Chao-Wen Chan

According to our database1, Chao-Wen Chan authored at least 16 papers between 2000 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A random increasing sequence hash chain and smart card-based remote user authentication scheme.
Proceedings of the 9th International Conference on Information, 2013

2012
An Improvement to Lee and Hwang's Scheme.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Analysis to Wen and Li's Scheme.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2008
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Improving the Security of the Chien-Jan Protocol for Large Mobile Networks.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

The Improvement of Lee-Chiu's Remote User Authentication Scheme.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A New (t, n)-Threshold Scheme Based on Difference Equations.
Proceedings of the Combinatorics, 2007

2006
Digital opportunity: the digital gap between openness and closeness of relational divide upon the mobile phone usage.
Int. J. Internet Enterp. Manag., 2006

A Scheme for (t, n)-Threshold Secret Image Sharing.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

A New Scheme for the Electronic Coin.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

2005
A scheme for threshold multi-secret sharing.
Appl. Math. Comput., 2005

A Search Scheme Resulting in Mixing Compressed Text Files.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2003
A New Channel for Image Hiding Based on Interpolating polynomials.
Fundam. Informaticae, 2003

Huffman Tree Decomposition and Its Coding Applications.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
Key Exchange Protocols for Multiparty Communication Services.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

2000
Detecting Dealer Cheating in Secret Sharing Systems.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000


  Loading...