| 淡江大學 |
2005-06 |
Information Hiding in Lossy Compression Gray Scale Image
|
Kao, Chuan-ho; 黃仁俊; Hwang, Ren-junn |
| 淡江大學 |
2005-03 |
An Efficient Decryption Method for RSA Cryptosystem
|
Hwang, Ren-Junn; Su, Feng-Fu; Yeh, Yi-Shiung; Chen, Chia-Yao |
| 淡江大學 |
2005-03 |
Key Agreement Protocol Based on Weil Pairing
|
Shiau, Sheng-Hua; Hwang, Ren-Junn; Lin, Ming-Fuu |
| 淡江大學 |
2005 |
Cryptanalysis on stream ciphers for GSM networks
|
黃仁俊; Hwang, Ren-junn; Su, Feng-fu |
| 淡江大學 |
2005 |
An efficient signcryption scheme with forward secrecy based on elliptic curve
|
黃仁俊; Hwang, Ren-junn; Lai, Chih-hua; Su, Feng-fu |
| 淡江大學 |
2004-09 |
A new scheme to protect confidential Images
|
Chang, Chin-chen; 黃仁俊; Hwang, Ren-junn |
| 淡江大學 |
2004-07 |
A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ
|
黃仁俊; Hwang, Ren-junn; 施國琛; Shih, Timothy K.; Kao, Chuan-ho |
| 淡江大學 |
2004-03-23 |
An agent-based consumer recommendation mechanism
|
Wang, Ying-hong; Hwang, Ren-junn; Wang, Wen-nan |
| 淡江大學 |
2004-03 |
An agent-based consumer recommendation mechanism
|
Wang, Ying-hong; Hwang, Ren-junn; Wang, Wen-nan |
| 淡江大學 |
2003-10 |
Implementing the RSA Algorithm on the TI TMS320C55x Family
|
Hwang, Ren-Junn; Su, Feng-Fu; Huang, Loang-Shing; Peng, Jen-Kang |
| 淡江大學 |
2003-07 |
A method for sending confidential messages to a group without trusted parties
|
黃仁俊; Hwang, Ren-junn |
| 淡江大學 |
2003-07 |
Key agreement in ad hoc networks
|
黃仁俊; Hwang, Ren-junn |
| 淡江大學 |
2003-01 |
The improvement of steganography capacity
|
黃仁俊; Hwang, Ren-junn; Kao, Chuan-ho |
| 淡江大學 |
2002-11 |
Watermark in color image
|
Hwang, Ren-junn; Kao, Chuan-ho; Chang, Rong-chi |
| 淡江大學 |
2002-03 |
Digital watermarking based on pixels relationships
|
Hwang, Ren-junn; Chang, Rong-chi; Shiau, Sheng-hua; Chang, Tsung-ming |
| 淡江大學 |
2002 |
Future Multimedia Databases and Research Directions
|
Chang, Chin-chen; Hung, Yi-ping; Hwang, Ren-junn; Shih, Timothy |
| 淡江大學 |
2001-09 |
Using a mouse as the login device for a visual cryptography oriented password authentication scheme
|
Chang, Chin-chen; 黃仁俊; Hwang, Ren-junn; Chen, Tung-shou |
| 淡江大學 |
2001-07-01 |
Lossy compression tolerant steganography
|
黃仁俊; Hwang, Ren-junn; 施國琛; Shih, Timothy K.; Kao, Chuan-ho; Chang, Tsung-ming |
| 淡江大學 |
2001-07 |
Lossy compression tolerant steganography
|
黃仁俊; Hwang, Ren-junn; 施國琛; Shih, Timothy K.; Kao, Chuan-ho; Chang, Tsung-ming |
| 淡江大學 |
2001-03 |
Hiding a picture in two pictures
|
黃仁俊; Hwang, Ren-junn; Chang, Chin-chen |
| 淡江大學 |
1999 |
A Concept of Designing Cheater Identification Methods for Secret Sharing
|
Hwang, Ren-junn; 黃仁俊; Lee, W. B.; Chang, C. C. |
| 淡江大學 |
1999 |
An improved threshold scheme based on modular arithmetic
|
Hwang, Ren-junn; 黃仁俊 |
| 淡江大學 |
1999 |
A concept of designing cheater identification methods for secret sharing
|
Hwang, Ren-junn; 黃仁俊 |
| 淡江大學 |
1998-11 |
Sharing secret images using shadow codebooks
|
Chang, Chin-chen; 黃仁俊; Hwang, Ren-junn |
| 淡江大學 |
1998-09 |
An on-line secret sharing scheme for multi-secrets
|
Hwang, Ren-junn; 黃仁俊; Chang, Chin-chen |