{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
"A Conference Key Scheme Based on the Di\'ee-Hellman Key Exchange." \i International Journal of Network Security\i0  20, no. 6 (2018): 1221-1226.\par \par "A Conference Key Distribution Scheme in Tree Hierarchies." \i International Journal of Network Security\i0  15, no. 1 (2013): 59\{64.\par \par \i Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme\i0  In \i International Conference on Next Generation Web Services Practices\i0 ., 2005.\par \par "Challenges in E-Government and Security of Information." \i Information & Security: An International Journal\i0  15, no. 1 (2004): 9-20.\par \par "Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function." \i Information & Security: An International Journal\i0  15, no. 1 (2004): 110-114.\par \par "Efficient access control and key management schemes for mobile agents." \i Computer Standards & Interfaces\i0  26, no. 5 (2004): 423-433.\par \par Shen, Jau-Ji, Chih-Wei Lin, and Min-Shiang Hwang. "A Modified Remote User Authentication Scheme Using Smart Cards." \i IEEE Transactions on Consumer Electronics\i0  49, no. 2 (2003): 414-416.\par \par Lin, Iuon-Chang, Min-Shiang Hwang, and Chin-Chen Chang. "Security Enhancement for Anonymous Secure e-Voting over a Network." \i Computer Standards & Interfaces\i0  25, no. 2 (2003): 131-139.\par \par Hwang, Min-Shiang, Cheng-Chi Lee, and Yan-Chi Lai. "An Untraceable Blind Signature Scheme." \i IEICE Transactions on Foundations \i0  7 (2003): 1902-1906.\par \par Hwang, Min-Shiang, Eric Jui- Lin LU, and Iuon-Chung Lin. "Adding Timestamps to the Secure Electronic Auction Protocol." \i Data & Knowledge Engineering \i0  40, no. 2 (2002): 155-162.\par \par "A Flexible Remote User Authentication Scheme with Smart Cards." \i ACM Operating System Review\i0  36, no. 3 (2002): 46-52.\par \par "Integrating Different Semantics of Classification Levels in Heterogeneous Distributed Database Systems." \i Pakistan Journal of Information and Technology \i0  1, no. 1 (2002): 1-4.\par \par Lee, Cheng-Chi, Li-Hua Li, and Min-Shiang Hwang. "A Remote User Authentication Scheme Using Hash Functions." \i ACM SIGOPS Operating Systems Review\i0  36, no. 4 (2002): 23-29.\par \par Lee, Cheng-Chi, Li-Hua Li, and Min-Shiang Hwang. "A Remote User Authentication Scheme Using Smart Cards." \i ACM Operating Systems Review\i0  36, no. 4 (2002): 23-29.\par \par Tang, Yuan-Liang, Cheng-Chi Lee, and Min-Shiang Hwang. "A Simple Remote User Authentication Scheme." \i Mathematical and Computer Modelling\i0  36 (2002): 103-107.\par \par Hwang, Min-Shiang, Yan-Chi Lai, and Cheng-Chi Lee. "Traceability on Low-Computation Partially Blind Signatures for Electronic Cash." \i IEICE Fundamentals on Electronics, Communications and Computer Sciences E85-A\i0  5 (2002): 1181-1182.\par \par "Two Secure Transportation Schemes for Mobile Agents." \i Information & Security: An International Journal\i0  8 (2002): 87-97.\par \par Hwang, Min-Shiang, and Chii-Hwa Lee. "Secure access schemes in mobile database systems." \i European Transactions on Telecommunications\i0  12, no. 4 (2001).\par \par Hwang, Min-Shiang, and Chii-Hwa Lee. "Secure Access Schemes in Mobile Database Systems." \i European Transactions on Telecommunications\i0  12, no. 4 (2001): 303-310.\par \par Hwang, Min-Shiang, Li-Hua Li, and Iuon-Chung Lin. "A Simple Micro-payment Scheme." \i Journal of Systems and Software \i0  55, no. 3 (2001): 221-229.\par \par Hwang, Min-Shiang, Chin-Chen Chang, and Kuo-Feng Hwang. "Digital Watermarking of Images Using Neural Networks." \i Journal of Electronic Imaging\i0  9, no. 4 (2000): 548-555.\par \par Chang, Chin-Chen, Min-Shiang Hwang, and Kuo-Feng Hwang. "A Digital Watermarking Scheme Using Human Visual Effects." \i Informatica: An International Journal of Computing and Informatics\i0  24, no. 4 (2000): 505-511.\par \par Hwang, Min-Shiang, and Li-Hua Li. "A New Remote User Authentication Scheme Using Smart Cards." \i IEEE Transactions on Consumer Electronics\i0  46, no. 1 (2000): 28-30.\par \par Hwang, Min-Shiang. "Cryptanalysis of a Remote Login Authentication Scheme." \i Computer Communications\i0  22 (1999): 742-744.\par \par Hwang, Min-Shiang, and Wei-Pang Yang. "Multilevel Secure Database Encryption with Subkeys." \i Data and Knowledge Engineering \i0  2, no. 22 (1997): 117-131.\par \par Hwang, Min-Shiang, and Wei-Pang Yang. "Conference Key Distribution Protocols for Digital Mobile Communication Systems." \i IEEE Journal on Selected Areas in Communications\i0  13, no. 2 (1995).\par \par Hwang, Min-Shiang, and W.P. Yang. "Conference key distribution protocols for digital mobile communication systems." \i IEEE Journal on Selected Areas in Communications \i0  (1995): 416-420.\par \par Hwang, Min-Shiang, and Wei-Pang Yang. "A Two-Phase Encryption Scheme for Enhancing Database Security." \i Journal of Systems and Software\i0  31, no. 12 (1995): 257-265.\par \par }