Shin-Jia Hwang
According to our database1,
Shin-Jia Hwang
authored at least 25 papers
between 1994 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
1
1
5
3
3
1
1
1
1
1
1
2
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
A Detector Using Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious JavaScript with Obfuscations.
Proceedings of the New Trends in Computer Technologies and Applications, 2022
2014
A Strong Designated Verifier Ring Signcryption Scheme Providing Strongest Signers' Anonymity.
J. Inf. Sci. Eng., 2014
Universal Forgery on Shen et al.'s Linkable and Convertible ID-based Ring Signature Scheme.
Proceedings of the Intelligent Systems and Applications, 2014
2013
A Delegation-Based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
2011
J. Syst. Softw., 2011
2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2005
Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems.
Appl. Math. Comput., 2005
Security of Hsu-Wu's authenticated encryption scheme with (t, n) shared verification.
Appl. Math. Comput., 2005
Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Comput. Secur., 2004
Appl. Math. Comput., 2004
2003
J. Inf. Sci. Eng., 2003
Informatica, 2003
2002
1997
1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994