default search action
Jing-Jang Hwang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [c7]Chien-Hsing Wu, Jing-Jang Hwang, Zheng-Yun Zhuang:
A Trusted and Efficient Cloud Computing Service with Personal Health Record. ICISA 2013: 1-5 - 2011
- [c6]Yi-Chang Hsu, Jing-Jang Hwang:
Controlling Decryption of Personal Health Records in the Cloud. ICITCS 2011: 69-79
2000 – 2009
- 2005
- [j16]Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang, Jing-Jang Hwang:
New identity-based society oriented signature schemes from pairings on elliptic curves. Appl. Math. Comput. 160(1): 245-260 (2005) - [j15]Min-Hua Shao, Jing-Jang Hwang, Soushan Wu:
A transactional-cycle approach to evidence management for dispute resolution. Inf. Manag. 42(4): 607-618 (2005) - [j14]Ying-Chieh Chen, Patrick S. Chen, Jing-Jang Hwang, Larry Korba, Ronggong Song, George Yee:
An analysis of online gaming crime characteristics. Internet Res. 15(3): 246-261 (2005) - [c5]Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba:
Online Gaming Cheating and Security Issue. ITCC (1) 2005: 518-523 - 2003
- [j13]Jing-Jang Hwang, Tzu-Chang Yeh, Jung-Bin Li:
Securing on-line credit card payments without disclosing privacy information. Comput. Stand. Interfaces 25(2): 119-129 (2003) - [c4]Jing-Jang Hwang, Min-Hua Shao, Soushan Wu:
Establishing Chain of Evidence as a Base for Non-Repudiation Services. SEC 2003: 49-60 - 2001
- [j12]Wen-Hung Yeh, Jing-Jang Hwang:
Hiding Digital Information Using a Novel System Scheme. Comput. Secur. 20(6): 533-538 (2001) - [j11]Gen-Yih Liao, Jing-Jang Hwang:
A Fair and Privacy-preserved Protocol for Sealed Bid Auctions. Electron. Mark. 11(3): 163-170 (2001) - [j10]Gen-Yih Liao, Jing-Jang Hwang:
A trustworthy Internet auction model with verifiable fairness. Internet Res. 11(2): 159-166 (2001) - [c3]Jing-Jang Hwang, Chih-Wen Cheng:
Rules Markup for Automatic Deployment of Information Security Policies. ISAS-SCI (1) 2001: 44-49 - [c2]Chih-Yin Lin, Tzong-Chen Wu, Jing-Jang Hwang:
ID-Based Structured Mulitsignature Schemes. Network Security 2001: 45-59 - 2000
- [j9]Duen-Ren Liu, Chen-Hsien Lin, Jing-Jang Hwang:
Classifying Video Documents by Hierarchical Structure of Video Contents. Comput. J. 43(5): 396-410 (2000) - [j8]Henry Ker-Chang Chang, Jing-Jang Hwang, Hsing-Hua Liu:
A novel access control method using Morton number and prime factorization. Inf. Sci. 130(1-4): 23-40 (2000)
1990 – 1999
- 1998
- [j7]Jing-Jang Hwang, Sue-Chen Hsueh:
Greater protection for credit card holders: a revised SET protocol. Comput. Stand. Interfaces 19(1): 1-8 (1998) - 1996
- [j6]Jing-Jang Hwang:
A conventional approach to secret balloting in computer networks. Comput. Secur. 15(3): 249-262 (1996) - 1994
- [j5]Bao-Min Shao, Jing-Jang Hwang, PeCheng Wang:
Distributed assignment of cryptographic keys for access control in a hierarchy. Comput. Secur. 13(1): 79-84 (1994) - 1993
- [j4]Yuan-Chung Chin, PeCheng Wang, Jing-Jang Hwang:
Cryptanalysis on Schwartz Graphical Encryption Method. Cryptologia 17(3): 301-304 (1993) - 1992
- [j3]Jing-Jang Hwang, Bao-Min Shao, PeCheng Wang:
A New Access Control Method Using Prime Factorisation. Comput. J. 35(1): 16-20 (1992) - 1990
- [j2]Frank D. Anger, Jing-Jang Hwang, Yuan-Chieh Chow:
Scheduling with Sufficient Loosely Coupled Processors. J. Parallel Distributed Comput. 9(1): 87-92 (1990)
1980 – 1989
- 1989
- [j1]Jing-Jang Hwang, Yuan-Chieh Chow, Frank D. Anger, Chung-Yee Lee:
Scheduling Precedence Graphs in Systems with Interprocessor Communication Times. SIAM J. Comput. 18(2): 244-257 (1989) - 1988
- [c1]Jing-Jang Hwang, Yuan-Chieh Chow, Frank D. Anger:
An Analysis of Multiprocessing Speedup with Emphasis on the Effect of Scheduling Methods. ICDCS 1988: 242-248
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint