2005 | ||
---|---|---|
6 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Des. Codes Cryptography 35(1): 47-61 (2005) |
2002 | ||
5 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: Robust Key-Evolving Public Key Encryption Schemes. ICICS 2002: 61-72 |
2001 | ||
4 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Public Key Cryptography 2001: 207-224 |
3 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: Robust Forward-Secure Signature Schemes with Proactive Security. Public Key Cryptography 2001: 264-276 |
2 | EE | Zhi-Jia Tzeng, Wen-Guey Tzeng: Practical and Efficient Electronic Voting Schemes. J. Inf. Sci. Eng. 17(6): 865-877 (2001) |
2000 | ||
1 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: Round-Efficient Conference Key Agreement Protocols with Provable Security. ASIACRYPT 2000: 614-628 |
1 | Wen-Guey Tzeng | [1] [2] [3] [4] [5] [6] |