The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chih-Hung Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang
    On Zhang's Nonrepudiable Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:415-422 [Conf]
  2. Chih-Hung Wang, Tzonelih Hwang
    Threshold and Generalized DSS Signatures without a Trusted Party. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:221-226 [Conf]
  3. Chih-Hung Wang
    Untraceable Fair Network Payment Protocols with Off-Line TTP. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:173-187 [Conf]
  4. Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai
    On the Matsumoto and Imai's Human Identification Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:382-392 [Conf]
  5. Tzonelih Hwang, Chih-Hung Wang
    Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:266-272 [Conf]
  6. Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang
    A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:998-1007 [Conf]
  7. Tzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko
    On the security of Wu and Yeh's conference key distribution system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:12, pp:978-981 [Journal]
  8. Jiun-Jang Tsai, Tzonelih Hwang, Chih-Hung Wang
    New generalized group-oriented cryptosystem based on Diffie-Hellman scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:727-729 [Journal]
  9. Chih-Hung Wang, Tzonelih Hwang
    Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:4, pp:339-344 [Journal]
  10. Chih-Hung Wang, Yen-Cheng Chen
    Proxy Confirmation Signatures. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2004, v:15, n:3, pp:425-437 [Journal]
  11. Tzonelih Hwang, Chih-Hung Wang
    Arbetrated Unconditionally Secure Authentication Scheme with Multi-Senders. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:65, n:4, pp:189-193 [Journal]
  12. Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang
    The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:2, pp:79-81 [Journal]
  13. Chih-Hung Wang, Tzonelih Hwang, Narn-Yih Lee
    Comments on Two Group Signatures. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:69, n:2, pp:95-97 [Journal]
  14. Chih-Hung Wang, Chih-Yu Liu
    A new ring signature scheme with signer-admission property. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:3, pp:747-754 [Journal]
  15. Chih-Hung Wang, Yan-Sheng Kuo
    An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:4, pp:66-79 [Journal]
  16. Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang
    An iterative modular multiplication algorithm in RNS. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2005, v:171, n:1, pp:637-645 [Journal]
  17. Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzonelih Hwang
    On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:55-60 [Journal]
  18. Chih-Hung Wang
    Practical Constructions to Multiple Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2006, v:22, n:6, pp:1389-1407 [Journal]
  19. Chih-Hung Wang, Chih-Heng Yin, Chieh-His Juan
    How to protect exchanged secrets in the fair exchange protocol with off-line TTP. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2006, v:32, n:5, pp:364-375 [Journal]

  20. A Secure E-cash Scheme with Optional Traceability. [Citation Graph (, )][DBLP]


  21. A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment. [Citation Graph (, )][DBLP]


  22. A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002