| 2008 |
| 19 | | Woei-Jiunn Tsaur,
Ying-Jui Huang:
Constructing Secure Commercial Vehicle Operation Systems Based on XML and RFID Techniques.
CSREA EEE 2008: 393-399 |
| 2007 |
| 18 | EE | Woei-Jiunn Tsaur,
Haw-Tyng Pai:
Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks.
ISPA Workshops 2007: 475-484 |
| 17 | EE | Woei-Jiunn Tsaur,
Haw-Tyng Pai:
A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks.
ISPA Workshops 2007: 513-522 |
| 16 | EE | Chia Chun Wu,
Wei-Bin Lee,
Woei-Jiunn Tsaur:
A secure protocol for misbehavior-penalization-based fair digital signature exchange.
IWCMC 2007: 138-139 |
| 15 | EE | Woei-Jiunn Tsaur,
Haw-Tyng Pai:
A new security scheme for on-demand source routing in mobile ad hoc networks.
IWCMC 2007: 577-582 |
| 14 | EE | Wei-Bin Lee,
Chia Chun Wu,
Woei-Jiunn Tsaur:
A novel deniable authentication protocol using generalized ElGamal signature scheme.
Inf. Sci. 177(6): 1376-1381 (2007) |
| 2005 |
| 13 | EE | Woei-Jiunn Tsaur:
Several security schemes constructed using ECC-based self-certified public key cryptosystems.
Applied Mathematics and Computation 168(1): 447-464 (2005) |
| 12 | EE | Woei-Jiunn Tsaur,
Chih-Ho Chou:
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems.
Applied Mathematics and Computation 168(2): 1045-1064 (2005) |
| 11 | EE | Woei-Jiunn Tsaur,
Chia Chun Wu,
Wei-Bin Lee:
An enhanced user authentication scheme for multi-server Internet services.
Applied Mathematics and Computation 170(1): 258-266 (2005) |
| 10 | EE | Woei-Jiunn Tsaur,
Chien-Hao Ho:
A mobile agent protected scheme using pairing-based cryptosystems.
IJMC 3(2): 183-196 (2005) |
| 2001 |
| 9 | EE | Woei-Jiunn Tsaur:
A Flexible User Authentication Scheme for Multi-server Internet Services.
ICN (1) 2001: 174-183 |
| 8 | | Woei-Jiunn Tsaur,
Shi-Jinn Horng:
Auditing Causal Relationships of Group Multicast Communications in Group-Oriented Distributed Systems.
The Journal of Supercomputing 18(1): 25-45 (2001) |
| 1998 |
| 7 | EE | Woei-Jiunn Tsaur,
Shi-Jinn Horng,
R. Tsai:
A Scheme for Auditing Causal Relationships in Group Oriented Distributed Systems.
PDSE 1998: 115- |
| 6 | | Woei-Jiunn Tsaur,
Shi-Jinn Horng:
Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments.
Comput. J. 41(2): 125-133 (1998) |
| 5 | EE | Woei-Jiunn Tsaur,
Shi-Jinn Horng:
A new generalized software complexity metric for distributed programs.
Information & Software Technology 40(5-6): 259-269 (1998) |
| 1997 |
| 4 | EE | Woei-Jiunn Tsaur,
Shi-Jinn Horng,
Shung-Shing Lee,
Ruey-Chang Tsai:
An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments.
ICPADS 1997: 640-647 |
| 3 | EE | Woei-Jiunn Tsaur,
Shi-Jinn Horng,
Chia-Ho Chen:
An authentication-combined access control scheme using a geometric approach in distributed systems.
SAC 1997: 361-365 |
| 1996 |
| 2 | EE | Woei-Jiunn Tsaur,
Shi-Jinn Horng:
Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems.
ISPAN 1996: 326-329 |
| 1995 |
| 1 | EE | Woei-Jiunn Tsaur,
Shi-Jinn Horng:
Toward Software Metrics for Distributed Software.
APSEC 1995: 209- |