Refereed International Conferences (Min-Shiang Hwang)

1.Min-Shiang Hwang, Eko Fajar Cahyadi, Yung-Chen Chou, Cheng-Ying Yang, “Cryptanalysis of Kumar’s Remote User Authentication Scheme with Smart Cards”, 2018 14th International Conference on Computational Intelligence and Security (CIS2018), pp. 416-420, IEEExPlore http://conferences.computer.org/cis/2018, Nov. 16-19, 2018, Hangzhou. (EI/Scopus) P399.pdf

2.Min-Shiang Hwang, Eko Fajar Cahyadi, Cheng-Ying Yang, Shu-Fen Chiou, “An Improvement of the Remote Authentication Scheme for Anonymous Users Using an Elliptic Curve Cryptosystem”, IEEE 4th International Conference on Computer and Communications (IEEE ICCC2018), pp. 1872-1877, IEEExPlore, Dec. 7-10, 2018, Chengdu. (EI/Scopus) P389.pdf

3.Bambang Irawan and Min-Shiang Hwang, “The Weakness of Moon et al.’s Password Authentication Scheme”, 3rd Annual International Conference on Information System and Artificial Intelligence (ISAI2018), June 22nd-24th, 2018, Suzhou, Jiangsu, China. Journal of Physics: Conference Series, Vol. 1069, 2018 http://iopscience.iop.org/issue/1742-6596/1069/1 (EI/Scopus) P331.pdf 

4. Min-Shiang Hwang, Hung-Wei Yang and Cheng-Ying Yang, “An Improved Hou-Wang’s User Authentication Scheme”, Information Science and Applications 2018 (June 25-27, 2018, HongKong), Lecture Notes in Electrical Engineering 514, https://doi.org/10.1007/978-981-13-1056-0_31 (EI/Scopus)  P393.pdf

5.Cheng-Ying Yang, Tsai-Yuan Chung, Min-Shiang Hwang, Cheng-Yi Li, and Jenq-Foung JF Yao, "Learning Performance Evaluation in eLearning with The Web-based Assessment," 8th iCatse Conference on Information Science and Applications 2017 (ICISA 2017), Lecture Notes in Electrical Engineering, v 424, pp. 645-651, March 20th to 23rd, 2017 in Macau, China. P294.pdf (EI)

6.Hsieh-Tsen Pan, Chiu-Shu Pan, Shyh-Chang Tsaur, and Min-Shiang Hwang*, "Cryptanalysis of Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card," 2016 12th International Conference on Computational Intelligence and Security (CIS2016), December 16-19, 2016, Wuxi, Jiangsu Province, China, pp. 590-593, 2017. (EI/Scopus)  P375.pdf

7.Chiu-Shu Pan, Cheng-Yi Tsai, Shyh-Chang Tsaur, and Min-Shiang Hwang, " Cryptanalysis of an efficient password authentication scheme," The 2016 3rd IEEE International Conference on Systems and Informatics (ICSAI 2016), pp. 732-737, Shaihai, Nov. 19-21, 2016. P374.pdf (EI/Scopus)

8.Cheng-Yi Tsai, Chiu-Shu Pan and Min-Shiang Hwang, "An Improved Password Authentication Scheme for Smart Card," Advances in Intelligent Systems and Computing, Recent Developments in Intelligent Systems and Interactive Applications, Volume 541, pp. 194-199, 2017 (ISBN: 9783319495675). 2016 International Conference on Intelligent and Interactive Systems and Applications (IISA2016), Shaihai, June 25-26, 2016. (EI/Scopus)  P355.pdf

9. Chi-Wei Liu, Cheng-Yi Tsai, and Min-Shiang Hwang, "Cryptanalysis of an Efficient and Secure Smart Card Based Password Authentication Scheme," Advances in Intelligent Systems and Computing, Recent Developments in Intelligent Systems and Interactive Applications, Volume 541, pp. 188-193, 2017 (ISBN: 9783319495675). 2016 International Conference on Intelligent and Interactive Systems and Applications (IISA2016), Shaihai, 2016. (EI/Scopus) P373.pdf

10. Iuon-Chang Lin, Cheng-Yi Tsai, Fang-Yi Shan,Yu-Shiang Hsu, and Min-Shiang Hwang, "The Analysis of E-book Business Models in Taiwan," 2016 5th EEM International Conference on Hospitality, Leisure, Sport,Tourism & Education, December 20-21, 2016, Nadi, Fiji. P377.pdf

11. Chung-Huei Ling, Wan-Yu Chao, Shih-Ming Chen, and Min-Shiang Hwang, "Cryptanalysis of Dynamic Identity Based on a Remote User Authentication Scheme for a Multi-server Environment," 2015 International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015), Zhengzhou, April 11-12, 2015, Advances in Engineering Research, vol. 15, pp. 981-986, Atlantis Press, 2015. P357.pdf

12. Tung-Huang Feng, Wan-Yu Chao, and Min-Shiang Hwang, "Cryptanalysis and Improvement of the Li-Liu-Wu User Authentication Scheme," 2014 International Conference on Future Communication Technology and Engineering (FCTE2014), pp. 103-106, Shenzhen China, November 16-17, 2014. (EI)  P343.pdf 

13. Jia-Rong Sun, Shu-Chen Lin1, and Min-Shiang Hwang, "Cryptanalysis and Improvement of a Directed Digital Signature Scheme Using Non-interactive Public-key Distribution System," 2014 International Conference on Future Communication Technology and Engineering (FCTE2014), pp. 99-102, Shenzhen China, November 16-17, 2014. (EI) P205.pdf

14. Te-Yu Chen, Chung-Huei Ling, and Min-Shiang Hwang, "Weaknesses of the Yoon-Kim-Yoo Remote User Authentication Scheme Using Smart Cards," 2014 International Conference on Information Technology and Biomedical Engineering (ICITBE 2014), May 30-31, 2014, Chongqing, China. (EI)   Proceedings - 2014 IEEE Workshop on Electronics, Computer and Applications, IWECA 2014, University of Ottawa, Ottawa, ON, Canada, 08 May - 09 May 2014, pp. 771-774, 2014. P193.pdf     

15.  Cheng-Chi Lee, Chia-Hsin Liu, and Min-Shiang Hwang, "Guessing Attacks on Strong-Password Authentication Protocol", International Journal of Network Security, vol. 15, no. 1, pp. 64-67, Jan. 2013. (EI)   P207.pdf  

16.  

17. Hsieh-Tsen Pan, Jia-Rong Sun, and Min-Shiang Hwang, "Cryptanalysis of Biswas's Multi-party Keys Scheme Based on the Diffie-Hellman Technique," 2015 International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015), Zhengzhou, April 11-12, 2015, Advances in Engineering Research, vol. 15, pp. 842-847, Atlantis Press, 2015.    P328-1.pdf  (EEESYM 2015)

18. Yi-Lun Chi, Hung-Chieh Chuang, Iuon-Chang Lin and Min-Shiang Hwang, "The features of phishing detection based on judgment user device," 2015 4th International Conference on Computer Technology and Science (ICCTS2015), Bandar Seri Begawan, Brunei on 1-2June, 2015. (INSPECT)

19. Jia-Rong  Sun, Min-Shiang  Hwang, "A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server," 2014 International Computer Symposium (ICS 2014), Vol. 2, PP. 123-130, Tunghai University, Taichung, Taiwan on December 12-14, 2014, Frontiers in Artificial Intelligence and Applications, Vol. 274, pp. 850-857, IOS Press, 2015. (EI) P340.pdf  Asia(150525)

20. Min-Yu Chen, Chi-Wei Liu, and Min-Shiang Hwang, "SecureDropbox: A file encryption system suitable for cloud storage services," Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, CAC 2013, pp. 1-334, Aug. 5 – 9, 2013 at Miami, FL, United states. (EI)  P323.pdf  AU1410

21. Cheng-Ying Yang, Yi-Shan Lin, and Min-Shiang Hwang, "Downlink Relay Selection Algorithm for Amplifyand-Forward Cooperative Communication systems," 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 331-334, July 3 – 5, 2013 at Asia University, Taiwan. (EI) http://voyager.ce.fit.ac.jp/conf/accord/2013/  P322.pdf  AU1310

22.  Ting-Yi Chang, Chou-Chen Yang, and Min-Shiang Hwang, "Improvement of Convertible Authenticated Encryption Schemes," The 4th International Conference on Advanced Communication and Networking (ACN 2012), Aug. 30-31 2012 at Jeju Grand Hotel, Korea, pp. 1-6, 2012. (EI)   P195.pdf AU1210

23.  Li-Chin Huang and Min-Shiang Hwang, "Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem," The 4th International Conference on Advanced Communication and Networking (ACN 2012), Aug. 30-31 2012 at Jeju Grand Hotel, Korea, pp. 13-17, 2012. (EI)   P213.pdf AU1210

24.  Cheng-Ying Yang, Ah-Fur Lai, Min-Shiang Hwang, Cheng-Yi Li, and Ming-Chun Chen, "An Investigation on Procrastination in the E-learning Environment," 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT 2012)), June 26-28, 2012 in Jeju, Korea, pp. 616-620. (EI)   P238-1.pdf  AU1210

25.  Chun-Ta Li, Min-Shiang Hwang, "Comments on Chang-Lee's Anonymous E-Voting Scheme," The 6th International Conference on Information Security and Assurance (ISA 2012), April 28-30, at Shanghai, China, pp. 41-43, 2012. (EI) – P284  AU1310

26.  Song-Kong Chong, Shu-Fen Chiou, Min-Shiang Hwang, "A Simple Method to Secure the Integrating a Key Distribution into Digital Signature Standard," The 3rd International Conference on Next Generation Information Technology (ICNIT 2012), pp. 729-731, 24-26 Apr. 2012, Seoul, Korea, 2012. (EI) P264.pdf AU1310

27.  Min-Shiang Hwang, Ting-Yi Chang, Wei-Pang Yang, "The Batch Verifying Multiple Digital Signature Scheme: A Modified Version of Ohta-Okamoto Digital Signature," The 3rd International Conference on Next Generation Information Technology (ICNIT 2012), pp. 732-735, 24-26 Apr. 2012, Seoul, Korea, 2012. (EI) P233.pdf AU1310

28.  Cheng-Chi Lee, Te-Yu Chen, Shu-Chen Lin, Min-Shiang Hwang, "A New Proxy Electronic Voting Scheme Based on Proxy Signatures," The 7th FTRA International Conference on Future Information Technology (FutureTech 2012), 26-28 June 2012, Vancouver, Canada, 2012. (LNEE vol.164) (EI)    P221.pdf  AU1310

29.  Chou-Chen Yang, Shin-Hao Lo and Min-Shiang Hwang, "An Improved re-authentication Scheme Using Tickets Based on EAP TLS Authentication Protocol for Wireless Local Area Networks," 2012 International Conference on Convergence Information Technology (ICCIT 2012), Lecture Notes in Information Technology, Vol. 19, pp. 80-85, Japan, May 3-4, 2012. (EI) P255.pdf AU1210

30.  Chou-Chen Yang, Huan-Chin Hsu and Min-Shiang Hwang, "Design and Implementation of a P2P-Based DRM System," 2012 International Conference on Convergence Information Technology (ICCIT 2012), Lecture Notes in Information Technology, Vol. 19, pp. 73-79, Japan, May 3-4, 2012. (EI) P268.pdf AU1210

31.  Cheng-Chi Lee, Min-Shiang Hwang, Chou-Chen Yang, "A Secure and Efficient One-time Password Authentication Scheme for Wireless Sensor Networks," 2012 International Conference on Applied Materials and Electronics Engineering (AMEE 2012), HongKong, Jan. 18-19, 2012. (EI)

32.  Chun-Ta Li, Min-Shiang Hwang, Pin-Chieh Huang, "An Efficient Authenticated Key Agreement Scheme without Using Smart Card”, 2nd. International Symposium on Security and Information/Communication Technologies (SICT 2011), Orlando, USA, on July 19th - 22nd, 2011.

33.  Cheng-YingYang, Ming Chun Chen, Min-Shiang Hwang, Cheng-Yi Li, Victor R.L. Shen, " Users Intention to Utilize an E-learning System with an Informal Formative Assessment”, The Global Chinese Conference on Computers in Education (GCCCE 2011), Hangzhou China, pp. 1542-1546, May 29-31, 2011. P235.pdf

34.  LoJung-wen, HwangMin-Shiang, LeeJi-Zhe, ChuYen-Ping, "An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, The 15th Mobile Computing Workshop (MC2010), Taichung, May 28, 2010.

35.  Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan, "Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment”, the Fourth International Conference on Innovative Computing, Information and Control (ICICIC-2009), Kaohsiung, pp. 725-728, Taiwan on December 7-9, 2009.

36.  Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo and Min-Shiang Hwang, "Reversible Secret Image Sharing Based on Shamir’s Scheme”, The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2009), Sep.12-14, 2009 at MIELPARQUE, Kyoto, Japan.

37.  Chun-Ta Li, Min-Shiang Hwang and Yan-Chi Lai, "A Verifiable Electronic Voting Scheme Over the Internet”, 2009 Sixth International Conference on Information Technology: New Generations (ITNG 2009), 27-29 April 2009 in Las Vegas, Nevada, USA   P135.ps   P135.pdf

38.  Chun-Ta Li and Min-Shiang Hwang, "Improving the Security of Non-PKI Methods for Public”, 2009 Sixth International Conference on Information Technology: New Generations (ITNG 2009), 27-29 April 2009 in Las Vegas, Nevada, USA  

39.  H-J. Wu, Y-H. Chang, I-Ch. Lin, M-Sh. Hwang, “Flexible RFID Location System Based on Artificial Neural Networks for Medical Care Facilities”, The 2nd Joint Workshop On High Confidence Medical Devices, Software, and Systems (HCMDSS 2009) and Medical Device Plug-and-Play (MD PnP 2009) Interoperability, April 16, 2009, San Francisco, CA

40.  Te-Yu Chen, Min-Shiang Hwang and Jinn-Ke Jan, "Adaptive Authentication Schemes for 3D Mesh Models”, 2008 International Symposium on Intelligent Informatics (ISII2008)", December 12-13, 2008, Tokai University, Kumamoto, Japan.

41.  Meng-Hsiun Tsai, Shu-Fen Chiou and Min-Shiang Hwang, "A Simple Method for Detecting Protein Spots in 2D-GE Images Using Image Contrast”, 2008 International Symposium on Intelligent Informatics (ISII2008)", December 12-13, 2008, Tokai University, Kumamoto, Japan.

42.  Min-Shiang Hwang, Shiang-Feng Tzeng, and Shu-Fen Chiou, "An Ordered Multi-Proxy Multi-Signature Scheme”, The 8th International Conference on Intelligent Systems Design and Applications (ISDA 2008), Kaohsiung, Taiwan, Nov. 26-28, 2008.

43.  Jung-Wen Lo, Min-Shiang Hwang, and Yen-Ping Chu, "An Exchangeable E-Cash Scheme by E-mint”, The 8th International Conference on Intelligent Systems Design and Applications (ISDA 2008), Kaohsiung, Taiwan, Nov. 26-28, 2008.  

44.  Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, and Min-Shiang Hwang, "Enhance the image sharing with steganography and authentication," Proceedings of The Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, pp. 1177-1181, August 15-17, 2008.

45.  Min-Shiang Hwang, Shiang-Feng Tzeng, and Shu-Fen Chiou, "An Improvement of Strong Proxy Signature and Its Applications”, International Conference on Security and Cryptography (SECRYPT 2008), July 26-29, 2008, Porto/Portugal.

46.  Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, and Min-Shiang Hwang, "A Robust-FragileWatermarking Scheme for Image Authentication," Proceedings of The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008), Dalian, China, pp. 176-180, June 18-20, 2008.

47.  Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li, "A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period”, International Conference on Computational Science and Its Applications (ICCSA 2007), LNCS, vol. 4707, pp. 273-284, August 26-29, 2007, Kuala Lumpur, Malaysia.

48.  Chun-Ta Li, Yan-Chi Lai, Min-Shiang Hwang, Yen-Ping Chu, “An Electronic Cash Scheme with Crime-Resistance”, International Computer Symposium 2006 (ICS 2006), Taipei, Dec. 4 - 6, 2006.

49.  I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, “Identity-based Deniable Authentication Protocol from Pairings”, IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), Honolulu, USA, August 14-16, 2006.

50.  I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, “Security Enhancement for a Dynamic ID-based Remote User Authentication Scheme”, International Conference on Next Generation Web Services Practices
(NWeSP 2005), Seoul, Korea, Aug. 23-27, 2005.

51.  Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang, “Digital Signature for Diffie-Hellman Public Keys Using Time Stamp”, The 18th International Conference on Internet & Multimedia Systems & Applications (IMSA 2004), Kauai, Hawaii, USA, Aug. 16-18, 2004.

52.  Min-Shiang Hwang, Ting-Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai, “On the Security of an Enhanced Authentication Key Exchange Protocol”, The 18th International Conference on Advanced Information Networking and Applications (AINA2004), Fukuoka, Japan, Mar. 29-31, 2004.

53.  Yuan-Liang Tang, Min-Shiang Hwang, Chun-Hung Chen, “Exact Image Authentication Based on Intersecting Signature Blocks”, The 14th International Conference on Information Management (ICIM 2003), Chiayi, Taiwan, pp. 1098-1103.

54.  Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong Tsai, "A New Secure Generalization of Threshold Signature Scheme”, IEEE International Conference on Information Technology: Research and Education (ITRE 2003), pp. 282-285, August 11-13, 2003, Newark, New Jersey, USA

55.  Min-Shiang Hwang, Pei-Chen Sung, Shiang-Feng Tzeng, "Deniable Authentication Protocol Based on Elliptic Curve Cryptography”, 7th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2003), vol. 2, pp. 65-67, Orlando, Florida (USA), July 27-30, 2003. (Best paper from the session: Operations Research, Systems Security and Security Technologies)

56.  Yuan-Liang Tang, Chih-Wei Lin, Min-Shiang Hwang, "Security Enhancement for the Fingerprint-Based Remote User Authentication Scheme Using Smart Cards”, International Conference on Computer, Communication and Control Technologies (CCCT '03), vol. 1, pp. 104-107, Orlando, Florida (USA), July 31 – Aug. 2, 2003.

57.  Ting-Yi Chang, Shu-Jean Lin, Chou-Chen Yang, Min-Shiang Hwang, "An Efficient Identification Scheme Based on the Elliptic Curve Discrete Logarithm Problem", International Conference on Advanced Communications Technology, ICACT 2002, Korea, pp. 752-754, Feb. 2003.

58.  Chou-Chen Yang, Min-Shaing Hwang, Jian-Wei Li, and Ting-Yi Chang, “An Efficient MAKEP for Wireless Network”, Proceeding of the 2002 International Computer Symposium, Vol. 2, pp. 1012-1018, Dec. 2002.

59.  Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Detecting the Illegal Signature in Multiple Signatures", International Conference on Advanced Communications Technology, ICACT 2002, Korea, 881-882, Feb. 6-8, 2002.

60.  Yuan-Liang Tang, Min-Shiang Hwang, Chin-Rong Yang, " A New Image Authentication Scheme Based on One-Way Hash Functions", International Conference on Advanced Communications Technology, ICACT 2002, Korea, pp. 531-533, Feb. 6-8, 2002.

61.  Min-Shiang Hwang, Cheng-Chi Lee, Iuon-Chung Lin, "An Improvement of Proxy Multi-Signature Scheme", Youth Forum in Computer Science and Engineering, YUFORIC’2001, Valencia, Spain, pp. 125-126, Nov. 29-30, 2001.

62.  Min-Shiang Hwang, Yuan-Liang Tang, Cheng-Chi Lee, "An Authentication Scheme with Subscriber Anonymity in Personal Communication System", International Conference on Advanced Communications Technology, ICACT 2001, Korea, Feb. 8-10, 2001, pp.33-37.

63.  Iuon-Chung Lin, Chin-Chen Chang, and Min-Shiang Hwang,"Security Enhancement for the 'Simple Authentication Key Agreement Algorithm' ", Proceedings of 24th International Computer Software and Applications Conference (IEEE-COMPSAC00), Taipei, Oct. 2000, pp113-115.

64.  Min-Shiang Hwang, Yuan-Liang Tang, Cheng-Chi Lee, " An Efficient Authentication Protocol for GSM Networks", EuroComm'2000, Munich, Germany, pp.326-329, May 2000.

65.  Chin-Chen Chang, Kuo-Feng Hwang, and Min-Shiang Hwang, “A Block Based Digital Watermarks for Copy Protection of Images”, APCC’99. Fifth ASIA-PACIFIC Conference on Communications, Beijing, China, vol. 2, pp.977-980, Oct. 1999.

66.  Min-Shiang Hwang and Wei-Pang Yang, "A New Service for Digital Mobile Communications", IEEE APCCAS'94, Taipei, December 1994.

67.  Min-Shiang Hwang and Wei-Pang Yang, "Authenticating Multicast Electronic Documents", International Symposium on Environmental Information Management and EDI, Taipei, December 1994.

68.  Min-Shiang Hwang and Wei-Pang Yang, "A New Dynamic Cryptographic Key Generation Scheme for a Hierarchy", TENCON’94, IEEE Region 10’s Ninth Annual International Conference, Singapore, August 1994, pp. 465-468 vol.1.