Biblio
Export 27 results:
Filters: Автор is Min-Shiang Hwang [Clear All Filters]
"A Conference Key Scheme Based on the Die-Hellman Key Exchange." International Journal of Network Security 20, no. 6 (2018): 1221-1226.
"A Conference Key Distribution Scheme in Tree Hierarchies." International Journal of Network Security 15, no. 1 (2013): 59{64.
Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme In International Conference on Next Generation Web Services Practices., 2005.
"Challenges in E-Government and Security of Information." Information & Security: An International Journal 15, no. 1 (2004): 9-20.
"Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function." Information & Security: An International Journal 15, no. 1 (2004): 110-114.
"Efficient access control and key management schemes for mobile agents." Computer Standards & Interfaces 26, no. 5 (2004): 423-433.
A Modified Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 49, no. 2 (2003): 414-416.
"Security Enhancement for Anonymous Secure e-Voting over a Network." Computer Standards & Interfaces 25, no. 2 (2003): 131-139.
"An Untraceable Blind Signature Scheme." IEICE Transactions on Foundations 7 (2003): 1902-1906.
"Adding Timestamps to the Secure Electronic Auction Protocol." Data & Knowledge Engineering 40, no. 2 (2002): 155-162.
""A Flexible Remote User Authentication Scheme with Smart Cards." ACM Operating System Review 36, no. 3 (2002): 46-52.
A Remote User Authentication Scheme Using Hash Functions." ACM SIGOPS Operating Systems Review 36, no. 4 (2002): 23-29.
"A Remote User Authentication Scheme Using Smart Cards." ACM Operating Systems Review 36, no. 4 (2002): 23-29.
"A Simple Remote User Authentication Scheme." Mathematical and Computer Modelling 36 (2002): 103-107.
"Traceability on Low-Computation Partially Blind Signatures for Electronic Cash." IEICE Fundamentals on Electronics, Communications and Computer Sciences E85-A 5 (2002): 1181-1182.
""Two Secure Transportation Schemes for Mobile Agents." Information & Security: An International Journal 8 (2002): 87-97.
Secure Access Schemes in Mobile Database Systems." European Transactions on Telecommunications 12, no. 4 (2001): 303-310.
"Secure access schemes in mobile database systems." European Transactions on Telecommunications 12, no. 4 (2001).
"A Simple Micro-payment Scheme." Journal of Systems and Software 55, no. 3 (2001): 221-229.
"Digital Watermarking of Images Using Neural Networks." Journal of Electronic Imaging 9, no. 4 (2000): 548-555.
"A Digital Watermarking Scheme Using Human Visual Effects." Informatica: An International Journal of Computing and Informatics 24, no. 4 (2000): 505-511.
"A New Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 1 (2000): 28-30.
"Cryptanalysis of a Remote Login Authentication Scheme." Computer Communications 22 (1999): 742-744.
"Multilevel Secure Database Encryption with Subkeys." Data and Knowledge Engineering 2, no. 22 (1997): 117-131.
"Conference Key Distribution Protocols for Digital Mobile Communication Systems." IEEE Journal on Selected Areas in Communications 13, no. 2 (1995).
"