Shiang-Feng Tzeng

According to our database1, Shiang-Feng Tzeng authored at least 26 papers between 2003 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs.
IEEE Trans. Veh. Technol., 2017

2015
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
Inf. Sci., 2015

2014
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs.
Wirel. Pers. Commun., 2014

VANET-based Secure Value-Added Services.
Proceedings of the 2014 International Conference on Social Computing, Beijing, China, August 04, 2014

2013
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET.
IEEE Trans. Inf. Forensics Secur., 2013

Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles.
KSII Trans. Internet Inf. Syst., 2013

A new proxy signature scheme for a specified group of verifiers.
Inf. Sci., 2013

2012
Enhancement of Generalized Ring Signatures with Convertibility.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

2011
A Batch Verification for Multiple Proxy Signature.
Parallel Process. Lett., 2011

A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy.
Int. J. Netw. Secur., 2011

2009
A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem.
Int. J. Found. Comput. Sci., 2009

2008
An Improvement of Strong Proxy Signature and Its Applications.
Proceedings of the SECRYPT 2008, 2008

An Ordered Multi-proxy Multi-signature Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
A new convertible authenticated encryption scheme with message linkages.
Comput. Electr. Eng., 2007

A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period.
Proceedings of the Computational Science and Its Applications, 2007

2005
A secure on-line software transaction scheme.
Comput. Stand. Interfaces, 2005

Improvement of signature scheme based on factoring and discrete logarithms.
Appl. Math. Comput., 2005

2004
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers.
J. Syst. Softw., 2004

A new digital signature scheme based on factoring and discrete logarithms.
Int. J. Comput. Math., 2004

A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Future Gener. Comput. Syst., 2004

Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem.
Comput. Stand. Interfaces, 2004

Generalization of proxy signature based on elliptic curves.
Comput. Stand. Interfaces, 2004

An improvement of nonrepudiable threshold proxy signature scheme with known signers.
Comput. Secur., 2004

2003
A New Digital Multisignature Scheme With Distinguished Signing Authorities.
J. Inf. Sci. Eng., 2003

Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, 2003

Generalization of proxy signature-based on discrete logarithms.
Comput. Secur., 2003


  Loading...