dblp.uni-trier.dewww.uni-trier.de

Chien-Lung Hsu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
18EEChien-Lung Hsu, Yu-Hao Chuang: A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks. Inf. Sci. 179(4): 422-429 (2009)
2008
17EETzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu: Convertible multi-authenticated encryption scheme. Inf. Sci. 178(1): 256-263 (2008)
16EETzong-Chen Wu, Thsia-Tzu Huang, Chien-Lung Hsu, Kuo-Yu Tsai: Recursive protocol for group-oriented authentication with key distribution. Journal of Systems and Software 81(7): 1227-1239 (2008)
2007
15EEYu-Li Lin, Tzong-Chen Wu, Chien-Lung Hsu, Yen-Chun Chou: Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics. FGCN (2) 2007: 154-158
14EEChien-Lung Hsu, Kuo-Yu Tsai, Pei-Ling Tsai: Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Inf. Sci. 177(2): 543-549 (2007)
2005
13EEChien-Lung Hsu, Tzong-Sun Wu, Wei-Hua He: New proxy multi-signature scheme. Applied Mathematics and Computation 162(3): 1201-1206 (2005)
12EEChien-Lung Hsu, Tzong-Sun Wu: Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability. Applied Mathematics and Computation 164(1): 201-225 (2005)
11EEChien-Lung Hsu: Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem. Applied Mathematics and Computation 167(2): 882-890 (2005)
10EEChien-Lung Hsu, Tzong-Sun Wu: Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack. Applied Mathematics and Computation 168(1): 305-319 (2005)
9EEChien-Lung Hsu: A user friendly remote authentication scheme with smart cards against impersonation attacks. Applied Mathematics and Computation 170(1): 135-143 (2005)
2004
8EETzong-Sun Wu, Chien-Lung Hsu: Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computers & Security 23(2): 120-125 (2004)
7EEChien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: Group-oriented signature scheme with distinguished signing authoritie. Future Generation Comp. Syst. 20(5): 865-873 (2004)
2003
6EEChien-Lung Hsu, Tzong-Sun Wu: Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Computers & Security 22(5): 453-456 (2003)
5EETzong-Sun Wu, Chien-Lung Hsu, Han-Yu Lin, Po-Sheng Huang: Improvement of the Miyazaki-Takaragi threshold digital signature scheme. Inf. Process. Lett. 88(4): 183-186 (2003)
4EETzong-Sun Wu, Chien-Lung Hsu: Threshold signature scheme using self-certified public keys. Journal of Systems and Software 67(2): 89-97 (2003)
2002
3EEChien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inf. Process. Lett. 81(1): 41-45 (2002)
2EETzong-Sun Wu, Chien-Lung Hsu: Convertible authenticated encryption scheme. Journal of Systems and Software 62(3): 205-209 (2002)
2001
1EEChien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software 58(2): 119-124 (2001)

Coauthor Index

1Yen-Chun Chou [15]
2Yu-Hao Chuang [18]
3Wei-Hua He [13]
4Po-Sheng Huang [5]
5Thsia-Tzu Huang [16]
6Han-Yu Lin [5] [17]
7Yu-Li Lin [15]
8Kuo-Yu Tsai [14] [16] [17]
9Pei-Ling Tsai [14]
10Tzong-Chen Wu [1] [3] [7] [15] [16] [17]
11Tzong-Sun Wu [1] [2] [3] [4] [5] [6] [7] [8] [10] [12] [13] [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)