The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gwoboa Horng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gwoboa Horng, Ming-Deh A. Huang
    Simplifying Nested Radicals and Solving Polynomials by Radicals in Minimum Depth [Citation Graph (0, 0)][DBLP]
    FOCS, 1990, pp:847-856 [Conf]
  2. Chien-Lung Wang, Gwoboa Horng, Yu-Sheng Chen, Tzung-Pei Hong
    An Efficient Key-Update Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2006, pp:1026-1029 [Conf]
  3. Chien-Lung Wang, Tzung-Pei Hong, Gwoboa Horng, Wen-Hung Wang
    A Key Renewal Scheme under the Power Consumption for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  4. Chun-Hua Chen, Gwoboa Horng
    More Robust Private Information. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:297-302 [Conf]
  5. Chun-Hua Chen, Chi-Min Lan, Gwoboa Horng
    Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:580-583 [Conf]
  6. Gwoboa Horng
    An Efficient and Secure Protocol for Multi-party Key Establishment. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2001, v:44, n:5, pp:463-470 [Journal]
  7. Gwoboa Horng, C. S. Yang
    Key authentication scheme for cryptosystems based on discrete logarithms. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:848-850 [Journal]
  8. Gwoboa Horng, Tzungher Chen, Du-shiau Tsai
    Cheating in Visual Cryptography. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:2, pp:219-236 [Journal]
  9. Gwoboa Horng
    Password Authentication Without Using a Password Table. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:55, n:5, pp:247-250 [Journal]
  10. Gwoboa Horng
    An Active Attack on Protocols for Server-Aided RSA Signature Computation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:65, n:2, pp:71-73 [Journal]
  11. Gwoboa Horng
    A Secure Server-Aided RSA Signature Computation Protocol for Smart Cards. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2000, v:16, n:6, pp:847-855 [Journal]
  12. Gwoboa Horng
    A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:959-965 [Journal]
  13. Gwoboa Horng, Ming-Deh A. Huang
    Solving polynomials by radicals with roots of unity in minimum depth. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 1999, v:68, n:226, pp:881-885 [Journal]
  14. Yu-Sheng Chen, Gwoboa Horng, Chao-Liang Liu
    Performance improvement for the GGM-construction of pseudorandom functions. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:183, n:1, pp:486-490 [Journal]
  15. Eric Jui-Lin Lu, Gwoboa Horng, Chia-Ssu Yu, Ling-ying Chou
    A Web-Based Authoring System Supporting Metadata. [Citation Graph (0, 0)][DBLP]
    CBMS, 2007, pp:645-650 [Conf]
  16. Chin-Ling Chen, Chih-Cheng Chen, Ling-Chun Liu, Gwoboa Horng
    A server-aided signature scheme for mobile commerce. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:565-570 [Conf]
  17. Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
    A Secure YS-Like User Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:27-36 [Journal]
  18. Du-shiau Tsai, Tzungher Chen, Gwoboa Horng
    A cheating prevention scheme for binary visual cryptography with homogeneous secret images. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2007, v:40, n:8, pp:2356-2366 [Journal]

  19. A practical voting system for small-scale election. [Citation Graph (, )][DBLP]


  20. Privacy Protection in On-line Shopping for Electronic Documents. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.021secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002