dblp.uni-trier.dewww.uni-trier.de

Wei-Chi Ku

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
21EEHao-Rung Chung, Wei-Chi Ku: Three weaknesses in a simple three-party key exchange protocol. Inf. Sci. 178(1): 220-229 (2008)
2007
20EEWei-Chi Ku, Chun-Hao Hwang, Hao-Rung Chung: An Enhanced Verifier-Free Remote User Password Authentication Scheme. ICEBE 2007: 406-409
2006
19EEMin-Hung Chiang, Wei-Chi Ku: Weaknesses of Two SAS-Like Password Authentication Schemes. IEICE Transactions 89-B(2): 594-597 (2006)
18EEWei-Chi Ku, Hui-Lung Lee: Authentication Protocols Using Hoover-Kausik's Software Token. J. Inf. Sci. Eng. 22(3): 691-699 (2006)
2005
17EEWei-Chi Ku, Maw-Jinn Tsaur: A Remote User Authentication Scheme Using Strong Graphical Passwords. LCN 2005: 351-357
16EEWei-Chi Ku, Shen-Tien Chang, Hsi-Hung Chen, Maw-Jinn Tsaur: Weakness and Simple Improvement of a Password Authentication Scheme Based on Geometric Approach. LCN 2005: 472-473
15EEWei-Chi Ku, Hsiu-Mei Chuang, Min-Hung Chiang: Cryptanalysis of a Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards. IEICE Transactions 88-A(11): 3235-3238 (2005)
14EEWei-Chi Ku, Hsiu-Mei Chuang, Maw-Jinn Tsaur: Vulnerabilities of Wu-Chieu's Improved Password Authentication Scheme Using Smart Cards. IEICE Transactions 88-A(11): 3241-3243 (2005)
13EEWei-Chi Ku, Shen-Tien Chang: Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards. IEICE Transactions 88-B(5): 2165-2167 (2005)
12EEWei-Chi Ku, Shen-Tien Chang, Min-Hung Chiang: Weaknesses of a Remote User Authentication Scheme Using Smart Cards for Multi-Server Architecture. IEICE Transactions 88-B(8): 3451-3454 (2005)
11EEWei-Chi Ku, Hao-Chuan Tsai: Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme. Informatica, Lith. Acad. Sci. 16(2): 203-212 (2005)
10EEWei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang: Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. Operating Systems Review 39(1): 85-89 (2005)
9EEWei-Chi Ku, Shuai-Min Chen: Cryptanalysis of a flexible remote user authentication scheme using smart cards. Operating Systems Review 39(1): 90-96 (2005)
2004
8EEWei-Chi Ku, Chun-Ming Ho: An e-Voting Scheme against Bribe and Coercion. EEE 2004: 113-116
7EEWei-Chi Ku: A hash-based strong-password authentication scheme without using smart cards. Operating Systems Review 38(1): 29-34 (2004)
2003
6EEWei-Chi Ku, Shuai-Min Chen: An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees. ICPP Workshops 2003: 391-396
5EEWei-Chi Ku, Chien-Ming Chen, Hui-Lung Lee: Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. Operating Systems Review 37(4): 19-25 (2003)
4EEWei-Chi Ku, Hao-Chuan Tsai, Shuai-Min Chen: Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol. Operating Systems Review 37(4): 26-31 (2003)
2002
3EEWei-Chi Ku: An Improved ID-Based Authentication and Key Distribution Protocol. ICOIN (2) 2002: 375-380
2EEWei-Chi Ku, Sheng-De Wang: An Anonymous Endorsement System. J. Inf. Sci. Eng. 18(1): 107-114 (2002)
1999
1EEWei-Chi Ku, Sheng-De Wang: A secure and practical electronic voting scheme. Computer Communications 22(3): 279-286 (1999)

Coauthor Index

1Shen-Tien Chang [10] [12] [13] [16]
2Chien-Ming Chen [5]
3Hsi-Hung Chen [16]
4Shuai-Min Chen [4] [6] [9]
5Min-Hung Chiang [10] [12] [15] [19]
6Hsiu-Mei Chuang [14] [15]
7Hao-Rung Chung [20] [21]
8Chun-Ming Ho [8]
9Chun-Hao Hwang [20]
10Hui-Lung Lee [5] [18]
11Hao-Chuan Tsai [4] [11]
12Maw-Jinn Tsaur [14] [16] [17]
13Sheng-De Wang [1] [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)