Shin-Jia Hwang

According to our database1, Shin-Jia Hwang authored at least 25 papers between 1994 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Detector Using Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious JavaScript with Obfuscations.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

2014
A Strong Designated Verifier Ring Signcryption Scheme Providing Strongest Signers' Anonymity.
J. Inf. Sci. Eng., 2014

Universal Forgery on Shen et al.'s Linkable and Convertible ID-based Ring Signature Scheme.
Proceedings of the Intelligent Systems and Applications, 2014

2013
A Delegation-Based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Security Flaws of Off-Line Micro Payment Scheme with Dual Signatures.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

2011
Confidential deniable authentication using promised signcryption.
J. Syst. Softw., 2011

2009
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2005
New threshold-proxy threshold-signature schemes.
Comput. Electr. Eng., 2005

Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems.
Appl. Math. Comput., 2005

Security of Hsu-Wu's authenticated encryption scheme with (t, n) shared verification.
Appl. Math. Comput., 2005

Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves.
Appl. Math. Comput., 2005

Improvement of Tseng et al.'s authenticated encryption scheme.
Appl. Math. Comput., 2005

A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Improvement on Li et al.'s generalization of proxy signature schemes.
Comput. Secur., 2004

Repairing ElGamal-like multi-signature schemes using self-certified public keys.
Appl. Math. Comput., 2004

New multi-proxy multi-signature schemes.
Appl. Math. Comput., 2004

2003
A New Digital Multisignature Scheme With Distinguished Signing Authorities.
J. Inf. Sci. Eng., 2003

Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers.
Informatica, 2003

Cryptanalysis of Shieh-Lin-Yang-Sun signature scheme.
IEEE Commun. Lett., 2003

2002
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme.
Fundam. Informaticae, 2002

1997
A Simple Approach for Generating RSA Keys.
Inf. Process. Lett., 1997

1996
Autenticated Encryption Schemes with Message Linkage.
Inf. Process. Lett., 1996

A dynamic secret sharing scheme with cheater detection.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
New concepts for multiple stack systems: Born and reborn.
J. Syst. Softw., 1994


  Loading...