2008 |
10 | EE | Tzungher Chen,
Wei-Bin Lee:
A new method for using hash functions to solve remote user authentication.
Computers & Electrical Engineering 34(1): 53-62 (2008) |
9 | EE | Tzungher Chen,
Gwoboa Horng,
Chuan-Sheng Yang:
Public Key Authentication Schemes for Local Area Networks.
Informatica, Lith. Acad. Sci. 19(1): 3-16 (2008) |
8 | EE | Tzungher Chen,
Wei-Bin Lee,
Hsing-Bai Chen:
A round- and computation-efficient three-party authenticated key exchange protocol.
Journal of Systems and Software 81(9): 1581-1590 (2008) |
2007 |
7 | EE | Chiung-Chou Tsai,
Kuan-Chieh Liao,
Tzungher Chen,
Wei-Bin Lee:
Security enhancement of a novel proxy key generation protocol.
COMPSAC (2) 2007: 681-688 |
6 | EE | Tzungher Chen,
Gwoboa Horng,
Ke-Chiang Wu:
A Secure YS-Like User Authentication Scheme.
Informatica, Lith. Acad. Sci. 18(1): 27-36 (2007) |
5 | EE | Du-shiau Tsai,
Tzungher Chen,
Gwoboa Horng:
A cheating prevention scheme for binary visual cryptography with homogeneous secret images.
Pattern Recognition 40(8): 2356-2366 (2007) |
2006 |
4 | EE | Gwoboa Horng,
Tzungher Chen,
Du-shiau Tsai:
Cheating in Visual Cryptography.
Des. Codes Cryptography 38(2): 219-236 (2006) |
3 | EE | Tzungher Chen,
Du-shiau Tsai:
Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol.
Pattern Recognition 39(8): 1530-1541 (2006) |
2005 |
2 | EE | Tzungher Chen,
Wei-Bin Lee,
Gwoboa Horng:
Remarks on some signature schemes based on factoring and discrete logarithms.
Applied Mathematics and Computation 169(2): 1070-1075 (2005) |
2002 |
1 | EE | Wei-Bin Lee,
Tzungher Chen:
A public verifiable copy protection technique for still images.
Journal of Systems and Software 62(3): 195-204 (2002) |