Min-Shiang Hwang

From MaRDI portal
Person:424782

Available identifiers

zbMath Open hwang.minshiangMaRDI QIDQ424782

List of research outcomes





PublicationDate of PublicationType
Password authenticated key exchange and protected password change protocols2019-11-13Paper
An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme2019-06-24Paper
https://portal.mardi4nfdi.de/entity/Q46402362018-05-17Paper
A new proxy signature scheme for a specified group of verifiers2014-08-01Paper
A simple key assignment for access control based on polynomial2013-08-05Paper
https://portal.mardi4nfdi.de/entity/Q49250722013-06-11Paper
A BATCH VERIFICATION FOR MULTIPLE PROXY SIGNATURE2012-12-12Paper
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks2012-06-04Paper
An efficient key assignment scheme for access control in a large leaf class hierarchy2011-03-28Paper
A simple mobile communication billing system among charged parties2010-09-01Paper
A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM2009-06-23Paper
An efficient multi-round anonymous auction protocol2008-03-06Paper
A new convertible authenticated encryption scheme with message linkages2007-03-02Paper
A password authentication scheme over insecure networks2006-06-30Paper
A secure strong-password authentication protocol2006-06-19Paper
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures2006-04-28Paper
A time-stamping protocol for digital watermarking2005-11-14Paper
The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain2005-08-17Paper
Simple authenticated key agreement and protected password change protocol2005-08-05Paper
Cryptanalysis of an authenticated encryption scheme using self-certified public keys2005-08-05Paper
A new blind signature based on the discrete logarithm problem for untraceability2005-06-13Paper
An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme2005-05-04Paper
Improvement of signature scheme based on factoring and discrete logarithms2005-02-22Paper
A new proxy signature scheme with revocation2005-02-22Paper
https://portal.mardi4nfdi.de/entity/Q48257232004-11-05Paper
https://portal.mardi4nfdi.de/entity/Q48236562004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48236712004-10-28Paper
A \((t,n)\) multi-secret sharing scheme2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44735992004-08-04Paper
A new digital signature scheme based on factoring and discrete logarithms2004-05-27Paper
https://portal.mardi4nfdi.de/entity/Q44577642004-03-25Paper
https://portal.mardi4nfdi.de/entity/Q44329632004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44361192003-11-23Paper
https://portal.mardi4nfdi.de/entity/Q44360902003-11-23Paper
A simple remote user authentication scheme2003-10-14Paper
A new key authentication scheme based on discrete logarithms2003-09-09Paper
https://portal.mardi4nfdi.de/entity/Q44237362003-09-08Paper
https://portal.mardi4nfdi.de/entity/Q47965292003-05-14Paper
A threshold decryption scheme without session keys2003-02-20Paper
A new remote user authentication scheme for multi-server architecture2003-01-21Paper
Cryptanalysis of YCN key assignment scheme in a hierarchy2002-07-25Paper
A digital watermarking scheme using human visual effects2002-04-15Paper
Adding timestamps to the secure electronic auction protocol2002-03-03Paper
An improvement of SPLICE/AS in WIDE against guessing attack2002-02-28Paper
Improved digital signature scheme based on factoring and discrete logarithms2002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q47967582002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q45062002000-11-22Paper
https://portal.mardi4nfdi.de/entity/Q44899912000-10-26Paper
A virtual image cryptosystem based upon vector quantization2000-09-06Paper
https://portal.mardi4nfdi.de/entity/Q49487292000-04-26Paper
An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies2000-04-09Paper
An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy2000-01-20Paper
A new redundancy reducing cipher2000-01-01Paper
A remote password authentication scheme based on the digital signature method1999-04-29Paper
Multilevel secure database encryption with subkeys1998-07-23Paper
A cryptographic key assignment scheme in a hierarchy for access control1998-07-01Paper

Research outcomes over time

This page was built for person: Min-Shiang Hwang