H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 45 Citations 6,480 182 World Ranking 3516 National Ranking 18

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer network
  • Public-key cryptography

His scientific interests lie mostly in Computer security, Computer network, Cryptography, Authentication and Quantum cryptography. His study in Computer security is interdisciplinary in nature, drawing from both The Internet and Protocol. In his work, Shared secret and Optics is strongly intertwined with Qubit, which is a subfield of Computer network.

His Cryptography research incorporates themes from Information security, Communication source, Baby-step giant-step, Hash function and Public-key cryptography. His Authentication study integrates concerns from other disciplines, such as Wireless sensor network and Network security. His Quantum cryptography research integrates issues from Quantum key distribution, Algorithm and Quantum computer, Quantum network.

His most cited work include:

  • BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network (291 citations)
  • Three-party encrypted key exchange: attacks and a solution (176 citations)
  • New quantum private comparison protocol using EPR pairs (154 citations)

What are the main themes of his work throughout his whole career to date?

Tzonelih Hwang mainly investigates Computer security, Computer network, Quantum, Quantum cryptography and Theoretical computer science. Tzonelih Hwang regularly links together related areas like Scheme in his Computer security studies. Many of his research projects under Quantum are closely connected to Protocol with Protocol, tying the diverse disciplines of science together.

Within one scientific family, Tzonelih Hwang focuses on topics pertaining to Topology under Qubit, and may sometimes address concerns connected to Greenberger–Horne–Zeilinger state. His Quantum cryptography research incorporates themes from Quantum key distribution, Quantum channel and Quantum computer, Quantum network. The concepts of his Authentication study are interwoven with issues in Roaming and Network security.

He most often published in these fields:

  • Computer security (32.65%)
  • Computer network (32.31%)
  • Quantum (24.83%)

What were the highlights of his more recent work (between 2017-2021)?

  • Quantum (24.83%)
  • Quantum key distribution (15.65%)
  • Protocol (20.41%)

In recent papers he was focusing on the following fields of study:

Tzonelih Hwang focuses on Quantum, Quantum key distribution, Protocol, Key and Computer network. His Qubit, Bell state and Quantum computer study in the realm of Quantum connects with subjects such as Protocol and Third party. His work on Computer security expands to the thematically related Bell state.

His Key study integrates concerns from other disciplines, such as Theoretical computer science and Communication channel. Tzonelih Hwang combines subjects such as Quantum channel, Quantum register and Trojan horse with his study of Computer network. In his study, Quantum information science is strongly linked to Quantum cryptography, which falls under the umbrella field of Trojan horse.

Between 2017 and 2021, his most popular works were:

  • Mediated Semi-Quantum Key Distribution Without Invoking Quantum Measurement (32 citations)
  • Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol’ (21 citations)
  • Efficient semi-quantum private comparison using single photons (11 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Computer network
  • Programming language

Tzonelih Hwang mainly focuses on Quantum, Qubit, Quantum key distribution, Protocol and Quantum mechanics. The study incorporates disciplines such as Algorithm, Computer network and Photon in addition to Quantum. His studies in Computer network integrate themes in fields like Key and Quantum protocols.

His studies deal with areas such as Dephasing and Quantum decoherence as well as Qubit. He usually deals with Protocol and limits it to topics linked to Quantum computer and Direct communication. In general Quantum mechanics, his work in Quantum measurement, Controlled NOT gate and Quantum teleportation is often linked to Permission linking many areas of study.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network

Prosanta Gope;Tzonelih Hwang.
IEEE Sensors Journal (2016)

479 Citations

Three-party encrypted key exchange: attacks and a solution

Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
Operating Systems Review (2000)

257 Citations

Threshold proxy signatures

H.-M. Sun;N.-Y. Lee;T. Hwang.
IEE Proceedings - Computers and Digital Techniques (1999)

225 Citations

Three-party encrypted key exchange without server public-keys

Chun-Li Lin;Hung-Min Sun;M. Steiner;T. Hwang.
IEEE Communications Letters (2001)

195 Citations

Quantum key agreement protocol based on BB84

Song Kong Chong;Tzone-Lih Hwang.
Optics Communications (2010)

193 Citations

Attacks and Solutions on Strong-Password Authentication

Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
IEICE Transactions on Communications (2001)

187 Citations

Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders

Chuan-Ming Li;Tzonelih Hwang;Narn-Yih Lee.
theory and application of cryptographic techniques (1994)

172 Citations

Chun-Li Lin and Tzonelih Hwang: A password authentication scheme with secure password updating

Chun-Li Lin;Tzonelih Hwang.
Computers & Security (2003)

167 Citations

New quantum private comparison protocol using EPR pairs

Hsin-Yi Tseng;Jason Lin;Tzonelih Hwang.
Quantum Information Processing (2012)

166 Citations

Non-interactive password authentications without password tables

Tzonelih Hwang;Yihwa Chen;Chi Jung Laih.
ieee region 10 conference (1990)

155 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Tzonelih Hwang

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 54

Min-Shiang Hwang

Min-Shiang Hwang

Asia University Taiwan

Publications: 48

Anirban Pathak

Anirban Pathak

Jaypee Institute of Information Technology

Publications: 31

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 30

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 26

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 26

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 25

Qiao-Yan Wen

Qiao-Yan Wen

Beijing University of Posts and Telecommunications

Publications: 25

Nanrun Zhou

Nanrun Zhou

Nanchang University

Publications: 23

Debiao He

Debiao He

Wuhan University

Publications: 21

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 19

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 19

Fei Gao

Fei Gao

Beijing University of Posts and Telecommunications

Publications: 17

Hung-Min Sun

Hung-Min Sun

National Tsing Hua University

Publications: 16

Yixian Yang

Yixian Yang

Beijing University of Posts and Telecommunications

Publications: 16

Something went wrong. Please try again later.