BibTeX records: Min-Shiang Hwang

download as .bib file

@article{DBLP:journals/ijnsec/ChiouPCH19,
  author    = {Shu{-}Fen Chiou and
               Hsieh{-}Tsen Pan and
               Eko Fajar Cahyadi and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of the Mutual Authentication and Key Agreement Protocol
               with Smart Cards for Wireless Communications},
  journal   = {I. J. Network Security},
  volume    = {21},
  number    = {1},
  pages     = {100--104},
  year      = {2019},
  url       = {http://ijns.femto.com.tw/contents/ijns-v21-n1/ijns-2019-v21-n1-p100-104.pdf},
  timestamp = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChiouPCH19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LinYH19,
  author    = {Tzu{-}Chun Lin and
               Ting{-}Yi Yeh and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an ID-based Deniable Threshold Ring Authentication},
  journal   = {I. J. Network Security},
  volume    = {21},
  number    = {2},
  pages     = {298--302},
  year      = {2019},
  url       = {http://ijns.femto.com.tw/contents/ijns-v21-n2/ijns-2019-v21-n2-p298-302.pdf},
  timestamp = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LinYH19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangSH18,
  author    = {Yu{-}Lun Wang and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {A Survey of Reversible Data Hiding for VQ-Compressed Images},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {1},
  pages     = {1--8},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p1-8.pdf},
  timestamp = {Wed, 11 Oct 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/WangSH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiHH18,
  author    = {Cheng{-}Yi Tsai and
               Pi{-}Fang Ho and
               Min{-}Shiang Hwang},
  title     = {A Secure Group Signature Scheme},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {2},
  pages     = {201--205},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p201-205.pdf},
  timestamp = {Fri, 12 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/TsaiHH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangSH18a,
  author    = {Yu{-}Lun Wang and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {A Novel Dual Image-based High Payload Reversible Hiding Technique
               Using {LSB} Matching},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {4},
  pages     = {801--804},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p801-804.pdf},
  timestamp = {Fri, 18 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/WangSH18a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiYLH18,
  author    = {Cheng{-}Yi Tsai and
               Cheng{-}Ying Yang and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {A Survey of E-book Digital Right Management},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {5},
  pages     = {998--1004},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p998-1004.pdf},
  timestamp = {Sat, 23 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/TsaiYLH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangCH18,
  author    = {Li{-}Chin Huang and
               Ting{-}Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A Conference Key Scheme Based on the Diffie-Hellman Key Exchange},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {6},
  pages     = {1221--1226},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1221-1226.pdf},
  timestamp = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/HuangCH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HwangCCY18,
  author    = {Min{-}Shiang Hwang and
               Eko Fajar Cahyadi and
               Yuen{-}Cheng Chou and
               Cheng{-}Ying Yang},
  title     = {Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart
               Card},
  booktitle = {14th International Conference on Computational Intelligence and Security,
               {CIS} 2018, Hangzhou, China, November 16-19, 2018},
  pages     = {416--420},
  year      = {2018},
  crossref  = {DBLP:conf/cis/2018},
  url       = {https://doi.org/10.1109/CIS2018.2018.00099},
  doi       = {10.1109/CIS2018.2018.00099},
  timestamp = {Tue, 05 Feb 2019 12:32:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cis/HwangCCY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/WuH17,
  author    = {Nan{-}I Wu and
               Min{-}Shiang Hwang},
  title     = {Development of a data hiding scheme based on combination theory for
               lowering the visual noise in binary images},
  journal   = {Displays},
  volume    = {49},
  pages     = {116--123},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.displa.2017.07.009},
  doi       = {10.1016/j.displa.2017.07.009},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/displays/WuH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/WeiHC17,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               Augustin Yeh{-}Hao Chin},
  title     = {A secure privacy and authentication protocol for passive {RFID} tags},
  journal   = {{IJMC}},
  volume    = {15},
  number    = {3},
  pages     = {266--277},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJMC.2017.10003252},
  doi       = {10.1504/IJMC.2017.10003252},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijmc/WeiHC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenYH17a,
  author    = {Shih{-}Ming Chen and
               Ching{-}Rong Yang and
               Min{-}Shiang Hwang},
  title     = {Using a New Structure in Group Key Management for Pay-TV},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {1},
  pages     = {112--117},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p112-117.pdf},
  timestamp = {Tue, 19 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChenYH17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LingLYH17,
  author    = {Chung{-}Huei Ling and
               Cheng{-}Chi Lee and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Secure and Efficient One-time Password Authentication Scheme for
               {WSN}},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {2},
  pages     = {177--181},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p177-181.pdf},
  timestamp = {Fri, 30 Sep 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LingLYH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiLTH17,
  author    = {Cheng{-}Yi Tsai and
               Chi{-}Yu Liu and
               Shyh{-}Chang Tsaur and
               Min{-}Shiang Hwang},
  title     = {A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring
               and Discrete Logarithms},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {3},
  pages     = {443--448},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p443-448.pdf},
  timestamp = {Fri, 30 Sep 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/TsaiLTH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChaoTH17,
  author    = {Wan{-}Yu Chao and
               Cheng{-}Yi Tsai and
               Min{-}Shiang Hwang},
  title     = {An Improved Key-Management Scheme for Hierarchical Access Control},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {4},
  pages     = {639--643},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p639-643.pdf},
  timestamp = {Thu, 02 Mar 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChaoTH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangSH17,
  author    = {Yu{-}Lun Wang and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {An Improved Dual Image-based Reversible Hiding Technique Using {LSB}
               Matching},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {5},
  pages     = {858--862},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p858-862.pdf},
  timestamp = {Mon, 08 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/WangSH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenYH17,
  author    = {Jong{-}Shin Chen and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {The Capacity Analysis in the Secure Cooperative Communication System},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {6},
  pages     = {863--869},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p863-869.pdf},
  timestamp = {Mon, 08 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChenYH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/HwangSL17,
  author    = {Min{-}Shiang Hwang and
               Tsuei{-}Hung Sun and
               Cheng{-}Chi Lee},
  title     = {Achieving Dynamic Data Guarantee and Data Confidentiality of Public
               Auditing in Cloud Storage Service},
  journal   = {Journal of Circuits, Systems, and Computers},
  volume    = {26},
  number    = {5},
  pages     = {1--16},
  year      = {2017},
  url       = {https://doi.org/10.1142/S0218126617500724},
  doi       = {10.1142/S0218126617500724},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcsc/HwangSL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ChangHY17,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Chou Chen Yang},
  title     = {Password Authenticated Key Exchange and Protected Password Change
               Protocols},
  journal   = {Symmetry},
  volume    = {9},
  number    = {8},
  pages     = {134},
  year      = {2017},
  url       = {https://doi.org/10.3390/sym9080134},
  doi       = {10.3390/sym9080134},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/symmetry/ChangHY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HsienYH16,
  author    = {Wei{-}Fu Hsien and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Survey of Public Auditing for Secure Data Storage in Cloud Computing},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {1},
  pages     = {133--142},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n1/ijns-2016-v18-n1-p133-142.pdf},
  timestamp = {Fri, 31 Jul 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/HsienYH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LingHH16,
  author    = {Chung{-}Huei Ling and
               Wei{-}Fu Hsien and
               Min{-}Shiang Hwang},
  title     = {A Double Circular Chain Intrusion Detection for Cloud Computing Based
               on AdjointVM Approach},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {2},
  pages     = {397--400},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n2/ijns-2016-v18-n2-p397-400.pdf},
  timestamp = {Mon, 12 Oct 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LingHH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LingCH16,
  author    = {Chung{-}Huei Ling and
               Shih{-}Ming Chen and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of Tseng-Wu Group Key Exchange Protocol},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {3},
  pages     = {590--593},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n3/ijns-2016-v18-n3-p590-593.pdf},
  timestamp = {Mon, 12 Oct 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LingCH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuHYH16,
  author    = {Chi{-}Wei Liu and
               Wei{-}Fu Hsien and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Survey of Public Auditing for Shared Data Storage with User Revocation
               in Cloud Computing},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {4},
  pages     = {650--666},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n4/ijns-2016-v18-n4-p650-666.pdf},
  timestamp = {Mon, 16 Nov 2015 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LiuHYH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuHYH16a,
  author    = {Chi{-}Wei Liu and
               Wei{-}Fu Hsien and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Survey of Attribute-based Access Control with User Revocation in
               Cloud Data Storage},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {5},
  pages     = {900--916},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n5/ijns-2016-v18-n5-p900-916.pdf},
  timestamp = {Wed, 17 Feb 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LiuHYH16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XieWSH16,
  author    = {Ming{-}Ru Xie and
               Chia{-}Chun Wu and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {A Survey of Data Distortion Watermarking Relational Databases},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {6},
  pages     = {1022--1033},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n6/ijns-2016-v18-n6-p1022-1033.pdf},
  timestamp = {Thu, 25 Aug 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/XieWSH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/HwangCO16,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Hsia{-}Hung Ou},
  title     = {The Moderately Hard DoS-Resistant Authentication Protocol on Client
               Puzzles},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {27},
  number    = {1},
  pages     = {31--48},
  year      = {2016},
  url       = {http://content.iospress.com/articles/informatica/inf1088},
  timestamp = {Mon, 12 Dec 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/HwangCO16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/FengHS16,
  author    = {Tung{-}Huang Feng and
               Min{-}Shiang Hwang and
               Liang{-}Wei Syu},
  title     = {An Authentication Protocol for Lightweight {NFC} Mobile Sensors Payment},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {27},
  number    = {4},
  pages     = {723--732},
  year      = {2016},
  url       = {http://content.iospress.com/articles/informatica/inf1125},
  timestamp = {Thu, 27 Apr 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/FengHS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/LinCCH16,
  author    = {Iuon{-}Chang Lin and
               Yi{-}Lun Chi and
               Hung{-}Chieh Chuang and
               Min{-}Shiang Hwang},
  title     = {The Novel Features for Phishing Based on User Device Detection},
  journal   = {{JCP}},
  volume    = {11},
  number    = {2},
  pages     = {109--115},
  year      = {2016},
  url       = {https://doi.org/10.17706/jcp.11.2.109-115},
  doi       = {10.17706/jcp.11.2.109-115},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcp/LinCCH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PanPTH16,
  author    = {Hsieh{-}Tsen Pan and
               Chiu{-}Shu Pan and
               Shyh{-}Chang Tsaur and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of Efficient Dynamic {ID} Based Remote User Authentication
               Scheme in Multi-Server Environment Using Smart Card},
  booktitle = {12th International Conference on Computational Intelligence and Security,
               {CIS} 2016, Wuxi, China, December 16-19, 2016},
  pages     = {590--593},
  year      = {2016},
  crossref  = {DBLP:conf/cis/2016},
  url       = {https://doi.org/10.1109/CIS.2016.0143},
  doi       = {10.1109/CIS.2016.0143},
  timestamp = {Wed, 10 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cis/PanPTH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsai/PanTTH16,
  author    = {Chiu{-}Shu Pan and
               Cheng{-}Yi Tsai and
               Shyh{-}Chang Tsaur and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an efficient password authentication scheme},
  booktitle = {3rd International Conference on Systems and Informatics, {ICSAI} 2016,
               Shanghai, China, November 19-21, 2016},
  pages     = {743--748},
  year      = {2016},
  crossref  = {DBLP:conf/icsai/2016},
  url       = {https://doi.org/10.1109/ICSAI.2016.7811051},
  doi       = {10.1109/ICSAI.2016.7811051},
  timestamp = {Thu, 18 Oct 2018 16:08:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icsai/PanTTH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WijayantoH15,
  author    = {Heri Wijayanto and
               Min{-}Shiang Hwang},
  title     = {Improvement on Timestamp-based User Authentication Scheme with Smart
               Card Lost Attack Resistance},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {2},
  pages     = {160--164},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p160-164.pdf},
  timestamp = {Mon, 02 Mar 2015 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/WijayantoH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChiCLH15,
  author    = {Yi{-}Lun Chi and
               Cheng Hao Chen and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {The Secure Transaction Protocol in {NFC} Card Emulation Mode},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {4},
  pages     = {431--438},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p431-438.pdf},
  timestamp = {Mon, 11 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChiCLH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RenWZH15,
  author    = {Yanli Ren and
               Shuozhong Wang and
               Xinpeng Zhang and
               Min{-}Shiang Hwang},
  title     = {An Efficient Batch Verifying Scheme for Detecting Illegal Signatures},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {4},
  pages     = {463--470},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p463-470.pdf},
  timestamp = {Mon, 11 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/RenWZH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SunSH15,
  author    = {Jia{-}Rong Sun and
               Mao{-}Lin Shih and
               Min{-}Shiang Hwang},
  title     = {A Survey of Digital Evidences Forensic and Cybercrime Investigation
               Procedure},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {5},
  pages     = {497--509},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p497-509.pdf},
  timestamp = {Fri, 31 Jul 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/SunSH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FengSH15,
  author    = {Tung{-}Huang Feng and
               Neng{-}Yih Shih and
               Min{-}Shiang Hwang},
  title     = {A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor
               Networks},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {6},
  pages     = {712--721},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p712-721.pdf},
  timestamp = {Fri, 31 Jul 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/FengSH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/HwangLS14,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Tsuei{-}Hung Sun},
  title     = {Data error locations reported by public auditing in cloud storage
               service},
  journal   = {Autom. Softw. Eng.},
  volume    = {21},
  number    = {3},
  pages     = {373--390},
  year      = {2014},
  url       = {https://doi.org/10.1007/s10515-014-0142-6},
  doi       = {10.1007/s10515-014-0142-6},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ase/HwangLS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChungLH14,
  author    = {Pei{-}Shan Chung and
               Chi{-}Wei Liu and
               Min{-}Shiang Hwang},
  title     = {A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {1},
  pages     = {1--13},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n1/ijns-2014-v16-n1-p1-13.pdf},
  timestamp = {Mon, 09 Sep 2013 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChungLH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FengLH14,
  author    = {Tung{-}Huang Feng and
               Chung{-}Huei Ling and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of Tan's Improvement on a Password Authentication Scheme
               for Multi-server Environments},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {4},
  pages     = {318--321},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n4/ijns-2014-v16-n4-p318-321.pdf},
  timestamp = {Mon, 20 Apr 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/FengLH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiFH14,
  author    = {Wei Teng Li and
               Tung{-}Huang Feng and
               Min{-}Shiang Hwang},
  title     = {Distributed Detecting Node Replication Attacks in Wireless Sensor
               Networks: {A} Survey},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {5},
  pages     = {323--330},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n5/ijns-2014-v16-n5-p323-330.pdf},
  timestamp = {Mon, 21 Jul 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LiFH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiLH14,
  author    = {Wei Teng Li and
               Chung{-}Huei Ling and
               Min{-}Shiang Hwang},
  title     = {Group Rekeying in Wireless Sensor Networks: {A} Survey},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {6},
  pages     = {400--410},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n6/ijns-2014-v16-n6-p400-410.pdf},
  timestamp = {Mon, 24 Nov 2014 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LiLH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/HwangHL14,
  author    = {Min{-}Shiang Hwang and
               Shih{-}Ting Hsu and
               Cheng{-}Chi Lee},
  title     = {A New Public Key Encryption with Conjunctive Field Keyword Search
               Scheme},
  journal   = {{ITC}},
  volume    = {43},
  number    = {3},
  pages     = {277--288},
  year      = {2014},
  url       = {https://doi.org/10.5755/j01.itc.43.3.6429},
  doi       = {10.5755/j01.itc.43.3.6429},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itc/HwangHL14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intcompsymp/SunH14,
  author    = {Jia{-}Rong Sun and
               Min{-}Shiang Hwang},
  title     = {A New Investigation Approach for Tracing Source {IP} in DDoS attack
               from Proxy Server},
  booktitle = {Intelligent Systems and Applications - Proceedings of the International
               Computer Symposium {(ICS)} held at Taichung, Taiwan, December 12-14,
               2014},
  pages     = {850--857},
  year      = {2014},
  crossref  = {DBLP:conf/intcompsymp/2014},
  url       = {https://doi.org/10.3233/978-1-61499-484-8-850},
  doi       = {10.3233/978-1-61499-484-8-850},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intcompsymp/SunH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/HuangLH13,
  author    = {Li{-}Chin Huang and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A n2+n {MQV} key agreement protocol},
  journal   = {Int. Arab J. Inf. Technol.},
  volume    = {10},
  number    = {2},
  pages     = {137--142},
  year      = {2013},
  url       = {http://www.ccis2k.org/iajit/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=85\&\#38;Itemid=350},
  timestamp = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iajit/HuangLH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeLH13,
  author    = {Cheng{-}Chi Lee and
               Chia{-}Hsin Liu and
               Min{-}Shiang Hwang},
  title     = {Guessing Attacks on Strong-Password Authentication Protocol},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {1},
  pages     = {64--67},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n1/ijns-2013-v15-n1-p64-67.pdf},
  timestamp = {Mon, 09 Sep 2013 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LeeLH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HsuYH13,
  author    = {Shih{-}Ting Hsu and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Study of Public Key Encryption with Keyword Search},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {2},
  pages     = {71--79},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p71-79.pdf},
  timestamp = {Mon, 09 Sep 2013 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/HsuYH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeCH13,
  author    = {Cheng{-}Chi Lee and
               Pei{-}Shan Chung and
               Min{-}Shiang Hwang},
  title     = {A Survey on Attribute-based Encryption Schemes of Access Control in
               Cloud Environments},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {4},
  pages     = {231--240},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n4/ijns-2013-v15-n4-p231-240.pdf},
  timestamp = {Mon, 09 Sep 2013 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LeeCH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeHH13,
  author    = {Cheng{-}Chi Lee and
               Shih{-}Ting Hsu and
               Min{-}Shiang Hwang},
  title     = {A Study of Conjunctive Keyword Searchable Schemes},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {5},
  pages     = {321--330},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n5/ijns-2013-v15-n5-p321-330.pdf},
  timestamp = {Mon, 09 Sep 2013 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LeeHH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenYH13,
  author    = {Min{-}Yu Chen and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {Privacy Protection Data Access Control},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {6},
  pages     = {411--419},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n6/ijns-2013-v15-n6-p411-419.pdf},
  timestamp = {Mon, 09 Sep 2013 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChenYH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HwangLT13,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Shiang{-}Feng Tzeng},
  title     = {A new proxy signature scheme for a specified group of verifiers},
  journal   = {Inf. Sci.},
  volume    = {227},
  pages     = {102--115},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.ins.2012.11.004},
  doi       = {10.1016/j.ins.2012.11.004},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/HwangLT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/YangCH13,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A New Group Signature Scheme Based on {RSA} Assumption},
  journal   = {{ITC}},
  volume    = {42},
  number    = {1},
  pages     = {61--66},
  year      = {2013},
  url       = {https://doi.org/10.5755/j01.itc.42.1.1185},
  doi       = {10.5755/j01.itc.42.1.1185},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itc/YangCH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HuangHT13,
  author    = {Li{-}Chin Huang and
               Min{-}Shiang Hwang and
               Lin{-}Yu Tseng},
  title     = {Reversible and High-Capacity Data Hiding in High Quality Medical Images},
  journal   = {{TIIS}},
  volume    = {7},
  number    = {1},
  pages     = {132--148},
  year      = {2013},
  url       = {https://doi.org/10.3837/tiis.2013.01.009},
  doi       = {10.3837/tiis.2013.01.009},
  timestamp = {Wed, 30 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itiis/HuangHT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HuangTH13,
  author    = {Li{-}Chin Huang and
               Lin{-}Yu Tseng and
               Min{-}Shiang Hwang},
  title     = {A reversible data hiding method by histogram shifting in high quality
               medical images},
  journal   = {Journal of Systems and Software},
  volume    = {86},
  number    = {3},
  pages     = {716--727},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.jss.2012.11.024},
  doi       = {10.1016/j.jss.2012.11.024},
  timestamp = {Wed, 30 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/HuangTH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/ChongLH13,
  author    = {Song{-}Kong Chong and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {An Authentication Scheme for the Global Mobility Network},
  journal   = {Parallel Processing Letters},
  volume    = {23},
  number    = {3},
  year      = {2013},
  url       = {https://doi.org/10.1142/S0129626413500096},
  doi       = {10.1142/S0129626413500096},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ppl/ChongLH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChenLHJ13,
  author    = {Te{-}Yu Chen and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Jinn{-}Ke Jan},
  title     = {Towards secure and efficient user authentication scheme using smart
               card for multi-server environments},
  journal   = {The Journal of Supercomputing},
  volume    = {66},
  number    = {2},
  pages     = {1008--1032},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11227-013-0966-z},
  doi       = {10.1007/s11227-013-0966-z},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tjs/ChenLHJ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/OuH13,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang},
  title     = {Double Delegation-Based Authentication and Key Agreement Protocol
               for PCSs},
  journal   = {Wireless Personal Communications},
  volume    = {72},
  number    = {1},
  pages     = {437--446},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11277-013-1022-2},
  doi       = {10.1007/s11277-013-1022-2},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/wpc/OuH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cac/ChenLH13,
  author    = {Min{-}Yu Chen and
               Chi{-}Wei Liu and
               Min{-}Shiang Hwang},
  title     = {SecureDropbox: a file encryption system suitable for cloud storage
               services},
  booktitle = {{ACM} Cloud and Autonomic Computing Conference, {CAC} '13, Miami,
               FL, {USA} - August 05 - 09, 2013},
  pages     = {21:1--21:2},
  year      = {2013},
  crossref  = {DBLP:conf/cac/2013},
  url       = {https://doi.org/10.1145/2494621.2494642},
  doi       = {10.1145/2494621.2494642},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cac/ChenLH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/YangLH13,
  author    = {Cheng{-}Ying Yang and
               Yi{-}Shan Lin and
               Min{-}Shiang Hwang},
  title     = {Downlink Relay Selection Algorithm for Amplify-and-Forward Cooperative
               Communication Systems},
  booktitle = {Seventh International Conference on Complex, Intelligent, and Software
               Intensive Systems, {CISIS} 2013, Taichung, Taiwan, July 3-5, 2013},
  pages     = {331--334},
  year      = {2013},
  crossref  = {DBLP:conf/cisis/2013},
  url       = {https://doi.org/10.1109/CISIS.2013.60},
  doi       = {10.1109/CISIS.2013.60},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisis/YangLH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/LiYH12,
  author    = {Chun{-}Ta Li and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A secure routing protocol with node selfishness resistance in MANETs},
  journal   = {{IJMC}},
  volume    = {10},
  number    = {1},
  pages     = {103--118},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJMC.2012.044525},
  doi       = {10.1504/IJMC.2012.044525},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijmc/LiYH12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/OuLH12,
  author    = {Hsia{-}Hung Ou and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {An effective {AKA} protocol for {UMTS}},
  journal   = {{IJMC}},
  volume    = {10},
  number    = {4},
  pages     = {427--448},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJMC.2012.048139},
  doi       = {10.1504/IJMC.2012.048139},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijmc/OuLH12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/WeiHC12,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               Augustin Yeh{-}Hao Chin},
  title     = {An improved authentication protocol for mobile agent device in {RFID}
               environment},
  journal   = {{IJMC}},
  volume    = {10},
  number    = {5},
  pages     = {508--520},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJMC.2012.048884},
  doi       = {10.1504/IJMC.2012.048884},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijmc/WeiHC12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangTH12,
  author    = {Li{-}Chin Huang and
               Lin{-}Yu Tseng and
               Min{-}Shiang Hwang},
  title     = {The Study of Data Hiding in Medical Images},
  journal   = {I. J. Network Security},
  volume    = {14},
  number    = {6},
  pages     = {301--309},
  year      = {2012},
  url       = {http://ijns.femto.com.tw/contents/ijns-v14-n6/ijns-2012-v14-n6-p301-309.pdf},
  timestamp = {Wed, 07 Nov 2012 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/HuangTH12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/ChangHY12,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption
               Scheme for Encrypting Large Messages},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {23},
  number    = {4},
  pages     = {537--562},
  year      = {2012},
  url       = {http://content.iospress.com/articles/informatica/inf23-4-03},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/ChangHY12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/HwangCO11,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Hsia{-}Hung Ou},
  title     = {On the security of an enhanced {UMTS} authentication and key agreement
               protocol},
  journal   = {European Transactions on Telecommunications},
  volume    = {22},
  number    = {3},
  pages     = {99--112},
  year      = {2011},
  url       = {https://doi.org/10.1002/ett.1460},
  doi       = {10.1002/ett.1460},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ett/HwangCO11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/LeeHL11,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {On the Security of Self-Certified Public Keys},
  journal   = {{IJISP}},
  volume    = {5},
  number    = {2},
  pages     = {54--60},
  year      = {2011},
  url       = {https://doi.org/10.4018/jisp.2011040104},
  doi       = {10.4018/jisp.2011040104},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisp/LeeHL11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/ChangH11,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {User-anonymous and short-term Conference Key Distribution System via
               link-layer routing in mobile communications},
  journal   = {{IJMC}},
  volume    = {9},
  number    = {2},
  pages     = {144--158},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMC.2011.040143},
  doi       = {10.1504/IJMC.2011.040143},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijmc/ChangH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/WeiHC11,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               Augustin Yeh{-}Hao Chin},
  title     = {An authentication protocol for low-cost {RFID} tags},
  journal   = {{IJMC}},
  volume    = {9},
  number    = {2},
  pages     = {208--223},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMC.2011.040146},
  doi       = {10.1504/IJMC.2011.040146},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijmc/WeiHC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChangHY11,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A communication-efficient three-party password authenticated key exchange
               protocol},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {1},
  pages     = {217--226},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ins.2010.08.032},
  doi       = {10.1016/j.ins.2010.08.032},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/ChangHY11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LoHL11,
  author    = {Jung{-}Wen Lo and
               Min{-}Shiang Hwang and
               Chia{-}Hsin Liu},
  title     = {An efficient key assignment scheme for access control in a large leaf
               class hierarchy},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {4},
  pages     = {917--925},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ins.2010.09.033},
  doi       = {10.1016/j.ins.2010.09.033},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/LoHL11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiH11,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang},
  title     = {A lightweight anonymous routing protocol without public key en/decryptions
               for wireless ad hoc networks},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {23},
  pages     = {5333--5347},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ins.2011.07.014},
  doi       = {10.1016/j.ins.2011.07.014},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/LiH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/ChangHY11,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {An Improved Multi-stage Secret Sharing Scheme Based on the Factorization
               Problem},
  journal   = {{ITC}},
  volume    = {40},
  number    = {3},
  pages     = {246--251},
  year      = {2011},
  url       = {https://doi.org/10.5755/j01.itc.40.3.633},
  doi       = {10.5755/j01.itc.40.3.633},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itc/ChangHY11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/WeiHC11,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               A. Y. Chin},
  title     = {A Mutual Authentication Protocol for {RFID}},
  journal   = {{IT} Professional},
  volume    = {13},
  number    = {2},
  pages     = {20--24},
  year      = {2011},
  url       = {https://doi.org/10.1109/MITP.2011.17},
  doi       = {10.1109/MITP.2011.17},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itpro/WeiHC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WuKH11,
  author    = {Chia{-}Chun Wu and
               Shang{-}Juh Kao and
               Min{-}Shiang Hwang},
  title     = {A high quality image sharing with steganography and adaptive authentication
               scheme},
  journal   = {Journal of Systems and Software},
  volume    = {84},
  number    = {12},
  pages     = {2196--2207},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.jss.2011.06.021},
  doi       = {10.1016/j.jss.2011.06.021},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jss/WuKH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/TzengLH11,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A Batch Verification for Multiple Proxy Signature},
  journal   = {Parallel Processing Letters},
  volume    = {21},
  number    = {1},
  pages     = {77--84},
  year      = {2011},
  url       = {https://doi.org/10.1142/S0129626411000084},
  doi       = {10.1142/S0129626411000084},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ppl/TzengLH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LeeLH11,
  author    = {Cheng{-}Chi Lee and
               I{-}En Liao and
               Min{-}Shiang Hwang},
  title     = {An efficient authentication protocol for mobile communications},
  journal   = {Telecommunication Systems},
  volume    = {46},
  number    = {1},
  pages     = {31--41},
  year      = {2011},
  url       = {https://doi.org/10.1007/s11235-009-9276-4},
  doi       = {10.1007/s11235-009-9276-4},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/telsys/LeeLH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiH10,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang},
  title     = {An efficient biometrics-based remote user authentication scheme using
               smart cards},
  journal   = {J. Network and Computer Applications},
  volume    = {33},
  number    = {1},
  pages     = {1--5},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.jnca.2009.08.001},
  doi       = {10.1016/j.jnca.2009.08.001},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/LiH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HwangCC10,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Te{-}Yu Chen},
  title     = {DoS-resistant ID-based password authentication scheme using smart
               cards},
  journal   = {Journal of Systems and Software},
  volume    = {83},
  number    = {1},
  pages     = {163--172},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.jss.2009.07.050},
  doi       = {10.1016/j.jss.2009.07.050},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/HwangCC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/OuHJ10,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {A cocktail protocol with the Authentication and Key Agreement on the
               {UMTS}},
  journal   = {Journal of Systems and Software},
  volume    = {83},
  number    = {2},
  pages     = {316--325},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.jss.2009.08.019},
  doi       = {10.1016/j.jss.2009.08.019},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/OuHJ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/OuHJ10,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}Ke Jan},
  title     = {A Provable Billing Protocol on the Current {UMTS}},
  journal   = {Wireless Personal Communications},
  volume    = {55},
  number    = {4},
  pages     = {551--566},
  year      = {2010},
  url       = {https://doi.org/10.1007/s11277-009-9818-9},
  doi       = {10.1007/s11277-009-9818-9},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/wpc/OuHJ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/OuHJ09,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {The {UMTS-AKA} Protocols for Intelligent Transportation Systems},
  journal   = {{EURASIP} J. Wireless Comm. and Networking},
  volume    = {2009},
  year      = {2009},
  url       = {https://doi.org/10.1155/2009/267283},
  doi       = {10.1155/2009/267283},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejwcn/OuHJ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/LeeHT09,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng},
  title     = {A New Convertible Authenticated Encryption Scheme Based on the ElGamal
               Cryptosystem},
  journal   = {Int. J. Found. Comput. Sci.},
  volume    = {20},
  number    = {2},
  pages     = {351--359},
  year      = {2009},
  url       = {https://doi.org/10.1142/S0129054109006607},
  doi       = {10.1142/S0129054109006607},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijfcs/LeeHT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OuLHJ09,
  author    = {Hsia{-}Hung Ou and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {{TK-AKA:} using temporary key on Authentication and Key Agreement
               protocol on {UMTS}},
  journal   = {Int. Journal of Network Management},
  volume    = {19},
  number    = {4},
  pages     = {291--303},
  year      = {2009},
  url       = {https://doi.org/10.1002/nem.703},
  doi       = {10.1002/nem.703},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnm/OuLHJ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LeeHL09,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Chih{-}Wei Lin},
  title     = {A new English auction scheme using the bulletin board system},
  journal   = {Inf. Manag. Comput. Security},
  volume    = {17},
  number    = {5},
  pages     = {408--417},
  year      = {2009},
  url       = {https://doi.org/10.1108/09685220911006696},
  doi       = {10.1108/09685220911006696},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/imcs/LeeHL09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/LeeHH09,
  author    = {Cheng{-}Chi Lee and
               Pi{-}Fang Ho and
               Min{-}Shiang Hwang},
  title     = {A secure e-auction scheme based on group signatures},
  journal   = {Information Systems Frontiers},
  volume    = {11},
  number    = {3},
  pages     = {335--343},
  year      = {2009},
  url       = {https://doi.org/10.1007/s10796-008-9094-3},
  doi       = {10.1007/s10796-008-9094-3},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isf/LeeHH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigbed/WuCHL09,
  author    = {Hao{-}Ju Wu and
               Yi{-}Hsin Chang and
               Min{-}Shiang Hwang and
               Iuon{-}Chang Lin},
  title     = {Flexible {RFID} location system based on artificial neural networks
               for medical care facilities},
  journal   = {{SIGBED} Review},
  volume    = {6},
  number    = {2},
  pages     = {12},
  year      = {2009},
  url       = {https://doi.org/10.1145/1859823.1859835},
  doi       = {10.1145/1859823.1859835},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigbed/WuCHL09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/WuKKH09,
  author    = {Chia{-}Chun Wu and
               Shang{-}Juh Kao and
               Wen{-}Chung Kuo and
               Min{-}Shiang Hwang},
  title     = {Reversible Secret Image Sharing Based on Shamir's Scheme},
  booktitle = {Fifth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14
               September, 2009, Proceedings},
  pages     = {1014--1017},
  year      = {2009},
  crossref  = {DBLP:conf/iih-msp/2009},
  url       = {https://doi.org/10.1109/IIH-MSP.2009.158},
  doi       = {10.1109/IIH-MSP.2009.158},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iih-msp/WuKKH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/LiHL09,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yan{-}Chi Lai},
  title     = {A Verifiable Electronic Voting Scheme over the Internet},
  booktitle = {Sixth International Conference on Information Technology: New Generations,
               {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages     = {449--454},
  year      = {2009},
  crossref  = {DBLP:conf/itng/2009},
  url       = {https://doi.org/10.1109/ITNG.2009.93},
  doi       = {10.1109/ITNG.2009.93},
  timestamp = {Thu, 21 Jun 2018 07:42:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itng/LiHL09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/LiH09a,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang},
  title     = {Improving the Security of Non-PKI Methods for Public Key Distribution},
  booktitle = {Sixth International Conference on Information Technology: New Generations,
               {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages     = {1695--1696},
  year      = {2009},
  crossref  = {DBLP:conf/itng/2009},
  url       = {https://doi.org/10.1109/ITNG.2009.92},
  doi       = {10.1109/ITNG.2009.92},
  timestamp = {Thu, 21 Jun 2018 07:42:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itng/LiH09a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiHL08,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Chi{-}Yu Liu},
  title     = {An electronic voting protocol with deniable authentication for mobile
               ad hoc networks},
  journal   = {Computer Communications},
  volume    = {31},
  number    = {10},
  pages     = {2534--2540},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.comcom.2008.03.018},
  doi       = {10.1016/j.comcom.2008.03.018},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/LiHL08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiHC08,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {A secure and efficient communication scheme with authenticated key
               establishment and privacy preserving for vehicular ad hoc networks},
  journal   = {Computer Communications},
  volume    = {31},
  number    = {12},
  pages     = {2803--2814},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.comcom.2007.12.005},
  doi       = {10.1016/j.comcom.2007.12.005},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/LiHC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HwangLC08,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Song{-}Kong Chong},
  title     = {An improved address ownership in mobile IPv6},
  journal   = {Computer Communications},
  volume    = {31},
  number    = {14},
  pages     = {3250--3252},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.comcom.2008.05.011},
  doi       = {10.1016/j.comcom.2008.05.011},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/HwangLC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiHC08a,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {Further improvement on a novel privacy preserving authentication and
               access control scheme for pervasive computing environments},
  journal   = {Computer Communications},
  volume    = {31},
  number    = {18},
  pages     = {4255--4258},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.comcom.2008.06.002},
  doi       = {10.1016/j.comcom.2008.06.002},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/LiHC08a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/LiHC08,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {Improving the security of a secure anonymous routing protocol with
               authenticated key exchange for ad hoc networks},
  journal   = {Comput. Syst. Sci. Eng.},
  volume    = {23},
  number    = {3},
  year      = {2008},
  timestamp = {Thu, 23 Aug 2012 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csse/LiHC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WangWTH08,
  author    = {Chung{-}Ming Wang and
               Nan{-}I Wu and
               Chwei{-}Shyong Tsai and
               Min{-}Shiang Hwang},
  title     = {A high quality steganographic method with pixel-value differencing
               and modulus function},
  journal   = {Journal of Systems and Software},
  volume    = {81},
  number    = {1},
  pages     = {150--158},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.jss.2007.01.049},
  doi       = {10.1016/j.jss.2007.01.049},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/WangWTH08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LeeHL08,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {A new authentication protocol based on pointer forwarding for mobile
               communications},
  journal   = {Wireless Communications and Mobile Computing},
  volume    = {8},
  number    = {5},
  pages     = {661--672},
  year      = {2008},
  url       = {https://doi.org/10.1002/wcm.495},
  doi       = {10.1002/wcm.495},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/wicomm/LeeHL08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/WuKKH08,
  author    = {Chia{-}Chun Wu and
               Shang{-}Juh Kao and
               Wen{-}Chung Kuo and
               Min{-}Shiang Hwang},
  title     = {Enhance the Image Sharing with Steganography and Authentication},
  booktitle = {4th International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
               August 2008, Proceedings},
  pages     = {1177--1181},
  year      = {2008},
  crossref  = {DBLP:conf/iih-msp/2008},
  url       = {https://doi.org/10.1109/IIH-MSP.2008.317},
  doi       = {10.1109/IIH-MSP.2008.317},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iih-msp/WuKKH08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/LoHC08,
  author    = {Jung{-}Wen Lo and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {An Exchangeable E-Cash Scheme by E-Mint},
  booktitle = {Eighth International Conference on Intelligent Systems Design and
               Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
               3 Volumes},
  pages     = {246--251},
  year      = {2008},
  crossref  = {DBLP:conf/isda/2008},
  url       = {https://doi.org/10.1109/ISDA.2008.186},
  doi       = {10.1109/ISDA.2008.186},
  timestamp = {Tue, 23 Jan 2018 17:06:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isda/LoHC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  title     = {An Ordered Multi-proxy Multi-signature Scheme},
  booktitle = {Eighth International Conference on Intelligent Systems Design and
               Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
               3 Volumes},
  pages     = {308--313},
  year      = {2008},
  crossref  = {DBLP:conf/isda/2008},
  url       = {https://doi.org/10.1109/ISDA.2008.189},
  doi       = {10.1109/ISDA.2008.189},
  timestamp = {Tue, 23 Jan 2018 17:06:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isda/HwangTC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  title     = {An Improvement of Strong Proxy Signature and Its Applications},
  booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security
               and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  pages     = {95--98},
  year      = {2008},
  crossref  = {DBLP:conf/secrypt/2008},
  timestamp = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/HwangTC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/OuHJ07,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {A simple mobile communication billing system among charged parties},
  journal   = {Applied Mathematics and Computation},
  volume    = {192},
  number    = {2},
  pages     = {487--495},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.amc.2007.03.034},
  doi       = {10.1016/j.amc.2007.03.034},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/OuHJ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/TzengTH07,
  author    = {Shiang{-}Feng Tzeng and
               Yuan{-}Liang Tang and
               Min{-}Shiang Hwang},
  title     = {A new convertible authenticated encryption scheme with message linkages},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {33},
  number    = {2},
  pages     = {133--138},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.compeleceng.2006.02.005},
  doi       = {10.1016/j.compeleceng.2006.02.005},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cee/TzengTH07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WuH07,
  author    = {Nan{-}I Wu and
               Min{-}Shiang Hwang},
  title     = {Data Hiding: Current Status and Key Issues},
  journal   = {I. J. Network Security},
  volume    = {4},
  number    = {1},
  pages     = {1--9},
  year      = {2007},
  url       = {http://ijns.femto.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p1-9.pdf},
  timestamp = {Sun, 08 Nov 2009 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/WuH07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/HwangTL07,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Chun{-}Ta Li},
  title     = {A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation
               Period},
  booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International
               Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings.
               Part {III}},
  pages     = {273--284},
  year      = {2007},
  crossref  = {DBLP:conf/iccsa/2007-3},
  url       = {https://doi.org/10.1007/978-3-540-74484-9\_24},
  doi       = {10.1007/978-3-540-74484-9\_24},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccsa/HwangTL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/BaoLH06,
  author    = {Feng Bao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis and improvement on batch verifying multiple {RSA} digital
               signatures},
  journal   = {Applied Mathematics and Computation},
  volume    = {172},
  number    = {2},
  pages     = {1195--1200},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.amc.2005.03.016},
  doi       = {10.1016/j.amc.2005.03.016},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/amc/BaoLH06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HwangLHC06,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Shu{-}Yin Hsiao and
               Yen{-}Ping Chu},
  title     = {Improvement of Authenticated Encryption Schemes with Message Linkages
               for Message Flows},
  journal   = {{IEICE} Transactions},
  volume    = {89-D},
  number    = {4},
  pages     = {1575--1577},
  year      = {2006},
  url       = {https://doi.org/10.1093/ietisy/e89-d.4.1575},
  doi       = {10.1093/ietisy/e89-d.4.1575},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/HwangLHC06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HwangS06,
  author    = {Min{-}Shiang Hwang and
               Pei{-}Chen Sung},
  title     = {A Study of Micro-payment Based on One-way Hash Chain},
  journal   = {I. J. Network Security},
  volume    = {2},
  number    = {2},
  pages     = {81--90},
  year      = {2006},
  url       = {http://ijns.femto.com.tw/contents/ijns-v2-n2/ijns-2006-v2-n2-p81-90.pdf},
  timestamp = {Mon, 09 Nov 2009 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/HwangS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiLH06,
  author    = {Chwei{-}Shyong Tsai and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {Password Authentication Schemes: Current Status and Key Issues},
  journal   = {I. J. Network Security},
  volume    = {3},
  number    = {2},
  pages     = {101--115},
  year      = {2006},
  url       = {http://ijns.femto.com.tw/contents/ijns-v3-n2/ijns-2006-v3-n2-p101-115.pdf},
  timestamp = {Mon, 09 Nov 2009 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/TsaiLH06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/LiaoLH06,
  author    = {I{-}En Liao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A password authentication scheme over insecure networks},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {72},
  number    = {4},
  pages     = {727--740},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.jcss.2005.10.001},
  doi       = {10.1016/j.jcss.2005.10.001},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcss/LiaoLH06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/LeeHL06,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {Security Enhancement on a New Authentication Scheme With Anonymity
               for Wireless Environments},
  journal   = {{IEEE} Trans. Industrial Electronics},
  volume    = {53},
  number    = {5},
  pages     = {1683--1687},
  year      = {2006},
  url       = {https://doi.org/10.1109/TIE.2006.881998},
  doi       = {10.1109/TIE.2006.881998},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tie/LeeHL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsa/LiaoLH06,
  author    = {I{-}En Liao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {Identity-based deniable authentication protocol from pairings},
  booktitle = {Proceedings of the Tenth {IASTED} International Conference on Internet
               and Multimedia Systems and Applications {(IMSA} 2006), Honolulu, Hawaii,
               USA, August 14-16, 2006},
  pages     = {112--114},
  year      = {2006},
  crossref  = {DBLP:conf/imsa/2006},
  timestamp = {Tue, 27 Oct 2015 19:30:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imsa/LiaoLH06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LiTH05,
  author    = {Li{-}Hua Li and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Improvement of signature scheme based on factoring and discrete logarithms},
  journal   = {Applied Mathematics and Computation},
  volume    = {161},
  number    = {1},
  pages     = {49--54},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2003.12.008},
  doi       = {10.1016/j.amc.2003.12.008},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/LiTH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LuHH05,
  author    = {Eric Jui{-}Lin Lu and
               Min{-}Shiang Hwang and
               Cheng{-}Jian Huang},
  title     = {A new proxy signature scheme with revocation},
  journal   = {Applied Mathematics and Computation},
  volume    = {161},
  number    = {3},
  pages     = {799--806},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2003.12.039},
  doi       = {10.1016/j.amc.2003.12.039},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/LuHH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ChangHY05,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret
               sharing scheme},
  journal   = {Applied Mathematics and Computation},
  volume    = {163},
  number    = {1},
  pages     = {169--178},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.01.029},
  doi       = {10.1016/j.amc.2004.01.029},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/ChangHY05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LeeHY05,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A new blind signature based on the discrete logarithm problem for
               untraceability},
  journal   = {Applied Mathematics and Computation},
  volume    = {164},
  number    = {3},
  pages     = {837--841},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.06.034},
  doi       = {10.1016/j.amc.2004.06.034},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/LeeHY05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/TsaiLH05,
  author    = {Chwei{-}Shyong Tsai and
               Shu{-}Chen Lin and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an authenticated encryption scheme using self-certified
               public keys},
  journal   = {Applied Mathematics and Computation},
  volume    = {166},
  number    = {1},
  pages     = {118--122},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.04.073},
  doi       = {10.1016/j.amc.2004.04.073},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/TsaiLH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/HwangHC05,
  author    = {Min{-}Shiang Hwang and
               Kuo{-}Feng Hwang and
               Chin{-}Chen Chang},
  title     = {A time-stamping protocol for digital watermarking},
  journal   = {Applied Mathematics and Computation},
  volume    = {169},
  number    = {2},
  pages     = {1276--1284},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.10.094},
  doi       = {10.1016/j.amc.2004.10.094},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/amc/HwangHC05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HwangLL05,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Chia{-}Hsin Liu},
  title     = {Improvement on the flexible tree-based key management framework},
  journal   = {Computers {\&} Security},
  volume    = {24},
  number    = {6},
  pages     = {500--504},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.cose.2004.09.009},
  doi       = {10.1016/j.cose.2004.09.009},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/HwangLL05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/TzengHC05,
  author    = {Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang and
               Hsing{-}Bai Chen},
  title     = {A secure on-line software transaction scheme},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {27},
  number    = {3},
  pages     = {303--312},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.csi.2004.07.004},
  doi       = {10.1016/j.csi.2004.07.004},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csi/TzengHC05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinHC05,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Chin{-}Chen Chang},
  title     = {The General Pay-Word: {A} Micro-payment Scheme Based on \emph{n}-dimension
               One-way Hash Chain},
  journal   = {Des. Codes Cryptography},
  volume    = {36},
  number    = {1},
  pages     = {53--67},
  year      = {2005},
  url       = {https://doi.org/10.1007/s10623-003-1162-6},
  doi       = {10.1007/s10623-003-1162-6},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/LinHC05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/WuHL05,
  author    = {Hsien{-}Chu Wu and
               Min{-}Shiang Hwang and
               Chia{-}Hsin Liu},
  title     = {A Secure Strong-Password Authentication Protocol},
  journal   = {Fundam. Inform.},
  volume    = {68},
  number    = {4},
  pages     = {399--406},
  year      = {2005},
  url       = {http://content.iospress.com/articles/fundamenta-informaticae/fi68-4-06},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fuin/WuHL05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcat/LeeCH05,
  author    = {Cheng{-}Chi Lee and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A simple broadcasting cryptosystem in computer networks using eXclusive-OR},
  journal   = {{IJCAT}},
  volume    = {24},
  number    = {3},
  pages     = {180--183},
  year      = {2005},
  url       = {https://doi.org/10.1504/IJCAT.2005.007484},
  doi       = {10.1504/IJCAT.2005.007484},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijcat/LeeCH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HwangL05,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee},
  title     = {Research Issues and Challenges for Multiple Digital Signatures},
  journal   = {I. J. Network Security},
  volume    = {1},
  number    = {1},
  pages     = {1--7},
  year      = {2005},
  url       = {http://ijns.femto.com.tw/contents/ijns-v1-n1/ijns-2005-v1-n1-p1-7.pdf},
  timestamp = {Mon, 09 Nov 2009 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/HwangL05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HwangL05a,
  author    = {Min{-}Shiang Hwang and
               Chi{-}Yu Liu},
  title     = {Authenticated Encryption Schemes: Current Status and Key Issues},
  journal   = {I. J. Network Security},
  volume    = {1},
  number    = {2},
  pages     = {61--73},
  year      = {2005},
  url       = {http://ijns.femto.com.tw/contents/ijns-v1-n2/ijns-2005-v1-n2-p61-73.pdf},
  timestamp = {Mon, 09 Nov 2009 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/HwangL05a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HwangC05,
  author    = {Min{-}Shiang Hwang and
               Ting Yi Chang},
  title     = {Threshold Signatures: Current Status and Key Issues},
  journal   = {I. J. Network Security},
  volume    = {1},
  number    = {3},
  pages     = {123--137},
  year      = {2005},
  url       = {http://ijns.femto.com.tw/contents/ijns-v1-n3/ijns-2005-v1-n3-p123-137.pdf},
  timestamp = {Mon, 09 Nov 2009 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/HwangC05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/LinOH05,
  author    = {Iuon{-}Chang Lin and
               Hsia{-}Hung Ou and
               Min{-}Shiang Hwang},
  title     = {A user authentication system using back-propagation network},
  journal   = {Neural Computing and Applications},
  volume    = {14},
  number    = {3},
  pages     = {243--249},
  year      = {2005},
  url       = {https://doi.org/10.1007/s00521-004-0460-x},
  doi       = {10.1007/s00521-004-0460-x},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/nca/LinOH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/ChangHY05,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A new multi-stage secret sharing scheme using one-way function},
  journal   = {Operating Systems Review},
  volume    = {39},
  number    = {1},
  pages     = {48--55},
  year      = {2005},
  url       = {https://doi.org/10.1145/1044552.1044557},
  doi       = {10.1145/1044552.1044557},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/ChangHY05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/HwangLLY05,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Ji{-}Zhe Lee and
               Chao{-}Chen Yang},
  title     = {A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography},
  journal   = {Telecommunication Systems},
  volume    = {29},
  number    = {3},
  pages     = {165--180},
  year      = {2005},
  url       = {https://doi.org/10.1007/s11235-005-1689-0},
  doi       = {10.1007/s11235-005-1689-0},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/telsys/HwangLLY05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/YangCH04,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A (t, n) multi-secret sharing scheme},
  journal   = {Applied Mathematics and Computation},
  volume    = {151},
  number    = {2},
  pages     = {483--490},
  year      = {2004},
  url       = {https://doi.org/10.1016/S0096-3003(03)00355-2},
  doi       = {10.1016/S0096-3003(03)00355-2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/YangCH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TzengHY04,
  author    = {Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang and
               Cheng{-}Ying Yang},
  title     = {An improvement of nonrepudiable threshold proxy signature scheme with
               known signers},
  journal   = {Computers {\&} Security},
  volume    = {23},
  number    = {2},
  pages     = {174--178},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.cose.2003.12.001},
  doi       = {10.1016/j.cose.2003.12.001},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/TzengHY04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/TzengH04,
  author    = {Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Digital signature with message recovery and its variants based on
               elliptic curve discrete logarithm problem},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {26},
  number    = {2},
  pages     = {61--71},
  year      = {2004},
  url       = {https://doi.org/10.1016/S0920-5489(03)00069-2},
  doi       = {10.1016/S0920-5489(03)00069-2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csi/TzengH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HwangTT04,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Chwei{-}Shyong Tsai},
  title     = {Generalization of proxy signature based on elliptic curves},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {26},
  number    = {2},
  pages     = {73--84},
  year      = {2004},
  url       = {https://doi.org/10.1016/S0920-5489(03)00075-8},
  doi       = {10.1016/S0920-5489(03)00075-8},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csi/HwangTT04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LinOH04,
  author    = {Iuon{-}Chang Lin and
               Hsia{-}Hung Ou and
               Min{-}Shiang Hwang},
  title     = {Efficient access control and key management schemes for mobile agents},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {26},
  number    = {5},
  pages     = {423--433},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.csi.2003.11.010},
  doi       = {10.1016/j.csi.2003.11.010},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csi/LinOH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HwangLL04,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Shu{-}Chen Lin},
  title     = {An efficient user identification scheme based on ID-based cryptosystem},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {26},
  number    = {6},
  pages     = {565--569},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.csi.2004.03.006},
  doi       = {10.1016/j.csi.2004.03.006},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csi/HwangLL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/YangLH04,
  author    = {Chou Chen Yang and
               Jian Wei Li and
               Min{-}Shiang Hwang},
  title     = {A new mutual authentication and key exchange protocol with balanced
               computational power for wireless settings},
  journal   = {European Transactions on Telecommunications},
  volume    = {15},
  number    = {2},
  pages     = {91--99},
  year      = {2004},
  url       = {https://doi.org/10.1002/ett.957},
  doi       = {10.1002/ett.957},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ett/YangLH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/TzengYH04,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {A nonrepudiable threshold multi-proxy multi-signature scheme with
               shared verification},
  journal   = {Future Generation Comp. Syst.},
  volume    = {20},
  number    = {5},
  pages     = {887--893},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.future.2004.01.002},
  doi       = {10.1016/j.future.2004.01.002},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/TzengYH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChangYH04,
  author    = {Ting Yi Chang and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A threshold signature scheme for group communications without a shared
               distribution center},
  journal   = {Future Generation Comp. Syst.},
  volume    = {20},
  number    = {6},
  pages     = {1013--1021},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.future.2003.09.005},
  doi       = {10.1016/j.future.2003.09.005},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/ChangYH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/HwangLL04,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Chia{-}Hsin Liu},
  title     = {Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service
               Attack},
  journal   = {Fundam. Inform.},
  volume    = {61},
  number    = {3-4},
  pages     = {389--398},
  year      = {2004},
  url       = {http://content.iospress.com/articles/fundamenta-informaticae/fi61-3-4-12},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fuin/HwangLL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShenLH04,
  author    = {Jau{-}Ji Shen and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {A Secure {LITESET} Scheme},
  journal   = {{IEICE} Transactions},
  volume    = {87-D},
  number    = {11},
  pages     = {2509--2512},
  year      = {2004},
  url       = {http://search.ieice.org/bin/summary.php?id=e87-d\_11\_2509},
  timestamp = {Wed, 17 Aug 2011 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/ShenLH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/TzengYH04,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {A new digital signature scheme based on factoring and discrete logarithms},
  journal   = {Int. J. Comput. Math.},
  volume    = {81},
  number    = {1},
  pages     = {9--14},
  year      = {2004},
  url       = {https://doi.org/10.1080/00207160310001614954},
  doi       = {10.1080/00207160310001614954},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijcm/TzengYH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/YangTH04,
  author    = {Cheng{-}Ying Yang and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {On the efficiency of nonrepudiable threshold proxy signature scheme
               with known signers},
  journal   = {Journal of Systems and Software},
  volume    = {73},
  number    = {3},
  pages     = {507--514},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.jss.2003.09.022},
  doi       = {10.1016/j.jss.2003.09.022},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/YangTH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LeeHL04,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {A server assisted authentication protocol for detecting error vectors},
  journal   = {Operating Systems Review},
  volume    = {38},
  number    = {2},
  pages     = {93--96},
  year      = {2004},
  url       = {https://doi.org/10.1145/991130.991140},
  doi       = {10.1145/991130.991140},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/LeeHL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/HwangLL04,
  author    = {Min{-}Shiang Hwang and
               Li{-}Hua Li and
               Cheng{-}Chi Lee},
  title     = {A key authentication scheme with non-repudiation},
  journal   = {Operating Systems Review},
  volume    = {38},
  number    = {3},
  pages     = {75--78},
  year      = {2004},
  url       = {https://doi.org/10.1145/1035834.1035843},
  doi       = {10.1145/1035834.1035843},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/HwangLL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LiLH04,
  author    = {Li{-}Hua Li and
               Chi{-}Yu Liu and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an efficient secure group signature scheme},
  journal   = {Operating Systems Review},
  volume    = {38},
  number    = {4},
  pages     = {66--69},
  year      = {2004},
  url       = {https://doi.org/10.1145/1031154.1031161},
  doi       = {10.1145/1031154.1031161},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/LiLH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ChangCH04,
  author    = {Chin{-}Chen Chang and
               Kuo{-}Lun Chen and
               Min{-}Shiang Hwang},
  title     = {End-to-End Security Protocol for Mobile Communications with End-User
               Identification/Authentication},
  journal   = {Wireless Personal Communications},
  volume    = {28},
  number    = {2},
  pages     = {95--106},
  year      = {2004},
  url       = {https://doi.org/10.1023/B:WIRE.0000021422.21951.f0},
  doi       = {10.1023/B:WIRE.0000021422.21951.f0},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/wpc/ChangCH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/HwangCLT04,
  author    = {Min{-}Shiang Hwang and
               Ting Yi Chang and
               Shu{-}Chen Lin and
               Chwei{-}Shyong Tsai},
  title     = {On the Security of an Enhanced Authentication Key Exchange Protocol},
  booktitle = {18th International Conference on Advanced Information Networking and
               Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan},
  pages     = {160--163},
  year      = {2004},
  crossref  = {DBLP:conf/aina/2004},
  url       = {https://doi.org/10.1109/AINA.2004.1283777},
  doi       = {10.1109/AINA.2004.1283777},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/HwangCLT04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LeeHL03,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Li{-}Hua Li},
  title     = {A new key authentication scheme based on discrete logarithms},
  journal   = {Applied Mathematics and Computation},
  volume    = {139},
  number    = {2-3},
  pages     = {343--349},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0096-3003(02)00192-3},
  doi       = {10.1016/S0096-3003(02)00192-3},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/LeeHL03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/HwangLL03,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yan{-}Chi Lai},
  title     = {Traceability on RSA-based partially signature with low computation},
  journal   = {Applied Mathematics and Computation},
  volume    = {145},
  number    = {2-3},
  pages     = {465--468},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0096-3003(02)00500-3},
  doi       = {10.1016/S0096-3003(02)00500-3},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/HwangLL03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiTH03,
  author    = {Li{-}Hua Li and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Generalization of proxy signature-based on discrete logarithms},
  journal   = {Computers {\&} Security},
  volume    = {22},
  number    = {3},
  pages     = {245--255},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0167-4048(03)00312-2},
  doi       = {10.1016/S0167-4048(03)00312-2},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/LiTH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenLH03,
  author    = {Jau{-}Ji Shen and
               Chih{-}Wei Lin and
               Min{-}Shiang Hwang},
  title     = {Security enhancement for the timestamp-based password authentication
               scheme using smart cards},
  journal   = {Computers {\&} Security},
  volume    = {22},
  number    = {7},
  pages     = {591--595},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0167-4048(03)00709-0},
  doi       = {10.1016/S0167-4048(03)00709-0},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/ShenLH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LinHC03,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Chin{-}Chen Chang},
  title     = {Security enhancement for anonymous secure e-voting over a network},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {25},
  number    = {2},
  pages     = {131--139},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0920-5489(02)00120-4},
  doi       = {10.1016/S0920-5489(02)00120-4},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/csi/LinHC03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/YangCH03,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A new anonymous conference key distribution system based on the elliptic
               curve discrete logarithm problem},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {25},
  number    = {2},
  pages     = {141--145},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0920-5489(03)00002-3},
  doi       = {10.1016/S0920-5489(03)00002-3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csi/YangCH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LinHL03,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Li{-}Hua Li},
  title     = {A new remote user authentication scheme for multi-server architecture},
  journal   = {Future Generation Comp. Syst.},
  volume    = {19},
  number    = {1},
  pages     = {13--22},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0167-739X(02)00093-6},
  doi       = {10.1016/S0167-739X(02)00093-6},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/LinHL03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LinHC03,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Chin{-}Chen Chang},
  title     = {A new key assignment scheme for enforcing complicated access control
               policies in hierarchy},
  journal   = {Future Generation Comp. Syst.},
  volume    = {19},
  number    = {4},
  pages     = {457--462},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0167-739X(02)00200-5},
  doi       = {10.1016/S0167-739X(02)00200-5},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/LinHC03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/LeeYH03,
  author    = {Cheng{-}Chi Lee and
               Wei{-}Pang Yang and
               Min{-}Shiang Hwang},
  title     = {Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem},
  journal   = {Fundam. Inform.},
  volume    = {55},
  number    = {3-4},
  pages     = {307--320},
  year      = {2003},
  url       = {http://content.iospress.com/articles/fundamenta-informaticae/fi55-3-4-04},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fuin/LeeYH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/LeeYH03,
  author    = {Cheng{-}Chi Lee and
               Chao{-}Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A new privacy and authentication protocol for end-to-end mobile users},
  journal   = {Int. J. Communication Systems},
  volume    = {16},
  number    = {9},
  pages     = {799--808},
  year      = {2003},
  url       = {https://doi.org/10.1002/dac.617},
  doi       = {10.1002/dac.617},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijcomsys/LeeYH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/YangCLH03,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Jian Wei Li and
               Min{-}Shiang Hwang},
  title     = {Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {14},
  number    = {1},
  pages     = {111--120},
  year      = {2003},
  url       = {http://content.iospress.com/articles/informatica/inf14-1-08},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/YangCLH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/TsaiTH03,
  author    = {Chwei{-}Shyong Tsai and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Improved Non-Repudiable Threshold Proxy Signature Scheme with Known
               Signers},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {14},
  number    = {3},
  pages     = {393--402},
  year      = {2003},
  url       = {http://content.iospress.com/articles/informatica/inf14-3-09},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/TsaiTH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/YangCH03,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {Security of Improvement on Methods for Protecting Password Transmission},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {14},
  number    = {4},
  pages     = {551--558},
  year      = {2003},
  url       = {http://content.iospress.com/articles/informatica/inf14-4-11},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/YangCH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/HwangHT03a,
  author    = {Shin{-}Jia Hwang and
               Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng},
  title     = {A New Digital Multisignature Scheme With Distinguished Signing Authorities},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {19},
  number    = {5},
  pages     = {881--887},
  year      = {2003},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2003/200309\_09.html},
  timestamp = {Wed, 24 Oct 2007 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jise/HwangHT03a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HwangY03,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Controlling access in large partially ordered hierarchies using cryptographic
               keys},
  journal   = {Journal of Systems and Software},
  volume    = {67},
  number    = {2},
  pages     = {99--107},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0164-1212(02)00091-2},
  doi       = {10.1016/S0164-1212(02)00091-2},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/HwangY03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LinSH03,
  author    = {Chih{-}Wei Lin and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {Security enhancement for Optimal Strong-Password Authentication protocol},
  journal   = {Operating Systems Review},
  volume    = {37},
  number    = {2},
  pages     = {7--12},
  year      = {2003},
  url       = {https://doi.org/10.1145/769782.769783},
  doi       = {10.1145/769782.769783},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/LinSH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LinSH03a,
  author    = {Chih{-}Wei Lin and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {Security enhancement for optimal strong-password authentication protocol},
  journal   = {Operating Systems Review},
  volume    = {37},
  number    = {3},
  pages     = {12--16},
  year      = {2003},
  url       = {https://doi.org/10.1145/881783.881785},
  doi       = {10.1145/881783.881785},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/LinSH03a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/HwangYS03,
  author    = {Min{-}Shiang Hwang and
               Chao{-}Chen Yang and
               Cheng{-}Yeh Shiu},
  title     = {An authentication scheme for mobile satellite communication systems},
  journal   = {Operating Systems Review},
  volume    = {37},
  number    = {4},
  pages     = {42--47},
  year      = {2003},
  url       = {https://doi.org/10.1145/958965.958970},
  doi       = {10.1145/958965.958970},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/HwangYS03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ShenLH03,
  author    = {Jau{-}Ji Shen and
               Chih{-}Wei Lin and
               Min{-}Shiang Hwang},
  title     = {A modified remote user authentication scheme using smart cards},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {49},
  number    = {2},
  pages     = {414--416},
  year      = {2003},
  url       = {https://doi.org/10.1109/TCE.2003.1209534},
  doi       = {10.1109/TCE.2003.1209534},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tce/ShenLH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/HwangLL03,
  author    = {Min{-}Shiang Hwang and
               Eric Jui{-}Lin Lu and
               Iuon{-}Chang Lin},
  title     = {A Practical (t, n) Threshold Proxy Signature Scheme Based on the {RSA}
               Cryptosystem},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {15},
  number    = {6},
  pages     = {1552--1560},
  year      = {2003},
  url       = {https://doi.org/10.1109/TKDE.2003.1245292},
  doi       = {10.1109/TKDE.2003.1245292},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tkde/HwangLL03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/HwangT03,
  author    = {Min{-}Shiang Hwang and
               Wen{-}Guey Tzeng},
  title     = {A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy},
  booktitle = {Information Networking, Networking Technologies for Enhanced Internet
               Services International Conference, {ICOIN} 2003, Cheju Island, Korea,
               February 12-14, 2003, Revised Selected Papers},
  pages     = {757--761},
  year      = {2003},
  crossref  = {DBLP:conf/icoin/2003},
  url       = {https://doi.org/10.1007/978-3-540-45235-5\_74},
  doi       = {10.1007/978-3-540-45235-5\_74},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icoin/HwangT03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/HwangLL02,
  author    = {Min{-}Shiang Hwang and
               Eric Jui{-}Lin Lu and
               Iuon{-}Chang Lin},
  title     = {Adding timestamps to the secure electronic auction protocol},
  journal   = {Data Knowl. Eng.},
  volume    = {40},
  number    = {2},
  pages     = {155--162},
  year      = {2002},
  url       = {https://doi.org/10.1016/S0169-023X(01)00048-9},
  doi       = {10.1016/S0169-023X(01)00048-9},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dke/HwangLL02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/HwangLH02,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Shin{-}Jia Hwang},
  title     = {Cryptanalysis of the Hwang-Shi Proxy Signature Scheme},
  journal   = {Fundam. Inform.},
  volume    = {53},
  number    = {2},
  pages     = {131--134},
  year      = {2002},
  url       = {http://content.iospress.com/articles/fundamenta-informaticae/fi53-2-02},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fuin/HwangLH02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/ChangHH02,
  author    = {Chin{-}Chen Chang and
               Kuo{-}Feng Hwang and
               Min{-}Shiang Hwang},
  title     = {A Feature-Oriented Copyright Owner Proving Technique for Still Images},
  journal   = {International Journal of Software Engineering and Knowledge Engineering},
  volume    = {12},
  number    = {3},
  pages     = {317--330},
  year      = {2002},
  url       = {https://doi.org/10.1142/S0218194002000937},
  doi       = {10.1142/S0218194002000937},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijseke/ChangHH02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/HwangLC02,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Ting Yi Chang},
  title     = {Broadcasting Cryptosystem in Computer Networks Using Geometric Properties
               of Lines},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {18},
  number    = {3},
  pages     = {373--379},
  year      = {2002},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2002/200205\_03.html},
  timestamp = {Wed, 24 Oct 2007 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jise/HwangLC02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LeeHY02,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A flexible remote user authentication scheme using smart cards},
  journal   = {Operating Systems Review},
  volume    = {36},
  number    = {3},
  pages     = {46--52},
  year      = {2002},
  url       = {https://doi.org/10.1145/567331.567335},
  doi       = {10.1145/567331.567335},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/LeeHY02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LeeLH02,
  author    = {Cheng{-}Chi Lee and
               Li{-}Hua Li and
               Min{-}Shiang Hwang},
  title     = {A remote user authentication scheme using hash functions},
  journal   = {Operating Systems Review},
  volume    = {36},
  number    = {4},
  pages     = {23--29},
  year      = {2002},
  url       = {https://doi.org/10.1145/583800.583803},
  doi       = {10.1145/583800.583803},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/LeeLH02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/HwangCH02,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {An ElGamal-Like Cryptosystem for Enciphering Large Messages},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {14},
  number    = {2},
  pages     = {445--446},
  year      = {2002},
  url       = {https://doi.org/10.1109/69.991728},
  doi       = {10.1109/69.991728},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tkde/HwangCH02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdma/YangHLC02,
  author    = {Chou Chen Yang and
               Min{-}Shiang Hwang and
               Jian Wei Li and
               Ting Yi Chang},
  title     = {A Solution to Mobile {IP} Registration for {AAA}},
  booktitle = {Mobile Communications, 7th {CDMA} International Conference, {CIC}
               2002, Seoul, Korea, October 29 - November 1, 2002, Revised Papers},
  pages     = {329--337},
  year      = {2002},
  crossref  = {DBLP:conf/cdma/2002},
  url       = {https://doi.org/10.1007/3-540-36555-9\_34},
  doi       = {10.1007/3-540-36555-9\_34},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cdma/YangHLC02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/HwangL01,
  author    = {Min{-}Shiang Hwang and
               Chii{-}Hwa Lee},
  title     = {Secure access schemes in mobile database systems},
  journal   = {European Transactions on Telecommunications},
  volume    = {12},
  number    = {4},
  pages     = {303--310},
  year      = {2001},
  url       = {https://doi.org/10.1002/ett.4460120407},
  doi       = {10.1002/ett.4460120407},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ett/HwangL01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/HwangLT01,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yuan{-}Liang Tang},
  title     = {An Improvement of {SPLICE/AS} in {WIDE} against Guessing Attack},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {12},
  number    = {2},
  pages     = {297--302},
  year      = {2001},
  url       = {http://www.mii.lt/informatica/htm/INFO267.htm},
  timestamp = {Mon, 04 Mar 2013 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/HwangLT01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HwangLL01,
  author    = {Min{-}Shiang Hwang and
               Iuon{-}Chang Lin and
               Li{-}Hua Li},
  title     = {A simple micro-payment scheme},
  journal   = {Journal of Systems and Software},
  volume    = {55},
  number    = {3},
  pages     = {221--229},
  year      = {2001},
  url       = {https://doi.org/10.1016/S0164-1212(00)00072-8},
  doi       = {10.1016/S0164-1212(00)00072-8},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/HwangLL01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ChangHC01,
  author    = {Chin{-}Chen Chang and
               Min{-}Shiang Hwang and
               Tung{-}Shou Chen},
  title     = {A new encryption algorithm for image cryptosystems},
  journal   = {Journal of Systems and Software},
  volume    = {58},
  number    = {2},
  pages     = {83--91},
  year      = {2001},
  url       = {https://doi.org/10.1016/S0164-1212(01)00029-2},
  doi       = {10.1016/S0164-1212(01)00029-2},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jss/ChangHC01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/LiLH01,
  author    = {Li{-}Hua Li and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {A remote password authentication scheme for multiserver architecture
               using neural networks},
  journal   = {{IEEE} Trans. Neural Networks},
  volume    = {12},
  number    = {6},
  pages     = {1498--1504},
  year      = {2001},
  url       = {https://doi.org/10.1109/72.963786},
  doi       = {10.1109/72.963786},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tnn/LiLH01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HwangLT01,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yuan{-}Liang Tang},
  title     = {Two Simple Batch Verifying Multiple Digital Signatures},
  booktitle = {Information and Communications Security, Third International Conference,
               {ICICS} 2001, Xian, China, November 13-16, 2001},
  pages     = {233--237},
  year      = {2001},
  crossref  = {DBLP:conf/icics/2001},
  url       = {https://doi.org/10.1007/3-540-45600-7\_26},
  doi       = {10.1007/3-540-45600-7\_26},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/HwangLT01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/HwangCH00,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {A threshold decryption scheme without session keys},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {27},
  number    = {1},
  pages     = {29--35},
  year      = {2000},
  url       = {https://doi.org/10.1016/S0045-7906(00)00006-9},
  doi       = {10.1016/S0045-7906(00)00006-9},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cee/HwangCH00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/HwangLH00,
  author    = {Min{-}Shiang Hwang and
               Iuon{-}Chang Lin and
               Kuo{-}Feng Hwang},
  title     = {Cryptanalysis of the Batch Verifying Multiple {RSA} Digital Signatures},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {11},
  number    = {1},
  pages     = {15--19},
  year      = {2000},
  url       = {http://www.mii.lt/informatica/htm/INFO197.htm},
  timestamp = {Mon, 04 Mar 2013 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/HwangLH00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/HwangLL00,
  author    = {Min{-}Shiang Hwang and
               Iuon{-}Chang Lin and
               Eric Jui{-}Lin Lu},
  title     = {A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known
               Signers},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {11},
  number    = {2},
  pages     = {137--144},
  year      = {2000},
  url       = {http://www.mii.lt/informatica/htm/INFO199.htm},
  timestamp = {Mon, 04 Mar 2013 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/HwangLL00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/Hwang00,
  author    = {Min{-}Shiang Hwang},
  title     = {A New Redundancy Reducing Cipher},
  journal   = {Informatica, Lith. Acad. Sci.},
  volume    = {11},
  number    = {4},
  pages     = {435--440},
  year      = {2000},
  url       = {http://www.mii.lt/informatica/htm/INFO233.htm},
  timestamp = {Mon, 04 Mar 2013 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaLT/Hwang00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/ChangHK00,
  author    = {Chin{-}Chen Chang and
               Kuo{-}Feng Hwang and
               Min{-}Shiang Hwang},
  title     = {A Digital Watermarking Scheme Using Human Visual Effects},
  journal   = {Informatica (Slovenia)},
  volume    = {24},
  number    = {4},
  year      = {2000},
  timestamp = {Mon, 15 Feb 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaSI/ChangHK00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Hwang00,
  author    = {Min{-}Shiang Hwang},
  title     = {Cryptanalysis of {YCN} key assignment scheme in a hierarchy},
  journal   = {Inf. Process. Lett.},
  volume    = {73},
  number    = {3-4},
  pages     = {97--101},
  year      = {2000},
  url       = {https://doi.org/10.1016/S0020-0190(00)00013-2},
  doi       = {10.1016/S0020-0190(00)00013-2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/Hwang00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/HwangCH00,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {Digital watermarking of images using neural networks},
  journal   = {J. Electronic Imaging},
  volume    = {9},
  number    = {4},
  pages     = {548--555},
  year      = {2000},
  url       = {https://doi.org/10.1117/1.1289357},
  doi       = {10.1117/1.1289357},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jei/HwangCH00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/HwangL00,
  author    = {Min{-}Shiang Hwang and
               Li{-}Hua Li},
  title     = {A new remote user authentication scheme using smart cards},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {46},
  number    = {1},
  pages     = {28--30},
  year      = {2000},
  url       = {https://doi.org/10.1109/30.826377},
  doi       = {10.1109/30.826377},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tce/HwangL00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/LinCH00,
  author    = {Iuon{-}Chang Lin and
               Chin{-}Chen Chang and
               Min{-}Shiang Hwang},
  title     = {Security Enhancement for the "Simple Authentication Key Agreement
               Algorithm"},
  booktitle = {24th International Computer Software and Applications Conference {(COMPSAC}
               2000), 25-28 October 2000, Taipei, Taiwan},
  pages     = {113--115},
  year      = {2000},
  crossref  = {DBLP:conf/compsac/2000},
  url       = {https://doi.org/10.1109/CMPSAC.2000.884699},
  doi       = {10.1109/CMPSAC.2000.884699},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/compsac/LinCH00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Hwang99,
  author    = {Min{-}Shiang Hwang},
  title     = {Cryptanalysis of a remote login authentication scheme},
  journal   = {Computer Communications},
  volume    = {22},
  number    = {8},
  pages     = {742--744},
  year      = {1999},
  url       = {https://doi.org/10.1016/S0140-3664(99)00036-5},
  doi       = {10.1016/S0140-3664(99)00036-5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/Hwang99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LeeHY99,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A Novel Application of the Phone Card and Its Authentication in Mobile
               Communications},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {15},
  number    = {4},
  pages     = {471--484},
  year      = {1999},
  url       = {http://www.iis.sinica.edu.tw/page/jise/1999/199907\_01.html},
  timestamp = {Wed, 24 Oct 2007 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jise/LeeHY99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/njc/Hwang99,
  author    = {Min{-}Shiang Hwang},
  title     = {A Dynamic Key Generation Scheme for Access Control in a Hierarchy},
  journal   = {Nord. J. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {363--371},
  year      = {1999},
  timestamp = {Wed, 14 Jan 2004 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/njc/Hwang99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/HwangCH99,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {A watermarking technique based on one-way hash functions},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {45},
  number    = {2},
  pages     = {286--294},
  year      = {1999},
  url       = {https://doi.org/10.1109/30.793411},
  doi       = {10.1109/30.793411},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tce/HwangCH99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LeeHY99,
  author    = {Chii{-}Hwa Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Enhanced privacy and authentication for the global system for mobile
               communications},
  journal   = {Wireless Networks},
  volume    = {5},
  number    = {4},
  pages     = {231--243},
  year      = {1999},
  url       = {https://doi.org/10.1023/A:1019103228471},
  doi       = {10.1023/A:1019103228471},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/winet/LeeHY99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/ChenCH98,
  author    = {Tung{-}Shou Chen and
               Chin{-}Chen Chang and
               Min{-}Shiang Hwang},
  title     = {A virtual image cryptosystem based upon vector quantization},
  journal   = {{IEEE} Trans. Image Processing},
  volume    = {7},
  number    = {10},
  pages     = {1485--1488},
  year      = {1998},
  url       = {https://doi.org/10.1109/83.718488},
  doi       = {10.1109/83.718488},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tip/ChenCH98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/HwangY97,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Multilevel Secure Database Encryption with Subkeys},
  journal   = {Data Knowl. Eng.},
  volume    = {22},
  number    = {2},
  pages     = {117--131},
  year      = {1997},
  url       = {https://doi.org/10.1016/S0169-023X(96)00040-7},
  doi       = {10.1016/S0169-023X(96)00040-7},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dke/HwangY97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/HwangL97,
  author    = {Min{-}Shiang Hwang and
               Chii{-}Hwa Lee},
  title     = {Authenticated key-exchange in a mobile radio network},
  journal   = {European Transactions on Telecommunications},
  volume    = {8},
  number    = {3},
  pages     = {265--269},
  year      = {1997},
  url       = {https://doi.org/10.1002/ett.4460080309},
  doi       = {10.1002/ett.4460080309},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ett/HwangL97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HwangTY96,
  author    = {Min{-}Shiang Hwang and
               Wen{-}Guey Tzeng and
               Wei{-}Pang Yang},
  title     = {An access control scheme based on Chinese remainder theorem and time
               stamp concept},
  journal   = {Computers {\&} Security},
  volume    = {15},
  number    = {1},
  pages     = {73--81},
  year      = {1996},
  url       = {https://doi.org/10.1016/0167-4048(95)00028-3},
  doi       = {10.1016/0167-4048(95)00028-3},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/HwangTY96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/Lee96,
  author    = {Chii{-}Hwa Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Phone Card Application and Authentication in Wireless Communications},
  booktitle = {{IFIP} World Conference on Mobile Communications},
  pages     = {323--329},
  year      = {1996},
  timestamp = {Thu, 21 Dec 2006 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ifip/Lee96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/HwangY95,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Conference Key Distribution Schemes for Secure Digital Mobile Communications},
  journal   = {{IEEE} Journal on Selected Areas in Communications},
  volume    = {13},
  number    = {2},
  pages     = {416--420},
  year      = {1995},
  url       = {https://doi.org/10.1109/49.345886},
  doi       = {10.1109/49.345886},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jsac/HwangY95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HwangY95,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A two-phase encryption scheme for enhancing database security},
  journal   = {Journal of Systems and Software},
  volume    = {31},
  number    = {3},
  pages     = {257--265},
  year      = {1995},
  url       = {https://doi.org/10.1016/0164-1212(94)00102-2},
  doi       = {10.1016/0164-1212(94)00102-2},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/HwangY95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/HwangY94,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A New Dynamic Access Control Scheme Based on Subject-Object List},
  journal   = {Data Knowl. Eng.},
  volume    = {14},
  number    = {1},
  pages     = {45--56},
  year      = {1994},
  url       = {https://doi.org/10.1016/0169-023X(94)90008-6},
  doi       = {10.1016/0169-023X(94)90008-6},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dke/HwangY94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cis/2018,
  title     = {14th International Conference on Computational Intelligence and Security,
               {CIS} 2018, Hangzhou, China, November 16-19, 2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8563058},
  isbn      = {978-1-7281-0169-9},
  timestamp = {Tue, 05 Feb 2019 12:32:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cis/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cis/2016,
  title     = {12th International Conference on Computational Intelligence and Security,
               {CIS} 2016, Wuxi, China, December 16-19, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7819579},
  isbn      = {978-1-5090-4840-3},
  timestamp = {Wed, 01 Feb 2017 11:01:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cis/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icsai/2016,
  editor    = {Xiang Fei and
               Lipo Wang and
               Chunlei Ji and
               Qiang Sun and
               Niansheng Chen and
               Xiaoyong Song and
               Xin Wang},
  title     = {3rd International Conference on Systems and Informatics, {ICSAI} 2016,
               Shanghai, China, November 19-21, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7794486},
  isbn      = {978-1-5090-5521-0},
  timestamp = {Thu, 18 Oct 2018 16:08:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icsai/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intcompsymp/2014,
  editor    = {William Cheng{-}Chung Chu and
               Han{-}Chieh Chao and
               Stephen Jenn{-}Hwa Yang},
  title     = {Intelligent Systems and Applications - Proceedings of the International
               Computer Symposium {(ICS)} held at Taichung, Taiwan, December 12-14,
               2014},
  series    = {Frontiers in Artificial Intelligence and Applications},
  volume    = {274},
  publisher = {{IOS} Press},
  year      = {2015},
  url       = {http://ebooks.iospress.nl/volume/intelligent-systems-and-applications-proceedings-of-the-international-computer-symposium-ics-held-at-taichung-taiwan-december-12-14-2014},
  isbn      = {978-1-61499-483-1},
  timestamp = {Tue, 21 Mar 2017 08:35:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/intcompsymp/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cac/2013,
  editor    = {Salim Hariri and
               Alan Sill},
  title     = {{ACM} Cloud and Autonomic Computing Conference, {CAC} '13, Miami,
               FL, {USA} - August 05 - 09, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2494621},
  isbn      = {978-1-4503-2172-3},
  timestamp = {Thu, 22 Aug 2013 08:04:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cac/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisis/2013,
  editor    = {Leonard Barolli and
               Fatos Xhafa and
               Hsing{-}Chung Chen and
               Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
               Farooq Hussain},
  title     = {Seventh International Conference on Complex, Intelligent, and Software
               Intensive Systems, {CISIS} 2013, Taichung, Taiwan, July 3-5, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6603428},
  isbn      = {978-0-7695-4992-7},
  timestamp = {Wed, 29 Mar 2017 16:45:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisis/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iih-msp/2009,
  editor    = {Jeng{-}Shyang Pan and
               Yen{-}Wei Chen and
               Lakhmi C. Jain},
  title     = {Fifth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14
               September, 2009, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5337074},
  isbn      = {978-1-4244-4717-6},
  timestamp = {Wed, 18 May 2016 12:49:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iih-msp/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itng/2009,
  editor    = {Shahram Latifi},
  title     = {Sixth International Conference on Information Technology: New Generations,
               {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5070574},
  isbn      = {978-0-7695-3596-8},
  timestamp = {Thu, 21 Jun 2018 07:42:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itng/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iih-msp/2008,
  editor    = {Jeng{-}Shyang Pan and
               Xiamu Niu and
               Hsiang{-}Cheh Huang and
               Lakhmi C. Jain},
  title     = {4th International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
               August 2008, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4603986},
  isbn      = {978-0-7695-3278-3},
  timestamp = {Wed, 18 May 2016 12:48:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iih-msp/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isda/2008,
  editor    = {Jeng{-}Shyang Pan and
               Ajith Abraham and
               Chin{-}Chen Chang},
  title     = {Eighth International Conference on Intelligent Systems Design and
               Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
               3 Volumes},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4696158},
  isbn      = {978-0-7695-3382-7},
  timestamp = {Tue, 23 Jan 2018 17:06:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isda/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2008,
  editor    = {Eduardo Fern{\'{a}}ndez{-}Medina and
               Manu Malek and
               Javier Hernando},
  title     = {{SECRYPT} 2008, Proceedings of the International Conference on Security
               and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  publisher = {{INSTICC} Press},
  year      = {2008},
  isbn      = {978-989-8111-59-3},
  timestamp = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccsa/2007-3,
  editor    = {Osvaldo Gervasi and
               Marina L. Gavrilova},
  title     = {Computational Science and Its Applications - {ICCSA} 2007, International
               Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings.
               Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {4707},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74484-9},
  doi       = {10.1007/978-3-540-74484-9},
  isbn      = {978-3-540-74482-5},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccsa/2007-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imsa/2006,
  editor    = {Jenq{-}Neng Hwang},
  title     = {Proceedings of the Tenth {IASTED} International Conference on Internet
               and Multimedia Systems and Applications {(IMSA} 2006), Honolulu, Hawaii,
               USA, August 14-16, 2006},
  publisher = {{IASTED/ACTA} Press},
  year      = {2006},
  isbn      = {0-88986-589-2},
  timestamp = {Tue, 27 Oct 2015 19:30:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imsa/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aina/2004,
  title     = {18th International Conference on Advanced Information Networking and
               Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9028},
  isbn      = {0-7695-2051-0},
  timestamp = {Mon, 15 Sep 2014 17:23:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icoin/2003,
  editor    = {Hyun{-}Kook Kahng},
  title     = {Information Networking, Networking Technologies for Enhanced Internet
               Services International Conference, {ICOIN} 2003, Cheju Island, Korea,
               February 12-14, 2003, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2662},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13389},
  doi       = {10.1007/b13389},
  isbn      = {3-540-40827-4},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icoin/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cdma/2002,
  editor    = {Jai{-}Yong Lee and
               Chul{-}Hee Kang},
  title     = {Mobile Communications, 7th {CDMA} International Conference, {CIC}
               2002, Seoul, Korea, October 29 - November 1, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2524},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36555-9},
  doi       = {10.1007/3-540-36555-9},
  isbn      = {3-540-00732-6},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cdma/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2001,
  editor    = {Sihan Qing and
               Tatsuaki Okamoto and
               Jianying Zhou},
  title     = {Information and Communications Security, Third International Conference,
               {ICICS} 2001, Xian, China, November 13-16, 2001},
  series    = {Lecture Notes in Computer Science},
  volume    = {2229},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45600-7},
  doi       = {10.1007/3-540-45600-7},
  isbn      = {3-540-42880-1},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/compsac/2000,
  title     = {24th International Computer Software and Applications Conference {(COMPSAC}
               2000), 25-28 October 2000, Taipei, Taiwan},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7100},
  isbn      = {0-7695-0792-1},
  timestamp = {Thu, 09 Oct 2014 16:51:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/compsac/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier