default search action
Ren-Junn Hwang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c16]Ren-Junn Hwang, Yan Zhi Huang:
Secure Data Collection Scheme for Wireless Sensor Networks. AINA Workshops 2017: 553-558 - 2015
- [j21]Ren-Junn Hwang, Chih-Hua Lai:
Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce. Symmetry 7(2): 464-487 (2015) - 2014
- [j20]Ren-Junn Hwang, Yu-Kai Hsiao:
Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks. Comput. J. 57(10): 1557-1569 (2014) - [j19]Ren-Junn Hwang, Loang-Shing Huang:
The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks. Peer-to-Peer Netw. Appl. 7(4): 655-664 (2014) - 2013
- [j18]Ren-Junn Hwang, Yu-Kai Hsiao:
An anonymous distributed routing protocol in mobile ad-hoc networks. J. Supercomput. 66(2): 888-906 (2013) - 2012
- [j17]Ren-Junn Hwang, Yu-Kai Hsiao:
An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks. IEICE Trans. Commun. 95-B(9): 2718-2727 (2012) - 2011
- [j16]Ren-Junn Hwang, Yu-Kai Hsiao, Cheng-Yang Hwang:
Privacy protection on Vehicular Ad hoc NETworks. Int. J. Ad Hoc Ubiquitous Comput. 7(4): 261-271 (2011) - [c15]Ren-Junn Hwang, Yu-Kai Hsiao, Yen-Fu Liu:
Secure Communication Scheme of VANET with Privacy Preserving. ICPADS 2011: 654-659 - 2010
- [j15]Yu-Kai Hsiao, Ren-Junn Hwang:
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks. Int. J. Secur. Networks 5(1): 26-34 (2010)
2000 – 2009
- 2007
- [j14]Ren-Junn Hwang, Sheng-Hua Shiau:
Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers. Comput. J. 50(5): 602-615 (2007) - [j13]Ren-Junn Hwang, Sheng-Hua Shiau, Ding-Far Jan:
A new mobile payment scheme for roaming services. Electron. Commer. Res. Appl. 6(2): 184-191 (2007) - [j12]Ren-Junn Hwang, Feng-Fu Su, Loang-Shing Huang:
Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices. Wirel. Pers. Commun. 42(2): 213-223 (2007) - 2006
- [j11]Ren-Junn Hwang, Rong-Chi Chang:
Key agreement in ad hoc networks. Int. J. Comput. Sci. Eng. 2(1/2): 37-45 (2006) - 2005
- [j10]Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su:
An efficient signcryption scheme with forward secrecy based on elliptic curve. Appl. Math. Comput. 167(2): 870-881 (2005) - [j9]Ren-Junn Hwang, Feng-Fu Su:
A new efficient authentication protocol for mobile networks. Comput. Stand. Interfaces 28(2): 241-252 (2005) - [j8]Ren-Junn Hwang, Feng-Fu Su:
Cryptanalysis on stream ciphers for GSM networks. Int. J. Internet Protoc. Technol. 1(1): 30-33 (2005) - [c14]Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen:
An Efficient Decryption Method for RSA Cryptosystem. AINA 2005: 585-590 - [c13]Sheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin:
Key Agreement Protocol Based on Weil Pairing. AINA 2005: 597-602 - 2004
- [j7]Chin-Chen Chang, Ren-Junn Hwang:
A new scheme to protect confidential images. J. Interconnect. Networks 5(3): 221-232 (2004) - [c12]Ying-Hong Wang, Ren-Junn Hwang, Wen-Nan Wang:
An Agent-Based Consumer Recommendation Mechanism. AINA (2) 2004: 143-148 - [c11]Chin-Chen Chang, Ren-Junn Hwang:
A New Scheme to Protect Confidential Images. AINA (1) 2004: 158-164 - [c10]Ren-Junn Hwang, Chin-Chen Chang:
Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. AINA (1) 2004: 208-212 - [c9]Ying-Hong Wang, Ren-Junn Hwang, Wen-Nan Wang:
An Agent-Based Consumer Recommendation Mechanism. ICDCS Workshops 2004: 228-233 - 2003
- [c8]Ren-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai:
An Enhanced Authentication Key Exchange Protocol . AINA 2003: 202-205 - [c7]Ren-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai:
Enhanced Authentication Key Agreement Protocol. Applied Informatics 2003: 1003-1006 - [c6]Ren-Junn Hwang, Chin-Chen Chang:
A Method for Sending Confidential Messages to a Group without Trusted Parties. ISPA 2003: 375-381 - [c5]Ren-Junn Hwang, Rong-Chi Chang:
Key Agreement in Ad Hoc Networks. ISPA 2003: 382-390 - [c4]Ren-Junn Hwang, Chuan-Ho Kao:
The Improvement of Steganography Capacity. MMM 2003: 329-342 - 2002
- [c3]Ren-Junn Hwang, Chuan-Ho Kao, Rong-Chi Chang:
Watermark in Color Image. CW 2002: 225-229 - [c2]Ren-Junn Hwang, Rong-Chi Chang, Sheng-Hua Shiau, Tsung-Ming Chang, Chun-Chia Wang, Hui-Huang Hsu:
Digital Watermarking Based on Pixels Relationships. JCIS 2002: 1025-1028 - 2001
- [c1]Ren-Junn Hwang, Timothy K. Shih, Chuan-Ho Kao, Tsung-Ming Chang:
Lossy Compression Tolerant Steganography. Human.Society@Internet 2001: 427-435
1990 – 1999
- 1999
- [j6]Ren-Junn Hwang, Chin-Chen Chang:
An Improved Threshold Scheme Based on Modular ARithmetic. J. Inf. Sci. Eng. 15(5): 691-699 (1999) - [j5]Ren-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang:
A concept of designing cheater identification methods for secret sharing. J. Syst. Softw. 46(1): 7-11 (1999) - 1998
- [j4]Ren-Junn Hwang, Chin-Chen Chang:
An on-line secret sharing scheme for multi-secrets. Comput. Commun. 21(13): 1170-1176 (1998) - [j3]Chin-Chen Chang, Ren-Junn Hwang:
Sharing Secret Omages using Shadow Codebooks. Inf. Sci. 111(1-4): 335-345 (1998) - 1993
- [j2]Chin-Chen Chang, Ren-Junn Hwang:
Master Keys for an M 3 Cryptoscheme. Cryptologia 17(2): 175-186 (1993) - 1992
- [j1]Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu:
Crypographic key assignment scheme for access control in a hierarchy. Inf. Syst. 17(3): 243-247 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint