The SCEAS System
Navigation Menu

Search the dblp DataBase


Tzungher Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gwoboa Horng, Tzungher Chen, Du-shiau Tsai
    Cheating in Visual Cryptography. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:2, pp:219-236 [Journal]
  2. Tzungher Chen, Du-shiau Tsai
    Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2006, v:39, n:8, pp:1530-1541 [Journal]
  3. Chiung-Chou Tsai, Kuan-Chieh Liao, Tzungher Chen, Wei-Bin Lee
    Security enhancement of a novel proxy key generation protocol. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:681-688 [Conf]
  4. Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
    A Secure YS-Like User Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:27-36 [Journal]
  5. Du-shiau Tsai, Tzungher Chen, Gwoboa Horng
    A cheating prevention scheme for binary visual cryptography with homogeneous secret images. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2007, v:40, n:8, pp:2356-2366 [Journal]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002