![]() |
| 2005 | ||
|---|---|---|
| 6 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Des. Codes Cryptography 35(1): 47-61 (2005) |
| 2002 | ||
| 5 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: Robust Key-Evolving Public Key Encryption Schemes. ICICS 2002: 61-72 |
| 2001 | ||
| 4 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Public Key Cryptography 2001: 207-224 |
| 3 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: Robust Forward-Secure Signature Schemes with Proactive Security. Public Key Cryptography 2001: 264-276 |
| 2 | EE | Zhi-Jia Tzeng, Wen-Guey Tzeng: Practical and Efficient Electronic Voting Schemes. J. Inf. Sci. Eng. 17(6): 865-877 (2001) |
| 2000 | ||
| 1 | EE | Wen-Guey Tzeng, Zhi-Jia Tzeng: Round-Efficient Conference Key Agreement Protocols with Provable Security. ASIACRYPT 2000: 614-628 |
| 1 | Wen-Guey Tzeng | [1] [2] [3] [4] [5] [6] |