Tzong-Chen Wu

According to our database1, Tzong-Chen Wu authored at least 92 papers between 1991 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

2018
Policy-Controlled Signature from NTRU Lattice.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2015
Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
J. Inf. Sci. Eng., 2015

RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model.
IEICE Trans. Inf. Syst., 2015

Efficient english auction scheme without a secure channel.
Int. Arab J. Inf. Technol., 2015

2014
Secure anonymous authentication scheme without verification table for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2014

Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings.
Int. J. Commun. Syst., 2014

2013
Secure Handover Authentication Protocol Based on Bilinear Pairings.
Wirel. Pers. Commun., 2013

A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks.
Wirel. Pers. Commun., 2013

Novel Anonymous Authentication Scheme Using Smart Cards.
IEEE Trans. Ind. Informatics, 2013

Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks.
Secur. Commun. Networks, 2013

Efficient and secure three-party authenticated key exchange protocol for mobile environments.
J. Zhejiang Univ. Sci. C, 2013

ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation.
J. Inf. Sci. Eng., 2013

Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks.
J. Inf. Sci. Eng., 2013

Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings.
Inf. Technol. Control., 2013

Exploring design-fits for the strategic alignment of information systems with business objectives.
Inf. Res., 2013

Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care.
Int. J. Distributed Sens. Networks, 2013

ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices.
Ad Hoc Sens. Wirel. Networks, 2013

New Identity-Based Sequential Aggregate Signature Scheme from RSA.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Robust Certificateless Signature Scheme without Bilinear Pairings.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Two RFID-Based Solutions for Secure Inpatient Medication Administration.
J. Medical Syst., 2012

Establish a secure and trustworthy ICT environment for educational systems: a case study.
J. Intell. Manuf., 2012

A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability.
KSII Trans. Internet Inf. Syst., 2012

Secure Delegation-Based Authentication Protocol for Wireless Roaming Service.
IEEE Commun. Lett., 2012

Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

Analysis of an eHealth Care System with Smart Card Based Authentication.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
A three-level authenticated conference key establishment protocol for UMTS networks.
J. Zhejiang Univ. Sci. C, 2011

Two RFID-based Solutions to Enhance Inpatient Medication Safety.
J. Medical Syst., 2011

Wireless-Sensor-Networks-based healthcare system: a survey on the view of communication paradigms.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Ownership transfer protocol for RFID objects using lightweight computing operators.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks.
J. Zhejiang Univ. Sci. C, 2010

New Secure Broadcasting Scheme Realizing Information Granularity.
J. Inf. Sci. Eng., 2010

Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks.
Int. J. Secur. Networks, 2010

Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls.
Int. J. Internet Protoc. Technol., 2010

New dynamic ID authentication scheme using smart cards.
Int. J. Commun. Syst., 2010

Digital product transaction mechanism for electronic auction environment.
IET Inf. Secur., 2010

Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations.
Proceedings of the Communication and Networking, 2010

Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks.
Proceedings of the CISIS 2010, 2010

2009
A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2009

Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps.
Comput. J., 2009

Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Recursive protocol for group-oriented authentication with key distribution.
J. Syst. Softw., 2008

Convertible multi-authenticated encryption scheme.
Inf. Sci., 2008

GAnGS: gather, authenticate 'n group securely.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics.
Proceedings of the Future Generation Communication and Networking, 2007

2005
New identity-based society oriented signature schemes from pairings on elliptic curves.
Appl. Math. Comput., 2005

Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Joint Window Nonadjacent Form.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

2004
Group-oriented signature scheme with distinguished signing authoritie.
Future Gener. Comput. Syst., 2004

2003
Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Veh. Technol., 2003

A Structured Multisignature Scheme from the Gap Diffie-Hellman Group.
IACR Cryptol. ePrint Arch., 2003

An identity-based ring signature scheme from bilinear pairings.
IACR Cryptol. ePrint Arch., 2003

Improvement of modified authenticated key agreement protocol.
Appl. Math. Comput., 2003

Improvement of threshold proxy signature scheme.
Appl. Math. Comput., 2003

2002
Remarks on Using RSA With Low Exponent in a Public Network.
J. Inf. Sci. Eng., 2002

Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002

2001
Delegated multisignature scheme with document decomposition.
J. Syst. Softw., 2001

New nonrepudiable threshold proxy signature scheme with known signers.
J. Syst. Softw., 2001

Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett., 2001

Cryptographic key assignment scheme for hierarchical access control.
Comput. Syst. Sci. Eng., 2001

Digital signature/multisignature schemes giving public key verification and message recovery simultaneously.
Comput. Syst. Sci. Eng., 2001

ID-Based Structured Mulitsignature Schemes.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

An Efficient Method for Computing the Feasible Region with Translational Containment between Two Convex Polygons.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

2000
ElGamal-like digital signature and multisignature schemes using self-certified public keys.
J. Syst. Softw., 2000

1999
Authorization-based Group-oriented Secure Broadcasting System.
J. Inf. Sci. Eng., 1999

Cryptanalysis of Lee and Chang's ID-based information security functions.
Comput. Commun., 1999

1998
Group-oriented authentication mechanism with key exchange.
Comput. Commun., 1998

1997
Retrieving similar pictures from iconic databases using G-tree.
Pattern Recognit. Lett., 1997

A Binary Access Control Method Using Prime Factorization.
Inf. Sci., 1997

ID-based group-oriented cryptosystem and its digital signature scheme.
Comput. Commun., 1997

1996
An Improved One-Time Digital Signature Scheme Based on One-Way Function.
J. Inf. Sci. Eng., 1996

Authenticating passwords over an insecure channel.
Comput. Secur., 1996

Two ID-based multisignature protocols for sequential and broadcasting architectures.
Comput. Commun., 1996

1995
An exact match retrieval scheme based upon principal component analysis.
Pattern Recognit. Lett., 1995

A geometric approach for sharing secrets.
Comput. Secur., 1995

Group commitment protocol based on zero knowledge proofs.
Comput. Commun., 1995

Remote login authentication scheme based on a geometric approach.
Comput. Commun., 1995

Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Comput. Commun., 1995

1994
Application of geometric hashing to iconic database retrieval.
Pattern Recognit. Lett., 1994

Controlling Access in Tree Hierarchies.
Inf. Sci., 1994

Access control with binary keys.
Comput. Secur., 1994

1993
A hashing-oriented nearest neighbor searching scheme.
Pattern Recognit. Lett., 1993

Algebraic operations on encryped relational databases.
Inf. Syst., 1993

Controlling the Access Requests in an Information Protection System.
Inf. Process. Manag., 1993

A Refinement of a Compression-Oriented Addressing Scheme.
BIT, 1993

1992
Crypographic key assignment scheme for access control in a hierarchy.
Inf. Syst., 1992

Retrieving the Most Similar Symbolic Pictures from Pictorial Databases.
Inf. Process. Manag., 1992

The Design of a Conference Key Distribution System.
Proceedings of the Advances in Cryptology, 1992

1991
A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression.
Softw. Pract. Exp., 1991

Password authentication using Newton's interpolating polynomials.
Inf. Syst., 1991

A password authentication scheme based on discrete logarithms.
Int. J. Comput. Math., 1991


  Loading...