Min-Shiang Hwang

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Password authenticated key exchange and protected password change protocols
Symmetry
2019-11-13Paper
An ElGamal-like secure channel free public key encryption with keyword search scheme
International Journal of Foundations of Computer Science
2019-06-24Paper
The moderately hard DoS-resistant authentication protocol on client puzzles2018-05-17Paper
A new proxy signature scheme for a specified group of verifiers
Information Sciences
2014-08-01Paper
A simple key assignment for access control based on polynomial
Arabian Journal for Science and Engineering
2013-08-05Paper
Cryptanalysis on an improved version of ElGamal-like public-key encryption scheme for encrypting large messages2013-06-11Paper
A batch verification for multiple proxy signature
Parallel Processing Letters
2012-12-12Paper
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Information Sciences
2012-06-04Paper
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences
2011-03-28Paper
A simple mobile communication billing system among charged parties
Applied Mathematics and Computation
2010-09-01Paper
A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM
International Journal of Foundations of Computer Science
2009-06-23Paper
An efficient multi-round anonymous auction protocol
Journal of Discrete Mathematical Sciences and Cryptography
2008-03-06Paper
A new convertible authenticated encryption scheme with message linkages
Computers and Electrical Engineering
2007-03-02Paper
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
2006-06-30Paper
A secure strong-password authentication protocol2006-06-19Paper
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures
Applied Mathematics and Computation
2006-04-28Paper
A time-stamping protocol for digital watermarking
Applied Mathematics and Computation
2005-11-14Paper
The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain
Designs, Codes and Cryptography
2005-08-17Paper
Simple authenticated key agreement and protected password change protocol
Computers & Mathematics with Applications
2005-08-05Paper
Cryptanalysis of an authenticated encryption scheme using self-certified public keys
Applied Mathematics and Computation
2005-08-05Paper
A new blind signature based on the discrete logarithm problem for untraceability
Applied Mathematics and Computation
2005-06-13Paper
An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme
Applied Mathematics and Computation
2005-05-04Paper
Improvement of signature scheme based on factoring and discrete logarithms
Applied Mathematics and Computation
2005-02-22Paper
A new proxy signature scheme with revocation
Applied Mathematics and Computation
2005-02-22Paper
scientific article; zbMATH DE number 2113984 (Why is no real title available?)2004-11-05Paper
scientific article; zbMATH DE number 2112199 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 2112210 (Why is no real title available?)2004-10-28Paper
A \((t,n)\) multi-secret sharing scheme
Applied Mathematics and Computation
2004-08-06Paper
scientific article; zbMATH DE number 2080695 (Why is no real title available?)2004-08-04Paper
A new digital signature scheme based on factoring and discrete logarithms
International Journal of Computer Mathematics
2004-05-27Paper
scientific article; zbMATH DE number 2061980 (Why is no real title available?)2004-03-25Paper
scientific article; zbMATH DE number 1998329 (Why is no real title available?)2004-02-18Paper
scientific article; zbMATH DE number 2006822 (Why is no real title available?)2003-11-23Paper
scientific article; zbMATH DE number 2006800 (Why is no real title available?)2003-11-23Paper
A simple remote user authentication scheme
Mathematical and Computer Modelling
2003-10-14Paper
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
2003-09-09Paper
scientific article; zbMATH DE number 1977217 (Why is no real title available?)2003-09-08Paper
scientific article; zbMATH DE number 1876856 (Why is no real title available?)2003-05-14Paper
A threshold decryption scheme without session keys
Computers and Electrical Engineering
2003-02-20Paper
A new remote user authentication scheme for multi-server architecture
Future Generation Computer Systems
2003-01-21Paper
Cryptanalysis of YCN key assignment scheme in a hierarchy
Information Processing Letters
2002-07-25Paper
A digital watermarking scheme using human visual effects
Informatica (Ljubljana)
2002-04-15Paper
Adding timestamps to the secure electronic auction protocol
Data & Knowledge Engineering
2002-03-03Paper
An improvement of SPLICE/AS in WIDE against guessing attack
Informatica (Vilnius)
2002-02-28Paper
scientific article; zbMATH DE number 1877162 (Why is no real title available?)2002-01-01Paper
Improved digital signature scheme based on factoring and discrete logarithms
Journal of Discrete Mathematical Sciences and Cryptography
2002-01-01Paper
scientific article; zbMATH DE number 1508174 (Why is no real title available?)2000-11-22Paper
scientific article; zbMATH DE number 1472274 (Why is no real title available?)2000-10-26Paper
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
2000-09-06Paper
scientific article; zbMATH DE number 1436132 (Why is no real title available?)2000-04-26Paper
An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies<sup>∗</sup>
International Journal of Computer Mathematics
2000-04-09Paper
An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy
Computers & Mathematics with Applications
2000-01-20Paper
A new redundancy reducing cipher
Informatica (Vilnius)
2000-01-01Paper
A remote password authentication scheme based on the digital signature method
International Journal of Computer Mathematics
1999-04-29Paper
Multilevel secure database encryption with subkeys
Data & Knowledge Engineering
1998-07-23Paper
A cryptographic key assignment scheme in a hierarchy for access control
Mathematical and Computer Modelling
1998-07-01Paper


Research outcomes over time


This page was built for person: Min-Shiang Hwang