|
Search the dblp DataBase
Tzer-Shyong Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. [Citation Graph (0, 0)][DBLP] COMPSAC, 2004, pp:396-397 [Conf]
- Tzer-Shyong Chen, Feipei Lai, Rung-Ji Shang
A Simple Tree Pattern Matching Algorithm for Code Generator. [Citation Graph (0, 0)][DBLP] COMPSAC, 1995, pp:162-169 [Conf]
- Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP] EEE, 2004, pp:106-112 [Conf]
- Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung
Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. [Citation Graph (0, 0)][DBLP] EEE, 2004, pp:569-572 [Conf]
- Jen-Yi Pan, Tzer-Long Chen, Tzer-Shyong Chen
A Novel Key Management and Access Control Scheme for Mobile Agent. [Citation Graph (0, 0)][DBLP] ICIC (2), 2006, pp:334-345 [Conf]
- Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP] JCIS, 2006, pp:- [Conf]
- Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
Unconditionally Secure Cryptosystem Based on Quantum Cryptography. [Citation Graph (0, 0)][DBLP] JCIS, 2006, pp:- [Conf]
- Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu
Hacking Tricks Toward Security on Network Environments. [Citation Graph (0, 0)][DBLP] PDCAT, 2006, pp:442-447 [Conf]
- Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen
Threshold Signature Scheme Resistible for Conspiracy Attack. [Citation Graph (0, 0)][DBLP] PDCAT, 2006, pp:479-483 [Conf]
- Tzer-Shyong Chen
An English auction scheme in the online transaction environment. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:5, pp:389-399 [Journal]
- Tzer-Shyong Chen, Yu-Fang Chung
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:6, pp:565-570 [Journal]
- Tzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang
Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:6, pp:527-534 [Journal]
- Victor R. L. Shen, Tzer-Shyong Chen
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:2, pp:164-171 [Journal]
- Tzer-Shyong Chen, Yu-Fang Chung
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2003, v:18, n:2, pp:210-213 [Journal]
- Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung
Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2004, v:19, n:4, pp:570-0 [Journal]
- Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:502-512 [Conf]
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. [Citation Graph (, )][DBLP]
Hierarchical Time-Bound Key Management for Mobile Agents. [Citation Graph (, )][DBLP]
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce. [Citation Graph (, )][DBLP]
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent. [Citation Graph (, )][DBLP]
A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. [Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.023secs
|