The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wen-Shenq Juang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wen-Shenq Juang, Chin-Laung Lei
    Blind Threshold Signatures Based on Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    ASIAN, 1996, pp:172-181 [Conf]
  2. Wen-Shenq Juang
    Efficient User Authentication and Key Agreement in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:396-405 [Conf]
  3. Wen-Shenq Juang
    A Simple and Efficient Conference Scheme for Mobile Communications. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:81-95 [Conf]
  4. Ren-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei
    A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:313-318 [Conf]
  5. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw
    A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2002, v:45, n:6, pp:672-682 [Journal]
  6. Wen-Shenq Juang, Chin-Laung Lei, C.-Y. Chang
    Anonymous channel and authentication in wireless communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:15-16, pp:1502-1511 [Journal]
  7. Wen-Shenq Juang
    Efficient password authenticated key agreement using smart cards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:2, pp:167-173 [Journal]
  8. Wen-Shenq Juang, Chin-Laung Lei
    A collision-free secret ballot protocol for computerized general elections. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:4, pp:339-348 [Journal]
  9. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw
    Fair blind threshold signatures based on discrete logarithm. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2001, v:16, n:6, pp:371-379 [Journal]
  10. Wen-Shenq Juang
    A practical anonymous off-line multi-authority payment scheme. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2005, v:4, n:3, pp:240-249 [Journal]
  11. Wen-Shenq Juang
    D-cash: A flexible pre-paid e-cash scheme for date-attachment. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2007, v:6, n:1, pp:74-80 [Journal]
  12. Chin-Laung Lei, Wen-Shenq Juang, Pei-Ling Yu
    Provably Secure Blind Threshold Signatures Based on Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:1, pp:23-39 [Journal]
  13. Wen-Shenq Juang, Horng-Twu Liaw
    Fair blind threshold signatures in wallet with observers. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:72, n:1, pp:25-31 [Journal]
  14. Wen-Shenq Juang
    Efficient User Authentication and Key Agreement in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:15-29 [Conf]

  15. An Anonymous and Deniable Conversation for a Thin Client. [Citation Graph (, )][DBLP]


  16. A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. [Citation Graph (, )][DBLP]


  17. Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002