dblp.uni-trier.dewww.uni-trier.de

Tzong-Chen Wu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
47 Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings Springer 2008
46EEHung-Yu Chien, Tzong-Chen Wu: Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. ISI Workshops 2008: 69-76
45EEChia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu: GAnGS: gather, authenticate 'n group securely. MOBICOM 2008: 92-103
44EETzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu: Convertible multi-authenticated encryption scheme. Inf. Sci. 178(1): 256-263 (2008)
43EETzong-Chen Wu, Thsia-Tzu Huang, Chien-Lung Hsu, Kuo-Yu Tsai: Recursive protocol for group-oriented authentication with key distribution. Journal of Systems and Software 81(7): 1227-1239 (2008)
2007
42EEYu-Li Lin, Tzong-Chen Wu, Chien-Lung Hsu, Yen-Chun Chou: Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics. FGCN (2) 2007: 154-158
2005
41 Wei-Hua He, Chih-Wen Wang, Tzong-Chen Wu: Joint Window Nonadjacent Form. FCS 2005: 154-160
40EEC. Abe, I. L. Lin, T. H. Lan, Tzong-Chen Wu: Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence. SADFE 2005: 56-68
39EEChih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang, Jing-Jang Hwang: New identity-based society oriented signature schemes from pairings on elliptic curves. Applied Mathematics and Computation 160(1): 245-260 (2005)
2004
38EEChih-Yin Lin, Tzong-Chen Wu: An Identity-based Ring Signature Scheme from Bilinear Pairings. AINA (2) 2004: 182-186
37EEChien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: Group-oriented signature scheme with distinguished signing authoritie. Future Generation Comp. Syst. 20(5): 865-873 (2004)
2002
36EEChien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inf. Process. Lett. 81(1): 41-45 (2002)
35EEWei-Hua He, Tzong-Chen Wu, Chih-Yin Lin: Remarks on Using RSA With Low Exponent in a Public Network. J. Inf. Sci. Eng. 18(2): 341-344 (2002)
2001
34EEYu-Kumg Chen, Shuo-Yan Chou, Tzong-Chen Wu: An Efficient Method for Computing the Feasible Region with Translational Containment between Two Convex Polygons. ICDCS Workshops 2001: 390-395
33 Chih-Yin Lin, Tzong-Chen Wu, Jing-Jang Hwang: ID-Based Structured Mulitsignature Schemes. Network Security 2001: 45-60
32 Tzong-Chen Wu, Chin-Chen Chang: Cryptographic key assignment scheme for hierarchical access control. Comput. Syst. Sci. Eng. 16(1): 25-28 (2001)
31 Tzong-Chen Wu: Digital signature/multisignature schemes giving public key verification and message recovery simultaneously. Comput. Syst. Sci. Eng. 16(6): 329-337 (2001)
30EEHung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng: Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. Inf. Process. Lett. 80(2): 113-117 (2001)
29EETzong-Chen Wu, Chih-Chan Huang, D.-J. Guan: Delegated multisignature scheme with document decomposition. Journal of Systems and Software 55(3): 321-328 (2001)
28EEChien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software 58(2): 119-124 (2001)
2000
27EEYuh-Shihng Chang, Tzong-Chen Wu, Shih-Chan Huang: ElGamal-like digital signature and multisignature schemes using self-certified public keys. Journal of Systems and Software 50(2): 99-105 (2000)
1999
26EEWei-Hua He, Tzong-Chen Wu: Cryptanalysis of Lee and Chang's ID-based information security functions. Computer Communications 22(8): 723-726 (1999)
25EETzong-Chen Wu, Yuh-Shihng Chang: Authorization-based Group-oriented Secure Broadcasting System. J. Inf. Sci. Eng. 15(5): 653-667 (1999)
1998
24EEYuh-Shihng Chang, Tzong-Chen Wu: Group-oriented authentication mechanism with key exchange. Computer Communications 21(5): 485-497 (1998)
1997
23EETzong-Chen Wu, Ru-Lan Su: ID-based group-oriented cryptosystem and its digital signature scheme. Computer Communications 20(11): 1019-1026 (1997)
22 Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu: A Binary Access Control Method Using Prime Factorization. Inf. Sci. 96(1&2): 15-26 (1997)
21EETzong-Chen Wu, Jason Cheng: Retrieving similar pictures from iconic databases using G-tree. Pattern Recognition Letters 18(6): 595-603 (1997)
1996
20EETzong-Chen Wu, Shu-Lin Chou, Tzong-Sun Wu: Two ID-based multisignature protocols for sequential and broadcasting architectures. Computer Communications 19(9-10): 851-856 (1996)
19EETzong-Chen Wu, Hung-Sung Sung: Authenticating passwords over an insecure channel. Computers & Security 15(5): 431-439 (1996)
18EETzong-Chen Wu, Hung-Sung Sung: An Improved One-Time Digital Signature Scheme Based on One-Way Function. J. Inf. Sci. Eng. 12(3): 387-395 (1996)
1995
17 Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih: Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Computer Communications 18(1): 45-47 (1995)
16EETzong-Chen Wu: Remote login authentication scheme based on a geometric approach. Computer Communications 18(12): 959-963 (1995)
15EETzong-Chen Wu, Tzong-Sun Wu: Group commitment protocol based on zero knowledge proofs. Computer Communications 18(9): 654-656 (1995)
14EETzong-Chen Wu, Wei-Hua He: A geometric approach for sharing secrets. Computers & Security 14(2): 135-145 (1995)
13EEChin-Chen Chang, Tzong-Chen Wu: An exact match retrieval scheme based upon principal component analysis. Pattern Recognition Letters 16(5): 465-470 (1995)
1994
12EEChin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu: Access control with binary keys. Computers & Security 13(8): 681-686 (1994)
11 Tzong-Chen Wu, Chin-Chen Chang: Controlling Access in Tree Hierarchies. Inf. Sci. 78(1-2): 69-76 (1994)
10EETzong-Chen Wu, Chin-Chen Chang: Application of geometric hashing to iconic database retrieval. Pattern Recognition Letters 15(9): 871-876 (1994)
1993
9 Chin-Chen Chang, Huey-Cheue Kowng, Tzong-Chen Wu: A Refinement of a Compression-Oriented Addressing Scheme. BIT 33(4): 530-535 (1993)
8 Chin-Chen Chang, Tzong-Chen Wu: Controlling the Access Requests in an Information Protection System. Inf. Process. Manage. 29(1): 61-68 (1993)
7 Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang: Algebraic operations on encryped relational databases. Inf. Syst. 18(1): 55-62 (1993)
6EEChin-Chen Chang, Tzong-Chen Wu: A hashing-oriented nearest neighbor searching scheme. Pattern Recognition Letters 14(8): 625-630 (1993)
1992
5 Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen: The Design of a Conference Key Distribution System. AUSCRYPT 1992: 459-466
4 Chin-Chen Chang, Tzong-Chen Wu: Retrieving the Most Similar Symbolic Pictures from Pictorial Databases. Inf. Process. Manage. 28(5): 581-588 (1992)
3 Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu: Crypographic key assignment scheme for access control in a hierarchy. Inf. Syst. 17(3): 243-247 (1992)
1991
2 Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee: Password authentication using Newton's interpolating polynomials. Inf. Syst. 16(1): 97-102 (1991)
1 Chin-Chen Chang, Tzong-Chen Wu: A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression. Softw., Pract. Exper. 21(1): 35-49 (1991)

Coauthor Index

1C. Abe [40]
2Chin-Chen Chang [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [17] [22] [32]
3Yuh-Shihng Chang [24] [25] [27]
4C. P. Chen [5]
5Chia-Hsin Owen Chen [45]
6Chung-Wei Chen [45]
7Yu-Kumg Chen [34]
8Jason Cheng [21]
9Hung-Yu Chien [30] [46]
10Shu-Lin Chou [20]
11Shuo-Yan Chou [34]
12Yen-Chun Chou [42]
13D.-J. Guan [29]
14Wei-Hua He [14] [26] [35] [41]
15Chien-Lung Hsu [28] [36] [37] [42] [43] [44]
16Chih-Chan Huang [29]
17Shih-Chan Huang [27]
18Thsia-Tzu Huang [43]
19Jing-Jang Hwang [33] [39]
20Ren-Junn Hwang [3]
21Jinn-ke Jan [30]
22Huey-Cheue Kowng [9]
23Cynthia Kuo [45]
24Yan-Hao Lai [45]
25Chi-Sung Laih [17]
26T. H. Lan [40]
27Der-Tsai Lee [47]
28Richard C. T. Lee (Richard Chia-Tung Lee) [2]
29Chin-Laung Lei [47]
30Chih-Yin Lin [33] [35] [38] [39]
31Chu-Hsing Lin [2]
32Han-Yu Lin [44]
33I. L. Lin [40]
34Yu-Li Lin [42]
35Der-Chyuan Lou [22]
36Jonathan M. McCune [45]
37Adrian Perrig [45]
38Vincent Rijmen [47]
39Jao-Ji Shen [12]
40Ahren Studer [45]
41Ru-Lan Su [23]
42Hung-Sung Sung [18] [19]
43Kuo-Yu Tsai [43] [44]
44Yuh-Min Tseng [30]
45Chih-Wen Wang [41]
46Tzong-Sun Wu [15] [20] [28] [36] [37] [44]
47Bo-Yin Yang [45]
48Yi-Shiung Yeh [7]
49Fangguo Zhang [39]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)