Min-Shiang Hwang
Orcid: 0000-0001-5502-8033
According to our database1,
Min-Shiang Hwang
authored at least 224 papers
between 1994 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Informatica, 2023
An Improvement of A Lightweight NFC Authentication Algorithm Based on Modified Hash Function.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
Proceedings of the 12th International Conference on Awareness Science and Technology, 2023
2022
An improved efficient authentication scheme for vehicular ad hoc networks with batch verification using bilinear pairings.
Int. J. Embed. Syst., 2022
A certificateless aggregate signature scheme for security and privacy protection in VANET.
Int. J. Distributed Sens. Networks, 2022
Future Gener. Comput. Syst., 2022
A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs.
IEEE Access, 2022
2021
A Reversible Data Hiding Based on Histogram Shifting of Prediction Errors for Two-Tier Medical Images.
Informatica, 2021
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
2020
Informatica, 2020
Int. J. Netw. Secur., 2020
Int. J. Netw. Secur., 2020
Int. J. Netw. Secur., 2020
2019
Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks.
J. Supercomput., 2019
Int. J. Netw. Secur., 2019
Int. J. Netw. Secur., 2019
Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.
Int. J. Netw. Secur., 2019
An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme.
Int. J. Found. Comput. Sci., 2019
2018
A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching.
Int. J. Netw. Secur., 2018
Int. J. Netw. Secur., 2018
Int. J. Netw. Secur., 2018
Proceedings of the Information Science and Applications 2018, 2018
Proceedings of the Information Science and Applications 2018, 2018
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
2017
Symmetry, 2017
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service.
J. Circuits Syst. Comput., 2017
Int. J. Netw. Secur., 2017
A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms.
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
Int. J. Mob. Commun., 2017
Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images.
Displays, 2017
Proceedings of the Information Science and Applications 2017, 2017
2016
Informatica, 2016
Informatica, 2016
Int. J. Netw. Secur., 2016
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage.
Int. J. Netw. Secur., 2016
A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing.
Int. J. Netw. Secur., 2016
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach.
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Proceedings of the 3rd International Conference on Systems and Informatics, 2016
Cryptanalysis of Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-Server Environment Using Smart Card.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
2015
Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance.
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
2014
Inf. Technol. Control., 2014
Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey.
Int. J. Netw. Secur., 2014
Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments.
Int. J. Netw. Secur., 2014
Int. J. Netw. Secur., 2014
Autom. Softw. Eng., 2014
Proceedings of the Intelligent Systems and Applications, 2014
2013
Wirel. Pers. Commun., 2013
Towards secure and efficient user authentication scheme using smart card for multi-server environments.
J. Supercomput., 2013
Parallel Process. Lett., 2013
A reversible data hiding method by histogram shifting in high quality medical images.
J. Syst. Softw., 2013
KSII Trans. Internet Inf. Syst., 2013
Int. J. Netw. Secur., 2013
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
Int. J. Netw. Secur., 2013
Downlink Relay Selection Algorithm for Amplify-and-Forward Cooperative Communication Systems.
Proceedings of the Seventh International Conference on Complex, 2013
Proceedings of the ACM Cloud and Autonomic Computing Conference, 2013
2012
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages.
Informatica, 2012
Int. J. Mob. Commun., 2012
Int. J. Mob. Commun., 2012
2011
Telecommun. Syst., 2011
J. Syst. Softw., 2011
Inf. Technol. Control., 2011
An efficient key assignment scheme for access control in a large leaf class hierarchy.
Inf. Sci., 2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks.
Inf. Sci., 2011
Inf. Sci., 2011
User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications.
Int. J. Mob. Commun., 2011
Eur. Trans. Telecommun., 2011
2010
J. Syst. Softw., 2010
J. Syst. Softw., 2010
J. Netw. Comput. Appl., 2010
2009
Flexible RFID location system based on artificial neural networks for medical care facilities.
SIGBED Rev., 2009
Inf. Manag. Comput. Secur., 2009
Int. J. Netw. Manag., 2009
Int. J. Found. Comput. Sci., 2009
EURASIP J. Wirel. Commun. Netw., 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
Wirel. Commun. Mob. Comput., 2008
A high quality steganographic method with pixel-value differencing and modulus function.
J. Syst. Softw., 2008
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Syst. Sci. Eng., 2008
An electronic voting protocol with deniable authentication for mobile ad hoc networks.
Comput. Commun., 2008
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments.
Comput. Commun., 2008
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks.
Comput. Commun., 2008
An Improvement of Strong Proxy Signature and Its Applications.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
Comput. Electr. Eng., 2007
Appl. Math. Comput., 2007
Proceedings of the Computational Science and Its Applications, 2007
2006
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments.
IEEE Trans. Ind. Electron., 2006
Int. J. Netw. Secur., 2006
Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows.
IEICE Trans. Inf. Syst., 2006
Appl. Math. Comput., 2006
Identity-based deniable authentication protocol from pairings.
Proceedings of the Tenth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), 2006
2005
Telecommun. Syst., 2005
ACM SIGOPS Oper. Syst. Rev., 2005
Neural Comput. Appl., 2005
Int. J. Netw. Secur., 2005
Int. J. Netw. Secur., 2005
Int. J. Comput. Appl. Technol., 2005
The General Pay-Word: A Micro-payment Scheme Based on <i>n</i>-dimension One-way Hash Chain.
Des. Codes Cryptogr., 2005
Comput. Secur., 2005
Cryptanalysis of an authenticated encryption scheme using self-certified public keys.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme.
Appl. Math. Comput., 2005
2004
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication.
Wirel. Pers. Commun., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers.
J. Syst. Softw., 2004
Int. J. Comput. Math., 2004
Fundam. Informaticae, 2004
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Future Gener. Comput. Syst., 2004
A threshold signature scheme for group communications without a shared distribution center.
Future Gener. Comput. Syst., 2004
A new mutual authentication and key exchange protocol with balanced computational power for wireless settings.
Eur. Trans. Telecommun., 2004
Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem.
Comput. Stand. Interfaces, 2004
Comput. Stand. Interfaces, 2004
Comput. Stand. Interfaces, 2004
Comput. Stand. Interfaces, 2004
Comput. Secur., 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
IEEE Trans. Knowl. Data Eng., 2003
IEEE Trans. Consumer Electron., 2003
ACM SIGOPS Oper. Syst. Rev., 2003
ACM SIGOPS Oper. Syst. Rev., 2003
J. Syst. Softw., 2003
J. Inf. Sci. Eng., 2003
Informatica, 2003
Informatica, 2003
Informatica, 2003
Int. J. Commun. Syst., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Fundam. Informaticae, 2003
Future Gener. Comput. Syst., 2003
A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Gener. Comput. Syst., 2003
A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem.
Comput. Stand. Interfaces, 2003
Comput. Stand. Interfaces, 2003
Security enhancement for the timestamp-based password authentication scheme using smart cards.
Comput. Secur., 2003
Appl. Math. Comput., 2003
Appl. Math. Comput., 2003
Proceedings of the Information Networking, 2003
2002
IEEE Trans. Knowl. Data Eng., 2002
ACM SIGOPS Oper. Syst. Rev., 2002
ACM SIGOPS Oper. Syst. Rev., 2002
J. Inf. Sci. Eng., 2002
Int. J. Softw. Eng. Knowl. Eng., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002
2001
A remote password authentication scheme for multiserver architecture using neural networks.
IEEE Trans. Neural Networks, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
IEEE Trans. Consumer Electron., 2000
A Digital Watermarking Scheme Using Human Visual Effects.
Informatica (Slovenia), 2000
Informatica, 2000
Informatica, 2000
An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies.
Int. J. Comput. Math., 2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
1999
Wirel. Networks, 1999
IEEE Trans. Consumer Electron., 1999
A Dynamic Key Generation Scheme for Access Control in a Hierarchy.
Nord. J. Comput., 1999
A Novel Application of the Phone Card and Its Authentication in Mobile Communications.
J. Inf. Sci. Eng., 1999
Int. J. Comput. Math., 1999
1998
IEEE Trans. Image Process., 1998
1997
1996
Comput. Secur., 1996
Phone Card Application and Authentication in Wireless Communications.
Proceedings of the Mobile Communications: Technology, 1996
1995
IEEE J. Sel. Areas Commun., 1995
1994
Data Knowl. Eng., 1994