The SCEAS System
Navigation Menu

Search the dblp DataBase


Tzong-Chen Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chin-Chen Chang, Tzong-Chen Wu
    Retrieving the Most Similar Symbolic Pictures from Pictorial Databases. [Citation Graph (1, 0)][DBLP]
    Inf. Process. Manage., 1992, v:28, n:5, pp:581-588 [Journal]
  2. Chih-Yin Lin, Tzong-Chen Wu
    An Identity-based Ring Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:182-186 [Conf]
  3. Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen
    The Design of a Conference Key Distribution System. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:459-466 [Conf]
  4. Wei-Hua He, Chih-Wen Wang, Tzong-Chen Wu
    Joint Window Nonadjacent Form. [Citation Graph (0, 0)][DBLP]
    FCS, 2005, pp:154-160 [Conf]
  5. Chih-Yin Lin, Tzong-Chen Wu, Jing-Jang Hwang
    ID-Based Structured Mulitsignature Schemes. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:45-60 [Conf]
  6. C. Abe, I. L. Lin, T. H. Lan, Tzong-Chen Wu
    Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:56-68 [Conf]
  7. Chin-Chen Chang, Huey-Cheue Kowng, Tzong-Chen Wu
    A Refinement of a Compression-Oriented Addressing Scheme. [Citation Graph (0, 0)][DBLP]
    BIT, 1993, v:33, n:4, pp:530-535 [Journal]
  8. Yuh-Shihng Chang, Tzong-Chen Wu
    Group-oriented authentication mechanism with key exchange. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:5, pp:485-497 [Journal]
  9. Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih
    Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:1, pp:45-47 [Journal]
  10. Wei-Hua He, Tzong-Chen Wu
    Cryptanalysis of Lee and Chang's ID-based information security functions. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:723-726 [Journal]
  11. Tzong-Chen Wu
    Remote login authentication scheme based on a geometric approach. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:12, pp:959-963 [Journal]
  12. Tzong-Chen Wu, Shu-Lin Chou, Tzong-Sun Wu
    Two ID-based multisignature protocols for sequential and broadcasting architectures. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:851-856 [Journal]
  13. Tzong-Chen Wu, Ru-Lan Su
    ID-based group-oriented cryptosystem and its digital signature scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:11, pp:1019-1026 [Journal]
  14. Tzong-Chen Wu, Tzong-Sun Wu
    Group commitment protocol based on zero knowledge proofs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:9, pp:654-656 [Journal]
  15. Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu
    Access control with binary keys. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:8, pp:681-686 [Journal]
  16. Tzong-Chen Wu, Wei-Hua He
    A geometric approach for sharing secrets. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:2, pp:135-145 [Journal]
  17. Tzong-Chen Wu, Hung-Sung Sung
    Authenticating passwords over an insecure channel. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:5, pp:431-439 [Journal]
  18. Tzong-Chen Wu
    Digital signature/multisignature schemes giving public key verification and message recovery simultaneously. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2001, v:16, n:6, pp:329-337 [Journal]
  19. Tzong-Chen Wu, Chin-Chen Chang
    Cryptographic key assignment scheme for hierarchical access control. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2001, v:16, n:1, pp:25-28 [Journal]
  20. Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu
    Group-oriented signature scheme with distinguished signing authoritie. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:5, pp:865-873 [Journal]
  21. Hung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng
    Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:80, n:2, pp:113-117 [Journal]
  22. Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu
    Improvements of generalization of threshold signature and authenticated encryption for group communications. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:81, n:1, pp:41-45 [Journal]
  23. Chin-Chen Chang, Tzong-Chen Wu
    Controlling the Access Requests in an Information Protection System. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 1993, v:29, n:1, pp:61-68 [Journal]
  24. Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu
    Crypographic key assignment scheme for access control in a hierarchy. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1992, v:17, n:3, pp:243-247 [Journal]
  25. Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee
    Password authentication using Newton's interpolating polynomials. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1991, v:16, n:1, pp:97-102 [Journal]
  26. Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang
    Algebraic operations on encryped relational databases. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1993, v:18, n:1, pp:55-62 [Journal]
  27. Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu
    A Binary Access Control Method Using Prime Factorization. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1997, v:96, n:1&2, pp:15-26 [Journal]
  28. Tzong-Chen Wu, Chin-Chen Chang
    Controlling Access in Tree Hierarchies. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1994, v:78, n:1-2, pp:69-76 [Journal]
  29. Wei-Hua He, Tzong-Chen Wu, Chih-Yin Lin
    Remarks on Using RSA With Low Exponent in a Public Network. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:2, pp:341-344 [Journal]
  30. Tzong-Chen Wu, Yuh-Shihng Chang
    Authorization-based Group-oriented Secure Broadcasting System. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:5, pp:653-667 [Journal]
  31. Tzong-Chen Wu, Hung-Sung Sung
    An Improved One-Time Digital Signature Scheme Based on One-Way Function. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1996, v:12, n:3, pp:387-395 [Journal]
  32. Yuh-Shihng Chang, Tzong-Chen Wu, Shih-Chan Huang
    ElGamal-like digital signature and multisignature schemes using self-certified public keys. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2000, v:50, n:2, pp:99-105 [Journal]
  33. Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu
    New nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:58, n:2, pp:119-124 [Journal]
  34. Tzong-Chen Wu, Chih-Chan Huang, D.-J. Guan
    Delegated multisignature scheme with document decomposition. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:55, n:3, pp:321-328 [Journal]
  35. Chin-Chen Chang, Tzong-Chen Wu
    A hashing-oriented nearest neighbor searching scheme. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1993, v:14, n:8, pp:625-630 [Journal]
  36. Chin-Chen Chang, Tzong-Chen Wu
    An exact match retrieval scheme based upon principal component analysis. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1995, v:16, n:5, pp:465-470 [Journal]
  37. Tzong-Chen Wu, Chin-Chen Chang
    Application of geometric hashing to iconic database retrieval. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1994, v:15, n:9, pp:871-876 [Journal]
  38. Tzong-Chen Wu, Jason Cheng
    Retrieving similar pictures from iconic databases using G-tree. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1997, v:18, n:6, pp:595-603 [Journal]
  39. Chin-Chen Chang, Tzong-Chen Wu
    A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1991, v:21, n:1, pp:35-49 [Journal]
  40. Yu-Kumg Chen, Shuo-Yan Chou, Tzong-Chen Wu
    An Efficient Method for Computing the Feasible Region with Translational Containment between Two Convex Polygons. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2001, pp:390-395 [Conf]

  41. Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. [Citation Graph (, )][DBLP]

  42. GAnGS: gather, authenticate 'n group securely. [Citation Graph (, )][DBLP]

  43. Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics. [Citation Graph (, )][DBLP]

  44. Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks. [Citation Graph (, )][DBLP]

  45. Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps. [Citation Graph (, )][DBLP]

Search in 0.039secs, Finished in 0.042secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002