dblp.uni-trier.dewww.uni-trier.de

Chih-Hung Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
21 Chih-Hung Wang, Chien-Chang Feng: A Secure E-cash Scheme with Optional Traceability. Security and Management 2007: 439-445
20EEChih-Hung Wang, Chih-Yu Liu: A new ring signature scheme with signer-admission property. Inf. Sci. 177(3): 747-754 (2007)
19EEPei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzonelih Hwang: On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes. Informatica, Lith. Acad. Sci. 18(1): 55-60 (2007)
2006
18EEJen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang: A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. UIC 2006: 998-1007
17EEChih-Hung Wang, Chih-Heng Yin, Chieh-His Juan: How to protect exchanged secrets in the fair exchange protocol with off-line TTP. Computers & Electrical Engineering 32(5): 364-375 (2006)
16EEChih-Hung Wang, Chih-Heng Yin: Practical Implementations of a Non-disclosure Fair Contract Signing Protocol. IEICE Transactions 89-A(1): 297-309 (2006)
15EEChih-Hung Wang: Practical Constructions to Multiple Designated Confirmer Signatures. J. Inf. Sci. Eng. 22(6): 1389-1407 (2006)
2005
14EEJen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang: An iterative modular multiplication algorithm in RNS. Applied Mathematics and Computation 171(1): 637-645 (2005)
13EEChih-Hung Wang, Yan-Sheng Kuo: An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability. Operating Systems Review 39(4): 66-79 (2005)
2004
12EEChih-Hung Wang, Yen-Cheng Chen: Proxy Confirmation Signatures. Informatica, Lith. Acad. Sci. 15(3): 425-437 (2004)
2003
11EEChih-Hung Wang: Untraceable Fair Network Payment Protocols with Off-Line TTP. ASIACRYPT 2003: 173-187
1999
10EEJiun-Jang Tsai, Tzonelih Hwang, Chih-Hung Wang: New generalized group-oriented cryptosystem based on Diffie-Hellman scheme. Computer Communications 22(8): 727-729 (1999)
9EEChih-Hung Wang, Tzonelih Hwang, Narn-Yih Lee: Comments on Two Group Signatures. Inf. Process. Lett. 69(2): 95-97 (1999)
8EENarn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang: The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures. Inf. Process. Lett. 70(2): 79-81 (1999)
1998
7EENarn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang: On Zhang's Nonrepudiable Proxy Signature Schemes. ACISP 1998: 415-422
6EETzonelih Hwang, Chih-Hung Wang: Arbetrated Unconditionally Secure Authentication Scheme with Multi-Senders. Inf. Process. Lett. 65(4): 189-193 (1998)
1997
5EEChih-Hung Wang, Tzonelih Hwang: Threshold and Generalized DSS Signatures without a Trusted Party. ACSAC 1997: 221-226
4 Tzonelih Hwang, Chih-Hung Wang: Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. ISW 1997: 266-272
3EEChih-Hung Wang, Tzonelih Hwang: Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication. Computers & Security 16(4): 339-344 (1997)
1995
2EEChih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai: On the Matsumoto and Imai's Human Identification Scheme. EUROCRYPT 1995: 382-392
1EETzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko: On the security of Wu and Yeh's conference key distribution system. Computer Communications 18(12): 978-981 (1995)

Coauthor Index

1Chin-Chen Chang [14] [18]
2Yen-Cheng Chen [12]
3Chien-Chang Feng [21]
4Pei-Hui Huang [19]
5Tzonelih Hwang [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [19]
6Chieh-His Juan [17]
7Ming-Yung Ko [1]
8Yan-Sheng Kuo [13]
9Narn-Yih Lee [1] [7] [8] [9]
10Chih-Yu Liu [20]
11Jiun-Jang Tsai [2] [10]
12Hsiang-An Wen [19]
13Jen-Ho Yang [14] [18]
14Chih-Heng Yin [16] [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)