2023 - Research.com Computer Science in Taiwan Leader Award
2022 - Research.com Computer Science in Taiwan Leader Award
Computer security is closely attributed to Authentication (law) in his study. His Mathematical analysis study typically links adjacent topics like Scheme (mathematics). He combines topics linked to Mathematical analysis with his work on Scheme (mathematics). Min-Shiang Hwang connects Artificial intelligence with Theoretical computer science in his study. Min-Shiang Hwang integrates many fields in his works, including Theoretical computer science and Artificial intelligence. In his research, he undertakes multidisciplinary study on Cryptanalysis and Cryptography. Min-Shiang Hwang merges many fields, such as Cryptography and Cryptanalysis, in his writings. He integrates several fields in his works, including Login and Computer security. Min-Shiang Hwang conducts interdisciplinary study in the fields of S/KEY and Password through his works.
His biological study spans a wide range of topics, including Computer security, Key (lock) and Mathematical analysis, Scheme (mathematics). His research on Computer security often connects related areas such as Hash function. As part of his studies on Mathematical analysis, he often connects relevant subjects like Scheme (mathematics). His studies link Image (mathematics) with Artificial intelligence. His research on Image (mathematics) often connects related areas such as Watermark. His Watermark study frequently intersects with other fields, such as Artificial intelligence. His work often combines Theoretical computer science and Cryptography studies. In his research, Min-Shiang Hwang performs multidisciplinary study on Cryptography and Theoretical computer science. Borrowing concepts from Wavelength, Min-Shiang Hwang weaves in ideas under Optics.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A new remote user authentication scheme using smart cards
Min-Shiang Hwang;Li-Hua Li.
IEEE Transactions on Consumer Electronics (2000)
Image steganographic scheme based on pixel-value differencing and LSB replacement methods
H.-C. Wu;N.-I. Wu;C.-S. Tsai;M.-S. Hwang.
IEE Proceedings - Vision, Image, and Signal Processing (2005)
An efficient biometrics-based remote user authentication scheme using smart cards
Chun-Ta Li;Min-Shiang Hwang.
Journal of Network and Computer Applications (2010)
A high quality steganographic method with pixel-value differencing and modulus function
Chung-Ming Wang;Nan-I Wu;Chwei-Shyong Tsai;Min-Shiang Hwang.
Journal of Systems and Software (2008)
A remote password authentication scheme for multiserver architecture using neural networks
Li-Hua Li;Luon-Chang Lin;Min-Shiang Hwang.
IEEE Transactions on Neural Networks (2001)
A modified remote user authentication scheme using smart cards
Jau-Ji Shen;Chih-Wei Lin;Min-Shiang Hwang.
IEEE Transactions on Consumer Electronics (2003)
A (t,n) multi-secret sharing scheme
Chou-Chen Yang;Ting-Yi Chang;Min-Shiang Hwang.
Applied Mathematics and Computation (2004)
A password authentication scheme over insecure networks
I-En Liao;Cheng-Chi Lee;Min-Shiang Hwang.
Journal of Computer and System Sciences (2006)
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments
Cheng-Chi Lee;Min-Shiang Hwang;I-En Liao.
IEEE Transactions on Industrial Electronics (2006)
A new remote user authentication scheme for multi-server architecture
Iuon-Chang Lin;Min-Shiang Hwang;Li-Hua Li.
Future Generation Computer Systems (2003)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: