The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tzer-Shyong Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian
    A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:396-397 [Conf]
  2. Tzer-Shyong Chen, Feipei Lai, Rung-Ji Shang
    A Simple Tree Pattern Matching Algorithm for Code Generator. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1995, pp:162-169 [Conf]
  3. Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung
    A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:106-112 [Conf]
  4. Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung
    Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:569-572 [Conf]
  5. Jen-Yi Pan, Tzer-Long Chen, Tzer-Shyong Chen
    A Novel Key Management and Access Control Scheme for Mobile Agent. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2006, pp:334-345 [Conf]
  6. Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
    Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  7. Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
    Unconditionally Secure Cryptosystem Based on Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  8. Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu
    Hacking Tricks Toward Security on Network Environments. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:442-447 [Conf]
  9. Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen
    Threshold Signature Scheme Resistible for Conspiracy Attack. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:479-483 [Conf]
  10. Tzer-Shyong Chen
    An English auction scheme in the online transaction environment. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:5, pp:389-399 [Journal]
  11. Tzer-Shyong Chen, Yu-Fang Chung
    Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:6, pp:565-570 [Journal]
  12. Tzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang
    Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:527-534 [Journal]
  13. Victor R. L. Shen, Tzer-Shyong Chen
    A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:164-171 [Journal]
  14. Tzer-Shyong Chen, Yu-Fang Chung
    An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:2, pp:210-213 [Journal]
  15. Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung
    Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:4, pp:570-0 [Journal]
  16. Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
    A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:502-512 [Conf]

  17. Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. [Citation Graph (, )][DBLP]


  18. Hierarchical Time-Bound Key Management for Mobile Agents. [Citation Graph (, )][DBLP]


  19. An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce. [Citation Graph (, )][DBLP]


  20. Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent. [Citation Graph (, )][DBLP]


  21. A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. [Citation Graph (, )][DBLP]


Search in 0.169secs, Finished in 0.170secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002