2008 |
29 | EE | Yu-Fang Chung,
Tzer-Shyong Chen,
Chia-Hui Liu,
Tzu-Chi Wang:
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent.
AINA Workshops 2008: 650-655 |
28 | EE | Yu-Fang Chung,
Hsiu-Hui Lee,
Feipei Lai,
Tzer-Shyong Chen:
Access control in user hierarchy based on elliptic curve cryptosystem.
Inf. Sci. 178(1): 230-243 (2008) |
27 | EE | Yu-Fang Chung,
Zhen Yu Wu,
Tzer-Shyong Chen:
Unconditionally secure cryptosystems based on quantum cryptography.
Inf. Sci. 178(8): 2044-2058 (2008) |
26 | EE | Yu-Fang Chung,
Kuo-Hsuan Huang,
Hsiu-Hui Lee,
Feipei Lai,
Tzer-Shyong Chen:
Bidder-anonymous English auction scheme with privacy and public verifiability.
Journal of Systems and Software 81(1): 113-119 (2008) |
2007 |
25 | EE | Jyh-Horng Wen,
Ming-Chang Wu,
Tzer-Shyong Chen:
A Novel Elliptic Curve Dynamic Access Control System.
IEICE Transactions 90-B(8): 1979-1987 (2007) |
2006 |
24 | EE | Yu-Fang Chung,
Zhen Yu Wu,
Feipei Lai,
Tzer-Shyong Chen:
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
CIS 2006: 502-512 |
23 | EE | Jen-Yi Pan,
Tzer-Long Chen,
Tzer-Shyong Chen:
A Novel Key Management and Access Control Scheme for Mobile Agent.
ICIC (2) 2006: 334-345 |
22 | EE | Yu-Fang Chung,
Zhen Yu Wu,
Feipei Lai,
Tzer-Shyong Chen:
Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem.
JCIS 2006 |
21 | EE | Yu-Fang Chung,
Zhen Yu Wu,
Feipei Lai,
Tzer-Shyong Chen:
Unconditionally Secure Cryptosystem Based on Quantum Cryptography.
JCIS 2006 |
20 | EE | Tzer-Shyong Chen,
Fuh-Gwo Jeng,
Yu-Chia Liu:
Hacking Tricks Toward Security on Network Environments.
PDCAT 2006: 442-447 |
19 | EE | Yu-Fang Chung,
Chia-Hui Liu,
Feipei Lai,
Tzer-Shyong Chen:
Threshold Signature Scheme Resistible for Conspiracy Attack.
PDCAT 2006: 479-483 |
2005 |
18 | EE | Tzer-Shyong Chen,
Jen-Yan Huang:
A novel key management scheme for dynamic access control in a user hierarchy.
Applied Mathematics and Computation 162(1): 339-351 (2005) |
17 | EE | Tzer-Shyong Chen:
A threshold signature scheme based on the elliptic curve cryptosystem.
Applied Mathematics and Computation 162(3): 1119-1134 (2005) |
16 | EE | Tzer-Shyong Chen,
Jen-Yan Huang,
Tzer-Long Chen:
An efficient undeniable group-oriented signature scheme.
Applied Mathematics and Computation 165(1): 95-102 (2005) |
15 | EE | Qiu-Liang Xu,
Tzer-Shyong Chen:
An efficient threshold RSA digital signature scheme.
Applied Mathematics and Computation 166(1): 25-34 (2005) |
14 | EE | Yuan-Lung Yu,
Tzer-Shyong Chen:
An efficient threshold group signature scheme.
Applied Mathematics and Computation 167(1): 362-371 (2005) |
13 | EE | Victor R. L. Shen,
Tzer-Shyong Chen,
Kai-Quan Shai:
A novel cryptosystem based on grey system theory and genetic algorithm.
Applied Mathematics and Computation 170(2): 1290-1302 (2005) |
2004 |
12 | EE | Tzer-Shyong Chen,
Yu-Fang Chung,
Chang-Sin Tian:
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy.
COMPSAC 2004: 396-397 |
11 | EE | Tzer-Shyong Chen,
Kuo-Hsuan Huang,
Yu-Fang Chung:
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem.
EEE 2004: 106-112 |
10 | EE | Tzer-Shyong Chen,
Kuo-Hsuan Huang,
Yu-Fang Chung:
Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme.
EEE 2004: 569-572 |
9 | EE | Tzer-Shyong Chen,
Yu-Fang Chung,
Kuo-Hsuan Huang:
A traceable proxy multisignature scheme based on the elliptic curve cryptosystem.
Applied Mathematics and Computation 159(1): 137-145 (2004) |
8 | EE | Tzer-Shyong Chen,
Kuo-Hsuan Huang,
Yu-Fang Chung:
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme.
Applied Mathematics and Computation 159(1): 147-155 (2004) |
7 | EE | Tzer-Shyong Chen:
An English auction scheme in the online transaction environment.
Computers & Security 23(5): 389-399 (2004) |
6 | EE | Tzer-Shyong Chen,
Kuo-Hsuan Huang,
Yu-Fang Chung:
Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem.
J. Comput. Sci. Technol. 19(4): 570- (2004) |
2003 |
5 | EE | Tzer-Shyong Chen,
Yu-Fang Chung,
Gwo-Shiuan Huang:
Efficient proxy multisignature schemes based on the elliptic curve cryptosystem.
Computers & Security 22(6): 527-534 (2003) |
4 | EE | Tzer-Shyong Chen,
Yu-Fang Chung:
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy.
J. Comput. Sci. Technol. 18(2): 210-213 (2003) |
2002 |
3 | | Victor R. L. Shen,
Tzer-Shyong Chen:
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations.
Computers & Security 21(2): 164-171 (2002) |
2 | | Tzer-Shyong Chen,
Yu-Fang Chung:
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm.
Computers & Security 21(6): 565-570 (2002) |
1995 |
1 | EE | Tzer-Shyong Chen,
Feipei Lai,
Rung-Ji Shang:
A Simple Tree Pattern Matching Algorithm for Code Generator.
COMPSAC 1995: 162-169 |