Tzong-Sun Wu

According to our database1, Tzong-Sun Wu
  • authored at least 39 papers between 1995 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Toward Secure CB-Signcryption for Wireless Ad Hoc Networks.
Ad Hoc & Sensor Wireless Networks, 2017

2016
Photograph watermarking.
Multimedia Tools Appl., 2016

2015
Efficient english auction scheme without a secure channel.
Int. Arab J. Inf. Technol., 2015

A Provable Watermark-Based Copyright Protection Scheme.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System.
TIIS, 2014

Provably secure proxy convertible authenticated encryption scheme based on RSA.
Inf. Sci., 2014

Shoulder-surfing-proof graphical password authentication scheme.
Int. J. Inf. Sec., 2014

2013
A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.
Security and Communication Networks, 2013

Non-Interactive Authenticated Key Agreement over the Mobile Communication Network.
MONET, 2013

2012
An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce.
J. Inf. Sci. Eng., 2012

Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs.
J. Inf. Sci. Eng., 2012

A publicly verifiable PCAE scheme for confidential applications with proxy delegation.
Trans. Emerging Telecommunications Technologies, 2012

2011
A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation.
J. Inf. Sci. Eng., 2011

Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue.
JDIM, 2011

Audio watermarking scheme with dynamic adjustment in mute period.
Expert Syst. Appl., 2011

2010
Efficient proxy signcryption scheme with provable CCA and CMA security.
Computers & Mathematics with Applications, 2010

2009
Efficient self-certified proxy CAE scheme and its variants.
Journal of Systems and Software, 2009

Secure Convertible Authenticated Encryption Scheme Based on RSA.
Informatica (Slovenia), 2009

2008
Convertible multi-authenticated encryption scheme.
Inf. Sci., 2008

Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2005
New proxy multi-signature scheme.
Applied Mathematics and Computation, 2005

Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.
Applied Mathematics and Computation, 2005

Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability.
Applied Mathematics and Computation, 2005

2004
Group-oriented signature scheme with distinguished signing authoritie.
Future Generation Comp. Syst., 2004

Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers.
Computer Standards & Interfaces, 2004

Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
Computers & Security, 2004

Robust key authentication scheme resistant to public key substitution attacks.
Applied Mathematics and Computation, 2004

Efficient proxy signature schemes using self-certified public keys.
Applied Mathematics and Computation, 2004

2003
Threshold signature scheme using self-certified public keys.
Journal of Systems and Software, 2003

Improvement of the Miyazaki-Takaragi threshold digital signature scheme.
Inf. Process. Lett., 2003

Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
Computers & Security, 2003

Improvement of modified authenticated key agreement protocol.
Applied Mathematics and Computation, 2003

Improvement of threshold proxy signature scheme.
Applied Mathematics and Computation, 2003

2002
Convertible authenticated encryption scheme.
Journal of Systems and Software, 2002

Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002

ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Applied Mathematics and Computation, 2002

2001
New nonrepudiable threshold proxy signature scheme with known signers.
Journal of Systems and Software, 2001

1996
Two ID-based multisignature protocols for sequential and broadcasting architectures.
Computer Communications, 1996

1995
Group commitment protocol based on zero knowledge proofs.
Computer Communications, 1995


  Loading...