2009 |
18 | EE | Chien-Lung Hsu,
Yu-Hao Chuang:
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks.
Inf. Sci. 179(4): 422-429 (2009) |
2008 |
17 | EE | Tzong-Sun Wu,
Chien-Lung Hsu,
Kuo-Yu Tsai,
Han-Yu Lin,
Tzong-Chen Wu:
Convertible multi-authenticated encryption scheme.
Inf. Sci. 178(1): 256-263 (2008) |
16 | EE | Tzong-Chen Wu,
Thsia-Tzu Huang,
Chien-Lung Hsu,
Kuo-Yu Tsai:
Recursive protocol for group-oriented authentication with key distribution.
Journal of Systems and Software 81(7): 1227-1239 (2008) |
2007 |
15 | EE | Yu-Li Lin,
Tzong-Chen Wu,
Chien-Lung Hsu,
Yen-Chun Chou:
Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics.
FGCN (2) 2007: 154-158 |
14 | EE | Chien-Lung Hsu,
Kuo-Yu Tsai,
Pei-Ling Tsai:
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Inf. Sci. 177(2): 543-549 (2007) |
2005 |
13 | EE | Chien-Lung Hsu,
Tzong-Sun Wu,
Wei-Hua He:
New proxy multi-signature scheme.
Applied Mathematics and Computation 162(3): 1201-1206 (2005) |
12 | EE | Chien-Lung Hsu,
Tzong-Sun Wu:
Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability.
Applied Mathematics and Computation 164(1): 201-225 (2005) |
11 | EE | Chien-Lung Hsu:
Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem.
Applied Mathematics and Computation 167(2): 882-890 (2005) |
10 | EE | Chien-Lung Hsu,
Tzong-Sun Wu:
Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.
Applied Mathematics and Computation 168(1): 305-319 (2005) |
9 | EE | Chien-Lung Hsu:
A user friendly remote authentication scheme with smart cards against impersonation attacks.
Applied Mathematics and Computation 170(1): 135-143 (2005) |
2004 |
8 | EE | Tzong-Sun Wu,
Chien-Lung Hsu:
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
Computers & Security 23(2): 120-125 (2004) |
7 | EE | Chien-Lung Hsu,
Tzong-Sun Wu,
Tzong-Chen Wu:
Group-oriented signature scheme with distinguished signing authoritie.
Future Generation Comp. Syst. 20(5): 865-873 (2004) |
2003 |
6 | EE | Chien-Lung Hsu,
Tzong-Sun Wu:
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
Computers & Security 22(5): 453-456 (2003) |
5 | EE | Tzong-Sun Wu,
Chien-Lung Hsu,
Han-Yu Lin,
Po-Sheng Huang:
Improvement of the Miyazaki-Takaragi threshold digital signature scheme.
Inf. Process. Lett. 88(4): 183-186 (2003) |
4 | EE | Tzong-Sun Wu,
Chien-Lung Hsu:
Threshold signature scheme using self-certified public keys.
Journal of Systems and Software 67(2): 89-97 (2003) |
2002 |
3 | EE | Chien-Lung Hsu,
Tzong-Sun Wu,
Tzong-Chen Wu:
Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett. 81(1): 41-45 (2002) |
2 | EE | Tzong-Sun Wu,
Chien-Lung Hsu:
Convertible authenticated encryption scheme.
Journal of Systems and Software 62(3): 205-209 (2002) |
2001 |
1 | EE | Chien-Lung Hsu,
Tzong-Sun Wu,
Tzong-Chen Wu:
New nonrepudiable threshold proxy signature scheme with known signers.
Journal of Systems and Software 58(2): 119-124 (2001) |