Browsing by Author M. S. Hwang

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 24  next >
DateTitleAuthor(s)File
Mar-2004(The 18th International Conference on Advanced Information Networking and Applications, p160-p163)On the Security of an Enhanced Authentication Key Exchange Protocol蔡垂雄; Chwei-Shyong Tsai; M. S. Hwang; T. Y. Chang; S. C. Lin; C. S. Tsai; 國立中興大學資訊管理學系-
2000(24th International Computer Software and Applications Conference:p113-p115)Security Enhancement for the Simple Authentication Key Agreement AlgorithmI. C. Lin; M. S. Hwang; C. C. Chang; 國立中興大學資訊管理學系
Jul-2005(Applied Mathematics and Computation, 166(1):118-112)Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys蔡垂雄; Chwei-Shyong Tsai; C. S. Tsai; S. C. Lin; M. S. Hwang; 國立中興大學資訊管理學系-
Mar-2004(Computer Standards & Interfaces, 24(2):073-084)Generalization of Proxy Signature Based on Elliptic CurvesChwei-Shyong Tsai; 蔡垂雄; M. S. Hwang; S. F. Tzeng; C. S. Tsai; 國立中興大學資訊管理學系-
2003(Computer Standards and Interfaces,25(2):131-139)Security Enhancement for the Anonymous Secure E-Voting over a NetworkI. C. Lin; M. S. Hwang; C. C. Chang; 國立中興大學資訊管理學系
2004(Computer Standards and Interfaces,26(5):423-433)Efficient Access Control and Key Management Schemes for Mobile AgentsI. C. Lin; H. H. Ou; M. S. Hwang; 國立中興大學資訊管理學系
2002(Data & Knowledge Engineering,40(2):155-162)Adding Timestamps to the Secure Electronic Auction ProtocolM. S. Hwang; E. J. L. Lu; I. C. Lin; 國立中興大學資訊管理學系
2005(Designs, Codes, and Cryptography,36(1):053-067)The General Pay-Word:A Micro-payment Scheme Based on n-dimension One-way Hash ChainI. C. Lin; M. S. Hwang; C. C. Chang; 國立中興大學資訊管理學系
2003(Future Generation Computer Systems,19(1):013-022)A New Remote User Authentication Scheme for Multi-Server ArchitectureI. C. Lin; M. S. Hwang; L. H. Li; 國立中興大學資訊管理學系
2003(Future Generation Computer Systems,19(4):457-462)A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in HierarchyI. C. Lin; M. S. Hwang; C. C. Chang; 國立中興大學資訊管理學系
Oct-2005(IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement蔡垂雄; Chwei-Shyong Tsai; H. C. Wu; N. I. Wu; C. S. Tsai; M. S. Hwang; 國立中興大學資訊管理學系-
2003(IEEE International Conference on Information Technology: Research and Education (ITRE 2003), p282-p285)A New Secure Generalization of Threshold Signature Scheme蔡垂雄; Chwei-Shyong Tsai; M. S. Hwang; S. F. Tzeng; C. S. Tsai; 國立中興大學資訊管理學系
2003(IEEE Transactions on Knowledge and Data Engineering,15(6):1552-1560)A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA CryptographyM. S. Hwang; E. J. L. Lu; I. C. Lin; 國立中興大學資訊管理學系
2001(IEEE Transactions on Neural Networks,12(6):1498-1504)A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural NetworkL. H. Li; I. C. Lin; M. S. Hwang; 國立中興大學資訊管理學系
2001(IEEE YUFORIC 2001 Youth Forum in Computer Science and Engineering:p125-p126)An Improvement of Proxy Multi-Signature SchemeM. S. Hwang; C. C. Lee; I. C. Lin; 國立中興大學資訊管理學系-
2004(IEICE Transactions on Information and Systems,E87-D(11):2509-2512)A Secure LITESET SchemeJ. J. Shen; I. C. Lin; M. S. Hwang; 國立中興大學資訊管理學系
2003(Informatica, 14(3):393-402)Improved Non-repudiable Threshold Proxy Signature Scheme with Known Signers蔡垂雄; Chwei-Shyong Tsai; C. S. Tsai; S. F. Tzeng; M. S. Hwang; 國立中興大學資訊管理學系
2000(Informatica,11(1):001-004)Cryptanalysis of The Batch Verifying Multiple RSA Digital SignaturesM. S. Hwang; K. F. Hwang; I. C. Lin; 國立中興大學資訊管理學系
2000(Informatica,11(2):001-008)A secure nonrepudiable threshold proxy signature scheme with known signersM. S. Hwang; I. C. Lin; E. J. L. Lu; 國立中興大學資訊管理學系
2002(Information & Security,08(1):087-097)Two Secure Transportation Schemes for Mobile AgentsL. C. Lin; H. H. Ou; M. S. Hwang; 國立中興大學資訊管理學系