Tzong-Chen Wu

According to our database1, Tzong-Chen Wu
  • authored at least 89 papers between 1991 and 2018.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 




Policy-Controlled Signature from NTRU Lattice.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
J. Inf. Sci. Eng., 2015

RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model.
IEICE Transactions, 2015

Efficient english auction scheme without a secure channel.
Int. Arab J. Inf. Technol., 2015

Secure anonymous authentication scheme without verification table for mobile satellite communication systems.
Int. J. Satellite Communications Networking, 2014

Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings.
Int. J. Communication Systems, 2014

Secure Handover Authentication Protocol Based on Bilinear Pairings.
Wireless Personal Communications, 2013

A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks.
Wireless Personal Communications, 2013

Novel Anonymous Authentication Scheme Using Smart Cards.
IEEE Trans. Industrial Informatics, 2013

Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks.
Security and Communication Networks, 2013

ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation.
J. Inf. Sci. Eng., 2013

Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks.
J. Inf. Sci. Eng., 2013

Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings.
ITC, 2013

Exploring design-fits for the strategic alignment of information systems with business objectives.
Inf. Res., 2013

Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care.
IJDSN, 2013

ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices.
Ad Hoc & Sensor Wireless Networks, 2013

New Identity-Based Sequential Aggregate Signature Scheme from RSA.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Robust Certificateless Signature Scheme without Bilinear Pairings.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

Two RFID-Based Solutions for Secure Inpatient Medication Administration.
J. Medical Systems, 2012

Establish a secure and trustworthy ICT environment for educational systems: a case study.
J. Intelligent Manufacturing, 2012

A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability.
TIIS, 2012

Secure Delegation-Based Authentication Protocol for Wireless Roaming Service.
IEEE Communications Letters, 2012

Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

Analysis of an eHealth Care System with Smart Card Based Authentication.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

A three-level authenticated conference key establishment protocol for UMTS networks.
Journal of Zhejiang University - Science C, 2011

Two RFID-based Solutions to Enhance Inpatient Medication Safety.
J. Medical Systems, 2011

Wireless-Sensor-Networks-based healthcare system: a survey on the view of communication paradigms.
IJAHUC, 2011

Ownership transfer protocol for RFID objects using lightweight computing operators.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

New Secure Broadcasting Scheme Realizing Information Granularity.
J. Inf. Sci. Eng., 2010

Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks.
IJSN, 2010

Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls.
IJIPT, 2010

New dynamic ID authentication scheme using smart cards.
Int. J. Communication Systems, 2010

Digital product transaction mechanism for electronic auction environment.
IET Information Security, 2010

Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations.
Proceedings of the Communication and Networking, 2010

Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks.
Proceedings of the CISIS 2010, 2010

A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks.
IEICE Transactions, 2009

Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps.
Comput. J., 2009

Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Recursive protocol for group-oriented authentication with key distribution.
Journal of Systems and Software, 2008

Convertible multi-authenticated encryption scheme.
Inf. Sci., 2008

GAnGS: gather, authenticate 'n group securely.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, 2008

Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics.
Proceedings of the Future Generation Communication and Networking, 2007

New identity-based society oriented signature schemes from pairings on elliptic curves.
Applied Mathematics and Computation, 2005

Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Joint Window Nonadjacent Form.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

Group-oriented signature scheme with distinguished signing authoritie.
Future Generation Comp. Syst., 2004

An Identity-based Ring Signature Scheme from Bilinear Pairings.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Vehicular Technology, 2003

A Structured Multisignature Scheme from the Gap Diffie-Hellman Group.
IACR Cryptology ePrint Archive, 2003

An identity-based ring signature scheme from bilinear pairings.
IACR Cryptology ePrint Archive, 2003

Improvement of modified authenticated key agreement protocol.
Applied Mathematics and Computation, 2003

Improvement of threshold proxy signature scheme.
Applied Mathematics and Computation, 2003

Remarks on Using RSA With Low Exponent in a Public Network.
J. Inf. Sci. Eng., 2002

Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002

Delegated multisignature scheme with document decomposition.
Journal of Systems and Software, 2001

New nonrepudiable threshold proxy signature scheme with known signers.
Journal of Systems and Software, 2001

Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett., 2001

Cryptographic key assignment scheme for hierarchical access control.
Comput. Syst. Sci. Eng., 2001

Digital signature/multisignature schemes giving public key verification and message recovery simultaneously.
Comput. Syst. Sci. Eng., 2001

ID-Based Structured Mulitsignature Schemes.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

An Efficient Method for Computing the Feasible Region with Translational Containment between Two Convex Polygons.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

ElGamal-like digital signature and multisignature schemes using self-certified public keys.
Journal of Systems and Software, 2000

Authorization-based Group-oriented Secure Broadcasting System.
J. Inf. Sci. Eng., 1999

Cryptanalysis of Lee and Chang's ID-based information security functions.
Computer Communications, 1999

Group-oriented authentication mechanism with key exchange.
Computer Communications, 1998

Retrieving similar pictures from iconic databases using G-tree.
Pattern Recognition Letters, 1997

A Binary Access Control Method Using Prime Factorization.
Inf. Sci., 1997

ID-based group-oriented cryptosystem and its digital signature scheme.
Computer Communications, 1997

An Improved One-Time Digital Signature Scheme Based on One-Way Function.
J. Inf. Sci. Eng., 1996

Authenticating passwords over an insecure channel.
Computers & Security, 1996

Two ID-based multisignature protocols for sequential and broadcasting architectures.
Computer Communications, 1996

An exact match retrieval scheme based upon principal component analysis.
Pattern Recognition Letters, 1995

A geometric approach for sharing secrets.
Computers & Security, 1995

Group commitment protocol based on zero knowledge proofs.
Computer Communications, 1995

Remote login authentication scheme based on a geometric approach.
Computer Communications, 1995

Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Computer Communications, 1995

Application of geometric hashing to iconic database retrieval.
Pattern Recognition Letters, 1994

Controlling Access in Tree Hierarchies.
Inf. Sci., 1994

Access control with binary keys.
Computers & Security, 1994

A hashing-oriented nearest neighbor searching scheme.
Pattern Recognition Letters, 1993

Algebraic operations on encryped relational databases.
Inf. Syst., 1993

Controlling the Access Requests in an Information Protection System.
Inf. Process. Manage., 1993

A Refinement of a Compression-Oriented Addressing Scheme.
BIT, 1993

Crypographic key assignment scheme for access control in a hierarchy.
Inf. Syst., 1992

Retrieving the Most Similar Symbolic Pictures from Pictorial Databases.
Inf. Process. Manage., 1992

The Design of a Conference Key Distribution System.
Proceedings of the Advances in Cryptology, 1992

A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression.
Softw., Pract. Exper., 1991

Password authentication using Newton's interpolating polynomials.
Inf. Syst., 1991