|
Search the dblp DataBase
Zhi-Jia Tzeng:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wen-Guey Tzeng, Zhi-Jia Tzeng
Round-Efficient Conference Key Agreement Protocols with Provable Security. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:614-628 [Conf]
- Wen-Guey Tzeng, Zhi-Jia Tzeng
Robust Key-Evolving Public Key Encryption Schemes. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:61-72 [Conf]
- Wen-Guey Tzeng, Zhi-Jia Tzeng
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2001, pp:207-224 [Conf]
- Wen-Guey Tzeng, Zhi-Jia Tzeng
Robust Forward-Secure Signature Schemes with Proactive Security. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2001, pp:264-276 [Conf]
- Wen-Guey Tzeng, Zhi-Jia Tzeng
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2005, v:35, n:1, pp:47-61 [Journal]
- Zhi-Jia Tzeng, Wen-Guey Tzeng
Practical and Efficient Electronic Voting Schemes. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2001, v:17, n:6, pp:865-877 [Journal]
Search in 0.001secs, Finished in 0.001secs
|