Browsing by Author M. S. Hwang

Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 24  next >
Issue DateTitleAuthor(s)Text
-(The 18th International Conference on Advanced Information Networking and Applications, p160-p163)On the Security of an Enhanced Authentication Key Exchange ProtocolM. S. Hwang; T. Y. Chang; S. C. Lin; C. S. Tsai-
-(24th International Computer Software and Applications Conference:p113-p115)Security Enhancement for the Simple Authentication Key Agreement AlgorithmI. C. Lin; M. S. Hwang; C. C. Chang
-(Applied Mathematics and Computation, 166(1):118-112)Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public KeysC. S. Tsai; S. C. Lin; M. S. Hwang-
-(Computer Standards & Interfaces, 24(2):073-084)Generalization of Proxy Signature Based on Elliptic CurvesM. S. Hwang; S. F. Tzeng; C. S. Tsai-
-(Computer Standards and Interfaces,25(2):131-139)Security Enhancement for the Anonymous Secure E-Voting over a NetworkI. C. Lin; M. S. Hwang; C. C. Chang
-(Computer Standards and Interfaces,26(5):423-433)Efficient Access Control and Key Management Schemes for Mobile AgentsI. C. Lin; H. H. Ou; M. S. Hwang
-(Data & Knowledge Engineering,40(2):155-162)Adding Timestamps to the Secure Electronic Auction ProtocolM. S. Hwang; E. J. L. Lu; I. C. Lin
-(Designs, Codes, and Cryptography,36(1):053-067)The General Pay-Word:A Micro-payment Scheme Based on n-dimension One-way Hash ChainI. C. Lin; M. S. Hwang; C. C. Chang
-(Future Generation Computer Systems,19(1):013-022)A New Remote User Authentication Scheme for Multi-Server ArchitectureI. C. Lin; M. S. Hwang; L. H. Li
-(Future Generation Computer Systems,19(4):457-462)A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in HierarchyI. C. Lin; M. S. Hwang; C. C. Chang
-(IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB ReplacementH. C. Wu; N. I. Wu; C. S. Tsai; M. S. Hwang-
-(IEEE International Conference on Information Technology: Research and Education (ITRE 2003), p282-p285)A New Secure Generalization of Threshold Signature SchemeM. S. Hwang; S. F. Tzeng; C. S. Tsai
-(IEEE Transactions on Knowledge and Data Engineering,15(6):1552-1560)A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA CryptographyM. S. Hwang; E. J. L. Lu; I. C. Lin
-(IEEE Transactions on Neural Networks,12(6):1498-1504)A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural NetworkL. H. Li; I. C. Lin; M. S. Hwang
-(IEEE YUFORIC 2001 Youth Forum in Computer Science and Engineering:p125-p126)An Improvement of Proxy Multi-Signature SchemeM. S. Hwang; C. C. Lee; I. C. Lin-
-(IEICE Transactions on Information and Systems,E87-D(11):2509-2512)A Secure LITESET SchemeJ. J. Shen; I. C. Lin; M. S. Hwang
-(Informatica, 14(3):393-402)Improved Non-repudiable Threshold Proxy Signature Scheme with Known SignersC. S. Tsai; S. F. Tzeng; M. S. Hwang
-(Informatica,11(1):001-004)Cryptanalysis of The Batch Verifying Multiple RSA Digital SignaturesM. S. Hwang; K. F. Hwang; I. C. Lin
-(Informatica,11(2):001-008)A secure nonrepudiable threshold proxy signature scheme with known signersM. S. Hwang; I. C. Lin; E. J. L. Lu
-(Information & Security,08(1):087-097)Two Secure Transportation Schemes for Mobile AgentsL. C. Lin; H. H. Ou; M. S. Hwang