1.Related Papers
of “Security in Mobile Computing” in International Journal of Network Security [IJNS-MCOMPUTING].
2.Chia-Hui Wei, Min-Shiang Hwang and Augustin Yeh-Hao Chin, "An Improved Authentication Protocol for Mobile Agent Device in RFID," International Journal of Mobile Communications, vol. 10, no. 5, pp.508-520, 2012. (SSCI) P250.ps P250.pdf
3.Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, "An Effective AKA Protocol for UMTS," International Journal of Mobile Communications, Vol. 10, No. 4, PP. 427-448. (SSCI) P281.ps P281.pdf
4.Chun-Ta Li,
Chou-Chen Yang, and Min-Shiang Hwang, “A Secure Routing Protocol with Node Selfishness
Resistance in MANETs”, International Journal of Mobile Communications (IJMC),
vol. 10, no. 1, pp. 103-118, Jan. 2012. (SSCI) P293.ps
P293.pdf
5.Chun-Ta Li, Min-Shiang Hwang, “A Lightweight Anonymous Routing Protocol without Public Key En/Decryptions for Wireless Ad Hoc Networks”, Information Sciences, vol. 181, no. 23, pp. 5333–5347, Dec. 2011. (SCIE) P262.ps P262.pdf
6. Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou, "On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol”, European Transactions on Telecommunications, vol. 22, no. 3, pp. 99-112, Apr. 2011. (SCIE). P258.ps P258.pdf
7. Chia-Hui
Wei, Min-Shiang Hwang, and Augustin Yeh-Hao Chin, “An Authentication Protocol
for Low-cost RFID Tags”, International Journal of Mobile Communications, Vol.
9, No. 2, PP. 208-223, 2011. (SSCI) P041.ps P041.pdf
8. Ting-Yi
Chang and Min-Shiang Hwang, “User-Anonymous and Short-Term Conference Key
Distribution System via Link-Layer Routing in Mobile Communications”, International
Journal of Mobile Communications, vol. 9, No. 2, PP. 144-158, 2011. (SSCI) P114.ps P114.pdf
9. Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-hao Chin, "A Mutual Authentication Protocol for RFID”, IEEE IT Professional, vol. 13, no. 2, pp. 20-24, March/April 2011. P097.pdf
10.
Cheng-Chi Lee, I-En Liao,
and Min-Shiang Hwang, “An Efficient
Authentication Protocol for Mobile Communications", Telecommunication Systems, vol. 46, no. 1, pp. 31-41, Jan. 2011.
(SCI) P283.ps P283.pdf
11. Jung-Wen Lo, Ji-Zhe Lee, Min-Shiang Hwang, Yen-Ping Chu, "An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Journal of Internet Technology, vol. 11, no. 7, pp. 997-1004, Dec. 2010. (SCIE). P187.ps P187.pdf
12.
Hsia-Hung Ou, Min-Shiang
Hwang and Jinn-Ke Jan, “A provable billing protocol on the current UMTS”, Wireless Personal Communications, vol. 55, no. 4, pp. 551-556, 2010.
(SCI) P287.ps P287.pdf
13. Jung-Wen Lo, Cheng-Chi Lee, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient ECC-based AKA Protocol for Wireless Mobile Communications”, International Journal of Innovative Computing, Information and Control, vol. 6, no. 11, pp. 5249-5258 , Nov. 2010. (SCI) P233.ps P233.pdf
14. Jung-Wen Lo, Shu-Chen Lin, Min-Shiang Hwang, “A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments”, Information Technology and Control, vol. 39, no. 2, pp. 146-151, 2010. (SCI) P212.ps P212.pdf
15. Cheng-Chi Lee, Tzu-Chun Lin, Min-Shiang Hwang, “A Key Agreement
Scheme for Satellite Communications”, Information Technology and Control,
vol. 39, no. 1, pp. 43-47, March 2010. P178.ps P178.pdf
16.
Hsia-Hung Ou, Min-Shiang
Hwang and Jinn-Ke Jan, “A Cocktail Protocol with the Authentication and Key Agreement on the
UMTS”, Journal of Systems and Software, vol. 83, no.
2, pp. 316-325, Feb. 2010. (SCI) P292.ps P292.pdf
17.
Hsia-Hung Ou, Min-Shiang
Hwang and Jinn-Ke Jan, “The UMTS-AKA Protocols for Intelligent Transportation Systems”, EURASIP Journal on Wireless Communications and Networking, vol.
2009, pp. 1-12, 2009. (SCI) P247.ps P247.pdf
18. Min-Shiang Hwang, Chia-Hui
Wei, Cheng-Yee Lee, "Privacy and Security Requirements for RFID
Applications”, Journal of Computers (Taiwan), Vol. 20, No. 3, pp. 55-60, Oct.
2009. P103.pdf
19. C.T. Li, Min-Shiang Hwang and Y.P. Chu, “An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, Aug. 2009. (SCI) P157.ps P157.pdf
20. Hsia-Hung Ou, Iuon-Chang Lin,
Min-Shiang Hwang, and Jinn-Ke Jan, “TK-AKA: Using Temporary Key on
Authentication and Key Agreement Protocol on UMTS”, International Journal of
Network Management, vol. 19, no. 4, pp. 291-303, July 2009. P286.ps P286.pdf
21. Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang, “An Extended Certificate-based Authentication and Security Protocol for Mobile Networks”, Information Technology and Control, vol. 38, no. 1, pp. 61-66, 2009. P067.ps P067.pdf
22. Min-Shiang Hwang, Cheng-Chi
Lee, Song-Kong Chong, “An Improved Address Ownership in Mobile IPv6”, Computer
Communications, vol. 31, pp. 3250-3252, 2008. (SCI) P249.ps P249.pdf
23. Min-Shiang Hwang, Cheng-Chi
Lee, Song-Kong Chong and Jung-Wen Lo, “A Key Management for Wireless
Communications”, International Journal of Innovative Computing, Information and
Control, Vol. 4, No. 8, pp. 2045-2056, August 2008. (SCI) P202.ps P202.pdf
24. Chun-Ta Li, Min-Shiang Hwang,
Yen-Ping Chu, “A Secure and Efficient Communication Scheme with Authenticated
Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks”,
Computer Communications, vol. 31, no. 12, pp. 2803-2814, July 2008. (SCI) P227.ps P227.pdf
25. Cheng-Chi Lee, Min-Shiang
Hwang, I-En Liao, “A New Authentication Protocol Based on Pointer Forwarding
for Mobile Communications”, Wireless Communications & Mobile Computing,
vol. 8, no. 5, pp. 661-672, 2008. (SCI)
P073.ps P073.pdf
26. Chun-Ta Li, Min-Shiang Hwang,
Chi-Yu Liu, “An Electronic Voting Protocol with Deniable Authentication for
Mobile Ad Hoc Networks”, Computer Communications, vol. 31, issue 10, pp.
2534-2540, June 2008. (SCI)
P196.ps P196.pdf
27. Chun-Ta Li, Min-Shiang Hwang,
Yen-Ping Chu, “Improving the Security of a Secure Anonymous Routing Protocol
with Authenticated Key Exchange for Ad Hoc Networks”, International Journal of
Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, May
2008. (SCI) P288.ps
P288.pdf
28. Yung-Chin Chen, Wei-Lin Wang, Min-Shiang Hwang, "Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection", Asian Journal of Health and Information SCiences, Vol. 1, no. 2, pp. 189-203, 2006.
29. Cheng-Chi Lee, Min-Shiang
Hwang, I-En Liao, "Security Enhancement on a New Authentication Scheme
with Anonymity For Wireless Environments", IEEE Transactions on Industrial
Electronics, vol. 53, no. 5, pp. 1683-1687, Oct. 2006. [SCI] P261.ps P261.pdf
30. Min Shiang Hwang, Cheng-Chi
Lee, Ji-Zhe Lee, and Chao-Chen Yang, "A Secure Protocol for Bluetooth
Piconets Using Elliptic Curve Cryptography", Telecommunication Systems,
vol. 29, no. 3, pp. 165-180, 2005. [SCI]
P145.ps P145.pdf
31.
Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, "A
New Anonymous Channel Protocol in Wireless Communications", International Journal of
Electronics and Communications, vol. 58, pp. 218-222, 2004. [SCI] P171.ps P171.pdf
32.
Chou-Chen Yang, Jian-Wei Li, Min-Shiang
Hwang, "A New Mutual Authentication and Key Exchange Protocol with Balanced
Computational Power for Wireless Settings", European Transactions on
Telecommunications, vol. 15, no. 2, pp. 91-99, 2004. [SCI] P141.ps P141.pdf
33.
Chin-Chen Chang, Kuo-Lun Chen, Min-Shiang Hwang, "End-to-End
Security Protocol for Mobile Communications with End-User
Identification/Authentication", Wireless Personal Communications, Vol. 28, No. 2, pp. 95-106, Jan.
2004. [SCI] P063.ps P063.pdf
34.
Cheng-Chi Lee, Chou-Chen Yang, Min-Shiang
Hwang, "A New Privacy and Authentication Protocol for End-to-End Mobile Users",
International Journal of Communication Systems, Vol. 16, PP. 799-808, 2003. [SCI] P065.ps P065.pdf
35.
Min-Shiang Hwang, Chou-Chen Yang, Cheng-Yeh Shiu, “An Authentication Scheme for Mobile Satellite
Communication Systems”, ACM Operating Systems Review, vol. 37, no. 4, pp. 42-47,
Oct. 2003. [EI] P077.ps P077.pdf
36.
Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "Extension of
Authentication Protocol for GSM", IEE Proceedings – Communications, vol.
150, no. 2, pp. 91-95, Apr. 2003. [SCI] P083.ps P083.pdf
37.
Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "Two Secure Transportation Schemes for Mobile Agents", Information
and Security: An
International Journal, vol. 8, no. 1, pp. 87-97, 2002. P088.ps P088.pdf
38.
Min-Shiang Hwang, Cheng-Chi Lee, Wei-Pang Yang, "An
Improvement of Mobile Users Authentication in the Integration Environments",
International Journal of Electronics and Communications, vol. 56, no. 5, pp
293-297, Sep. 2002. [SCI] P091.ps P091.pdf
39.
Min-Shiang Hwang,
Chii-Hwa Lee, “Secure
Access Schemes in Mobile Database Systems”, European Transactions on
Telecommunications, vol. 12, no. 4, pp. 303-310, July 2001. [SCI] P039.ps P039.pdf
40.
Min-Shiang Hwang, “Dynamic Participation in a Secure Conference Scheme for Mobile
Communications”, IEEE Transactions on Vehicular Technology, vol. 48, no. 5, pp.
1469-1474, Sep. 1999. [SCI] P029.pdf
41.
Chii-Hwa Lee, Min-Shiang Hwang,
and Wei-Pang Yang, “Enhanced Privacy and Authentication for the Global System
of Mobile Communications”, Wireless Networks, vol. 5, pp. 231-243, July 1999. [SCI] P024.ps P024.pdf
42. Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, “A
Novel Application of the Phone Card and Its Authentication in Mobile Communications”,
Journal of Information Science and Engineering, vol. 15, no. 4, pp. 471-484,
July 1999. [SCI] P037.pdf
43. Min-Shiang Hwang and Chii-Hwa Lee, “Authenticated Key-Exchange in a Mobile Radio Network”,
European Transactions on Telecommunications,
Vo1. 8, No.3, pp.265-269, May 1997. [SCI] P024.ps P024.pdf
44. Min-Shiang Hwang and Wei-Pang Yang, “Conference Key Distribution Protocols for Digital
Mobile Communication Systems", IEEE
Journal on Selected Areas in Communications, vo1.13, no.2, February 1995, pp.416-420.
[SCI] P026.pdf