|
Search the dblp DataBase
Tzong-Chen Wu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chin-Chen Chang, Tzong-Chen Wu
Retrieving the Most Similar Symbolic Pictures from Pictorial Databases. [Citation Graph (1, 0)][DBLP] Inf. Process. Manage., 1992, v:28, n:5, pp:581-588 [Journal]
- Chih-Yin Lin, Tzong-Chen Wu
An Identity-based Ring Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:182-186 [Conf]
- Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen
The Design of a Conference Key Distribution System. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:459-466 [Conf]
- Wei-Hua He, Chih-Wen Wang, Tzong-Chen Wu
Joint Window Nonadjacent Form. [Citation Graph (0, 0)][DBLP] FCS, 2005, pp:154-160 [Conf]
- Chih-Yin Lin, Tzong-Chen Wu, Jing-Jang Hwang
ID-Based Structured Mulitsignature Schemes. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:45-60 [Conf]
- C. Abe, I. L. Lin, T. H. Lan, Tzong-Chen Wu
Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:56-68 [Conf]
- Chin-Chen Chang, Huey-Cheue Kowng, Tzong-Chen Wu
A Refinement of a Compression-Oriented Addressing Scheme. [Citation Graph (0, 0)][DBLP] BIT, 1993, v:33, n:4, pp:530-535 [Journal]
- Yuh-Shihng Chang, Tzong-Chen Wu
Group-oriented authentication mechanism with key exchange. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:5, pp:485-497 [Journal]
- Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. [Citation Graph (0, 0)][DBLP] Computer Communications, 1995, v:18, n:1, pp:45-47 [Journal]
- Wei-Hua He, Tzong-Chen Wu
Cryptanalysis of Lee and Chang's ID-based information security functions. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:8, pp:723-726 [Journal]
- Tzong-Chen Wu
Remote login authentication scheme based on a geometric approach. [Citation Graph (0, 0)][DBLP] Computer Communications, 1995, v:18, n:12, pp:959-963 [Journal]
- Tzong-Chen Wu, Shu-Lin Chou, Tzong-Sun Wu
Two ID-based multisignature protocols for sequential and broadcasting architectures. [Citation Graph (0, 0)][DBLP] Computer Communications, 1996, v:19, n:9-10, pp:851-856 [Journal]
- Tzong-Chen Wu, Ru-Lan Su
ID-based group-oriented cryptosystem and its digital signature scheme. [Citation Graph (0, 0)][DBLP] Computer Communications, 1997, v:20, n:11, pp:1019-1026 [Journal]
- Tzong-Chen Wu, Tzong-Sun Wu
Group commitment protocol based on zero knowledge proofs. [Citation Graph (0, 0)][DBLP] Computer Communications, 1995, v:18, n:9, pp:654-656 [Journal]
- Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu
Access control with binary keys. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:8, pp:681-686 [Journal]
- Tzong-Chen Wu, Wei-Hua He
A geometric approach for sharing secrets. [Citation Graph (0, 0)][DBLP] Computers & Security, 1995, v:14, n:2, pp:135-145 [Journal]
- Tzong-Chen Wu, Hung-Sung Sung
Authenticating passwords over an insecure channel. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:5, pp:431-439 [Journal]
- Tzong-Chen Wu
Digital signature/multisignature schemes giving public key verification and message recovery simultaneously. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2001, v:16, n:6, pp:329-337 [Journal]
- Tzong-Chen Wu, Chin-Chen Chang
Cryptographic key assignment scheme for hierarchical access control. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2001, v:16, n:1, pp:25-28 [Journal]
- Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu
Group-oriented signature scheme with distinguished signing authoritie. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2004, v:20, n:5, pp:865-873 [Journal]
- Hung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng
Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2001, v:80, n:2, pp:113-117 [Journal]
- Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu
Improvements of generalization of threshold signature and authenticated encryption for group communications. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2002, v:81, n:1, pp:41-45 [Journal]
- Chin-Chen Chang, Tzong-Chen Wu
Controlling the Access Requests in an Information Protection System. [Citation Graph (0, 0)][DBLP] Inf. Process. Manage., 1993, v:29, n:1, pp:61-68 [Journal]
- Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu
Crypographic key assignment scheme for access control in a hierarchy. [Citation Graph (0, 0)][DBLP] Inf. Syst., 1992, v:17, n:3, pp:243-247 [Journal]
- Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee
Password authentication using Newton's interpolating polynomials. [Citation Graph (0, 0)][DBLP] Inf. Syst., 1991, v:16, n:1, pp:97-102 [Journal]
- Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang
Algebraic operations on encryped relational databases. [Citation Graph (0, 0)][DBLP] Inf. Syst., 1993, v:18, n:1, pp:55-62 [Journal]
- Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu
A Binary Access Control Method Using Prime Factorization. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1997, v:96, n:1&2, pp:15-26 [Journal]
- Tzong-Chen Wu, Chin-Chen Chang
Controlling Access in Tree Hierarchies. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1994, v:78, n:1-2, pp:69-76 [Journal]
- Wei-Hua He, Tzong-Chen Wu, Chih-Yin Lin
Remarks on Using RSA With Low Exponent in a Public Network. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2002, v:18, n:2, pp:341-344 [Journal]
- Tzong-Chen Wu, Yuh-Shihng Chang
Authorization-based Group-oriented Secure Broadcasting System. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 1999, v:15, n:5, pp:653-667 [Journal]
- Tzong-Chen Wu, Hung-Sung Sung
An Improved One-Time Digital Signature Scheme Based on One-Way Function. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 1996, v:12, n:3, pp:387-395 [Journal]
- Yuh-Shihng Chang, Tzong-Chen Wu, Shih-Chan Huang
ElGamal-like digital signature and multisignature schemes using self-certified public keys. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2000, v:50, n:2, pp:99-105 [Journal]
- Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu
New nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2001, v:58, n:2, pp:119-124 [Journal]
- Tzong-Chen Wu, Chih-Chan Huang, D.-J. Guan
Delegated multisignature scheme with document decomposition. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2001, v:55, n:3, pp:321-328 [Journal]
- Chin-Chen Chang, Tzong-Chen Wu
A hashing-oriented nearest neighbor searching scheme. [Citation Graph (0, 0)][DBLP] Pattern Recognition Letters, 1993, v:14, n:8, pp:625-630 [Journal]
- Chin-Chen Chang, Tzong-Chen Wu
An exact match retrieval scheme based upon principal component analysis. [Citation Graph (0, 0)][DBLP] Pattern Recognition Letters, 1995, v:16, n:5, pp:465-470 [Journal]
- Tzong-Chen Wu, Chin-Chen Chang
Application of geometric hashing to iconic database retrieval. [Citation Graph (0, 0)][DBLP] Pattern Recognition Letters, 1994, v:15, n:9, pp:871-876 [Journal]
- Tzong-Chen Wu, Jason Cheng
Retrieving similar pictures from iconic databases using G-tree. [Citation Graph (0, 0)][DBLP] Pattern Recognition Letters, 1997, v:18, n:6, pp:595-603 [Journal]
- Chin-Chen Chang, Tzong-Chen Wu
A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 1991, v:21, n:1, pp:35-49 [Journal]
- Yu-Kumg Chen, Shuo-Yan Chou, Tzong-Chen Wu
An Efficient Method for Computing the Feasible Region with Translational Containment between Two Convex Polygons. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2001, pp:390-395 [Conf]
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. [Citation Graph (, )][DBLP]
GAnGS: gather, authenticate 'n group securely. [Citation Graph (, )][DBLP]
Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics. [Citation Graph (, )][DBLP]
Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks. [Citation Graph (, )][DBLP]
Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps. [Citation Graph (, )][DBLP]
Search in 0.106secs, Finished in 0.108secs
|