dblp.uni-trier.dewww.uni-trier.de

Tzungher Chen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
10EETzungher Chen, Wei-Bin Lee: A new method for using hash functions to solve remote user authentication. Computers & Electrical Engineering 34(1): 53-62 (2008)
9EETzungher Chen, Gwoboa Horng, Chuan-Sheng Yang: Public Key Authentication Schemes for Local Area Networks. Informatica, Lith. Acad. Sci. 19(1): 3-16 (2008)
8EETzungher Chen, Wei-Bin Lee, Hsing-Bai Chen: A round- and computation-efficient three-party authenticated key exchange protocol. Journal of Systems and Software 81(9): 1581-1590 (2008)
2007
7EEChiung-Chou Tsai, Kuan-Chieh Liao, Tzungher Chen, Wei-Bin Lee: Security enhancement of a novel proxy key generation protocol. COMPSAC (2) 2007: 681-688
6EETzungher Chen, Gwoboa Horng, Ke-Chiang Wu: A Secure YS-Like User Authentication Scheme. Informatica, Lith. Acad. Sci. 18(1): 27-36 (2007)
5EEDu-shiau Tsai, Tzungher Chen, Gwoboa Horng: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition 40(8): 2356-2366 (2007)
2006
4EEGwoboa Horng, Tzungher Chen, Du-shiau Tsai: Cheating in Visual Cryptography. Des. Codes Cryptography 38(2): 219-236 (2006)
3EETzungher Chen, Du-shiau Tsai: Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recognition 39(8): 1530-1541 (2006)
2005
2EETzungher Chen, Wei-Bin Lee, Gwoboa Horng: Remarks on some signature schemes based on factoring and discrete logarithms. Applied Mathematics and Computation 169(2): 1070-1075 (2005)
2002
1EEWei-Bin Lee, Tzungher Chen: A public verifiable copy protection technique for still images. Journal of Systems and Software 62(3): 195-204 (2002)

Coauthor Index

1Hsing-Bai Chen [8]
2Gwoboa Horng [2] [4] [5] [6] [9]
3Wei-Bin Lee [1] [2] [7] [8] [10]
4Kuan-Chieh Liao [7]
5Chiung-Chou Tsai [7]
6Du-shiau Tsai [3] [4] [5]
7Ke-Chiang Wu [6]
8Chuan-Sheng Yang [9]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)