dblp.uni-trier.dewww.uni-trier.de

Woei-Jiunn Tsaur

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19 Woei-Jiunn Tsaur, Ying-Jui Huang: Constructing Secure Commercial Vehicle Operation Systems Based on XML and RFID Techniques. CSREA EEE 2008: 393-399
2007
18EEWoei-Jiunn Tsaur, Haw-Tyng Pai: Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks. ISPA Workshops 2007: 475-484
17EEWoei-Jiunn Tsaur, Haw-Tyng Pai: A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks. ISPA Workshops 2007: 513-522
16EEChia Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur: A secure protocol for misbehavior-penalization-based fair digital signature exchange. IWCMC 2007: 138-139
15EEWoei-Jiunn Tsaur, Haw-Tyng Pai: A new security scheme for on-demand source routing in mobile ad hoc networks. IWCMC 2007: 577-582
14EEWei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur: A novel deniable authentication protocol using generalized ElGamal signature scheme. Inf. Sci. 177(6): 1376-1381 (2007)
2005
13EEWoei-Jiunn Tsaur: Several security schemes constructed using ECC-based self-certified public key cryptosystems. Applied Mathematics and Computation 168(1): 447-464 (2005)
12EEWoei-Jiunn Tsaur, Chih-Ho Chou: Efficient algorithms for speeding up the computations of elliptic curve cryptosystems. Applied Mathematics and Computation 168(2): 1045-1064 (2005)
11EEWoei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee: An enhanced user authentication scheme for multi-server Internet services. Applied Mathematics and Computation 170(1): 258-266 (2005)
10EEWoei-Jiunn Tsaur, Chien-Hao Ho: A mobile agent protected scheme using pairing-based cryptosystems. IJMC 3(2): 183-196 (2005)
2001
9EEWoei-Jiunn Tsaur: A Flexible User Authentication Scheme for Multi-server Internet Services. ICN (1) 2001: 174-183
8 Woei-Jiunn Tsaur, Shi-Jinn Horng: Auditing Causal Relationships of Group Multicast Communications in Group-Oriented Distributed Systems. The Journal of Supercomputing 18(1): 25-45 (2001)
1998
7EEWoei-Jiunn Tsaur, Shi-Jinn Horng, R. Tsai: A Scheme for Auditing Causal Relationships in Group Oriented Distributed Systems. PDSE 1998: 115-
6 Woei-Jiunn Tsaur, Shi-Jinn Horng: Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments. Comput. J. 41(2): 125-133 (1998)
5EEWoei-Jiunn Tsaur, Shi-Jinn Horng: A new generalized software complexity metric for distributed programs. Information & Software Technology 40(5-6): 259-269 (1998)
1997
4EEWoei-Jiunn Tsaur, Shi-Jinn Horng, Shung-Shing Lee, Ruey-Chang Tsai: An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments. ICPADS 1997: 640-647
3EEWoei-Jiunn Tsaur, Shi-Jinn Horng, Chia-Ho Chen: An authentication-combined access control scheme using a geometric approach in distributed systems. SAC 1997: 361-365
1996
2EEWoei-Jiunn Tsaur, Shi-Jinn Horng: Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems. ISPAN 1996: 326-329
1995
1EEWoei-Jiunn Tsaur, Shi-Jinn Horng: Toward Software Metrics for Distributed Software. APSEC 1995: 209-

Coauthor Index

1Chia-Ho Chen [3]
2Chih-Ho Chou [12]
3Chien-Hao Ho [10]
4Shi-Jinn Horng [1] [2] [3] [4] [5] [6] [7] [8]
5Ying-Jui Huang [19]
6Shung-Shing Lee [4]
7Wei-Bin Lee [11] [14] [16]
8Haw-Tyng Pai [15] [17] [18]
9R. Tsai [7]
10Ruey-Chang Tsai [4]
11Chia Chun Wu [11] [14] [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)