His scientific interests lie mostly in Computer security, Computer network, Cryptography, Authentication and Quantum cryptography. His study in Computer security is interdisciplinary in nature, drawing from both The Internet and Protocol. In his work, Shared secret and Optics is strongly intertwined with Qubit, which is a subfield of Computer network.
His Cryptography research incorporates themes from Information security, Communication source, Baby-step giant-step, Hash function and Public-key cryptography. His Authentication study integrates concerns from other disciplines, such as Wireless sensor network and Network security. His Quantum cryptography research integrates issues from Quantum key distribution, Algorithm and Quantum computer, Quantum network.
Tzonelih Hwang mainly investigates Computer security, Computer network, Quantum, Quantum cryptography and Theoretical computer science. Tzonelih Hwang regularly links together related areas like Scheme in his Computer security studies. Many of his research projects under Quantum are closely connected to Protocol with Protocol, tying the diverse disciplines of science together.
Within one scientific family, Tzonelih Hwang focuses on topics pertaining to Topology under Qubit, and may sometimes address concerns connected to Greenberger–Horne–Zeilinger state. His Quantum cryptography research incorporates themes from Quantum key distribution, Quantum channel and Quantum computer, Quantum network. The concepts of his Authentication study are interwoven with issues in Roaming and Network security.
Tzonelih Hwang focuses on Quantum, Quantum key distribution, Protocol, Key and Computer network. His Qubit, Bell state and Quantum computer study in the realm of Quantum connects with subjects such as Protocol and Third party. His work on Computer security expands to the thematically related Bell state.
His Key study integrates concerns from other disciplines, such as Theoretical computer science and Communication channel. Tzonelih Hwang combines subjects such as Quantum channel, Quantum register and Trojan horse with his study of Computer network. In his study, Quantum information science is strongly linked to Quantum cryptography, which falls under the umbrella field of Trojan horse.
Tzonelih Hwang mainly focuses on Quantum, Qubit, Quantum key distribution, Protocol and Quantum mechanics. The study incorporates disciplines such as Algorithm, Computer network and Photon in addition to Quantum. His studies in Computer network integrate themes in fields like Key and Quantum protocols.
His studies deal with areas such as Dephasing and Quantum decoherence as well as Qubit. He usually deals with Protocol and limits it to topics linked to Quantum computer and Direct communication. In general Quantum mechanics, his work in Quantum measurement, Controlled NOT gate and Quantum teleportation is often linked to Permission linking many areas of study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network
Prosanta Gope;Tzonelih Hwang.
IEEE Sensors Journal (2016)
Three-party encrypted key exchange: attacks and a solution
Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
Operating Systems Review (2000)
Threshold proxy signatures
H.-M. Sun;N.-Y. Lee;T. Hwang.
IEE Proceedings - Computers and Digital Techniques (1999)
Quantum key agreement protocol based on BB84
Song Kong Chong;Tzone-Lih Hwang.
Optics Communications (2010)
Three-party encrypted key exchange without server public-keys
Chun-Li Lin;Hung-Min Sun;Hung-Min Sun;M. Steiner;M. Steiner;T. Hwang.
IEEE Communications Letters (2001)
Attacks and Solutions on Strong-Password Authentication
Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
IEICE Transactions on Communications (2001)
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope;Tzonelih Hwang.
IEEE Transactions on Industrial Electronics (2016)
Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders
Chuan-Ming Li;Tzonelih Hwang;Narn-Yih Lee.
theory and application of cryptographic techniques (1994)
Chun-Li Lin and Tzonelih Hwang: A password authentication scheme with secure password updating
Chun-Li Lin;Tzonelih Hwang.
Computers & Security (2003)
New quantum private comparison protocol using EPR pairs
Hsin-Yi Tseng;Jason Lin;Tzonelih Hwang.
Quantum Information Processing (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
National Tsing Hua University
Feng Chia University
Zama
Intel (United States)
University of Missouri–Kansas City
University of Arizona
Indian Institute of Technology Kharagpur
IBM (United States)
Ludwig-Maximilians-Universität München
University of Tehran
Southern University of Science and Technology
University of Pennsylvania
US Forest Service
University of Natural Resources and Life Sciences
Institut Gustave Roussy
Osnabrück University
University of Maryland, College Park
National Autonomous University of Mexico
Université de Sherbrooke
University of Bristol
University of British Columbia