2008 |
43 | EE | Yi-Ru Liu,
Wen-Guey Tzeng:
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time.
Public Key Cryptography 2008: 380-396 |
42 | | Cheng-Kang Chu,
Wen-Guey Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes.
J. UCS 14(3): 397-415 (2008) |
2007 |
41 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
ACISP 2007: 323-337 |
40 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Identity-Based Proxy Re-encryption Without Random Oracles.
ISC 2007: 189-202 |
39 | EE | Chi-Ming Hu,
Wen-Guey Tzeng:
Cheating Prevention in Visual Cryptography.
IEEE Transactions on Image Processing 16(1): 36-45 (2007) |
38 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Optimal resilient threshold GQ signatures.
Inf. Sci. 177(8): 1834-1851 (2007) |
2006 |
37 | EE | Wen-Guey Tzeng:
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys.
ASIACCS 2006: 223-230 |
36 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Conditional Oblivious Cast.
Public Key Cryptography 2006: 443-457 |
2005 |
35 | EE | Hsiao-Ying Lin,
Wen-Guey Tzeng:
An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption.
ACNS 2005: 456-466 |
34 | EE | Chi-Ming Hu,
Wen-Guey Tzeng:
Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.
ISC 2005: 300-313 |
33 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.
Public Key Cryptography 2005: 172-183 |
32 | EE | Wen-Guey Tzeng,
Zhi-Jia Tzeng:
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares.
Des. Codes Cryptography 35(1): 47-61 (2005) |
31 | EE | Chia-Jung Lee,
Chi-Jen Lu,
Shi-Chun Tsai,
Wen-Guey Tzeng:
Extracting randomness from multiple independent sources.
IEEE Transactions on Information Theory 51(6): 2224-2227 (2005) |
30 | EE | Shi-Chun Tsai,
Wen-Guey Tzeng,
Hsin-Lung Wu:
On the Jensen-Shannon Divergence and Variational Distance.
IEEE Transactions on Information Theory 51(9): 3333-3336 (2005) |
2004 |
29 | EE | Wen-Guey Tzeng:
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters.
IEEE Trans. Computers 53(2): 232-240 (2004) |
2003 |
28 | EE | Li-Shan Liu,
Cheng-Kang Chu,
Wen-Guey Tzeng:
A Threshold GQ Signature Scheme.
ACNS 2003: 137-150 |
27 | EE | Min-Shiang Hwang,
Wen-Guey Tzeng:
A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy.
ICOIN 2003: 757-761 |
26 | | Shun-Chieh Lin,
Wen-Hsiang Tsai,
Shian-Shyong Tseng,
Wen-Guey Tzeng,
Shyan-Ming Yuan:
A Framework of High Confidence E-Healthcare Information System.
ICWI 2003: 493-500 |
2002 |
25 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Distributed Key Generation as a Component of an Integrated Protocol.
ICICS 2002: 411-421 |
24 | EE | Wen-Guey Tzeng,
Zhi-Jia Tzeng:
Robust Key-Evolving Public Key Encryption Schemes.
ICICS 2002: 61-72 |
23 | EE | Wen-Guey Tzeng:
Efficient 1-Out-n Oblivious Transfer Schemes.
Public Key Cryptography 2002: 159-171 |
22 | | Wen-Guey Tzeng,
Chi-Ming Hu:
A New Approach for Visual Cryptography.
Des. Codes Cryptography 27(3): 207-227 (2002) |
21 | EE | Wen-Guey Tzeng:
Corrections to "A Secure Fault-Tolerant Conference-Key Agreement Protocol".
IEEE Trans. Computers 51(12): 1462 (2002) |
20 | EE | Wen-Guey Tzeng:
A Secure Fault-Tolerant Conference-Key Agreement Protocol.
IEEE Trans. Computers 51(4): 373-379 (2002) |
19 | EE | Wen-Guey Tzeng:
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy.
IEEE Trans. Knowl. Data Eng. 14(1): 182-188 (2002) |
2001 |
18 | EE | Wen-Guey Tzeng,
Zhi-Jia Tzeng:
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares.
Public Key Cryptography 2001: 207-224 |
17 | EE | Wen-Guey Tzeng,
Zhi-Jia Tzeng:
Robust Forward-Secure Signature Schemes with Proactive Security.
Public Key Cryptography 2001: 264-276 |
16 | EE | Zhi-Jia Tzeng,
Wen-Guey Tzeng:
Practical and Efficient Electronic Voting Schemes.
J. Inf. Sci. Eng. 17(6): 865-877 (2001) |
2000 |
15 | EE | Wen-Guey Tzeng,
Zhi-Jia Tzeng:
Round-Efficient Conference Key Agreement Protocols with Provable Security.
ASIACRYPT 2000: 614-628 |
14 | | Wen-Guey Tzeng:
A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol.
Public Key Cryptography 2000: 1-13 |
1999 |
13 | EE | Wen-Guey Tzeng,
Chi-Ming Hu:
Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols.
Inf. Process. Lett. 69(6): 297-302 (1999) |
12 | EE | Wen-Guey Tzeng:
Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations.
Inf. Process. Lett. 70(3): 153-156 (1999) |
11 | | Wen-Guey Tzeng,
Gow-Hsing King:
Three-Quarter Approximation for the Number of Unused Colors in Graph Coloring.
Inf. Sci. 114(1-4): 105-126 (1999) |
10 | EE | Gow-Hsing King,
Wen-Guey Tzeng:
A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix.
J. Inf. Sci. Eng. 15(3): 337-352 (1999) |
1998 |
9 | | Kuen-Feng Chu,
Wen-Guey Tzeng,
Ping-Jer Yeh,
Shyan-Ming Yuan:
An Integrated System for Multilevel Secure Compound Documents.
WebNet 1998 |
1997 |
8 | EE | Gow-Hsing King,
Wen-Guey Tzeng:
On-Line Algorithms for the Dominating Set Problem.
Inf. Process. Lett. 61(1): 11-14 (1997) |
1996 |
7 | EE | Min-Shiang Hwang,
Wen-Guey Tzeng,
Wei-Pang Yang:
An access control scheme based on Chinese remainder theorem and time stamp concept.
Computers & Security 15(1): 73-81 (1996) |
6 | EE | Wen-Guey Tzeng:
On Path Equivalence of Nondeterministic Finite Automata.
Inf. Process. Lett. 58(1): 43-46 (1996) |
1992 |
5 | | Wen-Guey Tzeng:
Learning Probabilistic Automata and Markov Chains via Queries.
Machine Learning 8: 151-166 (1992) |
4 | | Wen-Guey Tzeng:
A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata.
SIAM J. Comput. 21(2): 216-227 (1992) |
1991 |
3 | | Ker-I Ko,
Wen-Guey Tzeng:
Three Sigma^p_2-Complete Problems in Computational Learning Theory.
Computational Complexity 1: 269-310 (1991) |
1990 |
2 | | Ker-I Ko,
Assaf Marron,
Wen-Guey Tzeng:
Learning String Patterns and Tree Patterns from Examples.
ML 1990: 384-391 |
1989 |
1 | | Wen-Guey Tzeng:
The Equivalence and Learning of Probabilistic Automata (Extended Abstract)
FOCS 1989: 268-273 |