Skip to main content

and
  1. No Access

    Article

    Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks

    The remote nodes using a selecting relay algorithm (SRA) transmit its dates on wireless sensor networks (WSNs). The algorithm can enhance the network life cycle. It selects an appropriate cooperation node as a...

    Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang in The Journal of Supercomputing (2019)

  2. No Access

    Article

    Data error locations reported by public auditing in cloud storage service

    Public auditing is an important issue in cloud storage service because a cloud service provider may try to hide management mistakes and system errors from users or even steal or tamper with a user’s data for m...

    Min-Shiang Hwang, Cheng-Chi Lee, Tsuei-Hung Sun in Automated Software Engineering (2014)

  3. No Access

    Article

    Towards secure and efficient user authentication scheme using smart card for multi-server environments

    Two user authentication schemes for multi-server environments have been proposed by Tsai and Wang et al., respectively. However, there are some flaws existing in both schemes. Therefore, a new scheme for impro...

    Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, **n-Ke Jan in The Journal of Supercomputing (2013)

  4. No Access

    Chapter and Conference Paper

    A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period

    In the (t, n) proxy signature scheme, the signature, signed by a signer originally, can be signed by t or more proxy signers out of a proxy group of n proxy signers. In this paper, we propose a new secure non-rep...

    Min-Shiang Hwang, Shiang-Feng Tzeng in Computational Science and Its Applications… (2007)

  5. No Access

    Article

    A user authentication system using back-propagation network

    Information security has been a critical issue in the field of information systems. One of the key factors in the security of a computer system is how to identify the authorization of users. Password-based use...

    Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang in Neural Computing & Applications (2005)

  6. No Access

    Article

    The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain

    In this paper, we extend the Pay-Word micro-payment scheme using the 1-dimension one-way hash chain to generate an n-dimension one-way hash chain. According to the system requirements, a user can flexibly choose ...

    Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang in Designs, Codes and Cryptography (2005)

  7. No Access

    Chapter and Conference Paper

    A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy

    A new conference key distribution scheme in a in a totally-ordered Hierarchy is proposed in this study. A group of users with a different security class can generate a common secret key over a public channel s...

    Min-Shiang Hwang, Wen-Guey Tzeng in Information Networking (2003)