Zobrazeno 1 - 10
of 61
pro vyhledávání: '"Ren-Junn Hwang"'
Autor:
Ren-Junn Hwang, Chih-Hua Lai
Publikováno v:
Symmetry, Vol 7, Iss 2, Pp 464-487 (2015)
Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange doc
Externí odkaz:
https://doaj.org/article/0a0433a9878e44148b98e2e087b78b45
Autor:
Ren Junn Hwang, Yan Zhi Huang
Publikováno v:
AINA Workshops
Wireless sensor networks (WSNs) are extensively used in various industries and environments to monitor an environment and manage risks in situations such as real-time traffic monitoring and health care. The Internet of Thing (IOT) is a wireless senso
Autor:
Ren-Junn Hwang, Yu-Kai Hsiao
Publikováno v:
Journal of Shanghai Jiaotong University (Science). 19:466-475
This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks (WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices (or nodes). I
Autor:
Ren-Junn Hwang, Yu-Kai Hsiao
Publikováno v:
The Computer Journal. 57:1557-1569
Autor:
Ren-Junn Hwang, Yu-Kai Hsiao
Publikováno v:
The Journal of Supercomputing. 66:888-906
This paper proposes an efficient anonymous routing protocol for mobile ad hoc networks (MANETs). This protocol considers symmetric and asymmetric links during the wireless communication of MANETs. A MANET is one type of self-organized wireless networ
Publikováno v:
Journal of Convergence Information Technology. 8:837-844
Autor:
Loang-Shing Huang, Ren-Junn Hwang
Publikováno v:
Peer-to-Peer Networking and Applications. 7:655-664
This paper proposes an optimal method for large integer multiplication when implementing modern cryptographic applications on Peer-to-Peer ubiquitous networks. P2P ubiquitous networks are usually composed of smart low-end devices, which operate on th
Publikováno v:
Applied Mechanics and Materials. :2075-2079
This paper proposes a three-party authenticated key exchange protocol using two-factor including a password and a token. The proposed protocol allows two users to establish a session key through a trusted server with whom they both share a human-memo
Autor:
Ren Junn Hwang, Yu-Kai Hsiao
Publikováno v:
IEICE Transactions on Communications. :2718-2727
Autor:
Ren-Junn Hwang, Sheng-Hua Shiau
Publikováno v:
The Computer Journal. 50:602-615
An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two