Publications in Key Management  [Other Topics]

1. Shu-Fen Chiou, Min-Shiang Hwang, Song-Kong Chong, "A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS", International Journal of Advancements in Computing Technology (IJACT), vol. 4, no. 19, pp. 529-535, Oct. 2012. (EI)   P223.pdf

2.Tsuei-Hung Sun and Min-Shiang Hwang, “A Hierarchical Data Access and Key Management in Cloud Computing”, ICIC Express Letters, Vol. 6, No.2, pp. 569-574, 2012. (EI)   P175.ps   P175.pdf

3.Chun-Ta Li, Min-Shiang Hwang, “A Lightweight Anonymous Routing Protocol without Public Key En/Decryptions for Wireless Ad Hoc Networks”, Information Sciences, vol. 181, no. 23, pp. 53335347, Dec. 2011. (SCIE) P262.ps   P262.pdf

4.  Cheng-Chi Lee, Min-Shiang Hwang and I-En Liao, “On the Security of Self-Certified Public Keys”, International Journal of Information Security and Privacy, vol. 5, no. 2, pp. 55-62, Apr. 2011.  P084.ps  P084.pdf

5.  Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou, "On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol”, European Transactions on Telecommunications, vol. 22, no. 3, pp. 99-112, Apr. 2011. (SCIE).  P258.ps  P258.pdf

6.  Ting-Yi Chang and Min-Shiang Hwang, “User-Anonymous and Short-Term Conference Key Distribution System via Link-Layer Routing in Mobile Communications”, International Journal of Mobile Communications, vol. 9, No. 2, PP. 144-158, 2011. (SSCI)  P114.ps  P114.pdf

7.  Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu, "An Efficient Key Assignment Scheme for Access Control in a Class Hierarchy”, Information Sciences, vol. 181, no. 4, pp. 917-925, Feb. 2011. (SCIE)  P170.ps  P170.pdf

8.  Ting-Yi Chang; Min-Shiang Hwang, Wei-Pang Yang, "A Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol”, Information Sciences, vol. 181, pp. 217-226, 2011. (SCIE).    P188.ps   P188.pdf

9.  Jung-Wen Lo, Ji-Zhe Lee, Min-Shiang Hwang, Yen-Ping Chu, "An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Journal of Internet Technology, vol. 11, no. 7, pp. 997-1004, Dec. 2010. (SCIE).  P187.ps  P187.pdf

10.    Jung-Wen Lo, Shu-Chen Lin, Min-Shiang Hwang, “A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments”, Information Technology and Control, vol. 39, no. 2, pp. 146-151, 2010. (SCI)  P212.ps  P212.pdf

11.    Cheng-Chi Lee, Tzu-Chun Lin, Min-Shiang Hwang, “A Key Agreement Scheme for Satellite Communications”, Information Technology and Control,
vol. 39, no. 1, pp. 43-47, March 2010.  
P178.ps   P178.pdf

12.    Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “A Cocktail Protocol with the Authentication and Key Agreement on the UMTS”, Journal of Systems and Software, vol. 83, no. 2, pp. 316-325, Feb. 2010. (SCI)  P292.ps   P292.pdf

13. C.T. Li, Min-Shiang Hwang and Y.P. Chu, “An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, Aug. 2009. (SCI)  P157.ps  P157.pdf

14. Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, and Jinn-Ke Jan, “TK-AKA: Using Temporary Key on Authentication and Key Agreement Protocol on UMTS”, International Journal of Network Management, vol. 19, no. 4, pp. 291-303, July 2009.  P286.ps   P286.pdf

15. Song Han, Elizabeth Chang, Tharam Dillon, Min-Shiang Hwang, and Cheng-Chi Lee, "Identifying Attributes and Insecurity of A Public-channel Key Exchange Protocol Using Chaos Synchronization", Chaos Solitons & Fractals, Volume 40, Issue 5, Pages 2569-2575, June 2009,  (SCI)  P300.pdf

16. Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, "A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm", International Journal of Applied Mathematics and Computer Sciences, Volume 5, Issue 1, pp. 33-38, 2009.  P123.ps  P123.pdf

17. Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong and Jung-Wen Lo, “A Key Management for Wireless Communications”, International Journal of Innovative Computing, Information and Control, Vol. 4, No. 8, pp. 2045-2056, August 2008. (SCI)  P202.ps  P202.pdf

18. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks”, Computer Communications, vol. 31, no. 12, pp. 2803-2814, July 2008. (SCI)  P227.ps   P227.pdf

19. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Improving the Security of a Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks”, International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, May 2008. (SCI)  P288.ps   P288.pdf

20. Nan-I Wu and Min-Shiang Hwang, "Data Hiding: Current Status and Key Issues", International Journal of Network Security, vol. 4, no. 1, pp. 1-9, Jan. 2007.   P273.ps  P273.pdf

21. Chwei-Shyong Tsai, Cheng-Chi Lee, and Min-Shiang Hwang, "Password Authentication Schemes: Current Status and Key Issues", International Journal of Network Security, vol. 3, no. 2, pp. 101-115, Sept. 2006.  P279.ps  P279.pdf

22. Min-Shiang Hwang and Ting-Yi Chang, "Threshold Signatures: Current Status and Key Issues", International Journal of Network Security, vol. 1, no. 3, pp. 123-137, Nov. 2005.  P269.pdf

23.    Min-Shiang Hwang and Chi-Yu Liu, "Authenticated Encryption Schemes: Current Status and Key Issues", International Journal of Network Security, vol. 1, no. 2, pp. 61-73, Sept. 2005.  P271.ps   P271pdf

24.    Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Improvement on the Flexible Tree-Based Key Management Framework", Computers & Security, vol. 24, pp. 500-504, 2005. [SCI]   P214.ps   P214.pdf

25.    Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang, "Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys", Applied Mathematics and Computation, vol. 166, no. 1, pp. 118-122, July 2005. [SCI]  P181.ps   P181.pdf

26.    Ting-Yi Chang, Wei-Pang Yang, Min-Shiang Hwang, "Simple Authenticated Key Agreement and Protected Password Change Protocol", Computers & Mathematics with Applications, vol. 49, pp. 703-714, 2005. [SCI]  P176.ps  P176.pdf

27.    Ting-Yi Chang, Min-Shiang Hwang, Wei-Pang Yang, "Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System without Using a One-way Hash Function", Information & Security: An International Journal, Vol. 15, No. 1, pp. 110-114, 2004.  P152.ps   P152.pdf

28.    Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "Cryptanalysis of Simple Authenticated Key Agreement Protocols", IEICE Transactions on Foundations, vol. E87-A, no. 8, pp. 2174-2176, Aug. 2004. [SCI]  P167.ps   P167.pdf

29.    Chou-Chen Yang, Jian-Wei Li, Min-Shiang Hwang, "A New Mutual Authentication and Key Exchange Protocol with Balanced Computational Power for Wireless Settings", European Transactions on Telecommunications, vol. 15, no. 2, pp. 91-99, 2004. [SCI]  P141.ps   P141.pdf

30.    Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack", Fundamenta Informaticae, vol. 61, no. 3, pp. 389-398, July 2004. [SCI]  P200.ps   P200.pdf

31.    Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee, “A Key Authentication Scheme With Non-repudiation”, ACM Operating Systems Review, vol. 38, no. 3, pp. 75-78, July. 2004. [EI]  P031.ps   P031.pdf

32.    Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "Efficient Access Control and Key Management Schemes for Mobile Agents", Computer Standards & Interfaces, vol. 26, no. 5, pp. 423-433, May 2004. [SCI] P093.ps   P093.pdf

33.    Min-Shiang Hwang, Wei-Pang Yang, "Controlling Access in Large Partially-Ordered Hierarchies Using Cryptographic Keys", The Journal of Systems and Software, vol. 67, no. 2, pp. 99-107, Aug. 2003. [SCI]  P005.ps   P005.pdf

34.    Cheng-Chi Lee, Min-Shiang Hwang, Li-Hua Li, "A New Key Authentication Scheme Based on Discrete Logarithms", Applied Mathematics and Computation, vol. 139, no. 2, pp. 343-349, July 2003. [SCI]  P035.ps  P035.pdf

35.    Iuon-Chung Lin, Min-Shiang Hwang, Chin-Chen Chang, "A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy", Future Generation Computer Systems, Vol. 19, no. 4, pp 457-462, May 2003. [SCI]  P018.ps  P018.pdf

36.    Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A New Anonymous Conference Key Distribution System Based on the Elliptic Curve Discrete Logarithm Problem", Computer Standards and Interfaces, Vol 25, No. 2, pp 141-145, May 2003. [SCI]  P156.ps  P156.pdf

37.    Eric Jui-Lin Lu, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis of Some Authenticated Key Agreement Protocols", International Journal of Computational and Numerical Analysis and Applications, Vol. 3, no. 2, pp. 151-157, Apr. 2003.  P092.ps  P092.pdf

38.    Min-Shiang Hwang, Chih-Wei Lin, Cheng-Chi Lee, "Improved Yen-Joye's Authenticated Multiple-key Agreement Protocol", IEE Electronics Letters, vol. 38, no. 23, pp. 1429-1431, Nov. 2002. [SCI]  P121.ps   P121.pdf

39.    Eric Jui-Lin Lu, Min-Shiang Hwang, "An Improvement of a Simple Authenticated Key Agreement Algorithm", Pakistan Journal of Applied Sciences, Vol. 2, no. 1, pp. 64-65, Jan. 2002. P071.ps   P071.pdf

40. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An Efficient Threshold Decryption Scheme without Session Keys", Computers & Electrical Engineering, vol. 27, no. 1, pp. 29-35, Nov. 2000. [SCI]  P043.ps   P043.pdf

41. Min-Shiang Hwang, "An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Totally-Ordered Hierarchies", International Journal of Computer Mathematics, vol. 73, no. 4, pp. 463-468, Oct. 2000. [SCI]  P004.ps   P004.pdf

42. Min-Shiang Hwang, "Cryptanalysis of YCN Key Assignment Scheme in a Hierarchy", Information Processing Letters, vol. 73, no. 3, pp. 97-101, Feb. 2000. [SCI]  P055.ps   P055.pdf

43. Min-Shiang Hwang, "A New Dynamic Cryptographic Key Generation Scheme for a Hierarchy", Nordic Journal of Computing, vol. 6, no. 4, pp. 363-371, Aug. 1999. P009.ps   P009.pdf

44.    Min-Shiang Hwang, “Extension of CHW Cryptographic Key Assignment Scheme in a Hierarchy”, IEE Proceedings Computers and Digital Techniques, vol. 146, no. 4, pp. 219, July 1999. [SCI]  P054.ps   P054.pdf

45.    Min-Shiang Hwang, “An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E82-A, No.3, pp.548-550, March 1999. [SCI]  P044.ps   P044.pdf

46.    Min-Shiang Hwang, “An Improvement of a Dynamic Cryptographic Key Assignment Schemes in a Tree Hierarchy”, Computers Mathematics with Applications, vol.37, no.3, pp.19-22, Feb. 1999. [SCI] P014.ps   P014.pdf

47. Min-Shiang Hwang, “A Cryptographic Key Assignment Scheme in a Hierarchy for Access Control”, Mathematical and Computer Modeling, Vo1.26, No2, pp.27-31, June 25, 1997. [SCI]  P016.ps   P016.pdf

48. Min-Shiang Hwang and Chii-Hwa Lee, “Authenticated Key-Exchange in a Mobile Radio Network”, European Transactions on Telecommunications, Vo1. 8, No.3, pp.265-269, May 1997. [SCI]  P024.ps   P024.pdf

49.    Min-Shiang Hwang and Wei-Pang Yang, “Multilevel Secure Database Encryption with Subkeys”, DataKnowledge Engineering, Vo1.22, 1997, pp.117-131. [SCI]  P007.ps   P007.pdf

50. Chin-Chen Chang, Min-Shiang Hwang, “Parallel Computation of the Generating Keys for RSA Cryptosystems”, IEE Electronics Letters, vo1. 32, no. 15, July 1996, pp. 1365-1366. [SCI]  P036.ps   P036.pdf

51. Min-Shiang Hwang and Wei-Pang Yang, “Conference Key Distribution Protocols for Digital Mobile Communication Systems", IEEE Journal on Selected Areas in Communications, vo1.13, no.2, February 1995, pp.416-420. [SCI]  P026.pdf