BibTeX records: Min-Shiang Hwang

download as .bib file

@article{DBLP:journals/ijnsec/PanYH20,
  author    = {Hsieh{-}Tsen Pan and
               Hung{-}Wei Yang and
               Min{-}Shiang Hwang},
  title     = {An Enhanced Secure Smart Card-based Password Authentication Scheme},
  journal   = {I. J. Network Security},
  volume    = {22},
  number    = {2},
  pages     = {358--363},
  year      = {2020},
  url       = {http://ijns.femto.com.tw/contents/ijns-v22-n2/ijns-2020-v22-n2-p358-363.pdf},
  timestamp = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/PanYH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/HwangLH19,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Shih{-}Ting Hsu},
  title     = {An ElGamal-like Secure Channel Free Public Key Encryption with Keyword
               Search Scheme},
  journal   = {Int. J. Found. Comput. Sci.},
  volume    = {30},
  number    = {2},
  pages     = {255--273},
  year      = {2019},
  url       = {https://doi.org/10.1142/S0129054119500047},
  doi       = {10.1142/S0129054119500047},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijfcs/HwangLH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChiouPCH19,
  author    = {Shu{-}Fen Chiou and
               Hsieh{-}Tsen Pan and
               Eko Fajar Cahyadi and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of the Mutual Authentication and Key Agreement Protocol
               with Smart Cards for Wireless Communications},
  journal   = {I. J. Network Security},
  volume    = {21},
  number    = {1},
  pages     = {100--104},
  year      = {2019},
  url       = {http://ijns.femto.com.tw/contents/ijns-v21-n1/ijns-2019-v21-n1-p100-104.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChiouPCH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LinYH19,
  author    = {Tzu{-}Chun Lin and
               Ting{-}Yi Yeh and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an ID-based Deniable Threshold Ring Authentication},
  journal   = {I. J. Network Security},
  volume    = {21},
  number    = {2},
  pages     = {298--302},
  year      = {2019},
  url       = {http://ijns.femto.com.tw/contents/ijns-v21-n2/ijns-2019-v21-n2-p298-302.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LinYH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PanCCH19,
  author    = {Hsieh{-}Tsen Pan and
               Eko Fajar Cahyadi and
               Shu{-}Fen Chiou and
               Min{-}Shiang Hwang},
  title     = {Research on Batch Verification Schemes for Identifying Illegal Signatures},
  journal   = {I. J. Network Security},
  volume    = {21},
  number    = {6},
  pages     = {1062--1070},
  year      = {2019},
  url       = {http://ijns.femto.com.tw/contents/ijns-v21-n6/ijns-2019-v21-n6-p1062-1070.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/PanCCH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/FengSH19,
  author    = {Tung{-}Huang Feng and
               Neng{-}Yih Shih and
               Min{-}Shiang Hwang},
  title     = {Safety relay selection algorithms based on fuzzy relationship for
               wireless sensor networks},
  journal   = {J. Supercomput.},
  volume    = {75},
  number    = {8},
  pages     = {4601--4616},
  year      = {2019},
  url       = {https://doi.org/10.1007/s11227-018-2547-7},
  doi       = {10.1007/s11227-018-2547-7},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tjs/FengSH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangSH18,
  author    = {Yu{-}Lun Wang and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {A Survey of Reversible Data Hiding for VQ-Compressed Images},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {1},
  pages     = {1--8},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p1-8.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/WangSH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiHH18,
  author    = {Cheng{-}Yi Tsai and
               Pi{-}Fang Ho and
               Min{-}Shiang Hwang},
  title     = {A Secure Group Signature Scheme},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {2},
  pages     = {201--205},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p201-205.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/TsaiHH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangSH18a,
  author    = {Yu{-}Lun Wang and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {A Novel Dual Image-based High Payload Reversible Hiding Technique
               Using {LSB} Matching},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {4},
  pages     = {801--804},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p801-804.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/WangSH18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiYLH18,
  author    = {Cheng{-}Yi Tsai and
               Cheng{-}Ying Yang and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {A Survey of E-book Digital Right Management},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {5},
  pages     = {998--1004},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p998-1004.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/TsaiYLH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangCH18,
  author    = {Li{-}Chin Huang and
               Ting{-}Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A Conference Key Scheme Based on the Diffie-Hellman Key Exchange},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {6},
  pages     = {1221--1226},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1221-1226.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HuangCH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HwangCCY18,
  author    = {Min{-}Shiang Hwang and
               Eko Fajar Cahyadi and
               Yuen{-}Cheng Chou and
               Cheng{-}Ying Yang},
  title     = {Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart
               Card},
  booktitle = {14th International Conference on Computational Intelligence and Security,
               {CIS} 2018, Hangzhou, China, November 16-19, 2018},
  pages     = {416--420},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {https://doi.org/10.1109/CIS2018.2018.00099},
  doi       = {10.1109/CIS2018.2018.00099},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/cis/HwangCCY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisa/LiangYH18,
  author    = {Hsin{-}Ying Liang and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  editor    = {Kuinam J. Kim and
               Nakhoon Baek},
  title     = {Secrecy Analysis in the {AF} Mode Cooperative Communication System},
  booktitle = {Information Science and Applications 2018 - {ICISA} 2018, Hong Kong,
               China, June 25-27th, 2018},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {514},
  pages     = {285--293},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-981-13-1056-0\_30},
  doi       = {10.1007/978-981-13-1056-0\_30},
  timestamp = {Fri, 08 Mar 2019 12:36:23 +0100},
  biburl    = {https://dblp.org/rec/conf/icisa/LiangYH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisa/HwangYY18,
  author    = {Min{-}Shiang Hwang and
               Hung{-}Wei Yang and
               Cheng{-}Ying Yang},
  editor    = {Kuinam J. Kim and
               Nakhoon Baek},
  title     = {An Improved Hou-Wang's User Authentication Scheme},
  booktitle = {Information Science and Applications 2018 - {ICISA} 2018, Hong Kong,
               China, June 25-27th, 2018},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {514},
  pages     = {295--301},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-981-13-1056-0\_31},
  doi       = {10.1007/978-981-13-1056-0\_31},
  timestamp = {Fri, 08 Mar 2019 12:36:23 +0100},
  biburl    = {https://dblp.org/rec/conf/icisa/HwangYY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/WuH17,
  author    = {Nan{-}I Wu and
               Min{-}Shiang Hwang},
  title     = {Development of a data hiding scheme based on combination theory for
               lowering the visual noise in binary images},
  journal   = {Displays},
  volume    = {49},
  pages     = {116--123},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.displa.2017.07.009},
  doi       = {10.1016/j.displa.2017.07.009},
  timestamp = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/displays/WuH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/WeiHC17,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               Augustin Yeh{-}Hao Chin},
  title     = {A secure privacy and authentication protocol for passive {RFID} tags},
  journal   = {Int. J. Mob. Commun.},
  volume    = {15},
  number    = {3},
  pages     = {266--277},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJMC.2017.10003252},
  doi       = {10.1504/IJMC.2017.10003252},
  timestamp = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmc/WeiHC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenYH17a,
  author    = {Shih{-}Ming Chen and
               Ching{-}Rong Yang and
               Min{-}Shiang Hwang},
  title     = {Using a New Structure in Group Key Management for Pay-TV},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {1},
  pages     = {112--117},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p112-117.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChenYH17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LingLYH17,
  author    = {Chung{-}Huei Ling and
               Cheng{-}Chi Lee and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Secure and Efficient One-time Password Authentication Scheme for
               {WSN}},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {2},
  pages     = {177--181},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p177-181.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LingLYH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiLTH17,
  author    = {Cheng{-}Yi Tsai and
               Chi{-}Yu Liu and
               Shyh{-}Chang Tsaur and
               Min{-}Shiang Hwang},
  title     = {A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring
               and Discrete Logarithms},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {3},
  pages     = {443--448},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p443-448.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/TsaiLTH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChaoTH17,
  author    = {Wan{-}Yu Chao and
               Cheng{-}Yi Tsai and
               Min{-}Shiang Hwang},
  title     = {An Improved Key-Management Scheme for Hierarchical Access Control},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {4},
  pages     = {639--643},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p639-643.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChaoTH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangSH17,
  author    = {Yu{-}Lun Wang and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {An Improved Dual Image-based Reversible Hiding Technique Using {LSB}
               Matching},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {5},
  pages     = {858--862},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p858-862.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/WangSH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenYH17,
  author    = {Jong{-}Shin Chen and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {The Capacity Analysis in the Secure Cooperative Communication System},
  journal   = {I. J. Network Security},
  volume    = {19},
  number    = {6},
  pages     = {863--869},
  year      = {2017},
  url       = {http://ijns.femto.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p863-869.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChenYH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/HwangSL17,
  author    = {Min{-}Shiang Hwang and
               Tsuei{-}Hung Sun and
               Cheng{-}Chi Lee},
  title     = {Achieving Dynamic Data Guarantee and Data Confidentiality of Public
               Auditing in Cloud Storage Service},
  journal   = {Journal of Circuits, Systems, and Computers},
  volume    = {26},
  number    = {5},
  pages     = {1750072:1--1750072:16},
  year      = {2017},
  url       = {https://doi.org/10.1142/S0218126617500724},
  doi       = {10.1142/S0218126617500724},
  timestamp = {Wed, 18 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jcsc/HwangSL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ChangHY17,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Chou Chen Yang},
  title     = {Password Authenticated Key Exchange and Protected Password Change
               Protocols},
  journal   = {Symmetry},
  volume    = {9},
  number    = {8},
  pages     = {134},
  year      = {2017},
  url       = {https://doi.org/10.3390/sym9080134},
  doi       = {10.3390/sym9080134},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/symmetry/ChangHY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisa/YangCHLY17,
  author    = {Cheng{-}Ying Yang and
               Tsai{-}Yuan Chung and
               Min{-}Shiang Hwang and
               Cheng{-}Yi Li and
               Jenq{-}Foung JF Yao},
  editor    = {Kuinam Kim and
               Nikolai Joukov},
  title     = {Learning Performance Evaluation in eLearning with the Web-Based Assessment},
  booktitle = {Information Science and Applications 2017 - {ICISA} 2017, Macau, China,
               20-23 March 2017},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {424},
  pages     = {645--651},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-981-10-4154-9\_74},
  doi       = {10.1007/978-981-10-4154-9\_74},
  timestamp = {Wed, 05 Jun 2019 13:59:26 +0200},
  biburl    = {https://dblp.org/rec/conf/icisa/YangCHLY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HsienYH16,
  author    = {Wei{-}Fu Hsien and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Survey of Public Auditing for Secure Data Storage in Cloud Computing},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {1},
  pages     = {133--142},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n1/ijns-2016-v18-n1-p133-142.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HsienYH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LingHH16,
  author    = {Chung{-}Huei Ling and
               Wei{-}Fu Hsien and
               Min{-}Shiang Hwang},
  title     = {A Double Circular Chain Intrusion Detection for Cloud Computing Based
               on AdjointVM Approach},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {2},
  pages     = {397--400},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n2/ijns-2016-v18-n2-p397-400.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LingHH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LingCH16,
  author    = {Chung{-}Huei Ling and
               Shih{-}Ming Chen and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of Tseng-Wu Group Key Exchange Protocol},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {3},
  pages     = {590--593},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n3/ijns-2016-v18-n3-p590-593.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LingCH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuHYH16,
  author    = {Chi{-}Wei Liu and
               Wei{-}Fu Hsien and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Survey of Public Auditing for Shared Data Storage with User Revocation
               in Cloud Computing},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {4},
  pages     = {650--666},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n4/ijns-2016-v18-n4-p650-666.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LiuHYH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuHYH16a,
  author    = {Chi{-}Wei Liu and
               Wei{-}Fu Hsien and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Survey of Attribute-based Access Control with User Revocation in
               Cloud Data Storage},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {5},
  pages     = {900--916},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n5/ijns-2016-v18-n5-p900-916.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LiuHYH16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XieWSH16,
  author    = {Ming{-}Ru Xie and
               Chia{-}Chun Wu and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {A Survey of Data Distortion Watermarking Relational Databases},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {6},
  pages     = {1022--1033},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n6/ijns-2016-v18-n6-p1022-1033.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/XieWSH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/HwangCO16,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Hsia{-}Hung Ou},
  title     = {The Moderately Hard DoS-Resistant Authentication Protocol on Client
               Puzzles},
  journal   = {Informatica},
  volume    = {27},
  number    = {1},
  pages     = {31--48},
  year      = {2016},
  url       = {http://content.iospress.com/articles/informatica/inf1088},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/HwangCO16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/FengHS16,
  author    = {Tung{-}Huang Feng and
               Min{-}Shiang Hwang and
               Liang{-}Wei Syu},
  title     = {An Authentication Protocol for Lightweight {NFC} Mobile Sensors Payment},
  journal   = {Informatica},
  volume    = {27},
  number    = {4},
  pages     = {723--732},
  year      = {2016},
  url       = {http://content.iospress.com/articles/informatica/inf1125},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/FengHS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/LinCCH16,
  author    = {Iuon{-}Chang Lin and
               Yi{-}Lun Chi and
               Hung{-}Chieh Chuang and
               Min{-}Shiang Hwang},
  title     = {The Novel Features for Phishing Based on User Device Detection},
  journal   = {{JCP}},
  volume    = {11},
  number    = {2},
  pages     = {109--115},
  year      = {2016},
  url       = {https://doi.org/10.17706/jcp.11.2.109-115},
  doi       = {10.17706/jcp.11.2.109-115},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcp/LinCCH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PanPTH16,
  author    = {Hsieh{-}Tsen Pan and
               Chiu{-}Shu Pan and
               Shyh{-}Chang Tsaur and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of Efficient Dynamic {ID} Based Remote User Authentication
               Scheme in Multi-Server Environment Using Smart Card},
  booktitle = {12th International Conference on Computational Intelligence and Security,
               {CIS} 2016, Wuxi, China, December 16-19, 2016},
  pages     = {590--593},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {https://doi.org/10.1109/CIS.2016.0143},
  doi       = {10.1109/CIS.2016.0143},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/cis/PanPTH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsai/PanTTH16,
  author    = {Chiu{-}Shu Pan and
               Cheng{-}Yi Tsai and
               Shyh{-}Chang Tsaur and
               Min{-}Shiang Hwang},
  editor    = {Xiang Fei and
               Lipo Wang and
               Chunlei Ji and
               Qiang Sun and
               Niansheng Chen and
               Xiaoyong Song and
               Xin Wang},
  title     = {Cryptanalysis of an efficient password authentication scheme},
  booktitle = {3rd International Conference on Systems and Informatics, {ICSAI} 2016,
               Shanghai, China, November 19-21, 2016},
  pages     = {743--748},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/ICSAI.2016.7811051},
  doi       = {10.1109/ICSAI.2016.7811051},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/icsai/PanTTH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WijayantoH15,
  author    = {Heri Wijayanto and
               Min{-}Shiang Hwang},
  title     = {Improvement on Timestamp-based User Authentication Scheme with Smart
               Card Lost Attack Resistance},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {2},
  pages     = {160--164},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p160-164.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/WijayantoH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChiCLH15,
  author    = {Yi{-}Lun Chi and
               Cheng Hao Chen and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {The Secure Transaction Protocol in {NFC} Card Emulation Mode},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {4},
  pages     = {431--438},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p431-438.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChiCLH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RenWZH15,
  author    = {Yanli Ren and
               Shuozhong Wang and
               Xinpeng Zhang and
               Min{-}Shiang Hwang},
  title     = {An Efficient Batch Verifying Scheme for Detecting Illegal Signatures},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {4},
  pages     = {463--470},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p463-470.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/RenWZH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SunSH15,
  author    = {Jia{-}Rong Sun and
               Mao{-}Lin Shih and
               Min{-}Shiang Hwang},
  title     = {A Survey of Digital Evidences Forensic and Cybercrime Investigation
               Procedure},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {5},
  pages     = {497--509},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p497-509.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/SunSH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FengSH15,
  author    = {Tung{-}Huang Feng and
               Neng{-}Yih Shih and
               Min{-}Shiang Hwang},
  title     = {A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor
               Networks},
  journal   = {I. J. Network Security},
  volume    = {17},
  number    = {6},
  pages     = {712--721},
  year      = {2015},
  url       = {http://ijns.femto.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p712-721.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/FengSH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/HwangLS14,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Tsuei{-}Hung Sun},
  title     = {Data error locations reported by public auditing in cloud storage
               service},
  journal   = {Autom. Softw. Eng.},
  volume    = {21},
  number    = {3},
  pages     = {373--390},
  year      = {2014},
  url       = {https://doi.org/10.1007/s10515-014-0142-6},
  doi       = {10.1007/s10515-014-0142-6},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ase/HwangLS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChungLH14,
  author    = {Pei{-}Shan Chung and
               Chi{-}Wei Liu and
               Min{-}Shiang Hwang},
  title     = {A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {1},
  pages     = {1--13},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n1/ijns-2014-v16-n1-p1-13.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChungLH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FengLH14,
  author    = {Tung{-}Huang Feng and
               Chung{-}Huei Ling and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of Tan's Improvement on a Password Authentication Scheme
               for Multi-server Environments},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {4},
  pages     = {318--321},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n4/ijns-2014-v16-n4-p318-321.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/FengLH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiFH14,
  author    = {Wei Teng Li and
               Tung{-}Huang Feng and
               Min{-}Shiang Hwang},
  title     = {Distributed Detecting Node Replication Attacks in Wireless Sensor
               Networks: {A} Survey},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {5},
  pages     = {323--330},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n5/ijns-2014-v16-n5-p323-330.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LiFH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiLH14,
  author    = {Wei Teng Li and
               Chung{-}Huei Ling and
               Min{-}Shiang Hwang},
  title     = {Group Rekeying in Wireless Sensor Networks: {A} Survey},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {6},
  pages     = {400--410},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n6/ijns-2014-v16-n6-p400-410.pdf},
  timestamp = {Mon, 24 Nov 2014 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LiLH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/HwangHL14,
  author    = {Min{-}Shiang Hwang and
               Shih{-}Ting Hsu and
               Cheng{-}Chi Lee},
  title     = {A New Public Key Encryption with Conjunctive Field Keyword Search
               Scheme},
  journal   = {{ITC}},
  volume    = {43},
  number    = {3},
  pages     = {277--288},
  year      = {2014},
  url       = {https://doi.org/10.5755/j01.itc.43.3.6429},
  doi       = {10.5755/j01.itc.43.3.6429},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/itc/HwangHL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intcompsymp/SunH14,
  author    = {Jia{-}Rong Sun and
               Min{-}Shiang Hwang},
  editor    = {William Cheng{-}Chung Chu and
               Han{-}Chieh Chao and
               Stephen Jenn{-}Hwa Yang},
  title     = {A New Investigation Approach for Tracing Source {IP} in DDoS attack
               from Proxy Server},
  booktitle = {Intelligent Systems and Applications - Proceedings of the International
               Computer Symposium {(ICS)} held at Taichung, Taiwan, December 12-14,
               2014},
  series    = {Frontiers in Artificial Intelligence and Applications},
  volume    = {274},
  pages     = {850--857},
  publisher = {{IOS} Press},
  year      = {2014},
  url       = {https://doi.org/10.3233/978-1-61499-484-8-850},
  doi       = {10.3233/978-1-61499-484-8-850},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/intcompsymp/SunH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/HuangLH13,
  author    = {Li{-}Chin Huang and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A n2+n {MQV} key agreement protocol},
  journal   = {Int. Arab J. Inf. Technol.},
  volume    = {10},
  number    = {2},
  pages     = {137--142},
  year      = {2013},
  url       = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=85\&\#38;Itemid=350},
  timestamp = {Wed, 27 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iajit/HuangLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeLH13,
  author    = {Cheng{-}Chi Lee and
               Chia{-}Hsin Liu and
               Min{-}Shiang Hwang},
  title     = {Guessing Attacks on Strong-Password Authentication Protocol},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {1},
  pages     = {64--67},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n1/ijns-2013-v15-n1-p64-67.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LeeLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HsuYH13,
  author    = {Shih{-}Ting Hsu and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Study of Public Key Encryption with Keyword Search},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {2},
  pages     = {71--79},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p71-79.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HsuYH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeCH13,
  author    = {Cheng{-}Chi Lee and
               Pei{-}Shan Chung and
               Min{-}Shiang Hwang},
  title     = {A Survey on Attribute-based Encryption Schemes of Access Control in
               Cloud Environments},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {4},
  pages     = {231--240},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n4/ijns-2013-v15-n4-p231-240.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LeeCH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeHH13,
  author    = {Cheng{-}Chi Lee and
               Shih{-}Ting Hsu and
               Min{-}Shiang Hwang},
  title     = {A Study of Conjunctive Keyword Searchable Schemes},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {5},
  pages     = {321--330},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n5/ijns-2013-v15-n5-p321-330.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LeeHH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenYH13,
  author    = {Min{-}Yu Chen and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {Privacy Protection Data Access Control},
  journal   = {I. J. Network Security},
  volume    = {15},
  number    = {6},
  pages     = {411--419},
  year      = {2013},
  url       = {http://ijns.femto.com.tw/contents/ijns-v15-n6/ijns-2013-v15-n6-p411-419.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChenYH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HwangLT13,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Shiang{-}Feng Tzeng},
  title     = {A new proxy signature scheme for a specified group of verifiers},
  journal   = {Inf. Sci.},
  volume    = {227},
  pages     = {102--115},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.ins.2012.11.004},
  doi       = {10.1016/j.ins.2012.11.004},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/HwangLT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/YangCH13,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A New Group Signature Scheme Based on {RSA} Assumption},
  journal   = {{ITC}},
  volume    = {42},
  number    = {1},
  pages     = {61--66},
  year      = {2013},
  url       = {https://doi.org/10.5755/j01.itc.42.1.1185},
  doi       = {10.5755/j01.itc.42.1.1185},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/itc/YangCH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HuangHT13,
  author    = {Li{-}Chin Huang and
               Min{-}Shiang Hwang and
               Lin{-}Yu Tseng},
  title     = {Reversible and High-Capacity Data Hiding in High Quality Medical Images},
  journal   = {{TIIS}},
  volume    = {7},
  number    = {1},
  pages     = {132--148},
  year      = {2013},
  url       = {https://doi.org/10.3837/tiis.2013.01.009},
  doi       = {10.3837/tiis.2013.01.009},
  timestamp = {Wed, 30 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/itiis/HuangHT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HuangTH13,
  author    = {Li{-}Chin Huang and
               Lin{-}Yu Tseng and
               Min{-}Shiang Hwang},
  title     = {A reversible data hiding method by histogram shifting in high quality
               medical images},
  journal   = {J. Syst. Softw.},
  volume    = {86},
  number    = {3},
  pages     = {716--727},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.jss.2012.11.024},
  doi       = {10.1016/j.jss.2012.11.024},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/HuangTH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/ChongLH13,
  author    = {Song{-}Kong Chong and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {An Authentication Scheme for the Global Mobility Network},
  journal   = {Parallel Process. Lett.},
  volume    = {23},
  number    = {3},
  year      = {2013},
  url       = {https://doi.org/10.1142/S0129626413500096},
  doi       = {10.1142/S0129626413500096},
  timestamp = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ppl/ChongLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChenLHJ13,
  author    = {Te{-}Yu Chen and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Jinn{-}Ke Jan},
  title     = {Towards secure and efficient user authentication scheme using smart
               card for multi-server environments},
  journal   = {J. Supercomput.},
  volume    = {66},
  number    = {2},
  pages     = {1008--1032},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11227-013-0966-z},
  doi       = {10.1007/s11227-013-0966-z},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tjs/ChenLHJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/OuH13,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang},
  title     = {Double Delegation-Based Authentication and Key Agreement Protocol
               for PCSs},
  journal   = {Wireless Personal Communications},
  volume    = {72},
  number    = {1},
  pages     = {437--446},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11277-013-1022-2},
  doi       = {10.1007/s11277-013-1022-2},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/wpc/OuH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cac/ChenLH13,
  author    = {Min{-}Yu Chen and
               Chi{-}Wei Liu and
               Min{-}Shiang Hwang},
  editor    = {Salim Hariri and
               Alan Sill},
  title     = {SecureDropbox: a file encryption system suitable for cloud storage
               services},
  booktitle = {{ACM} Cloud and Autonomic Computing Conference, {CAC} '13, Miami,
               FL, {USA} - August 05 - 09, 2013},
  pages     = {21:1--21:2},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2494621.2494642},
  doi       = {10.1145/2494621.2494642},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/cac/ChenLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/YangLH13,
  author    = {Cheng{-}Ying Yang and
               Yi{-}Shan Lin and
               Min{-}Shiang Hwang},
  editor    = {Leonard Barolli and
               Fatos Xhafa and
               Hsing{-}Chung Chen and
               Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
               Farooq Hussain},
  title     = {Downlink Relay Selection Algorithm for Amplify-and-Forward Cooperative
               Communication Systems},
  booktitle = {Seventh International Conference on Complex, Intelligent, and Software
               Intensive Systems, {CISIS} 2013, Taichung, Taiwan, July 3-5, 2013},
  pages     = {331--334},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://doi.org/10.1109/CISIS.2013.60},
  doi       = {10.1109/CISIS.2013.60},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/cisis/YangLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/LiYH12,
  author    = {Chun{-}Ta Li and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A secure routing protocol with node selfishness resistance in MANETs},
  journal   = {Int. J. Mob. Commun.},
  volume    = {10},
  number    = {1},
  pages     = {103--118},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJMC.2012.044525},
  doi       = {10.1504/IJMC.2012.044525},
  timestamp = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmc/LiYH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/OuLH12,
  author    = {Hsia{-}Hung Ou and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {An effective {AKA} protocol for {UMTS}},
  journal   = {Int. J. Mob. Commun.},
  volume    = {10},
  number    = {4},
  pages     = {427--448},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJMC.2012.048139},
  doi       = {10.1504/IJMC.2012.048139},
  timestamp = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmc/OuLH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/WeiHC12,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               Augustin Yeh{-}Hao Chin},
  title     = {An improved authentication protocol for mobile agent device in {RFID}
               environment},
  journal   = {Int. J. Mob. Commun.},
  volume    = {10},
  number    = {5},
  pages     = {508--520},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJMC.2012.048884},
  doi       = {10.1504/IJMC.2012.048884},
  timestamp = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmc/WeiHC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangTH12,
  author    = {Li{-}Chin Huang and
               Lin{-}Yu Tseng and
               Min{-}Shiang Hwang},
  title     = {The Study of Data Hiding in Medical Images},
  journal   = {I. J. Network Security},
  volume    = {14},
  number    = {6},
  pages     = {301--309},
  year      = {2012},
  url       = {http://ijns.femto.com.tw/contents/ijns-v14-n6/ijns-2012-v14-n6-p301-309.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HuangTH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/ChangHY12,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption
               Scheme for Encrypting Large Messages},
  journal   = {Informatica},
  volume    = {23},
  number    = {4},
  pages     = {537--562},
  year      = {2012},
  url       = {http://content.iospress.com/articles/informatica/inf23-4-03},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/ChangHY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/HwangCO11,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Hsia{-}Hung Ou},
  title     = {On the security of an enhanced {UMTS} authentication and key agreement
               protocol},
  journal   = {Eur. Trans. Telecommun.},
  volume    = {22},
  number    = {3},
  pages     = {99--112},
  year      = {2011},
  url       = {https://doi.org/10.1002/ett.1460},
  doi       = {10.1002/ett.1460},
  timestamp = {Mon, 18 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ett/HwangCO11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/LeeHL11,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {On the Security of Self-Certified Public Keys},
  journal   = {{IJISP}},
  volume    = {5},
  number    = {2},
  pages     = {54--60},
  year      = {2011},
  url       = {https://doi.org/10.4018/jisp.2011040104},
  doi       = {10.4018/jisp.2011040104},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijisp/LeeHL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/ChangH11,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {User-anonymous and short-term Conference Key Distribution System via
               link-layer routing in mobile communications},
  journal   = {Int. J. Mob. Commun.},
  volume    = {9},
  number    = {2},
  pages     = {144--158},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMC.2011.040143},
  doi       = {10.1504/IJMC.2011.040143},
  timestamp = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmc/ChangH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/WeiHC11,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               Augustin Yeh{-}Hao Chin},
  title     = {An authentication protocol for low-cost {RFID} tags},
  journal   = {Int. J. Mob. Commun.},
  volume    = {9},
  number    = {2},
  pages     = {208--223},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMC.2011.040146},
  doi       = {10.1504/IJMC.2011.040146},
  timestamp = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmc/WeiHC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChangHY11,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A communication-efficient three-party password authenticated key exchange
               protocol},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {1},
  pages     = {217--226},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ins.2010.08.032},
  doi       = {10.1016/j.ins.2010.08.032},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/ChangHY11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LoHL11,
  author    = {Jung{-}Wen Lo and
               Min{-}Shiang Hwang and
               Chia{-}Hsin Liu},
  title     = {An efficient key assignment scheme for access control in a large leaf
               class hierarchy},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {4},
  pages     = {917--925},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ins.2010.09.033},
  doi       = {10.1016/j.ins.2010.09.033},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/LoHL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiH11,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang},
  title     = {A lightweight anonymous routing protocol without public key en/decryptions
               for wireless ad hoc networks},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {23},
  pages     = {5333--5347},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ins.2011.07.014},
  doi       = {10.1016/j.ins.2011.07.014},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isci/LiH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/ChangHY11,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {An Improved Multi-stage Secret Sharing Scheme Based on the Factorization
               Problem},
  journal   = {{ITC}},
  volume    = {40},
  number    = {3},
  pages     = {246--251},
  year      = {2011},
  url       = {https://doi.org/10.5755/j01.itc.40.3.633},
  doi       = {10.5755/j01.itc.40.3.633},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/itc/ChangHY11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/WeiHC11,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               A. Y. Chin},
  title     = {A Mutual Authentication Protocol for {RFID}},
  journal   = {{IT} Prof.},
  volume    = {13},
  number    = {2},
  pages     = {20--24},
  year      = {2011},
  url       = {https://doi.org/10.1109/MITP.2011.17},
  doi       = {10.1109/MITP.2011.17},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/itpro/WeiHC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WuKH11,
  author    = {Chia{-}Chun Wu and
               Shang{-}Juh Kao and
               Min{-}Shiang Hwang},
  title     = {A high quality image sharing with steganography and adaptive authentication
               scheme},
  journal   = {J. Syst. Softw.},
  volume    = {84},
  number    = {12},
  pages     = {2196--2207},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.jss.2011.06.021},
  doi       = {10.1016/j.jss.2011.06.021},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/WuKH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/TzengLH11,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A Batch Verification for Multiple Proxy Signature},
  journal   = {Parallel Process. Lett.},
  volume    = {21},
  number    = {1},
  pages     = {77--84},
  year      = {2011},
  url       = {https://doi.org/10.1142/S0129626411000084},
  doi       = {10.1142/S0129626411000084},
  timestamp = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ppl/TzengLH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LeeLH11,
  author    = {Cheng{-}Chi Lee and
               I{-}En Liao and
               Min{-}Shiang Hwang},
  title     = {An efficient authentication protocol for mobile communications},
  journal   = {Telecommunication Systems},
  volume    = {46},
  number    = {1},
  pages     = {31--41},
  year      = {2011},
  url       = {https://doi.org/10.1007/s11235-009-9276-4},
  doi       = {10.1007/s11235-009-9276-4},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/telsys/LeeLH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiH10,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang},
  title     = {An efficient biometrics-based remote user authentication scheme using
               smart cards},
  journal   = {J. Netw. Comput. Appl.},
  volume    = {33},
  number    = {1},
  pages     = {1--5},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.jnca.2009.08.001},
  doi       = {10.1016/j.jnca.2009.08.001},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnca/LiH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HwangCC10,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Te{-}Yu Chen},
  title     = {DoS-resistant ID-based password authentication scheme using smart
               cards},
  journal   = {J. Syst. Softw.},
  volume    = {83},
  number    = {1},
  pages     = {163--172},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.jss.2009.07.050},
  doi       = {10.1016/j.jss.2009.07.050},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/HwangCC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/OuHJ10,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {A cocktail protocol with the Authentication and Key Agreement on the
               {UMTS}},
  journal   = {J. Syst. Softw.},
  volume    = {83},
  number    = {2},
  pages     = {316--325},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.jss.2009.08.019},
  doi       = {10.1016/j.jss.2009.08.019},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/OuHJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/OuHJ10,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}Ke Jan},
  title     = {A Provable Billing Protocol on the Current {UMTS}},
  journal   = {Wireless Personal Communications},
  volume    = {55},
  number    = {4},
  pages     = {551--566},
  year      = {2010},
  url       = {https://doi.org/10.1007/s11277-009-9818-9},
  doi       = {10.1007/s11277-009-9818-9},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/wpc/OuHJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/OuHJ09,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {The {UMTS-AKA} Protocols for Intelligent Transportation Systems},
  journal   = {{EURASIP} J. Wireless Comm. and Networking},
  volume    = {2009},
  year      = {2009},
  url       = {https://doi.org/10.1155/2009/267283},
  doi       = {10.1155/2009/267283},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ejwcn/OuHJ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/LeeHT09,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng},
  title     = {A New Convertible Authenticated Encryption Scheme Based on the ElGamal
               Cryptosystem},
  journal   = {Int. J. Found. Comput. Sci.},
  volume    = {20},
  number    = {2},
  pages     = {351--359},
  year      = {2009},
  url       = {https://doi.org/10.1142/S0129054109006607},
  doi       = {10.1142/S0129054109006607},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijfcs/LeeHT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OuLHJ09,
  author    = {Hsia{-}Hung Ou and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {{TK-AKA:} using temporary key on Authentication and Key Agreement
               protocol on {UMTS}},
  journal   = {Int. J. Netw. Manag.},
  volume    = {19},
  number    = {4},
  pages     = {291--303},
  year      = {2009},
  url       = {https://doi.org/10.1002/nem.703},
  doi       = {10.1002/nem.703},
  timestamp = {Thu, 21 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnm/OuLHJ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LeeHL09,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Chih{-}Wei Lin},
  title     = {A new English auction scheme using the bulletin board system},
  journal   = {Inf. Manag. Comput. Secur.},
  volume    = {17},
  number    = {5},
  pages     = {408--417},
  year      = {2009},
  url       = {https://doi.org/10.1108/09685220911006696},
  doi       = {10.1108/09685220911006696},
  timestamp = {Mon, 18 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/imcs/LeeHL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/LeeHH09,
  author    = {Cheng{-}Chi Lee and
               Pi{-}Fang Ho and
               Min{-}Shiang Hwang},
  title     = {A secure e-auction scheme based on group signatures},
  journal   = {Inf. Syst. Frontiers},
  volume    = {11},
  number    = {3},
  pages     = {335--343},
  year      = {2009},
  url       = {https://doi.org/10.1007/s10796-008-9094-3},
  doi       = {10.1007/s10796-008-9094-3},
  timestamp = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isf/LeeHH09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigbed/WuCHL09,
  author    = {Hao{-}Ju Wu and
               Yi{-}Hsin Chang and
               Min{-}Shiang Hwang and
               Iuon{-}Chang Lin},
  title     = {Flexible {RFID} location system based on artificial neural networks
               for medical care facilities},
  journal   = {{SIGBED} Review},
  volume    = {6},
  number    = {2},
  pages     = {12},
  year      = {2009},
  url       = {https://doi.org/10.1145/1859823.1859835},
  doi       = {10.1145/1859823.1859835},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigbed/WuCHL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/WuKKH09,
  author    = {Chia{-}Chun Wu and
               Shang{-}Juh Kao and
               Wen{-}Chung Kuo and
               Min{-}Shiang Hwang},
  editor    = {Jeng{-}Shyang Pan and
               Yen{-}Wei Chen and
               Lakhmi C. Jain},
  title     = {Reversible Secret Image Sharing Based on Shamir's Scheme},
  booktitle = {Fifth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14
               September, 2009, Proceedings},
  pages     = {1014--1017},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://doi.org/10.1109/IIH-MSP.2009.158},
  doi       = {10.1109/IIH-MSP.2009.158},
  timestamp = {Mon, 06 Apr 2020 19:01:12 +0200},
  biburl    = {https://dblp.org/rec/conf/iih-msp/WuKKH09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/LiHL09,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yan{-}Chi Lai},
  editor    = {Shahram Latifi},
  title     = {A Verifiable Electronic Voting Scheme over the Internet},
  booktitle = {Sixth International Conference on Information Technology: New Generations,
               {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages     = {449--454},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://doi.org/10.1109/ITNG.2009.93},
  doi       = {10.1109/ITNG.2009.93},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/itng/LiHL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/LiH09a,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang},
  editor    = {Shahram Latifi},
  title     = {Improving the Security of Non-PKI Methods for Public Key Distribution},
  booktitle = {Sixth International Conference on Information Technology: New Generations,
               {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages     = {1695--1696},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://doi.org/10.1109/ITNG.2009.92},
  doi       = {10.1109/ITNG.2009.92},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/itng/LiH09a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiHL08,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Chi{-}Yu Liu},
  title     = {An electronic voting protocol with deniable authentication for mobile
               ad hoc networks},
  journal   = {Comput. Commun.},
  volume    = {31},
  number    = {10},
  pages     = {2534--2540},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.comcom.2008.03.018},
  doi       = {10.1016/j.comcom.2008.03.018},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/LiHL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiHC08,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {A secure and efficient communication scheme with authenticated key
               establishment and privacy preserving for vehicular ad hoc networks},
  journal   = {Comput. Commun.},
  volume    = {31},
  number    = {12},
  pages     = {2803--2814},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.comcom.2007.12.005},
  doi       = {10.1016/j.comcom.2007.12.005},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/LiHC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HwangLC08,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Song{-}Kong Chong},
  title     = {An improved address ownership in mobile IPv6},
  journal   = {Comput. Commun.},
  volume    = {31},
  number    = {14},
  pages     = {3250--3252},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.comcom.2008.05.011},
  doi       = {10.1016/j.comcom.2008.05.011},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/HwangLC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiHC08a,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {Further improvement on a novel privacy preserving authentication and
               access control scheme for pervasive computing environments},
  journal   = {Comput. Commun.},
  volume    = {31},
  number    = {18},
  pages     = {4255--4258},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.comcom.2008.06.002},
  doi       = {10.1016/j.comcom.2008.06.002},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/LiHC08a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/LiHC08,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {Improving the security of a secure anonymous routing protocol with
               authenticated key exchange for ad hoc networks},
  journal   = {Comput. Syst. Sci. Eng.},
  volume    = {23},
  number    = {3},
  year      = {2008},
  timestamp = {Thu, 23 Aug 2012 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/csse/LiHC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WangWTH08,
  author    = {Chung{-}Ming Wang and
               Nan{-}I Wu and
               Chwei{-}Shyong Tsai and
               Min{-}Shiang Hwang},
  title     = {A high quality steganographic method with pixel-value differencing
               and modulus function},
  journal   = {J. Syst. Softw.},
  volume    = {81},
  number    = {1},
  pages     = {150--158},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.jss.2007.01.049},
  doi       = {10.1016/j.jss.2007.01.049},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/WangWTH08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LeeHL08,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {A new authentication protocol based on pointer forwarding for mobile
               communications},
  journal   = {Wireless Communications and Mobile Computing},
  volume    = {8},
  number    = {5},
  pages     = {661--672},
  year      = {2008},
  url       = {https://doi.org/10.1002/wcm.495},
  doi       = {10.1002/wcm.495},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/wicomm/LeeHL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/WuKKH08,
  author    = {Chia{-}Chun Wu and
               Shang{-}Juh Kao and
               Wen{-}Chung Kuo and
               Min{-}Shiang Hwang},
  editor    = {Jeng{-}Shyang Pan and
               Xiamu Niu and
               Hsiang{-}Cheh Huang and
               Lakhmi C. Jain},
  title     = {Enhance the Image Sharing with Steganography and Authentication},
  booktitle = {4th International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
               August 2008, Proceedings},
  pages     = {1177--1181},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://doi.org/10.1109/IIH-MSP.2008.317},
  doi       = {10.1109/IIH-MSP.2008.317},
  timestamp = {Mon, 06 Apr 2020 19:01:12 +0200},
  biburl    = {https://dblp.org/rec/conf/iih-msp/WuKKH08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/LoHC08,
  author    = {Jung{-}Wen Lo and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  editor    = {Jeng{-}Shyang Pan and
               Ajith Abraham and
               Chin{-}Chen Chang},
  title     = {An Exchangeable E-Cash Scheme by E-Mint},
  booktitle = {Eighth International Conference on Intelligent Systems Design and
               Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
               3 Volumes},
  pages     = {246--251},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://doi.org/10.1109/ISDA.2008.186},
  doi       = {10.1109/ISDA.2008.186},
  timestamp = {Wed, 01 Apr 2020 17:00:41 +0200},
  biburl    = {https://dblp.org/rec/conf/isda/LoHC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  editor    = {Jeng{-}Shyang Pan and
               Ajith Abraham and
               Chin{-}Chen Chang},
  title     = {An Ordered Multi-proxy Multi-signature Scheme},
  booktitle = {Eighth International Conference on Intelligent Systems Design and
               Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
               3 Volumes},
  pages     = {308--313},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://doi.org/10.1109/ISDA.2008.189},
  doi       = {10.1109/ISDA.2008.189},
  timestamp = {Wed, 01 Apr 2020 17:00:41 +0200},
  biburl    = {https://dblp.org/rec/conf/isda/HwangTC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  editor    = {Eduardo Fern{\'{a}}ndez{-}Medina and
               Manu Malek and
               Javier Hernando},
  title     = {An Improvement of Strong Proxy Signature and Its Applications},
  booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security
               and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  pages     = {95--98},
  publisher = {{INSTICC} Press},
  year      = {2008},
  timestamp = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl    = {https://dblp.org/rec/conf/secrypt/HwangTC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/OuHJ07,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {A simple mobile communication billing system among charged parties},
  journal   = {Appl. Math. Comput.},
  volume    = {192},
  number    = {2},
  pages     = {487--495},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.amc.2007.03.034},
  doi       = {10.1016/j.amc.2007.03.034},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/OuHJ07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/TzengTH07,
  author    = {Shiang{-}Feng Tzeng and
               Yuan{-}Liang Tang and
               Min{-}Shiang Hwang},
  title     = {A new convertible authenticated encryption scheme with message linkages},
  journal   = {Comput. Electr. Eng.},
  volume    = {33},
  number    = {2},
  pages     = {133--138},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.compeleceng.2006.02.005},
  doi       = {10.1016/j.compeleceng.2006.02.005},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cee/TzengTH07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WuH07,
  author    = {Nan{-}I Wu and
               Min{-}Shiang Hwang},
  title     = {Data Hiding: Current Status and Key Issues},
  journal   = {I. J. Network Security},
  volume    = {4},
  number    = {1},
  pages     = {1--9},
  year      = {2007},
  url       = {http://ijns.femto.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p1-9.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/WuH07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/HwangTL07,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Chun{-}Ta Li},
  editor    = {Osvaldo Gervasi and
               Marina L. Gavrilova},
  title     = {A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation
               Period},
  booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International
               Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings.
               Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {4707},
  pages     = {273--284},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74484-9\_24},
  doi       = {10.1007/978-3-540-74484-9\_24},
  timestamp = {Tue, 14 May 2019 10:00:43 +0200},
  biburl    = {https://dblp.org/rec/conf/iccsa/HwangTL07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/BaoLH06,
  author    = {Feng Bao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis and improvement on batch verifying multiple {RSA} digital
               signatures},
  journal   = {Appl. Math. Comput.},
  volume    = {172},
  number    = {2},
  pages     = {1195--1200},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.amc.2005.03.016},
  doi       = {10.1016/j.amc.2005.03.016},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/BaoLH06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HwangLHC06,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Shu{-}Yin Hsiao and
               Yen{-}Ping Chu},
  title     = {Improvement of Authenticated Encryption Schemes with Message Linkages
               for Message Flows},
  journal   = {{IEICE} Trans. Inf. Syst.},
  volume    = {89-D},
  number    = {4},
  pages     = {1575--1577},
  year      = {2006},
  url       = {https://doi.org/10.1093/ietisy/e89-d.4.1575},
  doi       = {10.1093/ietisy/e89-d.4.1575},
  timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ieicet/HwangLHC06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HwangS06,
  author    = {Min{-}Shiang Hwang and
               Pei{-}Chen Sung},
  title     = {A Study of Micro-payment Based on One-way Hash Chain},
  journal   = {I. J. Network Security},
  volume    = {2},
  number    = {2},
  pages     = {81--90},
  year      = {2006},
  url       = {http://ijns.femto.com.tw/contents/ijns-v2-n2/ijns-2006-v2-n2-p81-90.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HwangS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiLH06,
  author    = {Chwei{-}Shyong Tsai and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {Password Authentication Schemes: Current Status and Key Issues},
  journal   = {I. J. Network Security},
  volume    = {3},
  number    = {2},
  pages     = {101--115},
  year      = {2006},
  url       = {http://ijns.femto.com.tw/contents/ijns-v3-n2/ijns-2006-v3-n2-p101-115.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/TsaiLH06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/LiaoLH06,
  author    = {I{-}En Liao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A password authentication scheme over insecure networks},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {72},
  number    = {4},
  pages     = {727--740},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.jcss.2005.10.001},
  doi       = {10.1016/j.jcss.2005.10.001},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcss/LiaoLH06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/LeeHL06,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {Security Enhancement on a New Authentication Scheme With Anonymity
               for Wireless Environments},
  journal   = {{IEEE} Trans. Ind. Electron.},
  volume    = {53},
  number    = {5},
  pages     = {1683--1687},
  year      = {2006},
  url       = {https://doi.org/10.1109/TIE.2006.881998},
  doi       = {10.1109/TIE.2006.881998},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tie/LeeHL06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsa/LiaoLH06,
  author    = {I{-}En Liao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  editor    = {Jenq{-}Neng Hwang},
  title     = {Identity-based deniable authentication protocol from pairings},
  booktitle = {Proceedings of the Tenth {IASTED} International Conference on Internet
               and Multimedia Systems and Applications {(IMSA} 2006), Honolulu, Hawaii,
               USA, August 14-16, 2006},
  pages     = {112--114},
  publisher = {{IASTED/ACTA} Press},
  year      = {2006},
  timestamp = {Tue, 27 Oct 2015 19:30:05 +0100},
  biburl    = {https://dblp.org/rec/conf/imsa/LiaoLH06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LiTH05,
  author    = {Li{-}Hua Li and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Improvement of signature scheme based on factoring and discrete logarithms},
  journal   = {Appl. Math. Comput.},
  volume    = {161},
  number    = {1},
  pages     = {49--54},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2003.12.008},
  doi       = {10.1016/j.amc.2003.12.008},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/LiTH05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LuHH05,
  author    = {Eric Jui{-}Lin Lu and
               Min{-}Shiang Hwang and
               Cheng{-}Jian Huang},
  title     = {A new proxy signature scheme with revocation},
  journal   = {Appl. Math. Comput.},
  volume    = {161},
  number    = {3},
  pages     = {799--806},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2003.12.039},
  doi       = {10.1016/j.amc.2003.12.039},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/LuHH05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ChangHY05,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret
               sharing scheme},
  journal   = {Appl. Math. Comput.},
  volume    = {163},
  number    = {1},
  pages     = {169--178},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.01.029},
  doi       = {10.1016/j.amc.2004.01.029},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/ChangHY05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LeeHY05,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A new blind signature based on the discrete logarithm problem for
               untraceability},
  journal   = {Appl. Math. Comput.},
  volume    = {164},
  number    = {3},
  pages     = {837--841},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.06.034},
  doi       = {10.1016/j.amc.2004.06.034},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/LeeHY05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/TsaiLH05,
  author    = {Chwei{-}Shyong Tsai and
               Shu{-}Chen Lin and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an authenticated encryption scheme using self-certified
               public keys},
  journal   = {Appl. Math. Comput.},
  volume    = {166},
  number    = {1},
  pages     = {118--122},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.04.073},
  doi       = {10.1016/j.amc.2004.04.073},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/TsaiLH05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/HwangHC05,
  author    = {Min{-}Shiang Hwang and
               Kuo{-}Feng Hwang and
               Chin{-}Chen Chang},
  title     = {A time-stamping protocol for digital watermarking},
  journal   = {Appl. Math. Comput.},
  volume    = {169},
  number    = {2},
  pages     = {1276--1284},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.amc.2004.10.094},
  doi       = {10.1016/j.amc.2004.10.094},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/HwangHC05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HwangLL05,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Chia{-}Hsin Liu},
  title     = {Improvement on the flexible tree-based key management framework},
  journal   = {Comput. Secur.},
  volume    = {24},
  number    = {6},
  pages     = {500--504},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.cose.2004.09.009},
  doi       = {10.1016/j.cose.2004.09.009},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/HwangLL05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/TzengHC05,
  author    = {Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang and
               Hsing{-}Bai Chen},
  title     = {A secure on-line software transaction scheme},
  journal   = {Comput. Stand. Interfaces},
  volume    = {27},
  number    = {3},
  pages     = {303--312},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.csi.2004.07.004},
  doi       = {10.1016/j.csi.2004.07.004},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/csi/TzengHC05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinHC05,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Chin{-}Chen Chang},
  title     = {The General Pay-Word: {A} Micro-payment Scheme Based on \emph{n}-dimension
               One-way Hash Chain},
  journal   = {Des. Codes Cryptogr.},
  volume    = {36},
  number    = {1},
  pages     = {53--67},
  year      = {2005},
  url       = {https://doi.org/10.1007/s10623-003-1162-6},
  doi       = {10.1007/s10623-003-1162-6},
  timestamp = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dcc/LinHC05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/WuHL05,
  author    = {Hsien{-}Chu Wu and
               Min{-}Shiang Hwang and
               Chia{-}Hsin Liu},
  title     = {A Secure Strong-Password Authentication Protocol},
  journal   = {Fundam. Inform.},
  volume    = {68},
  number    = {4},
  pages     = {399--406},
  year      = {2005},
  url       = {http://content.iospress.com/articles/fundamenta-informaticae/fi68-4-06},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/fuin/WuHL05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcat/LeeCH05,
  author    = {Cheng{-}Chi Lee and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A simple broadcasting cryptosystem in computer networks using eXclusive-OR},
  journal   = {{IJCAT}},
  volume    = {24},
  number    = {3},
  pages     = {180--183},
  year      = {2005},
  url       = {https://doi.org/10.1504/IJCAT.2005.007484},
  doi       = {10.1504/IJCAT.2005.007484},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcat/LeeCH05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HwangL05,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee},
  title     = {Research Issues and Challenges for Multiple Digital Signatures},
  journal   = {I. J. Network Security},
  volume    = {1},
  number    = {1},
  pages     = {1--7},
  year      = {2005},
  url       = {http://ijns.femto.com.tw/contents/ijns-v1-n1/ijns-2005-v1-n1-p1-7.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HwangL05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HwangL05a,
  author    = {Min{-}Shiang Hwang and
               Chi{-}Yu Liu},
  title     = {Authenticated Encryption Schemes: Current Status and Key Issues},
  journal   = {I. J. Network Security},
  volume    = {1},
  number    = {2},
  pages     = {61--73},
  year      = {2005},
  url       = {http://ijns.femto.com.tw/contents/ijns-v1-n2/ijns-2005-v1-n2-p61-73.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HwangL05a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HwangC05,
  author    = {Min{-}Shiang Hwang and
               Ting Yi Chang},
  title     = {Threshold Signatures: Current Status and Key Issues},
  journal   = {I. J. Network Security},
  volume    = {1},
  number    = {3},
  pages     = {123--137},
  year      = {2005},
  url       = {http://ijns.femto.com.tw/contents/ijns-v1-n3/ijns-2005-v1-n3-p123-137.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/HwangC05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/LinOH05,
  author    = {Iuon{-}Chang Lin and
               Hsia{-}Hung Ou and
               Min{-}Shiang Hwang},
  title     = {A user authentication system using back-propagation network},
  journal   = {Neural Computing and Applications},
  volume    = {14},
  number    = {3},
  pages     = {243--249},
  year      = {2005},
  url       = {https://doi.org/10.1007/s00521-004-0460-x},
  doi       = {10.1007/s00521-004-0460-x},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nca/LinOH05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/ChangHY05,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A new multi-stage secret sharing scheme using one-way function},
  journal   = {Operating Systems Review},
  volume    = {39},
  number    = {1},
  pages     = {48--55},
  year      = {2005},
  url       = {https://doi.org/10.1145/1044552.1044557},
  doi       = {10.1145/1044552.1044557},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigops/ChangHY05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/HwangLLY05,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Ji{-}Zhe Lee and
               Chao{-}Chen Yang},
  title     = {A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography},
  journal   = {Telecommunication Systems},
  volume    = {29},
  number    = {3},
  pages     = {165--180},
  year      = {2005},
  url       = {https://doi.org/10.1007/s11235-005-1689-0},
  doi       = {10.1007/s11235-005-1689-0},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/telsys/HwangLLY05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/YangCH04,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A (t, n) multi-secret sharing scheme},
  journal   = {Appl. Math. Comput.},
  volume    = {151},
  number    = {2},
  pages     = {483--490},
  year      = {2004},
  url       = {https://doi.org/10.1016/S0096-3003(03)00355-2},
  doi       = {10.1016/S0096-3003(03)00355-2},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/YangCH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TzengHY04,
  author    = {Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang and
               Cheng{-}Ying Yang},
  title     = {An improvement of nonrepudiable threshold proxy signature scheme with
               known signers},
  journal   = {Comput. Secur.},
  volume    = {23},
  number    = {2},
  pages     = {174--178},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.cose.2003.12.001},
  doi       = {10.1016/j.cose.2003.12.001},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/TzengHY04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/TzengH04,
  author    = {Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Digital signature with message recovery and its variants based on
               elliptic curve discrete logarithm problem},
  journal   = {Comput. Stand. Interfaces},
  volume    = {26},
  number    = {2},
  pages     = {61--71},
  year      = {2004},
  url       = {https://doi.org/10.1016/S0920-5489(03)00069-2},
  doi       = {10.1016/S0920-5489(03)00069-2},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/csi/TzengH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HwangTT04,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Chwei{-}Shyong Tsai},
  title     = {Generalization of proxy signature based on elliptic curves},
  journal   = {Comput. Stand. Interfaces},
  volume    = {26},
  number    = {2},
  pages     = {73--84},
  year      = {2004},
  url       = {https://doi.org/10.1016/S0920-5489(03)00075-8},
  doi       = {10.1016/S0920-5489(03)00075-8},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/csi/HwangTT04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LinOH04,
  author    = {Iuon{-}Chang Lin and
               Hsia{-}Hung Ou and
               Min{-}Shiang Hwang},
  title     = {Efficient access control and key management schemes for mobile agents},
  journal   = {Comput. Stand. Interfaces},
  volume    = {26},
  number    = {5},
  pages     = {423--433},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.csi.2003.11.010},
  doi       = {10.1016/j.csi.2003.11.010},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/csi/LinOH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HwangLL04,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Shu{-}Chen Lin},
  title     = {An efficient user identification scheme based on ID-based cryptosystem},
  journal   = {Comput. Stand. Interfaces},
  volume    = {26},
  number    = {6},
  pages     = {565--569},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.csi.2004.03.006},
  doi       = {10.1016/j.csi.2004.03.006},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/csi/HwangLL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/YangLH04,
  author    = {Chou Chen Yang and
               Jian Wei Li and
               Min{-}Shiang Hwang},
  title     = {A new mutual authentication and key exchange protocol with balanced
               computational power for wireless settings},
  journal   = {Eur. Trans. Telecommun.},
  volume    = {15},
  number    = {2},
  pages     = {91--99},
  year      = {2004},
  url       = {https://doi.org/10.1002/ett.957},
  doi       = {10.1002/ett.957},
  timestamp = {Mon, 18 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ett/YangLH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/TzengYH04,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {A nonrepudiable threshold multi-proxy multi-signature scheme with
               shared verification},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {20},
  number    = {5},
  pages     = {887--893},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.future.2004.01.002},
  doi       = {10.1016/j.future.2004.01.002},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/TzengYH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChangYH04,
  author    = {Ting Yi Chang and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A threshold signature scheme for group communications without a shared
               distribution center},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {20},
  number    = {6},
  pages     = {1013--1021},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.future.2003.09.005},
  doi       = {10.1016/j.future.2003.09.005},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/ChangYH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/HwangLL04,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Chia{-}Hsin Liu},
  title     = {Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service
               Attack},
  journal   = {Fundam. Inform.},
  volume    = {61},
  number    = {3-4},
  pages     = {389--398},
  year      = {2004},
  url       = {http://content.iospress.com/articles/fundamenta-informaticae/fi61-3-4-12},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/fuin/HwangLL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShenLH04,
  author    = {Jau{-}Ji Shen and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {A Secure {LITESET} Scheme},
  journal   = {{IEICE} Trans. Inf. Syst.},
  volume    = {87-D},
  number    = {11},
  pages     = {2509--2512},
  year      = {2004},
  url       = {http://search.ieice.org/bin/summary.php?id=e87-d\_11\_2509},
  timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ieicet/ShenLH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/TzengYH04,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {A new digital signature scheme based on factoring and discrete logarithms},
  journal   = {Int. J. Comput. Math.},
  volume    = {81},
  number    = {1},
  pages     = {9--14},
  year      = {2004},
  url       = {https://doi.org/10.1080/00207160310001614954},
  doi       = {10.1080/00207160310001614954},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcm/TzengYH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/YangTH04,
  author    = {Cheng{-}Ying Yang and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {On the efficiency of nonrepudiable threshold proxy signature scheme
               with known signers},
  journal   = {J. Syst. Softw.},
  volume    = {73},
  number    = {3},
  pages     = {507--514},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.jss.2003.09.022},
  doi       = {10.1016/j.jss.2003.09.022},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/YangTH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LeeHL04,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {A server assisted authentication protocol for detecting error vectors},
  journal   = {Operating Systems Review},
  volume    = {38},
  number    = {2},
  pages     = {93--96},
  year      = {2004},
  url       = {https://doi.org/10.1145/991130.991140},
  doi       = {10.1145/991130.991140},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigops/LeeHL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/HwangLL04,
  author    = {Min{-}Shiang Hwang and
               Li{-}Hua Li and
               Cheng{-}Chi Lee},
  title     = {A key authentication scheme with non-repudiation},
  journal   = {Operating Systems Review},
  volume    = {38},
  number    = {3},
  pages     = {75--78},
  year      = {2004},
  url       = {https://doi.org/10.1145/1035834.1035843},
  doi       = {10.1145/1035834.1035843},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigops/HwangLL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LiLH04,
  author    = {Li{-}Hua Li and
               Chi{-}Yu Liu and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an efficient secure group signature scheme},
  journal   = {Operating Systems Review},
  volume    = {38},
  number    = {4},
  pages     = {66--69},
  year      = {2004},
  url       = {https://doi.org/10.1145/1031154.1031161},
  doi       = {10.1145/1031154.1031161},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigops/LiLH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ChangCH04,
  author    = {Chin{-}Chen Chang and
               Kuo{-}Lun Chen and
               Min{-}Shiang Hwang},
  title     = {End-to-End Security Protocol for Mobile Communications with End-User
               Identification/Authentication},
  journal   = {Wireless Personal Communications},
  volume    = {28},
  number    = {2},
  pages     = {95--106},
  year      = {2004},
  url       = {https://doi.org/10.1023/B:WIRE.0000021422.21951.f0},
  doi       = {10.1023/B:WIRE.0000021422.21951.f0},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/wpc/ChangCH04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/HwangCLT04,
  author    = {Min{-}Shiang Hwang and
               Ting Yi Chang and
               Shu{-}Chen Lin and
               Chwei{-}Shyong Tsai},
  title     = {On the Security of an Enhanced Authentication Key Exchange Protocol},
  booktitle = {18th International Conference on Advanced Information Networking and
               Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan},
  pages     = {160--163},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {https://doi.org/10.1109/AINA.2004.1283777},
  doi       = {10.1109/AINA.2004.1283777},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/aina/HwangCLT04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LeeHL03,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Li{-}Hua Li},
  title     = {A new key authentication scheme based on discrete logarithms},
  journal   = {Appl. Math. Comput.},
  volume    = {139},
  number    = {2-3},
  pages     = {343--349},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0096-3003(02)00192-3},
  doi       = {10.1016/S0096-3003(02)00192-3},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/LeeHL03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/HwangLL03,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yan{-}Chi Lai},
  title     = {Traceability on RSA-based partially signature with low computation},
  journal   = {Appl. Math. Comput.},
  volume    = {145},
  number    = {2-3},
  pages     = {465--468},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0096-3003(02)00500-3},
  doi       = {10.1016/S0096-3003(02)00500-3},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/HwangLL03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiTH03,
  author    = {Li{-}Hua Li and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Generalization of proxy signature-based on discrete logarithms},
  journal   = {Comput. Secur.},
  volume    = {22},
  number    = {3},
  pages     = {245--255},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0167-4048(03)00312-2},
  doi       = {10.1016/S0167-4048(03)00312-2},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/LiTH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenLH03,
  author    = {Jau{-}Ji Shen and
               Chih{-}Wei Lin and
               Min{-}Shiang Hwang},
  title     = {Security enhancement for the timestamp-based password authentication
               scheme using smart cards},
  journal   = {Comput. Secur.},
  volume    = {22},
  number    = {7},
  pages     = {591--595},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0167-4048(03)00709-0},
  doi       = {10.1016/S0167-4048(03)00709-0},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/ShenLH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LinHC03,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Chin{-}Chen Chang},
  title     = {Security enhancement for anonymous secure e-voting over a network},
  journal   = {Comput. Stand. Interfaces},
  volume    = {25},
  number    = {2},
  pages     = {131--139},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0920-5489(02)00120-4},
  doi       = {10.1016/S0920-5489(02)00120-4},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/csi/LinHC03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/YangCH03,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A new anonymous conference key distribution system based on the elliptic
               curve discrete logarithm problem},
  journal   = {Comput. Stand. Interfaces},
  volume    = {25},
  number    = {2},
  pages     = {141--145},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0920-5489(03)00002-3},
  doi       = {10.1016/S0920-5489(03)00002-3},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/csi/YangCH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LinHL03,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Li{-}Hua Li},
  title     = {A new remote user authentication scheme for multi-server architecture},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {19},
  number    = {1},
  pages     = {13--22},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0167-739X(02)00093-6},
  doi       = {10.1016/S0167-739X(02)00093-6},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/LinHL03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LinHC03,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Chin{-}Chen Chang},
  title     = {A new key assignment scheme for enforcing complicated access control
               policies in hierarchy},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {19},
  number    = {4},
  pages     = {457--462},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0167-739X(02)00200-5},
  doi       = {10.1016/S0167-739X(02)00200-5},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/LinHC03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/LeeYH03,
  author    = {Cheng{-}Chi Lee and
               Wei{-}Pang Yang and
               Min{-}Shiang Hwang},
  title     = {Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem},
  journal   = {Fundam. Inform.},
  volume    = {55},
  number    = {3-4},
  pages     = {307--320},
  year      = {2003},
  url       = {http://content.iospress.com/articles/fundamenta-informaticae/fi55-3-4-04},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/fuin/LeeYH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/LeeYH03,
  author    = {Cheng{-}Chi Lee and
               Chao{-}Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A new privacy and authentication protocol for end-to-end mobile users},
  journal   = {Int. J. Communication Systems},
  volume    = {16},
  number    = {9},
  pages     = {799--808},
  year      = {2003},
  url       = {https://doi.org/10.1002/dac.617},
  doi       = {10.1002/dac.617},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcomsys/LeeYH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/YangCLH03,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Jian Wei Li and
               Min{-}Shiang Hwang},
  title     = {Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem},
  journal   = {Informatica},
  volume    = {14},
  number    = {1},
  pages     = {111--120},
  year      = {2003},
  url       = {http://content.iospress.com/articles/informatica/inf14-1-08},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/YangCLH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/TsaiTH03,
  author    = {Chwei{-}Shyong Tsai and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Improved Non-Repudiable Threshold Proxy Signature Scheme with Known
               Signers},
  journal   = {Informatica},
  volume    = {14},
  number    = {3},
  pages     = {393--402},
  year      = {2003},
  url       = {http://content.iospress.com/articles/informatica/inf14-3-09},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/TsaiTH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/YangCH03,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {Security of Improvement on Methods for Protecting Password Transmission},
  journal   = {Informatica},
  volume    = {14},
  number    = {4},
  pages     = {551--558},
  year      = {2003},
  url       = {http://content.iospress.com/articles/informatica/inf14-4-11},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/YangCH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/HwangHT03a,
  author    = {Shin{-}Jia Hwang and
               Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng},
  title     = {A New Digital Multisignature Scheme With Distinguished Signing Authorities},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {19},
  number    = {5},
  pages     = {881--887},
  year      = {2003},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2003/200309\_09.html},
  timestamp = {Wed, 24 Oct 2007 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jise/HwangHT03a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HwangY03,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Controlling access in large partially ordered hierarchies using cryptographic
               keys},
  journal   = {J. Syst. Softw.},
  volume    = {67},
  number    = {2},
  pages     = {99--107},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0164-1212(02)00091-2},
  doi       = {10.1016/S0164-1212(02)00091-2},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/HwangY03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LinSH03,
  author    = {Chih{-}Wei Lin and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {Security enhancement for Optimal Strong-Password Authentication protocol},
  journal   = {Operating Systems Review},
  volume    = {37},
  number    = {2},
  pages     = {7--12},
  year      = {2003},
  url       = {https://doi.org/10.1145/769782.769783},
  doi       = {10.1145/769782.769783},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigops/LinSH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LinSH03a,
  author    = {Chih{-}Wei Lin and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {Security enhancement for optimal strong-password authentication protocol},
  journal   = {Operating Systems Review},
  volume    = {37},
  number    = {3},
  pages     = {12--16},
  year      = {2003},
  url       = {https://doi.org/10.1145/881783.881785},
  doi       = {10.1145/881783.881785},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigops/LinSH03a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/HwangYS03,
  author    = {Min{-}Shiang Hwang and
               Chao{-}Chen Yang and
               Cheng{-}Yeh Shiu},
  title     = {An authentication scheme for mobile satellite communication systems},
  journal   = {Operating Systems Review},
  volume    = {37},
  number    = {4},
  pages     = {42--47},
  year      = {2003},
  url       = {https://doi.org/10.1145/958965.958970},
  doi       = {10.1145/958965.958970},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigops/HwangYS03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ShenLH03,
  author    = {Jau{-}Ji Shen and
               Chih{-}Wei Lin and
               Min{-}Shiang Hwang},
  title     = {A modified remote user authentication scheme using smart cards},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {49},
  number    = {2},
  pages     = {414--416},
  year      = {2003},
  url       = {https://doi.org/10.1109/TCE.2003.1209534},
  doi       = {10.1109/TCE.2003.1209534},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tce/ShenLH03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/HwangLL03,
  author    = {Min{-}Shiang Hwang and
               Eric Jui{-}Lin Lu and
               Iuon{-}Chang Lin},
  title     = {A Practical (t, n) Threshold Proxy Signature Scheme Based on the {RSA}
               Cryptosystem},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {15},
  number    = {6},
  pages     = {1552--1560},
  year      = {2003},
  url       = {https://doi.org/10.1109/TKDE.2003.1245292},
  doi       = {10.1109/TKDE.2003.1245292},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tkde/HwangLL03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/HwangT03,
  author    = {Min{-}Shiang Hwang and
               Wen{-}Guey Tzeng},
  editor    = {Hyun{-}Kook Kahng},
  title     = {A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy},
  booktitle = {Information Networking, Networking Technologies for Enhanced Internet
               Services International Conference, {ICOIN} 2003, Cheju Island, Korea,
               February 12-14, 2003, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2662},
  pages     = {757--761},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-45235-5\_74},
  doi       = {10.1007/978-3-540-45235-5\_74},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/icoin/HwangT03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/HwangLL02,
  author    = {Min{-}Shiang Hwang and
               Eric Jui{-}Lin Lu and
               Iuon{-}Chang Lin},
  title     = {Adding timestamps to the secure electronic auction protocol},
  journal   = {Data Knowl. Eng.},
  volume    = {40},
  number    = {2},
  pages     = {155--162},
  year      = {2002},
  url       = {https://doi.org/10.1016/S0169-023X(01)00048-9},
  doi       = {10.1016/S0169-023X(01)00048-9},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dke/HwangLL02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/HwangLH02,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Shin{-}Jia Hwang},
  title     = {Cryptanalysis of the Hwang-Shi Proxy Signature Scheme},
  journal   = {Fundam. Inform.},
  volume    = {53},
  number    = {2},
  pages     = {131--134},
  year      = {2002},
  url       = {http://content.iospress.com/articles/fundamenta-informaticae/fi53-2-02},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/fuin/HwangLH02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/ChangHH02,
  author    = {Chin{-}Chen Chang and
               Kuo{-}Feng Hwang and
               Min{-}Shiang Hwang},
  title     = {A Feature-Oriented Copyright Owner Proving Technique for Still Images},
  journal   = {International Journal of Software Engineering and Knowledge Engineering},
  volume    = {12},
  number    = {3},
  pages     = {317--330},
  year      = {2002},
  url       = {https://doi.org/10.1142/S0218194002000937},
  doi       = {10.1142/S0218194002000937},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijseke/ChangHH02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/HwangLC02,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Ting Yi Chang},
  title     = {Broadcasting Cryptosystem in Computer Networks Using Geometric Properties
               of Lines},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {18},
  number    = {3},
  pages     = {373--379},
  year      = {2002},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2002/200205\_03.html},
  timestamp = {Wed, 24 Oct 2007 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jise/HwangLC02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LeeHY02,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A flexible remote user authentication scheme using smart cards},
  journal   = {Operating Systems Review},
  volume    = {36},
  number    = {3},
  pages     = {46--52},
  year      = {2002},
  url       = {https://doi.org/10.1145/567331.567335},
  doi       = {10.1145/567331.567335},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigops/LeeHY02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LeeLH02,
  author    = {Cheng{-}Chi Lee and
               Li{-}Hua Li and
               Min{-}Shiang Hwang},
  title     = {A remote user authentication scheme using hash functions},
  journal   = {Operating Systems Review},
  volume    = {36},
  number    = {4},
  pages     = {23--29},
  year      = {2002},
  url       = {https://doi.org/10.1145/583800.583803},
  doi       = {10.1145/583800.583803},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigops/LeeLH02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/HwangCH02,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {An ElGamal-Like Cryptosystem for Enciphering Large Messages},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {14},
  number    = {2},
  pages     = {445--446},
  year      = {2002},
  url       = {https://doi.org/10.1109/69.991728},
  doi       = {10.1109/69.991728},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tkde/HwangCH02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdma/YangHLC02,
  author    = {Chou Chen Yang and
               Min{-}Shiang Hwang and
               Jian Wei Li and
               Ting Yi Chang},
  editor    = {Jai{-}Yong Lee and
               Chul{-}Hee Kang},
  title     = {A Solution to Mobile {IP} Registration for {AAA}},
  booktitle = {Mobile Communications, 7th {CDMA} International Conference, {CIC}
               2002, Seoul, Korea, October 29 - November 1, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2524},
  pages     = {329--337},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36555-9\_34},
  doi       = {10.1007/3-540-36555-9\_34},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/cdma/YangHLC02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/HwangL01,
  author    = {Min{-}Shiang Hwang and
               Chii{-}Hwa Lee},
  title     = {Secure access schemes in mobile database systems},
  journal   = {Eur. Trans. Telecommun.},
  volume    = {12},
  number    = {4},
  pages     = {303--310},
  year      = {2001},
  url       = {https://doi.org/10.1002/ett.4460120407},
  doi       = {10.1002/ett.4460120407},
  timestamp = {Mon, 18 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ett/HwangL01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/HwangLT01,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yuan{-}Liang Tang},
  title     = {An Improvement of {SPLICE/AS} in {WIDE} against Guessing Attack},
  journal   = {Informatica},
  volume    = {12},
  number    = {2},
  pages     = {297--302},
  year      = {2001},
  url       = {http://www.mii.lt/informatica/htm/INFO267.htm},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/HwangLT01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HwangLL01,
  author    = {Min{-}Shiang Hwang and
               Iuon{-}Chang Lin and
               Li{-}Hua Li},
  title     = {A simple micro-payment scheme},
  journal   = {J. Syst. Softw.},
  volume    = {55},
  number    = {3},
  pages     = {221--229},
  year      = {2001},
  url       = {https://doi.org/10.1016/S0164-1212(00)00072-8},
  doi       = {10.1016/S0164-1212(00)00072-8},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/HwangLL01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ChangHC01,
  author    = {Chin{-}Chen Chang and
               Min{-}Shiang Hwang and
               Tung{-}Shou Chen},
  title     = {A new encryption algorithm for image cryptosystems},
  journal   = {J. Syst. Softw.},
  volume    = {58},
  number    = {2},
  pages     = {83--91},
  year      = {2001},
  url       = {https://doi.org/10.1016/S0164-1212(01)00029-2},
  doi       = {10.1016/S0164-1212(01)00029-2},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/ChangHC01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/LiLH01,
  author    = {Li{-}Hua Li and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {A remote password authentication scheme for multiserver architecture
               using neural networks},
  journal   = {{IEEE} Trans. Neural Networks},
  volume    = {12},
  number    = {6},
  pages     = {1498--1504},
  year      = {2001},
  url       = {https://doi.org/10.1109/72.963786},
  doi       = {10.1109/72.963786},
  timestamp = {Sat, 30 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tnn/LiLH01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HwangLT01,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yuan{-}Liang Tang},
  editor    = {Sihan Qing and
               Tatsuaki Okamoto and
               Jianying Zhou},
  title     = {Two Simple Batch Verifying Multiple Digital Signatures},
  booktitle = {Information and Communications Security, Third International Conference,
               {ICICS} 2001, Xian, China, November 13-16, 2001},
  series    = {Lecture Notes in Computer Science},
  volume    = {2229},
  pages     = {233--237},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45600-7\_26},
  doi       = {10.1007/3-540-45600-7\_26},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/conf/icics/HwangLT01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/HwangCH00,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {A threshold decryption scheme without session keys},
  journal   = {Comput. Electr. Eng.},
  volume    = {27},
  number    = {1},
  pages     = {29--35},
  year      = {2000},
  url       = {https://doi.org/10.1016/S0045-7906(00)00006-9},
  doi       = {10.1016/S0045-7906(00)00006-9},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cee/HwangCH00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/Hwang00,
  author    = {Min{-}Shiang Hwang},
  title     = {An asymmetric cryptographuic key assignment scheme for access control
               in totally-ordered hierarchies},
  journal   = {Int. J. Comput. Math.},
  volume    = {73},
  number    = {4},
  pages     = {463--468},
  year      = {2000},
  url       = {https://doi.org/10.1080/00207160008804909},
  doi       = {10.1080/00207160008804909},
  timestamp = {Wed, 08 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcm/Hwang00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/HwangLH00,
  author    = {Min{-}Shiang Hwang and
               Iuon{-}Chang Lin and
               Kuo{-}Feng Hwang},
  title     = {Cryptanalysis of the Batch Verifying Multiple {RSA} Digital Signatures},
  journal   = {Informatica},
  volume    = {11},
  number    = {1},
  pages     = {15--19},
  year      = {2000},
  url       = {http://www.mii.lt/informatica/htm/INFO197.htm},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/HwangLH00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/HwangLL00,
  author    = {Min{-}Shiang Hwang and
               Iuon{-}Chang Lin and
               Eric Jui{-}Lin Lu},
  title     = {A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known
               Signers},
  journal   = {Informatica},
  volume    = {11},
  number    = {2},
  pages     = {137--144},
  year      = {2000},
  url       = {http://www.mii.lt/informatica/htm/INFO199.htm},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/HwangLL00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/Hwang00,
  author    = {Min{-}Shiang Hwang},
  title     = {A New Redundancy Reducing Cipher},
  journal   = {Informatica},
  volume    = {11},
  number    = {4},
  pages     = {435--440},
  year      = {2000},
  url       = {http://www.mii.lt/informatica/htm/INFO233.htm},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/Hwang00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/ChangHK00,
  author    = {Chin{-}Chen Chang and
               Kuo{-}Feng Hwang and
               Min{-}Shiang Hwang},
  title     = {A Digital Watermarking Scheme Using Human Visual Effects},
  journal   = {Informatica (Slovenia)},
  volume    = {24},
  number    = {4},
  year      = {2000},
  timestamp = {Mon, 15 Feb 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/informaticaSI/ChangHK00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Hwang00,
  author    = {Min{-}Shiang Hwang},
  title     = {Cryptanalysis of {YCN} key assignment scheme in a hierarchy},
  journal   = {Inf. Process. Lett.},
  volume    = {73},
  number    = {3-4},
  pages     = {97--101},
  year      = {2000},
  url       = {https://doi.org/10.1016/S0020-0190(00)00013-2},
  doi       = {10.1016/S0020-0190(00)00013-2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ipl/Hwang00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/HwangCH00,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {Digital watermarking of images using neural networks},
  journal   = {J. Electronic Imaging},
  volume    = {9},
  number    = {4},
  pages     = {548--555},
  year      = {2000},
  url       = {https://doi.org/10.1117/1.1289357},
  doi       = {10.1117/1.1289357},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jei/HwangCH00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/HwangL00,
  author    = {Min{-}Shiang Hwang and
               Li{-}Hua Li},
  title     = {A new remote user authentication scheme using smart cards},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {46},
  number    = {1},
  pages     = {28--30},
  year      = {2000},
  url       = {https://doi.org/10.1109/30.826377},
  doi       = {10.1109/30.826377},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tce/HwangL00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/LinCH00,
  author    = {Iuon{-}Chang Lin and
               Chin{-}Chen Chang and
               Min{-}Shiang Hwang},
  title     = {Security Enhancement for the "Simple Authentication Key Agreement
               Algorithm"},
  booktitle = {24th International Computer Software and Applications Conference {(COMPSAC}
               2000), 25-28 October 2000, Taipei, Taiwan},
  pages     = {113--115},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {https://doi.org/10.1109/CMPSAC.2000.884699},
  doi       = {10.1109/CMPSAC.2000.884699},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/compsac/LinCH00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Hwang99,
  author    = {Min{-}Shiang Hwang},
  title     = {Cryptanalysis of a remote login authentication scheme},
  journal   = {Comput. Commun.},
  volume    = {22},
  number    = {8},
  pages     = {742--744},
  year      = {1999},
  url       = {https://doi.org/10.1016/S0140-3664(99)00036-5},
  doi       = {10.1016/S0140-3664(99)00036-5},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/Hwang99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/Hwang99,
  author    = {Min{-}Shiang Hwang},
  title     = {A remote password authentication scheme based on the digital signature
               method},
  journal   = {Int. J. Comput. Math.},
  volume    = {70},
  number    = {4},
  pages     = {657--666},
  year      = {1999},
  url       = {https://doi.org/10.1080/00207169908804781},
  doi       = {10.1080/00207169908804781},
  timestamp = {Thu, 09 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcm/Hwang99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LeeHY99,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A Novel Application of the Phone Card and Its Authentication in Mobile
               Communications},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {15},
  number    = {4},
  pages     = {471--484},
  year      = {1999},
  url       = {http://www.iis.sinica.edu.tw/page/jise/1999/199907\_01.html},
  timestamp = {Wed, 24 Oct 2007 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jise/LeeHY99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/njc/Hwang99,
  author    = {Min{-}Shiang Hwang},
  title     = {A Dynamic Key Generation Scheme for Access Control in a Hierarchy},
  journal   = {Nord. J. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {363--371},
  year      = {1999},
  timestamp = {Wed, 14 Jan 2004 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/njc/Hwang99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/HwangCH99,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {A watermarking technique based on one-way hash functions},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {45},
  number    = {2},
  pages     = {286--294},
  year      = {1999},
  url       = {https://doi.org/10.1109/30.793411},
  doi       = {10.1109/30.793411},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tce/HwangCH99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LeeHY99,
  author    = {Chii{-}Hwa Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Enhanced privacy and authentication for the global system for mobile
               communications},
  journal   = {Wireless Networks},
  volume    = {5},
  number    = {4},
  pages     = {231--243},
  year      = {1999},
  url       = {https://doi.org/10.1023/A:1019103228471},
  doi       = {10.1023/A:1019103228471},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/winet/LeeHY99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/ChenCH98,
  author    = {Tung{-}Shou Chen and
               Chin{-}Chen Chang and
               Min{-}Shiang Hwang},
  title     = {A virtual image cryptosystem based upon vector quantization},
  journal   = {{IEEE} Trans. Image Process.},
  volume    = {7},
  number    = {10},
  pages     = {1485--1488},
  year      = {1998},
  url       = {https://doi.org/10.1109/83.718488},
  doi       = {10.1109/83.718488},
  timestamp = {Sat, 30 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tip/ChenCH98.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/HwangY97,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Multilevel Secure Database Encryption with Subkeys},
  journal   = {Data Knowl. Eng.},
  volume    = {22},
  number    = {2},
  pages     = {117--131},
  year      = {1997},
  url       = {https://doi.org/10.1016/S0169-023X(96)00040-7},
  doi       = {10.1016/S0169-023X(96)00040-7},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dke/HwangY97.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/HwangL97,
  author    = {Min{-}Shiang Hwang and
               Chii{-}Hwa Lee},
  title     = {Authenticated key-exchange in a mobile radio network},
  journal   = {Eur. Trans. Telecommun.},
  volume    = {8},
  number    = {3},
  pages     = {265--269},
  year      = {1997},
  url       = {https://doi.org/10.1002/ett.4460080309},
  doi       = {10.1002/ett.4460080309},
  timestamp = {Mon, 18 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ett/HwangL97.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HwangTY96,
  author    = {Min{-}Shiang Hwang and
               Wen{-}Guey Tzeng and
               Wei{-}Pang Yang},
  title     = {An access control scheme based on Chinese remainder theorem and time
               stamp concept},
  journal   = {Comput. Secur.},
  volume    = {15},
  number    = {1},
  pages     = {73--81},
  year      = {1996},
  url       = {https://doi.org/10.1016/0167-4048(95)00028-3},
  doi       = {10.1016/0167-4048(95)00028-3},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/HwangTY96.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/Lee96,
  author    = {Chii{-}Hwa Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  editor    = {Jos{\'{e}} L. Encarna{\c{c}}{\~{a}}o and
               Jan M. Rabaey},
  title     = {Phone Card Application and Authentication in Wireless Communications},
  booktitle = {Mobile Communications: Technology, Tools Applications, Authentication
               and Security},
  series    = {{IFIP} Conference Proceedings},
  volume    = {66},
  pages     = {323--329},
  publisher = {Chapman {\&} Hall},
  year      = {1996},
  timestamp = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl    = {https://dblp.org/rec/conf/ifip/Lee96.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/HwangY95,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Conference Key Distribution Schemes for Secure Digital Mobile Communications},
  journal   = {{IEEE} J. Sel. Areas Commun.},
  volume    = {13},
  number    = {2},
  pages     = {416--420},
  year      = {1995},
  url       = {https://doi.org/10.1109/49.345886},
  doi       = {10.1109/49.345886},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jsac/HwangY95.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HwangY95,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A two-phase encryption scheme for enhancing database security},
  journal   = {J. Syst. Softw.},
  volume    = {31},
  number    = {3},
  pages     = {257--265},
  year      = {1995},
  url       = {https://doi.org/10.1016/0164-1212(94)00102-2},
  doi       = {10.1016/0164-1212(94)00102-2},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/HwangY95.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/HwangY94,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A New Dynamic Access Control Scheme Based on Subject-Object List},
  journal   = {Data Knowl. Eng.},
  volume    = {14},
  number    = {1},
  pages     = {45--56},
  year      = {1994},
  url       = {https://doi.org/10.1016/0169-023X(94)90008-6},
  doi       = {10.1016/0169-023X(94)90008-6},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dke/HwangY94.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics