![]() |
| 2005 | ||
|---|---|---|
| 6 | Wei-Hua He, Chih-Wen Wang, Tzong-Chen Wu: Joint Window Nonadjacent Form. FCS 2005: 154-160 | |
| 5 | EE | Chien-Lung Hsu, Tzong-Sun Wu, Wei-Hua He: New proxy multi-signature scheme. Applied Mathematics and Computation 162(3): 1201-1206 (2005) |
| 2002 | ||
| 4 | EE | Wei-Hua He: Weaknesses in some multisignature schemes for specified group of verifiers. Inf. Process. Lett. 83(2): 95-99 (2002) |
| 3 | EE | Wei-Hua He, Tzong-Chen Wu, Chih-Yin Lin: Remarks on Using RSA With Low Exponent in a Public Network. J. Inf. Sci. Eng. 18(2): 341-344 (2002) |
| 1999 | ||
| 2 | EE | Wei-Hua He, Tzong-Chen Wu: Cryptanalysis of Lee and Chang's ID-based information security functions. Computer Communications 22(8): 723-726 (1999) |
| 1995 | ||
| 1 | EE | Tzong-Chen Wu, Wei-Hua He: A geometric approach for sharing secrets. Computers & Security 14(2): 135-145 (1995) |
| 1 | Chien-Lung Hsu | [5] |
| 2 | Chih-Yin Lin | [3] |
| 3 | Chih-Wen Wang | [6] |
| 4 | Tzong-Chen Wu | [1] [2] [3] [6] |
| 5 | Tzong-Sun Wu | [5] |