Jing‐Jang Hwang

1.2k total citations
25 papers, 737 citations indexed

About

Jing‐Jang Hwang is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Jing‐Jang Hwang has authored 25 papers receiving a total of 737 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Computer Networks and Communications, 12 papers in Information Systems and 11 papers in Artificial Intelligence. Recurrent topics in Jing‐Jang Hwang's work include Cryptography and Data Security (11 papers), Advanced Authentication Protocols Security (6 papers) and Chaos-based Image/Signal Encryption (4 papers). Jing‐Jang Hwang is often cited by papers focused on Cryptography and Data Security (11 papers), Advanced Authentication Protocols Security (6 papers) and Chaos-based Image/Signal Encryption (4 papers). Jing‐Jang Hwang collaborates with scholars based in Taiwan, United States and Canada. Jing‐Jang Hwang's co-authors include Yuan-Chieh Chow, Frank D. Anger, Chung‐Yee Lee, Tzu-Chang Yeh, Chien‐Hsing Wu, Ying‐Chieh Chen, Larry Korba, Ronggong Song, George Yee and Gen‐Yih Liao and has published in prestigious journals such as Information Sciences, Information & Management and SIAM Journal on Computing.

In The Last Decade

Jing‐Jang Hwang

25 papers receiving 670 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jing‐Jang Hwang Taiwan 11 567 324 263 144 123 25 737
H. Abdel-Wahab United States 11 470 0.8× 251 0.8× 97 0.4× 28 0.2× 46 0.4× 49 683
Susan V. Vrbsky United States 16 525 0.9× 128 0.4× 276 1.0× 13 0.1× 136 1.1× 73 708
E.W. Felten United States 15 383 0.7× 253 0.8× 148 0.6× 8 0.1× 192 1.6× 30 610
M. Spreitzer United States 12 1.7k 3.0× 164 0.5× 1.0k 3.9× 16 0.1× 236 1.9× 18 1.9k
Rivka Ladin United States 10 710 1.3× 113 0.3× 356 1.4× 13 0.1× 146 1.2× 14 880
Lawrence Stewart Australia 10 496 0.9× 346 1.1× 78 0.3× 7 0.0× 99 0.8× 31 643
A. Dan United States 12 842 1.5× 62 0.2× 295 1.1× 16 0.1× 137 1.1× 33 1.0k
José Carlos Brustoloni United States 13 554 1.0× 214 0.7× 239 0.9× 9 0.1× 240 2.0× 41 747
Donald F. Box United States 5 493 0.9× 72 0.2× 451 1.7× 8 0.1× 245 2.0× 8 743
Nuno Preguiça Portugal 13 694 1.2× 106 0.3× 350 1.3× 7 0.0× 117 1.0× 64 787

Countries citing papers authored by Jing‐Jang Hwang

Since Specialization
Citations

This map shows the geographic impact of Jing‐Jang Hwang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jing‐Jang Hwang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jing‐Jang Hwang more than expected).

Fields of papers citing papers by Jing‐Jang Hwang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jing‐Jang Hwang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jing‐Jang Hwang. The network helps show where Jing‐Jang Hwang may publish in the future.

Co-authorship network of co-authors of Jing‐Jang Hwang

This figure shows the co-authorship network connecting the top 25 collaborators of Jing‐Jang Hwang. A scholar is included among the top collaborators of Jing‐Jang Hwang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jing‐Jang Hwang. Jing‐Jang Hwang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hwang, Jing‐Jang, et al.. (2015). An SMS - Based One - Time - Password Scheme with Client - Side Validation. Journal of Digital Information Management. 14(2). 69. 1 indexed citations
2.
Wu, Chien‐Hsing, Jing‐Jang Hwang, & Zheng-Yun Zhuang. (2013). A Trusted and Efficient Cloud Computing Service with Personal Health Record. 196. 1–5. 5 indexed citations
3.
4.
Chen, Ying‐Chieh, et al.. (2005). An analysis of online gaming crime characteristics. Internet Research. 15(3). 246–261. 42 indexed citations
5.
Wu, Tzong‐Chen, et al.. (2004). New identity-based society oriented signature schemes from pairings on elliptic curves. Applied Mathematics and Computation. 160(1). 245–260. 10 indexed citations
6.
Shao, Minhua, Jing‐Jang Hwang, & Soushan Wu. (2004). A transactional-cycle approach to evidence management for dispute resolution. Information & Management. 42(4). 607–618. 3 indexed citations
7.
Hwang, Jing‐Jang, et al.. (2003). Securing on-line credit card payments without disclosing privacy information. Computer Standards & Interfaces. 25(2). 119–129. 19 indexed citations
8.
Yeh, Tzu-Chang, et al.. (2002). A Secure One-Time Password Authentication Scheme Using Smart Cards(Regular Section). IEICE Transactions on Communications. 85(11). 2515–2518. 3 indexed citations
9.
Hwang, Jing‐Jang & Tzu-Chang Yeh. (2002). Improvement on Peyravian-Zunic's Password Authentication Schemes. IEICE Transactions on Communications. 85(4). 823–825. 41 indexed citations
10.
Yeh, Tzu-Chang, et al.. (2002). A Secure One-Time Password Authentication Scheme Using Smart Cards. IEICE Transactions on Communications. 2515–2518. 36 indexed citations
11.
Liao, Gen‐Yih & Jing‐Jang Hwang. (2001). A Fair and Privacy-preserved Protocol for Sealed-bid Auctions. Electronic Markets. 11(3). 163–170. 1 indexed citations
12.
Hwang, Jing‐Jang, et al.. (2000). Access control with role attribute certificates. Computer Standards & Interfaces. 22(1). 43–53. 7 indexed citations
13.
Hwang, Jing‐Jang & Sue-Chen Hsueh. (1998). Greater protection for credit card holders: a revised SET protocol. Computer Standards & Interfaces. 19(1). 1–8. 4 indexed citations
14.
Hwang, Jing‐Jang. (1996). A conventional approach to secret balloting in computer networks. Computers & Security. 15(3). 249–262. 3 indexed citations
15.
Hwang, Jing‐Jang, et al.. (1994). Distributed assignment of cryptographic keys for access control in a hierarchy. Computers & Security. 13(1). 79–84. 5 indexed citations
16.
Hwang, Jing‐Jang, et al.. (1992). A New Access Control Method Using Prime Factorisation. The Computer Journal. 35(1). 16–20. 11 indexed citations
17.
Anger, Frank D., Jing‐Jang Hwang, & Yuan-Chieh Chow. (1990). Scheduling with sufficient loosely coupled processors. Journal of Parallel and Distributed Computing. 9(1). 87–92. 44 indexed citations
18.
Hwang, Jing‐Jang, Yuan-Chieh Chow, Frank D. Anger, & Chung‐Yee Lee. (1989). Scheduling Precedence Graphs in Systems with Interprocessor Communication Times. SIAM Journal on Computing. 18(2). 244–257. 363 indexed citations
19.
Lee, Chung‐Yee, Jing‐Jang Hwang, Yuan-Chieh Chow, & Frank D. Anger. (1988). Multiprocessor scheduling with interprocessor communication delays. Operations Research Letters. 7(3). 141–147. 73 indexed citations
20.
Hwang, Jing‐Jang & Yuan-Chieh Chow. (1987). Deterministic scheduling in systems with interprocessor communication times. 6 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026