2008 |
17 | EE | Yu-Fang Chung,
Tzer-Shyong Chen,
Chia-Hui Liu,
Tzu-Chi Wang:
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent.
AINA Workshops 2008: 650-655 |
16 | EE | Yu-Fang Chung,
Hsiu-Hui Lee,
Feipei Lai,
Tzer-Shyong Chen:
Access control in user hierarchy based on elliptic curve cryptosystem.
Inf. Sci. 178(1): 230-243 (2008) |
15 | EE | Yu-Fang Chung,
Zhen Yu Wu,
Tzer-Shyong Chen:
Unconditionally secure cryptosystems based on quantum cryptography.
Inf. Sci. 178(8): 2044-2058 (2008) |
14 | EE | Yu-Fang Chung,
Kuo-Hsuan Huang,
Hsiu-Hui Lee,
Feipei Lai,
Tzer-Shyong Chen:
Bidder-anonymous English auction scheme with privacy and public verifiability.
Journal of Systems and Software 81(1): 113-119 (2008) |
2006 |
13 | EE | Yu-Fang Chung,
Zhen Yu Wu,
Feipei Lai,
Tzer-Shyong Chen:
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
CIS 2006: 502-512 |
12 | EE | Yu-Fang Chung,
Zhen Yu Wu,
Feipei Lai,
Tzer-Shyong Chen:
Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem.
JCIS 2006 |
11 | EE | Yu-Fang Chung,
Zhen Yu Wu,
Feipei Lai,
Tzer-Shyong Chen:
Unconditionally Secure Cryptosystem Based on Quantum Cryptography.
JCIS 2006 |
10 | EE | Yu-Fang Chung,
Chia-Hui Liu,
Feipei Lai,
Tzer-Shyong Chen:
Threshold Signature Scheme Resistible for Conspiracy Attack.
PDCAT 2006: 479-483 |
2004 |
9 | EE | Tzer-Shyong Chen,
Yu-Fang Chung,
Chang-Sin Tian:
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy.
COMPSAC 2004: 396-397 |
8 | EE | Tzer-Shyong Chen,
Kuo-Hsuan Huang,
Yu-Fang Chung:
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem.
EEE 2004: 106-112 |
7 | EE | Tzer-Shyong Chen,
Kuo-Hsuan Huang,
Yu-Fang Chung:
Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme.
EEE 2004: 569-572 |
6 | EE | Tzer-Shyong Chen,
Yu-Fang Chung,
Kuo-Hsuan Huang:
A traceable proxy multisignature scheme based on the elliptic curve cryptosystem.
Applied Mathematics and Computation 159(1): 137-145 (2004) |
5 | EE | Tzer-Shyong Chen,
Kuo-Hsuan Huang,
Yu-Fang Chung:
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme.
Applied Mathematics and Computation 159(1): 147-155 (2004) |
4 | EE | Tzer-Shyong Chen,
Kuo-Hsuan Huang,
Yu-Fang Chung:
Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem.
J. Comput. Sci. Technol. 19(4): 570- (2004) |
2003 |
3 | EE | Tzer-Shyong Chen,
Yu-Fang Chung,
Gwo-Shiuan Huang:
Efficient proxy multisignature schemes based on the elliptic curve cryptosystem.
Computers & Security 22(6): 527-534 (2003) |
2 | EE | Tzer-Shyong Chen,
Yu-Fang Chung:
An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy.
J. Comput. Sci. Technol. 18(2): 210-213 (2003) |
2002 |
1 | | Tzer-Shyong Chen,
Yu-Fang Chung:
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm.
Computers & Security 21(6): 565-570 (2002) |