1995 | ||
---|---|---|
2 | Jau-Liang Chen, Tzonelih Hwang: How to Thwart the Mafia Attack. Inf. Sci. 85(1-3): 99-104 (1995) | |
1994 | ||
1 | EE | Jau-Liang Chen, Tzonelih Hwang: Identity-based conference key broadcast schemes with user authentication. Computers & Security 13(1): 53-57 (1994) |
1 | Tzonelih Hwang | [1] [2] |