2024 |
黄明祥(Min-Shiang Hwang)、林承颖(Cheng-Ying Lin)、Chia-Chun Wu(Chia-Chun Wu)*, An Improvement of Three-Factor Remote User Authentication Protocol Using ECC, International Journal of Network Security, vol.26 no.3 pp.528-534, 2024 |
2024 |
黄明祥(Min-Shiang Hwang)、李后文(Hou-Wen Li)、Cheng-Ying Yang(Cheng-Ying Yang)*, An Improvement of A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography, International Journal of Network Security, vol.26 no.4 pp.713-718, 2024 |
2024 |
黄明祥(Min-Shiang Hwang)、Yung-Ling Chang、Ko-Yu Lin、Cheng-Ying Yang、Iuon-Chang Lin(Iuon-Chang Lin)*, Research on Data Security and Privacy of Smart Grids, International Journal of Network Security, vol.26 no.5 pp.901-910, 2024 |
2024 |
Cheng-Ying Yang、Jong-Shin Chen、Kuo-Chun Hsu、Jenq-Foung JF Yao、黄明祥(Min-Shiang Hwang)*, Time-Varying Cypher Assignment Based on Secrecy Capacity, Journal of Internet Technology, vol.25 no.5 pp.763-769, 2024 |
2024 |
Chia-Chung Wu、Chung-Huei Ling、黄明祥(Min-Shiang Hwang)*, A Processing-type Active Real-time Traceable Certification System, Scientific Reports, vol.14 no.1 pp.1-8, 2024 |
2024 |
Chia-Chun Wu、Chun-Tse Chang、Iuon-Chang Lin、黄明祥(Min-Shiang Hwang)*, Research on Blockchain Secret Key Sharing and Its Digital Asset Applications, International Journal of Network Security, vol.26 no.1 pp.160-166, 2024 |
2024 |
Cheng-Ying Yang、Jong-Shin Chen、Jenq-Foung JF Yao、黄明祥(Min-Shiang Hwang)*, A Study on Cypher Assignment Based on Secrecy Capacity, International Journal of Network Security, vol.26 no.2 pp.167-172, 2024 |
2023 |
胡文品(Wen-Pin Hu)、Chin-Bin Lin、Jing-Ting Wu、Cheng-Ying Yang、黄明祥(Min-Shiang Hwang)*, Research on Privacy and Security of Federated Learning in Intelligent Plant Factory Systems, International Journal of Network Security, vol.25 no.2 pp.377-384, 2023 |
2023 |
黄明祥(Min-Shiang Hwang)、Hou-Wen Li、Cheng-Ying Yang(Cheng-Ying Yang)*, An Improved of Enhancements of a User Authentication Scheme, International Journal of Network Security, vol.25 no.3 pp.508-514, 2023 |
2023 |
Kurnia Anggriani、Shu-Fen Chiou、Nan-I Wu、黄明祥(Min-Shiang Hwang)*, High Imperceptible Data Hiding Method for AMBTC Compressed Images Based on Combination Theory, Applied Sciences-Basel, vol.13 no.12 pp.1-12, 2023 |
2023 |
Chia-Chun Wu、Chung-Huei Ling、Shyh-Chang Tsaur、黄明祥(Min-Shiang Hwang)*, A Real Time Food Auto Traceable Authentication System, International Journal of Network Security, vol.25 no.4 pp.630-639, 2023 |
2023 |
Cheng-Ying Yang、Chun-Yi Shih、Chou-Chen Yang、黄明祥(Min-Shiang Hwang)*, Freeze-Phish: An ANN Based Phishing Detection System, International Journal of Network Security, vol.25 no.5 pp.893-898, 2023 |
2023 |
黄明祥(Min-Shiang Hwang)、Shih-Ting Hsu、Cheng-Ying Yang(Cheng-Ying Yang)*, A New Secure Channel Free Public Key Encryption with Keyword Search Scheme Based on ElGamal Cryptosystems, International Journal of Network Security, vol.25 no.6 pp.1070-1076, 2023 |
2023 |
Kurnia Anggriani、Shu-Fen Chiou、Nan-I Wu、黄明祥(Min-Shiang Hwang)*, A Robust and High-Capacity Coverless Information Hiding Based on Combination Theory, INFORMATICA, vol.34 no.3 pp.449-464, 2023 |
2023 |
Kurnia Anggriani、Shu-Fen Chiou、Nan-I Wu、黄明祥(Min-Shiang Hwang)*, A High Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragment, Electronics, vol.12 no.2 pp.1-10, 2023 |
2023 |
Kurnia Anggriani、Nan-I Wu、黄明祥(Min-Shiang Hwang)*, Research on Coverless Image Steganography, International Journal of Network Security, vol.25 no.1 pp.25-31, 2023 |
2022 |
Yung-Chih Lu、黄明祥(Min-Shiang Hwang)*, A Cryptographic Key Generation Scheme without a Trusted Third Party for Access Control in Multilevel Wireless Sensor Networks, International Journal of Network Security, vol.24 no.5 pp.959-964, 2022 |
2022 |
Kurnia Anggriani、Nan-I Wu、黄明祥(Min-Shiang Hwang)*, Research on Data Hiding Schemes for AMBTC Compressed Images, International Journal of Network Security, vol.24 no.6 pp.1114-1123, 2022 |
2022 |
Eko Fajar Cahyadi、黄明祥(Min-Shiang Hwang)*, A Comprehensive Survey on Certificateless Aggregate Signature in Vehicular Ad Hoc Networks, IETE TECHNICAL REVIEW, vol.39 no.6 pp.1265-1276, 2022 |
2022 |
Eko Fajar Cahyadi、黄明祥(Min-Shiang Hwang)*, A Lightweight BT-based Authentication Scheme for Illegal Signatures Identification in VANETs, IEEE Access, vol.10 no.12 pp.133869-133882, 2022 |
2022 |
Yu-Ying Hsieh、Liang-Hsu Chang、廖岳祥(Anthony Y. H. Liao)、Cheng-Ying Yang、黄明祥(Min-Shiang Hwang)*, The System Adoption Evaluation of RFID Safety Management System on Campus, International Journal of Network Security, vol.24 no.1 pp.176-180, 2022 |
2022 |
Eko Fajar Cahyadi、Cahya Damarjati、黄明祥(Min-Shiang Hwang), Review on Identity-based Batch Verification Schemes for Security and Privacy in VANETs, Journal of Electronic Science and Technology, vol.20 no.1 pp.92-110, 2022 |
2022 |
Eko Fajar Cahyadi、黄明祥(Min-Shiang Hwang), An improved efficient authentication scheme for vehicular ad-hoc networks with batch verification using bilinear pairings, International Journal of Embedded Systems, vol.15 no.2 pp.139-148, 2022 |
2022 |
廖岳祥(Anthony Y. H. Liao)、Yu-Ying Hsieh、Cheng-Ying Yang、黄明祥(Min-Shiang Hwang), Research on the Trusted Online Examination Systems, International Journal of Network Security, vol.24 no.3 pp.541-550, 2022 |
2022 |
Lanxiang Chen(Lanxiang Chen)*、Qingxiao Fu、Yi Mu、Lingfang Zeng、Fatemeh Rezaeibagha、黄明祥(Min-Shiang Hwang), Blockchain-based random auditor committee for integrity verification, Future Generation Computer Systems, vol.131 no.6 pp.183-193, 2022 |
2022 |
廖岳祥(Anthony Y. H. Liao)、Yu-Ying Hsieh、Cheng-Ying Yang、黄明祥(Min-Shiang Hwang), Research on a Trustworthy Digital Learning Roll Call System, International Journal of Network Security, vol.24 no.4 pp.681-688, 2022 |
2022 |
Zhao-Ping Peng、Mao-Lun Chiang、Iuon-Chang Lin、Chou-Chen Yang、黄明祥(Min-Shiang Hwang), CBP2P: Cooperative Electronic Bank Payment Systems Based on Blockchain Technology, Journal of Internet Technology, vol.23 no.4 pp.683-692, 2022 |
2022 |
Eko Fajar Cahyadi、Tzu-Wei Su、Chou-Chen Yang、黄明祥(Min-Shiang Hwang), A certificateless aggregate signature scheme for security and privacy protection in VANET, International Journal of Distributed Sensor Networks, vol.18 no.5 pp.1-21, 2022 |
2022 |
Jia-Rong Sun、Chin-Tser Huang、黄明祥(Min-Shiang Hwang), A SYN Flooding Attack Detection Approach with Hierarchical Policies Based on Self-information, ETRI JOURNAL, 2022 |
2021 |
Yung-Chen Chou、Kurnia Anggriani、Nan-I Wu、黄明祥(Min-Shiang Hwang), Research on E-book Text Copyright Protection and Anti-tampering Technology, International Journal of Network Security, vol.23 no.5 pp.739-749, 2021 |
2021 |
Cheng-Ying Lin、Li-Chin Huang、Yi-Hui Chen、黄明祥(Min-Shiang Hwang), Research on Security and Performance of Blockchain with Innovation Architecture Technology, International Journal of Network Security, vol.23 no.1 pp.1-8, 2021 |
2021 |
Li-Chin Huang、Shu-Fen Chiou、黄明祥(Min-Shiang Hwang)*, A Reversible Data Hiding Based on Histogram Shifting of Prediction Errors for Two-Tier Medical Images, INFORMATICA, vol.32 no.1 pp.69-84, 2021 |
2021 |
Hsieh-Tsen Pan、Li-Chin Huang、黄明祥(Min-Shiang Hwang)*, Research on Private and Seamless Roaming Cloud Service Authentications, International Journal of Network Security, vol.23 no.2 pp.187-194, 2021 |
2021 |
Hung-Wei Yang、Li-Chin Huang、黄明祥(Min-Shiang Hwang)*, Research on Detection and Prevention of Mobile Device Botnet in Cloud Service Systems, International Journal of Network Security, vol.23 no.3 pp.371-378, 2021 |
2021 |
Tzong-Shyuan Chen、黄明祥(Min-Shiang Hwang)、Yin-Ju Chang, The Effect Of Wealth Effect and Population Aging on Tourism Expenditure, Current Issues in Tourism, 2021 |
2021 |
Cheng-Ying Lin、Chia-Chun Wu、黄明祥(Min-Shiang Hwang)*, Research on E-book Security Tracking Schemes, International Journal of Network Security, vol.23 no.4 pp.549-557, 2021 |
2021 |
Eko Fajar Cahyadi、黄明祥(Min-Shiang Hwang), An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs, PLoS One, vol.16 no.9 pp.1-13, 2021 |
2021 |
Eko Fajar Cahyadi、黄明祥(Min-Shiang Hwang), The Study on the Key Management and Billing for Wireless Sensor Networks, International Journal of Network Security, vol.23 no.6 pp.937-947, 2021 |
2020 |
Hsieh-Tsen Pan、Hung-Wei Yang、黄明祥(Min-Shiang Hwang), An Enhanced Secure Smart Card-based Password Authentication Scheme, International Journal of Network Security, vol.22 no.2 pp.358-363, 2020 |
2020 |
Hung-Wei Yang、Hsieh-Tsen Pan、Yung-Hsing Chen、黄明祥(Min-Shiang Hwang), A Taxonomy of User Authentication Schemes for Multi-server Environments, International Journal of Network Security, vol.22 no.3 pp.365-372, 2020 |
2020 |
Hsieh-Tsen Pan、Shu-Fen Chiou、Cheng-Ying Yang、黄明祥(Min-Shiang Hwang)*, An Improved Key Agreement Authentication Scheme Based on an Anonymous Password, International Journal of Electrical and Electronic Engineering & Telecommunications, vol.9 no.3 pp.199-205, 2020 |
2020 |
黄明祥(Min-Shiang Hwang)、Ming-Ru Xie、Chia-Chun Wu, A Reversible Hiding Technique Using LSB Matching for Relational Databases, INFORMATICA, vol.31 no.3 pp.481-497, 2020 |
2020 |
Yi-Hui Chen、黄明祥(Min-Shiang Hwang)、Iuon-Chang Lin, Research on the Secure Financial Surveillance Blockchain Systems, International Journal of Network Security, vol.22 no.4 pp.708-716, 2020 |
2020 |
Li-Chin Huang、Chun-Hsien Chang、黄明祥(Min-Shiang Hwang), Research on Malware Detection and Classification Based on Artificial Intelligence, International Journal of Network Security, vol.22 no.5 pp.717-727, 2020 |
2020 |
Yi-Hui Chen、Li-Chin Huang、Iuon-Chang Lin、黄明祥(Min-Shiang Hwang), Research on Blockchain Technologies in Bidding Systems, International Journal of Network Security, vol.22 no.6 pp.897-904, 2020 |
2020 |
Yu-Lun Wang、黄明祥(Min-Shiang Hwang)、Jau-Ji Shen, An Improved Reversible Data Hiding for Block Truncation Coding Compressed Images, IETE TECHNICAL REVIEW, vol.37 no.6 pp.615-621, 2020 |
2019 |
Shu-Fen Chiou、Eko Fajar Cahyadi、Cheng-Ying Yang、黄明祥(Min-Shiang Hwang)*, An improved Chang-Lee’s smart card-based authentication scheme, Journal of Physics: Conference Series, vol.1237 pp.042044-, 2019 |
2019 |
黄明祥(Min-Shiang Hwang)、Eko Fajar Cahyadi、Shu-Fen Chiou、Cheng-Ying Yang(Cheng-Ying Yang)*, Reviews and analyses the privacy-protection system for multi-server, Journal of Physics: Conference Series, vol.1237, 2019 |
2019 |
Shu-Fen Chiou、Hsieh-Tsen Pan、Eko Fajar Cahyadi、黄明祥(Min-Shiang Hwang), Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications, International Journal of Network Security, vol.21 no.1 pp.100-104, 2019 |
2019 |
Tzu-Chun Lin、Ting-Yi Yeh、黄明祥(Min-Shiang Hwang), Cryptanalysis of an ID-based Deniable Threshold Ring Authentication, International Journal of Network Security, vol.21 no.2 pp.298-302, 2019 |
2019 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Shih-Ting Hsu, An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, vol.30 no.2 pp.255-273, 2019 |
2019 |
Chia-Chun Wu、Cheng-Yin Yang、黄明祥(Min-Shiang Hwang)、Mei-Yu Lin, The Design and Application of a Web-Based Teacher Evaluation System for STEM Education, INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING EDUCATION, 2019 |
2019 |
Chia-Chun Wu、Cheng-Yin Yang、黄明祥(Min-Shiang Hwang)、Cheng-Yee Lee, A Trustworthy Web-based System Platform for Teaching Evaluation and STEM Education, INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING EDUCATION, 2019 |
2019 |
Hsieh-Tsen Pan、Eko Fajar Cahyadi、Shu-Fen Chiou、黄明祥(Min-Shiang Hwang), Research on batch verification schemes for identifying illegal signatures, International Journal of Network Security, vol.21 no.6 pp.1062-1070, 2019 |
2018 |
Yu-Lun Wang、Jau-Ji Shen、黄明祥(Min-Shiang Hwang)*, A Survey of Reversible Data Hiding for VQ-Compressed Images", International Journal of Network Security, Vol. 20, No. 1, pp. 1-8, Jan. 2018, International Journal of Network Security, vol.20 no.1 pp.1-8, 2018 |
2018 |
Cheng-Yi Tsai、Pi-Fang Ho、黄明祥(Min-Shiang Hwang)*, A Secure Group Signature Scheme", International Journal of Network Security, Vol. 20, No. 2, pp. 201-205, Mar. 2018, International Journal of Network Security, vol.20 no.2 pp.201-205, 2018 |
2018 |
Yu-Lun Wang、Jau-Ji Shen、黄明祥(Min-Shiang Hwang)*, A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching, International Journal of Network Security, vol.20 no.4 pp.801-804, 2018 |
2018 |
Tung-Huang Feng、施能义(Neng-Yih Shih)、黄明祥(Min-Shiang Hwang), Safety Relay Selection Algorithms Based on Fuzzy Relationship for Wireless Sensor Networks, JOURNAL OF SUPERCOMPUTING pp.1-16, 2018 |
2018 |
Cheng-Yi Tsai、Cheng-Ying Yang、Iuon-Chang Lin、黄明祥(Min-Shiang Hwang), A Survey of E-book Digital Right Management, International Journal of Network Security, vol.20 no.5 pp.998-1004, 2018 |
2018 |
Li-Chin Huang、黄明祥(Min-Shiang Hwang), A Conference Key Scheme Based on the Diffie-Hellman Key Exchange, International Journal of Network Security, vol.20 no.6 pp.1221-1226, 2018 |
2017 |
Shih-Ming Chen、Ching-Rong Yang、黄明祥*, Using a New Structure in Group Key Management for Pay-TV, International Journal of Network Security, vol.19 no.1 pp.112-117, 2017 |
2017 |
Li-Chin Huang、Tung-Huang Feng、黄明祥*, A New Lossless Embedding Techniques Based on HDWT, IETE TECHNICAL REVIEW, vol.37 no.1 pp.40-48, 2017 |
2017 |
Chung-Huei Ling、Cheng-Chi Lee、Chou-Chen Yang、黄明祥*, A Secure and Efficient One-time Password Authentication Scheme for WSN, International Journal of Network Security, vol.19 no.2 pp.177-181, 2017 |
2017 |
Chia-Hui Wei、黄明祥*、Augustin Yeh-Hao Chin, A Secure Privacy and Authentication Protocol for Passive RFID Tags, International Journal of Mobile Communications, vol.15 no.3 pp.266-277, 2017 |
2017 |
黄明祥、Tsuei-Hung Sun、C. C. Lee(Cheng-Chi Lee)*, Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service, JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, vol.26 no.5 pp.1-16, 2017 |
2017 |
Cheng-Yi Tsai、Chi-Yu Liu、Shyh-Chang Tsaur、黄明祥*, A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms, International Journal of Network Security, vol.19 no.3 pp.443-448, 2017 |
2017 |
Wan-Yu Chao、Cheng-Yi Tsai、黄明祥*, An Improved Key-Management Scheme for Hierarchical Access Control, International Journal of Network Security, vol.19 no.4 pp.639-643, 2017 |
2017 |
Ting-Yi Chang、黄明祥、Chou-Chen Yang, Password Authenticated Key Exchange and Protected Password Change Protocols, Symmetry-Basel, vol.9 no.8 pp.1-12, 2017 |
2017 |
Nan-I Wu、黄明祥*, A Novel LSB Data Hiding Scheme with the Lowest Distortion,” , Volume: 65, Issue: 06, pages 371 – 378, Aug. 2017, IMAGING SCIENCE JOURNAL, vol.65 no.6 pp.371-378, 2017 |
2017 |
Yu-Lun Wang、Jau-Ji Shen、黄明祥*, An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching, International Journal of Network Security, vol.19 no.5 pp.858-862, 2017 |
2017 |
黄明祥*、Shih-Ming Chen、Chi-Yu Liu, Digital Signature with Message Recovery Based on Factoring and Discrete Logarithm,” , vol. 62, no. 3, pp. 415-423, Sept. 2016., IETE JOURNAL OF RESEARCH, vol.62 no.3 pp.415-423, 2017 |
2017 |
Nan-I Wu、黄明祥*, Development Of A Data Hiding Scheme Based On Combination Theory For Lowering The Visual Noise In Binary Images, DISPLAYS, vol.49 no.9 pp.116-123, 2017 |
2017 |
Jong-Shin Chen、Cheng-Ying Yang、黄明祥*, The Capacity Analysis in the Secure Cooperative Communication System, International Journal of Network Security, vol.19 no.6 pp.863-869, 2017 |
2016 |
黄明祥*、Song-Kong Chong、Hsia-Hung Ou, The Moderately Hard DoS-resistant Authentication Protocol on Client Puzzles, INFORMATICA, vol.27 no.1 pp.1-18, 2016 |
2016 |
Wei-Fu Hsien、Chou-Chen Yang、黄明祥*, A Survey of Public Auditing for Secure Data Storage in Cloud Computing, International Journal of Network Security, vol.18 no.1 pp.133-142, 2016 |
2016 |
Chung-Huei Ling、Wei-Fu Hsien、黄明祥*, A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach, International Journal of Network Security, vol.18 no.2 pp.397-400, 2016 |
2016 |
Chung-Huei Ling、Shih-Ming Chen、黄明祥*, Cryptanalysis of Tseng-Wu Group Key Exchange Protocol, International Journal of Network Security, vol.18 no.3 pp.590-593, 2016 |
2016 |
Chi-Wei Liu、Wei-Fu Hsien、Chou-Chen Yang、黄明祥*, A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing, International Journal of Network Security, vol.18 no.4 pp.650-666, 2016 |
2016 |
Chi-Wei Liu、Wei-Fu Hsien、Chou-Chen Yang、黄明祥*, A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage, International Journal of Network Security, vol.18 no.5 pp.900-916, 2016 |
2016 |
Ming-Ru Xie、Chia-Chun Wu、Jau-Ji Shen、黄明祥*, A Survey of Data Distortion Watermarking Relational Databases, International Journal of Network Security, vol.18 no.6 pp.1022-1033, 2016 |
2015 |
Jia-Rong Sun、黄明祥, A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server, Frontiers in Artificial Intelligence and Applications, vol.274 pp.850-857, 2015 |
2015 |
Heri Wijayanto、黄明祥, Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance, International Journal of Network Security, vol.17 no.2 pp.160-164, 2015 |
2015 |
冯栋煌(Tung-Huang Feng)、Wei Teng Li、黄明祥, A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey, International Journal of Network Security, vol.17 no.3 pp.229-236, 2015 |
2015 |
Chia-Hui Wei、黄明祥、Augustin Yeh-hao Chin, Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection, IETE TECHNICAL REVIEW, vol.32 no.3 pp.183-187, 2015 |
2015 |
纪逸伦(Yi-Lun Chi)、Cheng Hao Chen、Iuon-Chang Lin、黄明祥, The Secure Transaction Protocol in NFC Card Emulation Mode, International Journal of Network Security, vol.17 no.4 pp.431-438, 2015 |
2015 |
黄明祥、Cheng-Chi Le、Pei-Shan Chu, An Efficient IC-Lock Self-Reader Data Security in Cloud Computing, Applied Mathematics & Information Sciences, vol.9 no.4 pp.2099-2106, 2015 |
2015 |
黄明祥、Cheng-Chi Lee、Pei-Shan Chung, An Efficient IC-Lock Self-Reader Data Security in Cloud Computing, Applied Mathematics & Information Sciences, vol.9 no.4 pp.2099-2106, 2015 |
2015 |
YanLi Ren、Shuozhong Wang、Xinpeng Zhang、黄明祥, An Efficient Batch Verifying Scheme for Detecting Illegal Signatures, International Journal of Network Security, vol.17 no.4 pp.463-470, 2015 |
2015 |
孙加荣(Jia-Rong Sun)、施茂林、黄明祥, A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure, International Journal of Network Security, vol.17 no.5 pp.497-509, 2015 |
2015 |
冯栋煌(Tung-Huang Feng)、施能义(Neng-Yih Shih)、黄明祥, A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks, International Journal of Network Security, vol.17 no.6 pp.712-721, 2015 |
2015 |
Jia-Rong Sun、施茂林、黄明祥, Cases Study and Analysis of the Court Judgement of Cybercrimes in Taiwan, International Journal of Law Crime and Justice, vol.43 no.4 pp.412-423, 2015 |
2014 |
Pei-Shan Chung、Chi-Wei Liu、黄明祥, A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments, International Journal of Network Security, vol.16 no.1 pp.1-13, 2014 |
2014 |
Li-Chin Huang、黄明祥, An Efficient MQV Key Agreement Scheme, International Journal of Network Security, vol.16 no.2 pp.157-160, 2014 |
2014 |
Li-Chin Huang、黄明祥, An Efficient MQV Key Agreement Scheme, International Journal of Network Security, vol.16 no.2 pp.157-160, 2014 |
2014 |
黄明祥、Shu-Yin Hsia、Wei-Pang Yang, Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178., Information-An International Interdisciplinary Journal, vol.17 no.4 pp.1173-1178, 2014 |
2014 |
Te-Yu Chen、林宗辉(Chung-Huei Ling)、黄明祥, Weaknesses of the Yoon-Kim-Yoo Remote User Authentication Scheme Using Smart Cards, 2014 IEEE Workshop on Electronics, Computer and Applications pp.771-774, 2014 |
2014 |
Li-Chin Huang、黄明祥、Wei-Pang Yang, A Conference Key Distribution Scheme in Tree Hierarchies, BRIS Journal of Advances in Science & Technology, vol.2 no.4 pp.76-81, 2014 |
2014 |
Tung-Huang Feng、Chung-Huei Ling、黄明祥, Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments, International Journal of Network Security, vol.16 no.4 pp.318-321, 2014 |
2014 |
Tung-Huang Feng、Chung-Huei Ling、黄明祥, Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments, International Journal of Network Security, vol.16 no.4 pp.318-321, 2014 |
2014 |
黄明祥、Cheng-Chi Lee、Tsuei-Hung Sun, Data Error Locations Reported by Public Auditing in Cloud Storage Service, Automated Software Engineering, vol.21 no.3 pp.373-390, 2014 |
2014 |
Wei Teng Li、Tung-Huang Feng、黄明祥, Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey, International Journal of Network Security, vol.16 no.5 pp.323-330, 2014 |
2014 |
黄明祥、Shih-Ting Hsu、Cheng-Chi Lee, A New Public Key Encryption with Conjunctive Field Keyword Search Scheme, Information Technology and Control, vol.43 no.3 pp.277-288, 2014 |
2014 |
Wei Teng Li、冯栋煌(Tung-Huang Feng)、黄明祥, Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey, International Journal of Network Security, vol.16 no.5 pp.323-330, 2014 |
2014 |
Wei Teng Li、林宗辉、黄明祥, Group Rekeying in Wireless Sensor Networks: A Survey, International Journal of Network Security, vol.16 no.6 pp.400-410, 2014 |
2014 |
Wei Teng Li、Chung-Huei Ling、黄明祥, Group Rekeying in Wireless Sensor Networks: A Survey, International Journal of Network Security, vol.16 no.6 pp.400-410, 2014 |
2013 |
Cheng-Chi Lee、Chia-Hsin Liu、黄明祥(Min-Shiang Hwang), Guessing Attacks on Strong-Password Authentication Protocol, International Journal of Network Security, vol.15 no.1 pp.64-67, 2013 |
2013 |
Chun-Ta Li、黄明祥(Min-Shiang Hwang), A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol, International Journal of Security and Its Applications, vol.7 no.1 pp.59-70, 2013 |
2013 |
Li-Chin Huang、黄明祥(Min-Shiang Hwang), Two-party Authenticated Multiple-key Agreement Based on Elliptic Curve Discrete Logarithm Problem, International Journal of Smart Home, vol.7 no.1 pp.9-18, 2013 |
2013 |
Jung-Wen Lo、Hung-Miao Lu、Tsuei-Hung Sun、黄明祥(Min-Shiang Hwang), Improved on Date Attachable Electronic Cash, Applied Mechanics and Materials, vol.284 pp.3444-3448, 2013 |
2013 |
Li-Chin Huang、黄明祥(Min-Shiang Hwang)、Lin-Yu Tseng, Reversible and high-capacity data hiding in high quality medical images, KSII Transactions on Internet and Information Systems, vol.7 no.1 pp.132-148, 2013 |
2013 |
Chou-Chen Yang、Ting-Yi Chang、黄明祥(Min-Shiang Hwang), A New Group Signature Scheme Based on RSA Assumption, Information Technology and Control, vol.42 no.1 pp.61-66, 2013 |
2013 |
Tzu-Chun Lin、Te-Yu Chen、Chiun-Shiang Gau、黄明祥, A Key Agreement for Large Group Using Bilinear Maps, Journal of Theoretical and Applied Information Technology, vol.49 no.2 pp.871-878, 2013 |
2013 |
Li-Chin Hwang、Cheng-Chi Lee、黄明祥(Min-Shiang Hwang), A n2+n MQV Key Agreement Protocol, International Arab Journal of Information Technology, vol.10 no.2 pp.137-142, 2013 |
2013 |
Shih-Ting Hsu、Chou-Chen Yang、黄明祥(Min-Shiang Hwang)、、, A Study of Public Key Encryption with Keyword Search, International Journal of Network Security, vol.15 no.2 pp.71-79, 2013 |
2013 |
Li-Chin Huang、Lin-Yu Tseng、黄明祥(Min-Shiang Hwang), A Reversible Data Hiding Method by Histogram Shifting in High Quality Medical Images, JOURNAL OF SYSTEMS AND SOFTWARE, vol.86 no.3 pp.716-727, 2013 |
2013 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Shiang-Feng Tzeng, A New Proxy Signature Scheme for a Specified Group of Verifiers, INFORMATION SCIENCES, vol.227 pp.102-115, 2013 |
2013 |
Li-Chin Huang、黄明祥(Min-Shiang Hwang)、Lin-Yu Tseng, Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map, Journal of Electronic Science and Technology, vol.11 no.2 pp.230-236, 2013 |
2013 |
Jung-Wen Lo、黄明祥(Min-Shiang Hwang)、Chia-Hsin Liu, A Simple Key Assignment for Access Control Based on Polynomial, ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, vol.38 no.6 pp.1397-1403, 2013 |
2013 |
Cheng-Chi Lee、Pei-Shan Chung、黄明祥(Min-Shiang Hwang), A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments, International Journal of Network Security, vol.15 no.4 pp.231-240, 2013 |
2013 |
Shu-Fen Chiou、Yung-Chih Lu、I-En Liao、黄明祥(Min-Shiang Hwang), An Efficient Reversible Data Hiding Scheme Based on SMVQ, IMAGING SCIENCE JOURNAL, vol.61 no.6 pp.467-474, 2013 |
2013 |
Cheng-Chi Lee、Shih-Ting Hsu、黄明祥(Min-Shiang Hwang), A Study of Conjunctive Keyword Searchable Schemes, International Journal of Network Security, vol.15 no.5 pp.321-330, 2013 |
2013 |
黄明祥(Min-Shiang Hwang)、Tsuei?Hung Sun, Using Smart Card to Achieve a Single Sign‑on for Multiple Cloud Services, IETE TECHNICAL REVIEW, vol.30 no.5 pp.410-416, 2013 |
2013 |
Hsia-Hung Ou、黄明祥(Min-Shiang Hwang), Double Delegation-based Authentication and Key Agreement Protocol for PCSs", Volume 72, Issue 1, Page 437-446, 2013., WIRELESS PERSONAL COMMUNICATIONS, vol.72 no.1 pp.437-446, 2013 |
2013 |
Song-Kong Chong、Cheng-Chi Lee、黄明祥(Min-Shiang Hwang), An Authentication Scheme for the Global Mobility Network, Parallel Processing Letters, vol.23 no.4 pp.1-10, 2013 |
2013 |
Min-Yu Chen、Chou-Chen Yang、黄明祥(Min-Shiang Hwang), Privacy Protection Data Access Control, International Journal of Network Security, vol.15 no.6 pp.411-419, 2013 |
2013 |
Te-Yu Chen、Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)、Jinn-Ke Jan, Towards Secure and Efficient User Authentication Scheme Using Smart Card for Multi-Server Environments, JOURNAL OF SUPERCOMPUTING, vol.66 no.2 pp.1008-1032, 2013 |
2012 |
Chun-Ta Li、Chou-Chen Yang、黄明祥(Min-Shiang Hwang)*, A secure routing protocol with node selfishness resistance in MANETs, International Journal of Mobile Communications, vol.10 no.1 pp.103-118, 2012 |
2012 |
Tsuei-Hung Sun、黄明祥(Min-Shiang Hwang), A Hierarchical Data Access and Key Management in Cloud Computing, ICIC Express Letters, vol.6 no.2 pp.569-574, 2012 |
2012 |
Chun-Ta Li、黄明祥(Min-Shiang Hwang), Security Enhancement of Chang-Lee Anonymous E-Voting Schem, International Journal of Smart Home, vol.6 no.2 pp.45-52, 2012 |
2012 |
Chou-Chen Yang、Huan-Chin Hsu、黄明祥(Min-Shiang Hwang), Design and Implementation of a P2P-Based DRM System, Lecture Notes in Information Technology, vol.19 pp.73-79, 2012 |
2012 |
Chou-Chen Yang、Shin-Hao Lo、黄明祥(Min-Shiang Hwang), An Improved re-authentication Scheme Using Tickets Based on EAP TLS Authentication Protocol for Wireless Local Area Networks, Lecture Notes in Information Technology, vol.19 pp.80-85, 2012 |
2012 |
Cheng-Chi Lee、Te-Yu Chen、Shu-Chen Lin、黄明祥(Min-Shiang Hwang)*, A New Proxy Electronic Voting Scheme Based on Proxy Signatures, Lecture Notes in Electrical Engineering, vol.164 pp.3-12, 2012 |
2012 |
Te-Yu Chen、黄明祥(Min-Shiang Hwang)、Jinn-Ke Jan, A Secure Image Authentication Scheme for Tamper Detection and Recovery, IMAGING SCIENCE JOURNAL, vol.60 no.4 pp.219-233, 2012 |
2012 |
Hsia-Hung Ou、Iuon-Chang Lin、黄明祥(Min-Shiang Hwang), An Effective AKA Protocol for UMTS, International Journal of Mobile Communications, vol.10 no.4 pp.427-448, 2012 |
2012 |
Chia-Hui Wei、黄明祥(Min-Shiang Hwang)、Augustin Yeh-Hao Chin, An Improved Authentication Protocol for Mobile Agent Device in RFID, International Journal of Mobile Communications, vol.10 no.5 pp.508-520, 2012 |
2012 |
Ting-Yi Chang、黄明祥(Min-Shiang Hwang)、Wei-Pang Yang、Kuo-Cheng Tsou, A Modified Ohta-Okamoto Digital Signature for Batch Verification and Its Multi-Signature Version, International Journal of Engineering and Industries (IJEI), vol.3 no.3 pp.75-83, 2012 |
2012 |
Li-Chin Huang、黄明祥(Min-Shiang Hwang), Study of an Intrusion Detection System, Journal of Electronic Science and Technology, vol.10 no.3 pp.269-275, 2012 |
2012 |
Ting-Yi Chang、Chou-Chen Yang、黄明祥(Min-Shiang Hwang), Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version, International Journal of Security and Its Applications, vol.6 no.4 pp.151-162, 2012 |
2012 |
Shu-Fen Chiou、黄明祥(Min-Shiang Hwang)、Song-Kong Chong, A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS, International Journal of Advancements in Computing Technology, vol.4 no.19 pp.529-535, 2012 |
2012 |
Li-Chin Huang,、Lin-Yu Tseng、黄明祥(Min-Shiang Hwang), The Study on Data Hiding in Medical Images, International Journal of Network Security, vol.14 no.6 pp.301-309, 2012 |
2012 |
Ting-Yi Chang、黄明祥(Min-Shiang Hwang)、Wei-Pang Yang, Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages, INFORMATICA, vol.23 no.4 pp.537-562, 2012 |
2011 |
陈德佑(Te-Yu Chen)、黄明祥(Min-Shiang Hwang)*、詹进科(Jinn-Ke Jan), A Secure Image Authentication Scheme for Tamper Detection and Recovery”, accepted (May 10, 2011) in Imaging Science Journal., IMAGING SCIENCE JOURNAL, 2011 |
2011 |
Ting-Yi Chang、黄明祥(Min-Shiang Hwang)*、Wei-Pang Yang, A Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol, INFORMATION SCIENCES, vol.181 no.1 pp.217-226, 2011 |
2011 |
Cheng-Chi Lee、I-En Liao、黄明祥(Min-Shiang Hwang)*, An Efficient Authentication Protocol for Mobile Communications, TELECOMMUNICATION SYSTEMS, vol.46 no.1 pp.31-41, 2011 |
2011 |
邱淑芬(Shu-Fen Chiou)、廖宜恩(I-En Liao)、黄明祥(Min-Shiang Hwang)*, A capacity-enhanced reversible data hiding scheme based on SMVQ, IMAGING SCIENCE JOURNAL, vol.59 no.1 pp.17-24, 2011 |
2011 |
Jung-Wen Lo、黄明祥(Min-Shiang Hwang)、Chia-Hsin Liu, An Efficient Key Assignment Scheme for Access Control in a Large Leaf Class Hierarchy, INFORMATION SCIENCES, vol.181 no.4 pp.917-925, 2011 |
2011 |
Ting-Yi Chang、黄明祥(Min-Shiang Hwang)*, User-Anonymous and Short-Term Conference Key Distribution System via Link-Layer Routing in Mobile Communications”, International Journal of Mobile Communications, International Journal of Mobile Communications, vol.9 no.2 pp.144-158, 2011 |
2011 |
Chia-Hui Wei、黄明祥(Min-Shiang Hwang)、Augustin Yeh-Hao Chin, An Authentication Protocol for Low-cost RFID Tags, International Journal of Mobile Communications, vol.9 no.2 pp.208-223, 2011 |
2011 |
Shiang-Feng Tzeng、Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)*, A Batch Verification for Multiple Proxy Signature, Parallel Processing Letters, vol.21 no.1 pp.77-84, 2011 |
2011 |
魏家惠(Chia-Hui Wei)、黄明祥(Min-Shiang Hwang)*、金阳和(Augustin Yeh-hao Chin), A Mutual Authentication Protocol for RFID, IT Professional, vol.13 no.2 pp.20-24, 2011 |
2011 |
Cheng-Chi Lee、Tzu-Chun Lin、Shiang-Feng Tzeng、黄明祥(Min-Shiang Hwang)*, Generalization of Proxy Signature Based on Factorization, International Journal of Innovative Computing Information and Control, vol.7 no.3 pp.1039-1054, 2011 |
2011 |
黄明祥(Min-Shiang Hwang)*、欧侠宏(Hsia-Hung Ou)、钟松刚(Song-Kong Chong), On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol, European Transactions on Telecommunications, vol.22 no.3 pp.99-112, 2011 |
2011 |
Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)*、I-En Liao, On The Security Of Self-Certified Public Keys, International Journal of Information Security and Privacy, vol.5 no.2 pp.55-62, 2011 |
2011 |
Cheng-YingYang、Ming Chun Chen、黄明祥(Min-Shiang Hwang)、Cheng-Yi Li、Victor R.L. Shen(Victor R.L. Shen)*, User’s Intention to Utilize an E-learning System with an Informal Formative Assessment, 2011 15th Global Chinese Conference on Computers in Education, GCCCE 2011 pp.1542-1546, 2011 |
2011 |
李俊达(Chun-Ta Li)、黄明祥(Min-Shiang Hwang)*, A Lightweight Anonymous Routing Protocol without Public Key En/Decryptions for Wireless Ad Hoc Networks, INFORMATION SCIENCES, vol.181 no.23 pp.5333-5347, 2011 |
2011 |
吴佳骏(Chia-Chun Wu)、高胜助(Shang-Juh Kao)、黄明祥(Min-Shiang Hwang)*, A High Quality Image Sharing with Steganography and Adaptive Authentication Scheme, JOURNAL OF SYSTEMS AND SOFTWARE, vol.84 no.12 pp.2196-2207, 2011 |
2010 |
Chun-Ta Li、黄明祥(Min-Shiang Hwang), An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, vol.33 pp.1-5, 2010 |
2010 |
黄明祥(Min-Shiang Hwang)、Song-Kong Chong、Te-Yu Chen, DoS-resistant ID-based Password Authentication Scheme Using Smart Cards, JOURNAL OF SYSTEMS AND SOFTWARE, vol.83 pp.163-172, 2010 |
2010 |
李正吉(Cheng-Chi Lee)、Ting-Yi Chang、黄明祥(Min-Shiang Hwang), A New Group Signature Scheme Based on the Discrete Logarithm, Journal of Information Assurance and Security, vol.5 no.1 pp.54-57, 2010 |
2010 |
Hsia-Hung Ou、黄明祥(Min-Shiang Hwang)、Jinn-Ke Jan, A Cocktail Protocol with the Authentication and Key Agreement on the UMTS, JOURNAL OF SYSTEMS AND SOFTWARE, vol.83 no.2 pp.316-325, 2010 |
2010 |
Jung-Wen Lo、Shu-Chen Lin、黄明祥(Min-Shiang Hwang), A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments, INFORMATION TECHNOLOGY AND CONTROL, vol.39 no.2 pp.146-151, 2010 |
2010 |
Cheng-Chi Lee、Tzu-Chun Lin、黄明祥(Min-Shiang Hwang)*, A Key Agreement Scheme for Satellite Communications, INFORMATION TECHNOLOGY AND CONTROL, vol.39 no.1 pp.43-47, 2010 |
2010 |
Hsia-Hung Ou、黄明祥(Min-Shiang Hwang)*、Jinn-Ke Jan, A provable billing protocol on the current UMTS, WIRELESS PERSONAL COMMUNICATIONS, vol.55 no.4 pp.551-556, 2010 |
2010 |
Chun-Ta Li、黄明祥(Min-Shiang Hwang)*, An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards, International Journal of Innovative Computing Information and Control, vol.6 no.5 pp.2181-2188, 2010 |
2010 |
Jung-Wen Lo、Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)*、Yen-Ping Chu, A Secure and Efficient ECC-based AKA Protocol for Wireless Mobile Communications, International Journal of Innovative Computing Information and Control, vol.6 no.11 pp.5249-5258, 2010 |
2010 |
Chun-Ta Li、黄明祥(Min-Shiang Hwang)、Shih-Ming Chen, A Batch Verifying and Detecting the Illegal Signatures, International Journal of Innovative Computing Information and Control, vol.6 no.12 pp.5311-5320, 2010 |
2010 |
Jung-Wen Lo、Ji-Zhe Lee、黄明祥(Min-Shiang Hwang)*、Yen-Ping Chu, An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Journal of Internet Technology, Journal of Internet Technology, vol.11 no.7 pp.997-1004, 2010 |
2009 |
李正吉(Cheng-Chi Lee)、黄明祥(Min-Shiang Hwang)、Shiang-Feng Tzeng, A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem, INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, vol.20 no.2 pp.351-359, 2009 |
2009 |
Hsia-Hung Ou、黄明祥(Min-Shiang Hwang)、Jinn-Ke Jan, The UMTS-AKA Protocols for Intelligent Transportation Systems, EURASIP Journal on Wireless Communications and Networking, vol.2009 pp.1-12, 2009 |
2009 |
黄明祥(Min-Shiang Hwang)、李正吉(Cheng-Chi Lee)、Shiang-Feng Tzeng, A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm, International Journal of Applied Mathematics and Computer Sciences, vol.5 no.1 pp.33-38, 2009 |
2009 |
Song Han、Elizabeth Chang、Tharam Dillon、黄明祥(Min-Shiang Hwang)、李正吉(Cheng-Chi Lee), Identifying Attributes and Insecurity of A Public-channel Key Exchange Protocol Using Chaos Synchronization, CHAOS SOLITONS & FRACTALS, vol.40 no.5 pp.2569-2575, 2009 |
2009 |
李正吉(Cheng-Chi Lee)、I-En Liao、黄明祥(Min-Shiang Hwang), An Extended Certificate-based Authentication and Security Protocol for Mobile Networks, INFORMATION TECHNOLOGY AND CONTROL, vol.38 no.1 pp.61-66, 2009 |
2009 |
李正吉(Cheng-Chi Lee)、黄明祥(Min-Shiang Hwang)、Shu-Yin Hsiao, A Fair Non-transfer Exchange Protocol, International Journal of Electrical and Computer Engineering, vol.4 no.14 pp.879-885, 2009 |
2009 |
Meng-Hsiun Tsai、Shu-Fen Chiou、黄明祥(Min-Shiang Hwang), A Progressive Image Transmission Method for 2D-GE Image Based on Context Feature with Different Thresholds, International Journal of Innovative Computing Information and Control, vol.5 no.2 pp.379-386, 2009 |
2009 |
Chia-Chun Wu、黄明祥(Min-Shiang Hwang)、Shang-Juh Kao, A New Approach to the Secret Image Sharing with Steganography and Authentication, IMAGING SCIENCE JOURNAL, vol.57 no.3 pp.140-151, 2009 |
2009 |
Hsia-Hung Ou、Iuon-Chang Lin、黄明祥(Min-Shiang Hwang)、Jinn-Ke Jan, TK-AKA: Using Temporary Key on Authentication and Key Agreement Protocol on UMTS, International Journal of Network Management, vol.19 no.4 pp.291-303, 2009 |
2009 |
李正吉(Cheng-Chi Lee)、Pi-Fang Ho、黄明祥(Min-Shiang Hwang), A Secure E-Auction Scheme Based on Group Signatures, INFORMATION SYSTEMS FRONTIERS, vol.11 no.3 pp.335-343, 2009 |
2009 |
C.T. Li、黄明祥(Min-Shiang Hwang)、Y.P. Chu, An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks, International Journal of Innovative Computing Information and Control, vol.5 no.8 pp.2107-2124, 2009 |
2009 |
黄明祥(Min-Shiang Hwang)、Shiang-Feng Tzeng、Shu-Fen Chiou, A Non-repudiable Multi-Proxy Multi-Signature Scheme, ICIC Express Letters, vol.3 no.3 pp.259-264, 2009 |
2009 |
黄明祥(Min-Shiang Hwang)、Chia-Hui Wei、Cheng-Yee Lee, Privacy and Security Requirements for RFID Applications, Journal of Computers, vol.20 no.3 pp.55-60, 2009 |
2009 |
李正吉(Cheng-Chi Lee)、黄明祥(Min-Shiang Hwang)、Chih-Wei Lin, A New English Auction Scheme Using The Bulletin Board System, Information Management and Computer Security, vol.17 no.5 pp.408-417, 2009 |
2009 |
Te-Yu Chen、黄明祥(Min-Shiang Hwang)、Jinn-Ke Jan, Adaptive Authentication Schemes for 3D Mesh Models, International Journal of Innovative Computing Information and Control, vol.5 no.12 pp.4561-4572, 2009 |
2009 |
Meng-Hsiun Tsai、Shu-Fen Chiou、黄明祥(Min-Shiang Hwang), A Simple Method for Detecting Protein Spots in 2D-GE Images Using Image Contrast, International Journal of Innovative Computing Information and Control, vol.5 no.12 pp.4617-4626, 2009 |
2008 |
Nan-I Wu、Chung-Ming Wang、Chwei-Shyong Tsai、黄明祥(Min-Shiang Hwang), A Certificate-based Watermarking Scheme for Coloured Images, IMAGING SCIENCE JOURNAL, vol.56 pp.326-332, 2008 |
2008 |
Chung-Ming Wang、Nan-I Wu、Chwei-Shyong Tsai、黄明祥(Min-Shiang Hwang), A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function, JOURNAL OF SYSTEMS AND SOFTWARE, vol.81 no.1 pp.150-158, 2008 |
2008 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Song-Kong Chong、Jung-Wen Lo, A Key Management for Wireless Communications, Journal of Innovative Computing, Information and Control (IJICIC), vol.4 no.8 pp.2045-2056, 2008 |
2008 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Song-Kong Chong, An Improved Address Ownership in Mobile IPv6, COMPUTER COMMUNICATIONS, vol.31 pp.3250-3256, 2008 |
2008 |
李正吉(Cheng-Chi Lee)、黄明祥(Min-Shiang Hwang)、I-En Liao, A New Authentication Protocol Based on Pointer Forwarding for Mobile Communications, WIRELESS COMMUNICATIONS & MOBILE COMPUTING, vol.8 no.5 pp.661-672, 2008 |
2008 |
Chun-Ta Li、黄明祥(Min-Shiang Hwang)、Yen-Ping Chu, Improving the Security of a Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks, COMPUTER SYSTEMS SCIENCE AND ENGINEERING, vol.23 no.3 pp.227-234, 2008 |
2008 |
Chun-Ta Li、黄明祥(Min-Shiang Hwang)、Chi-Yu Liu, An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks, COMPUTER COMMUNICATIONS, vol.31 no.10 pp.2534-2540, 2008 |
2008 |
Chun-Ta Li、黄明祥(Min-Shiang Hwang)、Yen-Ping Chu, A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks, COMPUTER COMMUNICATIONS, vol.31 no.12 pp.2803-2814, 2008 |
2008 |
李俊达(Chun-Ta Li)、黄明祥(Min-Shiang Hwang)、朱延平(Yen-Ping Chu), Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments, COMPUTER COMMUNICATIONS, vol.31 no.18 pp.4255-4258, 2008 |
2007 |
Nan-I Wu、黄明祥(Min-Shiang Hwang), Data Hiding: Current Status and Key Issues, International Journal of Network Security, vol.4 no.1 pp.1-9, 2007 |
2007 |
Shiang-Feng Tzeng、Yuan-Liang Tang、黄明祥(Min-Shiang Hwang), A New Convertible Authenticated Encryption Scheme with Message Linkages, COMPUTERS & ELECTRICAL ENGINEERING, vol.33 no.2 pp.133-138, 2007 |
2007 |
黄明祥(Min-Shiang Hwang)、Li-Hua Li、Cheng-Chi Lee, A Key Authentication Scheme With Non-repudiation, Operating Systems Review (ACM), vol.38 no.3 pp.75-78, 2007 |
2007 |
Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)、Chih-Wei Lin, An Efficient Multi-Round Anonymous Auction Protocol, Journal of Discrete Mathematical Sciences & Cryptography, vol.10 no.4 pp.547-557, 2007 |
2007 |
Hsia-Hung Ou、黄明祥(Min-Shiang Hwang)、Jinn-Ke Jan, A Simple Mobile Communication Billing System Among Charged Parties, APPLIED MATHEMATICS AND COMPUTATION, vol.192 no.2 pp.487-495, 2007 |
2006 |
黄明祥(Min-Shiang Hwang)、Jung-Wen Lo、Shu-Yin Hsiao, Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, vol.E89-D no.4 pp.1575-1577, 2006 |
2006 |
Yung-Chin Chen、Wei-Lin Wang、黄明祥(Min-Shiang Hwang), Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection, Asian Journal of Health and Information Sciences, vol.1 no.2 pp.189-203, 2006 |
2006 |
Feng Bao、Cheng-Chi Lee、黄明祥(Min-Shiang Hwang), Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures, APPLIED MATHEMATICS AND COMPUTATION, vol.172 no.2 pp.1195-1200, 2006 |
2006 |
黄明祥(Min-Shiang Hwang)、Pei-Chen Sung, A Study of Micro-payment Based on One-way Hash Chain, International Journal of Network Security, vol.2 no.2 pp.81-90, 2006 |
2006 |
Chwei-Shyong Tsai、Cheng-Chi Lee、黄明祥(Min-Shiang Hwang), Password Authentication Schemes: Current Status and Key Issues, International Journal of Network Security, vol.3 no.2 pp.101-115, 2006 |
2006 |
李正吉(Cheng-Chi Lee)、黄明祥(Min-Shiang Hwang)、I-En Liao, Security Enhancement on A New Authentication Scheme with Anonymity for Wireless Environments, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, vol.53 no.5 pp.1683-1687, 2006 |
2005 |
Hsien-Chu Wu、黄明祥(Min-Shiang Hwang)、Chia-Hsin Liu, A Secure Strong-Password Authentication Protocol, FUNDAMENTA INFORMATICAE, vol.68 pp.399-406, 2005 |
2005 |
黄明祥(Min-Shiang Hwang)、Kuo-Feng Hwang、Chin-Chen Chang, A Time-Stamping Protocol for Digital Watermarking, APPLIED MATHEMATICS AND COMPUTATION, vol.169 pp.1276-1284, 2005 |
2005 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Ji-Zhe Lee、Chao-Chen Yang, A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography, TELECOMMUNICATION SYSTEMS, vol.29 no.3 pp.165-180, 2005 |
2005 |
Ting-Yi Chang、Wei-Pang Yang、黄明祥(Min-Shiang Hwang), Simple Authenticated Key Agreement and Protected Password Change Protocol, COMPUTERS & MATHEMATICS WITH APPLICATIONS, vol.49 pp.703-714, 2005 |
2005 |
林咏章、黄明祥(Min-Shiang Hwang)、Chin-Chen Chang, The General Pay-Word: A Micro-payment Scheme Based on N-dimension One-way Hash Chain, DESIGNS CODES AND CRYPTOGRAPHY, vol.36 no.1 pp.53-67, 2005 |
2005 |
Chwei-Shyong Tsai、Shu-Chen Lin、黄明祥(Min-Shiang Hwang), Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys, APPLIED MATHEMATICS AND COMPUTATION, vol.166 no.1 pp.118-122, 2005 |
2005 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee, Research Issues and Challenges for Multiple Digital Signatures, International Journal of Network Security, vol.1 no.1 pp.1-7, 2005 |
2005 |
Cheng-Chi Lee、Ting-Yi Chang、黄明祥(Min-Shiang Hwang), A Simple Broadcasting Cryptosystem in Computer Networks Using Exclusive-OR, International Journal of Computer Applications in Technology, vol.24 no.3 pp.180-183, 2005 |
2005 |
黄明祥(Min-Shiang Hwang)、Jung-Wen Lo、Chia-Hsin Liu, Improvement on the Flexible Tree-Based Key Management Framework, COMPUTERS & SECURITY, vol.24 pp.500-504, 2005 |
2005 |
Ting-Yi Chang、黄明祥(Min-Shiang Hwang)、Wei-Pang Yang, An Improvement on the Lin-Wu (t, n) Threshold Verifiable Multi-secret Sharing Scheme, APPLIED MATHEMATICS AND COMPUTATION, vol.163 no.1 pp.169-178, 2005 |
2005 |
Ting-Yi Chang、黄明祥(Min-Shiang Hwang)、Wei-Pang Yang, A New Multi-stage Secret Sharing Scheme Using One-way Function, Operating Systems Review (ACM), vol.39 no.1 pp.48-55, 2005 |
2005 |
Li-Hua Li、Shiang-Feng Tzeng、黄明祥(Min-Shiang Hwang), Improvement of Signature Scheme Based on Factoring and Discrete Logarithms, APPLIED MATHEMATICS AND COMPUTATION, vol.161 no.1 pp.49-54, 2005 |
2005 |
Eric Jui-Lin Lu、黄明祥(Min-Shiang Hwang)、Cheng-Jian Huang, A New Proxy Signature Scheme with Revocation, APPLIED MATHEMATICS AND COMPUTATION, vol.161 no.3 pp.799-806, 2005 |
2005 |
Shiang-Feng Tzeng、黄明祥(Min-Shiang Hwang)、Hsing-Bai Chen, A Secure On-line Software Transaction Scheme, COMPUTER STANDARDS & INTERFACES, vol.27 no.3 pp.303-312, 2005 |
2005 |
Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)、Wei-Pang Yang, A New Blind Signature Based on the Discrete Logarithm Problem for Untraceability, APPLIED MATHEMATICS AND COMPUTATION, vol.164 no.3 pp.837-841, 2005 |
2005 |
黄明祥(Min-Shiang Hwang)、Chi-Yu Liu, Authenticated Encryption Schemes: Current Status and Key Issues, International Journal of Network Security, vol.1 no.2 pp.61-73, 2005 |
2005 |
林咏章、Hsia-Hung Ou、黄明祥(Min-Shiang Hwang), A User Authentication System Using Back-Propagation Network, NEURAL COMPUTING & APPLICATIONS, vol.14 no.3 pp.243-249, 2005 |
2005 |
Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods, IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, vol.152 no.5 pp.611-615, 2005 |
2005 |
黄明祥(Min-Shiang Hwang)、Ting-Yi Chang, Threshold Signatures: Current Status and Key Issues, International Journal of Network Security, vol.1 no.3 pp.123-137, 2005 |
2004 |
Jau-Ji Shen、林咏章、黄明祥(Min-Shiang Hwang), A Secure LITESET Scheme, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, vol.E87-D no.11 pp.2509-2514, 2004 |
2004 |
Chou-Chen Yang,、Jian-Wei Li、黄明祥(Min-Shiang Hwang), A New Mutual Authentication and Key Exchange Protocol with Balanced Computational Power for Wireless Settings, EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, vol.15 no.2 pp.91-99, 2004 |
2004 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Ji-Zhe Lee, A New Anonymous Channel Protocol in Wireless Communications, AEU - International Journal of Electronics and Communications, vol.58 pp.218-222, 2004 |
2004 |
Shiang-Feng Tzeng、Cheng-Ying Yang、黄明祥(Min-Shiang Hwang), A New Digital Signature Scheme Based on Factoring and Discrete Logarithms, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, vol.81 no.1 pp.9-14, 2004 |
2004 |
Chin-Chen Chang、Kuo-Lun Chen、黄明祥(Min-Shiang Hwang), End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication, WIRELESS PERSONAL COMMUNICATIONS, vol.28 no.2 pp.95-106, 2004 |
2004 |
Shiang-Feng Tzeng、黄明祥(Min-Shiang Hwang), Digital Signature with Message Recovery and Its Variants Based on Elliptic Curve Discrete Logarithm Problem, COMPUTER STANDARDS & INTERFACES, vol.26 no.2 pp.61-71, 2004 |
2004 |
黄明祥(Min-Shiang Hwang)、Shiang-Feng Tzeng、Chwei-Shyong Tsai, Generalization of Proxy Signature Based on Elliptic Curves, COMPUTER STANDARDS & INTERFACES, vol.26 no.2 pp.73-84, 2004 |
2004 |
Chou-Chen Yang、Ting-Yi Chang、黄明祥(Min-Shiang Hwang), A (t,n) Multi-secret Sharing Scheme, APPLIED MATHEMATICS AND COMPUTATION, vol.151 no.2 pp.483-490, 2004 |
2004 |
Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)、I-En Liao, A Server-Assissted Authentication Protocol for Detecting Error Vectors, Operating Systems Review (ACM), vol.38 no.2 pp.93-96, 2004 |
2004 |
Shiang-Feng Tzeng、黄明祥(Min-Shiang Hwang)、Cheng-Ying Yang, An Improvement of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers, COMPUTERS & SECURITY, vol.23 no.2 pp.174-178, 2004 |
2004 |
Ting-Yi Chang,、Chou-Chen Yang、黄明祥(Min-Shiang Hwang), Threshold Untraceable Signature for Group Communications, IEE PROCEEDINGS-COMMUNICATIONS, vol.151 no.2 pp.179-184, 2004 |
2004 |
林咏章、Hsia-Hung Ou、黄明祥(Min-Shiang Hwang), Efficient Access Control and Key Management Schemes for Mobile Agents, COMPUTER STANDARDS & INTERFACES, vol.26 no.5 pp.423-433, 2004 |
2004 |
Shiang-Feng Tzeng、Cheng-Ying Yang、黄明祥(Min-Shiang Hwang), A Nonrepudiable Threshold Multi-Proxy Multi-Signature Scheme with Shared Verification, Future Generation Computer Systems, vol.20 no.5 pp.887-893, 2004 |
2004 |
Ting-Yi Chang、Chou-Chen Yang、黄明祥(Min-Shiang Hwang), Cryptanalysis of Publicly Verifiable Authenticated Encryption, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, vol.E87-A no.6 pp.1645-1646, 2004 |
2004 |
黄明祥(Min-Shiang Hwang)、Jung-Wen Lo、Chia-Hsin Liu, Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack, FUNDAMENTA INFORMATICAE, vol.61 no.3 pp.389-398, 2004 |
2004 |
Ting-Yi Chang、Chou-Chen Yang、黄明祥(Min-Shiang Hwang), A Threshold Signature Scheme for Group Communications without a Shared Distribution Center, Future Generation Computer Systems, vol.20 no.6 pp.1013-1021, 2004 |
2004 |
Chou-Chen Yang、Ting-Yi Chang、黄明祥(Min-Shiang Hwang), Cryptanalysis of Simple Authenticated Key Agreement Protocols, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, vol.E87-A no.8 pp.2174-2176, 2004 |
2004 |
Li-Hua Li、Chi-Yu Liu、黄明祥(Min-Shiang Hwang), Cryptanalysis of an Efficient Secure Group Signature Scheme, Operating Systems Review (ACM), vol.38 no.4 pp.67-69, 2004 |
2004 |
黄明祥(Min-Shiang Hwang)、Jung-Wen Lo、Shu-Chen Lin, An Efficient User Identification Scheme Based on ID-based Cryptosystem, COMPUTER STANDARDS & INTERFACES, vol.26 no.6 pp.565-569, 2004 |
2004 |
Cheng-Ying Yang、Shiang-Feng Tzeng、黄明祥(Min-Shiang Hwang), On the Efficiency of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers, JOURNAL OF SYSTEMS AND SOFTWARE, vol.73 no.3 pp.507-514, 2004 |
2003 |
Cheng-Chi Lee、Chou-Chen Yang、黄明祥(Min-Shiang Hwang), A New Privacy and Authentication Protocol for End-to-End Mobile Users, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, vol.16 pp.799-808, 2003 |
2003 |
Chou-Chen Yang、Ting-Yi Chang、黄明祥(Min-Shiang Hwang), The Security of the Improvement on the Methods for Protecting Password Transmission, INFORMATICA, vol.14 no.4 pp.551-558, 2003 |
2003 |
Chwei-Shyong Tsai、Shiang-Feng Tzeng、黄明祥(Min-Shiang Hwang), Improved Non-repudiable Threshold Proxy Signature Scheme with Known Signers, INFORMATICA, vol.14 no.3 pp.393-402, 2003 |
2003 |
林咏章、黄明祥(Min-Shiang Hwang)、Li-Hua Li, A New Remote User Authentication Scheme for Multi-Server Architecture, Future Generation Computer Systems, vol.19 no.1 pp.13-22, 2003 |
2003 |
Chou-Chen Yang、Ting-Yi Chang、Jian-Wei Li、黄明祥(Min-Shiang Hwang), Simple Generalized Group-oriented Cryptosystems Using ElGamal Cryptosystem, INFORMATICA, vol.14 no.1 pp.111-120, 2003 |
2003 |
Li-Hua Li、Shiang-Feng Tzeng、黄明祥(Min-Shiang Hwang), Generalization of Proxy Signature Based on Discrete Logarithms, COMPUTERS & SECURITY, vol.22 no.3 pp.245-255, 2003 |
2003 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Yan-Chi Lai, Traceability on Stadler et al.'s Fair Blind Signature Scheme, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, vol.E86-A no.2 pp.513-514, 2003 |
2003 |
Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)、Wei-Pang Yang, Extension of Authentication Protocol for GSM, IEE PROCEEDINGS-COMMUNICATIONS, vol.150 no.2 pp.91-95, 2003 |
2003 |
林咏章、黄明祥(Min-Shiang Hwang)、Chin-Chen Chang, Security Enhancement for Anonymous Secure E-Voting over a Network, COMPUTER STANDARDS & INTERFACES, vol.25 no.2 pp.131-139, 2003 |
2003 |
Chou-Chen Yang、Ting-Yi Chang、黄明祥(Min-Shiang Hwang), A New Anonymous Conference Key Distribution System Based on the Elliptic Curve Discrete Logarithm Problem, COMPUTER STANDARDS & INTERFACES, vol.25 no.2 pp.141-145, 2003 |
2003 |
林咏章、黄明祥(Min-Shiang Hwang)、Chin-Chen Chang, A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy, Future Generation Computer Systems, vol.19 no.4 pp.457-462, 2003 |
2003 |
Jau-Ji Shen、Chih-Wei Lin、黄明祥(Min-Shiang Hwang), A Modified Remote User Authentication Scheme Using Smart Cards, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol.49 no.2 pp.414-416, 2003 |
2003 |
Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)、Wei-Pang Yang, Untractable Blind Signature Schemes Based on Discrete Logarithm Problem, FUNDAMENTA INFORMATICAE, vol.55 no.3-4 pp.307-320, 2003 |
2003 |
Chih-Wei Lin、Jau-Ji Shen、黄明祥(Min-Shiang Hwang), Security Enhancement for Optimal Strong-Password Authentication Protocol, Operating Systems Review (ACM), vol.37 no.3 pp.12-16, 2003 |
2003 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Yan-Chi Lai, An Untraceable Blind Signature Scheme, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, vol.E86-A no.7 pp.1902-1906, 2003 |
2003 |
Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)、Li-Hua Li, A New Key Authentication Scheme Based on Discrete Logarithms, APPLIED MATHEMATICS AND COMPUTATION, vol.139 no.2 pp.343-349, 2003 |
2003 |
Chou-Chen Yang、Ting-Yi Chang、Jian-Wei Li、黄明祥(Min-Shiang Hwang), Security Enhancement for Protecting Password Transmission, IEICE TRANSACTIONS ON COMMUNICATIONS, vol.E86-B no.7 pp.2178-2181, 2003 |
2003 |
黄明祥(Min-Shiang Hwang)、Wei-Pang Yang, Controlling Access in Large Partially-Ordered Hierarchies Using Cryptographic Keys, JOURNAL OF SYSTEMS AND SOFTWARE, vol.67 no.2 pp.99-107, 2003 |
2003 |
Shin-Jia Hwang、黄明祥(Min-Shiang Hwang)、Shiang-Feng Tzeng, A New Digital Multisignature Scheme with Distinguished Signing Authorities, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, vol.19 no.5 pp.881-887, 2003 |
2003 |
黄明祥(Min-Shiang Hwang)、Chou-Chen Yang、Cheng-Yeh Shiu, An Authentication Scheme for Mobile Satellite Communication Systems, Operating Systems Review (ACM), vol.37 no.4 pp.42-47, 2003 |
2003 |
Jau-Ji Shen、Chih-Wei Lin、黄明祥(Min-Shiang Hwang), Security Enhancement for the Timestamp-Based Password Authentication Scheme Using Smart Cards, COMPUTERS & SECURITY, vol.22 no.7 pp.591-595, 2003 |
2003 |
黄明祥(Min-Shiang Hwang)、Eric Jui-Lin Lu、Iuon-Chang Lin, A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol.15 no.6 pp.1552-1560, 2003 |
2003 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Yan-Chi Lai, Traceability on RSA-Based Partially Signature with Low Computation, APPLIED MATHEMATICS AND COMPUTATION, vol.145 no.2-3 pp.465-468, 2003 |
2002 |
黄明祥(Min-Shiang Hwang)、S. Wesley Changchien、Cheng-Chi Lee, A New Method to Strengthen Ciphers, International Journal of Pure and Applied Mathematics, vol.3 no.2 pp.187-192, 2002 |
2002 |
黄明祥(Min-Shiang Hwang)、Eric Jui-Lin Lu、林咏章, Adding Timestamps to the Secure Electronic Auction Protocol, DATA & KNOWLEDGE ENGINEERING, vol.40 no.2 pp.155-162, 2002 |
2002 |
Chin-Chen Chang、Kuo-Feng Hwang、黄明祥(Min-Shiang Hwang), A Robust Authentication Scheme for Protecting Copyrights of Images and Graphics, IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, vol.149 no.1 pp.43-50, 2002 |
2002 |
黄明祥(Min-Shiang Hwang)、Chin-Chen Chang、Kuo-Feng Hwang, An ElGamal-like Cryptosystem For Enciphering Large Messages, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol.14 no.2 pp.445-446, 2002 |
2002 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Yan-Chi Lai, Traceability on Low-Computation Partially Blind Signatures for Electronic Cash, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, vol.E85-A no.5 pp.1181-1182, 2002 |
2002 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Ting-Yi Chang, Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, vol.18 no.3 pp.373-379, 2002 |
2002 |
Chin-Chen Chang、Kuo-Feng Hwang、黄明祥(Min-Shiang Hwang), A Feature-Oriented Copyright Owner Proving Technique for Still Images, INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, vol.12 no.3 pp.317-330, 2002 |
2002 |
Cheng-Chi Lee、黄明祥(Min-Shiang Hwang)、Wei-Pang Yang, A Flexible Remote User Authentication Scheme Using Smart Cards, Operating Systems Review (ACM), vol.36 no.3 pp.46-52, 2002 |
2002 |
黄明祥(Min-Shiang Hwang)、Chao-Chen Yang、Shiang-Feng Tzeng, Improved Digital Signature Scheme Based on Factoring and Discrete Logarithms, Journal of Discrete Mathematical Sciences & Cryptography, vol.5 no.2 pp.151-155, 2002 |
2002 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Wei-Pang Yang, An Improvement of Mobile Users Authentication in the Integration Environments, AEU - International Journal of Electronics and Communications, vol.56 no.5 pp.293-297, 2002 |
2002 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Yuan-Liang Tang, A Simple Remote User Authentication Scheme, MATHEMATICAL AND COMPUTER MODELLING, vol.36 pp.103-107, 2002 |
2002 |
Cheng-Chi Lee、Li-Hua Li、黄明祥(Min-Shiang Hwang), A Remote User Authentication Scheme Using Hash Functions, Operating Systems Review (ACM), vol.36 no.4 pp.23-29, 2002 |
2002 |
黄明祥(Min-Shiang Hwang)、Chih-Wei Lin、Cheng-Chi Le, Improved Yen-Joye's Authenticated Multiple-key Agreement Protocol, ELECTRONICS LETTERS, vol.38 no.23 pp.1429-1431, 2002 |
2002 |
黄明祥(Min-Shiang Hwang)、Cheng-Chi Lee、Shin-Jia Hwang, Cryptanalysis of the Hwang-Shi Proxy Signature Scheme, FUNDAMENTA INFORMATICAE, vol.53 no.2 pp.131-134, 2002 |