|
Search the dblp DataBase
Tzungher Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Gwoboa Horng, Tzungher Chen, Du-shiau Tsai
Cheating in Visual Cryptography. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:38, n:2, pp:219-236 [Journal]
- Tzungher Chen, Du-shiau Tsai
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. [Citation Graph (0, 0)][DBLP] Pattern Recognition, 2006, v:39, n:8, pp:1530-1541 [Journal]
- Chiung-Chou Tsai, Kuan-Chieh Liao, Tzungher Chen, Wei-Bin Lee
Security enhancement of a novel proxy key generation protocol. [Citation Graph (0, 0)][DBLP] COMPSAC (2), 2007, pp:681-688 [Conf]
- Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
A Secure YS-Like User Authentication Scheme. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:27-36 [Journal]
- Du-shiau Tsai, Tzungher Chen, Gwoboa Horng
A cheating prevention scheme for binary visual cryptography with homogeneous secret images. [Citation Graph (0, 0)][DBLP] Pattern Recognition, 2007, v:40, n:8, pp:2356-2366 [Journal]
Search in 0.001secs, Finished in 0.002secs
|