The SCEAS System
Navigation Menu

Search the dblp DataBase


Tzong-Sun Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tzong-Chen Wu, Shu-Lin Chou, Tzong-Sun Wu
    Two ID-based multisignature protocols for sequential and broadcasting architectures. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:851-856 [Journal]
  2. Tzong-Chen Wu, Tzong-Sun Wu
    Group commitment protocol based on zero knowledge proofs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:9, pp:654-656 [Journal]
  3. Chien-Lung Hsu, Tzong-Sun Wu
    Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:453-456 [Journal]
  4. Tzong-Sun Wu, Chien-Lung Hsu
    Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:2, pp:120-125 [Journal]
  5. Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu
    Group-oriented signature scheme with distinguished signing authoritie. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:5, pp:865-873 [Journal]
  6. Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu
    Improvements of generalization of threshold signature and authenticated encryption for group communications. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:81, n:1, pp:41-45 [Journal]
  7. Tzong-Sun Wu, Chien-Lung Hsu, Han-Yu Lin, Po-Sheng Huang
    Improvement of the Miyazaki-Takaragi threshold digital signature scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:88, n:4, pp:183-186 [Journal]
  8. Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu
    New nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:58, n:2, pp:119-124 [Journal]
  9. Tzong-Sun Wu, Chien-Lung Hsu
    Convertible authenticated encryption scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:62, n:3, pp:205-209 [Journal]
  10. Tzong-Sun Wu, Chien-Lung Hsu
    Threshold signature scheme using self-certified public keys. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:67, n:2, pp:89-97 [Journal]

  11. Self-Certified Proxy Convertible Authenticated Encryption Scheme. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002