Search the dblp DataBase
Chih-Hung Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Narn-Yih Lee , Tzonelih Hwang , Chih-Hung Wang On Zhang's Nonrepudiable Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:415-422 [Conf ] Chih-Hung Wang , Tzonelih Hwang Threshold and Generalized DSS Signatures without a Trusted Party. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:221-226 [Conf ] Chih-Hung Wang Untraceable Fair Network Payment Protocols with Off-Line TTP. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:173-187 [Conf ] Chih-Hung Wang , Tzonelih Hwang , Jiun-Jang Tsai On the Matsumoto and Imai's Human Identification Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:382-392 [Conf ] Tzonelih Hwang , Chih-Hung Wang Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:266-272 [Conf ] Jen-Ho Yang , Chin-Chen Chang , Chih-Hung Wang A Practical Solution to the (t , n ) Threshold Untraceable Signature with (k , l ) Verification Scheme. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:998-1007 [Conf ] Tzonelih Hwang , Narn-Yih Lee , Chih-Hung Wang , Ming-Yung Ko On the security of Wu and Yeh's conference key distribution system. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1995, v:18, n:12, pp:978-981 [Journal ] Jiun-Jang Tsai , Tzonelih Hwang , Chih-Hung Wang New generalized group-oriented cryptosystem based on Diffie-Hellman scheme. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:8, pp:727-729 [Journal ] Chih-Hung Wang , Tzonelih Hwang Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:4, pp:339-344 [Journal ] Chih-Hung Wang , Yen-Cheng Chen Proxy Confirmation Signatures. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2004, v:15, n:3, pp:425-437 [Journal ] Tzonelih Hwang , Chih-Hung Wang Arbetrated Unconditionally Secure Authentication Scheme with Multi-Senders. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:65, n:4, pp:189-193 [Journal ] Narn-Yih Lee , Tzonelih Hwang , Chih-Hung Wang The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:70, n:2, pp:79-81 [Journal ] Chih-Hung Wang , Tzonelih Hwang , Narn-Yih Lee Comments on Two Group Signatures. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:69, n:2, pp:95-97 [Journal ] Chih-Hung Wang , Chih-Yu Liu A new ring signature scheme with signer-admission property. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:3, pp:747-754 [Journal ] Chih-Hung Wang , Yan-Sheng Kuo An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2005, v:39, n:4, pp:66-79 [Journal ] Jen-Ho Yang , Chin-Chen Chang , Chih-Hung Wang An iterative modular multiplication algorithm in RNS. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2005, v:171, n:1, pp:637-645 [Journal ] Pei-Hui Huang , Hsiang-An Wen , Chih-Hung Wang , Tzonelih Hwang On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:55-60 [Journal ] Chih-Hung Wang Practical Constructions to Multiple Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2006, v:22, n:6, pp:1389-1407 [Journal ] Chih-Hung Wang , Chih-Heng Yin , Chieh-His Juan How to protect exchanged secrets in the fair exchange protocol with off-line TTP. [Citation Graph (0, 0)][DBLP ] Computers & Electrical Engineering, 2006, v:32, n:5, pp:364-375 [Journal ] A Secure E-cash Scheme with Optional Traceability. [Citation Graph (, )][DBLP ] A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment. [Citation Graph (, )][DBLP ] A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs