2008 |
23 | EE | Tzungher Chen,
Gwoboa Horng,
Chuan-Sheng Yang:
Public Key Authentication Schemes for Local Area Networks.
Informatica, Lith. Acad. Sci. 19(1): 3-16 (2008) |
2007 |
22 | EE | Eric Jui-Lin Lu,
Gwoboa Horng,
Chia-Ssu Yu,
Ling-ying Chou:
A Web-Based Authoring System Supporting Metadata.
CBMS 2007: 645-650 |
21 | EE | Chin-Ling Chen,
Chih-Cheng Chen,
Ling-Chun Liu,
Gwoboa Horng:
A server-aided signature scheme for mobile commerce.
IWCMC 2007: 565-570 |
20 | EE | Chao-Liang Liu,
Gwoboa Horng,
Te-Yu Chen:
Further refinement of pairing computation based on Miller's algorithm.
Applied Mathematics and Computation 189(1): 395-409 (2007) |
19 | EE | Tzungher Chen,
Gwoboa Horng,
Ke-Chiang Wu:
A Secure YS-Like User Authentication Scheme.
Informatica, Lith. Acad. Sci. 18(1): 27-36 (2007) |
18 | EE | Du-shiau Tsai,
Tzungher Chen,
Gwoboa Horng:
A cheating prevention scheme for binary visual cryptography with homogeneous secret images.
Pattern Recognition 40(8): 2356-2366 (2007) |
2006 |
17 | EE | Chien-Lung Wang,
Gwoboa Horng,
Yu-Sheng Chen,
Tzung-Pei Hong:
An Efficient Key-Update Scheme for Wireless Sensor Networks.
International Conference on Computational Science (1) 2006: 1026-1029 |
16 | EE | Chien-Lung Wang,
Tzung-Pei Hong,
Gwoboa Horng,
Wen-Hung Wang:
A Key Renewal Scheme under the Power Consumption for Wireless Sensor Networks.
JCIS 2006 |
15 | | Chun-Hua Chen,
Gwoboa Horng:
More Robust Private Information.
SECRYPT 2006: 297-302 |
14 | EE | Yu-Sheng Chen,
Gwoboa Horng,
Chao-Liang Liu:
Performance improvement for the GGM-construction of pseudorandom functions.
Applied Mathematics and Computation 183(1): 486-490 (2006) |
13 | EE | Gwoboa Horng,
Tzungher Chen,
Du-shiau Tsai:
Cheating in Visual Cryptography.
Des. Codes Cryptography 38(2): 219-236 (2006) |
2005 |
12 | EE | Chun-Hua Chen,
Chi-Min Lan,
Gwoboa Horng:
Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme.
ICITA (2) 2005: 580-583 |
11 | EE | Chun-Hua Chen,
Chi-Min Lan,
Gwoboa Horng:
A practical voting system for small-scale election.
ITRE 2005: 322-326 |
10 | EE | Tzungher Chen,
Wei-Bin Lee,
Gwoboa Horng:
Remarks on some signature schemes based on factoring and discrete logarithms.
Applied Mathematics and Computation 169(2): 1070-1075 (2005) |
9 | EE | Chao-Liang Liu,
Gwoboa Horng,
Hsin-Yu Liu:
Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.
IEICE Transactions 88-B(5): 2171-2172 (2005) |
2001 |
8 | EE | Gwoboa Horng:
An Efficient and Secure Protocol for Multi-party Key Establishment.
Comput. J. 44(5): 463-470 (2001) |
7 | EE | Gwoboa Horng:
A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing.
J. Inf. Sci. Eng. 17(6): 959-965 (2001) |
2000 |
6 | EE | Gwoboa Horng:
A Secure Server-Aided RSA Signature Computation Protocol for Smart Cards.
J. Inf. Sci. Eng. 16(6): 847-855 (2000) |
1999 |
5 | | Gwoboa Horng,
Ming-Deh A. Huang:
Solving polynomials by radicals with roots of unity in minimum depth.
Math. Comput. 68(226): 881-885 (1999) |
1998 |
4 | EE | Gwoboa Horng:
An Active Attack on Protocols for Server-Aided RSA Signature Computation.
Inf. Process. Lett. 65(2): 71-73 (1998) |
1996 |
3 | EE | Gwoboa Horng,
Chuan-Sheng Yang:
Key authentication scheme for cryptosystems based on discrete logarithms.
Computer Communications 19(9-10): 848-850 (1996) |
1995 |
2 | EE | Gwoboa Horng:
Password Authentication Without Using a Password Table.
Inf. Process. Lett. 55(5): 247-250 (1995) |
1990 |
1 | | Gwoboa Horng,
Ming-Deh A. Huang:
Simplifying Nested Radicals and Solving Polynomials by Radicals in Minimum Depth
FOCS 1990: 847-856 |