Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    A processing-type active real-time traceable certification system

    In addition to substituting low-price and low-quality materials for high-quality materials at the food processing stage, many dishonest businesses risk adulterating chemical materials in products to reduce pro...

    Chia-Chun Wu, Chung-Huei Ling, Min-Shiang Hwang in Scientific Reports (2024)

  2. No Access

    Book and Conference Proceedings

  3. No Access

    Article

    Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks

    The remote nodes using a selecting relay algorithm (SRA) transmit its dates on wireless sensor networks (WSNs). The algorithm can enhance the network life cycle. It selects an appropriate cooperation node as a...

    Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang in The Journal of Supercomputing (2019)

  4. No Access

    Chapter and Conference Paper

    The Weakness of the Self-encryption Mechanism for Authentication of Roaming Services

    In this paper, we will show that the authentication protocol for roaming service proposed by Hwang-Chang is vulnerable to Denial-of-Service attack. Most important we also will show that the protocol may cause ...

    Min-Shiang Hwang, Song-Kong Chong in Advances in Intelligent, Interactive Syste… (2019)

  5. No Access

    Chapter and Conference Paper

    Secrecy Analysis in the AF Mode Cooperative Communication System

    Cooperative system is a tendency for the future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a h...

    Hsin-Ying Liang, Cheng-Ying Yang in Information Science and Applications 2018 (2019)

  6. No Access

    Chapter and Conference Paper

    Cryptanalysis of Li–Wang Authentication Protocol for Secure and Efficient RFID Communication

    Recently, Li, Wang, et al. proposed a secure and efficient authentication protocol which enhances scalability function by using the simple index. This study further demonstrates that their scheme could not res...

    Chia-Hui Wei, Cheng-Ying Yang in Recent Developments in Intelligent Computi… (2019)

  7. No Access

    Chapter and Conference Paper

    Cryptanalysis of the Serverless RFID Authentication and Search Protocols

    In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan et al. proposed a serverless RFID system to solve this problem without a central database while protecting the ...

    Chia-Hui Wei, Cheng-Ying Yang in Advances in Intelligent, Interactive Syste… (2019)

  8. No Access

    Chapter and Conference Paper

    An Improved Hou-Wang’s User Authentication Scheme

    It’s easy to access Internet resources in the cloud environment. And it’s important to protect the legal users’ privacy and confidentiality. Recently, Hou and Wang proposed a robust and efficient user authenti...

    Min-Shiang Hwang, Hung-Wei Yang in Information Science and Applications 2018 (2019)

  9. No Access

    Chapter and Conference Paper

    An Improvement of Tseng–Wu Group Key Exchange Protocol

    Based on the group Diffie–Hellman technique, a contributory group key exchange protocol has been proposed by Biswas. Although Biswas claimed the protocol belongs to a contributory group key exchange, Tseng and...

    Min-Shiang Hwang, Yung-Chen Chou in Recent Developments in Intelligent Computi… (2019)

  10. No Access

    Chapter and Conference Paper

    A Blockchain-Based Traceable Certification System

    In recent years, product records become more common to merchandize sold in retail stores, but the current product record system used today can’t assure product’s quality after products were transported through...

    Po-Yeuan Chang, Min-Shiang Hwang in Security with Intelligent Computing and Bi… (2018)

  11. No Access

    Chapter and Conference Paper

    Cryptanalysis of an Efficient and Secure Smart Card Based Password Authentication Scheme

    The user authentication scheme has been widely applied to verify the users’ legality. In order to enhance the security, the smart card has widely used in an authentication scheme. Recently, Liu et al. shown th...

    Chi-Wei Liu, Cheng-Yi Tsai, Min-Shiang Hwang in Recent Developments in Intelligent Systems… (2017)

  12. No Access

    Chapter and Conference Paper

    Learning Performance Evaluation in eLearning with the Web-Based Assessment

    With the prevalence of Internet, eLearning provides a platform for education that enables students to take classes online. While eLearning provides a flexible learning environment, it also has drawbacks. This...

    Cheng-Ying Yang, Tsai-Yuan Chung in Information Science and Applications 2017 (2017)

  13. No Access

    Chapter and Conference Paper

    An Improved Password Authentication Scheme for Smart Card

    In recent times, Wei et al. proposed a secure smart card based on remote user password authentication scheme. Their scheme is more secure than other schemes. In this article, we will prove their scheme is vul...

    Cheng-Yi Tsai, Chiu-Shu Pan in Recent Developments in Intelligent Systems… (2017)

  14. No Access

    Article

    Data error locations reported by public auditing in cloud storage service

    Public auditing is an important issue in cloud storage service because a cloud service provider may try to hide management mistakes and system errors from users or even steal or tamper with a user’s data for m...

    Min-Shiang Hwang, Cheng-Chi Lee, Tsuei-Hung Sun in Automated Software Engineering (2014)

  15. No Access

    Article

    Towards secure and efficient user authentication scheme using smart card for multi-server environments

    Two user authentication schemes for multi-server environments have been proposed by Tsai and Wang et al., respectively. However, there are some flaws existing in both schemes. Therefore, a new scheme for impro...

    Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, **n-Ke Jan in The Journal of Supercomputing (2013)

  16. No Access

    Article

    Double Delegation-Based Authentication and Key Agreement Protocol for PCSs

    Many protocols have been proposed for solving the user authentication in portable communication system. One of the schemes is based on the delegation concept. Home Location Register (HLR) delegates Mobile Stat...

    Hsia-Hung Ou, Min-Shiang Hwang in Wireless Personal Communications (2013)

  17. No Access

    Article

    A Simple Key Assignment for Access Control Based on Polynomial

    The access control begins to be widely discussed, especially in organizations and systems with a hierarchical structure. In such a hierarchy, users and their information items divide into a number of disjointe...

    Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu in Arabian Journal for Science and Engineering (2013)

  18. No Access

    Chapter and Conference Paper

    A New Proxy Electronic Voting Scheme Based on Proxy Signatures

    Electronic voting (e-voting) is used to solve the problems of traditional paper-based voting and to lower costs. So far, many researchers have offered their secure e-voting systems. However, the existing schem...

    Cheng-Chi Lee, Te-Yu Chen, Shu-Chen Lin in Future Information Technology, Application… (2012)

  19. No Access

    Article

    An efficient authentication protocol for mobile communications

    In this paper, a new Global System of Mobile Communications (GSM) authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol for roaming users including: (a) commu...

    Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang in Telecommunication Systems (2011)

  20. No Access

    Article

    A Provable Billing Protocol on the Current UMTS

    This paper proposes a simple method that equips UMTS-based telecom companies with a mechanism to prove the records on mobile users’ phone bills. In the history of mobile phone communication, we have seen count...

    Hsia-Hung Ou, Min-Shiang Hwang, **n-Ke Jan in Wireless Personal Communications (2010)

previous disabled Page of 2