Shiang-Feng Tzeng

According to our database1, Shiang-Feng Tzeng authored at least 26 papers between 2003 and 2017.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs.
IEEE Trans. Vehicular Technology, 2017

2015
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
Inf. Sci., 2015

2014
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs.
Wireless Personal Communications, 2014

VANET-based Secure Value-Added Services.
Proceedings of the 2014 International Conference on Social Computing, Beijing, China, August 04, 2014

2013
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET.
IEEE Trans. Information Forensics and Security, 2013

Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles.
TIIS, 2013

A new proxy signature scheme for a specified group of verifiers.
Inf. Sci., 2013

2012
Enhancement of Generalized Ring Signatures with Convertibility.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

2011
A Batch Verification for Multiple Proxy Signature.
Parallel Processing Letters, 2011

A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy.
I. J. Network Security, 2011

2009
A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem.
Int. J. Found. Comput. Sci., 2009

2008
An Improvement of Strong Proxy Signature and Its Applications.
Proceedings of the SECRYPT 2008, 2008

An Ordered Multi-proxy Multi-signature Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
A new convertible authenticated encryption scheme with message linkages.
Computers & Electrical Engineering, 2007

A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period.
Proceedings of the Computational Science and Its Applications, 2007

2005
A secure on-line software transaction scheme.
Computer Standards & Interfaces, 2005

Improvement of signature scheme based on factoring and discrete logarithms.
Applied Mathematics and Computation, 2005

2004
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers.
Journal of Systems and Software, 2004

A new digital signature scheme based on factoring and discrete logarithms.
Int. J. Comput. Math., 2004

A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Future Generation Comp. Syst., 2004

Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem.
Computer Standards & Interfaces, 2004

Generalization of proxy signature based on elliptic curves.
Computer Standards & Interfaces, 2004

An improvement of nonrepudiable threshold proxy signature scheme with known signers.
Computers & Security, 2004

2003
A New Digital Multisignature Scheme With Distinguished Signing Authorities.
J. Inf. Sci. Eng., 2003

Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci., 2003

Generalization of proxy signature-based on discrete logarithms.
Computers & Security, 2003


  Loading...