Papers in International Journals

    2017
  1. Nan-I Wu, Min-Shiang Hwang, “A Novel LSB Data Hiding Scheme with the Lowest Distortion,” The Imaging Science Journal, Volume: 65, Issue: 06, pages 370 – 377, July 2017 (online). SCIE P376.pdf http://www.tandfonline.com/doi/full/10.1080/13682199.2017.1355089
  2. Ting-Yi Chang, Min-Shiang Hwang and Chou-Chen Yang, “Password Authenticated Key Exchange and Protected Password Change Protocols,” Symmetry, vol. , pp. , 2017. SCIE P177.pdf doi:10.3390/sym9080134.
  3. Nan-I Wu, Min-Shiang Hwang, “Development Of A Data Hiding Scheme Based On Combination Theory For Lowering The Visual Noise In Binary Images,” Displays, vol.49, pp. 116-123, Sept. 2017. SCIE P217.pdf
  4. Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang, "The Capacity Analysis in the Secure Cooperative Communication System", International Journal of Network Security, Vol. 19, No. 6, pp. 863-869, Nov. 2017 (EI) P298.pdf
  5. Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang, "An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching", International Journal of Network Security, Vol. 19, No. 5, pp. 858-862, Sept. 2017 (EI) P372.pdf
  6. Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang, " An Improved Key-Management Scheme for Hierarchical Access Control", International Journal of Network Security, Vol. 19, No. 4, pp. 639-643, July 2017 (EI) P348.pdf
  7. Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin, “A Secure Privacy and Authentication Protocol for Passive RFID Tags,” International Journal of Mobile Communications, vol. 15, no. 3, pp. 266-277, 2017. (SSCI) P085.pdf
  8. Min-Shiang Hwang, Tsuei-Hung Sun, Cheng-Chi Lee, “Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service,” Journal of Circuits Systems and Computers, Vol. 26, No. 5, 2017. (SCI) P310.pdf
  9. Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, and Min-Shiang Hwang, "A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms", International Journal of Network Security, Vol. 19, No. 3, pp. 443-448, May 2017 (EI) P209.pdf
  10. Chung-Huei Ling, Cheng-Chi Lee, Chou-Chen Yang, and Min-Shiang Hwang, "A Secure and Efficient One-time Password Authentication Scheme for WSN", International Journal of Network Security, Vol. 19, No. 2, pp. 177-181, Mar. 2017 (EI) P231.pdf
  11. Li-Chin Huang, Tung-Huang Feng, Min-Shiang Hwang, “A New Lossless Embedding Techniques Based on HDWT,” IETE Technical Review, vol. 37, issue 1, pp. 40-48, Jan. 2017. (SCI) P244.pdf
  12. Shih-Ming Chen, Ching-Rong Yang, and Min-Shiang Hwang, "Using a New Structure in Group Key Management for Pay-TV", International Journal of Network Security, Vol. 19, No. 1, pp. 112-117, Jan. 2017 (EI) P066.pdf

    2016

  13. Tung-Huang Feng, Min-Shiang Hwang, Liang-Wei Syu, “An Authentication Protocol for Lightweight NFC Mobile Sensors Payment,” Informatica, vol. 27, no. 4, pp. 723-732, Dec. 2016 (SCIE) P358.pdf
  14. Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang, "A Survey of Data Distortion Watermarking Relational Databases", International Journal of Network Security, Vol. 18, No. 6, pp. 1022-1033, 2016. (EI) P356.pdf
  15. Chi-Wei Liu, Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, " A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage", International Journal of Network Security, Vol. 18, No. 5, pp. 900-916, 2016 (EI) P367.pdf
  16. Min-Shiang Hwang, Shih-Ming Chen and Chi-Yu Liu, “Digital Signature with Message Recovery Based on Factoring and Discrete Logarithm,” IETE Journal of Research, vol. 62, no. 3, pp. 415-423, Sept. 2016. (SCI) P254.pdf
  17. Chi-Wei Liu, Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, " A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing", International Journal of Network Security, Vol. 18, No. 4, pp. 650-666, 2016 (EI) P366.pdf
  18. Chung-Huei Ling, Shih-Ming Chen, and Min-Shiang Hwang, "Cryptanalysis of Tseng-Wu Group Key Exchange Protocol", International Journal of Network Security, Vol. 18, No. 3, pp. 590-593, 2016 (EI) P185.pdf
  19. Chung-Huei Ling, Wei-Fu Hsien, and Min-Shiang Hwang, "A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach", International Journal of Network Security, Vol. 18, No. 2, pp. 397-400, 2016 (EI) P344.pdf
  20. Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, "A Survey of Public Auditing for Secure Data Storage in Cloud Computing", International Journal of Network Security, Vol. 18, No. 1, pp. 133-142, 2016 P363.pdf
  21. Min-Shiang Hwang, Song-Kong Chong, and Hsia-Hung Ou,“The Moderately Hard DoS-resistant Authentication Protocol on Client Puzzles,” INFORMATICA, Vol. 27, No. 1, 1–18, 2016. (SCI) P230.pdf

    2015

  22. Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang, “Cases Study and Analysis of the Court Judgement of Cybercrimes in Taiwan,” International Journal of Law, Crime and Justice, Volume 43, Issue 4, Pages 412–423, December 2015. (SSCI) P327.pdf
  23. Tung-Huang Feng, Neng-Yih Shih, and Min-Shiang Hwang, "A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks," International Journal of Network Security, Volume 17, Number 6, pp. 712-721, Nov. 2015. (EI) P362.pdf
  24. Jia-Rong Sun, Mao-Lin Shih, and Min-Shiang Hwang, "A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure," International Journal of Network Security, vol. 17, no. 5, pp. 497-509, 2015. (EI) P359.pdf
  25. Chia-Hui Wei, Min-Shiang Hwang, and Augustin Yeh-hao Chin, “Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection,” IETE Technical Review, vol. 32, no. 3, pp. 183-187, 2015. (SCI) P304.pdf
  26. YanLi Ren, Shuozhong Wang, Xinpeng Zhang, and Min-Shiang Hwang, "An Efficient Batch Verifying Scheme for Detecting Illegal Signatures," International Journal of Network Security, Volume 17, Number 4, July 2015, pp. 463-470 (EI) P303.pdf
  27. Tung-Huang Feng, Wei Teng Li, and Min-Shiang Hwang, "A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey," International Journal of Network Security, vol. 17, no. 3, pp. 229-236, 2015. (EI) P341.pdf
  28. Min-Shiang Hwang, Cheng-Chi Lee, Pei-Shan Chung, “An Efficient IC-Lock Self-Reader Data Security in Cloud Computing,” Applied Mathematics & Information Sciences, vol. 9, no. 4, pp. 2099-2106, Jul. 2015. (SCI) P314.pdf
  29. Heri Wijayanto and Min-Shiang Hwang, "Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance," International Journal of Network Security, Volume 17, Number 2, Mar. 2015, pp. 160-164 (EI) P354.pdf

    2014

  30. Wei Teng Li, Chung-Huei Ling, and Min-Shiang Hwang, "Group Rekeying in Wireless Sensor Networks: A Survey," International Journal of Network Security, Volume 16, Number 6, Nov. 2014, pp. 401-410 (EI) P339.pdf
  31. Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee, “A New Public Key Encryption with Conjunctive Field Keyword Search Scheme,” Information Technology and Control, vol. 43, no. 3, pp. 277-288, Sep. 2014. (SCI) P324.pdf
  32. Wei Teng Li, Tung-Huang Feng, and Min-Shiang Hwang, "Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey," International Journal of Network Security, Volume 16, Number 5, Sep. 2014, pp. 323-330 (EI) P337.pdf
  33. Min-Shiang Hwang, Cheng-Chi Lee, Tsuei-Hung Sun, “Data Error Locations Reported by Public Auditing in Cloud Storage Service,” Automated Software Engineering, vol. 21, no. 3, pp. 373-390, Sep. 2014. (SCI, Impact Factor: 1.4, 2012 JCR: 28/105=0.26, subject categories COMPUTER SCIENCE, SOFTWARE ENGINEERING) P311.pdf
  34. Li-Chin Huang, Min-Shiang Hwang, Wei-Pang Yang, “A Conference Key Distribution Scheme in Tree Hierarchies,” BRIS Journal of Advances in Science and Technology, vol. 2, no. 4, pp.76-81, July 2014. P190.pdf
  35. Min-Shiang Hwang, Shu-Yin Hsiao, Wei-Pang Yang, “Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178, Apr. 2014. (SCIE) P204.pdf
  36. Tung-Huang Feng, Chung-Huei Ling, and Min-Shiang Hwang, "Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments," International Journal of Network Security, Volume 16, Number 4, July 2014 , pp. 318-321 (EI) P241.pdf
  37. Li-Chin Huang and Min-Shiang Hwang, "An Efficient MQV Key Agreement Scheme," International Journal of Network Security, Volume 16, Number 2, Mar. 2014 , pp. 157-160 (EI) P172.pdf
  38. Pei-Shan Chung, Chi-Wei Liu, and Min-Shiang Hwang, "A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments," International Journal of Network Security, Volume 16, Number 1, Jan. 2014 , pp. 1-13 (EI) P321.pdf

    2013

  39. Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan, “Towards Secure and Efficient User Authentication Scheme Using Smart Card for Multi-Server Environments,” The Journal of Supercomputing, vol. 66, no. 2, pp. 1008-1032, Nov. 2013. (SCI, Impact Factor: 0.917, 2012 JCR: 39/100=0.39, subject categories COMPUTER SCIENCE, THEORY & METHODS) P140.pdf AU1406
  40. Min-Yu Chen, Chou-Chen Yang, Min-Shiang Hwang, “Privacy Protection Data Access Control,” International Journal of Network Security vol. 15, no. 6, pp. 391-399, Nov. 2013. (EI) P318.pdf
  41. Min-Shiang Hwang, Tsuei‑Hung Sun, "Using Smart Card to Achieve a Single Sign-on for Multiple Cloud Services," IETE Technical Review, Volume 30, Number 5, Sept 2013 , pp. 410-416 (SCIE) P305.pdf
  42. Hsia-Hung Ou, Min-Shiang Hwang, "Double Delegation-based Authentication and Key Agreement Protocol for PCSs", Wireless Personal Communications, Volume 72, Issue 1, Page 437-446, Sep. 2013. (SCIE) P236.pdf
  43. Song-Kong Chong, Cheng-Chi Lee, Min-Shiang Hwang, “An Authentication Scheme for the Global Mobility Network,” Parallel Processing Letters, vol. 23, no. 4, pp. , Sep. 2013. (10pages) (EI) P203.pdf
  44. Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang, “A Study of Conjunctive Keyword Searchable Schemes,” International Journal of Network Security, vol. 15, no. 5, pp. 311-320, Sept. 2013. (EI) P320.pdf
  45. Shu-Fen Chiou, Yung-Chih Lu, I-En Liao, and Min-Shiang Hwang, "An Efficient Reversible Data Hiding Scheme Based on SMVQ," Imaging Science Journal, Volume 61, Number 6, July 2013 , pp. 467-474 (SCIE) P125.pdf
  46. Li-Chin Huang, Min-Shiang Hwang, Lin-Yu Tseng, “Reversible and high-capacity data hiding in high quality medical images,” KSII Transactions on Internet and Information Systems, Vol. 7, No. 1, pp. 132-148, 2013 (SCIE) P274.pdf
  47. Li-Chin Huang, Min-Shiang Hwang, and Lin-Yu Tseng, “Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map,” Journal of Electronic Science and Technology, vol. 11, no. 2, pp. 230-236, June 2013. (EI) P317.pdf
  48. Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang, “A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments,” International Journal of Network Security vol. 15, no. 4, pp. 231-240, July 2013. (EI) P319.pdf
  49. Tzu-Chun Lin, Te-Yu Chen, Chiun-Shiang Gau, Min-Shiang Hwang, “A Key Agreement for Large Group Using Bilinear Maps,” Journal of Theoretical and Applied Information Technology (EI), Vol. 49, Issue 2, p871-878, Mar. 2, 2013. And 2nd International Workshop on Computing and Services for Industry and Applied Science (CSIAS 2013) P096.pdf
  50. Jung-Wen Lo, Min-Shiang Hwang, and Chia-Hsin Liu, “A Simple Key Assignment for Access Control Based on Polynomial”, The Arabian Journal for Science and Engineering (AJSE), vol. 38, Issue 6, Page 1397-1403, June 2013. (SCIE) P150.pdf
  51. Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, “A New Proxy Signature Scheme for a Specified Group of Verifiers,” Information Sciences, vol. 227, pp. 102-115, April 2013. (SCI) P144.pdf
  52. Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang, "A Reversible Data Hiding Method by Histogram Shifting in High Quality Medical Images", Journal of Systems and Software, Vol. 86, no. 3, pp. 716-727, Mar. 2013. (SCIE) P282.pdf
  53. Shih-Ting Hsu, Chou-Chen Yang, and Min-Shiang Hwang, "A Study of Public Key Encryption with Keyword Search", International Journal of Network Security, vol. 15, no. 2, pp. 71-79, Mar. 2013. P316.pdf
  54. Li-Chin Hwang, Cheng-Chi Lee, and Min-Shiang Hwang, “A n2+n MQV Key Agreement Protocol”, International Arab Journal of Information Technology (IAJIT), vol. 10, no. 2, pp. 137-142, Mar. 2013. (SCIE) P173.pdf
  55. Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A New Group Signature Scheme Based on RSA Assumption", Information Technology and Control, vol. 42, no. 1, pp. 61-66, 2013. P110.pdf
  56. Jung-Wen Lo, Hung-Miao Lu, Tsuei-Hung Sun and Min-Shiang Hwang, "Improved on Date Attachable Electronic Cash," Applied Mechanics and Materials, vol. 284-287, pp 3444-3448, Jan. 2013. P234.pdf
  57. Li-Chin Huang, Min-Shiang Hwang, "Two-party Authenticated Multiple-key Agreement Based on Elliptic Curve Discrete Logarithm Problem", International Journal of Smart Home, vol. 7, no. 1, pp. 9-18, Jan. 2013. (EI) P225.pdf
  58. Chun-Ta Li and Min-Shiang Hwang, "A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol", International Journal of Security and Its Applications, vol. 7, no. 1, pp. 59-70, Jan. 2013. P315.pdf
  59. Cheng-Chi Lee, Chia-Hsin Liu, and Min-Shiang Hwang, "Guessing Attacks on Strong-Password Authentication Protocol", International Journal of Network Security, vol. 15, no. 1, pp. 64-67, Jan. 2013. (EI)P207.pdf

    2012

  60. Ting-Yi Chang, Min-Shiang Hwang, Wei-Pang Yang, "Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages", Informatica, vol. 23, no. 4, pp. 537—562, 2012. (SCI) P267.pdf
  61. Li-Chin Huang, Lin-Yu Tseng, and Min-Shiang Hwang, "The Study on Data Hiding in Medical Images", International Journal of Network Security, vol. 14, no. 6, pp. 301-309, Nov. 2012. (EI)P295.pdf
  62. Shu-Fen Chiou, Min-Shiang Hwang, Song-Kong Chong, "A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS", International Journal of Advancements in Computing Technology (IJACT), vol. 4, no. 19, pp. 529-535, Oct. 2012. (EI) P223.pdf
  63. Ting-Yi Chang, Chou-Chen Yang and Min-Shiang Hwang, "Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version", International Journal of Security and Its Applications (IJSIA), vol. 6, no. 4, pp. 151-162, Oct. 2012. (EI) P226.pdf
  64. Ting-Yi Chang, Min-Shiang Hwang, Wei-Pang Yang, Kuo-Cheng Tsou, "A Modified Ohta-Okamoto Digital Signature for Batch Verification and Its Multi-Signature Version", International Journal of Engineering and Industries (IJEI), vol. 3, no. 3, pp. 75-83, Sep. 2012. (EI) P210.pdf
  65. Li-Chin Huang and Min-Shiang Hwang, "Study of an Intrusion Detection System," Journal of Electronic Science and Technology, vol. 10, no. 3, pp.269-275, Sept. 2012. (EI) P275.pdf
  66. Te-Yu Chen, Min-Shiang Hwang, and Jinn-Ke Jan, “A Secure Image Authentication Scheme for Tamper Detection and Recovery”, Imaging Science Journal, Volume 60, Number 4, pp. 219-233, August 2012. (SCIE) P299.pdf
  67. Chia-Hui Wei, Min-Shiang Hwang and Augustin Yeh-Hao Chin, "An Improved Authentication Protocol for Mobile Agent Device in RFID," International Journal of Mobile Communications, vol. 10, no. 5, pp.508-520, 2012. (SSCI) P250.pdf
  68. Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, "An Effective AKA Protocol for UMTS," International Journal of Mobile Communications, Vol. 10, No. 4, PP. 427-448, 2012. (SSCI) P281.pdf
  69. Chun-Ta Li, Min-Shiang Hwang, "Security Enhancement of Chang-Lee Anonymous E-Voting Scheme," International Journal of Smart Home, vol. 6, no. 2, pp. 45-52, Apr. 2012. (EI) P284.pdf
  70. Tsuei-Hung Sun and Min-Shiang Hwang, “A Hierarchical Data Access and Key Management in Cloud Computing”, ICIC Express Letters, Vol. 6, No.2, pp. 569-574, 2012. (EI) P175.pdf
  71. Chun-Ta Li, Chou-Chen Yang, and Min-Shiang Hwang, “A Secure Routing Protocol with Node Selfishness Resistance in MANETs”, International Journal of Mobile Communications (IJMC), vol. 10, no. 1, pp. 103-118, Jan. 2012. (SSCI) P293.pdf

    2011

  72. Chia-Chun Wu, Shang-Juh Kao, and Min-Shiang Hwang, “A High Quality Image Sharing with Steganography and Adaptive Authentication Scheme”, Journal of Systems and Software, vol. 84, no. 12, pp. 2196-2207, 2011. (SCIE) P302.pdf
  73. Chun-Ta Li, Min-Shiang Hwang, “A Lightweight Anonymous Routing Protocol without Public Key En/Decryptions for Wireless Ad Hoc Networks”, Information Sciences, vol. 181, no. 23, pp. 5333–5347, Dec. 2011. (SCIE) P262.pdf
  74. Cheng-Chi Lee, Min-Shiang Hwang and I-En Liao, “On the Security of Self-Certified Public Keys”, International Journal of Information Security and Privacy, vol. 5, no. 2, pp. 55-62, Apr. 2011.
  75. Min-Shiang Hwang, Song-Kong Chong, Hsia-Hung Ou, "On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol”, European Transactions on Telecommunications, vol. 22, no. 3, pp. 99-112, Apr. 2011. (SCIE). P258.pdf
  76. Chia-Hui Wei, Min-Shiang Hwang, and Augustin Yeh-Hao Chin, “An Authentication Protocol for Low-cost RFID Tags”, International Journal of Mobile Communications, Vol. 9, No. 2, PP. 208-223, 2011. (SSCI) P041.pdf
  77. Ting-Yi Chang and Min-Shiang Hwang, “User-Anonymous and Short-Term Conference Key Distribution System via Link-Layer Routing in Mobile Communications”, International Journal of Mobile Communications, vol. 9, No. 2, PP. 144-158, 2011. (SSCI)
  78. Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, "An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem", Information Technology and Control, vol.40, No.3, PP. 246-251, 2011. (SCIE) P130.pdf
  79. Cheng-Chi Lee, Tzu-Chun Lin, Shiang-Feng Tzeng and Min-Shiang Hwang, “Generalization of Proxy Signature Based on Factorization”, International Journal of Innovative Computing, Information and Control, vol. 7, no. 3, pp. 1039-1054, Mar. 2011. (SCI)
  80. Shiang-Feng Tzeng, Cheng-Chi Lee, and Min-Shiang Hwang, “A Batch Verification for Multiple Proxy Signature”, Parallel Processing Letters, vol. 21, no. 1, pp. 77-84, March 2011. (EI)
  81. Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-hao Chin, "A Mutual Authentication Protocol for RFID”, IEEE IT Professional, vol. 13, no. 2, pp. 20-24, March/April 2011. P097.pdf
  82. Shu-Fen Chiou, I-En Liao, and Min-Shiang Hwang, “A capacity-enhanced reversible data hiding scheme based on SMVQ”, Imaging Science Journal, vol. 59, no. 1, pp. 17-24, Feb. 2011. (SCI)
  83. Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu, "An Efficient Key Assignment Scheme for Access Control in a Large Leaf Class Hierarchy”, Information Sciences, vol. 181, no. 4, pp. 917-925, Feb. 2011. (SCIE) NCHU
  84. Ting-Yi Chang; Min-Shiang Hwang, Wei-Pang Yang, "A Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol”, Information Sciences, vol. 181, pp. 217-226, 2011. (SCIE).
  85. Cheng-Chi Lee, I-En Liao, and Min-Shiang Hwang, “An Efficient Authentication Protocol for Mobile Communications", Telecommunication Systems, vol. 46, no. 1, pp. 31-41, Jan. 2011. (SCI)

    2010

  86. Jung-Wen Lo, Ji-Zhe Lee, Min-Shiang Hwang, Yen-Ping Chu, "An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Journal of Internet Technology, vol. 11, no. 7, pp. 997-1004, Dec. 2010. (SCIE).
  87. Chun-Ta Li and Min-Shiang Hwang, Shih-Ming Chen, “A Batch Verifying and Detecting the Illegal Signatures”, International Journal of Innovative Computing, Information and Control, vol. 6, no. 12, pp. 5311-5320, Dec. 2010. (SCI)
  88. Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “A provable billing protocol on the current UMTS”, Wireless Personal Communications, vol. 55, no. 4, pp. 551-556, 2010. (SCI) P287.pdf
  89. Jung-Wen Lo, Cheng-Chi Lee, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient ECC-based AKA Protocol for Wireless Mobile Communications”, International Journal of Innovative Computing, Information and Control, vol. 6, no. 11, pp. 5249-5258 , Nov. 2010. (SCI)
  90. Jung-Wen Lo, Shu-Chen Lin, Min-Shiang Hwang, “A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments”, Information Technology and Control, vol. 39, no. 2, pp. 146-151, 2010. (SCI)
  91. Chun-Ta Li, Min-Shiang Hwang, “An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 5, pp. 2181-2188, May 2010. (SCI) P246.pdf
  92. Cheng-Chi Lee, Tzu-Chun Lin, Min-Shiang Hwang, “A Key Agreement Scheme for Satellite Communications”, Information Technology and Control, vol. 39, no. 1, pp. 43-47, March 2010. (SCI)
  93. Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “A Cocktail Protocol with the Authentication and Key Agreement on the UMTS”, Journal of Systems and Software, vol. 83, no. 2, pp. 316-325, Feb. 2010. (SCI) P292.pdf
  94. Chun-Ta Li and Min-Shiang Hwang, “An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards”, Journal of Network and Computer Applications, vol. 33, issue 1, pp. 1-5, 2010. (SCI)
  95. Cheng-Chi Lee, Ting-Yi Chang, Min-Shiang Hwang, “A New Group Signature Scheme Based on the Discrete Logarithm”, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 54-57, 2010.
  96. Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen, “DoS-resistant ID-based Password Authentication Scheme Using Smart Cards”, Journal of Systems and Software, vol. 83, pp. 163-172, Jan. 2010. (SCI)

    2009

  97. Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng, "A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem", International Journal of Foundations of Computer Science, Vol. 20, Iss. 2, pp. 351-359, 2009. (SCI)
  98. Hsia-Hung Ou, Min-Shiang Hwang and Jinn-Ke Jan, “The UMTS-AKA Protocols for Intelligent Transportation Systems”, EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 1-12, 2009. (SCI) P247.pdf
  99. Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin, "A New English Auction Scheme Using the Bulletin Board System", Information Management and Computer Security, Vol. 17 No. 5, pp. 408-417, Nov. 2009. (EI)
  100. Te-Yu Chen, Min-Shiang Hwang and Jinn-Ke Jan, “Adaptive Authentication Schemes for 3D Mesh Models”, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 12, pp. 4561-4572, Dec. 2009. (SCI)
  101. Meng-Hsiun Tsai, Shu-Fen Chiou and Min-Shiang Hwang, “A Simple Method for Detecting Protein Spots in 2D-GE Images Using Image Contrast”, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 12, pp. 4617-4626, Dec. 2009. (SCI) P257.pdf
  102. Min-Shiang Hwang, Shiang-Feng Tzeng and Shu-Fen Chiou, "A Non-repudiable Multi-Proxy Multi-Signature Scheme", Innovative Computing, Information and Control Express Letters, Vol.3, No.3, pp. 259-264, Sept. 2009.
  103. Min-Shiang Hwang, Chia-Hui Wei, Cheng-Yee Lee, "Privacy and Security Requirements for RFID Applications”, Journal of Computers (Taiwan), Vol. 20, No. 3, pp. 55-60, Oct. 2009. P103.pdf
  104. C.T. Li, Min-Shiang Hwang and Y.P. Chu, “An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, Aug. 2009. (SCI)
  105. Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, and Jinn-Ke Jan, “TK-AKA: Using Temporary Key on Authentication and Key Agreement Protocol on UMTS”, International Journal of Network Management, vol. 19, no. 4, pp. 291-303, July 2009. P286.pdf
  106. Cheng-Chi Lee, Pi-Fang Ho, Min-Shiang Hwang, "A Secure E-Auction Scheme Based on Group Signatures", Information Systems Frontiers, Volume 11, Number 3, pp. 335-343, July 2009 (SCI) P224.pdf
  107. Chia-Chun Wu, Min-Shiang Hwang, and Shang-Juh Kao, "A New Approach to the Secret Image Sharing with Steganography and Authentication", Imaging Science Journal, Vol. 57, Num. 3, pp. 140-151, June 2009. (SCI) P263.pdf
  108. Song Han, Elizabeth Chang, Tharam Dillon, Min-Shiang Hwang, and Cheng-Chi Lee, "Identifying Attributes and Insecurity of A Public-channel Key Exchange Protocol Using Chaos Synchronization", Chaos Solitons & Fractals, Volume 40, Issue 5, Pages 2569-2575, June 2009, (SCI)
  109. Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang, “An Extended Certificate-based Authentication and Security Protocol for Mobile Networks”, Information Technology and Control, vol. 38, no. 1, pp. 61-66, 2009. (SCI-Expanded)
  110. Cheng-Chi Lee, Min-Shiang Hwang, Shu-Yin Hsiao, "A Fair Non-transfer Exchange Protocol", International Journal of Electrical and Computer Engineering, vol. 4, no. 14, pp. 879-885, 2009. (EI)
  111. Meng-Hsiun Tsai, Shu-Fen Chiou, and Min-Shiang Hwang, “A Progressive Image Transmission Method for 2D-GE Image Based on Context Feature with Different Thresholds”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 2, pp. 379-386, Feb. 2009. (SCI) P256.ps P256.pdf
  112. Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, "A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm", International Journal of Applied Mathematics and Computer Sciences, Volume 5, Issue 1, pp. 33-38, 2009.

    2008

  113. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments”, Computer Communications, Vol. 31, no. 18, pp. 4255-4258, Dec. 2008. (SCI)
  114. Nan-I Wu, Chung-Ming Wang, Chwei-Shyong Tsai, Min-Shiang Hwang, “A Certificate-based Watermarking Scheme for Coloured Images”, The Image Science Journal, vol. 56, pp. 326-332, 2008. (SCI) P197.pdf
  115. Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong, “An Improved Address Ownership in Mobile IPv6”, Computer Communications, vol. 31, pp. 3250-3252, 2008. (SCI)
  116. Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong and Jung-Wen Lo, “A Key Management for Wireless Communications”, International Journal of Innovative Computing, Information and Control, Vol. 4, No. 8, pp. 2045-2056, August 2008. (SCI)
  117. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks”, Computer Communications, vol. 31, no. 12, pp. 2803-2814, July 2008. (SCI) P227.pdf
  118. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, “A New Authentication Protocol Based on Pointer Forwarding for Mobile Communications”, Wireless Communications & Mobile Computing, vol. 8, no. 5, pp. 661-672, 2008. (SCI)
  119. Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu, “An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks”, Computer Communications, vol. 31, issue 10, pp. 2534-2540, June 2008. (SCI) P196.pdf
  120. Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai and Min-Shiang Hwang, “A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function”, The Journal of Systems and Software, Vol. 81, Iss. 1, pp. 150-158, 2008. (SCI)
  121. Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin, “An Efficient Multi-Round Anonymous Auction Protocol”, Journal of Discrete Mathematical Sciences & Cryptography, vol. 10, no. 4, pp. 547-557, Aug. 2007.

    2007

  122. Hsia-Hung Ou, Min-Shiang Hwang, Jinn-Ke Jan, “A Simple Mobile Communication Billing System Among Charged Parties”, Applied Mathematics and Computation, vol. 192, no. 2, pp. 487-495, Sep. 2007. (SCI)
  123. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Improving the Security of a Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks”, International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, May 2008. (SCI) P288.pdf
  124. Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang, "A New Convertible Authenticated Encryption Scheme with Message Linkages", Computers and Electrical Engineering, vol. 33, no. 2, pp. 133-138, Mar. 2007. [SCI]
  125. Nan-I Wu and Min-Shiang Hwang, "Data Hiding: Current Status and Key Issues", International Journal of Network Security, vol. 4, no. 1, pp. 1-9, Jan. 2007.

    2006

  126. Yung-Chin Chen, Wei-Lin Wang, Min-Shiang Hwang, "Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection", Asian Journal of Health and Information SCiences, Vol. 1, no. 2, pp. 189-203, 2006.
  127. Hui-Chieh Lu, Yen-Ping Chu, Min-Shiang Hwang, "A New Steganographic Method of The Pixel-value Differencing", The Journal of Imaging Science and Technology, Vol. 50, no. 5, pp. 424-426, Oct., 2006. [SCI]
  128. Min-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, "Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows", IEICE Transactions on Information and Systems, vol. E89-D, no. 4, pp. 1575-1577, 2006. [SCI]
  129. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, "Security Enhancement on a New Authentication Scheme with Anonymity For Wireless Environments", IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683-1687, Oct. 2006. [SCI]
  130. Chwei-Shyong Tsai, Cheng-Chi Lee, and Min-Shiang Hwang, "Password Authentication Schemes: Current Status and Key Issues", International Journal of Network Security, vol. 3, no. 2, pp. 101-115, Sept. 2006.
  131. Chih-Wei Lin, Chwei-Shyong Tsai, Min-Shiang Hwang, "A New Strong-Password Authentication Scheme Using One-way Hash Functions", International Journal of Computer and Systems Sciences, vol. 45, no. 4, pp. 623-626, July 2006. (SCI)
  132. I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, "A Password Authentication Scheme Over Insecure Networks", Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740, June 2006. [SCI]
  133. Min-Shiang Hwang and Pei-Chen Sung, "A Study of Micro-payment Based on One-way Hash Chain", International Journal of Network Security, vol. 2, no. 2, pp. 81-90, Mar. 2006.
  134. Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures", Applied Mathematics and Computation, vol. 172, no. 2, pp. 1195-1200, Jan. 2006. [SCI]

    2005

  135. Min-Shiang Hwang and Ting-Yi Chang, "Threshold Signatures: Current Status and Key Issues", International Journal of Network Security, vol. 1, no. 3, pp. 123-137, Nov. 2005.
  136. Hsien-Chu Wu, Na-I Wu, Chwei-Shyong Tsai, Min Shiang Hwang, "Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods", IEE Proceedings Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611-615, Oct. 2005. [SCI] P211.pdf
  137. Min Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, and Chao-Chen Yang, "A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography", Telecommunication Systems, vol. 29, no. 3, pp. 165-180, 2005. [SCI]
  138. Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang, "A Time-Stamping Protocol for Digital Watermarking", Applied Mathematics and Computation, vol. 169, pp. 1276-1284, 2005. [SCI]
  139. Hsien-Chu Wu, Min-Shiang Hwang, Chia-Hsin Liu, "A Secure Strong-Password Authentication Protocol", Fundamenta Informaticae, vol. 68, pp. 399-406, 2005. [SCI]
  140. Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "A User Authentication System Using Back-Propagation Network", Neural Computing & Applications, vol. 14, no. 3, pp. 243-249, Sep. 2005. [SCI]
  141. Min-Shiang Hwang and Chi-Yu Liu, "Authenticated Encryption Schemes: Current Status and Key Issues", International Journal of Network Security, vol. 1, no. 2, pp. 61-73, Sept. 2005.
  142. Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Improvement on the Flexible Tree-Based Key Management Framework", Computers & Security, vol. 24, pp. 500-504, 2005. [SCI]
  143. Cheng-Chi Lee, Ting-Yi Chang, Min-Shiang Hwang, "A Simple Broadcasting Cryptosystem in Computer Networks Using Exclusive-OR", International Journal of Computer Applications in Technology, vol. 24, no. 3, pp. 180-183, 2005. [EI]
  144. Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang, "Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys", Applied Mathematics and Computation, vol. 166, no. 1, pp. 118-122, July 2005. [SCI]
  145. Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang, "The General Pay-Word: A Micro-payment Scheme Based on N-dimension One-way Hash Chain", Designs, Codes and Cryptography, vol. 36, no. 1, pp. 53-67, July 2005. [SCI]
  146. Min-Shiang Hwang and Cheng-Chi Lee, "Research Issues and Challenges for Multiple Digital Signatures", International Journal of Network Security, vol. 1, no. 1, pp. 1-7, July 2005.
  147. Ting-Yi Chang, Wei-Pang Yang, Min-Shiang Hwang, "Simple Authenticated Key Agreement and Protected Password Change Protocol", Computers & Mathematics with Applications, vol. 49, pp. 703-714, 2005. [SCI]
  148. Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Yang, "A New Blind Signature Based on the Discrete Logarithm Problem for Untraceability", Applied Mathematics and Computation, Vol. 164, no. 3, pp. 837-841, May 2005. [SCI]
  149. Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, "An Improvement on the Lin-Wu (t, n) Threshold Verifiable Multi-secret Sharing Scheme", Applied Mathematics and Computation, Vol 163, no. 1, pp 169-178, 2005. [SCI]
  150. Shiang-Feng Tzeng, Min-Shiang Hwang, Hsing-Bai Chen, "A Secure On-line Software Transaction Scheme", Computer Standards & Interfaces, vol. 27, no. 3, pp.303-312, Mar. 2005. [SCI]
  151. Eric Jui-Lin Lu, Min-Shiang Hwang, and Cheng-Jian Huang, "A New Proxy Signature Scheme with Revocation", Applied Mathematics and Computation, Vol. 161, No. 3, PP. 799-806, Feb. 2005. [SCI]
  152. Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang, "Improvement of Signature Scheme Based on Factoring and Discrete Logarithms", Applied Mathematics and Computation, Vol. 161, no. 1, pp. 49-54, Feb. 2005. [SCI]
  153. Ting-Yi Chang, Min-Shiang Hwang, and Wei-Pang Yang, “A New Multi-stage Secret Sharing Scheme Using One-way Function”, ACM Operating Systems Review, vol. 39, no. 1, pp. 48-55, Jan. 2005. [EI]
  154. Min-Shiang Hwang, Jung-Wen Lo, Chi-Yu Liu, Shu-Chen Lin, "Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card", Pakistan Journal of Applied Sciences, vol. 5, no. 1, pp. 99-100, Jan. 2005

    2004

  155. Min-Shiang Hwang, Chun-Ta Li, Jau-Ji Shen, Yen-Ping Chu, "Challenges in e-Government and Security of Information", Information & Security: An International Journal, Vol. 15, No. 1, pp. 9-20, 2004.
  156. Ting-Yi Chang, Min-Shiang Hwang, Wei-Pang Yang, "Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System without Using a One-way Hash Function", Information & Security: An International Journal, Vol. 15, No. 1, pp. 110-114, 2004.
  157. Jau-Ji Shen, Iuon-Chang Lin, Min-Shiang Hwang, "A Secure LITESET Scheme", IEICE Transactions on Information and Systems, Vol. E87-D, no. 11, pp. 2509-2512, 2004. [SCI]
  158. Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang, "On the Efficiency of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", Journal of Systems and Software, vol. 73, no. 3, pp. 507-514, Nov. 2004. [SCI]
  159. Min-Shiang Hwang, Jung-Wen Lo, Shu-Chen Lin, "An Efficient User Identification Scheme Based on ID-based Cryptosystem", Computer Standards & Interfaces, vol. 26, no. 6, pp.565-569, Oct. 2004. [SCI]
  160. Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang, “Cryptanalysis of an Efficient Secure Group Signature Scheme”, ACM Operating Systems Review, vol. 38, no. 4, pp. 67-69, Oct. 2004. [EI]
  161. Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "Cryptanalysis of Simple Authenticated Key Agreement Protocols", IEICE Transactions on Foundations, vol. E87-A, no. 8, pp. 2174-2176, Aug. 2004. [SCI]
  162. Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "A Threshold Signature Scheme for Group Communications without a Shared Distribution Center", Future Generation Computer Systems, vol. 20, no. 6, pp. 1013-1021, Aug. 2004. [SCI]
  163. Chwei-Shyong Tsai, Min-Shiang Hwang, Pei-Chen Sung, "Blind Signature Scheme Based on Elliptic Curve Cryptography", Journal of Computer Society of India, vol. 34, no. 3, pp. 58-60, July 2004. [EI]
  164. Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, "A New Anonymous Channel Protocol in Wireless Communications", International Journal of Electronics and Communications, vol. 58, pp. 218-222, 2004. [SCI]
  165. Chou-Chen Yang, Jian-Wei Li, Min-Shiang Hwang, "A New Mutual Authentication and Key Exchange Protocol with Balanced Computational Power for Wireless Settings", European Transactions on Telecommunications, vol. 15, no. 2, pp. 91-99, 2004. [SCI]
  166. Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu, "Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack", Fundamenta Informaticae, vol. 61, no. 3, pp. 389-398, July 2004. [SCI]
  167. Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee, “A Key Authentication Scheme With Non-repudiation”, ACM Operating Systems Review, vol. 38, no. 3, pp. 75-78, July. 2004. [EI]
  168. Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "Cryptanalysis of Publicly Verifiable Authenticated Encryption", IEICE Transactions on Foundations, vol. E87-A, no. 6, pp. 1645-1646, June 2004. [SCI]
  169. Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A Nonrepudiable Threshold Multi-Proxy Multi-Signature Scheme with Shared Verification", Future Generation Computer Systems, vol. 20, no. 5, PP. 887-893, June 2004. [SCI]
  170. Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "Efficient Access Control and Key Management Schemes for Mobile Agents", Computer Standards & Interfaces, vol. 26, no. 5, pp. 423-433, May 2004. [SCI]
  171. Ting-Yi Chang, Chou-Chen Yang, Min-Shiang Hwang, "Threshold Untraceable Signature for Group Communications", IEE Proceedings – Communications, vol. 151, no. 2, pp. 179-184, April 2004. [SCI]
  172. Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang, "An Improvement of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", Computers & Security, vol. 23, no. 2, pp. 174-178, April 2004. [SCI]
  173. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, “A Server-Assissted Authentication Protocol for Detecting Error Vectors”, ACM Operating Systems Review, vol. 38, no. 2, pp. 93-96, Apr. 2004. [EI]
  174. Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A (t,n) Multi-secret Sharing Scheme", Applied Mathematics and Computation, Vol. 151, No. 2 , pp. 483-490, April 2004. [SCI]
  175. Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong Tsai, "Generalization of Proxy Signature Based on Elliptic Curves", Computer Standards & Interfaces, vol. 26, no. 2, pp. 73-84, March 2004. [SCI]
  176. Shiang-Feng Tzeng, Min-Shiang Hwang, "Digital Signature with Message Recovery and Its Variants Based on Elliptic Curve Discrete Logarithm Problem", Computer Standards & Interfaces, vol. 26, no. 2, pp. 61-71, March 2004. [SCI]
  177. Chin-Chen Chang, Kuo-Lun Chen, Min-Shiang Hwang, "End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication", Wireless Personal Communications, Vol. 28, No. 2, pp. 95-106, Jan. 2004. [SCI]
  178. Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A New Digital Signature Scheme Based on Factoring and Discrete Logarithms", International Journal of Computer Mathematics, vol. 81, no. 1, pp. 9-14, 2004. [SCI]

    2003

  179. Cheng-Chi Lee, Chou-Chen Yang, Min-Shiang Hwang, "A New Privacy and Authentication Protocol for End-to-End Mobile Users", International Journal of Communication Systems, Vol. 16, PP. 799-808, 2003. [SCI]
  180. Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on RSA-Based Partially Signature with Low Computation", Applied Mathematics and Computation, vol. 145, no. 2-3, pp. 465-468, Dec. 2003. [SCI]
  181. Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang, "Security Enhancement for the Timestamp-Based Password Authentication Scheme Using Smart Cards", Computers & Security, Vol. 22, no. 7, pp. 591-595, Nov. 2003. [SCI]
  182. Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin, "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem", IEEE Transactions on Knowledge and Data Engineering, vol. 15. no. 6, pp. 1552-1560, Nov./Dec. 2003. [SCI] P049.pdf
  183. Min-Shiang Hwang, Chou-Chen Yang, Cheng-Yeh Shiu, “An Authentication Scheme for Mobile Satellite Communication Systems”, ACM Operating Systems Review, vol. 37, no. 4, pp. 42-47, Oct. 2003. [EI]
  184. Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "Security of Improvement on Methods for Protecting Password Transmission", Informatica, vol. 14, no. 4, pp. 551-558, 2003. [SCI]
  185. Shin-Jia Hwang, Min-Shiang Hwang, Shiang-Feng Tzeng, "A New Digital Multisignature Scheme with Distinguished Signing Authorities", Journal of Information Science and Engineering, vol. 19, no. 5, pp. 881-887, Sep. 2003. [SCI]
  186. Min-Shiang Hwang, Wei-Pang Yang, "Controlling Access in Large Partially-Ordered Hierarchies Using Cryptographic Keys", The Journal of Systems and Software, vol. 67, no. 2, pp. 99-107, Aug. 2003. [SCI] P005.pdf
  187. Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang, “Improved Non-repudiable Threshold Proxy Signature Scheme with Known Signers”, Informatica, vol. 14, no. 3, pp. 393-402, 2003. [SCI]
  188. Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, Min-Shiang Hwang, "Security Enhancement for Protecting Password Transmission", IEICE Transactions on Communications, vol. E86-B, no. 7, pp. 2178-2181, July 2003. [SCI]
  189. Cheng-Chi Lee, Min-Shiang Hwang, Li-Hua Li, "A New Key Authentication Scheme Based on Discrete Logarithms", Applied Mathematics and Computation, vol. 139, no. 2, pp. 343-349, July 2003. [SCI]
  190. Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "An Untraceable Blind Signature Scheme", IEICE Transactions on Foundations, vol. E86-A, no. 7, pp. 1902-1906, July 2003. [SCI]
  191. Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang, “Security Enhancement for Optimal Strong-Password Authentication Protocol”, ACM Operating Systems Review, vol. 37, no. 3, pp. 12-16, July 2003. [EI]
  192. Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang, "Generalization of Proxy Signature Based on Discrete Logarithms", Computers & Security, Vol. 22, No. 3, pp. 245-255, 2003. [SCI]
  193. Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "Untractable Blind Signature Schemes Based on Discrete Logarithm Problem", Fundamenta Informaticae, Vol. 55, Issue 3-4, pp. 307-320, June 2003. [SCI] P115
  194. Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang, "A Modified Remote User Authentication Scheme Using Smart Cards", IEEE Transactions on Consumer Electronics, vol. 49, no. 2, pp. 414-416, May 2003. [SCI]
  195. Iuon-Chung Lin, Min-Shiang Hwang, Chin-Chen Chang, "A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy", Future Generation Computer Systems, Vol. 19, no. 4, pp 457-462, May 2003. [SCI]
  196. Chou-Chen Yang, Ting-Yi Chang, Min-Shiang Hwang, "A New Anonymous Conference Key Distribution System Based on the Elliptic Curve Discrete Logarithm Problem", Computer Standards and Interfaces, Vol 25, No. 2, pp 141-145, May 2003. [SCI]
  197. Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang, "Security Enhancement for Anonymous Secure E-Voting over a Network", Computer Standards & Interfaces, Vol. 25, no. 2, pp. 131-139, May 2003. [SCI]
  198. Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "Extension of Authentication Protocol for GSM", IEE Proceedings – Communications, vol. 150, no. 2, pp. 91-95, Apr. 2003. [SCI]
  199. Eric Jui-Lin Lu, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis of Some Authenticated Key Agreement Protocols", International Journal of Computational and Numerical Analysis and Applications, Vol. 3, no. 2, pp. 151-157, Apr. 2003.
  200. Chou-Chen Yang, Ting-Yi Chang, Jian-Wei Li, Min-Shiang Hwang, "Simple Generalized Group-oriented Cryptosystems Using ElGamal Cryptosystem", Informatica, vol. 14, no. 1, pp. 111-120, 2003. [SCI]
  201. Iuon-Chung Lin, Min-Shiang Hwang, Li-Hua Li, "A New Remote User Authentication Scheme for Multi-Server Architecture", Future Generation Computer Systems, vol. 19, no. 1, pp. 13-22, 2003. [SCI]
  202. Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on Stadler et al.'s Fair Blind Signature Scheme", IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences, Vol. E86-A, no. 2, pp. 513-514, Feb. 2003. [SCI]

    2002

  203. Min-Shiang Hwang, Wei-Pang Yang, "An Authentication Protocol for Multicast Communications", Pakistan Journal of Applied Sciences, vol. 2, no. 12, pp. 1082-1083, Dec. 2002.
  204. Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang, "Cryptanalysis of the Hwang-Shi Proxy Signature Scheme", Fundamenta Informaticae, Vol. 53, No. 2, pp. 131-134, Nov. 2002. (SCI)
  205. Min-Shiang Hwang, Chih-Wei Lin, Cheng-Chi Lee, "Improved Yen-Joye's Authenticated Multiple-key Agreement Protocol", IEE Electronics Letters, vol. 38, no. 23, pp. 1429-1431, Nov. 2002. [SCI]
  206. Min-Shiang Hwang, S. Wesley Changchien, Cheng-Chi Lee, "A New Method to Strengthen Ciphers", International Journal of Pure and Applied Mathematics, vol. 3, no. 2, pp. 187-192, 2002.
  207. Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang, "Two Secure Transportation Schemes for Mobile Agents", Information and Security: An International Journal, vol. 8, no. 1, pp. 87-97, 2002.
  208. Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang, "A Remote User Authentication Scheme Using Hash Functions", ACM Operating Systems Review, vol. 36, no. 4, pp. 23-29, Oct. 2002. [EI]
  209. S. Wesley Changchien, Min-Shiang Hwang, "A Batch Verifying and Detecting Multiple RSA Digital Signatures", International Journal of Computational and Numerical Analysis and Applications, vol. 2, no. 3, pp. 303-307, Oct. 2002.
  210. Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang, "A Simple Remote User Authentication Scheme", Mathematical and Computer Modelling, Vol. 36, pp. 103-107, Oct. 2002. [SCI]
  211. Min-Shiang Hwang, Cheng-Chi Lee, Wei-Pang Yang, "An Improvement of Mobile Users Authentication in the Integration Environments", International Journal of Electronics and Communications, vol. 56, no. 5, pp 293-297, Sep. 2002. [SCI]
  212. Min-Shiang Hwang, Chao-Chen Yang, Shiang-Feng Tzeng, "Improved Digital Signature Scheme Based on Factoring and Discrete Logarithms", Journal of Discrete Mathematical Sciences & Cryptography, vol. 5, no. 2, pp. 151-155, Aug. 2002.
  213. Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, "A Flexible Remote User Authentication Scheme Using Smart Cards", ACM Operating Systems Review, vol. 36, no. 3, pp. 46-52, July 2002. [EI]
  214. Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang, "A Feature-Oriented Copyright Owner Proving Technique for Still Images", International Journal of Software Engineering and Knowledge Engineering, vol. 12, no. 3, pp. 317-330, June 2002. [SCI, EI] P064.pdf
  215. Min-Shiang Hwang, Cheng-Chi Lee, Ting-Yi Chang, "Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines", Journal of Information Science and Engineering, Vol. 18, No. 3, pp. 373-379, May 2002. [SCI]
  216. Yuan-Liang Tang, Min-Shiang Hwang, Ching-Rong Yang, "An Image Authentication Scheme Based On Digital Signatures", Pakistan Journal of Applied Sciences, vol. 2, no. 5, pp. 553-557, May 2002. P060.pdf
  217. Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai, "Traceability on Low-Computation Partially Blind Signatures for Electronic Cash", IEICE Fundamentals on Electronics, Communications and Computer Sciences, vol. E85-A, No. 5, pp. 1181-1182, May 2002. [SCI]
  218. Min-Shiang Hwang, Wei-Pang Yang, "Integrating Different Semantics of Classification Levels in Heterogeneous Distributed Database Systems", Pakistan Journal of Information and Technology, vol. 1, no. 1, pp. 1-4, April 2002.
  219. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An Improved Authentication Protocol Without Trusted Third Party", International Journal of Computational and Numerical Analysis and Applications, vol. 1, no. 4, pp. 407-412, April 2002.
  220. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An ElGamal-like Cryptosystem For Enciphering Large Messages", IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 2, pp. 445-446, March/April 2002. [SCI] P045.pdf
  221. Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang, “A Robust Authentication Scheme for Protecting Copyrights of Images and Graphics”, IEE Proceedings Vision, Image and Signal Processing, vol. 149, no. 1, pp. 43-50, Feb. 2002. [SCI] P059.pdf
  222. Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chung Lin, "Adding Timestamps to the Secure Electronic Auction Protocol", Data & Knowledge Engineering, vol. 40, no. 2, pp. 155-162, Feb. 2002. [SCI]
  223. Eric Jui-Lin Lu, Min-Shiang Hwang, "An Improvement of a Simple Authenticated Key Agreement Algorithm", Pakistan Journal of Applied Sciences, Vol. 2, no. 1, pp. 64-65, Jan. 2002. [MSHwang37.pdf]

    2001

  224. Li-Hua Li, Iuon-Chung Lin, Min-Shiang Hwang, "A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural Networks", IEEE Transactions on Neural Networks, vol. 12, no. 6, Nov. 2001, pp.1498-1504. [SCI]
  225. Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen, "A New Encryption Algorithm for Image Cryptosystems", Journal of Systems and Software, vol. 58, no. 2, pp. 83-91, Sep. 2001. [SCI] P038.pdf
  226. Min-Shiang Hwang, Chii-Hwa Lee, “Secure Access Schemes in Mobile Database Systems”, European Transactions on Telecommunications, vol. 12, no. 4, pp. 303-310, July 2001. [SCI]
  227. Min-Shiang Hwang, Cheng-Chi Lee, Eric Jui-Lin Lu, "Cryptanalysis of the Batch Verifying Multiple DSA-type Digital Signatures", Pakistan Journal of Applied Sciences, vol. 1, no. 3, pp. 287-288, July 2001.
  228. Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang, "An Improvement of SPLICE/AS in WIDE Against Guessing Attack", International Journal of Informatica, vol. 12, no. 2, pp.297-302, Apr. 2001. [SCI]
  229. Min-Shiang Hwang, Iuon-Chung Lin, Li-Hua Li, "A Simple Micro-payment Scheme", Journal of Systems and Software, vol. 55, no. 3, pp. 221-229, Jan. 2001. [SCI]

    2000

  230. Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang, "A Digital Watermarking Scheme Using Human Visual Effects", Informatica: An International Journal of Computing and Informatics, Vol. 24, No. 4, pp. 505-511, Dec. 2000. [EI]
  231. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "An Efficient Threshold Decryption Scheme without Session Keys", Computers & Electrical Engineering, vol. 27, no. 1, pp. 29-35, Nov. 2000. [SCI]
  232. Min-Shiang Hwang, "A New Redundancy Reducing Cipher", Informatica, vol. 11, no. 4, pp. 435-440, Oct. 2000. [SCI]
  233. Min-Shiang Hwang, "An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Totally-Ordered Hierarchies", International Journal of Computer Mathematics, vol. 73, no. 4, pp. 463-468, Oct. 2000. [SCI]
  234. Min-Shiang Hwang, Iuon-Chung Lin, Eric Jui-Lin Lu, "A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", Informatica, vol. 11, no. 2, pp. 1-8, Apr. 2000. [SCI]
  235. Min-Shiang Hwang, Li-Hua Li, "A New Remote User Authentication Scheme Using Smart Cards", IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp.28-30, Feb. 2000. [SCI]
  236. Min-Shiang Hwang, "Cryptanalysis of YCN Key Assignment Scheme in a Hierarchy", Information Processing Letters, vol. 73, no. 3, pp. 97-101, Feb. 2000. [SCI]
  237. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, "Digital Watermarking of Images Using Neural Networks", Journal of Electronic Imaging, vol. 9, no. 4, pp. 548-555, Jan. 2000. [SCI]
  238. Min-Shiang Hwang, Kuo-Feng Hwang, Iuon-Chung Lin, "Cryptanalysis of The Batch Verifying Multiple RSA Digital Signatures", Informatica, vol. 11, no. 1, pp. 1-4, Jan. 2000. [SCI]

    1999

  239. Min-Shiang Hwang, “A Remote Password Authentication Scheme Based on the Digital Signature Method”, International Journal of Computer Mathematics, vo1.70, no. 4, pp. 657-666, Oct. 1999. [SCI]
  240. Min-Shiang Hwang, “Dynamic Participation in a Secure Conference Scheme for Mobile Communications”, IEEE Transactions on Vehicular Technology, vol. 48, no. 5, pp. 1469-1474, Sep. 1999. [SCI]
  241. Min-Shiang Hwang, "A New Dynamic Cryptographic Key Generation Scheme for a Hierarchy", Nordic Journal of Computing, vol. 6, no. 4, pp. 363-371, Aug. 1999.
  242. Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, “Enhanced Privacy and Authentication for the Global System of Mobile Communications”, Wireless Networks, vol. 5, pp. 231-243, July 1999. [SCI]
  243. Min-Shiang Hwang, “Extension of CHW Cryptographic Key Assignment Scheme in a Hierarchy”, IEE Proceedings Computers and Digital Techniques, vol. 146, no. 4, pp. 217-218, July 1999. [SCI]
  244. Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, “A Novel Application of the Phone Card and Its Authentication in Mobile Communications”, Journal of Information Science and Engineering, vol. 15, no. 4, pp. 471-484, July 1999. [SCI]
  245. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang, “A Watermarking Technique Based on One-way Hash Functions", IEEE Transactions on Consumer Electronics, vol. 45, no. 2, pp.286-294, May 1999. [SCI]
  246. Min-Shiang Hwang, “Cryptanalysis of Remote Login Authentication Scheme”, Computer Communications, vol.22, no.8, pp.742-744, May 1999. [SCI]
  247. Min-Shiang Hwang, “An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E82-A, No.3, pp.548-550, March 1999. [SCI]
  248. Min-Shiang Hwang, “An Improvement of a Dynamic Cryptographic Key Assignment Schemes in a Tree Hierarchy”, Computers & Mathematics with Applications, vol.37, no.3, pp.19-22, Feb. 1999. [SCI]

    1995-1998

  249. Tung-Shou Chen, Chin-Chen Chang, and Min-Shiang Hwang, “A Virtual Image Cryptosystem Based upon Vector Quantization”, IEEE Transactions on Image Processing, Vo1.7, No.10, pp.1485-1488, Oct. 1998. [SCI] P034.pdf
  250. Min-Shiang Hwang, “A Cryptographic Key Assignment Scheme in a Hierarchy for Access Control”, Mathematical and Computer Modeling, Vo1.26, No2, pp.27-31, June 25,1997. [SCI]
  251. Min-Shiang Hwang and Chii-Hwa Lee, “Authenticated Key-Exchange in a Mobile Radio Network”, European Transactions on Telecommunications, Vo1. 8, No.3, pp.265-269, May 1997. [SCI]
  252. Min-Shiang Hwang and Wei-Pang Yang, “Multilevel Secure Database Encryption with Subkeys”, Data&Knowledge Engineering, Vo1.22, 1997, pp.117-131. [SCI]
  253. Chin-Chen Chang, Min-Shiang Hwang, “Parallel Computation of the Generating Keys for RSA Cryptosystems”, IEE Electronics Letters, vo1. 32, no. 15, July 1996, pp. 1365-1366. [SCI]
  254. Min-Shiang Hwang, Wen-Guey Tzeng, and Wei-Pang Yang, “An Access Control Scheme Based on Chinese Remainder Theorem and Time Stamp Concept”, Computers & Security, vo1.15, no. 1, 1996, pp.73-81. [SCI]
  255. Min-Shiang Hwang and Wei-Pang Yang, “A Two-Phase Encryption Scheme for Enhancing Database Security”, Journal of Systems and Software, vo1.31, No.12, December 1995, pp.257-265. [SCI]
  256. Min-Shiang Hwang and Wei-Pang Yang, “Conference Key Distribution Protocols for Digital Mobile Communication Systems", IEEE Journal on Selected Areas in Communications, vo1.13, no.2, February 1995, pp.416-420. [SCI]
  257. Min-Shiang Hwang and Wei-Pang Yang, “A New Dynamic Access Control Scheme Based on Subject-Object-List”, Data & Knowledge Engineering, Vo1.14, No.1, November 1994, pp.45-56. [SCI]
  258. Min-Shiang Hwang, Wen-Guey Tzeng, and Wei-Pang Yang, “A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp”, IEICE Transactions on Information and Systems, vo1. E77-D, No.9, September 1994, pp.1042-1046. [SCI]
  259. Min-Shiang Hwang, Chin-Chen Chang, Wei-Pang Yang, “Modified Chang-Hwang-Wu Access Control Scheme”, IEE Electronics Letters, vo1.29, no.24, November 1993, pp.2095-2096. [SCI]