Search For:

Displaying 1-13 out of 13 total
Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme
Found in: Next Generation Web Services Practices, International Conference on
By I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang
Issue Date:August 2005
pp. 437-440
In a paper recently published in the IEEE Transaction on Consumer Electronics, Das, Saxena, and Gulati proposed a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and do...
 
An Ordered Multi-proxy Multi-signature Scheme
Found in: Intelligent Systems Design and Applications, International Conference on
By Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou
Issue Date:November 2008
pp. 308-313
Recently, Hwang and Chen proposed a new multi-proxy multi-signature scheme. In this paper, an improvement on Hwang etal. scheme will be proposed. It is more efficient in terms of computational complexity and communication cost. Furthermore, the security of...
 
Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment
Found in: Innovative Computing ,Information and Control, International Conference on
By Te-Yu Chen, Min-Shiang Hwang, Cheng-Chi Lee, Jinn-Ke Jan
Issue Date:December 2009
pp. 725-728
The conventional user authentication scheme is designed for a single-sever environment. In the case of multiple servers, a user must register with each server individually, and memorize different pairs of identities and passwords to login to each one. This...
 
Reversible Secret Image Sharing Based on Shamir's Scheme
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang
Issue Date:September 2009
pp. 1014-1017
A novel secret image sharing scheme was proposed by Lin and Tsai in 2004. They claimed that their scheme can achieve the goal of secret image sharing with the additional capabilities of steganography and authentication. After that, Yang et al. indicated th...
 
An Exchangeable E-Cash Scheme by E-Mint
Found in: Intelligent Systems Design and Applications, International Conference on
By Jung-Wen Lo, Min-Shiang Hwang, Yen-Ping Chu
Issue Date:November 2008
pp. 246-251
The electronic payment systems are gradually used after the electronic commerce was in fashion. However, the electronic cash (E-cash) in every electronic payment system cannot be circulated to other E-cash systems. In addition, the E-cash usually presents ...
 
On the Security of an Enhanced Authentication Key Exchange Protocol
Found in: Advanced Information Networking and Applications, International Conference on
By Min-Shiang Hwang, Ting-Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai
Issue Date:March 2004
pp. 160
In 2003, Hwang et al. proposed an enhanced authentication key exchange protocol. Their protocol can generate multiple shared keys for two entities at a time and takes less computation time than Harn and Lin's protocol. However, we will show that Hwang et a...
 
A Mutual Authentication Protocol for RFID
Found in: IT Professional
By Chia-Hui Wei, Min-Shiang Hwang,A Y Chin
Issue Date:March 2011
pp. 20-24
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
 
A Verifiable Electronic Voting Scheme over the Internet
Found in: Information Technology: New Generations, Third International Conference on
By Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai
Issue Date:April 2009
pp. 449-454
The electronic election allows voters to vote over the Internet without the geographical restrictions. The mobility, democracy, and privacy are important criteria in evaluating electronic voting schemes. Moreover, researchers have suggested that the superv...
 
Improving the Security of Non-PKI Methods for Public Key Distribution
Found in: Information Technology: New Generations, Third International Conference on
By Chun-Ta Li, Min-Shiang Hwang
Issue Date:April 2009
pp. 1695-1696
In 2004, Peyravian et al. presented three simple solutions to X.509 PKI method that these three solutions could save storage, bandwidth and reduce the complexity of the operations. However, we find that Peyravian et al. second scheme suffers from the masqu...
 
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
Found in: IEEE Transactions on Knowledge and Data Engineering
By Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin
Issue Date:November 2003
pp. 1552-1560
<p><b>Abstract</b>—In a <tmath>(t,n)</tmath> threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of <tmath>n</tmath> members. Any <tmath>t...
 
Security Enhancement for the 'Simple Authentication Key Agreement Algorithm'
Found in: Computer Software and Applications Conference, Annual International
By Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang
Issue Date:October 2000
pp. 113
The weaknesses of the simple authenticated key agreement (SAKA) protocol were shown by Sun. The weaknesses include (1) it cannot detect a masquerade, (2) it cannot withstand the dictionary attack, and (3) it cannot provide perfect forward secrecy. In this ...
 
A Robust-Fragile Watermarking Scheme for Image Authentication
Found in: Innovative Computing ,Information and Control, International Conference on
By Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang
Issue Date:June 2008
pp. 176
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against the quantization attack. Unfortunately, their scheme is not secure enough. In 2006, Liao et al. proposed two types of attack on Lu et al.'s scheme. They po...
 
SecureDropbox: a file encryption system suitable for cloud storage services
Found in: Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference (CAC '13)
By Chi-Wei Liu, Min-Shiang Hwang, Min-Yu Chen
Issue Date:August 2013
pp. 1-2
Cloud storage services bring users a convenient, cross-device and practical application. A great number of users ranging from individuals to large-scale corporates grow and hold on the almighty information to cloud storage services. However, the lack of gu...
     
 1