淡江大學 |
2017年12月1日 |
Secure Data Collection Scheme for Wireless Sensor Networks
|
Hwang, Ren-Junn;Huang, Y. Z. |
淡江大學 |
2016-11-20 |
AN EFFICIENT AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON GEOMETRIC APPROACH
|
Hwang, Ren Junn |
淡江大學 |
2015-08-06 |
Secure Data Transmission Scheme for WSNs
|
Hwang, Ren Junn;Huang, Yan Zhi |
淡江大學 |
2015-07-22 |
The Hiding Method of Graph Structure in Cloud
|
Hwang, Ren Junn;Wu, J. S. |
淡江大學 |
2014-10 |
Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks
|
Hwang, Ren-Junn; Hsiao, Yu-Kai |
淡江大學 |
2014-08-05 |
A secure and reliable routing protocol for wireless mesh networks
|
Hwang, Ren Junn;Hsiao, Y. K. |
淡江大學 |
2013-11 |
An Anonymous Distributed Routing Protocol in Mobile Ad-hoc Networks
|
Hwang, Ren-Junn; Hsiao, Yu-Kai |
淡江大學 |
2013 |
A New Two-factor Dynamic ID-based Remote User Authentication Scheme
|
Hwang, Ren-Junn; Su, Feng-Fu; Chen, Yang-Yi |
淡江大學 |
2012-12-28 |
The Optimal Split Method of Large Integer Multiplication for Smart Low-End Devices on P2P Ubiquitous Networks
|
Hwang, Ren-junn; Huang, Loang-shing |
淡江大學 |
2012-11 |
A secure remote user authentication scheme
|
Hwang, Ren-junn |
淡江大學 |
2012-09 |
An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks
|
HWANG, Ren Junn; HSIAO, Yu-Kai |
淡江大學 |
2012-06 |
Two-factor authenticated key exchange protocol in the three-party setting
|
Hwang, Ren-junn; Su, Feng Fu; Huang, Loang Shing |
淡江大學 |
2011 |
Privacy protection on Vehicular Ad hoc NETworks
|
Hwang, Ren-Junn; Hsiao, Yu-Kai; Hwang, Cheng-Yang |
淡江大學 |
2010-10 |
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
|
Hsiao, Yu-Kai; Hwang, Ren-Junn |
淡江大學 |
2008-11 |
An Energy-Efficient En-Route Filtering False Data Scheme in Wireless Sensor Networks
|
Hwang, Ren-Junn; Liu, Yu-Hang; Wang, Chueh |
淡江大學 |
2008-11 |
Analysis and Improvement of Fair Certified E-Mail Delivery Protocol
|
Lai, Chih-Hua; Hwang, Ren-Junn |
淡江大學 |
2008-11 |
Efficient Squaring Algorithm for Embedded RISC Processors
|
Su, Feng-Fu; Hwang, Ren-Junn; Huang, Loang-Shing |
淡江大學 |
2008-09 |
Efficient and Secure Protocol in Fair Certified E-Mail Delivery
|
黃仁俊; Hwang, Ren-junn; Lai, Chih-hua |
淡江大學 |
2008-05 |
A Cell-Based Secure Routing Protocol for Wireless Sensor Networks
|
Hwang, Ren-Junn; Hsiao, Yu-Kai |
淡江大學 |
2006-09 |
Secure Key Management Scheme for Wireless LAN
|
黃仁俊; Hwang, Ren-junn; Lai, Chih-hua; Chen, Yun-ru |
淡江大學 |
2006-07 |
Improved key management scheme for IEEE 802.11
|
黃仁俊; Hwang, Ren-junn |
淡江大學 |
2006-04 |
A Wireless-based Authentication and Anonymous Channels for GSM System
|
黃仁俊; Hwang, Ren-junn; Li, Jing-feng; Hsiao, Yu-kai |
淡江大學 |
2006 |
Key Agreement in Ad Hoc Network
|
黃仁俊; Hwang, Ren-junn; Chang, Rong-chi |
淡江大學 |
2005-12 |
A new efficient authentication protocol for mobile networks
|
黃仁俊; Hwang, Ren-junn; Su, Feng-fu |
淡江大學 |
2005-06-13 |
Password authenticated key agreement protocol for multi-servers architecture
|
Hwang, Ren-junn; Shiau, Sheng-hua |
淡江大學 |
2005-06 |
Information Hiding in Lossy Compression Gray Scale Image
|
Kao, Chuan-ho; 黃仁俊; Hwang, Ren-junn |
淡江大學 |
2005-03 |
An Efficient Decryption Method for RSA Cryptosystem
|
Hwang, Ren-Junn; Su, Feng-Fu; Yeh, Yi-Shiung; Chen, Chia-Yao |
淡江大學 |
2005-03 |
Key Agreement Protocol Based on Weil Pairing
|
Shiau, Sheng-Hua; Hwang, Ren-Junn; Lin, Ming-Fuu |
淡江大學 |
2005 |
Cryptanalysis on stream ciphers for GSM networks
|
黃仁俊; Hwang, Ren-junn; Su, Feng-fu |
淡江大學 |
2005 |
An efficient signcryption scheme with forward secrecy based on elliptic curve
|
黃仁俊; Hwang, Ren-junn; Lai, Chih-hua; Su, Feng-fu |
淡江大學 |
2004-09 |
A new scheme to protect confidential Images
|
Chang, Chin-chen; 黃仁俊; Hwang, Ren-junn |
淡江大學 |
2004-07 |
A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ
|
黃仁俊; Hwang, Ren-junn; 施國琛; Shih, Timothy K.; Kao, Chuan-ho |
淡江大學 |
2004-03-23 |
An agent-based consumer recommendation mechanism
|
Wang, Ying-hong; Hwang, Ren-junn; Wang, Wen-nan |
淡江大學 |
2004-03 |
An agent-based consumer recommendation mechanism
|
Wang, Ying-hong; Hwang, Ren-junn; Wang, Wen-nan |
淡江大學 |
2003-10 |
Implementing the RSA Algorithm on the TI TMS320C55x Family
|
Hwang, Ren-Junn; Su, Feng-Fu; Huang, Loang-Shing; Peng, Jen-Kang |
淡江大學 |
2003-07 |
A method for sending confidential messages to a group without trusted parties
|
黃仁俊; Hwang, Ren-junn |
淡江大學 |
2003-07 |
Key agreement in ad hoc networks
|
黃仁俊; Hwang, Ren-junn |
淡江大學 |
2003-01 |
The improvement of steganography capacity
|
黃仁俊; Hwang, Ren-junn; Kao, Chuan-ho |
淡江大學 |
2002-11 |
Watermark in color image
|
Hwang, Ren-junn; Kao, Chuan-ho; Chang, Rong-chi |
淡江大學 |
2002-03 |
Digital watermarking based on pixels relationships
|
Hwang, Ren-junn; Chang, Rong-chi; Shiau, Sheng-hua; Chang, Tsung-ming |
淡江大學 |
2002 |
Future Multimedia Databases and Research Directions
|
Chang, Chin-chen; Hung, Yi-ping; Hwang, Ren-junn; Shih, Timothy |
淡江大學 |
2001-09 |
Using a mouse as the login device for a visual cryptography oriented password authentication scheme
|
Chang, Chin-chen; 黃仁俊; Hwang, Ren-junn; Chen, Tung-shou |
淡江大學 |
2001-07-01 |
Lossy compression tolerant steganography
|
黃仁俊; Hwang, Ren-junn; 施國琛; Shih, Timothy K.; Kao, Chuan-ho; Chang, Tsung-ming |
淡江大學 |
2001-07 |
Lossy compression tolerant steganography
|
黃仁俊; Hwang, Ren-junn; 施國琛; Shih, Timothy K.; Kao, Chuan-ho; Chang, Tsung-ming |
淡江大學 |
2001-03 |
Hiding a picture in two pictures
|
黃仁俊; Hwang, Ren-junn; Chang, Chin-chen |
淡江大學 |
1999 |
A Concept of Designing Cheater Identification Methods for Secret Sharing
|
Hwang, Ren-junn; 黃仁俊; Lee, W. B.; Chang, C. C. |
淡江大學 |
1999 |
An improved threshold scheme based on modular arithmetic
|
Hwang, Ren-junn; 黃仁俊 |
淡江大學 |
1999 |
A concept of designing cheater identification methods for secret sharing
|
Hwang, Ren-junn; 黃仁俊 |
淡江大學 |
1998-11 |
Sharing secret images using shadow codebooks
|
Chang, Chin-chen; 黃仁俊; Hwang, Ren-junn |
淡江大學 |
1998-09 |
An on-line secret sharing scheme for multi-secrets
|
Hwang, Ren-junn; 黃仁俊; Chang, Chin-chen |