default search action
Min-Shiang Hwang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
Journal Articles
- 2023
- [j197]Kurnia Anggriani, Shu-Fen Chiou, Nan-I Wu, Min-Shiang Hwang:
A Robust and High-Capacity Coverless Information Hiding Based on Combination Theory. Informatica 34(3): 449-464 (2023) - 2022
- [j196]Eko Fajar Cahyadi, Min-Shiang Hwang:
A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs. IEEE Access 10: 133869-133882 (2022) - [j195]Lanxiang Chen, Qingxiao Fu, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Min-Shiang Hwang:
Blockchain-based random auditor committee for integrity verification. Future Gener. Comput. Syst. 131: 183-193 (2022) - [j194]Eko Fajar Cahyadi, Tzu-Wei Su, Chou Chen Yang, Min-Shiang Hwang:
A certificateless aggregate signature scheme for security and privacy protection in VANET. Int. J. Distributed Sens. Networks 18(5): 155013292210806 (2022) - [j193]Eko Fajar Cahyadi, Min-Shiang Hwang:
An improved efficient authentication scheme for vehicular ad hoc networks with batch verification using bilinear pairings. Int. J. Embed. Syst. 15(2): 139-148 (2022) - 2021
- [j192]Li-Chin Huang, Shu-Fen Chiou, Min-Shiang Hwang:
A Reversible Data Hiding Based on Histogram Shifting of Prediction Errors for Two-Tier Medical Images. Informatica 32(1): 69-84 (2021) - 2020
- [j191]Hsieh-Tsen Pan, Hung-Wei Yang, Min-Shiang Hwang:
An Enhanced Secure Smart Card-based Password Authentication Scheme. Int. J. Netw. Secur. 22(2): 358-363 (2020) - [j190]Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, Min-Shiang Hwang:
Research on the Secure Financial Surveillance Blockchain Systems. Int. J. Netw. Secur. 22(4): 708-716 (2020) - [j189]Li-Chin Huang, Chun-Hsien Chang, Min-Shiang Hwang:
Research on Malware Detection and Classification Based on Artificial Intelligence. Int. J. Netw. Secur. 22(5): 717-727 (2020) - [j188]Min-Shiang Hwang, Ming-Ru Xie, Chia-Chun Wu:
A Reversible Hiding Technique Using LSB Matching for Relational Databases. Informatica 31(3): 481-497 (2020) - 2019
- [j187]Min-Shiang Hwang, Cheng-Chi Lee, Shih-Ting Hsu:
An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme. Int. J. Found. Comput. Sci. 30(2): 255-273 (2019) - [j186]Shu-Fen Chiou, Hsieh-Tsen Pan, Eko Fajar Cahyadi, Min-Shiang Hwang:
Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. Int. J. Netw. Secur. 21(1): 100-104 (2019) - [j185]Tzu-Chun Lin, Ting-Yi Yeh, Min-Shiang Hwang:
Cryptanalysis of an ID-based Deniable Threshold Ring Authentication. Int. J. Netw. Secur. 21(2): 298-302 (2019) - [j184]Hsieh-Tsen Pan, Eko Fajar Cahyadi, Shu-Fen Chiou, Min-Shiang Hwang:
Research on Batch Verification Schemes for Identifying Illegal Signatures. Int. J. Netw. Secur. 21(6): 1062-1070 (2019) - [j183]Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang:
Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks. J. Supercomput. 75(8): 4601-4616 (2019) - 2018
- [j182]Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
A Survey of Reversible Data Hiding for VQ-Compressed Images. Int. J. Netw. Secur. 20(1): 1-8 (2018) - [j181]Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang:
A Secure Group Signature Scheme. Int. J. Netw. Secur. 20(2): 201-205 (2018) - [j180]Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching. Int. J. Netw. Secur. 20(4): 801-804 (2018) - [j179]Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, Min-Shiang Hwang:
A Survey of E-book Digital Right Management. Int. J. Netw. Secur. 20(5): 998-1004 (2018) - [j178]Li-Chin Huang, Ting-Yi Chang, Min-Shiang Hwang:
A Conference Key Scheme Based on the Diffie-Hellman Key Exchange. Int. J. Netw. Secur. 20(6): 1221-1226 (2018) - 2017
- [j177]Nan-I Wu, Min-Shiang Hwang:
Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images. Displays 49: 116-123 (2017) - [j176]Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin:
A secure privacy and authentication protocol for passive RFID tags. Int. J. Mob. Commun. 15(3): 266-277 (2017) - [j175]Shih-Ming Chen, Ching-Rong Yang, Min-Shiang Hwang:
Using a New Structure in Group Key Management for Pay-TV. Int. J. Netw. Secur. 19(1): 112-117 (2017) - [j174]Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang:
A Secure and Efficient One-time Password Authentication Scheme for WSN. Int. J. Netw. Secur. 19(2): 177-181 (2017) - [j173]Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, Min-Shiang Hwang:
A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms. Int. J. Netw. Secur. 19(3): 443-448 (2017) - [j172]Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang:
An Improved Key-Management Scheme for Hierarchical Access Control. Int. J. Netw. Secur. 19(4): 639-643 (2017) - [j171]Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching. Int. J. Netw. Secur. 19(5): 858-862 (2017) - [j170]Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang:
The Capacity Analysis in the Secure Cooperative Communication System. Int. J. Netw. Secur. 19(6): 863-869 (2017) - [j169]Min-Shiang Hwang, Tsuei-Hung Sun, Cheng-Chi Lee:
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service. J. Circuits Syst. Comput. 26(5): 1750072:1-1750072:16 (2017) - [j168]Ting Yi Chang, Min-Shiang Hwang, Chou Chen Yang:
Password Authenticated Key Exchange and Protected Password Change Protocols. Symmetry 9(8): 134 (2017) - 2016
- [j167]Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:
A Survey of Public Auditing for Secure Data Storage in Cloud Computing. Int. J. Netw. Secur. 18(1): 133-142 (2016) - [j166]Chung-Huei Ling, Wei-Fu Hsien, Min-Shiang Hwang:
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach. Int. J. Netw. Secur. 18(2): 397-400 (2016) - [j165]Chung-Huei Ling, Shih-Ming Chen, Min-Shiang Hwang:
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol. Int. J. Netw. Secur. 18(3): 590-593 (2016) - [j164]Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:
A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing. Int. J. Netw. Secur. 18(4): 650-666 (2016) - [j163]Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage. Int. J. Netw. Secur. 18(5): 900-916 (2016) - [j162]Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang:
A Survey of Data Distortion Watermarking Relational Databases. Int. J. Netw. Secur. 18(6): 1022-1033 (2016) - [j161]Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou:
The Moderately Hard DoS-Resistant Authentication Protocol on Client Puzzles. Informatica 27(1): 31-48 (2016) - [j160]Tung-Huang Feng, Min-Shiang Hwang, Liang-Wei Syu:
An Authentication Protocol for Lightweight NFC Mobile Sensors Payment. Informatica 27(4): 723-732 (2016) - [j159]Iuon-Chang Lin, Yi-Lun Chi, Hung-Chieh Chuang, Min-Shiang Hwang:
The Novel Features for Phishing Based on User Device Detection. J. Comput. 11(2): 109-115 (2016) - 2015
- [j158]Heri Wijayanto, Min-Shiang Hwang:
Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance. Int. J. Netw. Secur. 17(2): 160-164 (2015) - [j157]Yi-Lun Chi, Cheng Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang:
The Secure Transaction Protocol in NFC Card Emulation Mode. Int. J. Netw. Secur. 17(4): 431-438 (2015) - [j156]Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang:
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures. Int. J. Netw. Secur. 17(4): 463-470 (2015) - [j155]Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang:
A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure. Int. J. Netw. Secur. 17(5): 497-509 (2015) - [j154]Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang:
A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks. Int. J. Netw. Secur. 17(6): 712-721 (2015) - 2014
- [j153]Min-Shiang Hwang, Cheng-Chi Lee, Tsuei-Hung Sun:
Data error locations reported by public auditing in cloud storage service. Autom. Softw. Eng. 21(3): 373-390 (2014) - [j152]Pei-Shan Chung, Chi-Wei Liu, Min-Shiang Hwang:
A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments. Int. J. Netw. Secur. 16(1): 1-13 (2014) - [j151]Tung-Huang Feng, Chung-Huei Ling, Min-Shiang Hwang:
Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments. Int. J. Netw. Secur. 16(4): 318-321 (2014) - [j150]Wei Teng Li, Tung-Huang Feng, Min-Shiang Hwang:
Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey. Int. J. Netw. Secur. 16(5): 323-330 (2014) - [j149]Wei Teng Li, Chung-Huei Ling, Min-Shiang Hwang:
Group Rekeying in Wireless Sensor Networks: A Survey. Int. J. Netw. Secur. 16(6): 400-410 (2014) - [j148]Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee:
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme. Inf. Technol. Control. 43(3): 277-288 (2014) - 2013
- [j147]Li-Chin Huang, Cheng-Chi Lee, Min-Shiang Hwang:
A n2+n MQV key agreement protocol. Int. Arab J. Inf. Technol. 10(2): 137-142 (2013) - [j146]Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang:
Guessing Attacks on Strong-Password Authentication Protocol. Int. J. Netw. Secur. 15(1): 64-67 (2013) - [j145]Shih-Ting Hsu, Chou Chen Yang, Min-Shiang Hwang:
A Study of Public Key Encryption with Keyword Search. Int. J. Netw. Secur. 15(2): 71-79 (2013) - [j144]Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang:
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. Int. J. Netw. Secur. 15(4): 231-240 (2013) - [j143]Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang:
A Study of Conjunctive Keyword Searchable Schemes. Int. J. Netw. Secur. 15(5): 321-330 (2013) - [j142]Min-Yu Chen, Chou Chen Yang, Min-Shiang Hwang:
Privacy Protection Data Access Control. Int. J. Netw. Secur. 15(6): 411-419 (2013) - [j141]Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng:
A new proxy signature scheme for a specified group of verifiers. Inf. Sci. 227: 102-115 (2013) - [j140]Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang:
A New Group Signature Scheme Based on RSA Assumption. Inf. Technol. Control. 42(1): 61-66 (2013) - [j139]Li-Chin Huang, Min-Shiang Hwang, Lin-Yu Tseng:
Reversible and High-Capacity Data Hiding in High Quality Medical Images. KSII Trans. Internet Inf. Syst. 7(1): 132-148 (2013) - [j138]Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang:
A reversible data hiding method by histogram shifting in high quality medical images. J. Syst. Softw. 86(3): 716-727 (2013) - [j137]Song-Kong Chong, Cheng-Chi Lee, Min-Shiang Hwang:
An Authentication Scheme for the Global Mobility Network. Parallel Process. Lett. 23(3) (2013) - [j136]Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan:
Towards secure and efficient user authentication scheme using smart card for multi-server environments. J. Supercomput. 66(2): 1008-1032 (2013) - [j135]Hsia-Hung Ou, Min-Shiang Hwang:
Double Delegation-Based Authentication and Key Agreement Protocol for PCSs. Wirel. Pers. Commun. 72(1): 437-446 (2013) - 2012
- [j134]Chun-Ta Li, Chou Chen Yang, Min-Shiang Hwang:
A secure routing protocol with node selfishness resistance in MANETs. Int. J. Mob. Commun. 10(1): 103-118 (2012) - [j133]Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang:
An effective AKA protocol for UMTS. Int. J. Mob. Commun. 10(4): 427-448 (2012) - [j132]Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin:
An improved authentication protocol for mobile agent device in RFID environment. Int. J. Mob. Commun. 10(5): 508-520 (2012) - [j131]Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang:
The Study of Data Hiding in Medical Images. Int. J. Netw. Secur. 14(6): 301-309 (2012) - [j130]Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages. Informatica 23(4): 537-562 (2012) - 2011
- [j129]Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou:
On the security of an enhanced UMTS authentication and key agreement protocol. Eur. Trans. Telecommun. 22(3): 99-112 (2011) - [j128]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
On the Security of Self-Certified Public Keys. Int. J. Inf. Secur. Priv. 5(2): 54-60 (2011) - [j127]Ting Yi Chang, Min-Shiang Hwang:
User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications. Int. J. Mob. Commun. 9(2): 144-158 (2011) - [j126]Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin:
An authentication protocol for low-cost RFID tags. Int. J. Mob. Commun. 9(2): 208-223 (2011) - [j125]Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
A communication-efficient three-party password authenticated key exchange protocol. Inf. Sci. 181(1): 217-226 (2011) - [j124]Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu:
An efficient key assignment scheme for access control in a large leaf class hierarchy. Inf. Sci. 181(4): 917-925 (2011) - [j123]Chun-Ta Li, Min-Shiang Hwang:
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks. Inf. Sci. 181(23): 5333-5347 (2011) - [j122]Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem. Inf. Technol. Control. 40(3): 246-251 (2011) - [j121]Chia-Hui Wei, Min-Shiang Hwang, A. Y. Chin:
A Mutual Authentication Protocol for RFID. IT Prof. 13(2): 20-24 (2011) - [j120]Chia-Chun Wu, Shang-Juh Kao, Min-Shiang Hwang:
A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 84(12): 2196-2207 (2011) - [j119]Shiang-Feng Tzeng, Cheng-Chi Lee, Min-Shiang Hwang:
A Batch Verification for Multiple Proxy Signature. Parallel Process. Lett. 21(1): 77-84 (2011) - [j118]Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang:
An efficient authentication protocol for mobile communications. Telecommun. Syst. 46(1): 31-41 (2011) - 2010
- [j117]Chun-Ta Li, Min-Shiang Hwang:
An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1): 1-5 (2010) - [j116]Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen:
DoS-resistant ID-based password authentication scheme using smart cards. J. Syst. Softw. 83(1): 163-172 (2010) - [j115]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
A cocktail protocol with the Authentication and Key Agreement on the UMTS. J. Syst. Softw. 83(2): 316-325 (2010) - [j114]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-Ke Jan:
A Provable Billing Protocol on the Current UMTS. Wirel. Pers. Commun. 55(4): 551-566 (2010) - 2009
- [j113]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
The UMTS-AKA Protocols for Intelligent Transportation Systems. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j112]Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng:
A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. Int. J. Found. Comput. Sci. 20(2): 351-359 (2009) - [j111]Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, Jinn-ke Jan:
TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS. Int. J. Netw. Manag. 19(4): 291-303 (2009) - [j110]Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin:
A new English auction scheme using the bulletin board system. Inf. Manag. Comput. Secur. 17(5): 408-417 (2009) - [j109]Cheng-Chi Lee, Pi-Fang Ho, Min-Shiang Hwang:
A secure e-auction scheme based on group signatures. Inf. Syst. Frontiers 11(3): 335-343 (2009) - [j108]Hao-Ju Wu, Yi-Hsin Chang, Min-Shiang Hwang, Iuon-Chang Lin:
Flexible RFID location system based on artificial neural networks for medical care facilities. SIGBED Rev. 6(2): 12 (2009) - 2008
- [j107]Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu:
An electronic voting protocol with deniable authentication for mobile ad hoc networks. Comput. Commun. 31(10): 2534-2540 (2008) - [j106]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12): 2803-2814 (2008) - [j105]Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong:
An improved address ownership in mobile IPv6. Comput. Commun. 31(14): 3250-3252 (2008) - [j104]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Comput. Commun. 31(18): 4255-4258 (2008) - [j103]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Comput. Syst. Sci. Eng. 23(3) (2008) - [j102]Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang:
A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. 81(1): 150-158 (2008) - [j101]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
A new authentication protocol based on pointer forwarding for mobile communications. Wirel. Commun. Mob. Comput. 8(5): 661-672 (2008) - 2007
- [j100]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
A simple mobile communication billing system among charged parties. Appl. Math. Comput. 192(2): 487-495 (2007) - [j99]Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang:
A new convertible authenticated encryption scheme with message linkages. Comput. Electr. Eng. 33(2): 133-138 (2007) - [j98]Nan-I Wu, Min-Shiang Hwang:
Data Hiding: Current Status and Key Issues. Int. J. Netw. Secur. 4(1): 1-9 (2007) - 2006
- [j97]Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang:
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Appl. Math. Comput. 172(2): 1195-1200 (2006) - [j96]Min-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, Yen-Ping Chu:
Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows. IEICE Trans. Inf. Syst. 89-D(4): 1575-1577 (2006) - [j95]Min-Shiang Hwang, Pei-Chen Sung:
A Study of Micro-payment Based on One-way Hash Chain. Int. J. Netw. Secur. 2(2): 81-90 (2006) - [j94]Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang:
Password Authentication Schemes: Current Status and Key Issues. Int. J. Netw. Secur. 3(2): 101-115 (2006) - [j93]I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang:
A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4): 727-740 (2006) - [j92]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments. IEEE Trans. Ind. Electron. 53(5): 1683-1687 (2006) - 2005
- [j91]Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang:
Improvement of signature scheme based on factoring and discrete logarithms. Appl. Math. Comput. 161(1): 49-54 (2005) - [j90]Eric Jui-Lin Lu, Min-Shiang Hwang, Cheng-Jian Huang:
A new proxy signature scheme with revocation. Appl. Math. Comput. 161(3): 799-806 (2005) - [j89]Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme. Appl. Math. Comput. 163(1): 169-178 (2005) - [j88]Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang:
A new blind signature based on the discrete logarithm problem for untraceability. Appl. Math. Comput. 164(3): 837-841 (2005) - [j87]Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang:
Cryptanalysis of an authenticated encryption scheme using self-certified public keys. Appl. Math. Comput. 166(1): 118-122 (2005) - [j86]Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang:
A time-stamping protocol for digital watermarking. Appl. Math. Comput. 169(2): 1276-1284 (2005) - [j85]Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu:
Improvement on the flexible tree-based key management framework. Comput. Secur. 24(6): 500-504 (2005) - [j84]Shiang-Feng Tzeng, Min-Shiang Hwang, Hsing-Bai Chen:
A secure on-line software transaction scheme. Comput. Stand. Interfaces 27(3): 303-312 (2005) - [j83]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Des. Codes Cryptogr. 36(1): 53-67 (2005) - [j82]Hsien-Chu Wu, Min-Shiang Hwang, Chia-Hsin Liu:
A Secure Strong-Password Authentication Protocol. Fundam. Informaticae 68(4): 399-406 (2005) - [j81]