2008 |
47 | | Tzong-Chen Wu,
Chin-Laung Lei,
Vincent Rijmen,
Der-Tsai Lee:
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
Springer 2008 |
46 | EE | Hung-Yu Chien,
Tzong-Chen Wu:
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model.
ISI Workshops 2008: 69-76 |
45 | EE | Chia-Hsin Owen Chen,
Chung-Wei Chen,
Cynthia Kuo,
Yan-Hao Lai,
Jonathan M. McCune,
Ahren Studer,
Adrian Perrig,
Bo-Yin Yang,
Tzong-Chen Wu:
GAnGS: gather, authenticate 'n group securely.
MOBICOM 2008: 92-103 |
44 | EE | Tzong-Sun Wu,
Chien-Lung Hsu,
Kuo-Yu Tsai,
Han-Yu Lin,
Tzong-Chen Wu:
Convertible multi-authenticated encryption scheme.
Inf. Sci. 178(1): 256-263 (2008) |
43 | EE | Tzong-Chen Wu,
Thsia-Tzu Huang,
Chien-Lung Hsu,
Kuo-Yu Tsai:
Recursive protocol for group-oriented authentication with key distribution.
Journal of Systems and Software 81(7): 1227-1239 (2008) |
2007 |
42 | EE | Yu-Li Lin,
Tzong-Chen Wu,
Chien-Lung Hsu,
Yen-Chun Chou:
Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics.
FGCN (2) 2007: 154-158 |
2005 |
41 | | Wei-Hua He,
Chih-Wen Wang,
Tzong-Chen Wu:
Joint Window Nonadjacent Form.
FCS 2005: 154-160 |
40 | EE | C. Abe,
I. L. Lin,
T. H. Lan,
Tzong-Chen Wu:
Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence.
SADFE 2005: 56-68 |
39 | EE | Chih-Yin Lin,
Tzong-Chen Wu,
Fangguo Zhang,
Jing-Jang Hwang:
New identity-based society oriented signature schemes from pairings on elliptic curves.
Applied Mathematics and Computation 160(1): 245-260 (2005) |
2004 |
38 | EE | Chih-Yin Lin,
Tzong-Chen Wu:
An Identity-based Ring Signature Scheme from Bilinear Pairings.
AINA (2) 2004: 182-186 |
37 | EE | Chien-Lung Hsu,
Tzong-Sun Wu,
Tzong-Chen Wu:
Group-oriented signature scheme with distinguished signing authoritie.
Future Generation Comp. Syst. 20(5): 865-873 (2004) |
2002 |
36 | EE | Chien-Lung Hsu,
Tzong-Sun Wu,
Tzong-Chen Wu:
Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett. 81(1): 41-45 (2002) |
35 | EE | Wei-Hua He,
Tzong-Chen Wu,
Chih-Yin Lin:
Remarks on Using RSA With Low Exponent in a Public Network.
J. Inf. Sci. Eng. 18(2): 341-344 (2002) |
2001 |
34 | EE | Yu-Kumg Chen,
Shuo-Yan Chou,
Tzong-Chen Wu:
An Efficient Method for Computing the Feasible Region with Translational Containment between Two Convex Polygons.
ICDCS Workshops 2001: 390-395 |
33 | | Chih-Yin Lin,
Tzong-Chen Wu,
Jing-Jang Hwang:
ID-Based Structured Mulitsignature Schemes.
Network Security 2001: 45-60 |
32 | | Tzong-Chen Wu,
Chin-Chen Chang:
Cryptographic key assignment scheme for hierarchical access control.
Comput. Syst. Sci. Eng. 16(1): 25-28 (2001) |
31 | | Tzong-Chen Wu:
Digital signature/multisignature schemes giving public key verification and message recovery simultaneously.
Comput. Syst. Sci. Eng. 16(6): 329-337 (2001) |
30 | EE | Hung-Yu Chien,
Tzong-Chen Wu,
Jinn-ke Jan,
Yuh-Min Tseng:
Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett. 80(2): 113-117 (2001) |
29 | EE | Tzong-Chen Wu,
Chih-Chan Huang,
D.-J. Guan:
Delegated multisignature scheme with document decomposition.
Journal of Systems and Software 55(3): 321-328 (2001) |
28 | EE | Chien-Lung Hsu,
Tzong-Sun Wu,
Tzong-Chen Wu:
New nonrepudiable threshold proxy signature scheme with known signers.
Journal of Systems and Software 58(2): 119-124 (2001) |
2000 |
27 | EE | Yuh-Shihng Chang,
Tzong-Chen Wu,
Shih-Chan Huang:
ElGamal-like digital signature and multisignature schemes using self-certified public keys.
Journal of Systems and Software 50(2): 99-105 (2000) |
1999 |
26 | EE | Wei-Hua He,
Tzong-Chen Wu:
Cryptanalysis of Lee and Chang's ID-based information security functions.
Computer Communications 22(8): 723-726 (1999) |
25 | EE | Tzong-Chen Wu,
Yuh-Shihng Chang:
Authorization-based Group-oriented Secure Broadcasting System.
J. Inf. Sci. Eng. 15(5): 653-667 (1999) |
1998 |
24 | EE | Yuh-Shihng Chang,
Tzong-Chen Wu:
Group-oriented authentication mechanism with key exchange.
Computer Communications 21(5): 485-497 (1998) |
1997 |
23 | EE | Tzong-Chen Wu,
Ru-Lan Su:
ID-based group-oriented cryptosystem and its digital signature scheme.
Computer Communications 20(11): 1019-1026 (1997) |
22 | | Chin-Chen Chang,
Der-Chyuan Lou,
Tzong-Chen Wu:
A Binary Access Control Method Using Prime Factorization.
Inf. Sci. 96(1&2): 15-26 (1997) |
21 | EE | Tzong-Chen Wu,
Jason Cheng:
Retrieving similar pictures from iconic databases using G-tree.
Pattern Recognition Letters 18(6): 595-603 (1997) |
1996 |
20 | EE | Tzong-Chen Wu,
Shu-Lin Chou,
Tzong-Sun Wu:
Two ID-based multisignature protocols for sequential and broadcasting architectures.
Computer Communications 19(9-10): 851-856 (1996) |
19 | EE | Tzong-Chen Wu,
Hung-Sung Sung:
Authenticating passwords over an insecure channel.
Computers & Security 15(5): 431-439 (1996) |
18 | EE | Tzong-Chen Wu,
Hung-Sung Sung:
An Improved One-Time Digital Signature Scheme Based on One-Way Function.
J. Inf. Sci. Eng. 12(3): 387-395 (1996) |
1995 |
17 | | Chin-Chen Chang,
Tzong-Chen Wu,
Chi-Sung Laih:
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Computer Communications 18(1): 45-47 (1995) |
16 | EE | Tzong-Chen Wu:
Remote login authentication scheme based on a geometric approach.
Computer Communications 18(12): 959-963 (1995) |
15 | EE | Tzong-Chen Wu,
Tzong-Sun Wu:
Group commitment protocol based on zero knowledge proofs.
Computer Communications 18(9): 654-656 (1995) |
14 | EE | Tzong-Chen Wu,
Wei-Hua He:
A geometric approach for sharing secrets.
Computers & Security 14(2): 135-145 (1995) |
13 | EE | Chin-Chen Chang,
Tzong-Chen Wu:
An exact match retrieval scheme based upon principal component analysis.
Pattern Recognition Letters 16(5): 465-470 (1995) |
1994 |
12 | EE | Chin-Chen Chang,
Jao-Ji Shen,
Tzong-Chen Wu:
Access control with binary keys.
Computers & Security 13(8): 681-686 (1994) |
11 | | Tzong-Chen Wu,
Chin-Chen Chang:
Controlling Access in Tree Hierarchies.
Inf. Sci. 78(1-2): 69-76 (1994) |
10 | EE | Tzong-Chen Wu,
Chin-Chen Chang:
Application of geometric hashing to iconic database retrieval.
Pattern Recognition Letters 15(9): 871-876 (1994) |
1993 |
9 | | Chin-Chen Chang,
Huey-Cheue Kowng,
Tzong-Chen Wu:
A Refinement of a Compression-Oriented Addressing Scheme.
BIT 33(4): 530-535 (1993) |
8 | | Chin-Chen Chang,
Tzong-Chen Wu:
Controlling the Access Requests in an Information Protection System.
Inf. Process. Manage. 29(1): 61-68 (1993) |
7 | | Tzong-Chen Wu,
Yi-Shiung Yeh,
Chin-Chen Chang:
Algebraic operations on encryped relational databases.
Inf. Syst. 18(1): 55-62 (1993) |
6 | EE | Chin-Chen Chang,
Tzong-Chen Wu:
A hashing-oriented nearest neighbor searching scheme.
Pattern Recognition Letters 14(8): 625-630 (1993) |
1992 |
5 | | Chin-Chen Chang,
Tzong-Chen Wu,
C. P. Chen:
The Design of a Conference Key Distribution System.
AUSCRYPT 1992: 459-466 |
4 | | Chin-Chen Chang,
Tzong-Chen Wu:
Retrieving the Most Similar Symbolic Pictures from Pictorial Databases.
Inf. Process. Manage. 28(5): 581-588 (1992) |
3 | | Chin-Chen Chang,
Ren-Junn Hwang,
Tzong-Chen Wu:
Crypographic key assignment scheme for access control in a hierarchy.
Inf. Syst. 17(3): 243-247 (1992) |
1991 |
2 | | Chu-Hsing Lin,
Chin-Chen Chang,
Tzong-Chen Wu,
Richard C. T. Lee:
Password authentication using Newton's interpolating polynomials.
Inf. Syst. 16(1): 97-102 (1991) |
1 | | Chin-Chen Chang,
Tzong-Chen Wu:
A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression.
Softw., Pract. Exper. 21(1): 35-49 (1991) |