dblp.uni-trier.dewww.uni-trier.de

Tzer-Shyong Chen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
29EEYu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang: Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. AINA Workshops 2008: 650-655
28EEYu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen: Access control in user hierarchy based on elliptic curve cryptosystem. Inf. Sci. 178(1): 230-243 (2008)
27EEYu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen: Unconditionally secure cryptosystems based on quantum cryptography. Inf. Sci. 178(8): 2044-2058 (2008)
26EEYu-Fang Chung, Kuo-Hsuan Huang, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen: Bidder-anonymous English auction scheme with privacy and public verifiability. Journal of Systems and Software 81(1): 113-119 (2008)
2007
25EEJyh-Horng Wen, Ming-Chang Wu, Tzer-Shyong Chen: A Novel Elliptic Curve Dynamic Access Control System. IEICE Transactions 90-B(8): 1979-1987 (2007)
2006
24EEYu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen: A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. CIS 2006: 502-512
23EEJen-Yi Pan, Tzer-Long Chen, Tzer-Shyong Chen: A Novel Key Management and Access Control Scheme for Mobile Agent. ICIC (2) 2006: 334-345
22EEYu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen: Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem. JCIS 2006
21EEYu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen: Unconditionally Secure Cryptosystem Based on Quantum Cryptography. JCIS 2006
20EETzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu: Hacking Tricks Toward Security on Network Environments. PDCAT 2006: 442-447
19EEYu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen: Threshold Signature Scheme Resistible for Conspiracy Attack. PDCAT 2006: 479-483
2005
18EETzer-Shyong Chen, Jen-Yan Huang: A novel key management scheme for dynamic access control in a user hierarchy. Applied Mathematics and Computation 162(1): 339-351 (2005)
17EETzer-Shyong Chen: A threshold signature scheme based on the elliptic curve cryptosystem. Applied Mathematics and Computation 162(3): 1119-1134 (2005)
16EETzer-Shyong Chen, Jen-Yan Huang, Tzer-Long Chen: An efficient undeniable group-oriented signature scheme. Applied Mathematics and Computation 165(1): 95-102 (2005)
15EEQiu-Liang Xu, Tzer-Shyong Chen: An efficient threshold RSA digital signature scheme. Applied Mathematics and Computation 166(1): 25-34 (2005)
14EEYuan-Lung Yu, Tzer-Shyong Chen: An efficient threshold group signature scheme. Applied Mathematics and Computation 167(1): 362-371 (2005)
13EEVictor R. L. Shen, Tzer-Shyong Chen, Kai-Quan Shai: A novel cryptosystem based on grey system theory and genetic algorithm. Applied Mathematics and Computation 170(2): 1290-1302 (2005)
2004
12EETzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian: A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. COMPSAC 2004: 396-397
11EETzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung: A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. EEE 2004: 106-112
10EETzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung: Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. EEE 2004: 569-572
9EETzer-Shyong Chen, Yu-Fang Chung, Kuo-Hsuan Huang: A traceable proxy multisignature scheme based on the elliptic curve cryptosystem. Applied Mathematics and Computation 159(1): 137-145 (2004)
8EETzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung: Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme. Applied Mathematics and Computation 159(1): 147-155 (2004)
7EETzer-Shyong Chen: An English auction scheme in the online transaction environment. Computers & Security 23(5): 389-399 (2004)
6EETzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung: Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem. J. Comput. Sci. Technol. 19(4): 570- (2004)
2003
5EETzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang: Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. Computers & Security 22(6): 527-534 (2003)
4EETzer-Shyong Chen, Yu-Fang Chung: An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy. J. Comput. Sci. Technol. 18(2): 210-213 (2003)
2002
3 Victor R. L. Shen, Tzer-Shyong Chen: A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations. Computers & Security 21(2): 164-171 (2002)
2 Tzer-Shyong Chen, Yu-Fang Chung: Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. Computers & Security 21(6): 565-570 (2002)
1995
1EETzer-Shyong Chen, Feipei Lai, Rung-Ji Shang: A Simple Tree Pattern Matching Algorithm for Code Generator. COMPSAC 1995: 162-169

Coauthor Index

1Tzer-Long Chen [16] [23]
2Yu-Fang Chung [2] [4] [5] [6] [8] [9] [10] [11] [12] [19] [21] [22] [24] [26] [27] [28] [29]
3Gwo-Shiuan Huang [5]
4Jen-Yan Huang [16] [18]
5Kuo-Hsuan Huang [6] [8] [9] [10] [11] [26]
6Fuh-Gwo Jeng [20]
7Feipei Lai [1] [19] [21] [22] [24] [26] [28]
8Hsiu-Hui Lee [26] [28]
9Chia-Hui Liu [19] [29]
10Yu-Chia Liu [20]
11Jen-Yi Pan [23]
12Kai-Quan Shai [13]
13Rung-Ji Shang [1]
14Victor R. L. Shen [3] [13]
15Chang-Sin Tian [12]
16Tzu-Chi Wang [29]
17Jyh-Horng Wen [25]
18Ming-Chang Wu [25]
19Zhen Yu Wu [21] [22] [24] [27]
20Qiu-Liang Xu [15]
21Yuan-Lung Yu [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)