Ren-Chiun Wang

According to our database1, Ren-Chiun Wang authored at least 18 papers between 2004 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Provably secure and efficient identification and key agreement protocol with user anonymity.
J. Comput. Syst. Sci., 2011

Robust authentication and key agreement scheme preserving the privacy of secret key.
Comput. Commun., 2011

2010
A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems.
Int. J. Ad Hoc Ubiquitous Comput., 2010

2009
User authentication scheme with privacy-preservation for multi-server environment.
IEEE Commun. Lett., 2009

2008
An Anonymous and Deniable Conversation for a Thin Client.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards.
Int. J. Netw. Secur., 2006

2005
Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
IEICE Trans. Commun., 2005

A protected password change protocol
CoRR, 2005

Secure authentication scheme for session initiation protocol.
Comput. Secur., 2005

Note on Robust and Simple Authentication Protocol.
Comput. J., 2005

An improvement of the Yang-Shieh password authentication schemes.
Appl. Math. Comput., 2005

Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function.
Appl. Math. Comput., 2005

A secure and efficient authentication protocol for anonymous channel in wireless communications.
Appl. Math. Comput., 2005

2004
Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004

An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards.
ACM SIGOPS Oper. Syst. Rev., 2004

Cryptanalysis of a user friendly remote authentication scheme with smart cards.
Comput. Secur., 2004


  Loading...