Refereed International Journals (Min-Shiang Hwang)

1.Chia-Chun Wu, Cheng-Yin Yang, Min-Shiang Hwang*, Cheng-Yee Lee, “A Trustworthy Web-based System Platform for Teaching Evaluation and STEM Education", accepted (Mar. 11, 2019) in International Journal of Electrical Engineering Education (SCI)  P276.pdf

2.Chia-Chun Wu, Cheng-Yin Yang, Min-Shiang Hwang*, Mei-Yu Lin, “The Design and Application of a Web-Based Teacher Evaluation System for STEM Education", accepted (Apr. 11, 2019) in International Journal of Electrical Engineering Education (SCI) P277.pdf 

3.Tung-Huang Feng, Neng-Yih Shih, and Min-Shiang Hwang*, “Safety Relay Selection Algorithms Based on Fuzzy Relationship for Wireless Sensor Networks,” The Journal of Supercomputing, vol. 75, no. 8, pp. 4601-4616, Aug. 2019. https://link.springer.com/article/10.1007/s11227-018-2547-7  (SCI)  P347.pdf

4.Min-Shiang Hwang, Cheng-Chi Lee, Shih-Ting Hsu, “An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme,” International Journal of Foundations of Computer Science, Vol. 30, No. 2, pp. 255–273, Mar. 2019.  (SCI)  P242.pdf

5.Tzu-Chun Lin, Ting-Yi Yeh, Min-Shiang Hwang, "Cryptanalysis of an ID-based Deniable Threshold Ring Authentication", International Journal of Network Security, Vol.21, No.2, pp. 298-302, Mar. 2019 (EI) P404.pdf

6.Shu-Fen Chiou, Hsieh-Tsen Pan, Eko Fajar Cahyadi, and Min-Shiang Hwang, "Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications", International Journal of Network Security, Vol. 21, No. 1, pp. 100-104, Jan. 2019 (EI) P386.pdf

7.Li-Chin Huang and Min-Shiang Hwang, "A Conference Key Scheme Based on the Diffie-Hellman Key Exchange", International Journal of Network Security, Vol. 20, No. 6, pp. 1221-1226, Nov. 2018 (EI) P.pdf

8. Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, and Min-Shiang Hwang, "A Survey of E-book Digital Right Management", International Journal of Network Security, Vol. 20, No. 5, pp. 998-1004, Sept. 2018 (EI)

9.Yu-Lun Wang, Jau-Ji Shen, and Min-Shiang Hwang, "A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching", International Journal of Network Security, Vol. 20, No. 4, pp. 801-804, July 2018 (EI) P379.pdf

10. Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang, "A Secure Group Signature Scheme", International Journal of Network Security, Vol. 20, No. 2, pp. 201-205, Mar. 2018 (EI) P222.pdf

11. Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang, "A Survey of Reversible Data Hiding for VQ-Compressed Images", International Journal of Network Security, Vol. 20, No. 1, pp. 1-8, Jan. 2018 (EI) P384.pdf

12. Nan-I Wu, Min-Shiang Hwang, “A Novel LSB Data Hiding Scheme with the Lowest Distortion,” The Imaging Science Journal, Volume: 65, Issue: 06, pages 371 – 378, Aug. 2017 (online). SCIE   P376.pdf   AU171207 http://www.tandfonline.com/doi/full/10.1080/13682199.2017.1355089

13. Ting-Yi Chang, Min-Shiang Hwang and Chou-Chen Yang, “Password Authenticated Key Exchange and Protected Password Change Protocols,” Symmetry, vol. 9, no. 8, pp. 1-12, July 2017. SCIE P177.pdf doi:10.3390/sym9080134. AU171207 http://www.mdpi.com/2073-8994/9/8/134

14. Nan-I Wu, Min-Shiang Hwang, “Development of A Data Hiding Scheme Based On Combination Theory For Lowering The Visual Noise In Binary Images,” Displays, vol.49, pp. 116-123, Sept. 2017. SCIE P217.pdf AU171207

15. Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang, "The Capacity Analysis in the Secure Cooperative Communication System", International Journal of Network Security, Vol. 19, No. 6, pp. 863-869, Nov. 2017 (EI) P298.pdf AU171207

16. Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang, "An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching", International Journal of Network Security, Vol. 19, No. 5, pp. 858-862, Sept. 2017 (EI) P372.pdf AU171207

17. Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang, "An Improved Key-Management Scheme for Hierarchical Access Control", International Journal of Network Security, Vol. 19, No. 4, pp. 639-643, July 2017 (EI) P348.pdf AU171207

18. Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin, “A Secure Privacy and Authentication Protocol for Passive RFID Tags,” International Journal of Mobile Communications, vol. 15, no. 3, pp. 266-277, 2017. (SSCI)  P085.pdf AU171207

19. Min-Shiang Hwang, Tsuei-Hung Sun, Cheng-Chi Lee, “Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service,” Journal of Circuits Systems and Computers, Vol. 26, No. 5 (2017) 1750072 (16 pages), DOI: 10.1142/S0218126617500724 (SCI, Impact Factor: 0.308, 2015 JCR: 47/51=0.92, subject categories COMPUTER SCIENCE, HARDWARE & ARCHITECTURE)  P310.pdf  AU171207

20. Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, and Min-Shiang Hwang, "A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms", International Journal of Network Security, Vol. 19, No. 3, pp. 443-448, May 2017 (EI)  P209.pdf

21. Chung-Huei Ling, Cheng-Chi Lee, Chou-Chen Yang, and Min-Shiang Hwang, "A Secure and Efficient One-time Password Authentication Scheme for WSN", International Journal of Network Security, Vol. 19, No. 2, pp. 177-181, Mar. 2017 (EI)  P231.pdf

22. Li-Chin Huang, Tung-Huang Feng, Min-Shiang Hwang, “A New Lossless Embedding Techniques Based on HDWT,” IETE Technical Review, vol. 37, issue 1, pp. 40-48, Jan. 2017. (SCI)  P244.pdf

23. Shih-Ming Chen, Ching-Rong Yang, and Min-Shiang Hwang, "Using a New Structure in Group Key Management for Pay-TV", International Journal of Network Security, Vol. 19, No. 1, pp. 112-117, Jan. 2017 (EI) P066.pdf

24. Tung-Huang Feng, Min-Shiang Hwang, Liang-Wei Syu, “An Authentication Protocol for Lightweight NFC Mobile Sensors Payment,” Informatica, vol. 27, no. 4, pp. 723-732, Dec. 2016  SCIE P358.pdf

25.  Iuon-Chang Lin, Yi-Lun Chi, Hung-Chieh Chuang, and Min-Shiang Hwang, "The Novel Features for Phishing Based on User Device Detection," Journal of Computers, Vol. 11, No. 2, pp. 109-115, March 2016. (P405)

26. Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang, "A Survey of Data Distortion Watermarking Relational Databases", International Journal of Network Security, Vol. 18, No. 6, pp. 1022-1033, 2016 (EI)  P356.pdf

27. Chi-Wei Liu, Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, " A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage", International Journal of Network Security, Vol. 18, No. 5, pp. 900-916, 2016 (EI) P367.pdf

28. Min-Shiang Hwang, Shih-Ming Chen and Chi-Yu Liu, Digital Signature with Message Recovery Based on Factoring and Discrete Logarithm, IETE Journal of Research, vol. 62, no. 3, pp. 415-423, Sept. 2016. (SCI)  P254.pdf AU171207

29. Chi-Wei Liu, Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, " A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing", International Journal of Network Security, Vol. 18, No. 4, pp. 650-666, 2016 (EI) P366.pdf

30. Chung-Huei Ling, Shih-Ming Chen, and Min-Shiang Hwang, "Cryptanalysis of Tseng-Wu Group Key Exchange Protocol", International Journal of Network Security, Vol. 18, No. 3, pp. 590-593, 2016 (EI)  P345.pdf

31. Chung-Huei Ling, Wei-Fu Hsien, and Min-Shiang Hwang, "A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach", International Journal of Network Security, Vol. 18, No. 2, pp. 397-400, 2016 (EI)  P344.pdf

32. Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, "A Survey of Public Auditing for Secure Data Storage in Cloud Computing", International Journal of Network Security, Vol. 18, No. 1, pp. 133-142, 2016.  P363.pdf

33. Min-Shiang Hwang, Song-Kong Chong, and Hsia-Hung Ou,“The Moderately Hard DoS-resistant Authentication Protocol on Client Puzzles,” INFORMATICA, Vol. 27, No. 1, 1–18, 2016. (SCI)  P230.pdf

34. Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang, “Cases Study and Analysis of the Court Judgement of Cybercrimes in Taiwan,” International Journal of Law, Crime and Justice, Volume 43, Issue 4, Pages 412–423, December 2015. (SSCI)  P327.pdf

35. Tung-Huang Feng, Neng-Yih Shih, and Min-Shiang Hwang, "A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks," International Journal of Network Security, Volume 17, Number 6, pp. 712-721, Nov. 2015. (EI)  P362.pdf

36. Jia-Rong Sun, Mao-Lin Shih, and Min-Shiang Hwang, "A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure," International Journal of Network Security, vol. 17, no. 5, pp. 497-509, 2015. (EI)  P359.pdf

37. Chia-Hui Wei, Min-Shiang Hwang, and Augustin Yeh-hao Chin, “Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection,” IETE Technical Review, vol. 32, no. 3, pp. 183-187, 2015. (SCI)  P304.pdf Asia(150525)

38. YanLi Ren, Shuozhong Wang, Xinpeng Zhang, and Min-Shiang Hwang, "An Efficient Batch Verifying Scheme for Detecting Illegal Signatures," International Journal of Network Security, Volume 17, Number 4, July 2015, pp. 463-470 (EI)  P303.pdf

39. Tung-Huang Feng, Wei Teng Li, and Min-Shiang Hwang, "A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey," International Journal of Network Security, vol. 17, no. 3, pp. 229-236, 2015. (EI)  P341.pdf

40. Min-Shiang Hwang, Cheng-Chi Lee, Pei-Shan Chung, “An Efficient IC-Lock Self-Reader Data Security in Cloud Computing,” Applied Mathematics & Information Sciences, vol. 9, no. 4, pp. 2099-2106, Jul. 2015. (SCI, Impact Factor: 1.232, 2013 JCR: 53/250=0.21, subject categories MATHEMATICS, APPLIED) P314.pdf     

41. Heri Wijayanto and Min-Shiang Hwang, "Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance," International Journal of Network Security, Volume 17, Number 2, Mar. 2015, pp. 160-164 (EI)  P354.pdf

42. Wei Teng Li, Chung-Huei Ling, and Min-Shiang Hwang, "Group Rekeying in Wireless Sensor Networks: A Survey," International Journal of Network Security, Volume 16, Number 6, Nov. 2014, pp. 401-410 (EI)  P339.pdf   

43. Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee, “A New Public Key Encryption with Conjunctive Field Keyword Search Scheme,” Information Technology and Control, vol. 43, no. 3, pp. 277-288, Sep. 2014. (SCI, Impact Factor: 0.813, 2013 JCR: 86/135=0.63, subject categories COMPUTER SCIENCE, INFORMATION SYSTEMS) P324.pdf  

44. Wei Teng Li, Tung-Huang Feng, and Min-Shiang Hwang, "Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey," International Journal of Network Security, Volume 16, Number 5, Sep. 2014, pp. 323-330 (EI)  P337.pdf   

45. Min-Shiang Hwang, Cheng-Chi Lee, Tsuei-Hung Sun, “Data Error Locations Reported by Public Auditing in Cloud Storage Service,” Automated Software Engineering, vol. 21, no. 3, pp. 373-390, Sep. 2014. (SCI, Impact Factor: 1.4, 2012 JCR: 28/105=0.26, subject categories COMPUTER SCIENCE, SOFTWARE ENGINEERING) P311.pdf   

46. Li-Chin Huang, Min-Shiang Hwang, Wei-Pang Yang, “A Conference Key Distribution Scheme in Tree Hierarchies,” BRIS Journal of Advances in Science and Technology, vol. 2, no. 4, pp.76-81, July 2014.    P190.pdf

47. Min-Shiang Hwang, Shu-Yin Hsiao, Wei-Pang Yang, “Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178, Apr. 2014. (SCIE)  P204.pdf  

48. Tung-Huang Feng, Chung-Huei Ling, and Min-Shiang Hwang, "Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments," International Journal of Network Security, Volume 16, Number 4, July 2014 , pp. 318-321 (EI)  P241.pdf   

49. Li-Chin Huang and Min-Shiang Hwang, "An Efficient MQV Key Agreement Scheme," International Journal of Network Security, Volume 16, Number 2, Mar. 2014 , pp. 157-160 (EI)  P172.pdf   

50. Pei-Shan Chung, Chi-Wei Liu, and Min-Shiang Hwang, "A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments," International Journal of Network Security, Volume 16, Number 1, Jan. 2014 , pp. 1-13 (EI)  P321.pdf   

51. Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan, “Towards Secure and Efficient User Authentication Scheme Using Smart Card for Multi-Server Environments,” The Journal of Supercomputing, vol. 66, no. 2, pp. 1008-1032, Nov. 2013. (SCI, Impact Factor: 0.917, 2012 JCR: 39/100=0.39, subject categories COMPUTER SCIENCE, THEORY & METHODS)  P140.pdf    

52. Min-Yu Chen, Chou-Chen Yang, Min-Shiang Hwang, “Privacy Protection Data Access Control,” International Journal of Network Security vol. 15, no. 6, pp. 391-399, Nov. 2013. (EI)  P318.pdf  

53. Min-Shiang Hwang, Tsuei‑Hung Sun, "Using Smart Card to Achieve a Single Sign-on for Multiple Cloud Services," IETE Technical Review, Volume 30, Number 5, Sept 2013 , pp. 410-416 (SCIE)  P305.pdf  

54. Hsia-Hung Ou, Min-Shiang Hwang, "Double Delegation-based Authentication and Key Agreement Protocol for PCSs", Wireless Personal Communications, Volume 72, Issue 1, Page 437-446, Sep. 2013.  (SCIE) P236.pdf  

55. Song-Kong Chong, Cheng-Chi Lee, Min-Shiang Hwang, “An Authentication Scheme for the Global Mobility Network,” Parallel Processing Letters, vol. 23, no. 4, pp. , Sep. 2013. (10pages) (EI)  P203.pdf  

56. Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang, “A Study of Conjunctive Keyword Searchable Schemes,” International Journal of Network Security, vol. 15, no. 5, pp. 311-320, Sept. 2013. (EI)  P320.pdf  

57. Shu-Fen Chiou, Yung-Chih Lu, I-En Liao, and Min-Shiang Hwang, "An Efficient Reversible Data Hiding Scheme Based on SMVQ," Imaging Science Journal, Volume 61, Number 6, July 2013 , pp. 467-474 (SCIE)  P125.pdf  

58. Li-Chin Huang, Min-Shiang Hwang, Lin-Yu Tseng, “Reversible and high-capacity data hiding in high quality medical images,” KSII Transactions on Internet and Information Systems, Vol. 7, No. 1, pp. 132-148, 2013 (SCIE) P274.pdf  

59. Li-Chin Huang, Min-Shiang Hwang, and Lin-Yu Tseng, “Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map,” Journal of Electronic Science and Technology, vol. 11, no. 2, pp. 230-236, June 2013. (EI)  P317.pdf  

60. Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang, “A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments,” International Journal of Network Security vol. 15, no. 4, pp. 231-240, July 2013. (EI) P319.pdf  

61. Tzu-Chun Lin, Te-Yu Chen, Chiun-Shiang Gau, Min-Shiang Hwang, “A Key Agreement for Large Group Using Bilinear Maps,” Journal of Theoretical and Applied Information Technology (EI), Vol. 49, Issue 2, p871-878, Mar. 2, 2013. And  2nd International Workshop on Computing and Services for Industry and Applied Science (CSIAS 2013) P096.pdf  

62. Jung-Wen Lo, Min-Shiang Hwang, and Chia-Hsin Liu, “A Simple Key Assignment for Access Control Based on Polynomial”, The Arabian Journal for Science and Engineering (AJSE), vol. 38, Issue 6, Page 1397-1403, June 2013. (SCIE)   P150.pdf  

63. Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, “A New Proxy Signature Scheme for a Specified Group of Verifiers,” Information Sciences, vol. 227, pp. 102-115, April 2013. (SCI, Impact Factor: 2.833, 2011 JCR: 9/133=0.06, subject categories COMPUTER SCIENCE, INFORMATION SYSTEMS) P144.pdf  

64. Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang, "A Reversible Data Hiding Method by Histogram Shifting in High Quality Medical Images", Journal of Systems and Software, Vol. 86, no. 3, pp. 716-727, Mar. 2013. (SCIE)  P282.pdf

65. Shih-Ting Hsu, Chou-Chen Yang, and Min-Shiang Hwang, "A Study of Public Key Encryption with Keyword Search", International Journal of Network Security, vol. 15, no. 2, pp. 71-79, Mar. 2013.  P316.pdf

66. Li-Chin Hwang, Cheng-Chi Lee, and Min-Shiang Hwang, “A n2+n MQV Key Agreement Protocol”, International Arab Journal of Information Technology (IAJIT), vol. 10, no. 2, pp. 137-142, Mar. 2013. (SCIE)  P173.pdf  

67. Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A New Group Signature Scheme Based on RSA Assumption", Information Technology and Control, vol. 42, no. 1, pp. 61-66, 2013. P110.pdf

68. Jung-Wen Lo, Hung-Miao Lu, Tsuei-Hung Sun and Min-Shiang Hwang, "Improved on Date Attachable Electronic Cash," Applied Mechanics and Materials, vol. 284-287, pp 3444-3448, Jan. 2013.  P234.pdf

69. Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang, "A Reversible Data Hiding Method by Histogram Shifting in High Quality Medical Images" Journal of Systems and Software, Vol. 86, no. 3, pp. 716-727, Mar. 2013. (SCIE)  P282.pdf

70. Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, “A New Proxy Signature Scheme for a Specified Group of Verifiers,” Information Sciences, vol. 227, pp. 102-115, April 2013. (SCI) P144.pdf

71. Cheng-Chi Lee, Chia-Hsin Liu, and Min-Shiang Hwang, "Guessing Attacks on Strong-Password Authentication Protocol", International Journal of Network Security, vol. 15, no. 1, pp. 64-67, Jan. 2013. (EI)   P207.pdf

72. Li-Chin Huang, Lin-Yu Tseng, and Min-Shiang Hwang, "The Study on Data Hiding in Medical Images", International Journal of Network Security, vol. 14, no. 6, pp. 301-309, Nov. 2012. (EI)   P295.pdf

73. Shu-Fen Chiou, Min-Shiang Hwang, Song-Kong Chong, "A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS", International Journal of Advancements in Computing Technology (IJACT), vol. 4, no. 19, pp. 529-535, Oct. 2012. (EI)   P223.pdf

74. Ting-Yi Chang, Min-Shiang Hwang, Wei-Pang Yang, Kuo-Cheng Tsou, "A Modified Ohta-Okamoto Digital Signature for Batch Verification and Its Multi-Signature Version", International Journal of Engineering and Industries (IJEI), vol. 3, no. 3, pp. 75-83, Sep. 2012. (EI)  P210.pdf

75. Li-Chin Huang and Min-Shiang Hwang, "Study of an Intrusion Detection System," Journal of Electronic Science and Technology, vol. 10, no. 3, pp.269-275, Sept. 2012. (EI)   P275.pdf

76. Te-Yu Chen, Min-Shiang Hwang, and Jinn-Ke Jan, “A Secure Image Authentication Scheme for Tamper Detection and Recovery”, Imaging Science Journal, Volume 60, Number 4, pp. 219-233, August 2012. (SCIE)  P299.pdf

77. Chia-Hui Wei, Min-Shiang Hwang and Augustin Yeh-Hao Chin, "An Improved Authentication Protocol for Mobile Agent Device in RFID," International Journal of Mobile Communications, vol. 10, no. 5, pp.508-520, 2012. (SSCI)  P250.ps   P250.pdf

78. Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, "An Effective AKA Protocol for UMTS," International Journal of Mobile Communications, Vol. 10, No. 4, PP. 427-448. (SSCI)  P281.ps  P281.pdf

79. Chun-Ta Li, Min-Shiang Hwang, "Security Enhancement of Chang-Lee Anonymous E-Voting Scheme," International Journal of Smart Home, vol. 6, no. 2, pp. 45-52, Apr. 2012. (EI)  P284.pdf

80. Tsuei-Hung Sun and Min-Shiang Hwang, “A Hierarchical Data Access and Key Management in Cloud Computing”, ICIC Express Letters, Vol. 6, No.2, pp. 569-574, 2012. (EI)   P175.ps   P175.pdf

81. Chun-Ta Li, Chou-Chen Yang, and Min-Shiang Hwang, “A Secure Routing Protocol with Node Selfishness Resistance in MANETs”, International Journal of Mobile Communications (IJMC), vol. 10, no. 1, pp. 103-118, Jan. 2012. (SSCI)   P293.ps   P293.pdf

82. Chia-Chun Wu, Shang-Juh Kao, and Min-Shiang Hwang, “A High Quality Image Sharing with Steganography and Adaptive Authentication Scheme”, Journal of Systems and Software, vol. 84, no. 12, pp. 2196-2207. (SCIE) P302.pdf

83.  Chun-Ta Li, Min-Shiang Hwang, “A Lightweight Anonymous Routing Protocol without Public Key En/Decryptions for Wireless Ad Hoc Networks”, Information Sciences, vol. 181, no. 23, pp. 53335347, Dec. 2011. (SCIE) P262.ps   P262.pdf

84.    Cheng-Chi Lee, Min-Shiang Hwang and I-En Liao, “On the Security of Self-Certified Public Keys”, International Journal of Information Security and Privacy, vol. 5, no. 2, pp. 55-62, Apr. 2011.  P084.ps  P084.pdf

85.    Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou, "On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol”, European Transactions on Telecommunications, vol. 22, no. 3, pp. 99-112, Apr. 2011. (SCIE).  P258.ps  P258.pdf

86.    Chia-Hui Wei, Min-Shiang Hwang, and Augustin Yeh-Hao Chin, “An Authentication Protocol for Low-cost RFID Tags”, International Journal of Mobile Communications, Vol. 9, No. 2, PP. 208-223, 2011. (SSCI)  P041.ps   P041.pdf

87.    Ting-Yi Chang and Min-Shiang Hwang, “User-Anonymous and Short-Term Conference Key Distribution System via Link-Layer Routing in Mobile Communications”, International Journal of Mobile Communications, vol. 9, No. 2, PP. 144-158, 2011. (SSCI)  P114.ps  P114.pdf

88.    Ting-Yi Chang and Min-Shiang Hwang, Wei-Pang Yang "An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem", Information Technology and Control, vol.40, No.3, PP. 246-251, 2011. (SCIE) P130.ps  P130.pdf

89.    Cheng-Chi Lee, Tzu-Chun Lin, Shiang-Feng Tzeng and Min-Shiang Hwang, “Generalization of Proxy Signature Based on Factorization”, International Journal of Innovative Computing, Information and Control, vol. 7, no. 3, pp. 1039-1054, Mar. 2011. (SCI)  P143.ps  P143.pdf

90.    Shiang-Feng Tzeng, Cheng-Chi Lee, and Min-Shiang Hwang, “A Batch Verification for Multiple Proxy Signature”, Parallel Processing Letters, vol. 21, no. 1, pp. 77-84, March 2011. (EI)  P128.ps  P128.pdf

91.    Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-hao Chin, "A Mutual Authentication Protocol for RFID”, IEEE IT Professional, vol. 13, no. 2, pp. 20-24, March/April 2011.  P097.pdf

92.    Shu-Fen Chiou, I-En Liao, and Min-Shiang Hwang, “A capacity-enhanced reversible data hiding scheme based on SMVQ”, Imaging Science Journal, vol. 59, no. 1, pp. 17-24, Feb. 2011. (SCI)  P291.pdf

93.    Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu, "An Efficient Key Assignment Scheme for Access Control in a Class Hierarchy”, Information Sciences, vol. 181, no. 4, pp. 917-925, Feb. 2011. (SCIE)  P170.ps  P170.pdf

94.    Ting-Yi Chang; Min-Shiang Hwang, Wei-Pang Yang, "A Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol”, Information Sciences, vol. 181, pp. 217-226, 2011. (SCIE).    P188.ps   P188.pdf

95.    Cheng-Chi Lee, I-En Liao, and Min-Shiang Hwang, “An Efficient Authentication Protocol for Mobile Communications", Telecommunication Systems, vol. 46, no. 1, pp. 31-41, Jan. 2011. (SCI)  P283.ps  P283.pdf

96.    Jung-Wen Lo, Ji-Zhe Lee, Min-Shiang Hwang, Yen-Ping Chu, "An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Journal of Internet Technology, vol. 11, no. 7, pp. 997-1004, Dec. 2010. (SCIE).  P187.ps  P187.pdf

97.    Chun-Ta Li and Min-Shiang Hwang, Shih-Ming Chen, “A Batch Verifying and Detecting the Illegal Signatures”, International Journal of Innovative Computing, Information and Control, vol. 6, no. 12, pp. 5311-5320, Dec. 2010. (SCI)  P245.ps  P245.pdf

98.    Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “A provable billing protocol on the current UMTS”, Wireless Personal Communications, vol. 55, no. 4, pp. 551-556, 2010. (SCI)  P287.ps   P287.pdf

99.    Jung-Wen Lo, Cheng-Chi Lee, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient ECC-based AKA Protocol for Wireless Mobile Communications”, International Journal of Innovative Computing, Information and Control, vol. 6, no. 11, pp. 5249-5258 , Nov. 2010. (SCI)   P233.ps  P233.pdf

100.Jung-Wen Lo, Shu-Chen Lin, Min-Shiang Hwang, “A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments”, Information Technology and Control, vol. 39, no. 2, pp. 146-151, 2010. (SCI)  P212.ps  P212.pdf

101.Chun-Ta Li, Min-Shiang Hwang, “An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 5, pp. 2181-2188, May 2010. (SCI)  P246.ps   P246.pdf

102.Cheng-Chi Lee, Tzu-Chun Lin, Min-Shiang Hwang, “A Key Agreement Scheme for Satellite Communications”, Information Technology and Control,
vol. 39, no. 1, pp. 43-47, March 2010.  
P178.ps   P178.pdf

103.Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “A Cocktail Protocol with the Authentication and Key Agreement on the UMTS”, Journal of Systems and Software, vol. 83, no. 2, pp. 316-325, Feb. 2010. (SCI)  P292.ps   P292.pdf

104.Chun-Ta Li and Min-Shiang Hwang, “An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards”, Journal of Network and Computer Applications, vol. 33, pp. 1-5, 2010. (SCI)  P240.ps  P240.pdf

105.Cheng-Chi Lee, Ting-Yi Chang, Min-Shiang Hwang, “A New Group Signature Scheme Based on the Discrete Logarithm”, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 54-57, 2010.  P112.ps  P112.pdf

106.Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen, “DoS-resistant ID-based Password Authentication Scheme Using Smart Cards”, Journal of Systems and Software, vol. 83, pp. 163-172, Jan. 2010. (SCI)  P229.ps  P229.pdf

107.Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng, "A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem", International Journal of Foundations of Computer Science, Vol. 20, Iss. 2, pp. 351-359, 2009. (SCI)  P161.ps  P161.pdf

108.Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “The UMTS-AKA Protocols for Intelligent Transportation Systems”, EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 1-12, 2009. (SCI) P247.ps   P247.pdf

109.Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin, "A New English Auction Scheme Using the Bulletin Board System", Information Management and Computer Security, Vol. 17, No. 5, pp. 408-417, Nov. 2009. (EI)  P139.ps   P139.pdf

110. Te-Yu Chen, Min-Shiang Hwang and Jinn-Ke Jan, “Adaptive Authentication Schemes for 3D Mesh Models”, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 12, pp. 4561-4572, Dec. 2009. (SCI)  P289.ps  P289.pdf  

111. Meng-Hsiun Tsai, Shu-Fen Chiou and Min-Shiang Hwang, “A Simple Method for Detecting Protein Spots in 2D-GE Images Using Image Contrast”, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 12, pp. 4617-4626, Dec. 2009. (SCI)    P257.ps   P257.pdf

112. Min-Shiang Hwang, Shiang-Feng Tzeng and Shu-Fen Chiou, "A Non-repudiable Multi-Proxy Multi-Signature Scheme", Innovative Computing, Information and Control Express Letters, Vol.3, No.3, pp. 259-264, September 2009.  P119.ps  P119.pdf

113. Min-Shiang Hwang, Chia-Hui Wei, Cheng-Yee Lee, "Privacy and Security Requirements for RFID Applications”, Journal of Computers (Taiwan), Vol. 20, No. 3, pp. 55-60, Oct. 2009.  P103.pdf

114. C.T. Li, Min-Shiang Hwang and Y.P. Chu, “An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, Aug. 2009. (SCI)  P157.ps  P157.pdf

115. Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, and Jinn-Ke Jan, “TK-AKA: Using Temporary Key on Authentication and Key Agreement Protocol on UMTS”, International Journal of Network Management, vol. 19, no. 4, pp. 291-303, July 2009.  P286.ps   P286.pdf

116. Cheng-Chi Lee, Pi-Fang Ho, Min-Shiang Hwang, "A Secure E-Auction Scheme Based on Group Signatures", Information Systems Frontiers, Volume 11, Number 3, pp. 335-343, July 2009 (SCI)  P224.ps  P224.pdf

117. Chia-Chun Wu, Min-Shiang Hwang, and Shang-Juh Kao, "A New Approach to the Secret Image Sharing with Steganography and Authentication", Imaging Science Journal, Vol. 57, Num. 3, pp. 140-151, June 2009. (SCI)   P263.pdf

118. Song Han, Elizabeth Chang, Tharam Dillon, Min-Shiang Hwang, and Cheng-Chi Lee, "Identifying Attributes and Insecurity of A Public-channel Key Exchange Protocol Using Chaos Synchronization", Chaos Solitons & Fractals, Volume 40, Issue 5, Pages 2569-2575, June 2009,  (SCI)  P300.pdf

119. Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang, “An Extended Certificate-based Authentication and Security Protocol for Mobile Networks”, Information Technology and Control, vol. 38, no. 1, pp. 61-66, 2009.  P067.ps   P067.pdf

120. Cheng-Chi Lee, Min-Shiang Hwang, Shu-Yin Hsiao, "A Fair Non-transfer Exchange Protocol", International Journal of Electrical and Computer Engineering, vol. 4, no. 14, pp. 879-885, 2009. (EI)   P220.ps  P220.pdf

121. Meng-Hsiun Tsai, Shu-Fen Chiou, and Min-Shiang Hwang, “A Progressive Image Transmission Method for 2D-GE Image Based on Context Feature with Different Thresholds”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 2, pp. 379-386, Feb. 2009. (SCI)  P256.ps   P256.pdf

122. Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, "A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm", International Journal of Applied Mathematics and Computer Sciences, Volume 5, Issue 1, pp. 33-38, 2009.  P123.ps  P123.pdf

123. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments”, Computer Communications, Vol. 31, no. 18, pp. 4255-4258, Dec. 2008. (SCI)  P219.ps   P219.pdf

124. Nan-I Wu, Chung-Ming Wang, Chwei-Shyong Tsai, Min-Shiang Hwang, “A Certificate-based Watermarking Scheme for Coloured Images”, The Image Science Journal, vol. 56, pp. 326-332, 2008. (SCI)  P197.ps   P197.pdf

125. Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong, “An Improved Address Ownership in Mobile IPv6”, Computer Communications, vol. 31, pp. 3250-3252, 2008. (SCI)  P249.ps  P249.pdf

126. Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong and Jung-Wen Lo, “A Key Management for Wireless Communications”, International Journal of Innovative Computing, Information and Control, Vol. 4, No. 8, pp. 2045-2056, August 2008. (SCI)  P202.ps  P202.pdf

127. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks”, Computer Communications, vol. 31, no. 12, pp. 2803-2814, July 2008. (SCI)  P227.ps   P227.pdf

128. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, “A New Authentication Protocol Based on Pointer Forwarding for Mobile Communications”, Wireless Communications & Mobile Computing, vol. 8, no. 5, pp. 661-672, 2008. (SCI)  P073.ps  P073.pdf

129. Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu, “An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks”, Computer Communications, vol. 31, issue 10, pp. 2534-2540, June 2008. (SCI)    P196.ps   P196.pdf

130. Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai and Min-Shiang Hwang, “A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function”, The Journal of Systems and Software, Vol. 81, Iss. 1, pp. 150-158, 2008. (SCI)  P265.ps  P265.pdf

131. Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin, “An Efficient Multi-Round Anonymous Auction Protocol”, Journal of Discrete Mathematical Sciences & Cryptography, vol. 10, no. 4, pp. 547-557, Aug. 2007.  P109.ps   P109.pdf

132. Hsia-Hung Ou, Min-Shiang Hwang, Jinn-Ke Jan, “A Simple Mobile Communication Billing System Among Charged Parties”, Applied Mathematics and Computation, vol. 192, no. 2, pp. 487-495, Sep. 2007. (SCI)   P280.ps   P280.pdf

133. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Improving the Security of a Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks”, International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, May 2008. (SCI)  P288.ps   P288.pdf

134. Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang, "A New Convertible Authenticated Encryption Scheme with Message Linkages", Computers and Electrical Engineering, vol. 33, no. 2, pp. 133-138, Mar. 2007. [SCI]  P160.ps  P160.pdf

135. Nan-I Wu and Min-Shiang Hwang, "Data Hiding: Current Status and Key Issues", International Journal of Network Security, vol. 4, no. 1, pp. 1-9, Jan. 2007.   P273.ps  P273.pdf

136. Yung-Chin Chen, Wei-Lin Wang, Min-Shiang Hwang, "Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection", Asian Journal of Health and Information SCiences, Vol. 1, no. 2, pp. 189-203, 2006.  

137. Hui-Chieh Lu, Yen-Ping Chu, Min-Shiang Hwang, "A New Steganographic Method of The Pixel-value Differencing", The Journal of Imaging Science and Technology, Vol. 50, no. 5, pp. 424-426, Oct., 2006. IF: 0.522  8/12 [SCI]  P179.ps  P179.pdf

138. Min-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, "Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows", IEICE Transactions on Information and Systems, vol. E89-D, no. 4, pp. 1575-1577, 2006. [SCI]  P198.ps  P198.pdf

139. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, "Security Enhancement on a New Authentication Scheme with Anonymity For Wireless Environments", IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683-1687, Oct. 2006. [SCI]  P261.ps  P261.pdf

140.  Chwei-Shyong Tsai, Cheng-Chi Lee, and Min-Shiang Hwang, "Password Authentication Schemes: Current Status and Key Issues", International Journal of Network Security, vol. 3, no. 2, pp. 101-115, Sept. 2006.  P279.ps  P279.pdf

141. Chih-Wei Lin, Chwei-Shyong Tsai, Min-Shiang Hwang, "A New Strong-Password Authentication Scheme Using One-way Hash Functions", International Journal of Computer and Systems Sciences, vol. 45, no. 4, pp. 623-626, July 2006.    P184.pdf

142. I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, "A Password Authentication Scheme Over Insecure Networks", Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740, June 2006. [SCI]   P232.ps  P232.pdf

143. Min-Shiang Hwang and Pei-Chen Sung, "A Study of Micro-payment Based on One-way Hash Chain", International Journal of Network Security, vol. 2, no. 2, pp. 81-90, Mar. 2006.  P268.pdf

144. Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures", Applied Mathematics and Computation, vol. 172, no. 2, pp. 1195-1200, Jan. 2006. [SCI]  P131.ps  P131.pdf

145. Min-Shiang Hwang and Ting-Yi Chang, "Threshold Signatures: Current Status and Key Issues", International Journal of Network Security, vol. 1, no. 3, pp. 123-137, Nov. 2005.  P269.pdf

146. Hsien-Chu Wu, Na-I Wu, Chwei-Shyong Tsai, Min Shiang Hwang, "Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods", IEE Proceedings Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611-615, Oct. 2005. [SCI]    P211.ps   P211.pdf

147. Min Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, and Chao-Chen Yang, "A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography", Telecommunication Systems, vol. 29, no. 3, pp. 165-180, 2005. [SCI]  P145.ps  P145.pdf

148. Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang, "A Time-Stamping Protocol for Digital Watermarking", Applied Mathematics and Computation, vol. 169, pp. 1276-1284, 2005. [SCI]  P057.pdf

149. Hsien-Chu Wu, Min-Shiang Hwang, Chia-Hsin Liu, "A Secure Strong-Password Authentication Protocol", Fundamenta Informaticae, vol. 68, pp. 399-406, 2005. [SCI]  P208.ps   P208.pdf

150.Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "A User Authentication System Using Back-Propagation Network", Neural Computing & Applications, vol. 14, no. 3, pp. 243-249, Sep. 2005. [SCI] P100.ps   P100.pdf

151.Min-Shiang Hwang and Chi-Yu Liu, "Authenticated Encryption Schemes: Current Status and Key Issues", International Journal of Network Security, vol. 1, no. 2, pp. 61-73, Sept. 2005.  P271.ps   P271pdf

152.Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Improvement on the Flexible Tree-Based Key Management Framework", Computers & Security, vol. 24, pp. 500-504, 2005. [SCI]   P214.ps   P214.pdf

153.Cheng-Chi Lee, Ting-Yi Chang, Min-Shiang Hwang, "A Simple Broadcasting Cryptosystem in Computer Networks Using Exclusive-OR", International Journal of Computer Applications in Technology, vol. 24, no. 3, pp. 180-183, 2005. [EI]  P219.ps  P219.pdf

154.Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang, "Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys", Applied Mathematics and Computation, vol. 166, no. 1, pp. 118-122, July 2005. [SCI]  P181.ps   P181.pdf

155.Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang, "The General Pay-Word: A Micro-payment Scheme Based on N-dimension One-way Hash Chain", Designs, Codes and Cryptography, vol. 36, no. 1, pp. 53-67, July 2005. [SCI]   P079.ps   P079.pdf

156.Min-Shiang Hwang and Cheng-Chi Lee, "Research Issues and Challenges for Multiple Digital Signatures", International Journal of Network Security, vol. 1, no. 1, pp. 1-7, July 2005.  P270.ps   P270.pdf

157.Ting-Yi Chang, Wei-Pang Yang, Min-Shiang Hwang, "Simple Authenticated Key Agreement and Protected Password Change Protocol", Computers & Mathematics with Applications, vol. 49, pp. 703-714, 2005. [SCI]  P176.ps  P176.pdf

158.Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Yang, "A New Blind Signature Based on the Discrete Logarithm Problem for Untraceability", Applied Mathematics and Computation, Vol. 164, no. 3, pp. 837-841, May 2005. [SCI]  P023.ps   P023.pdf

159.Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, "An Improvement on the Lin-Wu (t, n) Threshold Verifiable Multi-secret Sharing Scheme", Applied Mathematics and Computation, Vol 163, no. 1, pp 169-178, 2005. [SCI]  P138.ps   P138.pdf

160.Shiang-Feng Tzeng, Min-Shiang Hwang, Hsing-Bai Chen, "A Secure On-line Software Transaction Scheme", Computer Standards & Interfaces, vol. 27, no. 3, pp.303-312, Mar. 2005. [SCI]  P215.ps   P215.pdf

161.Eric Jui-Lin Lu, Min-Shiang Hwang, and Cheng-Jian Huang, "A New Proxy Signature Scheme with Revocation", Applied Mathematics and Computation, Vol. 161, No. 3, PP. 799-806, Feb. 2005.   P255.pdf

162.Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang, "Improvement of Signature Scheme Based on Factoring and Discrete Logarithms", Applied Mathematics and Computation, Vol. 161, no. 1, pp. 49-54, Feb. 2005. [SCI]  P159.ps   P159.pdf 

163.Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, “A New Multi-stage Secret Sharing Scheme Using One-way Function”, ACM Operating Systems Review, vol. 39, no. 1, pp. 48-55, Jan. 2005. [EI]  P111.ps   P111.pdf

164.Min-Shiang Hwang, Jung-Wen Lo, Chi-Yu Liu, Shu-Chen Lin, "Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card", Pakistan Journal of Applied Sciences, vol. 5, no. 1, pp. 99-100, Jan. 2005  P154.pdf

165.Min-Shiang Hwang, Chun-Ta Li, Jau-Ji Shen, Yen-Ping Chu, "Challenges in e-Government and Security of Information", Information & Security: An International Journal, Vol. 15, No. 1, pp. 9-20, 2004.  P239.ps   P239.pdf

166.Ting-Yi Chang, Min-Shiang Hwang, Wei-Pang Yang, "Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System without Using a One-way Hash Function", Information & Security: An International Journal, Vol. 15, No. 1, pp. 110-114, 2004.  P152.ps   P152.pdf

167.Jau-Ji Shen, Iuon-Chang Lin, Min-Shiang Hwang, "A Secure LITESET Scheme", IEICE Transactions on Information and Systems, Vol. E87-D, no. 11, pp. 2509-2512, 2004. [SCI]   P058.ps   P058.pdf

168.Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang, "On the Efficiency of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", The Journal of Systems and Software, vol. 73, no. 3, pp. 507-514, Nov. 2004. [SCI]   P117.ps   P117.pdf

169.Min-Shiang Hwang, Jung-Wen Lo, Shu-Chen Lin, "An Efficient User Identification Scheme Based on ID-based Cryptosystem", Computer Standards & Interfaces, vol. 26, no. 6, pp.565-569, Oct. 2004. [SCI]  P206.ps   p206.pdf

170.Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang, “Cryptanalysis of an Efficient Secure Group Signature Scheme”, ACM Operating Systems Review, vol. 38, no. 4, pp. 67-69, Oct. 2004. [EI]  P218.ps   P218.pdf

171.Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "Cryptanalysis of Simple Authenticated Key Agreement Protocols", IEICE Transactions on Foundations, vol. E87-A, no. 8, pp. 2174-2176, Aug. 2004. [SCI]  P167.ps   P167.pdf

172.Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "A Threshold Signature Scheme for Group Communications without a Shared Distribution Center", Future Generation Computer Systems, vol. 20, no. 6, pp. 1013-1021, Aug. 2004. [SCI]   P146.ps   P146.pdf

173.Chwei-Shyong Tsai, Min-Shiang Hwang, Pei-Chen Sung, "Blind Signature Scheme Based on Elliptic Curve Cryptography", Journal of Computer Society of India, vol. 34, no. 3, pp. 58-60, July 2004. [EI]  P191.pdf

174.Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, "A New Anonymous Channel Protocol in Wireless Communications", International Journal of Electronics and Communications, vol. 58, pp. 218-222, 2004. [SCI]  P171.ps   P171.pdf

175.Chou-Chen Yang, Jian-Wei Li, Min-Shiang Hwang, "A New Mutual Authentication and Key Exchange Protocol with Balanced Computational Power for Wireless Settings", European Transactions on Telecommunications, vol. 15, no. 2, pp. 91-99, 2004. [SCI]  P141.ps   P141.pdf

176.Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack", Fundamenta Informaticae, vol. 61, no. 3, pp. 389-398, July 2004. [SCI]  P200.ps   P200.pdf

177.Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee, “A Key Authentication Scheme With Non-repudiation”, ACM Operating Systems Review, vol. 38, no. 3, pp. 75-78, July. 2004. [EI]  P031.ps   P031.pdf

178.Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "Cryptanalysis of Publicly Verifiable Authenticated Encryption", IEICE Transactions on Foundations, vol. E87-A, no. 6, pp. 1645-1646, June 2004. [SCI]  P194.ps   P194.pdf

179.Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A Nonrepudiable Threshold Multi-Proxy Multi-Signature Scheme with Shared Verification", Future Generation Computer Systems, vol. 20, no. 5, PP. 887-893, June 2004. [SCI]  P122.ps   P122.pdf

180.Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "Efficient Access Control and Key Management Schemes for Mobile Agents", Computer Standards & Interfaces, vol. 26, no. 5, pp. 423-433, May 2004. [SCI] P093.ps   P093.pdf

181.Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "Threshold Untraceable Signature for Group Communications", IEE Proceedings – Communications, vol. 151, no. 2, pp. 179-184, April 2004. [SCI] P069.ps P069.pdf

182.Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang, "An Improvement of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", Computers & Security, vol. 23, no. 2, pp. 174-178, April 2004. [SCI]  P132.ps   P132.pdf

183.Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, “A Server-Assissted Authentication Protocol for Detecting Error Vectors”, ACM Operating Systems Review, vol. 38, no. 2, pp. 93-96, Apr. 2004. [EI]  P113.ps  P113.pdf

184.Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A (t,n) Multi-secret Sharing Scheme", Applied Mathematics and Computation, Vol. 151, No. 2 , pp. 483-490, April 2004. [SCI]  P120.ps   P120.pdf

185.Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong Tsai, "Generalization of Proxy Signature Based on Elliptic Curves", Computer Standards & Interfaces, vol. 26, no. 2, pp. 73-84, March 2004. [SCI]  P149.ps   P149.pdf

186.Shiang-Feng Tzeng, Min-Shiang Hwang, "Digital Signature with Message Recovery and Its Variants Based on Elliptic Curve Discrete Logarithm Problem", Computer Standards & Interfaces, vol. 26, no. 2, pp. 61-71, March 2004. [SCI]  P162.ps   P162.pdf

187.Chin-Chen Chang, Kuo-Lun Chen, Min-Shiang Hwang, "End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication", Wireless Personal Communications, Vol. 28, No. 2, pp. 95-106, Jan. 2004. [SCI]  P063.ps  P063.pdf

188.Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A New Digital Signature Scheme Based on Factoring and Discrete Logarithms", International Journal of Computer Mathematics, vol. 81, no. 1, pp. 9-14, 2004. [SCI]  P127.pdf

189.Cheng-Chi Lee, Chou-Chen Yang, Min-Shiang Hwang, "A New Privacy and Authentication Protocol for End-to-End Mobile Users", International Journal of Communication Systems, Vol. 16, PP. 799-808, 2003. [SCI]  P065.ps   P065.pdf

190.Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on RSA-Based Partially Signature with Low Computation", Applied Mathematics and Computation, vol. 145, no. 2-3, pp. 465-468, Dec. 2003. [SCI]  P106.ps  P106.pdf

191.Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang, "Security Enhancement for the Timestamp-Based Password Authentication Scheme Using Smart Cards", Computers & Security, Vol. 22, no. 7, pp. 591-595, Nov. 2003. [SCI]  P166.ps   P166.pdf

192.Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin, "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem", IEEE Transactions on Knowledge and Data Engineering, vol. 15. no. 6, pp. 1552-1560, Nov./Dec. 2003. [SCI]  P049.ps   P049.pdf  

193.Min-Shiang Hwang, Chou-Chen Yang, Cheng-Yeh Shiu, “An Authentication Scheme for Mobile Satellite Communication Systems”, ACM Operating Systems Review, vol. 37, no. 4, pp. 42-47, Oct. 2003. [EI]  P077.ps  P077.pdf

194.Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "The Security of the Improvement on the Methods for Protecting Password Transmission", Informatica, vol. 14, no. 4, pp. 551-558, 2003. [SCI]  P168.ps  P168.pdf

195.Shin-Jia Hwang, Min-Shiang Hwang, Shiang-Feng Tzeng, "A New Digital Multisignature Scheme with Distinguished Signing Authorities", Journal of Information Science and Engineering, vol. 19, no. 5, pp. 881-887, Sep. 2003. [SCI]  P107.pdf

196.Min-Shiang Hwang, Wei-Pang Yang, "Controlling Access in Large Partially-Ordered Hierarchies Using Cryptographic Keys", The Journal of Systems and Software, vol. 67, no. 2, pp. 99-107, Aug. 2003. [SCI]  P005.ps   P005.pdf

197.Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang, “Improved Non-repudiable Threshold Proxy Signature Scheme with Known Signers”, Informatica, vol. 14, no. 3, pp. 393-402, 2003. [SCI]  P155.ps  P155.pdf

198.Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, Min-Shiang Hwang, "Security Enhancement for Protecting Password Transmission", IEICE Transactions on Communications, vol. E86-B, no. 7, pp. 2178-2181, July 2003. [SCI]  P169.ps  P169.pdf

199.Cheng-Chi Lee, Min-Shiang Hwang, Li-Hua Li, "A New Key Authentication Scheme Based on Discrete Logarithms", Applied Mathematics and Computation, vol. 139, no. 2, pp. 343-349, July 2003. [SCI]  P035.ps  P035.pdf

200.Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "An Untraceable Blind Signature Scheme", IEICE Transactions on Foundations, vol. E86-A, no. 7, pp. 1902-1906, July 2003. [SCI]  P108.ps  P108.pdf

201.Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang, “Security Enhancement for Optimal Strong-Password Authentication Protocol”, ACM Operating Systems Review, vol. 37, no. 3, pp. 12-16, July 2003. [EI]  P189.ps      

P189.pdf 

202.Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang, "Generalization of Proxy Signature Based on Discrete Logarithms", Computers & Security, Vol. 22, No. 3, pp. 245-255, 2003. [SCI]  P147.ps  P147.pdf

203.Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "Untractable Blind Signature Schemes Based on Discrete Logarithm Problem", Fundamenta Informaticae, Vol. 55, Issue 3-4, pp. 307-320, June 2003. [SCI] (ISSN:0169-2968)  P115.ps   P115.pdf

204.Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang, "A Modified Remote User Authentication Scheme Using Smart Cards", IEEE Transactions on Consumer Electronics, vol. 49, no. 2, pp. 414-416, May 2003. [SCI]  P153.ps   P153.pdf

205.Iuon-Chung Lin, Min-Shiang Hwang, Chin-Chen Chang, "A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy", Future Generation Computer Systems, Vol. 19, no. 4, pp 457-462, May 2003. [SCI]  P018.ps  P018.pdf

206.Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A New Anonymous Conference Key Distribution System Based on the Elliptic Curve Discrete Logarithm Problem", Computer Standards and Interfaces, Vol 25, No. 2, pp 141-145, May 2003. [SCI]  P156.ps  P156.pdf

207.Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang, "Security Enhancement for Anonymous Secure E-Voting over a Network", Computer Standards & Interfaces, Vol. 25, no. 2, pp. 131-139, May 2003. [SCI]  (ISSN: 0920-5489)  P082.ps  P082.pdf

208.Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "Extension of Authentication Protocol for GSM", IEE Proceedings – Communications, vol. 150, no. 2, pp. 91-95, Apr. 2003. [SCI]   P083.ps  P083.pdf

209.Eric Jui-Lin Lu, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis of Some Authenticated Key Agreement Protocols", International Journal of Computational and Numerical Analysis and Applications, Vol. 3, no. 2, pp. 151-157, Apr. 2003.  P092.ps  P092.pdf

210.Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, Min-Shiang Hwang, "Simple Generalized Group-oriented Cryptosystems Using ElGamal Cryptosystem", Informatica, vol. 14, no. 1, pp. 111-120, 2003. [SCI] (ISSN:0868-4952)  P151.ps  P151.pdf

211.Iuon-Chung Lin, Min-Shiang Hwang, Li-Hua Li, "A New Remote User Authentication Scheme for Multi-Server Architecture", Future Generation Computer Systems, vol. 19, no. 1, pp. 13-22, 2003. [SCI] (ISSN: 0167-739X)  P061.ps  P061.pdf

212.Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on Stadler et al.'s Fair Blind Signature Scheme", IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences, Vol. E86-A, no. 2, pp. 513-514, Feb. 2003. [SCI]  P102.ps  P102.pdf

213.Min-Shiang Hwang, Wei-Pang Yang, "An Authentication Protocol for Multicast Communications", Pakistan Journal of Applied Sciences, vol. 2, no. 12, pp. 1082-1083, Dec. 2002.  P030.ps  P030.pdf

214.Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang, "Cryptanalysis of the Hwang-Shi Proxy Signature Scheme", Fundamenta Informaticae, Vol. 53, No. 2, pp. 131-134, Nov. 2002. (SCI)  P099.ps  P099.pdf

215.Min-Shiang Hwang, Chih-Wei Lin, Cheng-Chi Lee, "Improved Yen-Joye's Authenticated Multiple-key Agreement Protocol", IEE Electronics Letters, vol. 38, no. 23, pp. 1429-1431, Nov. 2002. [SCI]  P121.ps   P121.pdf

216.Min-Shiang Hwang, S. Wesley Changchien, Cheng-Chi Lee, "A New Method to Strengthen Ciphers", International Journal of Pure and Applied Mathematics, vol. 3, no. 2, pp. 187-192, 2002.  P021.ps  P021.pdf

217.Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "Two Secure Transportation Schemes for Mobile Agents", Information and Security: An International Journal, vol. 8, no. 1, pp. 87-97, 2002.  P088.ps  P088.pdf

218.Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang, "A Remote User Authentication Scheme Using Hash Functions", ACM Operating Systems Review, vol. 36, no. 4, pp. 23-29, Oct. 2002. [EI]  P098.ps  P098.pdf

219.S. Wesley Changchien, Min-Shiang Hwang, "A Batch Verifying and Detecting Multiple RSA Digital Signatures", International Journal of Computational and Numerical Analysis and Applications, vol. 2, no. 3, pp. 303-307, Oct. 2002.  P050.ps  P050.pdf

220.Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang, "A Simple Remote User Authentication Scheme", Mathematical and Computer Modelling, Vol. 36, pp. 103-107, Oct. 2002. [SCI]  P087.ps  P087.pdf

221.Min-Shiang Hwang, Cheng-Chi Lee, Wei-Pang Yang, "An Improvement of Mobile Users Authentication in the Integration Environments", International Journal of Electronics and Communications, vol. 56, no. 5, pp 293-297, Sep. 2002. [SCI]  P091.ps  P091.pdf

222.Min-Shiang Hwang, Chao-Chen Yang, Shiang-Feng Tzeng, "Improved Digital Signature Scheme Based on Factoring and Discrete Logarithms", Journal of Discrete Mathematical Sciences & Cryptography, vol. 5, no. 2, pp. 151-155, Aug. 2002.  P052.ps  P052.pdf

223.Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "A Flexible Remote User Authentication Scheme Using Smart Cards", ACM Operating Systems Review, vol. 36, no. 3, pp. 46-52, July 2002. [EI]  P104.ps  P104.pdf

224.Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang, "A Feature-Oriented Copyright Owner Proving Technique for Still Images", International Journal of Software Engineering and Knowledge Engineering, vol. 12, no. 3, pp. 317-330, June 2002. [SCI, EI]   P064.ps   P064.pdf

225.Min-Shiang Hwang, Cheng-Chi Lee, Ting-Yi Chang, "Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines", Journal of Information Science and Engineering, Vol. 18, No. 3, pp. 373-379, May 2002. [SCI]  P027.ps  P027.pdf

226.Yuan-Liang Tang, Min-Shiang Hwang, Ching-Rong Yang, "An Image Authentication Scheme Based On Digital Signatures", Pakistan Journal of Applied Sciences, vol. 2, no. 5, pp. 553-557, May 2002.  P060.ps   P060.pdf

227.Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on Low-Computation Partially Blind Signatures for Electronic Cash", IEICE Fundamentals on Electronics, Communications and Computer Sciences, vol. E85-A, No. 5, pp. 1181-1182, May 2002. [SCI]  P105.ps  P105.pdf

228.Min-Shiang Hwang, Wei-Pang Yang, "Integrating Different Semantics of Classification Levels in Heterogeneous Distributed Database Systems", Pakistan Journal of Information and Technology, vol. 1, no. 1, pp. 1-4, April 2002.  P012.ps  P012.pdf

229.Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An Improved Authentication Protocol Without Trusted Third Party", International Journal of Computational and Numerical Analysis and Applications, vol. 1, no. 4, pp. 407-412, April 2002.  P042.ps  P042.pdf

230.Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An ElGamal-like Cryptosystem For Enciphering Large Messages", IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 2, pp. 445-446, March/April 2002. [SCI]  P045.ps   P045.pdf  

231.Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang, “A Robust Authentication Scheme for Protecting Copyrights of Images and Graphics”, IEE Proceedings Vision, Image and Signal Processing, vol. 149, no. 1, pp. 43-50, Feb. 2002. [SCI]    P059.ps   P059.pdf

232.Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chung Lin, "Adding Timestamps to the Secure Electronic Auction Protocol", Data & Knowledge Engineering, vol. 40, no. 2, pp. 155-162, Feb. 2002. [SCI]  P040.ps   P040.pdf

233.Eric Jui-Lin Lu, Min-Shiang Hwang, "An Improvement of a Simple Authenticated Key Agreement Algorithm", Pakistan Journal of Applied Sciences, Vol. 2, no. 1, pp. 64-65, Jan. 2002. P071.ps   P071.pdf

234.Li-Hua Li, Iuon-Chung Lin, Min-Shiang Hwang, "A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural Networks", IEEE Transactions on Neural Networks, vol. 12, no. 6, Nov. 2001, pp.1498-1504. [SCI]  P028.ps   P028.pdf

235.Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen, "A New Encryption Algorithm for Image Cryptosystems", Journal of Systems and Software, vol. 58, no. 2, pp. 83-91, Sep. 2001. [SCI]   P038.ps   P038.pdf

236.Min-Shiang Hwang, Chii-Hwa Lee, “Secure Access Schemes in Mobile Database Systems”, European Transactions on Telecommunications, vol. 12, no. 4, pp. 303-310, July 2001. [SCI]  P039.ps   P039.pdf

237.Min-Shiang Hwang, Cheng-Chi Lee, Eric Jui-Lin Lu, "Cryptanalysis of the Batch Verifying Multiple DSA-type Digital Signatures", Pakistan Journal of Applied Sciences, vol. 1, no. 3, pp. 287-288, July 2001. P090.ps   P090.pdf

238.Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang, "An Improvement of SPLICE/AS in WIDE Against Guessing Attack", International Journal of Informatica, vol. 12, no. 2, pp.297-302, Apr. 2001. [SCI] P074.ps   P074.pdf

239.Min-Shiang Hwang, Iuon-Chung Lin, Li-Hua Li, "A Simple Micro-payment Scheme", Journal of Systems and Software, vol. 55, no. 3, pp. 221-229, Jan. 2001. [SCI]  P056.ps   P056.pdf

240.Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang, "A Digital Watermarking Scheme Using Human Visual Effects", Informatica: An International Journal of Computing and Informatics, Vol. 24, No. 4, pp. 505-511, Dec. 2000. [EI]  P046.pdf

241.Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An Efficient Threshold Decryption Scheme without Session Keys", Computers & Electrical Engineering, vol. 27, no. 1, pp. 29-35, Nov. 2000. [SCI]  P043.ps   P043.pdf

242.Min-Shiang Hwang, "A New Redundancy Reducing Cipher", Informatica, vol. 11, no. 4, pp. 435-440, Oct. 2000. [SCI]  P025.ps   P025.pdf

243.Min-Shiang Hwang, "An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Totally-Ordered Hierarchies", International Journal of Computer Mathematics, vol. 73, no. 4, pp. 463-468, Oct. 2000. [SCI]  P004.ps   P004.pdf

244.Min-Shiang Hwang, Iuon-Chung Lin, Eric Jui-Lin Lu, "A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", Informatica, vol. 11, no. 2, pp. 137-144, Apr. 2000. [SCI]  P068.ps   P068.pdf

245.Min-Shiang Hwang, Li-Hua Li, "A New Remote User Authentication Scheme Using Smart Cards", IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp.28-30, Feb. 2000. [SCI]  P013.ps   P013.pdf

246.Min-Shiang Hwang, "Cryptanalysis of YCN Key Assignment Scheme in a Hierarchy", Information Processing Letters, vol. 73, no. 3, pp. 97-101, Feb. 2000. [SCI]  P055.ps   P055.pdf

247.Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "Digital Watermarking of Images Using Neural Networks", Journal of Electronic Imaging, vol. 9, no. 4, pp. 548-555, Jan. 2000. [SCI]  P051.ps   P051.pdf

248.Min-Shiang Hwang, Kuo-Feng Hwang, Iuon-Chung Lin, "Cryptanalysis of The Batch Verifying Multiple RSA Digital Signatures", Informatica, vol. 11, no. 1, pp. 1-4, Jan. 2000. [SCI]  P053.ps   P053.pdf

249.Min-Shiang Hwang, “A Remote Password Authentication Scheme Based on the Digital Signature Method”, International Journal of Computer Mathematics, vo1.70, no. 4, pp. 657-666, Oct. 1999. [SCI]   P020.pdf

250.Min-Shiang Hwang, “Dynamic Participation in a Secure Conference Scheme for Mobile Communications”, IEEE Transactions on Vehicular Technology, vol. 48, no. 5, pp. 1469-1474, Sep. 1999. [SCI]  P029.pdf

251.Min-Shiang Hwang, "A New Dynamic Cryptographic Key Generation Scheme for a Hierarchy", Nordic Journal of Computing, vol. 6, no. 4, pp. 363-371, Aug. 1999. P009.ps   P009.pdf

252.Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, “Enhanced Privacy and Authentication for the Global System of Mobile Communications”, Wireless Networks, vol. 5, pp. 231-243, July 1999.  [SCI]  P024.ps   P024.pdf

253.Min-Shiang Hwang, “Extension of CHW Cryptographic Key Assignment Scheme in a Hierarchy”, IEE Proceedings Computers and Digital Techniques, vol. 146, no. 4, pp. 219, July 1999. [SCI]  P054.ps   P054.pdf

254.Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, “A Novel Application of the Phone Card and Its Authentication in Mobile Communications”, Journal of Information Science and Engineering, vol. 15, no. 4, pp. 471-484, July 1999. [SCI]  P037.pdf

255.Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, “A Watermarking Technique Based on One-way Hash Functions", IEEE Transactions on Consumer Electronics, vol. 45, no. 2, pp.286-294, May 1999. [SCI]  P047.ps   P047.pdf

256.Min-Shiang Hwang, “Cryptanalysis of Remote Login Authentication Scheme”, Computer Communications, vol.22, no.8, pp.742-744, May 1999. [SCI]  P048.ps   P048.pdf

257.Min-Shiang Hwang, “An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E82-A, No.3, pp.548-550, March 1999. [SCI]  P044.ps   P044.pdf

258.Min-Shiang Hwang, “An Improvement of a Dynamic Cryptographic Key Assignment Schemes in a Tree Hierarchy”, Computers Mathematics with Applications, vol.37, no.3, pp.19-22, Feb. 1999. [SCI] P014.ps   P014.pdf

259.Tung-Shou Chen, Chin-Chen Chang, and Min-Shiang Hwang, “A Virtual Image Cryptosystem Based upon Vector Quantization”, IEEE Transactions on Image Processing, Vo1.7, No.10, pp.1485-1488, Oct. 1998. [SCI]   P034.pdf

260.Min-Shiang Hwang, “A Cryptographic Key Assignment Scheme in a Hierarchy for Access Control”, Mathematical and Computer Modeling, Vo1.26, No2, pp.27-31, June 25, 1997. [SCI]  P016.ps   P016.pdf

261.Min-Shiang Hwang and Chii-Hwa Lee, “Authenticated Key-Exchange in a Mobile Radio Network”, European Transactions on Telecommunications, Vo1. 8, No.3, pp.265-269, May 1997. [SCI]  P024.ps   P024.pdf

262.Min-Shiang Hwang and Wei-Pang Yang, “Multilevel Secure Database Encryption with Subkeys”, DataKnowledge Engineering, Vo1.22, 1997, pp.117-131. [SCI]  P007.ps   P007.pdf

263.Chin-Chen Chang, Min-Shiang Hwang, “Parallel Computation of the Generating Keys for RSA Cryptosystems”, IEE Electronics Letters, vo1. 32, no. 15, July 1996, pp. 1365-1366. [SCI]  P036.ps   P036.pdf

264.Min-Shiang Hwang, Wen-Guey Tzeng, and Wei-Pang Yang, “An Access Control Scheme Based on Chinese Remainder Theorem and Time Stamp Concept”, Computers & Security, vo1.15, no. 1, 1996, pp.73-81. [SCI]  P001.ps   P001.pdf

265.Min-Shiang Hwang and Wei-Pang Yang, “A Two-Phase Encryption Scheme for Enhancing Database Security”, Journal of Systems and Software, vo1.31, No.12, December 1995, pp.257-265. [SCI]  P010.ps   P010.pdf

266.Min-Shiang Hwang and Wei-Pang Yang, “Conference Key Distribution Protocols for Digital Mobile Communication Systems", IEEE Journal on Selected Areas in Communications, vo1.13, no.2, February 1995, pp.416-420. [SCI]  P026.pdf

267.Min-Shiang Hwang and Wei-Pang Yang, “A New Dynamic Access Control Scheme Based on Subject-Object-List”, Data & Knowledge Engineering, Vo1.14, No.1, November 1994, pp.45-56. [SCI]  P002.ps   P002.pdf

268.Min-Shiang Hwang, Wen-Guey Tzeng, and Wei-Pang Yang, “A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp”, IEICE Transactions on Information and Systems, vo1. E77-D, No.9, September 1994, pp.1042-1046. [SCI]  P003.ps   P003.pdf

269.Min-Shiang Hwang, Chin-Chen Chang, Wei-Pang Yang, “Modified Chang-Hwang-Wu Access Control Scheme”, IEE Electronics Letters, vo1.29, no.24, November 1993, pp.2095-2096. [SCI]  P008.ps   P008.pdf