1. Shu-Fen Chiou, Min-Shiang Hwang, Song-Kong Chong, "A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS", International Journal of Advancements in Computing Technology (IJACT), vol. 4, no. 19, pp. 529-535, Oct. 2012. (EI) P223.pdf
2.Tsuei-Hung
Sun and Min-Shiang Hwang, “A Hierarchical Data Access and Key Management in
Cloud Computing”, ICIC Express Letters, Vol. 6, No.2, pp. 569-574, 2012. (EI) P175.ps P175.pdf
3.Chun-Ta Li, Min-Shiang Hwang, “A Lightweight Anonymous Routing Protocol without Public Key En/Decryptions for Wireless Ad Hoc Networks”, Information Sciences, vol. 181, no. 23, pp. 5333–5347, Dec. 2011. (SCIE) P262.ps P262.pdf
4. Cheng-Chi Lee, Min-Shiang Hwang and I-En Liao, “On the Security of Self-Certified Public Keys”, International Journal of Information Security and Privacy, vol. 5, no. 2, pp. 55-62, Apr. 2011. P084.ps P084.pdf
5. Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou, "On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol”, European Transactions on Telecommunications, vol. 22, no. 3, pp. 99-112, Apr. 2011. (SCIE). P258.ps P258.pdf
6. Ting-Yi
Chang and Min-Shiang Hwang, “User-Anonymous and Short-Term Conference Key
Distribution System via Link-Layer Routing in Mobile Communications”, International
Journal of Mobile Communications, vol. 9, No. 2, PP. 144-158, 2011. (SSCI) P114.ps P114.pdf
7. Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu, "An Efficient Key
Assignment Scheme for Access Control in a Class Hierarchy”, Information
Sciences, vol. 181, no. 4, pp. 917-925, Feb. 2011. (SCIE) P170.ps P170.pdf
8. Ting-Yi Chang; Min-Shiang Hwang, Wei-Pang Yang, "A
Communication-Efficient Three-Party Password Authenticated Key Exchange
Protocol”, Information Sciences, vol. 181, pp. 217-226, 2011. (SCIE). P188.ps
P188.pdf
9. Jung-Wen Lo, Ji-Zhe Lee, Min-Shiang Hwang, Yen-Ping Chu, "An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Journal of Internet Technology, vol. 11, no. 7, pp. 997-1004, Dec. 2010. (SCIE). P187.ps P187.pdf
10. Jung-Wen Lo, Shu-Chen Lin, Min-Shiang Hwang, “A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments”, Information Technology and Control, vol. 39, no. 2, pp. 146-151, 2010. (SCI) P212.ps P212.pdf
11. Cheng-Chi Lee, Tzu-Chun Lin, Min-Shiang Hwang, “A Key Agreement
Scheme for Satellite Communications”, Information Technology and Control,
vol. 39, no. 1, pp. 43-47, March 2010. P178.ps P178.pdf
12.
Hsia-Hung Ou, Min-Shiang
Hwang and Jinn-Ke Jan, “A Cocktail Protocol with the Authentication and Key Agreement on the
UMTS”, Journal of Systems and Software, vol. 83, no.
2, pp. 316-325, Feb. 2010. (SCI) P292.ps P292.pdf
13. C.T. Li, Min-Shiang Hwang and Y.P. Chu, “An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, Aug. 2009. (SCI) P157.ps P157.pdf
14. Hsia-Hung Ou, Iuon-Chang Lin,
Min-Shiang Hwang, and Jinn-Ke Jan, “TK-AKA: Using Temporary Key on
Authentication and Key Agreement Protocol on UMTS”, International Journal of
Network Management, vol. 19, no. 4, pp. 291-303, July 2009. P286.ps P286.pdf
15. Song Han, Elizabeth Chang,
Tharam Dillon, Min-Shiang Hwang, and Cheng-Chi Lee, "Identifying
Attributes and Insecurity of A Public-channel Key Exchange Protocol Using Chaos
Synchronization", Chaos Solitons & Fractals, Volume 40, Issue 5, Pages
2569-2575, June 2009, (SCI) P300.pdf
16. Min-Shiang Hwang, Cheng-Chi
Lee, Shiang-Feng Tzeng, "A New Knapsack Public-Key Cryptosystem Based on
Permutation Combination Algorithm", International Journal of Applied
Mathematics and Computer Sciences, Volume 5, Issue 1, pp. 33-38, 2009. P123.ps P123.pdf
17. Min-Shiang Hwang, Cheng-Chi
Lee, Song-Kong Chong and Jung-Wen Lo, “A Key Management for Wireless
Communications”, International Journal of Innovative Computing, Information and
Control, Vol. 4, No. 8, pp. 2045-2056, August 2008. (SCI) P202.ps P202.pdf
18. Chun-Ta Li, Min-Shiang Hwang,
Yen-Ping Chu, “A Secure and Efficient Communication Scheme with Authenticated
Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks”,
Computer Communications, vol. 31, no. 12, pp. 2803-2814, July 2008. (SCI) P227.ps P227.pdf
19. Chun-Ta Li, Min-Shiang Hwang,
Yen-Ping Chu, “Improving the Security of a Secure Anonymous Routing Protocol
with Authenticated Key Exchange for Ad Hoc Networks”, International Journal of
Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, May
2008. (SCI) P288.ps
P288.pdf
20. Nan-I Wu and Min-Shiang Hwang,
"Data Hiding: Current Status and Key Issues", International Journal
of Network Security, vol. 4, no. 1, pp. 1-9, Jan. 2007. P273.ps P273.pdf
21. Chwei-Shyong Tsai, Cheng-Chi Lee, and Min-Shiang Hwang,
"Password Authentication Schemes: Current Status and Key Issues",
International Journal of Network Security, vol. 3, no. 2, pp. 101-115, Sept.
2006. P279.ps P279.pdf
22. Min-Shiang Hwang and Ting-Yi
Chang, "Threshold Signatures: Current Status and Key Issues",
International Journal of Network Security, vol. 1, no. 3, pp. 123-137, Nov.
2005. P269.pdf
23.
Min-Shiang Hwang and Chi-Yu Liu, "Authenticated Encryption Schemes: Current Status and
Key Issues", International
Journal of Network Security, vol. 1, no. 2, pp. 61-73, Sept. 2005. P271.ps P271pdf
24.
Min-Shiang Hwang, Jung-Wen Lo,
Chia-Hsin Liu, "Improvement on the Flexible Tree-Based Key Management
Framework", Computers
& Security, vol. 24, pp. 500-504, 2005. [SCI] P214.ps P214.pdf
25.
Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang, "Cryptanalysis of an Authenticated
Encryption Scheme Using Self-Certified Public Keys", Applied Mathematics and Computation,
vol. 166, no. 1, pp. 118-122, July 2005. [SCI] P181.ps
P181.pdf
26.
Ting-Yi Chang, Wei-Pang Yang,
Min-Shiang Hwang, "Simple Authenticated Key Agreement and Protected
Password Change Protocol", Computers & Mathematics with Applications, vol. 49, pp.
703-714, 2005. [SCI] P176.ps P176.pdf
27.
Ting-Yi Chang, Min-Shiang Hwang,
Wei-Pang Yang, "Cryptanalysis of the Tseng-Jan
Anonymous Conference Key Distribution System without Using a One-way Hash
Function", Information
& Security: An International Journal, Vol. 15, No. 1, pp. 110-114, 2004. P152.ps
P152.pdf
28.
Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "Cryptanalysis of Simple Authenticated Key Agreement Protocols",
IEICE Transactions on Foundations, vol. E87-A, no. 8, pp. 2174-2176, Aug. 2004.
[SCI] P167.ps P167.pdf
29.
Chou-Chen Yang, Jian-Wei Li, Min-Shiang
Hwang, "A New Mutual Authentication and Key Exchange Protocol with Balanced
Computational Power for Wireless Settings", European Transactions on
Telecommunications, vol. 15, no. 2, pp. 91-99, 2004. [SCI] P141.ps P141.pdf
30.
Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Enhanced
of Key Agreement Protocols Resistant to a Denial-of-Service Attack", Fundamenta
Informaticae, vol. 61, no. 3, pp. 389-398, July 2004. [SCI] P200.ps
P200.pdf
31.
Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee, “A Key Authentication Scheme With
Non-repudiation”, ACM Operating Systems Review, vol. 38, no. 3, pp. 75-78, July.
2004. [EI] P031.ps P031.pdf
32.
Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "Efficient Access
Control and Key Management Schemes for Mobile Agents", Computer Standards & Interfaces,
vol. 26, no. 5, pp. 423-433, May 2004.
[SCI] P093.ps P093.pdf
33.
Min-Shiang Hwang, Wei-Pang Yang, "Controlling
Access in Large Partially-Ordered Hierarchies Using Cryptographic Keys",
The Journal of Systems and Software, vol. 67, no. 2, pp. 99-107, Aug. 2003.
[SCI] P005.ps P005.pdf
34.
Cheng-Chi Lee, Min-Shiang
Hwang, Li-Hua Li, "A New Key Authentication Scheme Based on Discrete
Logarithms", Applied Mathematics and Computation, vol. 139, no. 2, pp.
343-349, July 2003. [SCI] P035.ps P035.pdf
35.
Iuon-Chung Lin, Min-Shiang Hwang,
Chin-Chen Chang, "A New Key Assignment Scheme for Enforcing Complicated
Access Control Policies in Hierarchy", Future Generation Computer Systems,
Vol. 19, no. 4, pp 457-462, May 2003. [SCI] P018.ps P018.pdf
36.
Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A New Anonymous Conference Key Distribution System Based on the
Elliptic Curve Discrete Logarithm Problem", Computer Standards and
Interfaces, Vol 25, No. 2, pp 141-145, May 2003. [SCI] P156.ps P156.pdf
37.
Eric Jui-Lin Lu, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis of Some
Authenticated Key Agreement Protocols", International Journal of Computational
and Numerical Analysis and Applications, Vol. 3, no. 2, pp. 151-157, Apr. 2003.
P092.ps P092.pdf
38.
Min-Shiang Hwang, Chih-Wei Lin, Cheng-Chi
Lee, "Improved
Yen-Joye's Authenticated Multiple-key Agreement Protocol", IEE Electronics
Letters, vol. 38, no. 23, pp. 1429-1431, Nov. 2002. [SCI] P121.ps P121.pdf
39.
Eric Jui-Lin Lu, Min-Shiang
Hwang, "An
Improvement of a Simple Authenticated Key Agreement Algorithm", Pakistan
Journal of Applied Sciences, Vol. 2, no. 1, pp. 64-65, Jan. 2002. P071.ps P071.pdf
40. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An Efficient Threshold Decryption
Scheme without Session Keys", Computers & Electrical Engineering, vol.
27, no. 1, pp. 29-35, Nov. 2000. [SCI] P043.ps P043.pdf
41. Min-Shiang Hwang, "An Asymmetric Cryptographic Key Assignment Scheme for Access
Control in Totally-Ordered Hierarchies", International Journal of Computer
Mathematics, vol. 73, no. 4, pp. 463-468, Oct. 2000. [SCI] P004.ps P004.pdf
42. Min-Shiang Hwang, "Cryptanalysis of YCN Key Assignment Scheme in a Hierarchy", Information
Processing Letters, vol. 73, no. 3, pp. 97-101, Feb. 2000. [SCI] P055.ps P055.pdf
43. Min-Shiang Hwang, "A New Dynamic Cryptographic Key Generation Scheme for a
Hierarchy", Nordic Journal of Computing, vol. 6, no. 4, pp. 363-371, Aug.
1999. P009.ps P009.pdf
44.
Min-Shiang Hwang, “Extension of CHW
Cryptographic Key Assignment Scheme in a Hierarchy”, IEE Proceedings Computers
and Digital Techniques, vol. 146, no. 4, pp. 219, July 1999. [SCI] P054.ps P054.pdf
45.
Min-Shiang Hwang, “An Improvement of Novel Cryptographic
Key Assignment Scheme for Dynamic Access Control in a Hierarchy”, IEICE
Transactions on Fundamentals of Electronics, Communications and Computer
Sciences, Vol.E82-A, No.3, pp.548-550, March 1999. [SCI] P044.ps P044.pdf
46.
Min-Shiang Hwang, “An Improvement of a Dynamic
Cryptographic Key Assignment Schemes in a Tree Hierarchy”, Computers & Mathematics with Applications,
vol.37, no.3, pp.19-22, Feb. 1999. [SCI] P014.ps P014.pdf
47. Min-Shiang Hwang, “A Cryptographic Key Assignment Scheme in a Hierarchy for Access
Control”, Mathematical and Computer Modeling,
Vo1.26, No2, pp.27-31, June 25, 1997. [SCI] P016.ps P016.pdf
48. Min-Shiang Hwang and Chii-Hwa Lee, “Authenticated Key-Exchange in a Mobile Radio Network”,
European Transactions on Telecommunications,
Vo1. 8, No.3, pp.265-269, May 1997. [SCI] P024.ps P024.pdf
49.
Min-Shiang Hwang and Wei-Pang Yang, “Multilevel
Secure Database Encryption with Subkeys”, Data&Knowledge Engineering, Vo1.22, 1997, pp.117-131. [SCI] P007.ps P007.pdf
50. Chin-Chen Chang, Min-Shiang Hwang, “Parallel Computation
of the Generating Keys for RSA Cryptosystems”, IEE Electronics Letters, vo1. 32, no. 15, July 1996, pp. 1365-1366.
[SCI] P036.ps P036.pdf
51. Min-Shiang Hwang and Wei-Pang Yang, “Conference Key Distribution Protocols for Digital
Mobile Communication Systems", IEEE
Journal on Selected Areas in Communications, vo1.13, no.2, February 1995, pp.416-420.
[SCI] P026.pdf