Browsing by Author Hwang, MS

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 26  next >
Issue DateTitleAuthor(s)
1996An access control scheme based on Chinese remainder theorem and time stamp conceptHwang, MS; Tzeng, WG; Yang, WP; 資訊工程學系; Department of Computer Science
1-May-2002Broadcasting cryptosystem in computer networks using geometric properties of linesHwang, MS; Lee, CC; Chang, TY; 資訊工程學系; Department of Computer Science
15-Aug-2003Controlling access in large partially ordered hierarchies using cryptographic keysHwang, MS; Yang, WP; 資訊工程學系; Department of Computer Science
1-Jun-2004Cryptanalysis of publicly verifiable authenticated encryptionChang, TY; Yang, CC; Hwang, MS; 資訊工程學系; Department of Computer Science
1-Aug-2004Cryptanalysis of simple authenticated key agreement protocolsYang, CC; Chang, TY; Hwang, MS; 資訊工程學系; Department of Computer Science
1-Nov-2002Cryptanalysis of the Hwang-Shi proxy signature schemeHwang, MS; Lee, CC; Hwang, SJ; 資訊工程學系; Department of Computer Science
1999Enhanced privacy and authentication for the global system for mobile communicationsLee, CH; Hwang, MS; Yang, WP; 資訊工程學系; Department of Computer Science
7-Nov-2002Improved Yen-Joye's authenticated multiple-key agreement protocolHwang, MS; Lin, CW; Lee, CC; 資訊工程學系; Department of Computer Science
2002An improvement of mobile users authentication in the integration enviromnentsHwang, MS; Lee, CC; Yang, WP; 資訊工程學系; Department of Computer Science
5-Apr-2005An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing schemeChang, TY; Hwang, MS; Yang, WP; 資訊工程學系; Department of Computer Science
1-Apr-1997Multilevel secure database encryption with subkeysHwang, MS; Yang, WP; 資訊工程學系; Department of Computer Science
1-Apr-1997Multilevel secure database encryption with subkeysHwang, MS; Yang, WP; 資訊工程學系; Department of Computer Science
2004New anonymous channel protocol in wireless communicationsHwang, MS; Lee, CC; Lee, JZ; 資訊工程學系; Department of Computer Science
15-Jul-2003A new key authentication scheme based on discrete logarithmsLee, CC; Hwang, MS; Li, LH; 資訊工程學系; Department of Computer Science
1-Nov-2003A new privacy and authentication protocol for end-to-end mobile usersLee, CC; Yang, CC; Hwang, MS; 資訊工程學系; Department of Computer Science
1-Jul-1999A novel application of the phone card and its authentication in mobile communicationsLee, CH; Hwang, MS; Yang, WP; 資訊工程學系; Department of Computer Science
2003Security of improvement on methods for protecting password transmissionYang, CC; Chang, TY; Hwang, MS; 資訊工程學系; Department of Computer Science
1-Apr-2005Simple authenticated key agreement and protected password change protocolChang, TY; Yang, WP; Hwang, MS; 資訊工程學系; Department of Computer Science
1-Jul-2002A simple remote user authentication schemeHwang, MS; Lee, CC; Tang, YL; 資訊工程學系; Department of Computer Science
1-Aug-2004A threshold signature scheme for group communications without a shared distribution centerChang, TY; Yang, CC; Hwang, MS; 資訊工程學系; Department of Computer Science