<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ting-Yi Chang</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Wei-Pang Yang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Conference Key Distribution System</style></keyword><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">Discrete Logarithm.</style></keyword><keyword><style  face="normal" font="default" size="100%">One-Way Hash Function</style></keyword><keyword><style  face="normal" font="default" size="100%">User Anonymity</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">110-114</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article mounts a conspiracy attack on the anonymous conference key distribution system without using a one-way hash function proposed by Tseng and Jan. The attack described in the article can reveal the participants’ common key shared with the chairperson.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Wei-Pang Yang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating Different Semantics of Classification Levels in Heterogeneous Distributed Database Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Pakistan Journal of Information and Technology </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">1-4</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Wei-Pang Yang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multilevel Secure Database Encryption with Subkeys</style></title><secondary-title><style face="normal" font="default" size="100%">Data and Knowledge Engineering </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1997</style></year></dates><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%">117-131</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">22</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Wei-Pang Yang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Conference Key Distribution Protocols for Digital Mobile Communication Systems</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Journal on Selected Areas in Communications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><volume><style face="normal" font="default" size="100%">13</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Wei-Pang Yang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Two-Phase Encryption Scheme for Enhancing Database Security</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Systems and Software</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><volume><style face="normal" font="default" size="100%">31</style></volume><pages><style face="normal" font="default" size="100%">257-265</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">12</style></issue></record></records></xml>