The SCEAS System
Navigation Menu

Search the dblp DataBase


Ching-Te Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang
    A group-oriented (t, n) undeniable signature scheme without trusted center. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:266-274 [Conf]
  2. Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
    Using IC Cards to Remotely Login Passwords without Verification Tables. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:321-326 [Conf]
  3. Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
    Signature Schemes Based on Two Hard Problems Simultaneously. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:557-560 [Conf]
  4. Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
    Supervising Secret-Key Agreements in a Level-Based Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:309-314 [Conf]
  5. Ching-Te Wang, Tung-Shou Chen, Chiu-Hsiung Liao, Feng-Yung Chang
    A New Face Recognition Method for Blurred Images Using Multi-Channel Wiener Filter. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:519-524 [Conf]
  6. Ching-Te Wang, Chiu-Hsiung Liao, Tung-Shou Chen
    Audio-Signal Authenticating System Based on Asymmetric Signature Schemes. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:656-661 [Conf]
  7. Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
    Threshold signature schemes with traceable signers in group communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:8, pp:771-776 [Journal]
  8. Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
    A New Micro-Payment System Using General Payword Chain. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2002, v:2, n:1-2, pp:159-168 [Journal]
  9. Ching-Te Wang, Tung-Shou Chen, Shao-Hau He
    Detecting and restoring the tampered images based on iteration-free fractal compression. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:67, n:2, pp:131-140 [Journal]

  10. A Practice of Allied Network Security System. [Citation Graph (, )][DBLP]

  11. High Capacity Image Data Hiding Scheme for Grouping Palette Index. [Citation Graph (, )][DBLP]

  12. A New Detection Method for Tampered Audio Signals Based on Discrete Cosine Transformation. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002