|
Search the dblp DataBase
Wen-Shenq Juang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wen-Shenq Juang, Chin-Laung Lei
Blind Threshold Signatures Based on Discrete Logarithm. [Citation Graph (0, 0)][DBLP] ASIAN, 1996, pp:172-181 [Conf]
- Wen-Shenq Juang
Efficient User Authentication and Key Agreement in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2006, pp:396-405 [Conf]
- Wen-Shenq Juang
A Simple and Efficient Conference Scheme for Mobile Communications. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:81-95 [Conf]
- Ren-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:313-318 [Conf]
- Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw
A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. [Citation Graph (0, 0)][DBLP] Comput. J., 2002, v:45, n:6, pp:672-682 [Journal]
- Wen-Shenq Juang, Chin-Laung Lei, C.-Y. Chang
Anonymous channel and authentication in wireless communications. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:15-16, pp:1502-1511 [Journal]
- Wen-Shenq Juang
Efficient password authenticated key agreement using smart cards. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:167-173 [Journal]
- Wen-Shenq Juang, Chin-Laung Lei
A collision-free secret ballot protocol for computerized general elections. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:4, pp:339-348 [Journal]
- Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw
Fair blind threshold signatures based on discrete logarithm. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2001, v:16, n:6, pp:371-379 [Journal]
- Wen-Shenq Juang
A practical anonymous off-line multi-authority payment scheme. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research and Applications, 2005, v:4, n:3, pp:240-249 [Journal]
- Wen-Shenq Juang
D-cash: A flexible pre-paid e-cash scheme for date-attachment. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research and Applications, 2007, v:6, n:1, pp:74-80 [Journal]
- Chin-Laung Lei, Wen-Shenq Juang, Pei-Ling Yu
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2002, v:18, n:1, pp:23-39 [Journal]
- Wen-Shenq Juang, Horng-Twu Liaw
Fair blind threshold signatures in wallet with observers. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2004, v:72, n:1, pp:25-31 [Journal]
- Wen-Shenq Juang
Efficient User Authentication and Key Agreement in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] WISA, 2006, pp:15-29 [Conf]
An Anonymous and Deniable Conversation for a Thin Client. [Citation Graph (, )][DBLP]
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. [Citation Graph (, )][DBLP]
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|