Publications in Proxy Signature   [Other Topics]

1.Related Papers of “Proxy Signature” in International Journal of Network Security [IJNS-PeoxySig].

2.  Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng, “A New Proxy Signature Scheme for a Specified Group of Verifiers,” Information Sciences, vol. 227, pp. 102-115, April 2013. (SCI) P144.pdf

3.  Cheng-Chi Lee, Tzu-Chun Lin, Shiang-Feng Tzeng and Min-Shiang Hwang, “Generalization of Proxy Signature Based on Factorization”, International Journal of Innovative Computing, Information and Control, vol. 7, no. 3, pp. 1039-1054, Mar. 2011. (SCI)  P143.pdf

4.  Shiang-Feng Tzeng, Cheng-Chi Lee, and Min-Shiang Hwang, “A Batch Verification for Multiple Proxy Signature”, Parallel Processing Letters, vol. 21, no. 1, pp. 77-84, March 2011. (EI)  P128.pdf

5. Min-Shiang Hwang, Shiang-Feng Tzeng and Shu-Fen Chiou, "A Non-repudiable Multi-Proxy Multi-Signature Scheme", Innovative Computing, Information and Control Express Letters, Vol.3, No.3, pp. 259-264, September 2009.  P119.pdf

6.  Eric Jui-Lin Lu, Min-Shiang Hwang, and Cheng-Jian Huang, "A New Proxy Signature Scheme with Revocation", Applied Mathematics and Computation, Vol. 161, No. 3, PP. 799-806, Feb. 2005.   P255.pdf

7.  Cheng-Ying Yang, Shiang-Feng Tzeng, Min-Shiang Hwang, "On the Efficiency of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", The Journal of Systems and Software, vol. 73, no. 3, pp. 507-514, Nov. 2004. [SCI]   P117.pdf

8.  Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang, "A Nonrepudiable Threshold Multi-Proxy Multi-Signature Scheme with Shared Verification", Future Generation Computer Systems, vol. 20, no. 5, PP. 887-893, June 2004. [SCI]   P122.pdf

9.  Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang, "An Improvement of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", Computers & Security, vol. 23, no. 2, pp. 174-178, April 2004. [SCI]   P132.pdf

10.    Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong Tsai, "Generalization of Proxy Signature Based on Elliptic Curves", Computer Standards & Interfaces, vol. 26, no. 2, pp. 73-84, March 2004. [SCI]   P149.pdf

11.    Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin, "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem", IEEE Transactions on Knowledge and Data Engineering, vol. 15. no. 6, pp. 1552-1560, Nov./Dec. 2003. [SCI]   P049.pdf  

12.    Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang, “Improved Non-repudiable Threshold Proxy Signature Scheme with Known Signers”, Informatica, vol. 14, no. 3, pp. 393-402, 2003. [SCI]  P155.pdf

13.    Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang, "Generalization of Proxy Signature Based on Discrete Logarithms", Computers & Security, Vol. 22, No. 3, pp. 245-255, 2003. [SCI]  P147.pdf

14.    Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang, "Cryptanalysis of the Hwang-Shi Proxy Signature Scheme", Fundamenta Informaticae, Vol. 53, No. 2, pp. 131-134, Nov. 2002. (SCI)  P099.pdf

15. Min-Shiang Hwang, Iuon-Chung Lin, Eric Jui-Lin Lu, "A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers", Informatica, vol. 11, no. 2, pp. 137-144, Apr. 2000. [SCI]   P068.pdf