The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wen-Guey Tzeng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng
    A Threshold GQ Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:137-150 [Conf]
  2. Hsiao-Ying Lin, Wen-Guey Tzeng
    An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:456-466 [Conf]
  3. Wen-Guey Tzeng, Zhi-Jia Tzeng
    Round-Efficient Conference Key Agreement Protocols with Provable Security. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:614-628 [Conf]
  4. Wen-Guey Tzeng
    A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:223-230 [Conf]
  5. Wen-Guey Tzeng
    The Equivalence and Learning of Probabilistic Automata (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1989, pp:268-273 [Conf]
  6. Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tseng, Wen-Guey Tzeng, Shyan-Ming Yuan
    A Framework of High Confidence E-Healthcare Information System. [Citation Graph (0, 0)][DBLP]
    ICWI, 2003, pp:493-500 [Conf]
  7. Cheng-Kang Chu, Wen-Guey Tzeng
    Distributed Key Generation as a Component of an Integrated Protocol. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:411-421 [Conf]
  8. Wen-Guey Tzeng, Zhi-Jia Tzeng
    Robust Key-Evolving Public Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:61-72 [Conf]
  9. Ker-I Ko, Assaf Marron, Wen-Guey Tzeng
    Learning String Patterns and Tree Patterns from Examples. [Citation Graph (0, 0)][DBLP]
    ML, 1990, pp:384-391 [Conf]
  10. Min-Shiang Hwang, Wen-Guey Tzeng
    A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:757-761 [Conf]
  11. Chi-Ming Hu, Wen-Guey Tzeng
    Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:300-313 [Conf]
  12. Cheng-Kang Chu, Wen-Guey Tzeng
    Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:172-183 [Conf]
  13. Cheng-Kang Chu, Wen-Guey Tzeng
    Conditional Oblivious Cast. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:443-457 [Conf]
  14. Wen-Guey Tzeng
    A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:1-13 [Conf]
  15. Wen-Guey Tzeng
    Efficient 1-Out-n Oblivious Transfer Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:159-171 [Conf]
  16. Wen-Guey Tzeng, Zhi-Jia Tzeng
    A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:207-224 [Conf]
  17. Wen-Guey Tzeng, Zhi-Jia Tzeng
    Robust Forward-Secure Signature Schemes with Proactive Security. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:264-276 [Conf]
  18. Kuen-Feng Chu, Wen-Guey Tzeng, Ping-Jer Yeh, Shyan-Ming Yuan
    An Integrated System for Multilevel Secure Compound Documents. [Citation Graph (0, 0)][DBLP]
    WebNet, 1998, pp:- [Conf]
  19. Ker-I Ko, Wen-Guey Tzeng
    Three Sigma^p_2-Complete Problems in Computational Learning Theory. [Citation Graph (0, 0)][DBLP]
    Computational Complexity, 1991, v:1, n:, pp:269-310 [Journal]
  20. Min-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang
    An access control scheme based on Chinese remainder theorem and time stamp concept. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:1, pp:73-81 [Journal]
  21. Wen-Guey Tzeng, Chi-Ming Hu
    A New Approach for Visual Cryptography. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:27, n:3, pp:207-227 [Journal]
  22. Wen-Guey Tzeng, Zhi-Jia Tzeng
    A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:47-61 [Journal]
  23. Gow-Hsing King, Wen-Guey Tzeng
    On-Line Algorithms for the Dominating Set Problem. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:61, n:1, pp:11-14 [Journal]
  24. Wen-Guey Tzeng
    On Path Equivalence of Nondeterministic Finite Automata. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:58, n:1, pp:43-46 [Journal]
  25. Wen-Guey Tzeng
    Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:3, pp:153-156 [Journal]
  26. Wen-Guey Tzeng, Chi-Ming Hu
    Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:69, n:6, pp:297-302 [Journal]
  27. Wen-Guey Tzeng, Gow-Hsing King
    Three-Quarter Approximation for the Number of Unused Colors in Graph Coloring. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:114, n:1-4, pp:105-126 [Journal]
  28. Cheng-Kang Chu, Wen-Guey Tzeng
    Optimal resilient threshold GQ signatures. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:8, pp:1834-1851 [Journal]
  29. Gow-Hsing King, Wen-Guey Tzeng
    A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:3, pp:337-352 [Journal]
  30. Zhi-Jia Tzeng, Wen-Guey Tzeng
    Practical and Efficient Electronic Voting Schemes. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:865-877 [Journal]
  31. Wen-Guey Tzeng
    Learning Probabilistic Automata and Markov Chains via Queries. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 1992, v:8, n:, pp:151-166 [Journal]
  32. Wen-Guey Tzeng
    A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1992, v:21, n:2, pp:216-227 [Journal]
  33. Wen-Guey Tzeng
    A Secure Fault-Tolerant Conference-Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:4, pp:373-379 [Journal]
  34. Wen-Guey Tzeng
    Corrections to "A Secure Fault-Tolerant Conference-Key Agreement Protocol". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:12, pp:1462- [Journal]
  35. Wen-Guey Tzeng
    Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:2, pp:232-240 [Journal]
  36. Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai, Wen-Guey Tzeng
    Extracting randomness from multiple independent sources. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:6, pp:2224-2227 [Journal]
  37. Shi-Chun Tsai, Wen-Guey Tzeng, Hsin-Lung Wu
    On the Jensen-Shannon Divergence and Variational Distance. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:9, pp:3333-3336 [Journal]
  38. Wen-Guey Tzeng
    A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:1, pp:182-188 [Journal]
  39. Cheng-Kang Chu, Wen-Guey Tzeng
    Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:323-337 [Conf]
  40. Cheng-Kang Chu, Wen-Guey Tzeng
    Identity-Based Proxy Re-encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:189-202 [Conf]
  41. Chi-Ming Hu, Wen-Guey Tzeng
    Cheating Prevention in Visual Cryptography. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2007, v:16, n:1, pp:36-45 [Journal]

  42. A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate. [Citation Graph (, )][DBLP]


  43. Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. [Citation Graph (, )][DBLP]


  44. Efficient Large-Scale Distributed Key Generation against Burst Interruption. [Citation Graph (, )][DBLP]


  45. Permutation Arrays Under the Chebyshev Distance [Citation Graph (, )][DBLP]


Search in 0.035secs, Finished in 0.038secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002