shiang-Feng Tzeng, "A New Convertible
Authenticated Encryption Scheme Based on the ElGamal Cryptosystem",
International Journal of Foundations of Computer Science, Vol. 20, Iss. 2,
pp. 351-359, 2009. (SCI) P161.ps P161.pdf
11. Min-Shiang Hwang, Shiang-Feng
Tzeng and Shu-Fen Chiou, "A Non-repudiable Multi-Proxy Multi-Signature
Scheme", Innovative Computing, Information and Control Express Letters,
Vol.3, No.3, pp. 259-264, September 2009.
P119.ps P119.pdf
12. Song Han, Elizabeth Chang,
Tharam Dillon, Min-Shiang Hwang, and Cheng-Chi Lee, "Identifying
Attributes and Insecurity of A Public-channel Key Exchange Protocol Using Chaos
Synchronization", Chaos Solitons & Fractals, Volume 40, Issue 5, Pages
2569-2575, June 2009, (SCI) P300.pdf
13. Cheng-Chi Lee, Min-Shiang
Hwang, Shu-Yin Hsiao, "A Fair Non-transfer Exchange Protocol",
International Journal of Electrical and Computer Engineering, vol. 4, no. 14,
pp. 879-885, 2009. (EI) P220.ps P220.pdf
14. Min-Shiang Hwang, Cheng-Chi
Lee, Shiang-Feng Tzeng, "A New Knapsack Public-Key Cryptosystem Based on
Permutation Combination Algorithm", International Journal of Applied
Mathematics and Computer Sciences, Volume 5, Issue 1, pp. 33-38, 2009. P123.ps P123.pdf
15. Chun-Ta Li, Min-Shiang Hwang,
Yen-Ping Chu, “Further Improvement on A Novel Privacy Preserving Authentication
and Access Control Scheme for Pervasive Computing Environments”, Computer
Communications, Vol. 31, no. 18, pp. 4255-4258, Dec. 2008. (SCI) P219.ps P219.pdf
16. Min-Shiang Hwang, Cheng-Chi
Lee, Song-Kong Chong and Jung-Wen Lo, “A Key Management for Wireless
Communications”, International Journal of Innovative Computing, Information and
Control, Vol. 4, No. 8, pp. 2045-2056, August 2008. (SCI) P202.ps P202.pdf
17. Shiang-Feng Tzeng, Yuan-Liang
Tang, Min-Shiang Hwang, "A New Convertible Authenticated Encryption Scheme
with Message Linkages", Computers and Electrical Engineering, vol. 33, no.
2, pp. 133-138, Mar. 2007. [SCI] P160.ps P160.pdf
18. Min-Shiang Hwang, Jung-Wen Lo,
Shu-Yin Hsiao, "Improvement of Authenticated Encryption Schemes with
Message Linkages for Message Flows", IEICE Transactions on Information and
Systems, vol. E89-D, no. 4, pp. 1575-1577, 2006. [SCI] P198.ps P198.pdf
19. Cheng-Chi Lee, Min-Shiang
Hwang, I-En Liao, "Security Enhancement on a New Authentication Scheme
with Anonymity For Wireless Environments", IEEE Transactions on Industrial
Electronics, vol. 53, no. 5, pp. 1683-1687, Oct. 2006. [SCI] P261.ps P261.pdf
20. Feng Bao, Cheng-Chi Lee,
Min-Shiang Hwang, "Cryptanalysis and Improvement on Batch Verifying
Multiple RSA Digital Signatures", Applied Mathematics and Computation,
vol. 172, no. 2, pp. 1195-1200, Jan. 2006. [SCI] P131.ps P131.pdf
21. Min-Shiang Hwang and Ting-Yi
Chang, "Threshold Signatures: Current Status and Key Issues",
International Journal of Network Security, vol. 1, no. 3, pp. 123-137, Nov.
2005. P269.pdf
22. Min Shiang Hwang, Cheng-Chi
Lee, Ji-Zhe Lee, and Chao-Chen Yang, "A Secure Protocol for Bluetooth
Piconets Using Elliptic Curve Cryptography", Telecommunication Systems,
vol. 29, no. 3, pp. 165-180, 2005. [SCI]
P145.ps P145.pdf
23.
Min-Shiang Hwang and Chi-Yu Liu, "Authenticated Encryption Schemes: Current Status and
Key Issues", International
Journal of Network Security, vol. 1, no. 2, pp. 61-73, Sept. 2005. P271.ps P271pdf
24.
Min-Shiang Hwang, Jung-Wen Lo,
Chia-Hsin Liu, "Improvement on the Flexible Tree-Based Key Management
Framework", Computers
& Security, vol. 24, pp. 500-504, 2005. [SCI] P214.ps P214.pdf
25.
Cheng-Chi Lee, Ting-Yi Chang, Min-Shiang Hwang, "A Simple
Broadcasting Cryptosystem in Computer Networks Using Exclusive-OR", International Journal of
Computer Applications in Technology, vol. 24, no. 3, pp. 180-183, 2005. [EI] P219.ps P219.pdf
26.
Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang, "Cryptanalysis of an
Authenticated Encryption Scheme Using Self-Certified Public Keys", Applied Mathematics and
Computation, vol. 166, no. 1, pp. 118-122, July 2005. [SCI] P181.ps P181.pdf
27.
Min-Shiang Hwang and Cheng-Chi Lee,
"Research
Issues and Challenges for Multiple Digital Signatures", International
Journal of Network Security, vol. 1, no. 1, pp. 1-7, July 2005. P270.ps P270.pdf
28.
Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Yang, "A New Blind
Signature Based on the Discrete Logarithm Problem for Untraceability",
Applied Mathematics and Computation, Vol. 164, no. 3, pp. 837-841, May 2005.
[SCI] P023.ps P023.pdf
29.
Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, "An Improvement
on the Lin-Wu (t, n) Threshold Verifiable Multi-secret Sharing Scheme",
Applied Mathematics and Computation, Vol 163, no. 1, pp
169-178, 2005.
[SCI] P138.ps P138.pdf
30.
Eric
Jui-Lin Lu, Min-Shiang Hwang, and Cheng-Jian Huang, "A New Proxy Signature
Scheme with Revocation", Applied Mathematics and Computation, Vol. 161,
No. 3, PP. 799-806, Feb. 2005. P255.pdf
31.
Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang, "Improvement of
Signature Scheme Based on Factoring and Discrete Logarithms", Applied Mathematics and
Computation, Vol. 161, no. 1, pp. 49-54, Feb. 2005. [SCI] P159.ps
P159.pdf
32.
Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, “A New Multi-stage Secret Sharing Scheme Using
One-way Function”, ACM Operating Systems Review, vol. 39, no. 1, pp. 48-55, Jan. 2005.
[EI] P111.ps P111.pdf
33.
Ting-Yi Chang, Min-Shiang Hwang,
Wei-Pang Yang, "Cryptanalysis of the Tseng-Jan
Anonymous Conference Key Distribution System without Using a One-way Hash
Function", Information
& Security: An International Journal, Vol. 15, No. 1, pp. 110-114, 2004. P152.ps
P152.pdf
34.
Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang
Hwang, "On the Efficiency of Nonrepudiable Threshold Proxy Signature
Scheme with Known Signers", The Journal of Systems and Software, vol. 73,
no. 3, pp. 507-514, Nov. 2004. [SCI] P117.ps P117.pdf
35.
Min-Shiang Hwang, Jung-Wen Lo, Shu-Chen Lin,
"An Efficient User Identification Scheme Based on ID-based Cryptosystem",
Computer Standards & Interfaces, vol. 26, no. 6, pp.565-569, Oct. 2004. [SCI] P206.ps p206.pdf
36.
Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang, “Cryptanalysis of an
Efficient Secure Group Signature Scheme”, ACM Operating Systems Review, vol. 38,
no. 4, pp. 67-69, Oct. 2004. [EI] P218.ps P218.pdf
37.
Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "Cryptanalysis of Simple Authenticated Key Agreement Protocols",
IEICE Transactions on Foundations, vol. E87-A, no. 8, pp. 2174-2176, Aug. 2004.
[SCI] P167.ps P167.pdf
38.
Ting-Yi Chang, Chou-Chen Yang, Min-Shiang
Hwang, "A Threshold Signature Scheme for Group Communications without a
Shared Distribution Center", Future Generation Computer Systems, vol. 20,
no. 6, pp. 1013-1021, Aug. 2004. [SCI] P146.ps P146.pdf
39.
Chwei-Shyong Tsai, Min-Shiang Hwang, Pei-Chen Sung, "Blind
Signature Scheme Based on Elliptic Curve Cryptography", Journal of Computer Society of
India, vol. 34, no. 3, pp. 58-60, July 2004. [EI] P191.pdf
40.
Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, "A
New Anonymous Channel Protocol in Wireless Communications", International Journal of
Electronics and Communications, vol. 58, pp. 218-222, 2004. [SCI] P171.ps P171.pdf
41.
Chou-Chen Yang, Jian-Wei Li, Min-Shiang
Hwang, "A New Mutual Authentication and Key Exchange Protocol with Balanced
Computational Power for Wireless Settings", European Transactions on
Telecommunications, vol. 15, no. 2, pp. 91-99, 2004. [SCI] P141.ps P141.pdf
42.
Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Enhanced
of Key Agreement Protocols Resistant to a Denial-of-Service Attack", Fundamenta
Informaticae, vol. 61, no. 3, pp. 389-398, July 2004. [SCI] P200.ps
P200.pdf
43.
Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee, “A Key Authentication Scheme With
Non-repudiation”, ACM Operating Systems Review, vol. 38, no. 3, pp. 75-78, July.
2004. [EI] P031.ps P031.pdf
44.
Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "Cryptanalysis of
Publicly Verifiable Authenticated Encryption", IEICE Transactions on
Foundations, vol. E87-A, no. 6, pp. 1645-1646, June 2004. [SCI] P194.ps
P194.pdf
45.
Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A Nonrepudiable
Threshold Multi-Proxy Multi-Signature Scheme with Shared Verification", Future Generation Computer Systems, vol. 20, no. 5, PP.
887-893, June 2004. [SCI] P122.ps P122.pdf
46.
Ting-Yi Chang, Chou-Chen Yang, Min-Shiang
Hwang, "Threshold Untraceable Signature for Group Communications", IEE Proceedings –
Communications, vol. 151, no. 2, pp. 179-184, April 2004. [SCI] P069.ps P069.pdf
47.
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang, "An Improvement of
Nonrepudiable Threshold Proxy Signature Scheme with Known Signers",
Computers & Security, vol. 23, no. 2, pp. 174-178, April 2004. [SCI] P132.ps P132.pdf
48.
Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, “A Server-Assissted
Authentication Protocol for Detecting Error Vectors”, ACM Operating Systems
Review, vol. 38, no. 2, pp. 93-96, Apr. 2004. [EI] P113.ps P113.pdf
49.
Chou-Chen Yang, Ting-Yi Chang, Min-Shiang
Hwang, "A (t,n) Multi-secret Sharing Scheme", Applied Mathematics
and Computation, Vol. 151, No.
2 , pp. 483-490, April 2004. [SCI] P120.ps
P120.pdf
50.
Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong
Tsai, "Generalization
of Proxy Signature Based on Elliptic Curves", Computer Standards & Interfaces,
vol. 26, no. 2, pp. 73-84, March 2004. [SCI] P149.ps P149.pdf
51.
Shiang-Feng Tzeng, Min-Shiang Hwang, "Digital Signature
with Message Recovery and Its Variants Based on Elliptic Curve Discrete
Logarithm Problem",
Computer Standards & Interfaces, vol. 26, no. 2, pp. 61-71, March 2004.
[SCI] P162.ps P162.pdf
52.
Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A New Digital
Signature Scheme Based on Factoring and Discrete Logarithms", International Journal of
Computer Mathematics, vol. 81, no. 1, pp. 9-14, 2004. [SCI] P127.pdf
53.
Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on RSA-Based
Partially Signature with Low Computation", Applied Mathematics and
Computation, vol. 145, no. 2-3, pp. 465-468, Dec. 2003. [SCI] P106.ps P106.pdf
54.
Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang
Lin, "A Practical
(t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem", IEEE
Transactions on Knowledge and Data Engineering, vol. 15. no. 6, pp. 1552-1560,
Nov./Dec. 2003. [SCI] P049.ps P049.pdf
55.
Shin-Jia Hwang, Min-Shiang Hwang,
Shiang-Feng Tzeng, "A New Digital Multisignature Scheme with Distinguished
Signing Authorities", Journal of Information Science and Engineering, vol.
19, no. 5, pp. 881-887, Sep. 2003. [SCI]
P107.pdf
56.
Min-Shiang Hwang, Wei-Pang Yang, "Controlling
Access in Large Partially-Ordered Hierarchies Using Cryptographic Keys",
The Journal of Systems and Software, vol. 67, no. 2, pp. 99-107, Aug. 2003.
[SCI] P005.ps P005.pdf
57.
Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang
Hwang, “Improved Non-repudiable Threshold Proxy Signature Scheme with Known
Signers”, Informatica, vol. 14, no. 3, pp. 393-402, 2003. [SCI] P155.ps P155.pdf
58.
Cheng-Chi Lee, Min-Shiang
Hwang, Li-Hua Li, "A New Key Authentication Scheme Based on Discrete
Logarithms", Applied Mathematics and Computation, vol. 139, no. 2, pp.
343-349, July 2003. [SCI] P035.ps P035.pdf
59.
Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "An
Untraceable Blind Signature Scheme", IEICE Transactions on Foundations,
vol. E86-A, no. 7, pp. 1902-1906, July 2003. [SCI] P108.ps P108.pdf
60.
Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang
Hwang, "Generalization of Proxy Signature Based on Discrete Logarithms",
Computers & Security, Vol. 22, No. 3, pp. 245-255, 2003. [SCI] P147.ps P147.pdf
61.
Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "Untractable
Blind Signature Schemes Based on Discrete Logarithm Problem", Fundamenta
Informaticae, Vol. 55, Issue 3-4, pp. 307-320, June 2003. [SCI] (ISSN:0169-2968)
P115.ps P115.pdf
62.
Iuon-Chung Lin, Min-Shiang Hwang,
Chin-Chen Chang, "A New Key Assignment Scheme for Enforcing Complicated
Access Control Policies in Hierarchy", Future Generation Computer Systems,
Vol. 19, no. 4, pp 457-462, May 2003. [SCI] P018.ps P018.pdf
63.
Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A New Anonymous Conference Key Distribution System Based on the
Elliptic Curve Discrete Logarithm Problem", Computer Standards and
Interfaces, Vol 25, No. 2, pp 141-145, May 2003. [SCI] P156.ps P156.pdf
64.
Eric Jui-Lin Lu, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis of Some
Authenticated Key Agreement Protocols", International Journal of Computational
and Numerical Analysis and Applications, Vol. 3, no. 2, pp. 151-157, Apr. 2003.
P092.ps P092.pdf
65.
Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, Min-Shiang Hwang, "Simple Generalized Group-oriented
Cryptosystems Using ElGamal Cryptosystem", Informatica, vol. 14, no. 1,
pp. 111-120, 2003. [SCI] (ISSN:0868-4952) P151.ps P151.pdf
66.
Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on Stadler
et al.'s Fair Blind Signature Scheme", IEICE Transactions on Fundamentals
on Electronics, Communications and Computer Sciences, Vol. E86-A, no. 2, pp.
513-514, Feb. 2003. [SCI] P102.ps P102.pdf
67.
Min-Shiang Hwang, Wei-Pang Yang, "An Authentication Protocol
for Multicast Communications", Pakistan Journal of Applied Sciences, vol.
2, no. 12, pp. 1082-1083, Dec. 2002.
P030.ps P030.pdf
68.
Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang, "Cryptanalysis of the
Hwang-Shi Proxy Signature Scheme", Fundamenta Informaticae, Vol. 53, No.
2, pp. 131-134, Nov. 2002. (SCI) P099.ps P099.pdf
69.
Min-Shiang Hwang, Chih-Wei Lin, Cheng-Chi
Lee, "Improved
Yen-Joye's Authenticated Multiple-key Agreement Protocol", IEE Electronics
Letters, vol. 38, no. 23, pp. 1429-1431, Nov. 2002. [SCI] P121.ps P121.pdf
70.
Min-Shiang Hwang, S. Wesley
Changchien, Cheng-Chi Lee, "A New Method to Strengthen Ciphers", International Journal of Pure
and Applied Mathematics, vol. 3, no. 2, pp. 187-192, 2002. P021.ps P021.pdf
71.
S. Wesley Changchien, Min-Shiang Hwang, "A Batch Verifying and
Detecting Multiple RSA Digital Signatures", International Journal of Computational
and Numerical Analysis and Applications, vol. 2, no. 3, pp. 303-307, Oct.
2002. P050.ps P050.pdf
72.
Min-Shiang Hwang, Chao-Chen Yang, Shiang-Feng
Tzeng, "Improved Digital Signature Scheme Based on Factoring and Discrete
Logarithms", Journal of Discrete Mathematical Sciences & Cryptography,
vol. 5, no. 2, pp. 151-155, Aug. 2002.
P052.ps P052.pdf
73.
Min-Shiang Hwang, Cheng-Chi Lee, Ting-Yi
Chang,
"Broadcasting Cryptosystem in Computer Networks Using Geometric Properties
of Lines", Journal of Information Science and Engineering, Vol. 18, No. 3,
pp. 373-379, May 2002. [SCI] P027.ps P027.pdf
74.
Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability
on Low-Computation Partially Blind Signatures for Electronic Cash", IEICE
Fundamentals on Electronics, Communications and Computer Sciences, vol. E85-A,
No. 5, pp. 1181-1182, May 2002. [SCI] P105.ps P105.pdf
75.
Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An
Improved Authentication Protocol Without Trusted Third Party", International
Journal of Computational and Numerical Analysis and Applications, vol. 1, no.
4, pp. 407-412, April 2002. P042.ps P042.pdf
76.
Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng
Hwang, "An ElGamal-like Cryptosystem For Enciphering Large Messages",
IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 2, pp.
445-446, March/April 2002. [SCI] P045.ps P045.pdf
77.
Eric Jui-Lin Lu, Min-Shiang
Hwang, "An
Improvement of a Simple Authenticated Key Agreement Algorithm", Pakistan
Journal of Applied Sciences, Vol. 2, no. 1, pp. 64-65, Jan. 2002. P071.ps P071.pdf
78.
Min-Shiang Hwang, Cheng-Chi Lee, Eric Jui-Lin Lu, "Cryptanalysis of the
Batch Verifying Multiple DSA-type Digital Signatures", Pakistan Journal of
Applied Sciences, vol. 1, no. 3, pp. 287-288, July 2001. P090.ps P090.pdf
79. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An Efficient Threshold Decryption
Scheme without Session Keys", Computers & Electrical Engineering, vol.
27, no. 1, pp. 29-35, Nov. 2000. [SCI] P043.ps P043.pdf
80.
Min-Shiang Hwang, "A New Redundancy
Reducing Cipher", Informatica, vol. 11, no. 4, pp. 435-440, Oct. 2000.
[SCI] P025.ps P025.pdf
81. Min-Shiang Hwang, "An Asymmetric Cryptographic Key Assignment Scheme for Access
Control in Totally-Ordered Hierarchies", International Journal of Computer
Mathematics, vol. 73, no. 4, pp. 463-468, Oct. 2000. [SCI] P004.ps P004.pdf
82. Min-Shiang Hwang, Iuon-Chung Lin, Eric Jui-Lin Lu, "A Secure Nonrepudiable Threshold Proxy
Signature Scheme with Known Signers", Informatica, vol. 11, no. 2, pp. 137-144,
Apr. 2000. [SCI] P068.ps P068.pdf
83. Min-Shiang Hwang, "Cryptanalysis of YCN Key Assignment Scheme in a Hierarchy", Information
Processing Letters, vol. 73, no. 3, pp. 97-101, Feb. 2000. [SCI] P055.ps P055.pdf
84. Min-Shiang Hwang, Kuo-Feng Hwang, Iuon-Chung Lin, "Cryptanalysis of The Batch Verifying
Multiple RSA Digital Signatures", Informatica, vol. 11, no. 1, pp. 1-4,
Jan. 2000. [SCI] P053.ps P053.pdf
85.
Min-Shiang Hwang, “Dynamic Participation in a Secure Conference Scheme for Mobile
Communications”, IEEE Transactions on Vehicular Technology, vol. 48, no. 5, pp.
1469-1474, Sep. 1999. [SCI] P029.pdf
86. Min-Shiang Hwang, "A New Dynamic Cryptographic Key Generation Scheme for a
Hierarchy", Nordic Journal of Computing, vol. 6, no. 4, pp. 363-371, Aug.
1999. P009.ps P009.pdf
87.
Min-Shiang Hwang, “Extension of CHW
Cryptographic Key Assignment Scheme in a Hierarchy”, IEE Proceedings Computers
and Digital Techniques, vol. 146, no. 4, pp. 219, July 1999. [SCI] P054.ps P054.pdf
88.
Min-Shiang Hwang, “An Improvement of Novel Cryptographic
Key Assignment Scheme for Dynamic Access Control in a Hierarchy”, IEICE
Transactions on Fundamentals of Electronics, Communications and Computer
Sciences, Vol.E82-A, No.3, pp.548-550, March 1999. [SCI] P044.ps P044.pdf
89.
Min-Shiang Hwang, “An Improvement of a Dynamic
Cryptographic Key Assignment Schemes in a Tree Hierarchy”, Computers & Mathematics with Applications,
vol.37, no.3, pp.19-22, Feb. 1999. [SCI] P014.ps P014.pdf
90. Min-Shiang Hwang, “A Cryptographic Key Assignment Scheme in a Hierarchy for Access Control”,
Mathematical and Computer Modeling,
Vo1.26, No2, pp.27-31, June 25, 1997. [SCI] P016.ps P016.pdf
91. Chin-Chen Chang, Min-Shiang Hwang, “Parallel Computation
of the Generating Keys for RSA Cryptosystems”, IEE Electronics Letters, vo1. 32, no. 15, July 1996, pp. 1365-1366.
[SCI] P036.ps P036.pdf