Min-Shiang Hwang

According to our database1, Min-Shiang Hwang
  • authored at least 192 papers between 1994 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Survey of Reversible Data Hiding for VQ-Compressed Images.
I. J. Network Security, 2018

A Secure Group Signature Scheme.
I. J. Network Security, 2018

2017
Password Authenticated Key Exchange and Protected Password Change Protocols.
Symmetry, 2017

Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service.
Journal of Circuits, Systems, and Computers, 2017

An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching.
I. J. Network Security, 2017

A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms.
I. J. Network Security, 2017

A Secure and Efficient One-time Password Authentication Scheme for WSN.
I. J. Network Security, 2017

The Capacity Analysis in the Secure Cooperative Communication System.
I. J. Network Security, 2017

An Improved Key-Management Scheme for Hierarchical Access Control.
I. J. Network Security, 2017

A secure privacy and authentication protocol for passive RFID tags.
IJMC, 2017

Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images.
Displays, 2017

2016
The Novel Features for Phishing Based on User Device Detection.
JCP, 2016

The Moderately Hard DoS-Resistant Authentication Protocol on Client Puzzles.
Informatica, Lith. Acad. Sci., 2016

An Authentication Protocol for Lightweight NFC Mobile Sensors Payment.
Informatica, Lith. Acad. Sci., 2016

A Survey of Data Distortion Watermarking Relational Databases.
I. J. Network Security, 2016

A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage.
I. J. Network Security, 2016

A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing.
I. J. Network Security, 2016

A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach.
I. J. Network Security, 2016

Cryptanalysis of Tseng-Wu Group Key Exchange Protocol.
I. J. Network Security, 2016

A Survey of Public Auditing for Secure Data Storage in Cloud Computing.
I. J. Network Security, 2016

Cryptanalysis of Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-Server Environment Using Smart Card.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance.
I. J. Network Security, 2015

A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure.
I. J. Network Security, 2015

An Efficient Batch Verifying Scheme for Detecting Illegal Signatures.
I. J. Network Security, 2015

A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks.
I. J. Network Security, 2015

The Secure Transaction Protocol in NFC Card Emulation Mode.
I. J. Network Security, 2015

2014
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme.
ITC, 2014

Group Rekeying in Wireless Sensor Networks: A Survey.
I. J. Network Security, 2014

Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey.
I. J. Network Security, 2014

Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments.
I. J. Network Security, 2014

A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments.
I. J. Network Security, 2014

Data error locations reported by public auditing in cloud storage service.
Autom. Softw. Eng., 2014

A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Double Delegation-Based Authentication and Key Agreement Protocol for PCSs.
Wireless Personal Communications, 2013

Towards secure and efficient user authentication scheme using smart card for multi-server environments.
The Journal of Supercomputing, 2013

An Authentication Scheme for the Global Mobility Network.
Parallel Processing Letters, 2013

A reversible data hiding method by histogram shifting in high quality medical images.
Journal of Systems and Software, 2013

Reversible and High-Capacity Data Hiding in High Quality Medical Images.
TIIS, 2013

A New Group Signature Scheme Based on RSA Assumption.
ITC, 2013

A new proxy signature scheme for a specified group of verifiers.
Inf. Sci., 2013

Guessing Attacks on Strong-Password Authentication Protocol.
I. J. Network Security, 2013

A Study of Conjunctive Keyword Searchable Schemes.
I. J. Network Security, 2013

A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
I. J. Network Security, 2013

A Study of Public Key Encryption with Keyword Search.
I. J. Network Security, 2013

Privacy Protection Data Access Control.
I. J. Network Security, 2013

A n2+n MQV key agreement protocol.
Int. Arab J. Inf. Technol., 2013

Downlink Relay Selection Algorithm for Amplify-and-Forward Cooperative Communication Systems.
Proceedings of the Seventh International Conference on Complex, 2013

SecureDropbox: a file encryption system suitable for cloud storage services.
Proceedings of the ACM Cloud and Autonomic Computing Conference, 2013

2012
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages.
Informatica, Lith. Acad. Sci., 2012

The Study of Data Hiding in Medical Images.
I. J. Network Security, 2012

An improved authentication protocol for mobile agent device in RFID environment.
IJMC, 2012

An effective AKA protocol for UMTS.
IJMC, 2012

A secure routing protocol with node selfishness resistance in MANETs.
IJMC, 2012

2011
An efficient authentication protocol for mobile communications.
Telecommunication Systems, 2011

A Batch Verification for Multiple Proxy Signature.
Parallel Processing Letters, 2011

A high quality image sharing with steganography and adaptive authentication scheme.
Journal of Systems and Software, 2011

A Mutual Authentication Protocol for RFID.
IT Professional, 2011

An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem.
ITC, 2011

An efficient key assignment scheme for access control in a large leaf class hierarchy.
Inf. Sci., 2011

A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks.
Inf. Sci., 2011

A communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2011

An authentication protocol for low-cost RFID tags.
IJMC, 2011

User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications.
IJMC, 2011

On the Security of Self-Certified Public Keys.
IJISP, 2011

On the security of an enhanced UMTS authentication and key agreement protocol.
European Transactions on Telecommunications, 2011

2010
A Provable Billing Protocol on the Current UMTS.
Wireless Personal Communications, 2010

A cocktail protocol with the Authentication and Key Agreement on the UMTS.
Journal of Systems and Software, 2010

DoS-resistant ID-based password authentication scheme using smart cards.
Journal of Systems and Software, 2010

An efficient biometrics-based remote user authentication scheme using smart cards.
J. Network and Computer Applications, 2010

2009
Flexible RFID location system based on artificial neural networks for medical care facilities.
SIGBED Review, 2009

A secure e-auction scheme based on group signatures.
Information Systems Frontiers, 2009

A new English auction scheme using the bulletin board system.
Inf. Manag. Comput. Security, 2009

TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS.
Int. Journal of Network Management, 2009

A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem.
Int. J. Found. Comput. Sci., 2009

The UMTS-AKA Protocols for Intelligent Transportation Systems.
EURASIP J. Wireless Comm. and Networking, 2009

A Verifiable Electronic Voting Scheme over the Internet.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Improving the Security of Non-PKI Methods for Public Key Distribution.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Reversible Secret Image Sharing Based on Shamir's Scheme.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
A new authentication protocol based on pointer forwarding for mobile communications.
Wireless Communications and Mobile Computing, 2008

A high quality steganographic method with pixel-value differencing and modulus function.
Journal of Systems and Software, 2008

Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Syst. Sci. Eng., 2008

An electronic voting protocol with deniable authentication for mobile ad hoc networks.
Computer Communications, 2008

Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments.
Computer Communications, 2008

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks.
Computer Communications, 2008

An improved address ownership in mobile IPv6.
Computer Communications, 2008

An Improvement of Strong Proxy Signature and Its Applications.
Proceedings of the SECRYPT 2008, 2008

An Exchangeable E-Cash Scheme by E-Mint.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Ordered Multi-proxy Multi-signature Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Enhance the Image Sharing with Steganography and Authentication.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Data Hiding: Current Status and Key Issues.
I. J. Network Security, 2007

A new convertible authenticated encryption scheme with message linkages.
Computers & Electrical Engineering, 2007

A simple mobile communication billing system among charged parties.
Applied Mathematics and Computation, 2007

A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period.
Proceedings of the Computational Science and Its Applications, 2007

2006
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments.
IEEE Trans. Industrial Electronics, 2006

A password authentication scheme over insecure networks.
J. Comput. Syst. Sci., 2006

Password Authentication Schemes: Current Status and Key Issues.
I. J. Network Security, 2006

A Study of Micro-payment Based on One-way Hash Chain.
I. J. Network Security, 2006

Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows.
IEICE Transactions, 2006

Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.
Applied Mathematics and Computation, 2006

Identity-based deniable authentication protocol from pairings.
Proceedings of the Tenth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), 2006

2005
A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography.
Telecommunication Systems, 2005

A new multi-stage secret sharing scheme using one-way function.
Operating Systems Review, 2005

A user authentication system using back-propagation network.
Neural Computing and Applications, 2005

Authenticated Encryption Schemes: Current Status and Key Issues.
I. J. Network Security, 2005

Research Issues and Challenges for Multiple Digital Signatures.
I. J. Network Security, 2005

Threshold Signatures: Current Status and Key Issues.
I. J. Network Security, 2005

A simple broadcasting cryptosystem in computer networks using eXclusive-OR.
IJCAT, 2005

A Secure Strong-Password Authentication Protocol.
Fundam. Inform., 2005

The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain.
Des. Codes Cryptography, 2005

A secure on-line software transaction scheme.
Computer Standards & Interfaces, 2005

Improvement on the flexible tree-based key management framework.
Computers & Security, 2005

Cryptanalysis of an authenticated encryption scheme using self-certified public keys.
Applied Mathematics and Computation, 2005

A new proxy signature scheme with revocation.
Applied Mathematics and Computation, 2005

Improvement of signature scheme based on factoring and discrete logarithms.
Applied Mathematics and Computation, 2005

A new blind signature based on the discrete logarithm problem for untraceability.
Applied Mathematics and Computation, 2005

A time-stamping protocol for digital watermarking.
Applied Mathematics and Computation, 2005

An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme.
Applied Mathematics and Computation, 2005

2004
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication.
Wireless Personal Communications, 2004

Cryptanalysis of an efficient secure group signature scheme.
Operating Systems Review, 2004

A server assisted authentication protocol for detecting error vectors.
Operating Systems Review, 2004

A key authentication scheme with non-repudiation.
Operating Systems Review, 2004

On the efficiency of nonrepudiable threshold proxy signature scheme with known signers.
Journal of Systems and Software, 2004

A new digital signature scheme based on factoring and discrete logarithms.
Int. J. Comput. Math., 2004

A Secure LITESET Scheme.
IEICE Transactions, 2004

Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack.
Fundam. Inform., 2004

A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Future Generation Comp. Syst., 2004

A threshold signature scheme for group communications without a shared distribution center.
Future Generation Comp. Syst., 2004

A new mutual authentication and key exchange protocol with balanced computational power for wireless settings.
European Transactions on Telecommunications, 2004

Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem.
Computer Standards & Interfaces, 2004

Efficient access control and key management schemes for mobile agents.
Computer Standards & Interfaces, 2004

Generalization of proxy signature based on elliptic curves.
Computer Standards & Interfaces, 2004

An efficient user identification scheme based on ID-based cryptosystem.
Computer Standards & Interfaces, 2004

An improvement of nonrepudiable threshold proxy signature scheme with known signers.
Computers & Security, 2004

A (t, n) multi-secret sharing scheme.
Applied Mathematics and Computation, 2004

On the Security of an Enhanced Authentication Key Exchange Protocol.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IEEE Trans. Knowl. Data Eng., 2003

A modified remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electronics, 2003

Security enhancement for optimal strong-password authentication protocol.
Operating Systems Review, 2003

Security enhancement for Optimal Strong-Password Authentication protocol.
Operating Systems Review, 2003

An authentication scheme for mobile satellite communication systems.
Operating Systems Review, 2003

Controlling access in large partially ordered hierarchies using cryptographic keys.
Journal of Systems and Software, 2003

A New Digital Multisignature Scheme With Distinguished Signing Authorities.
J. Inf. Sci. Eng., 2003

Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem.
Informatica, Lith. Acad. Sci., 2003

Security of Improvement on Methods for Protecting Password Transmission.
Informatica, Lith. Acad. Sci., 2003

Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci., 2003

A new privacy and authentication protocol for end-to-end mobile users.
Int. J. Communication Systems, 2003

Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem.
Fundam. Inform., 2003

A new remote user authentication scheme for multi-server architecture.
Future Generation Comp. Syst., 2003

A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Generation Comp. Syst., 2003

A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem.
Computer Standards & Interfaces, 2003

Security enhancement for anonymous secure e-voting over a network.
Computer Standards & Interfaces, 2003

Security enhancement for the timestamp-based password authentication scheme using smart cards.
Computers & Security, 2003

Generalization of proxy signature-based on discrete logarithms.
Computers & Security, 2003

A new key authentication scheme based on discrete logarithms.
Applied Mathematics and Computation, 2003

Traceability on RSA-based partially signature with low computation.
Applied Mathematics and Computation, 2003

A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy.
Proceedings of the Information Networking, 2003

2002
An ElGamal-Like Cryptosystem for Enciphering Large Messages.
IEEE Trans. Knowl. Data Eng., 2002

A remote user authentication scheme using hash functions.
Operating Systems Review, 2002

A flexible remote user authentication scheme using smart cards.
Operating Systems Review, 2002

Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines.
J. Inf. Sci. Eng., 2002

A Feature-Oriented Copyright Owner Proving Technique for Still Images.
International Journal of Software Engineering and Knowledge Engineering, 2002

Cryptanalysis of the Hwang-Shi Proxy Signature Scheme.
Fundam. Inform., 2002

Adding timestamps to the secure electronic auction protocol.
Data Knowl. Eng., 2002

A Solution to Mobile IP Registration for AAA.
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002

2001
A remote password authentication scheme for multiserver architecture using neural networks.
IEEE Trans. Neural Networks, 2001

A simple micro-payment scheme.
Journal of Systems and Software, 2001

A new encryption algorithm for image cryptosystems.
Journal of Systems and Software, 2001

An Improvement of SPLICE/AS in WIDE against Guessing Attack.
Informatica, Lith. Acad. Sci., 2001

Secure access schemes in mobile database systems.
European Transactions on Telecommunications, 2001

Two Simple Batch Verifying Multiple Digital Signatures.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
A new remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electronics, 2000

Digital watermarking of images using neural networks.
J. Electronic Imaging, 2000

Cryptanalysis of YCN key assignment scheme in a hierarchy.
Inf. Process. Lett., 2000

A Digital Watermarking Scheme Using Human Visual Effects.
Informatica (Slovenia), 2000

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci., 2000

Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures.
Informatica, Lith. Acad. Sci., 2000

A New Redundancy Reducing Cipher.
Informatica, Lith. Acad. Sci., 2000

A threshold decryption scheme without session keys.
Computers & Electrical Engineering, 2000

Security Enhancement for the "Simple Authentication Key Agreement Algorithm".
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
Enhanced privacy and authentication for the global system for mobile communications.
Wireless Networks, 1999

A watermarking technique based on one-way hash functions.
IEEE Trans. Consumer Electronics, 1999

A Dynamic Key Generation Scheme for Access Control in a Hierarchy.
Nord. J. Comput., 1999

A Novel Application of the Phone Card and Its Authentication in Mobile Communications.
J. Inf. Sci. Eng., 1999

Cryptanalysis of a remote login authentication scheme.
Computer Communications, 1999

1998
A virtual image cryptosystem based upon vector quantization.
IEEE Trans. Image Processing, 1998

1997
Authenticated key-exchange in a mobile radio network.
European Transactions on Telecommunications, 1997

Multilevel Secure Database Encryption with Subkeys.
Data Knowl. Eng., 1997

1996
An access control scheme based on Chinese remainder theorem and time stamp concept.
Computers & Security, 1996

Phone Card Application and Authentication in Wireless Communications.
IFIP World Conference on Mobile Communications, 1996

1995
A two-phase encryption scheme for enhancing database security.
Journal of Systems and Software, 1995

Conference Key Distribution Schemes for Secure Digital Mobile Communications.
IEEE Journal on Selected Areas in Communications, 1995

1994
A New Dynamic Access Control Scheme Based on Subject-Object List.
Data Knowl. Eng., 1994


  Loading...