dblp.uni-trier.dewww.uni-trier.de

Hui-Feng Huang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19EEHui-Feng Huang: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network. ISI Workshops 2008: 77-82
18EEHui-Feng Huang, Chin-Chen Chang: A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. Fundam. Inform. 84(3-4): 353-361 (2008)
17EEHui-Feng Huang: A novel efficient conference scheme for mobile communications. IJMC 6(6): 750-759 (2008)
2007
16EEHui-Feng Huang: An Efficient Mutual Authentication Protocol on RFID Tags. EUC Workshops 2007: 550-556
15EEHui-Feng Huang, Chin-Chen Chang: An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. MUE 2007: 982-986
2006
14EEHui-Feng Huang, Chin-Chen Chang: An Untraceable Electronic Cash System Using Fair Blind Signatures. ICEBE 2006: 39-46
13 Hui-Feng Huang, Chin-Chen Chang: An Untraceable Forward-Secure Blind Signature Scheme. IMECS 2006: 441-446
12EEHui-Feng Huang: A New Cryptographic Key Assignment Scheme using a One-way Hash Function. JCIS 2006
11EEHui-Feng Huang: A New Efficient Authentication Scheme for Session Initiation Protocol. JCIS 2006
10EEHui-Feng Huang, Chin-Chen Chang: A novel efficient (t, n) threshold proxy signature scheme. Inf. Sci. 176(10): 1338-1349 (2006)
2005
9EEHui-Feng Huang, Chin-Chen Chang: A New Design for Efficient t-out-n Oblivious Transfer Scheme. AINA 2005: 499-502
8EEHui-Feng Huang, Chin-Chen Chang: Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. CIS (2) 2005: 554-559
7EEHui-Feng Huang, Chin-Chen Chang: An efficient deniable authentication protocol. CW 2005: 307-310
6EEHui-Feng Huang, Chin-Chen Chang: A Novel Conference Key Distribution System with Re-keying Protocol. Human.Society@Internet 2005: 282-290
5EEYa-Fen Chang, Chin-Chen Chang, Hui-Feng Huang: Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation 161(1): 211-227 (2005)
2004
4EEHui-Feng Huang, Chin-Chen Chang: A new design of efficient partially blind signature scheme. Journal of Systems and Software 73(3): 397-403 (2004)
2003
3EEHui-Feng Huang, Chin-Chen Chang: An Efficient Convertible Authenticated Encryption Scheme and Its Variant. ICICS 2003: 382-392
2EEHui-Feng Huang, Chin-Chen Chang: An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers. Fundam. Inform. 56(3): 243-253 (2003)
2002
1EEHui-Feng Huang, Chin-Chen Chang: Cryptanalysis of the WD Public-Key Cryptosystem. CW 2002: 249-254

Coauthor Index

1Chin-Chen Chang [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [13] [14] [15] [18]
2Ya-Fen Chang [5]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)