1.Related Papers
of “Proxy Signature” in International Journal of Network Security [IJNS-PeoxySig].
2. Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, “A New Proxy Signature
Scheme for a Specified Group of Verifiers,” Information Sciences, vol. 227, pp.
102-115, April 2013. (SCI) P144.pdf
3. Cheng-Chi
Lee, Tzu-Chun Lin, Shiang-Feng Tzeng and Min-Shiang Hwang, “Generalization
of Proxy Signature Based on Factorization”, International Journal of Innovative
Computing, Information and Control, vol. 7, no. 3, pp. 1039-1054, Mar. 2011.
(SCI) P143.ps P143.pdf
4. Shiang-Feng
Tzeng, Cheng-Chi Lee, and Min-Shiang Hwang, “A Batch Verification for Multiple
Proxy Signature”, Parallel Processing Letters, vol. 21,
no. 1, pp. 77-84, March 2011. (EI) P128.ps P128.pdf
5. Min-Shiang Hwang, Shiang-Feng Tzeng and Shu-Fen
Chiou, "A Non-repudiable Multi-Proxy Multi-Signature Scheme",
Innovative Computing, Information and Control Express Letters, Vol.3, No.3, pp.
259-264, September 2009. P119.ps P119.pdf
6. Eric Jui-Lin Lu, Min-Shiang Hwang, and
Cheng-Jian Huang, "A New Proxy Signature Scheme with Revocation",
Applied Mathematics and Computation, Vol. 161, No. 3, PP. 799-806, Feb. 2005. P255.pdf
7. Cheng-Ying Yang, Shiang-Feng
Tzeng, Min-Shiang Hwang, "On
the Efficiency of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers",
The Journal of Systems and Software, vol. 73, no. 3, pp. 507-514, Nov. 2004.
[SCI] P117.ps P117.pdf
8. Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A Nonrepudiable Threshold Multi-Proxy Multi-Signature
Scheme with Shared Verification", Future Generation
Computer Systems, vol. 20, no. 5, PP. 887-893, June 2004. [SCI] P122.ps P122.pdf
9. Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang, "An Improvement of Nonrepudiable Threshold Proxy Signature Scheme
with Known Signers", Computers & Security, vol. 23, no. 2, pp.
174-178, April 2004. [SCI] P132.ps P132.pdf
10.
Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong
Tsai, "Generalization
of Proxy Signature Based on Elliptic Curves", Computer Standards & Interfaces,
vol. 26, no. 2, pp. 73-84, March 2004. [SCI] P149.ps P149.pdf
11.
Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang
Lin, "A Practical
(t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem", IEEE
Transactions on Knowledge and Data Engineering, vol. 15. no. 6, pp. 1552-1560,
Nov./Dec. 2003. [SCI] P049.ps P049.pdf
12.
Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang
Hwang, “Improved Non-repudiable Threshold Proxy Signature Scheme with Known
Signers”, Informatica, vol. 14, no. 3, pp. 393-402, 2003. [SCI] P155.ps P155.pdf
13.
Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang
Hwang, "Generalization of Proxy Signature Based on Discrete Logarithms",
Computers & Security, Vol. 22, No. 3, pp. 245-255, 2003. [SCI] P147.ps P147.pdf
14.
Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang, "Cryptanalysis of the Hwang-Shi
Proxy Signature Scheme", Fundamenta Informaticae, Vol. 53, No. 2, pp.
131-134, Nov. 2002. (SCI) P099.ps P099.pdf
15. Min-Shiang Hwang, Iuon-Chung Lin, Eric Jui-Lin Lu, "A Secure Nonrepudiable Threshold Proxy
Signature Scheme with Known Signers", Informatica, vol. 11, no. 2, pp. 137-144,
Apr. 2000. [SCI] P068.ps P068.pdf