Ren-Junn Hwang

According to our database1, Ren-Junn Hwang authored at least 34 papers between 1992 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Secure Data Collection Scheme for Wireless Sensor Networks.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2015
Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce.
Symmetry, 2015

2014
The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks.
Peer-to-Peer Netw. Appl., 2014

Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks.
Comput. J., 2014

2013
An anonymous distributed routing protocol in mobile ad-hoc networks.
J. Supercomput., 2013

2012
An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks.
IEICE Trans. Commun., 2012

2011
Privacy protection on Vehicular Ad hoc NETworks.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Secure Communication Scheme of VANET with Privacy Preserving.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

2010
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks.
Int. J. Secur. Networks, 2010

2007
Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices.
Wirel. Pers. Commun., 2007

A new mobile payment scheme for roaming services.
Electron. Commer. Res. Appl., 2007

Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers.
Comput. J., 2007

2006
Key agreement in ad hoc networks.
Int. J. Comput. Sci. Eng., 2006

2005
Cryptanalysis on stream ciphers for GSM networks.
Int. J. Internet Protoc. Technol., 2005

A new efficient authentication protocol for mobile networks.
Comput. Stand. Interfaces, 2005

An efficient signcryption scheme with forward secrecy based on elliptic curve.
Appl. Math. Comput., 2005

Key Agreement Protocol Based on Weil Pairing.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Efficient Decryption Method for RSA Cryptosystem.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
A new scheme to protect confidential images.
J. Interconnect. Networks, 2004

An Agent-Based Consumer Recommendation Mechanism.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
The Improvement of Steganography Capacity.
Proceedings of the 9th International Conference on Multi-Media Modeling, 2003

A Method for Sending Confidential Messages to a Group without Trusted Parties.
Proceedings of the Parallel and Distributed Processing and Applications, 2003

Enhanced Authentication Key Agreement Protocol.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

An Enhanced Authentication Key Exchange Protocol .
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
Digital Watermarking Based on Pixels Relationships.
Proceedings of the 6th Joint Conference on Information Science, 2002

Watermark in Color Image.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

2001
Lossy Compression Tolerant Steganography.
Proceedings of the Human Society and the Internet, 2001

1999
A concept of designing cheater identification methods for secret sharing.
J. Syst. Softw., 1999

An Improved Threshold Scheme Based on Modular ARithmetic.
J. Inf. Sci. Eng., 1999

1998
Sharing Secret Omages using Shadow Codebooks.
Inf. Sci., 1998

An on-line secret sharing scheme for multi-secrets.
Comput. Commun., 1998

1993
Master Keys for an M <sup> 3 </sup> Cryptoscheme.
Cryptologia, 1993

1992
Crypographic key assignment scheme for access control in a hierarchy.
Inf. Syst., 1992


  Loading...