Tzong-Sun Wu

According to our database1, Tzong-Sun Wu authored at least 40 papers between 1995 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network.
IEEE Syst. J., 2018

2017
Toward Secure CB-Signcryption for Wireless Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2017

2016
Photograph watermarking.
Multim. Tools Appl., 2016

2015
Efficient english auction scheme without a secure channel.
Int. Arab J. Inf. Technol., 2015

A Provable Watermark-Based Copyright Protection Scheme.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System.
KSII Trans. Internet Inf. Syst., 2014

Provably secure proxy convertible authenticated encryption scheme based on RSA.
Inf. Sci., 2014

Shoulder-surfing-proof graphical password authentication scheme.
Int. J. Inf. Sec., 2014

2013
A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.
Secur. Commun. Networks, 2013

Non-Interactive Authenticated Key Agreement over the Mobile Communication Network.
Mob. Networks Appl., 2013

2012
An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce.
J. Inf. Sci. Eng., 2012

Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs.
J. Inf. Sci. Eng., 2012

A publicly verifiable PCAE scheme for confidential applications with proxy delegation.
Trans. Emerg. Telecommun. Technol., 2012

2011
A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation.
J. Inf. Sci. Eng., 2011

Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue.
J. Digit. Inf. Manag., 2011

Audio watermarking scheme with dynamic adjustment in mute period.
Expert Syst. Appl., 2011

2010
Efficient proxy signcryption scheme with provable CCA and CMA security.
Comput. Math. Appl., 2010

2009
Efficient self-certified proxy CAE scheme and its variants.
J. Syst. Softw., 2009

Secure Convertible Authenticated Encryption Scheme Based on RSA.
Informatica (Slovenia), 2009

2008
Convertible multi-authenticated encryption scheme.
Inf. Sci., 2008

Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2005
New proxy multi-signature scheme.
Appl. Math. Comput., 2005

Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.
Appl. Math. Comput., 2005

Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability.
Appl. Math. Comput., 2005

2004
Group-oriented signature scheme with distinguished signing authoritie.
Future Gener. Comput. Syst., 2004

Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers.
Comput. Stand. Interfaces, 2004

Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
Comput. Secur., 2004

Robust key authentication scheme resistant to public key substitution attacks.
Appl. Math. Comput., 2004

Efficient proxy signature schemes using self-certified public keys.
Appl. Math. Comput., 2004

2003
Threshold signature scheme using self-certified public keys.
J. Syst. Softw., 2003

Improvement of the Miyazaki-Takaragi threshold digital signature scheme.
Inf. Process. Lett., 2003

Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
Comput. Secur., 2003

Improvement of modified authenticated key agreement protocol.
Appl. Math. Comput., 2003

Improvement of threshold proxy signature scheme.
Appl. Math. Comput., 2003

2002
Convertible authenticated encryption scheme.
J. Syst. Softw., 2002

Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002

ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Appl. Math. Comput., 2002

2001
New nonrepudiable threshold proxy signature scheme with known signers.
J. Syst. Softw., 2001

1996
Two ID-based multisignature protocols for sequential and broadcasting architectures.
Comput. Commun., 1996

1995
Group commitment protocol based on zero knowledge proofs.
Comput. Commun., 1995


  Loading...