Publications in Security in Mobile Computing  [Other Topics]

 

1.Related Papers of “Security in Mobile Computing” in International Journal of Network Security [IJNS-MCOMPUTING].

2.Chia-Hui Wei, Min-Shiang Hwang and Augustin Yeh-Hao Chin, "An Improved Authentication Protocol for Mobile Agent Device in RFID," International Journal of Mobile Communications, vol. 10, no. 5, pp.508-520, 2012. (SSCI)  P250.ps   P250.pdf

3.Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, "An Effective AKA Protocol for UMTS," International Journal of Mobile Communications, Vol. 10, No. 4, PP. 427-448. (SSCI)  P281.ps  P281.pdf

4.Chun-Ta Li, Chou-Chen Yang, and Min-Shiang Hwang, “A Secure Routing Protocol with Node Selfishness Resistance in MANETs”, International Journal of Mobile Communications (IJMC), vol. 10, no. 1, pp. 103-118, Jan. 2012. (SSCI)   P293.ps   P293.pdf

5.Chun-Ta Li, Min-Shiang Hwang, “A Lightweight Anonymous Routing Protocol without Public Key En/Decryptions for Wireless Ad Hoc Networks”, Information Sciences, vol. 181, no. 23, pp. 53335347, Dec. 2011. (SCIE) P262.ps   P262.pdf

6.  Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou, "On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol”, European Transactions on Telecommunications, vol. 22, no. 3, pp. 99-112, Apr. 2011. (SCIE).  P258.ps  P258.pdf

7.  Chia-Hui Wei, Min-Shiang Hwang, and Augustin Yeh-Hao Chin, “An Authentication Protocol for Low-cost RFID Tags”, International Journal of Mobile Communications, Vol. 9, No. 2, PP. 208-223, 2011. (SSCI)  P041.ps   P041.pdf

8.  Ting-Yi Chang and Min-Shiang Hwang, “User-Anonymous and Short-Term Conference Key Distribution System via Link-Layer Routing in Mobile Communications”, International Journal of Mobile Communications, vol. 9, No. 2, PP. 144-158, 2011. (SSCI)  P114.ps  P114.pdf

9.  Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-hao Chin, "A Mutual Authentication Protocol for RFID”, IEEE IT Professional, vol. 13, no. 2, pp. 20-24, March/April 2011.  P097.pdf

10.    Cheng-Chi Lee, I-En Liao, and Min-Shiang Hwang, “An Efficient Authentication Protocol for Mobile Communications", Telecommunication Systems, vol. 46, no. 1, pp. 31-41, Jan. 2011. (SCI)  P283.ps  P283.pdf

11.    Jung-Wen Lo, Ji-Zhe Lee, Min-Shiang Hwang, Yen-Ping Chu, "An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Journal of Internet Technology, vol. 11, no. 7, pp. 997-1004, Dec. 2010. (SCIE).  P187.ps  P187.pdf

12.    Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “A provable billing protocol on the current UMTS”, Wireless Personal Communications, vol. 55, no. 4, pp. 551-556, 2010. (SCI)  P287.ps   P287.pdf

13.    Jung-Wen Lo, Cheng-Chi Lee, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient ECC-based AKA Protocol for Wireless Mobile Communications”, International Journal of Innovative Computing, Information and Control, vol. 6, no. 11, pp. 5249-5258 , Nov. 2010. (SCI)   P233.ps  P233.pdf

14.    Jung-Wen Lo, Shu-Chen Lin, Min-Shiang Hwang, “A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments”, Information Technology and Control, vol. 39, no. 2, pp. 146-151, 2010. (SCI)  P212.ps  P212.pdf

15.    Cheng-Chi Lee, Tzu-Chun Lin, Min-Shiang Hwang, “A Key Agreement Scheme for Satellite Communications”, Information Technology and Control,
vol. 39, no. 1, pp. 43-47, March 2010.  
P178.ps   P178.pdf

16.    Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “A Cocktail Protocol with the Authentication and Key Agreement on the UMTS”, Journal of Systems and Software, vol. 83, no. 2, pp. 316-325, Feb. 2010. (SCI)  P292.ps   P292.pdf

17.    Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “The UMTS-AKA Protocols for Intelligent Transportation Systems”, EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 1-12, 2009. (SCI) P247.ps   P247.pdf

18. Min-Shiang Hwang, Chia-Hui Wei, Cheng-Yee Lee, "Privacy and Security Requirements for RFID Applications”, Journal of Computers (Taiwan), Vol. 20, No. 3, pp. 55-60, Oct. 2009.  P103.pdf

19. C.T. Li, Min-Shiang Hwang and Y.P. Chu, “An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, Aug. 2009. (SCI)  P157.ps  P157.pdf

20. Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, and Jinn-Ke Jan, “TK-AKA: Using Temporary Key on Authentication and Key Agreement Protocol on UMTS”, International Journal of Network Management, vol. 19, no. 4, pp. 291-303, July 2009.  P286.ps   P286.pdf

21. Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang, “An Extended Certificate-based Authentication and Security Protocol for Mobile Networks”, Information Technology and Control, vol. 38, no. 1, pp. 61-66, 2009.  P067.ps   P067.pdf

22. Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong, “An Improved Address Ownership in Mobile IPv6”, Computer Communications, vol. 31, pp. 3250-3252, 2008. (SCI)  P249.ps  P249.pdf

23. Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong and Jung-Wen Lo, “A Key Management for Wireless Communications”, International Journal of Innovative Computing, Information and Control, Vol. 4, No. 8, pp. 2045-2056, August 2008. (SCI)  P202.ps  P202.pdf

24. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks”, Computer Communications, vol. 31, no. 12, pp. 2803-2814, July 2008. (SCI)  P227.ps   P227.pdf

25. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, “A New Authentication Protocol Based on Pointer Forwarding for Mobile Communications”, Wireless Communications & Mobile Computing, vol. 8, no. 5, pp. 661-672, 2008. (SCI)  P073.ps  P073.pdf

26. Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu, “An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks”, Computer Communications, vol. 31, issue 10, pp. 2534-2540, June 2008. (SCI)    P196.ps   P196.pdf

27. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Improving the Security of a Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks”, International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, May 2008. (SCI)  P288.ps   P288.pdf

28. Yung-Chin Chen, Wei-Lin Wang, Min-Shiang Hwang, "Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection", Asian Journal of Health and Information SCiences, Vol. 1, no. 2, pp. 189-203, 2006.  

29. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, "Security Enhancement on a New Authentication Scheme with Anonymity For Wireless Environments", IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683-1687, Oct. 2006. [SCI]  P261.ps  P261.pdf

30. Min Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, and Chao-Chen Yang, "A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography", Telecommunication Systems, vol. 29, no. 3, pp. 165-180, 2005. [SCI]  P145.ps  P145.pdf

31.    Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, "A New Anonymous Channel Protocol in Wireless Communications", International Journal of Electronics and Communications, vol. 58, pp. 218-222, 2004. [SCI]  P171.ps   P171.pdf

32.    Chou-Chen Yang, Jian-Wei Li, Min-Shiang Hwang, "A New Mutual Authentication and Key Exchange Protocol with Balanced Computational Power for Wireless Settings", European Transactions on Telecommunications, vol. 15, no. 2, pp. 91-99, 2004. [SCI]  P141.ps   P141.pdf

33.    Chin-Chen Chang, Kuo-Lun Chen, Min-Shiang Hwang, "End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication", Wireless Personal Communications, Vol. 28, No. 2, pp. 95-106, Jan. 2004. [SCI]  P063.ps  P063.pdf

34.    Cheng-Chi Lee, Chou-Chen Yang, Min-Shiang Hwang, "A New Privacy and Authentication Protocol for End-to-End Mobile Users", International Journal of Communication Systems, Vol. 16, PP. 799-808, 2003. [SCI]  P065.ps   P065.pdf

35.    Min-Shiang Hwang, Chou-Chen Yang, Cheng-Yeh Shiu, “An Authentication Scheme for Mobile Satellite Communication Systems”, ACM Operating Systems Review, vol. 37, no. 4, pp. 42-47, Oct. 2003. [EI]  P077.ps  P077.pdf

36.    Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "Extension of Authentication Protocol for GSM", IEE Proceedings – Communications, vol. 150, no. 2, pp. 91-95, Apr. 2003. [SCI]   P083.ps  P083.pdf

37.    Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "Two Secure Transportation Schemes for Mobile Agents", Information and Security: An International Journal, vol. 8, no. 1, pp. 87-97, 2002.  P088.ps  P088.pdf

38.    Min-Shiang Hwang, Cheng-Chi Lee, Wei-Pang Yang, "An Improvement of Mobile Users Authentication in the Integration Environments", International Journal of Electronics and Communications, vol. 56, no. 5, pp 293-297, Sep. 2002. [SCI]  P091.ps  P091.pdf

39.    Min-Shiang Hwang, Chii-Hwa Lee, “Secure Access Schemes in Mobile Database Systems”, European Transactions on Telecommunications, vol. 12, no. 4, pp. 303-310, July 2001. [SCI]  P039.ps   P039.pdf

40. Min-Shiang Hwang, “Dynamic Participation in a Secure Conference Scheme for Mobile Communications”, IEEE Transactions on Vehicular Technology, vol. 48, no. 5, pp. 1469-1474, Sep. 1999. [SCI]  P029.pdf

41.    Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, “Enhanced Privacy and Authentication for the Global System of Mobile Communications”, Wireless Networks, vol. 5, pp. 231-243, July 1999.  [SCI]  P024.ps   P024.pdf

42. Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, “A Novel Application of the Phone Card and Its Authentication in Mobile Communications”, Journal of Information Science and Engineering, vol. 15, no. 4, pp. 471-484, July 1999. [SCI]  P037.pdf

43. Min-Shiang Hwang and Chii-Hwa Lee, “Authenticated Key-Exchange in a Mobile Radio Network”, European Transactions on Telecommunications, Vo1. 8, No.3, pp.265-269, May 1997. [SCI]  P024.ps   P024.pdf

44. Min-Shiang Hwang and Wei-Pang Yang, “Conference Key Distribution Protocols for Digital Mobile Communication Systems", IEEE Journal on Selected Areas in Communications, vo1.13, no.2, February 1995, pp.416-420. [SCI]  P026.pdf