BibTeX records: Min-Shiang Hwang

download as .bib file

@article{DBLP:journals/fgcs/ChenFMZRH22,
  author    = {Lanxiang Chen and
               Qingxiao Fu and
               Yi Mu and
               Lingfang Zeng and
               Fatemeh Rezaeibagha and
               Min{-}Shiang Hwang},
  title     = {Blockchain-based random auditor committee for integrity verification},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {131},
  pages     = {183--193},
  year      = {2022}
}
@article{DBLP:journals/ijdsn/CahyadiSYH22,
  author    = {Eko Fajar Cahyadi and
               Tzu{-}Wei Su and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A certificateless aggregate signature scheme for security and privacy
               protection in {VANET}},
  journal   = {Int. J. Distributed Sens. Networks},
  volume    = {18},
  number    = {5},
  pages     = {155013292210806},
  year      = {2022}
}
@article{DBLP:journals/ijes/CahyadiH22,
  author    = {Eko Fajar Cahyadi and
               Min{-}Shiang Hwang},
  title     = {An improved efficient authentication scheme for vehicular ad hoc networks
               with batch verification using bilinear pairings},
  journal   = {Int. J. Embed. Syst.},
  volume    = {15},
  number    = {2},
  pages     = {139--148},
  year      = {2022}
}
@article{DBLP:journals/informaticaLT/HuangCH21,
  author    = {Li{-}Chin Huang and
               Shu{-}Fen Chiou and
               Min{-}Shiang Hwang},
  title     = {A Reversible Data Hiding Based on Histogram Shifting of Prediction
               Errors for Two-Tier Medical Images},
  journal   = {Informatica},
  volume    = {32},
  number    = {1},
  pages     = {69--84},
  year      = {2021}
}
@inproceedings{DBLP:conf/icce-tw/YangYYH21,
  author    = {Cheng{-}Ying Yang and
               Jenq{-}Foung J. F. Yao and
               Chin{-}En Yen and
               Min{-}Shiang Hwang},
  title     = {Overview on Physical Layer Security in Low Earth Orbit {(LEO)} Satellite
               System},
  booktitle = {{ICCE-TW}},
  pages     = {1--2},
  publisher = {{IEEE}},
  year      = {2021}
}
@article{DBLP:journals/ijnsec/PanYH20,
  author    = {Hsieh{-}Tsen Pan and
               Hung{-}Wei Yang and
               Min{-}Shiang Hwang},
  title     = {An Enhanced Secure Smart Card-based Password Authentication Scheme},
  journal   = {Int. J. Netw. Secur.},
  volume    = {22},
  number    = {2},
  pages     = {358--363},
  year      = {2020}
}
@article{DBLP:journals/ijnsec/ChenHLH20,
  author    = {Yi{-}Hui Chen and
               Li{-}Chin Huang and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {Research on the Secure Financial Surveillance Blockchain Systems},
  journal   = {Int. J. Netw. Secur.},
  volume    = {22},
  number    = {4},
  pages     = {708--716},
  year      = {2020}
}
@article{DBLP:journals/ijnsec/HuangCH20,
  author    = {Li{-}Chin Huang and
               Chun{-}Hsien Chang and
               Min{-}Shiang Hwang},
  title     = {Research on Malware Detection and Classification Based on Artificial
               Intelligence},
  journal   = {Int. J. Netw. Secur.},
  volume    = {22},
  number    = {5},
  pages     = {717--727},
  year      = {2020}
}
@article{DBLP:journals/informaticaLT/HwangXW20,
  author    = {Min{-}Shiang Hwang and
               Ming{-}Ru Xie and
               Chia{-}Chun Wu},
  title     = {A Reversible Hiding Technique Using {LSB} Matching for Relational
               Databases},
  journal   = {Informatica},
  volume    = {31},
  number    = {3},
  pages     = {481--497},
  year      = {2020}
}
@article{DBLP:journals/ijfcs/HwangLH19,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Shih{-}Ting Hsu},
  title     = {An ElGamal-like Secure Channel Free Public Key Encryption with Keyword
               Search Scheme},
  journal   = {Int. J. Found. Comput. Sci.},
  volume    = {30},
  number    = {2},
  pages     = {255--273},
  year      = {2019}
}
@article{DBLP:journals/ijnsec/ChiouPCH19,
  author    = {Shu{-}Fen Chiou and
               Hsieh{-}Tsen Pan and
               Eko Fajar Cahyadi and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of the Mutual Authentication and Key Agreement Protocol
               with Smart Cards for Wireless Communications},
  journal   = {Int. J. Netw. Secur.},
  volume    = {21},
  number    = {1},
  pages     = {100--104},
  year      = {2019}
}
@article{DBLP:journals/ijnsec/LinYH19,
  author    = {Tzu{-}Chun Lin and
               Ting{-}Yi Yeh and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an ID-based Deniable Threshold Ring Authentication},
  journal   = {Int. J. Netw. Secur.},
  volume    = {21},
  number    = {2},
  pages     = {298--302},
  year      = {2019}
}
@article{DBLP:journals/ijnsec/PanCCH19,
  author    = {Hsieh{-}Tsen Pan and
               Eko Fajar Cahyadi and
               Shu{-}Fen Chiou and
               Min{-}Shiang Hwang},
  title     = {Research on Batch Verification Schemes for Identifying Illegal Signatures},
  journal   = {Int. J. Netw. Secur.},
  volume    = {21},
  number    = {6},
  pages     = {1062--1070},
  year      = {2019}
}
@article{DBLP:journals/tjs/FengSH19,
  author    = {Tung{-}Huang Feng and
               Neng{-}Yih Shih and
               Min{-}Shiang Hwang},
  title     = {Safety relay selection algorithms based on fuzzy relationship for
               wireless sensor networks},
  journal   = {J. Supercomput.},
  volume    = {75},
  number    = {8},
  pages     = {4601--4616},
  year      = {2019}
}
@article{DBLP:journals/ijnsec/WangSH18,
  author    = {Yu{-}Lun Wang and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {A Survey of Reversible Data Hiding for VQ-Compressed Images},
  journal   = {Int. J. Netw. Secur.},
  volume    = {20},
  number    = {1},
  pages     = {1--8},
  year      = {2018}
}
@article{DBLP:journals/ijnsec/TsaiHH18,
  author    = {Cheng{-}Yi Tsai and
               Pi{-}Fang Ho and
               Min{-}Shiang Hwang},
  title     = {A Secure Group Signature Scheme},
  journal   = {Int. J. Netw. Secur.},
  volume    = {20},
  number    = {2},
  pages     = {201--205},
  year      = {2018}
}
@article{DBLP:journals/ijnsec/WangSH18a,
  author    = {Yu{-}Lun Wang and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {A Novel Dual Image-based High Payload Reversible Hiding Technique
               Using {LSB} Matching},
  journal   = {Int. J. Netw. Secur.},
  volume    = {20},
  number    = {4},
  pages     = {801--804},
  year      = {2018}
}
@article{DBLP:journals/ijnsec/TsaiYLH18,
  author    = {Cheng{-}Yi Tsai and
               Cheng{-}Ying Yang and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {A Survey of E-book Digital Right Management},
  journal   = {Int. J. Netw. Secur.},
  volume    = {20},
  number    = {5},
  pages     = {998--1004},
  year      = {2018}
}
@article{DBLP:journals/ijnsec/HuangCH18,
  author    = {Li{-}Chin Huang and
               Ting{-}Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A Conference Key Scheme Based on the Diffie-Hellman Key Exchange},
  journal   = {Int. J. Netw. Secur.},
  volume    = {20},
  number    = {6},
  pages     = {1221--1226},
  year      = {2018}
}
@inproceedings{DBLP:conf/cis/HwangCCY18,
  author    = {Min{-}Shiang Hwang and
               Eko Fajar Cahyadi and
               Yuen{-}Cheng Chou and
               Cheng{-}Ying Yang},
  title     = {Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart
               Card},
  booktitle = {{CIS}},
  pages     = {416--420},
  publisher = {{IEEE} Computer Society},
  year      = {2018}
}
@inproceedings{DBLP:conf/icisa/LiangYH18,
  author    = {Hsin{-}Ying Liang and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {Secrecy Analysis in the {AF} Mode Cooperative Communication System},
  booktitle = {{ICISA}},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {514},
  pages     = {285--293},
  publisher = {Springer},
  year      = {2018}
}
@inproceedings{DBLP:conf/icisa/HwangYY18,
  author    = {Min{-}Shiang Hwang and
               Hung{-}Wei Yang and
               Cheng{-}Ying Yang},
  title     = {An Improved Hou-Wang's User Authentication Scheme},
  booktitle = {{ICISA}},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {514},
  pages     = {295--301},
  publisher = {Springer},
  year      = {2018}
}
@article{DBLP:journals/displays/WuH17,
  author    = {Nan{-}I Wu and
               Min{-}Shiang Hwang},
  title     = {Development of a data hiding scheme based on combination theory for
               lowering the visual noise in binary images},
  journal   = {Displays},
  volume    = {49},
  pages     = {116--123},
  year      = {2017}
}
@article{DBLP:journals/ijmc/WeiHC17,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               Augustin Yeh{-}Hao Chin},
  title     = {A secure privacy and authentication protocol for passive {RFID} tags},
  journal   = {Int. J. Mob. Commun.},
  volume    = {15},
  number    = {3},
  pages     = {266--277},
  year      = {2017}
}
@article{DBLP:journals/ijnsec/ChenYH17a,
  author    = {Shih{-}Ming Chen and
               Ching{-}Rong Yang and
               Min{-}Shiang Hwang},
  title     = {Using a New Structure in Group Key Management for Pay-TV},
  journal   = {Int. J. Netw. Secur.},
  volume    = {19},
  number    = {1},
  pages     = {112--117},
  year      = {2017}
}
@article{DBLP:journals/ijnsec/LingLYH17,
  author    = {Chung{-}Huei Ling and
               Cheng{-}Chi Lee and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Secure and Efficient One-time Password Authentication Scheme for
               {WSN}},
  journal   = {Int. J. Netw. Secur.},
  volume    = {19},
  number    = {2},
  pages     = {177--181},
  year      = {2017}
}
@article{DBLP:journals/ijnsec/TsaiLTH17,
  author    = {Cheng{-}Yi Tsai and
               Chi{-}Yu Liu and
               Shyh{-}Chang Tsaur and
               Min{-}Shiang Hwang},
  title     = {A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring
               and Discrete Logarithms},
  journal   = {Int. J. Netw. Secur.},
  volume    = {19},
  number    = {3},
  pages     = {443--448},
  year      = {2017}
}
@article{DBLP:journals/ijnsec/ChaoTH17,
  author    = {Wan{-}Yu Chao and
               Cheng{-}Yi Tsai and
               Min{-}Shiang Hwang},
  title     = {An Improved Key-Management Scheme for Hierarchical Access Control},
  journal   = {Int. J. Netw. Secur.},
  volume    = {19},
  number    = {4},
  pages     = {639--643},
  year      = {2017}
}
@article{DBLP:journals/ijnsec/WangSH17,
  author    = {Yu{-}Lun Wang and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {An Improved Dual Image-based Reversible Hiding Technique Using {LSB}
               Matching},
  journal   = {Int. J. Netw. Secur.},
  volume    = {19},
  number    = {5},
  pages     = {858--862},
  year      = {2017}
}
@article{DBLP:journals/ijnsec/ChenYH17,
  author    = {Jong{-}Shin Chen and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {The Capacity Analysis in the Secure Cooperative Communication System},
  journal   = {Int. J. Netw. Secur.},
  volume    = {19},
  number    = {6},
  pages     = {863--869},
  year      = {2017}
}
@article{DBLP:journals/jcsc/HwangSL17,
  author    = {Min{-}Shiang Hwang and
               Tsuei{-}Hung Sun and
               Cheng{-}Chi Lee},
  title     = {Achieving Dynamic Data Guarantee and Data Confidentiality of Public
               Auditing in Cloud Storage Service},
  journal   = {J. Circuits Syst. Comput.},
  volume    = {26},
  number    = {5},
  pages     = {1750072:1--1750072:16},
  year      = {2017}
}
@article{DBLP:journals/symmetry/ChangHY17,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Chou Chen Yang},
  title     = {Password Authenticated Key Exchange and Protected Password Change
               Protocols},
  journal   = {Symmetry},
  volume    = {9},
  number    = {8},
  pages     = {134},
  year      = {2017}
}
@inproceedings{DBLP:conf/icisa/YangCHLY17,
  author    = {Cheng{-}Ying Yang and
               Tsai{-}Yuan Chung and
               Min{-}Shiang Hwang and
               Cheng{-}Yi Li and
               Jenq{-}Foung JF Yao},
  title     = {Learning Performance Evaluation in eLearning with the Web-Based Assessment},
  booktitle = {{ICISA}},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {424},
  pages     = {645--651},
  publisher = {Springer},
  year      = {2017}
}
@article{DBLP:journals/ijnsec/HsienYH16,
  author    = {Wei{-}Fu Hsien and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Survey of Public Auditing for Secure Data Storage in Cloud Computing},
  journal   = {Int. J. Netw. Secur.},
  volume    = {18},
  number    = {1},
  pages     = {133--142},
  year      = {2016}
}
@article{DBLP:journals/ijnsec/LingHH16,
  author    = {Chung{-}Huei Ling and
               Wei{-}Fu Hsien and
               Min{-}Shiang Hwang},
  title     = {A Double Circular Chain Intrusion Detection for Cloud Computing Based
               on AdjointVM Approach},
  journal   = {Int. J. Netw. Secur.},
  volume    = {18},
  number    = {2},
  pages     = {397--400},
  year      = {2016}
}
@article{DBLP:journals/ijnsec/LingCH16,
  author    = {Chung{-}Huei Ling and
               Shih{-}Ming Chen and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of Tseng-Wu Group Key Exchange Protocol},
  journal   = {Int. J. Netw. Secur.},
  volume    = {18},
  number    = {3},
  pages     = {590--593},
  year      = {2016}
}
@article{DBLP:journals/ijnsec/LiuHYH16,
  author    = {Chi{-}Wei Liu and
               Wei{-}Fu Hsien and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Survey of Public Auditing for Shared Data Storage with User Revocation
               in Cloud Computing},
  journal   = {Int. J. Netw. Secur.},
  volume    = {18},
  number    = {4},
  pages     = {650--666},
  year      = {2016}
}
@article{DBLP:journals/ijnsec/LiuHYH16a,
  author    = {Chi{-}Wei Liu and
               Wei{-}Fu Hsien and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Survey of Attribute-based Access Control with User Revocation in
               Cloud Data Storage},
  journal   = {Int. J. Netw. Secur.},
  volume    = {18},
  number    = {5},
  pages     = {900--916},
  year      = {2016}
}
@article{DBLP:journals/ijnsec/XieWSH16,
  author    = {Ming{-}Ru Xie and
               Chia{-}Chun Wu and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {A Survey of Data Distortion Watermarking Relational Databases},
  journal   = {Int. J. Netw. Secur.},
  volume    = {18},
  number    = {6},
  pages     = {1022--1033},
  year      = {2016}
}
@article{DBLP:journals/informaticaLT/HwangCO16,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Hsia{-}Hung Ou},
  title     = {The Moderately Hard DoS-Resistant Authentication Protocol on Client
               Puzzles},
  journal   = {Informatica},
  volume    = {27},
  number    = {1},
  pages     = {31--48},
  year      = {2016}
}
@article{DBLP:journals/informaticaLT/FengHS16,
  author    = {Tung{-}Huang Feng and
               Min{-}Shiang Hwang and
               Liang{-}Wei Syu},
  title     = {An Authentication Protocol for Lightweight {NFC} Mobile Sensors Payment},
  journal   = {Informatica},
  volume    = {27},
  number    = {4},
  pages     = {723--732},
  year      = {2016}
}
@article{DBLP:journals/jcp/LinCCH16,
  author    = {Iuon{-}Chang Lin and
               Yi{-}Lun Chi and
               Hung{-}Chieh Chuang and
               Min{-}Shiang Hwang},
  title     = {The Novel Features for Phishing Based on User Device Detection},
  journal   = {J. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {109--115},
  year      = {2016}
}
@inproceedings{DBLP:conf/cis/PanPTH16,
  author    = {Hsieh{-}Tsen Pan and
               Chiu{-}Shu Pan and
               Shyh{-}Chang Tsaur and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of Efficient Dynamic {ID} Based Remote User Authentication
               Scheme in Multi-Server Environment Using Smart Card},
  booktitle = {{CIS}},
  pages     = {590--593},
  publisher = {{IEEE} Computer Society},
  year      = {2016}
}
@inproceedings{DBLP:conf/icsai/PanTTH16,
  author    = {Chiu{-}Shu Pan and
               Cheng{-}Yi Tsai and
               Shyh{-}Chang Tsaur and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an efficient password authentication scheme},
  booktitle = {{ICSAI}},
  pages     = {743--748},
  publisher = {{IEEE}},
  year      = {2016}
}
@article{DBLP:journals/ijnsec/WijayantoH15,
  author    = {Heri Wijayanto and
               Min{-}Shiang Hwang},
  title     = {Improvement on Timestamp-based User Authentication Scheme with Smart
               Card Lost Attack Resistance},
  journal   = {Int. J. Netw. Secur.},
  volume    = {17},
  number    = {2},
  pages     = {160--164},
  year      = {2015}
}
@article{DBLP:journals/ijnsec/ChiCLH15,
  author    = {Yi{-}Lun Chi and
               Cheng Hao Chen and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {The Secure Transaction Protocol in {NFC} Card Emulation Mode},
  journal   = {Int. J. Netw. Secur.},
  volume    = {17},
  number    = {4},
  pages     = {431--438},
  year      = {2015}
}
@article{DBLP:journals/ijnsec/RenWZH15,
  author    = {Yanli Ren and
               Shuozhong Wang and
               Xinpeng Zhang and
               Min{-}Shiang Hwang},
  title     = {An Efficient Batch Verifying Scheme for Detecting Illegal Signatures},
  journal   = {Int. J. Netw. Secur.},
  volume    = {17},
  number    = {4},
  pages     = {463--470},
  year      = {2015}
}
@article{DBLP:journals/ijnsec/SunSH15,
  author    = {Jia{-}Rong Sun and
               Mao{-}Lin Shih and
               Min{-}Shiang Hwang},
  title     = {A Survey of Digital Evidences Forensic and Cybercrime Investigation
               Procedure},
  journal   = {Int. J. Netw. Secur.},
  volume    = {17},
  number    = {5},
  pages     = {497--509},
  year      = {2015}
}
@article{DBLP:journals/ijnsec/FengSH15,
  author    = {Tung{-}Huang Feng and
               Neng{-}Yih Shih and
               Min{-}Shiang Hwang},
  title     = {A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor
               Networks},
  journal   = {Int. J. Netw. Secur.},
  volume    = {17},
  number    = {6},
  pages     = {712--721},
  year      = {2015}
}
@article{DBLP:journals/ase/HwangLS14,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Tsuei{-}Hung Sun},
  title     = {Data error locations reported by public auditing in cloud storage
               service},
  journal   = {Autom. Softw. Eng.},
  volume    = {21},
  number    = {3},
  pages     = {373--390},
  year      = {2014}
}
@article{DBLP:journals/ijnsec/ChungLH14,
  author    = {Pei{-}Shan Chung and
               Chi{-}Wei Liu and
               Min{-}Shiang Hwang},
  title     = {A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments},
  journal   = {Int. J. Netw. Secur.},
  volume    = {16},
  number    = {1},
  pages     = {1--13},
  year      = {2014}
}
@article{DBLP:journals/ijnsec/FengLH14,
  author    = {Tung{-}Huang Feng and
               Chung{-}Huei Ling and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of Tan's Improvement on a Password Authentication Scheme
               for Multi-server Environments},
  journal   = {Int. J. Netw. Secur.},
  volume    = {16},
  number    = {4},
  pages     = {318--321},
  year      = {2014}
}
@article{DBLP:journals/ijnsec/LiFH14,
  author    = {Wei Teng Li and
               Tung{-}Huang Feng and
               Min{-}Shiang Hwang},
  title     = {Distributed Detecting Node Replication Attacks in Wireless Sensor
               Networks: {A} Survey},
  journal   = {Int. J. Netw. Secur.},
  volume    = {16},
  number    = {5},
  pages     = {323--330},
  year      = {2014}
}
@article{DBLP:journals/ijnsec/LiLH14,
  author    = {Wei Teng Li and
               Chung{-}Huei Ling and
               Min{-}Shiang Hwang},
  title     = {Group Rekeying in Wireless Sensor Networks: {A} Survey},
  journal   = {Int. J. Netw. Secur.},
  volume    = {16},
  number    = {6},
  pages     = {400--410},
  year      = {2014}
}
@article{DBLP:journals/itc/HwangHL14,
  author    = {Min{-}Shiang Hwang and
               Shih{-}Ting Hsu and
               Cheng{-}Chi Lee},
  title     = {A New Public Key Encryption with Conjunctive Field Keyword Search
               Scheme},
  journal   = {Inf. Technol. Control.},
  volume    = {43},
  number    = {3},
  pages     = {277--288},
  year      = {2014}
}
@inproceedings{DBLP:conf/intcompsymp/SunH14,
  author    = {Jia{-}Rong Sun and
               Min{-}Shiang Hwang},
  title     = {A New Investigation Approach for Tracing Source {IP} in DDoS attack
               from Proxy Server},
  booktitle = {{ICS}},
  series    = {Frontiers in Artificial Intelligence and Applications},
  volume    = {274},
  pages     = {850--857},
  publisher = {{IOS} Press},
  year      = {2014}
}
@article{DBLP:journals/iajit/HuangLH13,
  author    = {Li{-}Chin Huang and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A n2+n {MQV} key agreement protocol},
  journal   = {Int. Arab J. Inf. Technol.},
  volume    = {10},
  number    = {2},
  pages     = {137--142},
  year      = {2013}
}
@article{DBLP:journals/ijnsec/LeeLH13,
  author    = {Cheng{-}Chi Lee and
               Chia{-}Hsin Liu and
               Min{-}Shiang Hwang},
  title     = {Guessing Attacks on Strong-Password Authentication Protocol},
  journal   = {Int. J. Netw. Secur.},
  volume    = {15},
  number    = {1},
  pages     = {64--67},
  year      = {2013}
}
@article{DBLP:journals/ijnsec/HsuYH13,
  author    = {Shih{-}Ting Hsu and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A Study of Public Key Encryption with Keyword Search},
  journal   = {Int. J. Netw. Secur.},
  volume    = {15},
  number    = {2},
  pages     = {71--79},
  year      = {2013}
}
@article{DBLP:journals/ijnsec/LeeCH13,
  author    = {Cheng{-}Chi Lee and
               Pei{-}Shan Chung and
               Min{-}Shiang Hwang},
  title     = {A Survey on Attribute-based Encryption Schemes of Access Control in
               Cloud Environments},
  journal   = {Int. J. Netw. Secur.},
  volume    = {15},
  number    = {4},
  pages     = {231--240},
  year      = {2013}
}
@article{DBLP:journals/ijnsec/LeeHH13,
  author    = {Cheng{-}Chi Lee and
               Shih{-}Ting Hsu and
               Min{-}Shiang Hwang},
  title     = {A Study of Conjunctive Keyword Searchable Schemes},
  journal   = {Int. J. Netw. Secur.},
  volume    = {15},
  number    = {5},
  pages     = {321--330},
  year      = {2013}
}
@article{DBLP:journals/ijnsec/ChenYH13,
  author    = {Min{-}Yu Chen and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {Privacy Protection Data Access Control},
  journal   = {Int. J. Netw. Secur.},
  volume    = {15},
  number    = {6},
  pages     = {411--419},
  year      = {2013}
}
@article{DBLP:journals/isci/HwangLT13,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Shiang{-}Feng Tzeng},
  title     = {A new proxy signature scheme for a specified group of verifiers},
  journal   = {Inf. Sci.},
  volume    = {227},
  pages     = {102--115},
  year      = {2013}
}
@article{DBLP:journals/itc/YangCH13,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A New Group Signature Scheme Based on {RSA} Assumption},
  journal   = {Inf. Technol. Control.},
  volume    = {42},
  number    = {1},
  pages     = {61--66},
  year      = {2013}
}
@article{DBLP:journals/itiis/HuangHT13,
  author    = {Li{-}Chin Huang and
               Min{-}Shiang Hwang and
               Lin{-}Yu Tseng},
  title     = {Reversible and High-Capacity Data Hiding in High Quality Medical Images},
  journal   = {{KSII} Trans. Internet Inf. Syst.},
  volume    = {7},
  number    = {1},
  pages     = {132--148},
  year      = {2013}
}
@article{DBLP:journals/jss/HuangTH13,
  author    = {Li{-}Chin Huang and
               Lin{-}Yu Tseng and
               Min{-}Shiang Hwang},
  title     = {A reversible data hiding method by histogram shifting in high quality
               medical images},
  journal   = {J. Syst. Softw.},
  volume    = {86},
  number    = {3},
  pages     = {716--727},
  year      = {2013}
}
@article{DBLP:journals/ppl/ChongLH13,
  author    = {Song{-}Kong Chong and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {An Authentication Scheme for the Global Mobility Network},
  journal   = {Parallel Process. Lett.},
  volume    = {23},
  number    = {3},
  year      = {2013}
}
@article{DBLP:journals/tjs/ChenLHJ13,
  author    = {Te{-}Yu Chen and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Jinn{-}Ke Jan},
  title     = {Towards secure and efficient user authentication scheme using smart
               card for multi-server environments},
  journal   = {J. Supercomput.},
  volume    = {66},
  number    = {2},
  pages     = {1008--1032},
  year      = {2013}
}
@article{DBLP:journals/wpc/OuH13,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang},
  title     = {Double Delegation-Based Authentication and Key Agreement Protocol
               for PCSs},
  journal   = {Wirel. Pers. Commun.},
  volume    = {72},
  number    = {1},
  pages     = {437--446},
  year      = {2013}
}
@inproceedings{DBLP:conf/cac/ChenLH13,
  author    = {Min{-}Yu Chen and
               Chi{-}Wei Liu and
               Min{-}Shiang Hwang},
  title     = {SecureDropbox: a file encryption system suitable for cloud storage
               services},
  booktitle = {{CAC}},
  pages     = {21:1--21:2},
  publisher = {{ACM}},
  year      = {2013}
}
@inproceedings{DBLP:conf/cisis/YangLH13,
  author    = {Cheng{-}Ying Yang and
               Yi{-}Shan Lin and
               Min{-}Shiang Hwang},
  title     = {Downlink Relay Selection Algorithm for Amplify-and-Forward Cooperative
               Communication Systems},
  booktitle = {{CISIS}},
  pages     = {331--334},
  publisher = {{IEEE} Computer Society},
  year      = {2013}
}
@article{DBLP:journals/ijmc/LiYH12,
  author    = {Chun{-}Ta Li and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A secure routing protocol with node selfishness resistance in MANETs},
  journal   = {Int. J. Mob. Commun.},
  volume    = {10},
  number    = {1},
  pages     = {103--118},
  year      = {2012}
}
@article{DBLP:journals/ijmc/OuLH12,
  author    = {Hsia{-}Hung Ou and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {An effective {AKA} protocol for {UMTS}},
  journal   = {Int. J. Mob. Commun.},
  volume    = {10},
  number    = {4},
  pages     = {427--448},
  year      = {2012}
}
@article{DBLP:journals/ijmc/WeiHC12,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               Augustin Yeh{-}Hao Chin},
  title     = {An improved authentication protocol for mobile agent device in {RFID}
               environment},
  journal   = {Int. J. Mob. Commun.},
  volume    = {10},
  number    = {5},
  pages     = {508--520},
  year      = {2012}
}
@article{DBLP:journals/ijnsec/HuangTH12,
  author    = {Li{-}Chin Huang and
               Lin{-}Yu Tseng and
               Min{-}Shiang Hwang},
  title     = {The Study of Data Hiding in Medical Images},
  journal   = {Int. J. Netw. Secur.},
  volume    = {14},
  number    = {6},
  pages     = {301--309},
  year      = {2012}
}
@article{DBLP:journals/informaticaLT/ChangHY12,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption
               Scheme for Encrypting Large Messages},
  journal   = {Informatica},
  volume    = {23},
  number    = {4},
  pages     = {537--562},
  year      = {2012}
}
@article{DBLP:journals/ett/HwangCO11,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Hsia{-}Hung Ou},
  title     = {On the security of an enhanced {UMTS} authentication and key agreement
               protocol},
  journal   = {Eur. Trans. Telecommun.},
  volume    = {22},
  number    = {3},
  pages     = {99--112},
  year      = {2011}
}
@article{DBLP:journals/ijisp/LeeHL11,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {On the Security of Self-Certified Public Keys},
  journal   = {Int. J. Inf. Secur. Priv.},
  volume    = {5},
  number    = {2},
  pages     = {54--60},
  year      = {2011}
}
@article{DBLP:journals/ijmc/ChangH11,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {User-anonymous and short-term Conference Key Distribution System via
               link-layer routing in mobile communications},
  journal   = {Int. J. Mob. Commun.},
  volume    = {9},
  number    = {2},
  pages     = {144--158},
  year      = {2011}
}
@article{DBLP:journals/ijmc/WeiHC11,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               Augustin Yeh{-}Hao Chin},
  title     = {An authentication protocol for low-cost {RFID} tags},
  journal   = {Int. J. Mob. Commun.},
  volume    = {9},
  number    = {2},
  pages     = {208--223},
  year      = {2011}
}
@article{DBLP:journals/isci/ChangHY11,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A communication-efficient three-party password authenticated key exchange
               protocol},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {1},
  pages     = {217--226},
  year      = {2011}
}
@article{DBLP:journals/isci/LoHL11,
  author    = {Jung{-}Wen Lo and
               Min{-}Shiang Hwang and
               Chia{-}Hsin Liu},
  title     = {An efficient key assignment scheme for access control in a large leaf
               class hierarchy},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {4},
  pages     = {917--925},
  year      = {2011}
}
@article{DBLP:journals/isci/LiH11,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang},
  title     = {A lightweight anonymous routing protocol without public key en/decryptions
               for wireless ad hoc networks},
  journal   = {Inf. Sci.},
  volume    = {181},
  number    = {23},
  pages     = {5333--5347},
  year      = {2011}
}
@article{DBLP:journals/itc/ChangHY11,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {An Improved Multi-stage Secret Sharing Scheme Based on the Factorization
               Problem},
  journal   = {Inf. Technol. Control.},
  volume    = {40},
  number    = {3},
  pages     = {246--251},
  year      = {2011}
}
@article{DBLP:journals/itpro/WeiHC11,
  author    = {Chia{-}Hui Wei and
               Min{-}Shiang Hwang and
               A. Y. Chin},
  title     = {A Mutual Authentication Protocol for {RFID}},
  journal   = {{IT} Prof.},
  volume    = {13},
  number    = {2},
  pages     = {20--24},
  year      = {2011}
}
@article{DBLP:journals/jss/WuKH11,
  author    = {Chia{-}Chun Wu and
               Shang{-}Juh Kao and
               Min{-}Shiang Hwang},
  title     = {A high quality image sharing with steganography and adaptive authentication
               scheme},
  journal   = {J. Syst. Softw.},
  volume    = {84},
  number    = {12},
  pages     = {2196--2207},
  year      = {2011}
}
@article{DBLP:journals/ppl/TzengLH11,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A Batch Verification for Multiple Proxy Signature},
  journal   = {Parallel Process. Lett.},
  volume    = {21},
  number    = {1},
  pages     = {77--84},
  year      = {2011}
}
@article{DBLP:journals/telsys/LeeLH11,
  author    = {Cheng{-}Chi Lee and
               I{-}En Liao and
               Min{-}Shiang Hwang},
  title     = {An efficient authentication protocol for mobile communications},
  journal   = {Telecommun. Syst.},
  volume    = {46},
  number    = {1},
  pages     = {31--41},
  year      = {2011}
}
@article{DBLP:journals/jnca/LiH10,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang},
  title     = {An efficient biometrics-based remote user authentication scheme using
               smart cards},
  journal   = {J. Netw. Comput. Appl.},
  volume    = {33},
  number    = {1},
  pages     = {1--5},
  year      = {2010}
}
@article{DBLP:journals/jss/HwangCC10,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Te{-}Yu Chen},
  title     = {DoS-resistant ID-based password authentication scheme using smart
               cards},
  journal   = {J. Syst. Softw.},
  volume    = {83},
  number    = {1},
  pages     = {163--172},
  year      = {2010}
}
@article{DBLP:journals/jss/OuHJ10,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {A cocktail protocol with the Authentication and Key Agreement on the
               {UMTS}},
  journal   = {J. Syst. Softw.},
  volume    = {83},
  number    = {2},
  pages     = {316--325},
  year      = {2010}
}
@article{DBLP:journals/wpc/OuHJ10,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}Ke Jan},
  title     = {A Provable Billing Protocol on the Current {UMTS}},
  journal   = {Wirel. Pers. Commun.},
  volume    = {55},
  number    = {4},
  pages     = {551--566},
  year      = {2010}
}
@article{DBLP:journals/ejwcn/OuHJ09,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {The {UMTS-AKA} Protocols for Intelligent Transportation Systems},
  journal   = {{EURASIP} J. Wirel. Commun. Netw.},
  volume    = {2009},
  year      = {2009}
}
@article{DBLP:journals/ijfcs/LeeHT09,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng},
  title     = {A New Convertible Authenticated Encryption Scheme Based on the ElGamal
               Cryptosystem},
  journal   = {Int. J. Found. Comput. Sci.},
  volume    = {20},
  number    = {2},
  pages     = {351--359},
  year      = {2009}
}
@article{DBLP:journals/ijnm/OuLHJ09,
  author    = {Hsia{-}Hung Ou and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {{TK-AKA:} using temporary key on Authentication and Key Agreement
               protocol on {UMTS}},
  journal   = {Int. J. Netw. Manag.},
  volume    = {19},
  number    = {4},
  pages     = {291--303},
  year      = {2009}
}
@article{DBLP:journals/imcs/LeeHL09,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Chih{-}Wei Lin},
  title     = {A new English auction scheme using the bulletin board system},
  journal   = {Inf. Manag. Comput. Secur.},
  volume    = {17},
  number    = {5},
  pages     = {408--417},
  year      = {2009}
}
@article{DBLP:journals/isf/LeeHH09,
  author    = {Cheng{-}Chi Lee and
               Pi{-}Fang Ho and
               Min{-}Shiang Hwang},
  title     = {A secure e-auction scheme based on group signatures},
  journal   = {Inf. Syst. Frontiers},
  volume    = {11},
  number    = {3},
  pages     = {335--343},
  year      = {2009}
}
@article{DBLP:journals/sigbed/WuCHL09,
  author    = {Hao{-}Ju Wu and
               Yi{-}Hsin Chang and
               Min{-}Shiang Hwang and
               Iuon{-}Chang Lin},
  title     = {Flexible {RFID} location system based on artificial neural networks
               for medical care facilities},
  journal   = {{SIGBED} Rev.},
  volume    = {6},
  number    = {2},
  pages     = {12},
  year      = {2009}
}
@inproceedings{DBLP:conf/iih-msp/WuKKH09,
  author    = {Chia{-}Chun Wu and
               Shang{-}Juh Kao and
               Wen{-}Chung Kuo and
               Min{-}Shiang Hwang},
  title     = {Reversible Secret Image Sharing Based on Shamir's Scheme},
  booktitle = {{IIH-MSP}},
  pages     = {1014--1017},
  publisher = {{IEEE} Computer Society},
  year      = {2009}
}
@inproceedings{DBLP:conf/itng/LiHL09,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yan{-}Chi Lai},
  title     = {A Verifiable Electronic Voting Scheme over the Internet},
  booktitle = {{ITNG}},
  pages     = {449--454},
  publisher = {{IEEE} Computer Society},
  year      = {2009}
}
@inproceedings{DBLP:conf/itng/LiH09a,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang},
  title     = {Improving the Security of Non-PKI Methods for Public Key Distribution},
  booktitle = {{ITNG}},
  pages     = {1695--1696},
  publisher = {{IEEE} Computer Society},
  year      = {2009}
}
@article{DBLP:journals/comcom/LiHL08,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Chi{-}Yu Liu},
  title     = {An electronic voting protocol with deniable authentication for mobile
               ad hoc networks},
  journal   = {Comput. Commun.},
  volume    = {31},
  number    = {10},
  pages     = {2534--2540},
  year      = {2008}
}
@article{DBLP:journals/comcom/LiHC08,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {A secure and efficient communication scheme with authenticated key
               establishment and privacy preserving for vehicular ad hoc networks},
  journal   = {Comput. Commun.},
  volume    = {31},
  number    = {12},
  pages     = {2803--2814},
  year      = {2008}
}
@article{DBLP:journals/comcom/HwangLC08,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Song{-}Kong Chong},
  title     = {An improved address ownership in mobile IPv6},
  journal   = {Comput. Commun.},
  volume    = {31},
  number    = {14},
  pages     = {3250--3252},
  year      = {2008}
}
@article{DBLP:journals/comcom/LiHC08a,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {Further improvement on a novel privacy preserving authentication and
               access control scheme for pervasive computing environments},
  journal   = {Comput. Commun.},
  volume    = {31},
  number    = {18},
  pages     = {4255--4258},
  year      = {2008}
}
@article{DBLP:journals/csse/LiHC08,
  author    = {Chun{-}Ta Li and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {Improving the security of a secure anonymous routing protocol with
               authenticated key exchange for ad hoc networks},
  journal   = {Comput. Syst. Sci. Eng.},
  volume    = {23},
  number    = {3},
  year      = {2008}
}
@article{DBLP:journals/jss/WangWTH08,
  author    = {Chung{-}Ming Wang and
               Nan{-}I Wu and
               Chwei{-}Shyong Tsai and
               Min{-}Shiang Hwang},
  title     = {A high quality steganographic method with pixel-value differencing
               and modulus function},
  journal   = {J. Syst. Softw.},
  volume    = {81},
  number    = {1},
  pages     = {150--158},
  year      = {2008}
}
@article{DBLP:journals/wicomm/LeeHL08,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {A new authentication protocol based on pointer forwarding for mobile
               communications},
  journal   = {Wirel. Commun. Mob. Comput.},
  volume    = {8},
  number    = {5},
  pages     = {661--672},
  year      = {2008}
}
@inproceedings{DBLP:conf/iih-msp/WuKKH08,
  author    = {Chia{-}Chun Wu and
               Shang{-}Juh Kao and
               Wen{-}Chung Kuo and
               Min{-}Shiang Hwang},
  title     = {Enhance the Image Sharing with Steganography and Authentication},
  booktitle = {{IIH-MSP}},
  pages     = {1177--1181},
  publisher = {{IEEE} Computer Society},
  year      = {2008}
}
@inproceedings{DBLP:conf/isda/LoHC08,
  author    = {Jung{-}Wen Lo and
               Min{-}Shiang Hwang and
               Yen{-}Ping Chu},
  title     = {An Exchangeable E-Cash Scheme by E-Mint},
  booktitle = {{ISDA} {(3)}},
  pages     = {246--251},
  publisher = {{IEEE} Computer Society},
  year      = {2008}
}
@inproceedings{DBLP:conf/isda/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  title     = {An Ordered Multi-proxy Multi-signature Scheme},
  booktitle = {{ISDA} {(3)}},
  pages     = {308--313},
  publisher = {{IEEE} Computer Society},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  title     = {An Improvement of Strong Proxy Signature and Its Applications},
  booktitle = {{SECRYPT}},
  pages     = {95--98},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@article{DBLP:journals/amc/OuHJ07,
  author    = {Hsia{-}Hung Ou and
               Min{-}Shiang Hwang and
               Jinn{-}ke Jan},
  title     = {A simple mobile communication billing system among charged parties},
  journal   = {Appl. Math. Comput.},
  volume    = {192},
  number    = {2},
  pages     = {487--495},
  year      = {2007}
}
@article{DBLP:journals/cee/TzengTH07,
  author    = {Shiang{-}Feng Tzeng and
               Yuan{-}Liang Tang and
               Min{-}Shiang Hwang},
  title     = {A new convertible authenticated encryption scheme with message linkages},
  journal   = {Comput. Electr. Eng.},
  volume    = {33},
  number    = {2},
  pages     = {133--138},
  year      = {2007}
}
@article{DBLP:journals/ijnsec/WuH07,
  author    = {Nan{-}I Wu and
               Min{-}Shiang Hwang},
  title     = {Data Hiding: Current Status and Key Issues},
  journal   = {Int. J. Netw. Secur.},
  volume    = {4},
  number    = {1},
  pages     = {1--9},
  year      = {2007}
}
@inproceedings{DBLP:conf/iccsa/HwangTL07,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Chun{-}Ta Li},
  title     = {A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation
               Period},
  booktitle = {{ICCSA} {(3)}},
  series    = {Lecture Notes in Computer Science},
  volume    = {4707},
  pages     = {273--284},
  publisher = {Springer},
  year      = {2007}
}
@article{DBLP:journals/amc/BaoLH06,
  author    = {Feng Bao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis and improvement on batch verifying multiple {RSA} digital
               signatures},
  journal   = {Appl. Math. Comput.},
  volume    = {172},
  number    = {2},
  pages     = {1195--1200},
  year      = {2006}
}
@article{DBLP:journals/ieicet/HwangLHC06,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Shu{-}Yin Hsiao and
               Yen{-}Ping Chu},
  title     = {Improvement of Authenticated Encryption Schemes with Message Linkages
               for Message Flows},
  journal   = {{IEICE} Trans. Inf. Syst.},
  volume    = {89-D},
  number    = {4},
  pages     = {1575--1577},
  year      = {2006}
}
@article{DBLP:journals/ijnsec/HwangS06,
  author    = {Min{-}Shiang Hwang and
               Pei{-}Chen Sung},
  title     = {A Study of Micro-payment Based on One-way Hash Chain},
  journal   = {Int. J. Netw. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {81--90},
  year      = {2006}
}
@article{DBLP:journals/ijnsec/TsaiLH06,
  author    = {Chwei{-}Shyong Tsai and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {Password Authentication Schemes: Current Status and Key Issues},
  journal   = {Int. J. Netw. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {101--115},
  year      = {2006}
}
@article{DBLP:journals/jcss/LiaoLH06,
  author    = {I{-}En Liao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {A password authentication scheme over insecure networks},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {72},
  number    = {4},
  pages     = {727--740},
  year      = {2006}
}
@article{DBLP:journals/tie/LeeHL06,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {Security Enhancement on a New Authentication Scheme With Anonymity
               for Wireless Environments},
  journal   = {{IEEE} Trans. Ind. Electron.},
  volume    = {53},
  number    = {5},
  pages     = {1683--1687},
  year      = {2006}
}
@inproceedings{DBLP:conf/imsa/LiaoLH06,
  author    = {I{-}En Liao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {Identity-based deniable authentication protocol from pairings},
  booktitle = {{IMSA}},
  pages     = {112--114},
  publisher = {{IASTED/ACTA} Press},
  year      = {2006}
}
@article{DBLP:journals/amc/LiTH05,
  author    = {Li{-}Hua Li and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Improvement of signature scheme based on factoring and discrete logarithms},
  journal   = {Appl. Math. Comput.},
  volume    = {161},
  number    = {1},
  pages     = {49--54},
  year      = {2005}
}
@article{DBLP:journals/amc/LuHH05,
  author    = {Eric Jui{-}Lin Lu and
               Min{-}Shiang Hwang and
               Cheng{-}Jian Huang},
  title     = {A new proxy signature scheme with revocation},
  journal   = {Appl. Math. Comput.},
  volume    = {161},
  number    = {3},
  pages     = {799--806},
  year      = {2005}
}
@article{DBLP:journals/amc/ChangHY05,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret
               sharing scheme},
  journal   = {Appl. Math. Comput.},
  volume    = {163},
  number    = {1},
  pages     = {169--178},
  year      = {2005}
}
@article{DBLP:journals/amc/LeeHY05,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A new blind signature based on the discrete logarithm problem for
               untraceability},
  journal   = {Appl. Math. Comput.},
  volume    = {164},
  number    = {3},
  pages     = {837--841},
  year      = {2005}
}
@article{DBLP:journals/amc/TsaiLH05,
  author    = {Chwei{-}Shyong Tsai and
               Shu{-}Chen Lin and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an authenticated encryption scheme using self-certified
               public keys},
  journal   = {Appl. Math. Comput.},
  volume    = {166},
  number    = {1},
  pages     = {118--122},
  year      = {2005}
}
@article{DBLP:journals/amc/HwangHC05,
  author    = {Min{-}Shiang Hwang and
               Kuo{-}Feng Hwang and
               Chin{-}Chen Chang},
  title     = {A time-stamping protocol for digital watermarking},
  journal   = {Appl. Math. Comput.},
  volume    = {169},
  number    = {2},
  pages     = {1276--1284},
  year      = {2005}
}
@article{DBLP:journals/compsec/HwangLL05,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Chia{-}Hsin Liu},
  title     = {Improvement on the flexible tree-based key management framework},
  journal   = {Comput. Secur.},
  volume    = {24},
  number    = {6},
  pages     = {500--504},
  year      = {2005}
}
@article{DBLP:journals/csi/TzengHC05,
  author    = {Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang and
               Hsing{-}Bai Chen},
  title     = {A secure on-line software transaction scheme},
  journal   = {Comput. Stand. Interfaces},
  volume    = {27},
  number    = {3},
  pages     = {303--312},
  year      = {2005}
}
@article{DBLP:journals/dcc/LinHC05,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Chin{-}Chen Chang},
  title     = {The General Pay-Word: {A} Micro-payment Scheme Based on \emph{n}-dimension
               One-way Hash Chain},
  journal   = {Des. Codes Cryptogr.},
  volume    = {36},
  number    = {1},
  pages     = {53--67},
  year      = {2005}
}
@article{DBLP:journals/fuin/WuHL05,
  author    = {Hsien{-}Chu Wu and
               Min{-}Shiang Hwang and
               Chia{-}Hsin Liu},
  title     = {A Secure Strong-Password Authentication Protocol},
  journal   = {Fundam. Informaticae},
  volume    = {68},
  number    = {4},
  pages     = {399--406},
  year      = {2005}
}
@article{DBLP:journals/ijcat/LeeCH05,
  author    = {Cheng{-}Chi Lee and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A simple broadcasting cryptosystem in computer networks using eXclusive-OR},
  journal   = {Int. J. Comput. Appl. Technol.},
  volume    = {24},
  number    = {3},
  pages     = {180--183},
  year      = {2005}
}
@article{DBLP:journals/ijnsec/HwangL05,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee},
  title     = {Research Issues and Challenges for Multiple Digital Signatures},
  journal   = {Int. J. Netw. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {1--7},
  year      = {2005}
}
@article{DBLP:journals/ijnsec/HwangL05a,
  author    = {Min{-}Shiang Hwang and
               Chi{-}Yu Liu},
  title     = {Authenticated Encryption Schemes: Current Status and Key Issues},
  journal   = {Int. J. Netw. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {61--73},
  year      = {2005}
}
@article{DBLP:journals/ijnsec/HwangC05,
  author    = {Min{-}Shiang Hwang and
               Ting Yi Chang},
  title     = {Threshold Signatures: Current Status and Key Issues},
  journal   = {Int. J. Netw. Secur.},
  volume    = {1},
  number    = {3},
  pages     = {123--137},
  year      = {2005}
}
@article{DBLP:journals/nca/LinOH05,
  author    = {Iuon{-}Chang Lin and
               Hsia{-}Hung Ou and
               Min{-}Shiang Hwang},
  title     = {A user authentication system using back-propagation network},
  journal   = {Neural Comput. Appl.},
  volume    = {14},
  number    = {3},
  pages     = {243--249},
  year      = {2005}
}
@article{DBLP:journals/sigops/ChangHY05,
  author    = {Ting Yi Chang and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A new multi-stage secret sharing scheme using one-way function},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {39},
  number    = {1},
  pages     = {48--55},
  year      = {2005}
}
@article{DBLP:journals/telsys/HwangLLY05,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Ji{-}Zhe Lee and
               Chao{-}Chen Yang},
  title     = {A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography},
  journal   = {Telecommun. Syst.},
  volume    = {29},
  number    = {3},
  pages     = {165--180},
  year      = {2005}
}
@article{DBLP:journals/amc/YangCH04,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A (t, n) multi-secret sharing scheme},
  journal   = {Appl. Math. Comput.},
  volume    = {151},
  number    = {2},
  pages     = {483--490},
  year      = {2004}
}
@article{DBLP:journals/compsec/TzengHY04,
  author    = {Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang and
               Cheng{-}Ying Yang},
  title     = {An improvement of nonrepudiable threshold proxy signature scheme with
               known signers},
  journal   = {Comput. Secur.},
  volume    = {23},
  number    = {2},
  pages     = {174--178},
  year      = {2004}
}
@article{DBLP:journals/csi/TzengH04,
  author    = {Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Digital signature with message recovery and its variants based on
               elliptic curve discrete logarithm problem},
  journal   = {Comput. Stand. Interfaces},
  volume    = {26},
  number    = {2},
  pages     = {61--71},
  year      = {2004}
}
@article{DBLP:journals/csi/HwangTT04,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Chwei{-}Shyong Tsai},
  title     = {Generalization of proxy signature based on elliptic curves},
  journal   = {Comput. Stand. Interfaces},
  volume    = {26},
  number    = {2},
  pages     = {73--84},
  year      = {2004}
}
@article{DBLP:journals/csi/LinOH04,
  author    = {Iuon{-}Chang Lin and
               Hsia{-}Hung Ou and
               Min{-}Shiang Hwang},
  title     = {Efficient access control and key management schemes for mobile agents},
  journal   = {Comput. Stand. Interfaces},
  volume    = {26},
  number    = {5},
  pages     = {423--433},
  year      = {2004}
}
@article{DBLP:journals/csi/HwangLL04,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Shu{-}Chen Lin},
  title     = {An efficient user identification scheme based on ID-based cryptosystem},
  journal   = {Comput. Stand. Interfaces},
  volume    = {26},
  number    = {6},
  pages     = {565--569},
  year      = {2004}
}
@article{DBLP:journals/ett/YangLH04,
  author    = {Chou Chen Yang and
               Jian Wei Li and
               Min{-}Shiang Hwang},
  title     = {A new mutual authentication and key exchange protocol with balanced
               computational power for wireless settings},
  journal   = {Eur. Trans. Telecommun.},
  volume    = {15},
  number    = {2},
  pages     = {91--99},
  year      = {2004}
}
@article{DBLP:journals/fgcs/TzengYH04,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {A nonrepudiable threshold multi-proxy multi-signature scheme with
               shared verification},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {20},
  number    = {5},
  pages     = {887--893},
  year      = {2004}
}
@article{DBLP:journals/fgcs/ChangYH04,
  author    = {Ting Yi Chang and
               Chou Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A threshold signature scheme for group communications without a shared
               distribution center},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {20},
  number    = {6},
  pages     = {1013--1021},
  year      = {2004}
}
@article{DBLP:journals/fuin/HwangLL04,
  author    = {Min{-}Shiang Hwang and
               Jung{-}Wen Lo and
               Chia{-}Hsin Liu},
  title     = {Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service
               Attack},
  journal   = {Fundam. Informaticae},
  volume    = {61},
  number    = {3-4},
  pages     = {389--398},
  year      = {2004}
}
@article{DBLP:journals/ieicet/ShenLH04,
  author    = {Jau{-}Ji Shen and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {A Secure {LITESET} Scheme},
  journal   = {{IEICE} Trans. Inf. Syst.},
  volume    = {87-D},
  number    = {11},
  pages     = {2509--2512},
  year      = {2004}
}
@article{DBLP:journals/ijcm/TzengYH04,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Ying Yang and
               Min{-}Shiang Hwang},
  title     = {A new digital signature scheme based on factoring and discrete logarithms},
  journal   = {Int. J. Comput. Math.},
  volume    = {81},
  number    = {1},
  pages     = {9--14},
  year      = {2004}
}
@article{DBLP:journals/jss/YangTH04,
  author    = {Cheng{-}Ying Yang and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {On the efficiency of nonrepudiable threshold proxy signature scheme
               with known signers},
  journal   = {J. Syst. Softw.},
  volume    = {73},
  number    = {3},
  pages     = {507--514},
  year      = {2004}
}
@article{DBLP:journals/sigops/LeeHL04,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               I{-}En Liao},
  title     = {A server assisted authentication protocol for detecting error vectors},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {38},
  number    = {2},
  pages     = {93--96},
  year      = {2004}
}
@article{DBLP:journals/sigops/HwangLL04,
  author    = {Min{-}Shiang Hwang and
               Li{-}Hua Li and
               Cheng{-}Chi Lee},
  title     = {A key authentication scheme with non-repudiation},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {38},
  number    = {3},
  pages     = {75--78},
  year      = {2004}
}
@article{DBLP:journals/sigops/LiLH04,
  author    = {Li{-}Hua Li and
               Chi{-}Yu Liu and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an efficient secure group signature scheme},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {38},
  number    = {4},
  pages     = {66--69},
  year      = {2004}
}
@article{DBLP:journals/wpc/ChangCH04,
  author    = {Chin{-}Chen Chang and
               Kuo{-}Lun Chen and
               Min{-}Shiang Hwang},
  title     = {End-to-End Security Protocol for Mobile Communications with End-User
               Identification/Authentication},
  journal   = {Wirel. Pers. Commun.},
  volume    = {28},
  number    = {2},
  pages     = {95--106},
  year      = {2004}
}
@inproceedings{DBLP:conf/aina/HwangCLT04,
  author    = {Min{-}Shiang Hwang and
               Ting Yi Chang and
               Shu{-}Chen Lin and
               Chwei{-}Shyong Tsai},
  title     = {On the Security of an Enhanced Authentication Key Exchange Protocol},
  booktitle = {{AINA} {(2)}},
  pages     = {160--163},
  publisher = {{IEEE} Computer Society},
  year      = {2004}
}
@article{DBLP:journals/amc/LeeHL03,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Li{-}Hua Li},
  title     = {A new key authentication scheme based on discrete logarithms},
  journal   = {Appl. Math. Comput.},
  volume    = {139},
  number    = {2-3},
  pages     = {343--349},
  year      = {2003}
}
@article{DBLP:journals/amc/HwangLL03,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yan{-}Chi Lai},
  title     = {Traceability on RSA-based partially signature with low computation},
  journal   = {Appl. Math. Comput.},
  volume    = {145},
  number    = {2-3},
  pages     = {465--468},
  year      = {2003}
}
@article{DBLP:journals/compsec/LiTH03,
  author    = {Li{-}Hua Li and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Generalization of proxy signature-based on discrete logarithms},
  journal   = {Comput. Secur.},
  volume    = {22},
  number    = {3},
  pages     = {245--255},
  year      = {2003}
}
@article{DBLP:journals/compsec/ShenLH03,
  author    = {Jau{-}Ji Shen and
               Chih{-}Wei Lin and
               Min{-}Shiang Hwang},
  title     = {Security enhancement for the timestamp-based password authentication
               scheme using smart cards},
  journal   = {Comput. Secur.},
  volume    = {22},
  number    = {7},
  pages     = {591--595},
  year      = {2003}
}
@article{DBLP:journals/csi/LinHC03,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Chin{-}Chen Chang},
  title     = {Security enhancement for anonymous secure e-voting over a network},
  journal   = {Comput. Stand. Interfaces},
  volume    = {25},
  number    = {2},
  pages     = {131--139},
  year      = {2003}
}
@article{DBLP:journals/csi/YangCH03,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A new anonymous conference key distribution system based on the elliptic
               curve discrete logarithm problem},
  journal   = {Comput. Stand. Interfaces},
  volume    = {25},
  number    = {2},
  pages     = {141--145},
  year      = {2003}
}
@article{DBLP:journals/fgcs/LinHL03,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Li{-}Hua Li},
  title     = {A new remote user authentication scheme for multi-server architecture},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {19},
  number    = {1},
  pages     = {13--22},
  year      = {2003}
}
@article{DBLP:journals/fgcs/LinHC03,
  author    = {Iuon{-}Chang Lin and
               Min{-}Shiang Hwang and
               Chin{-}Chen Chang},
  title     = {A new key assignment scheme for enforcing complicated access control
               policies in hierarchy},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {19},
  number    = {4},
  pages     = {457--462},
  year      = {2003}
}
@article{DBLP:journals/fuin/LeeYH03,
  author    = {Cheng{-}Chi Lee and
               Wei{-}Pang Yang and
               Min{-}Shiang Hwang},
  title     = {Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem},
  journal   = {Fundam. Informaticae},
  volume    = {55},
  number    = {3-4},
  pages     = {307--320},
  year      = {2003}
}
@article{DBLP:journals/ieiceta/HwangLL03,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yan{-}Chi Lai},
  title     = {Traceability on Stadler et al.'s Fair Blind Signature Scheme},
  journal   = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume    = {86-A},
  number    = {2},
  pages     = {513--514},
  year      = {2003}
}
@article{DBLP:journals/ieiceta/HwangLL03a,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yan{-}Chi Lai},
  title     = {An Untraceable Blind Signature Scheme},
  journal   = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume    = {86-A},
  number    = {7},
  pages     = {1902--1906},
  year      = {2003}
}
@article{DBLP:journals/ijcomsys/LeeYH03,
  author    = {Cheng{-}Chi Lee and
               Chao{-}Chen Yang and
               Min{-}Shiang Hwang},
  title     = {A new privacy and authentication protocol for end-to-end mobile users},
  journal   = {Int. J. Commun. Syst.},
  volume    = {16},
  number    = {9},
  pages     = {799--808},
  year      = {2003}
}
@article{DBLP:journals/informaticaLT/YangCLH03,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Jian Wei Li and
               Min{-}Shiang Hwang},
  title     = {Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem},
  journal   = {Informatica},
  volume    = {14},
  number    = {1},
  pages     = {111--120},
  year      = {2003}
}
@article{DBLP:journals/informaticaLT/TsaiTH03,
  author    = {Chwei{-}Shyong Tsai and
               Shiang{-}Feng Tzeng and
               Min{-}Shiang Hwang},
  title     = {Improved Non-Repudiable Threshold Proxy Signature Scheme with Known
               Signers},
  journal   = {Informatica},
  volume    = {14},
  number    = {3},
  pages     = {393--402},
  year      = {2003}
}
@article{DBLP:journals/informaticaLT/YangCH03,
  author    = {Chou Chen Yang and
               Ting Yi Chang and
               Min{-}Shiang Hwang},
  title     = {Security of Improvement on Methods for Protecting Password Transmission},
  journal   = {Informatica},
  volume    = {14},
  number    = {4},
  pages     = {551--558},
  year      = {2003}
}
@article{DBLP:journals/jise/HwangHT03a,
  author    = {Shin{-}Jia Hwang and
               Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng},
  title     = {A New Digital Multisignature Scheme With Distinguished Signing Authorities},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {19},
  number    = {5},
  pages     = {881--887},
  year      = {2003}
}
@article{DBLP:journals/jss/HwangY03,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Controlling access in large partially ordered hierarchies using cryptographic
               keys},
  journal   = {J. Syst. Softw.},
  volume    = {67},
  number    = {2},
  pages     = {99--107},
  year      = {2003}
}
@article{DBLP:journals/sigops/LinSH03,
  author    = {Chih{-}Wei Lin and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {Security enhancement for Optimal Strong-Password Authentication protocol},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {37},
  number    = {2},
  pages     = {7--12},
  year      = {2003}
}
@article{DBLP:journals/sigops/LinSH03a,
  author    = {Chih{-}Wei Lin and
               Jau{-}Ji Shen and
               Min{-}Shiang Hwang},
  title     = {Security enhancement for optimal strong-password authentication protocol},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {37},
  number    = {3},
  pages     = {12--16},
  year      = {2003}
}
@article{DBLP:journals/sigops/HwangYS03,
  author    = {Min{-}Shiang Hwang and
               Chao{-}Chen Yang and
               Cheng{-}Yeh Shiu},
  title     = {An authentication scheme for mobile satellite communication systems},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {37},
  number    = {4},
  pages     = {42--47},
  year      = {2003}
}
@article{DBLP:journals/tce/ShenLH03,
  author    = {Jau{-}Ji Shen and
               Chih{-}Wei Lin and
               Min{-}Shiang Hwang},
  title     = {A modified remote user authentication scheme using smart cards},
  journal   = {{IEEE} Trans. Consumer Electron.},
  volume    = {49},
  number    = {2},
  pages     = {414--416},
  year      = {2003}
}
@article{DBLP:journals/tkde/HwangLL03,
  author    = {Min{-}Shiang Hwang and
               Eric Jui{-}Lin Lu and
               Iuon{-}Chang Lin},
  title     = {A Practical (t, n) Threshold Proxy Signature Scheme Based on the {RSA}
               Cryptosystem},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {15},
  number    = {6},
  pages     = {1552--1560},
  year      = {2003}
}
@inproceedings{DBLP:conf/icoin/HwangT03,
  author    = {Min{-}Shiang Hwang and
               Wen{-}Guey Tzeng},
  title     = {A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy},
  booktitle = {{ICOIN}},
  series    = {Lecture Notes in Computer Science},
  volume    = {2662},
  pages     = {757--761},
  publisher = {Springer},
  year      = {2003}
}
@article{DBLP:journals/dke/HwangLL02,
  author    = {Min{-}Shiang Hwang and
               Eric Jui{-}Lin Lu and
               Iuon{-}Chang Lin},
  title     = {Adding timestamps to the secure electronic auction protocol},
  journal   = {Data Knowl. Eng.},
  volume    = {40},
  number    = {2},
  pages     = {155--162},
  year      = {2002}
}
@article{DBLP:journals/fuin/HwangLH02,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Shin{-}Jia Hwang},
  title     = {Cryptanalysis of the Hwang-Shi Proxy Signature Scheme},
  journal   = {Fundam. Informaticae},
  volume    = {53},
  number    = {2},
  pages     = {131--134},
  year      = {2002}
}
@article{DBLP:journals/ieiceta/HwangLL02,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yan{-}Chi Lai},
  title     = {Traceability on Low-Computation Partially Blind Signatures for Electronic
               Cash},
  journal   = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume    = {85-A},
  number    = {5},
  pages     = {1181--1182},
  year      = {2002}
}
@article{DBLP:journals/ijseke/ChangHH02,
  author    = {Chin{-}Chen Chang and
               Kuo{-}Feng Hwang and
               Min{-}Shiang Hwang},
  title     = {A Feature-Oriented Copyright Owner Proving Technique for Still Images},
  journal   = {Int. J. Softw. Eng. Knowl. Eng.},
  volume    = {12},
  number    = {3},
  pages     = {317--330},
  year      = {2002}
}
@article{DBLP:journals/jise/HwangLC02,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Ting Yi Chang},
  title     = {Broadcasting Cryptosystem in Computer Networks Using Geometric Properties
               of Lines},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {18},
  number    = {3},
  pages     = {373--379},
  year      = {2002}
}
@article{DBLP:journals/sigops/LeeHY02,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A flexible remote user authentication scheme using smart cards},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {36},
  number    = {3},
  pages     = {46--52},
  year      = {2002}
}
@article{DBLP:journals/sigops/LeeLH02,
  author    = {Cheng{-}Chi Lee and
               Li{-}Hua Li and
               Min{-}Shiang Hwang},
  title     = {A remote user authentication scheme using hash functions},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {36},
  number    = {4},
  pages     = {23--29},
  year      = {2002}
}
@article{DBLP:journals/tkde/HwangCH02,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {An ElGamal-Like Cryptosystem for Enciphering Large Messages},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {14},
  number    = {2},
  pages     = {445--446},
  year      = {2002}
}
@inproceedings{DBLP:conf/cdma/YangHLC02,
  author    = {Chou Chen Yang and
               Min{-}Shiang Hwang and
               Jian Wei Li and
               Ting Yi Chang},
  title     = {A Solution to Mobile {IP} Registration for {AAA}},
  booktitle = {{CDMA} International Conference},
  series    = {Lecture Notes in Computer Science},
  volume    = {2524},
  pages     = {329--337},
  publisher = {Springer},
  year      = {2002}
}
@article{DBLP:journals/ett/HwangL01,
  author    = {Min{-}Shiang Hwang and
               Chii{-}Hwa Lee},
  title     = {Secure access schemes in mobile database systems},
  journal   = {Eur. Trans. Telecommun.},
  volume    = {12},
  number    = {4},
  pages     = {303--310},
  year      = {2001}
}
@article{DBLP:journals/informaticaLT/HwangLT01,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yuan{-}Liang Tang},
  title     = {An Improvement of {SPLICE/AS} in {WIDE} against Guessing Attack},
  journal   = {Informatica},
  volume    = {12},
  number    = {2},
  pages     = {297--302},
  year      = {2001}
}
@article{DBLP:journals/jss/HwangLL01,
  author    = {Min{-}Shiang Hwang and
               Iuon{-}Chang Lin and
               Li{-}Hua Li},
  title     = {A simple micro-payment scheme},
  journal   = {J. Syst. Softw.},
  volume    = {55},
  number    = {3},
  pages     = {221--229},
  year      = {2001}
}
@article{DBLP:journals/jss/ChangHC01,
  author    = {Chin{-}Chen Chang and
               Min{-}Shiang Hwang and
               Tung{-}Shou Chen},
  title     = {A new encryption algorithm for image cryptosystems},
  journal   = {J. Syst. Softw.},
  volume    = {58},
  number    = {2},
  pages     = {83--91},
  year      = {2001}
}
@article{DBLP:journals/tnn/LiLH01,
  author    = {Li{-}Hua Li and
               Iuon{-}Chang Lin and
               Min{-}Shiang Hwang},
  title     = {A remote password authentication scheme for multiserver architecture
               using neural networks},
  journal   = {{IEEE} Trans. Neural Networks},
  volume    = {12},
  number    = {6},
  pages     = {1498--1504},
  year      = {2001}
}
@inproceedings{DBLP:conf/icics/HwangLT01,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Yuan{-}Liang Tang},
  title     = {Two Simple Batch Verifying Multiple Digital Signatures},
  booktitle = {{ICICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {2229},
  pages     = {233--237},
  publisher = {Springer},
  year      = {2001}
}
@article{DBLP:journals/cee/HwangCH00,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {A threshold decryption scheme without session keys},
  journal   = {Comput. Electr. Eng.},
  volume    = {27},
  number    = {1},
  pages     = {29--35},
  year      = {2000}
}
@article{DBLP:journals/ijcm/Hwang00,
  author    = {Min{-}Shiang Hwang},
  title     = {An asymmetric cryptographuic key assignment scheme for access control
               in totally-ordered hierarchies},
  journal   = {Int. J. Comput. Math.},
  volume    = {73},
  number    = {4},
  pages     = {463--468},
  year      = {2000}
}
@article{DBLP:journals/informaticaLT/HwangLH00,
  author    = {Min{-}Shiang Hwang and
               Iuon{-}Chang Lin and
               Kuo{-}Feng Hwang},
  title     = {Cryptanalysis of the Batch Verifying Multiple {RSA} Digital Signatures},
  journal   = {Informatica},
  volume    = {11},
  number    = {1},
  pages     = {15--19},
  year      = {2000}
}
@article{DBLP:journals/informaticaLT/HwangLL00,
  author    = {Min{-}Shiang Hwang and
               Iuon{-}Chang Lin and
               Eric Jui{-}Lin Lu},
  title     = {A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known
               Signers},
  journal   = {Informatica},
  volume    = {11},
  number    = {2},
  pages     = {137--144},
  year      = {2000}
}
@article{DBLP:journals/informaticaLT/Hwang00,
  author    = {Min{-}Shiang Hwang},
  title     = {A New Redundancy Reducing Cipher},
  journal   = {Informatica},
  volume    = {11},
  number    = {4},
  pages     = {435--440},
  year      = {2000}
}
@article{DBLP:journals/informaticaSI/ChangHK00,
  author    = {Chin{-}Chen Chang and
               Kuo{-}Feng Hwang and
               Min{-}Shiang Hwang},
  title     = {A Digital Watermarking Scheme Using Human Visual Effects},
  journal   = {Informatica (Slovenia)},
  volume    = {24},
  number    = {4},
  year      = {2000}
}
@article{DBLP:journals/ipl/Hwang00,
  author    = {Min{-}Shiang Hwang},
  title     = {Cryptanalysis of {YCN} key assignment scheme in a hierarchy},
  journal   = {Inf. Process. Lett.},
  volume    = {73},
  number    = {3-4},
  pages     = {97--101},
  year      = {2000}
}
@article{DBLP:journals/jei/HwangCH00,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {Digital watermarking of images using neural networks},
  journal   = {J. Electronic Imaging},
  volume    = {9},
  number    = {4},
  pages     = {548--555},
  year      = {2000}
}
@article{DBLP:journals/tce/HwangL00,
  author    = {Min{-}Shiang Hwang and
               Li{-}Hua Li},
  title     = {A new remote user authentication scheme using smart cards},
  journal   = {{IEEE} Trans. Consumer Electron.},
  volume    = {46},
  number    = {1},
  pages     = {28--30},
  year      = {2000}
}
@inproceedings{DBLP:conf/compsac/LinCH00,
  author    = {Iuon{-}Chang Lin and
               Chin{-}Chen Chang and
               Min{-}Shiang Hwang},
  title     = {Security Enhancement for the "Simple Authentication Key Agreement
               Algorithm"},
  booktitle = {{COMPSAC}},
  pages     = {113--115},
  publisher = {{IEEE} Computer Society},
  year      = {2000}
}
@article{DBLP:journals/comcom/Hwang99,
  author    = {Min{-}Shiang Hwang},
  title     = {Cryptanalysis of a remote login authentication scheme},
  journal   = {Comput. Commun.},
  volume    = {22},
  number    = {8},
  pages     = {742--744},
  year      = {1999}
}
@article{DBLP:journals/ijcm/Hwang99,
  author    = {Min{-}Shiang Hwang},
  title     = {A remote password authentication scheme based on the digital signature
               method},
  journal   = {Int. J. Comput. Math.},
  volume    = {70},
  number    = {4},
  pages     = {657--666},
  year      = {1999}
}
@article{DBLP:journals/jise/LeeHY99,
  author    = {Cheng{-}Chi Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A Novel Application of the Phone Card and Its Authentication in Mobile
               Communications},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {15},
  number    = {4},
  pages     = {471--484},
  year      = {1999}
}
@article{DBLP:journals/njc/Hwang99,
  author    = {Min{-}Shiang Hwang},
  title     = {A Dynamic Key Generation Scheme for Access Control in a Hierarchy},
  journal   = {Nord. J. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {363--371},
  year      = {1999}
}
@article{DBLP:journals/tce/HwangCH99,
  author    = {Min{-}Shiang Hwang and
               Chin{-}Chen Chang and
               Kuo{-}Feng Hwang},
  title     = {A watermarking technique based on one-way hash functions},
  journal   = {{IEEE} Trans. Consumer Electron.},
  volume    = {45},
  number    = {2},
  pages     = {286--294},
  year      = {1999}
}
@article{DBLP:journals/winet/LeeHY99,
  author    = {Chii{-}Hwa Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Enhanced privacy and authentication for the global system for mobile
               communications},
  journal   = {Wirel. Networks},
  volume    = {5},
  number    = {4},
  pages     = {231--243},
  year      = {1999}
}
@article{DBLP:journals/tip/ChenCH98,
  author    = {Tung{-}Shou Chen and
               Chin{-}Chen Chang and
               Min{-}Shiang Hwang},
  title     = {A virtual image cryptosystem based upon vector quantization},
  journal   = {{IEEE} Trans. Image Process.},
  volume    = {7},
  number    = {10},
  pages     = {1485--1488},
  year      = {1998}
}
@article{DBLP:journals/dke/HwangY97,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Multilevel Secure Database Encryption with Subkeys},
  journal   = {Data Knowl. Eng.},
  volume    = {22},
  number    = {2},
  pages     = {117--131},
  year      = {1997}
}
@article{DBLP:journals/ett/HwangL97,
  author    = {Min{-}Shiang Hwang and
               Chii{-}Hwa Lee},
  title     = {Authenticated key-exchange in a mobile radio network},
  journal   = {Eur. Trans. Telecommun.},
  volume    = {8},
  number    = {3},
  pages     = {265--269},
  year      = {1997}
}
@article{DBLP:journals/compsec/HwangTY96,
  author    = {Min{-}Shiang Hwang and
               Wen{-}Guey Tzeng and
               Wei{-}Pang Yang},
  title     = {An access control scheme based on Chinese remainder theorem and time
               stamp concept},
  journal   = {Comput. Secur.},
  volume    = {15},
  number    = {1},
  pages     = {73--81},
  year      = {1996}
}
@inproceedings{DBLP:conf/ifip/Lee96,
  author    = {Chii{-}Hwa Lee and
               Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Phone Card Application and Authentication in Wireless Communications},
  booktitle = {{IFIP} World Conference on Mobile Communications},
  series    = {{IFIP} Conference Proceedings},
  volume    = {66},
  pages     = {323--329},
  publisher = {Chapman {\&} Hall},
  year      = {1996}
}
@article{DBLP:journals/jsac/HwangY95,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {Conference Key Distribution Schemes for Secure Digital Mobile Communications},
  journal   = {{IEEE} J. Sel. Areas Commun.},
  volume    = {13},
  number    = {2},
  pages     = {416--420},
  year      = {1995}
}
@article{DBLP:journals/jss/HwangY95,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A two-phase encryption scheme for enhancing database security},
  journal   = {J. Syst. Softw.},
  volume    = {31},
  number    = {3},
  pages     = {257--265},
  year      = {1995}
}
@article{DBLP:journals/dke/HwangY94,
  author    = {Min{-}Shiang Hwang and
               Wei{-}Pang Yang},
  title     = {A New Dynamic Access Control Scheme Based on Subject-Object List},
  journal   = {Data Knowl. Eng.},
  volume    = {14},
  number    = {1},
  pages     = {45--56},
  year      = {1994}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics