黃 宗立

Professor

  • 4317 引文
  • 37 h-指數
1990 …2019
如果您對這些純文本內容做了任何改變,很快就會看到。

研究成果 1990 2019

篩選
Conference contribution
2018

Comment on "cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags"

Huang, S. C., Tsai, C. W. & Hwang, T-L., 2018 七月 20, Proceedings of the 2018 International Conference on Data Science and Information Technology, DSIT 2018. Association for Computing Machinery, p. 23-27 5 p. (ACM International Conference Proceeding Series).

研究成果: Conference contribution

Radio frequency identification (RFID)
Authentication
Network protocols
Internet of things
Computer systems
2017

Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'

Gu, J. & Hwang, T., 2017 十月 18, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 520-521 2 p. 8073872. (2017 IEEE Conference on Dependable and Secure Computing).

研究成果: Conference contribution

Comment on 'Multiparty Quantum Key Agreement with GHz State'

Gu, J. & Hwang, T-L., 2017 二月 16, Proceedings - 2016 International Computer Symposium, ICS 2016. Institute of Electrical and Electronics Engineers Inc., p. 241-243 3 p. 7858477

研究成果: Conference contribution

1 引文 (Scopus)

Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System

Hwang, T-L., Luo, Y. P., Gope, P. & Liu, Z. R., 2017 二月 16, Proceedings - 2016 International Computer Symposium, ICS 2016. Institute of Electrical and Electronics Engineers Inc., p. 244-247 4 p. 7858478. (Proceedings - 2016 International Computer Symposium, ICS 2016).

研究成果: Conference contribution

Electronic document identification systems
Seals
Communication
2013
1 引文 (Scopus)

Provably secure mutual authentication and key agreement scheme with user anonymity

Hwang, T-L. & Gope, P., 2013, ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing. IEEE Computer Society, 6782847

研究成果: Conference contribution

Authentication
Communication
Forging
Wireless networks
Costs
2012

Improved 'bidirectional quantum secure communication protocol based on a shared private Bell state'

Lin, C. Y. & Hwang, T., 2012 十二月 1, Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012. p. 137-140 4 p. 6449726. (Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012).

研究成果: Conference contribution

Quantum communication
Network protocols
Photons
Communication
Secure communication
1 引文 (Scopus)

On 'controlled quantum teleportation and secure direct communication'

Kao, S. H. & Hwang, T-L., 2012, Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012. p. 141-145 5 p. 6449727

研究成果: Conference contribution

Network protocols
Communication
Defects
Controllers
2005
2 引文 (Scopus)

Anonymous proof of membership with ring signature

Chang, C. C. & Hwang, T-L., 2005 十二月 1, 2005 IEEE International Conference on Electro Information Technology. 1627030. (2005 IEEE International Conference on Electro Information Technology; 卷 2005).

研究成果: Conference contribution

Internet
Electronic document identification systems
Managers
1999
6 引文 (Scopus)

On the security of the Lee-Chang group signature scheme and its derivatives

Joye, M., Lee, N. Y. & Hwang, T., 1999 一月 1, Information Security - 2nd International Workshop, ISW 1999, Proceedings. Mambo, M. & Zheng, Y. (編輯). Springer Verlag, p. 47-51 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 1729).

研究成果: Conference contribution

Group Signature
Group Scheme
Signature Scheme
Derivatives
Derivative
1998

Arbitrated unconditionally secure authentication scheme with multi-senders

Hwang, T-L. & Wang, C. H., 1998 一月 1, Information Security - 1st International Workshop, ISW 1997, Proceedings. Mambo, M., Davida, G. & Okamoto, E. (編輯). Springer Verlag, p. 266-272 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 1396).

研究成果: Conference contribution

Authentication
Receiver
Arbitration
Evidence
55 引文 (Scopus)

On zhang’s nonrepudiable proxy signature schemes

Lee, N. Y., Hwang, T-L. & Wang, C. H., 1998 一月 1, Information Security and Privacy - 3rd Australasian Conference, ACISP 1998, Proceedings. Boyd, C. & Dawson, E. (編輯). Springer Verlag, p. 415-422 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 1438).

研究成果: Conference contribution

Proxy Signature
Signature Scheme
Delegation
Signature
Attack
1995
22 引文 (Scopus)

On the matsumoto and Imai’s human identification scheme

Wang, C. H., Hwang, T. & Tsai, J. J., 1995 一月 1, Advances in Cryptology — EUROCRYPT 1995 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Quisquater, J-J. & Guillou, L. C. (編輯). Springer Verlag, p. 382-392 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 921).

研究成果: Conference contribution

Identification Scheme
Password
Attack
Processing
Human
55 引文 (Scopus)

Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders

Li, C. M., Hwang, T-L. & Lee, N. Y., 1995 一月 1, Advances in Cryptology - EUROCRYPT 1994 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. de Santis, A. (編輯). Springer Verlag, p. 194-204 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 950).

研究成果: Conference contribution

Multisignature
Shareholders
Traceability
Signature Scheme
Imply
1994
28 引文 (Scopus)

Remark on the threshold RSA signature scheme

Li, C. M., Hwang, T. & Lee, N. Y., 1994 一月 1, Advances in Cryptology ─ CRYPT0 1993 - 13th Annual International Cryptology Conference, Proceedings. Stinson, D. R. (編輯). Springer Verlag, p. 413-419 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 773 LNCS).

研究成果: Conference contribution

Electronic document identification systems
Threshold Scheme
Signature Scheme
Threshold Signature
Digital Signature
1993

Attacks on ID-based signature scheme based upon Rabin's public key cryptosystem

Ko, M. Y., Hwang, T-L. & Chang, C. C., 1993 十二月 1, Proc 1993 IEEE Int Carnahan Conf Secur Technol. Sanson, L. D. (編輯). Publ by IEEE, p. 28-31 4 p. (Proc 1993 IEEE Int Carnahan Conf Secur Technol).

研究成果: Conference contribution

Cryptography
1992

Scheme for secure digital mobile communications based on symmetric key cryptography

Hwang, T-L., 1992 一月 1, TENCON 1992 - Technology Enabling Tomorrow: Computers, Communications and Automation towards the 21st Century - 1992 IEEE Region 10 International Conference. Institute of Electrical and Electronics Engineers Inc., p. 423-426 4 p. 271910. (IEEE Region 10 Annual International Conference, Proceedings/TENCON).

研究成果: Conference contribution

Cryptography
Communication
Authentication
Hardware
1991
12 引文 (Scopus)

A branch oriented key management solution to dynamic access control in a hierarchy

Laih, C. S. & Hwang, T-L., 1991 一月 1, Proceedings of the 1991 Symposium on Applied Computing, SOAC 1991. Institute of Electrical and Electronics Engineers Inc., p. 422-429 8 p. 143913. (Proceedings of the 1991 Symposium on Applied Computing, SOAC 1991).

研究成果: Conference contribution

Access control

Algebraic-code cryptosystem using random code chaining

Hwang, T-L. & Chen, Y., 1991, 90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91. Publ by IEEE, p. 194-196 3 p.

研究成果: Conference contribution

Cryptography
Decoding
24 引文 (Scopus)

Cryptosystem for group oriented cryptography

Hwang, T-L., 1991 一月 1, Advances in Cryptology — EUROCRYPT 1990 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Damgard, I. B. (編輯). Springer Verlag, p. 352-360 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 473 LNCS).

研究成果: Conference contribution

Cryptosystem
Cryptography
Discrete Logarithm Problem
Open Problems
Receiver
95 引文 (Scopus)

Non-interactive password authentications without password tables

Hwang, T-L., Chen, Y. & Laih, C. S., 1991 一月 1, 90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91. Publ by IEEE, p. 429-431 3 p. (90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91).

研究成果: Conference contribution

Authentication
1990
21 引文 (Scopus)

Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space

Laih, C. S., Harn, L., Lee, J. Y. & Hwang, T., 1990 一月 1, Advances in Cryptology — CRYPTO 1989, Proceedings. Brassard, G. (編輯). Springer Verlag, p. 286-298 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 435 LNCS).

研究成果: Conference contribution

Threshold Scheme
Cross product
Linear Space
16 引文 (Scopus)

Secret error-correcting codes (SECC)

Hwang, T. & Rao, T. R. N., 1990 一月 1, Advances in Cryptology – CRYPTO 1988 - Proceedings. Goldwasser, S. (編輯). Springer Verlag, p. 540-563 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 403 LNCS).

研究成果: Conference contribution

Error-correcting Codes
Coding errors
Cryptography
Encryption
Coding