The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhi-Jia Tzeng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wen-Guey Tzeng, Zhi-Jia Tzeng
    Round-Efficient Conference Key Agreement Protocols with Provable Security. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:614-628 [Conf]
  2. Wen-Guey Tzeng, Zhi-Jia Tzeng
    Robust Key-Evolving Public Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:61-72 [Conf]
  3. Wen-Guey Tzeng, Zhi-Jia Tzeng
    A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:207-224 [Conf]
  4. Wen-Guey Tzeng, Zhi-Jia Tzeng
    Robust Forward-Secure Signature Schemes with Proactive Security. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:264-276 [Conf]
  5. Wen-Guey Tzeng, Zhi-Jia Tzeng
    A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:47-61 [Journal]
  6. Zhi-Jia Tzeng, Wen-Guey Tzeng
    Practical and Efficient Electronic Voting Schemes. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:865-877 [Journal]

Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002