Search the dblp DataBase
Wen-Guey Tzeng :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Li-Shan Liu , Cheng-Kang Chu , Wen-Guey Tzeng A Threshold GQ Signature Scheme. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:137-150 [Conf ] Hsiao-Ying Lin , Wen-Guey Tzeng An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:456-466 [Conf ] Wen-Guey Tzeng , Zhi-Jia Tzeng Round-Efficient Conference Key Agreement Protocols with Provable Security. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:614-628 [Conf ] Wen-Guey Tzeng A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:223-230 [Conf ] Wen-Guey Tzeng The Equivalence and Learning of Probabilistic Automata (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1989, pp:268-273 [Conf ] Shun-Chieh Lin , Wen-Hsiang Tsai , Shian-Shyong Tseng , Wen-Guey Tzeng , Shyan-Ming Yuan A Framework of High Confidence E-Healthcare Information System. [Citation Graph (0, 0)][DBLP ] ICWI, 2003, pp:493-500 [Conf ] Cheng-Kang Chu , Wen-Guey Tzeng Distributed Key Generation as a Component of an Integrated Protocol. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:411-421 [Conf ] Wen-Guey Tzeng , Zhi-Jia Tzeng Robust Key-Evolving Public Key Encryption Schemes. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:61-72 [Conf ] Ker-I Ko , Assaf Marron , Wen-Guey Tzeng Learning String Patterns and Tree Patterns from Examples. [Citation Graph (0, 0)][DBLP ] ML, 1990, pp:384-391 [Conf ] Min-Shiang Hwang , Wen-Guey Tzeng A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:757-761 [Conf ] Chi-Ming Hu , Wen-Guey Tzeng Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:300-313 [Conf ] Cheng-Kang Chu , Wen-Guey Tzeng Efficient k -Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:172-183 [Conf ] Cheng-Kang Chu , Wen-Guey Tzeng Conditional Oblivious Cast. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:443-457 [Conf ] Wen-Guey Tzeng A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:1-13 [Conf ] Wen-Guey Tzeng Efficient 1-Out-n Oblivious Transfer Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:159-171 [Conf ] Wen-Guey Tzeng , Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:207-224 [Conf ] Wen-Guey Tzeng , Zhi-Jia Tzeng Robust Forward-Secure Signature Schemes with Proactive Security. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:264-276 [Conf ] Kuen-Feng Chu , Wen-Guey Tzeng , Ping-Jer Yeh , Shyan-Ming Yuan An Integrated System for Multilevel Secure Compound Documents. [Citation Graph (0, 0)][DBLP ] WebNet, 1998, pp:- [Conf ] Ker-I Ko , Wen-Guey Tzeng Three Sigma^p_2-Complete Problems in Computational Learning Theory. [Citation Graph (0, 0)][DBLP ] Computational Complexity, 1991, v:1, n:, pp:269-310 [Journal ] Min-Shiang Hwang , Wen-Guey Tzeng , Wei-Pang Yang An access control scheme based on Chinese remainder theorem and time stamp concept. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:73-81 [Journal ] Wen-Guey Tzeng , Chi-Ming Hu A New Approach for Visual Cryptography. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2002, v:27, n:3, pp:207-227 [Journal ] Wen-Guey Tzeng , Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2005, v:35, n:1, pp:47-61 [Journal ] Gow-Hsing King , Wen-Guey Tzeng On-Line Algorithms for the Dominating Set Problem. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1997, v:61, n:1, pp:11-14 [Journal ] Wen-Guey Tzeng On Path Equivalence of Nondeterministic Finite Automata. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1996, v:58, n:1, pp:43-46 [Journal ] Wen-Guey Tzeng Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:70, n:3, pp:153-156 [Journal ] Wen-Guey Tzeng , Chi-Ming Hu Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:69, n:6, pp:297-302 [Journal ] Wen-Guey Tzeng , Gow-Hsing King Three-Quarter Approximation for the Number of Unused Colors in Graph Coloring. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1999, v:114, n:1-4, pp:105-126 [Journal ] Cheng-Kang Chu , Wen-Guey Tzeng Optimal resilient threshold GQ signatures. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:8, pp:1834-1851 [Journal ] Gow-Hsing King , Wen-Guey Tzeng A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1999, v:15, n:3, pp:337-352 [Journal ] Zhi-Jia Tzeng , Wen-Guey Tzeng Practical and Efficient Electronic Voting Schemes. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2001, v:17, n:6, pp:865-877 [Journal ] Wen-Guey Tzeng Learning Probabilistic Automata and Markov Chains via Queries. [Citation Graph (0, 0)][DBLP ] Machine Learning, 1992, v:8, n:, pp:151-166 [Journal ] Wen-Guey Tzeng A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1992, v:21, n:2, pp:216-227 [Journal ] Wen-Guey Tzeng A Secure Fault-Tolerant Conference-Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2002, v:51, n:4, pp:373-379 [Journal ] Wen-Guey Tzeng Corrections to "A Secure Fault-Tolerant Conference-Key Agreement Protocol". [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2002, v:51, n:12, pp:1462- [Journal ] Wen-Guey Tzeng Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2004, v:53, n:2, pp:232-240 [Journal ] Chia-Jung Lee , Chi-Jen Lu , Shi-Chun Tsai , Wen-Guey Tzeng Extracting randomness from multiple independent sources. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2005, v:51, n:6, pp:2224-2227 [Journal ] Shi-Chun Tsai , Wen-Guey Tzeng , Hsin-Lung Wu On the Jensen-Shannon Divergence and Variational Distance. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2005, v:51, n:9, pp:3333-3336 [Journal ] Wen-Guey Tzeng A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:1, pp:182-188 [Journal ] Cheng-Kang Chu , Wen-Guey Tzeng Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:323-337 [Conf ] Cheng-Kang Chu , Wen-Guey Tzeng Identity-Based Proxy Re-encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ISC, 2007, pp:189-202 [Conf ] Chi-Ming Hu , Wen-Guey Tzeng Cheating Prevention in Visual Cryptography. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2007, v:16, n:1, pp:36-45 [Journal ] A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate. [Citation Graph (, )][DBLP ] Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. [Citation Graph (, )][DBLP ] Efficient Large-Scale Distributed Key Generation against Burst Interruption. [Citation Graph (, )][DBLP ] Permutation Arrays Under the Chebyshev Distance [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.307secs