2007 |
21 | | Chih-Hung Wang,
Chien-Chang Feng:
A Secure E-cash Scheme with Optional Traceability.
Security and Management 2007: 439-445 |
20 | EE | Chih-Hung Wang,
Chih-Yu Liu:
A new ring signature scheme with signer-admission property.
Inf. Sci. 177(3): 747-754 (2007) |
19 | EE | Pei-Hui Huang,
Hsiang-An Wen,
Chih-Hung Wang,
Tzonelih Hwang:
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes.
Informatica, Lith. Acad. Sci. 18(1): 55-60 (2007) |
2006 |
18 | EE | Jen-Ho Yang,
Chin-Chen Chang,
Chih-Hung Wang:
A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme.
UIC 2006: 998-1007 |
17 | EE | Chih-Hung Wang,
Chih-Heng Yin,
Chieh-His Juan:
How to protect exchanged secrets in the fair exchange protocol with off-line TTP.
Computers & Electrical Engineering 32(5): 364-375 (2006) |
16 | EE | Chih-Hung Wang,
Chih-Heng Yin:
Practical Implementations of a Non-disclosure Fair Contract Signing Protocol.
IEICE Transactions 89-A(1): 297-309 (2006) |
15 | EE | Chih-Hung Wang:
Practical Constructions to Multiple Designated Confirmer Signatures.
J. Inf. Sci. Eng. 22(6): 1389-1407 (2006) |
2005 |
14 | EE | Jen-Ho Yang,
Chin-Chen Chang,
Chih-Hung Wang:
An iterative modular multiplication algorithm in RNS.
Applied Mathematics and Computation 171(1): 637-645 (2005) |
13 | EE | Chih-Hung Wang,
Yan-Sheng Kuo:
An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability.
Operating Systems Review 39(4): 66-79 (2005) |
2004 |
12 | EE | Chih-Hung Wang,
Yen-Cheng Chen:
Proxy Confirmation Signatures.
Informatica, Lith. Acad. Sci. 15(3): 425-437 (2004) |
2003 |
11 | EE | Chih-Hung Wang:
Untraceable Fair Network Payment Protocols with Off-Line TTP.
ASIACRYPT 2003: 173-187 |
1999 |
10 | EE | Jiun-Jang Tsai,
Tzonelih Hwang,
Chih-Hung Wang:
New generalized group-oriented cryptosystem based on Diffie-Hellman scheme.
Computer Communications 22(8): 727-729 (1999) |
9 | EE | Chih-Hung Wang,
Tzonelih Hwang,
Narn-Yih Lee:
Comments on Two Group Signatures.
Inf. Process. Lett. 69(2): 95-97 (1999) |
8 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chih-Hung Wang:
The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures.
Inf. Process. Lett. 70(2): 79-81 (1999) |
1998 |
7 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chih-Hung Wang:
On Zhang's Nonrepudiable Proxy Signature Schemes.
ACISP 1998: 415-422 |
6 | EE | Tzonelih Hwang,
Chih-Hung Wang:
Arbetrated Unconditionally Secure Authentication Scheme with Multi-Senders.
Inf. Process. Lett. 65(4): 189-193 (1998) |
1997 |
5 | EE | Chih-Hung Wang,
Tzonelih Hwang:
Threshold and Generalized DSS Signatures without a Trusted Party.
ACSAC 1997: 221-226 |
4 | | Tzonelih Hwang,
Chih-Hung Wang:
Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders.
ISW 1997: 266-272 |
3 | EE | Chih-Hung Wang,
Tzonelih Hwang:
Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication.
Computers & Security 16(4): 339-344 (1997) |
1995 |
2 | EE | Chih-Hung Wang,
Tzonelih Hwang,
Jiun-Jang Tsai:
On the Matsumoto and Imai's Human Identification Scheme.
EUROCRYPT 1995: 382-392 |
1 | EE | Tzonelih Hwang,
Narn-Yih Lee,
Chih-Hung Wang,
Ming-Yung Ko:
On the security of Wu and Yeh's conference key distribution system.
Computer Communications 18(12): 978-981 (1995) |