![]() |
| 1995 | ||
|---|---|---|
| 2 | Jau-Liang Chen, Tzonelih Hwang: How to Thwart the Mafia Attack. Inf. Sci. 85(1-3): 99-104 (1995) | |
| 1994 | ||
| 1 | EE | Jau-Liang Chen, Tzonelih Hwang: Identity-based conference key broadcast schemes with user authentication. Computers & Security 13(1): 53-57 (1994) |
| 1 | Tzonelih Hwang | [1] [2] |