Tzong-Sun Wu

According to our database1, Tzong-Sun Wu authored at least 40 papers between 1995 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 




Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network.
IEEE Systems Journal, 2018

Toward Secure CB-Signcryption for Wireless Ad Hoc Networks.
Ad Hoc & Sensor Wireless Networks, 2017

Photograph watermarking.
Multimedia Tools Appl., 2016

Efficient english auction scheme without a secure channel.
Int. Arab J. Inf. Technol., 2015

A Provable Watermark-Based Copyright Protection Scheme.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System.
TIIS, 2014

Provably secure proxy convertible authenticated encryption scheme based on RSA.
Inf. Sci., 2014

Shoulder-surfing-proof graphical password authentication scheme.
Int. J. Inf. Sec., 2014

A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.
Security and Communication Networks, 2013

Non-Interactive Authenticated Key Agreement over the Mobile Communication Network.
MONET, 2013

An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce.
J. Inf. Sci. Eng., 2012

Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs.
J. Inf. Sci. Eng., 2012

A publicly verifiable PCAE scheme for confidential applications with proxy delegation.
Trans. Emerging Telecommunications Technologies, 2012

A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation.
J. Inf. Sci. Eng., 2011

Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue.
JDIM, 2011

Audio watermarking scheme with dynamic adjustment in mute period.
Expert Syst. Appl., 2011

Efficient proxy signcryption scheme with provable CCA and CMA security.
Computers & Mathematics with Applications, 2010

Efficient self-certified proxy CAE scheme and its variants.
Journal of Systems and Software, 2009

Secure Convertible Authenticated Encryption Scheme Based on RSA.
Informatica (Slovenia), 2009

Convertible multi-authenticated encryption scheme.
Inf. Sci., 2008

Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

New proxy multi-signature scheme.
Applied Mathematics and Computation, 2005

Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.
Applied Mathematics and Computation, 2005

Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability.
Applied Mathematics and Computation, 2005

Group-oriented signature scheme with distinguished signing authoritie.
Future Generation Comp. Syst., 2004

Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers.
Computer Standards & Interfaces, 2004

Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
Computers & Security, 2004

Robust key authentication scheme resistant to public key substitution attacks.
Applied Mathematics and Computation, 2004

Efficient proxy signature schemes using self-certified public keys.
Applied Mathematics and Computation, 2004

Threshold signature scheme using self-certified public keys.
Journal of Systems and Software, 2003

Improvement of the Miyazaki-Takaragi threshold digital signature scheme.
Inf. Process. Lett., 2003

Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
Computers & Security, 2003

Improvement of modified authenticated key agreement protocol.
Applied Mathematics and Computation, 2003

Improvement of threshold proxy signature scheme.
Applied Mathematics and Computation, 2003

Convertible authenticated encryption scheme.
Journal of Systems and Software, 2002

Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002

ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Applied Mathematics and Computation, 2002

New nonrepudiable threshold proxy signature scheme with known signers.
Journal of Systems and Software, 2001

Two ID-based multisignature protocols for sequential and broadcasting architectures.
Computer Communications, 1996

Group commitment protocol based on zero knowledge proofs.
Computer Communications, 1995