Min-shiang Hwang
#142,243
Most Influential Person Now
Min-shiang Hwang's AcademicInfluence.com Rankings
Min-shiang Hwangcomputer-science Degrees
Computer Science
#6902
World Rank
#7269
Historical Rank
Information Security
#17
World Rank
#17
Historical Rank
Database
#3976
World Rank
#4135
Historical Rank

Download Badge
Computer Science
Min-shiang Hwang's Degrees
- PhD Computer Science University of Southern California
- Masters Computer Science University of Southern California
- Bachelors Computer Science National Taiwan University
Similar Degrees You Can Earn
Why Is Min-shiang Hwang Influential?
(Suggest an Edit or Addition)Min-shiang Hwang's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A new remote user authentication scheme using smart cards (2000) (929)
- Image steganographic scheme based on pixel-value differencing and LSB replacement methods (2005) (559)
- An efficient biometrics-based remote user authentication scheme using smart cards (2010) (543)
- A high quality steganographic method with pixel-value differencing and modulus function (2008) (398)
- A new encryption algorithm for image cryptosystems (2001) (331)
- A remote password authentication scheme for multiserver architecture using neural networks (2001) (307)
- Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments (2006) (303)
- A password authentication scheme over insecure networks (2006) (299)
- A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks (2008) (272)
- A new remote user authentication scheme for multi-server architecture (2003) (261)
- A modified remote user authentication scheme using smart cards (2003) (249)
- A virtual image cryptosystem based upon vector quantization (1998) (231)
- A (t, n) multi-secret sharing scheme (2004) (223)
- Data Hiding: Current Status and Key Issues (2007) (202)
- A simple remote user authentication scheme (2002) (192)
- Security enhancement for a dynamic ID-based remote user authentication scheme (2005) (184)
- Password Authentication Schemes: Current Status and Key Issues (2006) (175)
- A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments (2013) (167)
- A flexible remote user authentication scheme using smart cards (2002) (166)
- A remote user authentication scheme using hash functions (2002) (160)
- A watermarking technique based on one-way hash functions (1999) (132)
- Security enhancement for the timestamp-based password authentication scheme using smart cards (2003) (122)
- A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers (2000) (119)
- (IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement (2005) (110)
- A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem (2003) (105)
- A communication-efficient three-party password authenticated key exchange protocol (2011) (99)
- A reversible data hiding method by histogram shifting in high quality medical images (2013) (98)
- A high quality image sharing with steganography and adaptive authentication scheme (2011) (92)
- Cryptanalysis of a remote login authentication scheme (1999) (90)
- An ElGamal-Like Cryptosystem for Enciphering Large Messages (2002) (89)
- Enhanced privacy and authentication for the global system for mobile communications (1999) (87)
- Extension of authentication protocol for GSM (2003) (86)
- DoS-resistant ID-based password authentication scheme using smart cards (2010) (80)
- Authenticated Encryption Schemes: Current Status and Key Issues (2005) (77)
- Challenges in E-Government and Security of Information (2004) (75)
- Conference Key Distribution Schemes for Secure Digital Mobile Communications (1995) (70)
- A Mutual Authentication Protocol for RFID (2011) (70)
- An authentication scheme for mobile satellite communication systems (2003) (69)
- Security enhancement for optimal strong-password authentication protocol (2003) (68)
- A Survey of Public Auditing for Secure Data Storage in Cloud Computing (2016) (68)
- Simple authenticated key agreement and protected password change protocol (2005) (67)
- (IEEE Transactions on Neural Networks,12(6):1498-1504)A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural Network (2001) (66)
- Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem (2004) (64)
- A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks (2011) (61)
- Generalization of proxy signature based on elliptic curves (2004) (60)
- Towards secure and efficient user authentication scheme using smart card for multi-server environments (2013) (60)
- Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures (2000) (60)
- An Improvement of SPLICE/AS in WIDE against Guessing Attack (2001) (60)
- An electronic voting protocol with deniable authentication for mobile ad hoc networks (2008) (60)
- Parallel computation of the generating keys for RSA cryptosystems (1996) (59)
- Security enhancement for anonymous secure e-voting over a network (2003) (59)
- Dynamic participation in a secure conference scheme for mobile communications (1999) (59)
- A new key authentication scheme based on discrete logarithms (2003) (57)
- A new key assignment scheme for enforcing complicated access control policies in hierarchy (2003) (56)
- A Study of Public Key Encryption with Keyword Search (2013) (56)
- A remote password authentication scheme based on the digital signature method (1999) (55)
- Guessing Attacks on Strong-Password Authentication Protocol (2013) (54)
- Digital watermarking of images using neural networks (2000) (54)
- A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification (2004) (54)
- A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments (2014) (53)
- A threshold signature scheme for group communications without a shared distribution center (2004) (52)
- A new multi-stage secret sharing scheme using one-way function (2005) (51)
- A simple micro-payment scheme (2001) (50)
- Robust authentication scheme for protecting copyrights of images and graphics (2002) (50)
- Generalization of proxy signature-based on discrete logarithms (2003) (50)
- Controlling access in large partially ordered hierarchies using cryptographic keys (2003) (48)
- On the efficiency of nonrepudiable threshold proxy signature scheme with known signers (2004) (48)
- A new proxy signature scheme with revocation (2005) (46)
- A cocktail protocol with the Authentication and Key Agreement on the UMTS (2010) (45)
- Research Issues and Challenges for Multiple Digital Signatures (2005) (44)
- A New Public Key Encryption with Conjunctive Field Keyword Search Scheme (2014) (43)
- An improvement of nonrepudiable threshold proxy signature scheme with known signers (2004) (43)
- RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection (2007) (42)
- A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing (2016) (41)
- A Study of Micro-payment Based on One-way Hash Chain (2006) (39)
- A new blind signature based on the discrete logarithm problem for untraceability (2005) (37)
- A Verifiable Electronic Voting Scheme over the Internet (2009) (37)
- Two Simple Batch Verifying Multiple Digital Signatures (2001) (37)
- A Digital Watermarking Scheme Using Human Visual Effects (2000) (36)
- An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme (2005) (35)
- An improvement of an efficient user identification scheme based on ID-based cryptosystem (2004) (35)
- Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signature (2001) (34)
- AN ONLINE BIOMETRICS-BASED SECRET SHARING SCHEME FOR MULTIPARTY CRYPTOSYSTEM USING SMART CARDS (2009) (34)
- Conference key distribution protocols for digital mobile communication systems (1995) (34)
- Adding timestamps to the secure electronic auction protocol (2002) (34)
- An Untraceable Blind Signature Scheme (2003) (33)
- A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage (2016) (33)
- A novel LSB data hiding scheme with the lowest distortion (2017) (33)
- An efficient key assignment scheme for access control in a large leaf class hierarchy (2011) (32)
- Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments (2008) (32)
- A secure routing protocol with node selfishness resistance in MANETs (2012) (32)
- Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment (2009) (31)
- Traceability on Low-Computation Partially Blind Signatures for Electronic Cash (2002) (31)
- A Secure and Efficient One-time Password Authentication Scheme for WSN (2017) (31)
- Efficient access control and key management schemes for mobile agents (2004) (30)
- Security enhancement for the "simple authentication key agreement algorithm" (2000) (30)
- Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers (2003) (30)
- Cryptanalysis and improvement on batch verifying multiple RSA digital signatures (2006) (29)
- A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem (2003) (29)
- A secure e-auction scheme based on group signatures (2009) (29)
- The Study of Data Hiding in Medical Images (2012) (29)
- Cryptanalysis of YCN key assignment scheme in a hierarchy (2000) (28)
- Threshold Signatures: Current Status and Key Issues (2005) (27)
- Improved Yen-Joye's authenticated multiple-key agreement protocol (2002) (27)
- Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments (2014) (27)
- Security of Improvement on Methods for Protecting Password Transmission (2003) (27)
- A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem (2009) (26)
- On the security of an enhanced UMTS authentication and key agreement protocol (2011) (26)
- Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service (2017) (26)
- Cryptanalysis of Simple Authenticated Key Agreement Protocols (2004) (26)
- An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy (1999) (25)
- Privacy and Security Requirements for RFID Applications (2009) (25)
- An efficient authentication protocol for mobile communications (2011) (24)
- A new proxy signature scheme for a specified group of verifiers (2013) (24)
- A Blockchain-Based Traceable Certification System (2017) (24)
- An authentication protocol for low-cost RFID tags (2011) (23)
- Multilevel Secure Database Encryption with Subkeys (1997) (23)
- An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy (1999) (23)
- A block based digital watermarks for copy protection of images (1999) (23)
- A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography (2005) (22)
- A Dynamic Key Generation Scheme for Access Control in a Hierarchy (1999) (21)
- An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks (2010) (21)
- A new authentication protocol based on pointer forwarding for mobile communications (2008) (21)
- An efficient authentication protocol for GSM networks (2000) (21)
- Extension of CHW cryptographic key assignment scheme in a hierarchy (1999) (20)
- Modified Chang-Hwang-Wu access control scheme (1993) (20)
- A Study of Conjunctive Keyword Searchable Schemes (2013) (20)
- Security Enhancement for Protecting Password Transmission (2003) (20)
- Data error locations reported by public auditing in cloud storage service (2014) (20)
- Threshold untraceable signature for group communications (2004) (20)
- Improvement of signature scheme based on factoring and discrete logarithms (2005) (20)
- An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem (2011) (20)
- Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks (2008) (20)
- A Batch Verification for Multiple Proxy Signature (2011) (20)
- GENERALIZATION OF PROXY SIGNATURE BASED ON FACTORIZATION (2011) (18)
- A two-phase encryption scheme for enhancing database security (1995) (18)
- Reversible and High-Capacity Data Hiding in High Quality Medical Images (2013) (18)
- A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS (2010) (18)
- A New Dynamic Access Control Scheme Based on Subject-Object List (1994) (18)
- Authenticated key-exchange in a mobile radio network (1997) (17)
- Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows (2006) (17)
- An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching (2017) (17)
- Using Smart Card to Achieve a Single Sign-on for Multiple Cloud Services (2013) (17)
- Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem (2003) (16)
- AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS (2009) (16)
- Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images (2017) (16)
- A SECURE AND EFFICIENT ECC-BASED AKA PROTOCOL FOR WIRELESS MOBILE COMMUNICATIONS (2010) (16)
- Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey (2014) (16)
- An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies (2000) (16)
- Improved digital signature scheme based on factoring and discrete logarithms (2002) (15)
- A user authentication system using back-propagation network (2002) (15)
- A new privacy and authentication protocol for end‐to‐end mobile users (2003) (15)
- A Solution to Mobile IP Registration for AAA (2002) (15)
- Privacy Protection Data Access Control (2013) (15)
- A new convertible authenticated encryption scheme with message linkages (2007) (15)
- A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm (2009) (15)
- A Survey of Data Distortion Watermarking Relational Databases (2016) (15)
- Secure access schemes in mobile database systems (2001) (15)
- A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure (2015) (14)
- An access control scheme based on Chinese remainder theorem and time stamp concept (1996) (14)
- The UMTS-AKA Protocols for Intelligent Transportation Systems (2009) (13)
- An Improvement of a Simple Authenticated Key Agreement Algorithm (2002) (13)
- Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance (2015) (13)
- A New Digital Multisignature Scheme With Distinguished Signing Authorities (2003) (13)
- The Capacity Analysis in the Secure Cooperative Communication System (2017) (13)
- Cryptanalysis of Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-Server Environment Using Smart Card (2016) (13)
- TK‐AKA: using temporary key on Authentication and Key Agreement protocol on UMTS (2009) (13)
- Traceability on RSA-based partially signature with low computation (2003) (13)
- Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem (2002) (13)
- A time-stamping protocol for digital watermarking (2005) (13)
- A capacity‐enhanced reversible data hiding scheme based on SMVQ (2011) (13)
- An improved authentication protocol for mobile agent device in RFID environment (2012) (13)
- A KEY MANAGEMENT FOR WIRELESS COMMUNICATIONS (2007) (12)
- A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching (2018) (12)
- Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages (2012) (12)
- A new digital signature scheme based on factoring and discrete logarithms (2004) (12)
- Weaknesses of the Yoon-Kim-Yoo remote user authentication scheme using smart cards (2014) (12)
- User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications (2011) (12)
- End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication (2004) (12)
- A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp (1994) (11)
- Security Enhancement of Chang-Lee Anonymous E-Voting Scheme (2012) (11)
- Group Rekeying in Wireless Sensor Networks: A Survey (2014) (11)
- Enhance the Image Sharing with Steganography and Authentication (2008) (11)
- An Improvement of Mobile Users Authentication in the Integration Environments (2002) (11)
- Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection (2006) (11)
- A secure privacy and authentication protocol for passive RFID tags (2017) (11)
- Blockchain-based random auditor committee for integrity verification (2022) (10)
- A NON-REPUDIABLE MULTI-PROXY MULTI-SIGNATURE SCHEME (2009) (10)
- The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain (2005) (10)
- A New Anonymous Channel Protocol in Wireless Communications (2004) (10)
- Cryptanalysis of a User Friendly Remote Authentication Scheme with Smart Card (2005) (10)
- Cryptanalysis of an efficient password authentication scheme (2016) (10)
- An Improved Password Authentication Scheme for Smart Card (2016) (9)
- Steganography Based on Payload Transformation (2011) (9)
- Reversible Secret Image Sharing Based on Shamir's Scheme (2009) (9)
- Two-party Authenticated Multiple-key Agreement Based on Elliptic Curve Discrete Logarithm Problem (2012) (9)
- New Steganographic Method of Pixel Value Differencing (2006) (9)
- Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack (2003) (9)
- A False Data Report Filtering Scheme in Wireless Sensor Networks : A Survey (2015) (9)
- An efficient reversible data hiding scheme based on SMVQ (2013) (8)
- A certificate-based watermarking scheme for coloured images (2008) (8)
- A New Group Signature Scheme Based on RSA Assumption (2013) (8)
- An Improved Key-Management Scheme for Hierarchical Access Control (2017) (8)
- A KEY AGREEMENT SCHEME FOR SATELLITE COMMUNICATIONS (2015) (8)
- An Efficient Batch Verifying Scheme for Detecting Illegal Signatures (2015) (8)
- Cases study and analysis of the court judgement of cybercrimes in Taiwan (2015) (8)
- A new dynamic cryptographic key generation scheme for a hierarchy (1994) (8)
- Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines (2002) (8)
- A n2+n MQV key agreement protocol (2013) (8)
- A New Proxy Electronic Voting Scheme Based on Proxy Signatures (2012) (7)
- Cryptanalysis of Dynamic Identity Based on a Remote User Authentication Scheme for a Multi-server Environment (2015) (7)
- SecureDropbox: a file encryption system suitable for cloud storage services (2013) (7)
- On the security of an enhanced authentication key exchange protocol (2004) (7)
- TWO SECURE TRANSPORTATION SCHEMES FOR MOBILE AGENTS (2002) (7)
- A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms (2017) (7)
- Downlink Relay Selection Algorithm for Amplify-and-Forward Cooperative Communication Systems (2013) (7)
- Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications (2019) (7)
- A simple mobile communication billing system among charged parties (2007) (7)
- Cryptanalysis of the Hwang-Shi Proxy Signature Scheme (2002) (7)
- An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme (2019) (7)
- A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS (2012) (7)
- Flexible RFID location system based on artificial neural networks for medical care facilities (2009) (6)
- Improvement on the flexible tree-based key management framework (2005) (6)
- The Secure Transaction Protocol in NFC Card Emulation Mode (2015) (6)
- A Framework of the Intelligent Plant Factory System (2018) (6)
- A Survey of Reversible Data Hiding for VQ-Compressed Images (2018) (6)
- An Exchangeable E-Cash Scheme by E-Mint (2008) (6)
- Cryptanalysis of publicly verifiable authenticated encryption (2004) (5)
- A Modified Ohta-Okamoto Digital Signature for Batch Verification and Its Multi-Signature Version (2012) (5)
- Security enhancement for Optimal Strong-Password Authentication protocol (2003) (5)
- Using a New Structure in Group Key Management for Pay-TV (2017) (5)
- A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy (2003) (5)
- An Authentication Protocol for Lightweight NFC Mobile Sensors Payment (2016) (5)
- A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol (2013) (5)
- An Efficient MQV Key Agreement Scheme (2014) (5)
- A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks (2015) (5)
- Cryptanalysis of Tseng-Wu Group Key Exchange Protocol (2016) (5)
- An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs (2021) (5)
- A New Redundancy Reducing Cipher (2000) (5)
- Double Delegation-Based Authentication and Key Agreement Protocol for PCSs (2013) (5)
- An Improved Timestamp-Based User Authentication Scheme with Smart Card (2015) (5)
- Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection (2015) (5)
- A Provable Billing Protocol on the Current UMTS (2010) (5)
- A Secure Group Signature Scheme (2018) (4)
- A threshold decryption scheme without session keys (2000) (4)
- A Simple Key Assignment for Access Control Based on Polynomial (2013) (4)
- Identity-based deniable authentication protocol from pairings (2006) (4)
- A New Group Signature Scheme Based on the Discrete Logarithm (2009) (4)
- A Secure Strong-Password Authentication Protocol (2005) (4)
- Security on Improvement of Modified Authenticated Key Agreement Protocol (2014) (4)
- An Enhanced Secure Smart Card-based Password Authentication Scheme (2020) (4)
- A key authentication scheme with non-repudiation (2004) (4)
- A new mutual authentication and key exchange protocol with balanced computational power for wireless settings (2004) (4)
- A New Lossless Embedding Techniques Based on HDWT (2017) (4)
- Blind Signature Scheme Based on Elliptic Curve Cryptography (2012) (4)
- Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function (2004) (4)
- A Preference-based Privacy Protection for Value-added Services in Vehicular Ad Hoc Networks (2015) (4)
- Cryptanalysis and improvement of the Li-Liu-Wu user authentication scheme (2015) (4)
- A new secure generalization of threshold signature scheme (2003) (4)
- A secure on-line software transaction scheme (2005) (4)
- A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period (2007) (4)
- An Improvement of the Remote Authentication Scheme for Anonymous Users Using an Elliptic Curve Cryptosystem (2018) (4)
- Traceability on Stadler et al.'s Fair Blind Signature Scheme (2003) (4)
- Cryptanalysis of an authenticated encryption scheme using self-certified public keys (2005) (4)
- The QoS Trade-off in IEEE 802.11n EDCA and DCF for Voice, Video, and Data Traffic (2019) (3)
- A n 2 + n MQV Key Agreement Protocol (2010) (3)
- A Conference Key Scheme Based on the Diffie-Hellman Key Exchange (2018) (3)
- The Weakness of Moon et al.’s Password Authentication Scheme (2018) (3)
- A Reversible Hiding Technique Using LSB Matching for Relational Databases (2020) (3)
- A Survey of E-book Digital Right Management (2018) (3)
- Cryptanalysis of an efficient secure group signature scheme (2004) (3)
- Image Tamper Detection and Recovery by Intersecting Signatures (2014) (3)
- An Ordered Multi-proxy Multi-signature Scheme (2008) (3)
- An improved Chang-Lee’s smart card-based authentication scheme (2019) (3)
- The Novel Features for Phishing Based on User Device Detection (2016) (3)
- Cryptanalysis of the Serverless RFID Authentication and Search Protocols (2018) (3)
- An Untraceable Blind Signature Scheme(Information Security) (2003) (3)
- Improving the Security of Non-PKI Methods for Public Key Distribution (2009) (3)
- Digital signature with message recovery based on factoring and discrete logarithm (2016) (3)
- A new English auction scheme using the bulletin board system (2009) (3)
- A Reversible Data Hiding Based on Histogram Shifting of Prediction Errors for Two-Tier Medical Images (2021) (3)
- Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart Card (2018) (3)
- A simple broadcasting cryptosystem in computer networks using eXclusive-OR (2005) (3)
- A Feature-Oriented Copyright Owner Proving Technique for Still Images (2002) (3)
- Cryptanalysis of an ID-based Deniable Threshold Ring Authentication (2019) (3)
- Cryptanalysis of Biswas's Multi-party Keys Scheme Based on the Diffie-Hellman Technique (2015) (3)
- Password Authenticated Key Exchange and Protected Password Change Protocols (2017) (3)
- Research on the Secure Financial Surveillance Blockchain Systems (2020) (2)
- An improved address ownership in mobile IPv6 (2008) (2)
- A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach (2016) (2)
- An E-cient MQV Key Agreement Scheme (2014) (2)
- Research on Blockchain Technologies in Bidding Systems (2020) (2)
- Cryptanalysis and improvement of a directed digital signature scheme using a non-interactive public-key distribution system (2015) (2)
- Cryptanalysis of Li–Wang Authentication Protocol for Secure and Efficient RFID Communication (2018) (2)
- An effective AKA protocol for UMTS (2012) (2)
- A Flexible Remote User Authentication Scheme with Smart Cards (2002) (2)
- A Secure LITESET Scheme (2004) (2)
- An improved efficient authentication scheme for vehicular ad hoc networks with batch verification using bilinear pairings (2022) (2)
- Cryptanalysis of Li–Wang Authentication Protocol for Secure and Efficient RFID Communication (2018) (2)
- An Improved Reversible Data Hiding for Block Truncation Coding Compressed Images (2019) (2)
- An Improved Hou-Wang's User Authentication Scheme (2018) (2)
- An Improvement of Strong Proxy Signature and Its Applications (2008) (2)
- Tw o-party Authenticated Multiple-key Agreement Based on Elliptic Curve Discrete Logarithm Problem ⋆ (2013) (2)
- On the Security of Self-Certified Public Keys (2011) (2)
- Improvement of convertible authenticated encryption schemes and its multiple recipients version (2012) (2)
- A Key Agreement For Large Group Using Bilinear Maps (2007) (1)
- A Novel Application of the Phone Card and Its Authentication in Mobile Communications (1999) (1)
- A simple method to secure the integrating a key distribution into digital signature standard (2012) (1)
- A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks q (2008) (1)
- The batch verifying multiple digital signature scheme: A modified version of Ohta-Okamoto digital signature (2012) (1)
- An Improved Key Agreement Authentication Scheme Based on an Anonymous Password (2020) (1)
- An efficient multi-round anonymous auction protocol (2007) (1)
- Two Secure Transportation Schemes for Mobile Agent (2002) (1)
- Research on Batch Verification Schemes for Identifying Illegal Signatures (2019) (1)
- A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server (2014) (1)
- Phone Card Application and Authentication in Wireless Communications (1996) (1)
- An access control based on (1996) (1)
- Cryptanalysis and Improvement of Zhuang-Chang-Wang-Zhu Password Authentication Scheme (2015) (1)
- RTS Threshold Variation Study on Contention-based IEEE 802.11n EDCA for Real-time Services (2020) (1)
- Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks (2018) (1)
- Improved Attack on Server Assisted Authentication Protocols (1999) (1)
- An Authentication Scheme for the Global Mobility Network (2013) (1)
- Cryptanalysis of Security Analysis and Enhancements of a Remote User Authentication Scheme (2020) (1)
- A Robust-Fragile Watermarking Scheme for Image Authentication (2008) (1)
- Image Protection by Intersecting Signatures (2014) (1)
- RFID Authentication Protocol for (2007) (1)
- Research on Malware Detection and Classification Based on Artificial Intelligence (2020) (1)
- Combating Stimulated Raman Scattering Nonlinear Effect on 8-channels DWDM Systems (2019) (1)
- A certificateless aggregate signature scheme for security and privacy protection in VANET (2022) (1)
- Cryptanalysis of Publicly Verifiable Authenticated Encryption(Information Security) (2004) (1)
- The Weaknesses of the Virtual Password Authentication Protocol with Cookie (2018) (1)
- A new service for digital mobile communications (1994) (1)
- Cryptanalysis of A Hierarchical Data Access and Key Management in Cloud Computing (2018) (1)
- A Steganographic method by using Adaptive Algorithm for gray scale images (2015) (1)
- Secrecy Analysis in the AF Mode Cooperative Communication System (2018) (0)
- A Novel Multistage Secret Sharing Scheme (2014) (0)
- A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs (2022) (0)
- Tourism Seasonal Research on Inbound Tourism (2019) (0)
- Extension of Authenti ation Proto ol for GSM (2012) (0)
- Improvements of Threshold Signature and Authenticated Encryption for Group Communications (2018) (0)
- Tra eability on Low-Computation Partially Blind Signatures for Ele troni Cash (2012) (0)
- Improvement of Convertible Authenticated Encryption Schemes (2012) (0)
- An access control based on scheme Chinese theorem remainder and time stamp concept (2003) (0)
- A Mutual Authentication Protocol Based on Hash Function for RFID (2010) (0)
- A Survey on Attribute-Based Proxy Re-Encryption Scheme in Cloud Environment ∗ (2013) (0)
- A New Anonymous Conferen e Key Distribution System based on the Ellipti Curve Dis rete Logarithm Problem (2012) (0)
- On the EÆ ien y of Nonrepudiable Threshold Proxy Signature S heme with Known Signers (2012) (0)
- An Untra eable Blind Signature S heme (2012) (0)
- S TWO SECURE TRANSPORTATION SCHEMES FOR MOBILE AGENTS (2012) (0)
- Enhan ement for Optimal Strong-Password Authenti ation Proto ol (2012) (0)
- 1.A DataDelivery Mechanism toSupport Mobile Users inWireless Sensor Networks (2007) (0)
- A Cryptographic Key Generation Scheme Without A Trusted Third Party For Access Control In A Hierarchy (2004) (0)
- Towards secure and efficient user authentication scheme using smart card for multi-server environments (2013) (0)
- An Improvement of Tseng–Wu Group Key Exchange Protocol (2018) (0)
- An Improved User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card (2020) (0)
- Data error locations reported by public auditing in cloud storage service (2014) (0)
- A server assisted authentication protocol for detecting error vectors (2004) (0)
- A Feature-Oriented Copyright Owner Detection Technique for Still Images (2012) (0)
- Double Delegation-Based Authentication and Key Agreement Protocol for PCSs (2013) (0)
- An Image Authentication Scheme Based On Digital Signatures ∗ (2012) (0)
- An Authentication Protocol for Multicast Communications (2002) (0)
- (The 18th International Conference on Advanced Information Networking and Applications, p160-p163)On the Security of an Enhanced Authentication Key Exchange Protocol (2004) (0)
- A Study On Cryptographic Key Assignment for Access Control in a User Hierarchy (2004) (0)
- Overview on Physical Layer Security in Low Earth Orbit (LEO) Satellite System (2021) (0)
- Tra eability on Stadler et al . ' s Fair Blind Signature S heme (2012) (0)
- A Secure and Efficient One-time Password Authentication Scheme for Wireless Sensor Networks (2011) (0)
- An Improvement of a Dynami Cryptographi Key Assignment S heme in a Tree Hierar hy (2012) (0)
- An Efficient ECDSA Authentication Scheme for Mobile IP Networks (2003) (0)
- The Moderately Hard DoS-Resistant Authentication Protocol on Client Puzzles (2016) (0)
- A Conference Key Distribution Scheme in Tree Hierarchies (2013) (0)
- Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization (2009) (0)
- (IEEE YUFORIC 2001 Youth Forum in Computer Science and Engineering:p125-p126)An Improvement of Proxy Multi-Signature Scheme (2001) (0)
- An Improved Authentication Protocol Without Trusted Third Party (2001) (0)
- Comments on Chang-Lee ’ s Anonymous E-Voting Scheme (2012) (0)
- A Fair Non-transfer Exchange Protocol (2009) (0)
- A Server Assisted Authenti ation Proto ol for Dete ting Error Ve tors (2012) (0)
- An Authenti ation Proto ol for Multi ast Communi ations (2012) (0)
- An Electronic Cash Scheme with Crime-Resistance (2003) (0)
- An Efficient Authenticated Key Agreement Scheme Without Using Smart Card (2011) (0)
- A Study on Fair Exchange Protocols in Networks (2004) (0)
- FOR LIGHTWEIGHT NFC MOBILE SENSORS PAYMENT (2016) (0)
- Privacy-Preserving Universal Authentication Protocol using Hierarchical Key and Group Signature (2020) (0)
- Reviews and analyses the privacy-protection system for multi-server (2019) (0)
- The Weakness of the Self-encryption Mechanism for Authentication of Roaming Services (2018) (0)
This paper list is powered by the following services: