Wen-Guey Tzeng

According to our database1, Wen-Guey Tzeng
  • authored at least 90 papers between 1989 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Phrase Search for Encrypted Cloud Storage.
J. Inf. Sci. Eng., 2018

Privacy-preserving ridge regression on distributed data.
Inf. Sci., 2018

2017
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over ℤp.
J. Inf. Sci. Eng., 2017

Strategy analysis for cloud storage reliability management based on game theory.
Journal of Computer Security, 2017

A secret key establishment protocol for wireless networks using noisy channels.
Journal of Computer Security, 2017

Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members.
Computer Communications, 2017

The forward-backward string: A new robust feature for botnet detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

An online subject-based spam filter using natural language features.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security.
Proceedings of the Applied Cryptography and Network Security, 2017

2015
An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems.
IEEE Trans. Reliability, 2015

Delegated integrity check for hierarchical cloud data.
Journal of Computer Security, 2015

Unique Signature with Short Output from CDH Assumption.
IACR Cryptology ePrint Archive, 2015

Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp.
IACR Cryptology ePrint Archive, 2015

Unique Signature with Short Output from CDH Assumption.
Proceedings of the Provable Security, 2015

2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

Preserving user query privacy in cloud-based security services.
Journal of Computer Security, 2014

Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

2013
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
IACR Cryptology ePrint Archive, 2013

CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding.
IEEE Trans. Parallel Distrib. Syst., 2012

Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
An Optimal Data Hiding Scheme With Tree-Based Parity Check.
IEEE Trans. Image Processing, 2011

A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Secure group key management using uni-directional proxy re-encryption schemes.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Delegable Provable Data Possession for Remote Data in the Clouds.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

2010
A Secure Decentralized Erasure Code for Distributed Networked Storage.
IEEE Trans. Parallel Distrib. Syst., 2010

Permutation arrays under the Chebyshev distance.
IEEE Trans. Information Theory, 2010

New Secure Broadcasting Scheme Realizing Information Granularity.
J. Inf. Sci. Eng., 2010

2009
Key establishment schemes against storage-bounded adversaries in wireless sensor networks.
IEEE Trans. Wireless Communications, 2009

Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication.
J. Inf. Sci. Eng., 2009

Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes.
J. Inf. Sci. Eng., 2009

Permutation Arrays Under the Chebyshev Distance
CoRR, 2009

A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
Efficient k-out-of-n Oblivious Transfer Schemes.
J. UCS, 2008

Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time.
Proceedings of the Public Key Cryptography, 2008

Efficient encoding and decoding with permutation arrays.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
Cheating Prevention in Visual Cryptography.
IEEE Trans. Image Processing, 2007

Optimal resilient threshold GQ signatures.
Inf. Sci., 2007

Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2).
IACR Cryptology ePrint Archive, 2007

Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
IACR Cryptology ePrint Archive, 2007

Efficient Large-Scale Distributed Key Generation against Burst Interruption.
Proceedings of the SECRYPT 2007, 2007

Identity-Based Proxy Re-encryption Without Random Oracles.
Proceedings of the Information Security, 10th International Conference, 2007

Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Conditional Oblivious Cast.
Proceedings of the Public Key Cryptography, 2006

A secure system for data access based on anonymous authentication and time-dependent hierarchical keys.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
On the Jensen-Shannon Divergence and Variational Distance.
IEEE Trans. Information Theory, 2005

Extracting randomness from multiple independent sources.
IEEE Trans. Information Theory, 2005

An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2005

A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares.
Des. Codes Cryptography, 2005

Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.
Proceedings of the Public Key Cryptography, 2005

Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.
Proceedings of the Information Security, 8th International Conference, 2005

An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters.
IEEE Trans. Computers, 2004

Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries.
IACR Cryptology ePrint Archive, 2004

2003
A Threshold GQ Signature Scheme.
IACR Cryptology ePrint Archive, 2003

A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy.
Proceedings of the Information Networking, 2003

A Framework of High Confidence E-Healthcare Information System.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

A Threshold GQ Signature Scheme.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy.
IEEE Trans. Knowl. Data Eng., 2002

Corrections to "A Secure Fault-Tolerant Conference-Key Agreement Protocol".
IEEE Trans. Computers, 2002

A Secure Fault-Tolerant Conference-Key Agreement Protocol.
IEEE Trans. Computers, 2002

A New Approach for Visual Cryptography.
Des. Codes Cryptography, 2002

Efficient 1-Out-n Oblivious Transfer Schemes.
Proceedings of the Public Key Cryptography, 2002

Robust Key-Evolving Public Key Encryption Schemes.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Distributed Key Generation as a Component of an Integrated Protocol.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
Authentication of Mobile Users in Third Generation Mobile Systems.
Wireless Personal Communications, 2001

Practical and Efficient Electronic Voting Schemes.
J. Inf. Sci. Eng., 2001

Robust key-evolving public key encryption schemes.
IACR Cryptology ePrint Archive, 2001

Efficient oblivious transfer schemes.
IACR Cryptology ePrint Archive, 2001

Robust Forward-Secure Signature Schemes with Proactive Security.
Proceedings of the Public Key Cryptography, 2001

A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares.
Proceedings of the Public Key Cryptography, 2001

2000
A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol.
Proceedings of the Public Key Cryptography, 2000

Round-Efficient Conference Key Agreement Protocols with Provable Security.
Proceedings of the Advances in Cryptology, 2000

1999
A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix.
J. Inf. Sci. Eng., 1999

Three-Quarter Approximation for the Number of Unused Colors in Graph Coloring.
Inf. Sci., 1999

Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols.
Inf. Process. Lett., 1999

Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations.
Inf. Process. Lett., 1999

1998
An Integrated System for Multilevel Secure Compound Documents.
Proceedings of WebNet 98, 1998

1997
On-Line Algorithms for the Dominating Set Problem.
Inf. Process. Lett., 1997

1996
On Path Equivalence of Nondeterministic Finite Automata.
Inf. Process. Lett., 1996

An access control scheme based on Chinese remainder theorem and time stamp concept.
Computers & Security, 1996

1992
A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata.
SIAM J. Comput., 1992

Learning Probabilistic Automata and Markov Chains via Queries.
Machine Learning, 1992

1991
Three Sigma^p_2-Complete Problems in Computational Learning Theory.
Computational Complexity, 1991

1990
Learning String Patterns and Tree Patterns from Examples.
Proceedings of the Machine Learning, 1990

1989
The Equivalence and Learning of Probabilistic Automata (Extended Abstract)
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989


  Loading...