Gwoboa Horng An Efficient and Secure Protocol for Multi-party Key Establishment. [Citation Graph (0, 0)][DBLP] Comput. J., 2001, v:44, n:5, pp:463-470 [Journal]
Gwoboa Horng, C. S. Yang Key authentication scheme for cryptosystems based on discrete logarithms. [Citation Graph (0, 0)][DBLP] Computer Communications, 1996, v:19, n:9-10, pp:848-850 [Journal]
Gwoboa Horng Password Authentication Without Using a Password Table. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1995, v:55, n:5, pp:247-250 [Journal]
Gwoboa Horng An Active Attack on Protocols for Server-Aided RSA Signature Computation. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1998, v:65, n:2, pp:71-73 [Journal]
Gwoboa Horng A Secure Server-Aided RSA Signature Computation Protocol for Smart Cards. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2000, v:16, n:6, pp:847-855 [Journal]
Gwoboa Horng A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2001, v:17, n:6, pp:959-965 [Journal]