dblp.uni-trier.dewww.uni-trier.de

Tzong-Sun Wu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
14EETzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu: Convertible multi-authenticated encryption scheme. Inf. Sci. 178(1): 256-263 (2008)
2005
13EEChien-Lung Hsu, Tzong-Sun Wu, Wei-Hua He: New proxy multi-signature scheme. Applied Mathematics and Computation 162(3): 1201-1206 (2005)
12EEChien-Lung Hsu, Tzong-Sun Wu: Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability. Applied Mathematics and Computation 164(1): 201-225 (2005)
11EEChien-Lung Hsu, Tzong-Sun Wu: Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack. Applied Mathematics and Computation 168(1): 305-319 (2005)
2004
10EETzong-Sun Wu, Chien-Lung Hsu: Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computers & Security 23(2): 120-125 (2004)
9EEChien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: Group-oriented signature scheme with distinguished signing authoritie. Future Generation Comp. Syst. 20(5): 865-873 (2004)
2003
8EEChien-Lung Hsu, Tzong-Sun Wu: Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Computers & Security 22(5): 453-456 (2003)
7EETzong-Sun Wu, Chien-Lung Hsu, Han-Yu Lin, Po-Sheng Huang: Improvement of the Miyazaki-Takaragi threshold digital signature scheme. Inf. Process. Lett. 88(4): 183-186 (2003)
6EETzong-Sun Wu, Chien-Lung Hsu: Threshold signature scheme using self-certified public keys. Journal of Systems and Software 67(2): 89-97 (2003)
2002
5EEChien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inf. Process. Lett. 81(1): 41-45 (2002)
4EETzong-Sun Wu, Chien-Lung Hsu: Convertible authenticated encryption scheme. Journal of Systems and Software 62(3): 205-209 (2002)
2001
3EEChien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu: New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software 58(2): 119-124 (2001)
1996
2EETzong-Chen Wu, Shu-Lin Chou, Tzong-Sun Wu: Two ID-based multisignature protocols for sequential and broadcasting architectures. Computer Communications 19(9-10): 851-856 (1996)
1995
1EETzong-Chen Wu, Tzong-Sun Wu: Group commitment protocol based on zero knowledge proofs. Computer Communications 18(9): 654-656 (1995)

Coauthor Index

1Shu-Lin Chou [2]
2Wei-Hua He [13]
3Chien-Lung Hsu [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14]
4Po-Sheng Huang [7]
5Han-Yu Lin [7] [14]
6Kuo-Yu Tsai [14]
7Tzong-Chen Wu [1] [2] [3] [5] [9] [14]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)