dblp.uni-trier.dewww.uni-trier.de

Wen-Guey Tzeng

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
43EEYi-Ru Liu, Wen-Guey Tzeng: Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. Public Key Cryptography 2008: 380-396
42 Cheng-Kang Chu, Wen-Guey Tzeng: Efficient k-out-of-n Oblivious Transfer Schemes. J. UCS 14(3): 397-415 (2008)
2007
41EECheng-Kang Chu, Wen-Guey Tzeng: Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. ACISP 2007: 323-337
40EECheng-Kang Chu, Wen-Guey Tzeng: Identity-Based Proxy Re-encryption Without Random Oracles. ISC 2007: 189-202
39EEChi-Ming Hu, Wen-Guey Tzeng: Cheating Prevention in Visual Cryptography. IEEE Transactions on Image Processing 16(1): 36-45 (2007)
38EECheng-Kang Chu, Wen-Guey Tzeng: Optimal resilient threshold GQ signatures. Inf. Sci. 177(8): 1834-1851 (2007)
2006
37EEWen-Guey Tzeng: A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. ASIACCS 2006: 223-230
36EECheng-Kang Chu, Wen-Guey Tzeng: Conditional Oblivious Cast. Public Key Cryptography 2006: 443-457
2005
35EEHsiao-Ying Lin, Wen-Guey Tzeng: An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. ACNS 2005: 456-466
34EEChi-Ming Hu, Wen-Guey Tzeng: Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. ISC 2005: 300-313
33EECheng-Kang Chu, Wen-Guey Tzeng: Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. Public Key Cryptography 2005: 172-183
32EEWen-Guey Tzeng, Zhi-Jia Tzeng: A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Des. Codes Cryptography 35(1): 47-61 (2005)
31EEChia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai, Wen-Guey Tzeng: Extracting randomness from multiple independent sources. IEEE Transactions on Information Theory 51(6): 2224-2227 (2005)
30EEShi-Chun Tsai, Wen-Guey Tzeng, Hsin-Lung Wu: On the Jensen-Shannon Divergence and Variational Distance. IEEE Transactions on Information Theory 51(9): 3333-3336 (2005)
2004
29EEWen-Guey Tzeng: Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters. IEEE Trans. Computers 53(2): 232-240 (2004)
2003
28EELi-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng: A Threshold GQ Signature Scheme. ACNS 2003: 137-150
27EEMin-Shiang Hwang, Wen-Guey Tzeng: A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy. ICOIN 2003: 757-761
26 Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tseng, Wen-Guey Tzeng, Shyan-Ming Yuan: A Framework of High Confidence E-Healthcare Information System. ICWI 2003: 493-500
2002
25EECheng-Kang Chu, Wen-Guey Tzeng: Distributed Key Generation as a Component of an Integrated Protocol. ICICS 2002: 411-421
24EEWen-Guey Tzeng, Zhi-Jia Tzeng: Robust Key-Evolving Public Key Encryption Schemes. ICICS 2002: 61-72
23EEWen-Guey Tzeng: Efficient 1-Out-n Oblivious Transfer Schemes. Public Key Cryptography 2002: 159-171
22 Wen-Guey Tzeng, Chi-Ming Hu: A New Approach for Visual Cryptography. Des. Codes Cryptography 27(3): 207-227 (2002)
21EEWen-Guey Tzeng: Corrections to "A Secure Fault-Tolerant Conference-Key Agreement Protocol". IEEE Trans. Computers 51(12): 1462 (2002)
20EEWen-Guey Tzeng: A Secure Fault-Tolerant Conference-Key Agreement Protocol. IEEE Trans. Computers 51(4): 373-379 (2002)
19EEWen-Guey Tzeng: A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. IEEE Trans. Knowl. Data Eng. 14(1): 182-188 (2002)
2001
18EEWen-Guey Tzeng, Zhi-Jia Tzeng: A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Public Key Cryptography 2001: 207-224
17EEWen-Guey Tzeng, Zhi-Jia Tzeng: Robust Forward-Secure Signature Schemes with Proactive Security. Public Key Cryptography 2001: 264-276
16EEZhi-Jia Tzeng, Wen-Guey Tzeng: Practical and Efficient Electronic Voting Schemes. J. Inf. Sci. Eng. 17(6): 865-877 (2001)
2000
15EEWen-Guey Tzeng, Zhi-Jia Tzeng: Round-Efficient Conference Key Agreement Protocols with Provable Security. ASIACRYPT 2000: 614-628
14 Wen-Guey Tzeng: A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol. Public Key Cryptography 2000: 1-13
1999
13EEWen-Guey Tzeng, Chi-Ming Hu: Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols. Inf. Process. Lett. 69(6): 297-302 (1999)
12EEWen-Guey Tzeng: Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations. Inf. Process. Lett. 70(3): 153-156 (1999)
11 Wen-Guey Tzeng, Gow-Hsing King: Three-Quarter Approximation for the Number of Unused Colors in Graph Coloring. Inf. Sci. 114(1-4): 105-126 (1999)
10EEGow-Hsing King, Wen-Guey Tzeng: A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix. J. Inf. Sci. Eng. 15(3): 337-352 (1999)
1998
9 Kuen-Feng Chu, Wen-Guey Tzeng, Ping-Jer Yeh, Shyan-Ming Yuan: An Integrated System for Multilevel Secure Compound Documents. WebNet 1998
1997
8EEGow-Hsing King, Wen-Guey Tzeng: On-Line Algorithms for the Dominating Set Problem. Inf. Process. Lett. 61(1): 11-14 (1997)
1996
7EEMin-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang: An access control scheme based on Chinese remainder theorem and time stamp concept. Computers & Security 15(1): 73-81 (1996)
6EEWen-Guey Tzeng: On Path Equivalence of Nondeterministic Finite Automata. Inf. Process. Lett. 58(1): 43-46 (1996)
1992
5 Wen-Guey Tzeng: Learning Probabilistic Automata and Markov Chains via Queries. Machine Learning 8: 151-166 (1992)
4 Wen-Guey Tzeng: A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata. SIAM J. Comput. 21(2): 216-227 (1992)
1991
3 Ker-I Ko, Wen-Guey Tzeng: Three Sigma^p_2-Complete Problems in Computational Learning Theory. Computational Complexity 1: 269-310 (1991)
1990
2 Ker-I Ko, Assaf Marron, Wen-Guey Tzeng: Learning String Patterns and Tree Patterns from Examples. ML 1990: 384-391
1989
1 Wen-Guey Tzeng: The Equivalence and Learning of Probabilistic Automata (Extended Abstract) FOCS 1989: 268-273

Coauthor Index

1Cheng-Kang Chu [25] [28] [33] [36] [38] [40] [41] [42]
2Kuen-Feng Chu [9]
3Chi-Ming Hu [13] [22] [34] [39]
4Min-Shiang Hwang [7] [27]
5Gow-Hsing King [8] [10] [11]
6Ker-I Ko [2] [3]
7Chia-Jung Lee [31]
8Hsiao-Ying Lin [35]
9Shun-Chieh Lin [26]
10Li-Shan Liu [28]
11Yi-Ru Liu [43]
12Chi-Jen Lu [31]
13Assaf Marron [2]
14Shi-Chun Tsai [30] [31]
15Wen-Hsiang Tsai [26]
16Shian-Shyong Tseng [26]
17Zhi-Jia Tzeng [15] [16] [17] [18] [24] [32]
18Hsin-Lung Wu [30]
19Wei-Pang Yang [7]
20Ping-Jer Yeh [9]
21Shyan-Ming Yuan [9] [26]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)