Shih-Chang Chang

According to our database1, Shih-Chang Chang authored at least 18 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.
Int. J. Netw. Secur., 2018

2017
An Efficient and Secure Smart Card Based Password Authentication Scheme.
Int. J. Netw. Secur., 2017

2016
Robust off-line e-cash scheme with recoverability and anonymity revocation.
Secur. Commun. Networks, 2016

A highly efficient and secure electronic cash system based on secure sharing in cloud environment.
Secur. Commun. Networks, 2016

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
Int. J. Netw. Secur., 2016

A Strong RSA-based and Certificateless-based Signature Scheme.
Int. J. Netw. Secur., 2016

2015
An image-based key agreement protocol using the morphing technique.
Multim. Tools Appl., 2015

A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management.
J. Inf. Hiding Multim. Signal Process., 2015

2014
An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem.
Int. J. Netw. Secur., 2014

2013
Authenticated RFID security mechanism based on chaotic maps.
Secur. Commun. Networks, 2013

A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment.
Secur. Commun. Networks, 2013

An Efficient Oblivious Transfer Protocol Using Residue Number System.
Int. J. Netw. Secur., 2013

2011
Design of a signal processing circuit for quartz crystal microbalance biosensors.
Proceedings of the 2011 IEEE 9th International Conference on ASIC, 2011

2010
The Design of E-Traveler's Check with Efficiency and Mutual Authentication.
J. Networks, 2010

An Improved Biometrics-based User Authentication Scheme without Concurrency System.
Int. J. Intell. Inf. Process., 2010

2009
An on-line electronic check system with mutual authentication.
Comput. Electr. Eng., 2009

Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008


  Loading...