2008 | ||
---|---|---|
47 | Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings Springer 2008 | |
46 | EE | Hung-Yu Chien, Tzong-Chen Wu: Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. ISI Workshops 2008: 69-76 |
45 | EE | Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu: GAnGS: gather, authenticate 'n group securely. MOBICOM 2008: 92-103 |
44 | EE | Tzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu: Convertible multi-authenticated encryption scheme. Inf. Sci. 178(1): 256-263 (2008) |
43 | EE | Tzong-Chen Wu, Thsia-Tzu Huang, Chien-Lung Hsu, Kuo-Yu Tsai: Recursive protocol for group-oriented authentication with key distribution. Journal of Systems and Software 81(7): 1227-1239 (2008) |
2007 | ||
42 | EE | Yu-Li Lin, Tzong-Chen Wu, Chien-Lung Hsu, Yen-Chun Chou: Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics. FGCN (2) 2007: 154-158 |
2005 | ||
41 | Wei-Hua He, Chih-Wen Wang, Tzong-Chen Wu: Joint Window Nonadjacent Form. FCS 2005: 154-160 | |
40 | EE | C. Abe, I. L. Lin, T. H. Lan, Tzong-Chen Wu: Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence. SADFE 2005: 56-68 |
39 | EE | Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang, Jing-Jang Hwang: New identity-based society oriented signature schemes from pairings on elliptic curves. Applied Mathematics and Computation 160(1): 245-260 (2005) |
2004 | ||
38 | EE | Chih-Yin Lin, Tzong-Chen Wu: An Identity-based Ring Signature Scheme from Bilinear Pairings. AINA (2) 2004: 182-186 |
37 | EE | Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: Group-oriented signature scheme with distinguished signing authoritie. Future Generation Comp. Syst. 20(5): 865-873 (2004) |
2002 | ||
36 | EE | Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inf. Process. Lett. 81(1): 41-45 (2002) |
35 | EE | Wei-Hua He, Tzong-Chen Wu, Chih-Yin Lin: Remarks on Using RSA With Low Exponent in a Public Network. J. Inf. Sci. Eng. 18(2): 341-344 (2002) |
2001 | ||
34 | EE | Yu-Kumg Chen, Shuo-Yan Chou, Tzong-Chen Wu: An Efficient Method for Computing the Feasible Region with Translational Containment between Two Convex Polygons. ICDCS Workshops 2001: 390-395 |
33 | Chih-Yin Lin, Tzong-Chen Wu, Jing-Jang Hwang: ID-Based Structured Mulitsignature Schemes. Network Security 2001: 45-60 | |
32 | Tzong-Chen Wu, Chin-Chen Chang: Cryptographic key assignment scheme for hierarchical access control. Comput. Syst. Sci. Eng. 16(1): 25-28 (2001) | |
31 | Tzong-Chen Wu: Digital signature/multisignature schemes giving public key verification and message recovery simultaneously. Comput. Syst. Sci. Eng. 16(6): 329-337 (2001) | |
30 | EE | Hung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng: Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. Inf. Process. Lett. 80(2): 113-117 (2001) |
29 | EE | Tzong-Chen Wu, Chih-Chan Huang, D.-J. Guan: Delegated multisignature scheme with document decomposition. Journal of Systems and Software 55(3): 321-328 (2001) |
28 | EE | Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software 58(2): 119-124 (2001) |
2000 | ||
27 | EE | Yuh-Shihng Chang, Tzong-Chen Wu, Shih-Chan Huang: ElGamal-like digital signature and multisignature schemes using self-certified public keys. Journal of Systems and Software 50(2): 99-105 (2000) |
1999 | ||
26 | EE | Wei-Hua He, Tzong-Chen Wu: Cryptanalysis of Lee and Chang's ID-based information security functions. Computer Communications 22(8): 723-726 (1999) |
25 | EE | Tzong-Chen Wu, Yuh-Shihng Chang: Authorization-based Group-oriented Secure Broadcasting System. J. Inf. Sci. Eng. 15(5): 653-667 (1999) |
1998 | ||
24 | EE | Yuh-Shihng Chang, Tzong-Chen Wu: Group-oriented authentication mechanism with key exchange. Computer Communications 21(5): 485-497 (1998) |
1997 | ||
23 | EE | Tzong-Chen Wu, Ru-Lan Su: ID-based group-oriented cryptosystem and its digital signature scheme. Computer Communications 20(11): 1019-1026 (1997) |
22 | Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu: A Binary Access Control Method Using Prime Factorization. Inf. Sci. 96(1&2): 15-26 (1997) | |
21 | EE | Tzong-Chen Wu, Jason Cheng: Retrieving similar pictures from iconic databases using G-tree. Pattern Recognition Letters 18(6): 595-603 (1997) |
1996 | ||
20 | EE | Tzong-Chen Wu, Shu-Lin Chou, Tzong-Sun Wu: Two ID-based multisignature protocols for sequential and broadcasting architectures. Computer Communications 19(9-10): 851-856 (1996) |
19 | EE | Tzong-Chen Wu, Hung-Sung Sung: Authenticating passwords over an insecure channel. Computers & Security 15(5): 431-439 (1996) |
18 | EE | Tzong-Chen Wu, Hung-Sung Sung: An Improved One-Time Digital Signature Scheme Based on One-Way Function. J. Inf. Sci. Eng. 12(3): 387-395 (1996) |
1995 | ||
17 | Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih: Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Computer Communications 18(1): 45-47 (1995) | |
16 | EE | Tzong-Chen Wu: Remote login authentication scheme based on a geometric approach. Computer Communications 18(12): 959-963 (1995) |
15 | EE | Tzong-Chen Wu, Tzong-Sun Wu: Group commitment protocol based on zero knowledge proofs. Computer Communications 18(9): 654-656 (1995) |
14 | EE | Tzong-Chen Wu, Wei-Hua He: A geometric approach for sharing secrets. Computers & Security 14(2): 135-145 (1995) |
13 | EE | Chin-Chen Chang, Tzong-Chen Wu: An exact match retrieval scheme based upon principal component analysis. Pattern Recognition Letters 16(5): 465-470 (1995) |
1994 | ||
12 | EE | Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu: Access control with binary keys. Computers & Security 13(8): 681-686 (1994) |
11 | Tzong-Chen Wu, Chin-Chen Chang: Controlling Access in Tree Hierarchies. Inf. Sci. 78(1-2): 69-76 (1994) | |
10 | EE | Tzong-Chen Wu, Chin-Chen Chang: Application of geometric hashing to iconic database retrieval. Pattern Recognition Letters 15(9): 871-876 (1994) |
1993 | ||
9 | Chin-Chen Chang, Huey-Cheue Kowng, Tzong-Chen Wu: A Refinement of a Compression-Oriented Addressing Scheme. BIT 33(4): 530-535 (1993) | |
8 | Chin-Chen Chang, Tzong-Chen Wu: Controlling the Access Requests in an Information Protection System. Inf. Process. Manage. 29(1): 61-68 (1993) | |
7 | Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang: Algebraic operations on encryped relational databases. Inf. Syst. 18(1): 55-62 (1993) | |
6 | EE | Chin-Chen Chang, Tzong-Chen Wu: A hashing-oriented nearest neighbor searching scheme. Pattern Recognition Letters 14(8): 625-630 (1993) |
1992 | ||
5 | Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen: The Design of a Conference Key Distribution System. AUSCRYPT 1992: 459-466 | |
4 | Chin-Chen Chang, Tzong-Chen Wu: Retrieving the Most Similar Symbolic Pictures from Pictorial Databases. Inf. Process. Manage. 28(5): 581-588 (1992) | |
3 | Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu: Crypographic key assignment scheme for access control in a hierarchy. Inf. Syst. 17(3): 243-247 (1992) | |
1991 | ||
2 | Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee: Password authentication using Newton's interpolating polynomials. Inf. Syst. 16(1): 97-102 (1991) | |
1 | Chin-Chen Chang, Tzong-Chen Wu: A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression. Softw., Pract. Exper. 21(1): 35-49 (1991) |