Min-Shiang Hwang focuses on Computer security, Computer network, Cryptography, Password and Authentication. His study in Authentication protocol, Password strength, Challenge–response authentication, Public-key cryptography and Message authentication code is carried out as part of his Computer security studies. His Computer network study incorporates themes from Computer security model and Hierarchy.
His studies in Cryptography integrate themes in fields like Hash function, Key, Digital image and Steganography. His Password study combines topics from a wide range of disciplines, such as Smart card, Replay attack and Login. His studies deal with areas such as Information privacy, Mobile computing and Mobile telephony as well as Authentication.
Min-Shiang Hwang mostly deals with Computer security, Computer network, Cryptography, Authentication and Theoretical computer science. He frequently studies issues relating to Protocol and Computer security. His research in Computer network intersects with topics in Key and Mobile telephony.
The concepts of his Cryptography study are interwoven with issues in Hash function and Access control. In his research, Algorithm and Signature is intimately related to Digital signature, which falls under the overarching field of Theoretical computer science. His Password research includes elements of Replay attack and Challenge–response authentication.
His scientific interests lie mostly in Computer security, Computer network, Password, Smart card and Cryptanalysis. Min-Shiang Hwang focuses mostly in the field of Computer security, narrowing it down to topics relating to Cloud computing and, in certain cases, Distributed computing. In his work, Key-agreement protocol is strongly intertwined with Wireless, which is a subfield of Computer network.
In his study, which falls under the umbrella issue of Password, Authentication scheme is strongly linked to Key. His Smart card research is multidisciplinary, incorporating elements of Forward secrecy and Mutual authentication. His Password authentication protocol research includes themes of Password policy, Server and Cryptography.
His primary areas of investigation include Computer security, Computer network, Cloud storage, Cloud computing and Database. All of his Computer security and Password cracking, Password, Authentication, Password authentication protocol and Hash function investigations are sub-components of the entire Computer security study. One-time password, Password strength and S/KEY are the subjects of his Password studies.
His research in the fields of Authentication protocol overlaps with other disciplines such as Memory bank. His study in Password authentication protocol is interdisciplinary in nature, drawing from both Server and Cryptography. Much of his study explores Computer network relationship to Keyword search.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A new remote user authentication scheme using smart cards
Min-Shiang Hwang;Li-Hua Li.
IEEE Transactions on Consumer Electronics (2000)
Image steganographic scheme based on pixel-value differencing and LSB replacement methods
H.-C. Wu;N.-I. Wu;C.-S. Tsai;M.-S. Hwang.
IEE Proceedings - Vision, Image, and Signal Processing (2005)
An efficient biometrics-based remote user authentication scheme using smart cards
Chun-Ta Li;Min-Shiang Hwang.
Journal of Network and Computer Applications (2010)
A high quality steganographic method with pixel-value differencing and modulus function
Chung-Ming Wang;Nan-I Wu;Chwei-Shyong Tsai;Min-Shiang Hwang.
Journal of Systems and Software (2008)
A modified remote user authentication scheme using smart cards
Jau-Ji Shen;Chih-Wei Lin;Min-Shiang Hwang.
IEEE Transactions on Consumer Electronics (2003)
A remote password authentication scheme for multiserver architecture using neural networks
Li-Hua Li;Luon-Chang Lin;Min-Shiang Hwang.
IEEE Transactions on Neural Networks (2001)
A (t,n) multi-secret sharing scheme
Chou-Chen Yang;Ting-Yi Chang;Min-Shiang Hwang.
Applied Mathematics and Computation (2004)
A password authentication scheme over insecure networks
I-En Liao;Cheng-Chi Lee;Min-Shiang Hwang.
Journal of Computer and System Sciences (2006)
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments
Cheng-Chi Lee;Min-Shiang Hwang;I-En Liao.
IEEE Transactions on Industrial Electronics (2006)
A new remote user authentication scheme for multi-server architecture
Iuon-Chang Lin;Min-Shiang Hwang;Li-Hua Li.
Future Generation Computer Systems (2003)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: