Ren-Junn Hwang

693 total citations
35 papers, 461 citations indexed

About

Ren-Junn Hwang is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Ren-Junn Hwang has authored 35 papers receiving a total of 461 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Artificial Intelligence, 18 papers in Computer Networks and Communications and 15 papers in Information Systems. Recurrent topics in Ren-Junn Hwang's work include Cryptography and Data Security (16 papers), Chaos-based Image/Signal Encryption (12 papers) and Advanced Authentication Protocols Security (10 papers). Ren-Junn Hwang is often cited by papers focused on Cryptography and Data Security (16 papers), Chaos-based Image/Signal Encryption (12 papers) and Advanced Authentication Protocols Security (10 papers). Ren-Junn Hwang collaborates with scholars based in Taiwan. Ren-Junn Hwang's co-authors include Chin‐Chen Chang, Tzong‐Chen Wu, Chia‐Chen Chang, Rong‐Chi Chang, Wei‐Bin Lee, Jing‐Feng Li, Yinghong Wang and Jain-Shing Wu and has published in prestigious journals such as Information Sciences, Applied Mathematics and Computation and Journal of Systems and Software.

In The Last Decade

Ren-Junn Hwang

31 papers receiving 397 citations

Peers

Ren-Junn Hwang
Brian LaMacchia United States
Prasang Upadhyaya United States
Sotirios Terzis United Kingdom
Pradheep Elango United States
Jan Newmarch Australia
Vacha Dave United States
Brian LaMacchia United States
Ren-Junn Hwang
Citations per year, relative to Ren-Junn Hwang Ren-Junn Hwang (= 1×) peers Brian LaMacchia

Countries citing papers authored by Ren-Junn Hwang

Since Specialization
Citations

This map shows the geographic impact of Ren-Junn Hwang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ren-Junn Hwang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ren-Junn Hwang more than expected).

Fields of papers citing papers by Ren-Junn Hwang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ren-Junn Hwang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ren-Junn Hwang. The network helps show where Ren-Junn Hwang may publish in the future.

Co-authorship network of co-authors of Ren-Junn Hwang

This figure shows the co-authorship network connecting the top 25 collaborators of Ren-Junn Hwang. A scholar is included among the top collaborators of Ren-Junn Hwang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ren-Junn Hwang. Ren-Junn Hwang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hwang, Ren-Junn, et al.. (2014). A secure and reliable routing protocol for wireless mesh networks. Journal of Shanghai Jiaotong University (Science). 19(4). 466–475. 2 indexed citations
2.
Hwang, Ren-Junn, et al.. (2013). A New Two-factor Dynamic ID-based Remote User Authentication Scheme. Journal of Convergence Information Technology. 8(3). 837–844. 1 indexed citations
3.
Hwang, Ren-Junn, et al.. (2013). An anonymous distributed routing protocol in mobile ad-hoc networks. The Journal of Supercomputing. 66(2). 888–906. 2 indexed citations
4.
Hwang, Ren-Junn, et al.. (2008). Efficient and secure protocol in fair certified E-mail delivery. WSEAS Transactions on Information Science and Applications archive. 5(9). 6. 4 indexed citations
5.
Hwang, Ren-Junn, et al.. (2006). A Wireless-based Authentication and Anonymous Channels for GSM System. 17(1). 31–36. 2 indexed citations
6.
Hwang, Ren-Junn, et al.. (2005). Information Hiding in Lossy Compression Gray Scale Image. Journal of Applied Science and Engineering. 8(2). 99–108. 3 indexed citations
7.
Hwang, Ren-Junn, et al.. (2005). An Efficient Decryption Method for RSA Cryptosystem. 1. 585–590. 25 indexed citations
8.
Chang, Chin‐Chen & Ren-Junn Hwang. (2004). A NEW SCHEME TO PROTECT CONFIDENTIAL IMAGES. Journal of Interconnection Networks. 5(3). 221–232. 1 indexed citations
9.
Hwang, Ren-Junn & Chin‐Chen Chang. (2004). Enhancing the efficiency of (v, r, n)-fairness secret sharing scheme. 1. 208–211. 5 indexed citations
10.
Wang, Yinghong, et al.. (2004). An agent-based consumer recommendation mechanism. 228–233. 1 indexed citations
11.
Hwang, Ren-Junn & Rong‐Chi Chang. (2003). Key agreement in ad hoc networks. 382–390. 2 indexed citations
12.
Hwang, Ren-Junn, et al.. (2003). Enhanced Authentication Key Agreement Protocol.. Applied Informatics. 1003–1006. 1 indexed citations
13.
Hwang, Ren-Junn, et al.. (2003). An enhanced authentication key exchange protocol. 37. 202–205. 10 indexed citations
14.
15.
Hwang, Ren-Junn. (2000). A Digital Image Copyright Protection Scheme Based on Visual Cryptography. Journal of Applied Science and Engineering. 3(2). 97–106. 50 indexed citations
16.
Hwang, Ren-Junn & Chin‐Chen Chang. (1999). An Improved Threshold Scheme Based on Modular ARithmetic.. Journal of information science and engineering. 15(2). 691–699. 3 indexed citations
17.
Hwang, Ren-Junn, Wei‐Bin Lee, & Chin‐Chen Chang. (1999). A concept of designing cheater identification methods for secret sharing. Journal of Systems and Software. 46(1). 7–11. 7 indexed citations
18.
Hwang, Ren-Junn & Chin‐Chen Chang. (1998). An on-line secret sharing scheme for multi-secrets. Computer Communications. 21(13). 1170–1176. 40 indexed citations
19.
Chang, Chin‐Chen & Ren-Junn Hwang. (1998). Sharing secret images using shadow codebooks. Information Sciences. 111(1-4). 335–345. 37 indexed citations
20.
Chang, Chia‐Chen & Ren-Junn Hwang. (1997). Efficient cheater identification method for threshold schemes. IEE Proceedings - Computers and Digital Techniques. 144(1). 23–23. 21 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026