The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Horng-Twu Liaw: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Horng-Twu Liaw, Chin-Laung Lei
    An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control. [Citation Graph (0, 0)][DBLP]
    BIT, 1993, v:33, n:1, pp:46-56 [Journal]
  2. Chin-Laung Lei, Horng-Twu Liaw
    A parallel algorithm for finding congruent regions. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1992, v:16, n:3, pp:289-294 [Journal]
  3. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw
    A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2002, v:45, n:6, pp:672-682 [Journal]
  4. Horng-Twu Liaw
    A secure electronic voting protocol for general elections. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:2, pp:107-119 [Journal]
  5. Horng-Twu Liaw
    A dynamic cryptographic key generation and information broadcasting scheme in information systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:7, pp:601-610 [Journal]
  6. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw
    Fair blind threshold signatures based on discrete logarithm. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2001, v:16, n:6, pp:371-379 [Journal]
  7. Chin-Laung Lei, Horng-Twu Liaw
    Efficient Parallel Algorithms for Finding the Majority Element. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1993, v:9, n:2, pp:319-334 [Journal]
  8. Wen-Shenq Juang, Horng-Twu Liaw
    Fair blind threshold signatures in wallet with observers. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:72, n:1, pp:25-31 [Journal]
  9. Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu
    A simple password authentication using a polynomial. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:74-79 [Journal]

  10. The Routing Mechanism with Interference Aware and Congestion Aware for IEEE 802.16j Networks. [Citation Graph (, )][DBLP]


  11. A new electronic traveler's check scheme based on one-way hash function. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002