Wen-Shenq Juang

According to our database1, Wen-Shenq Juang authored at least 40 papers between 1996 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

2015
A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
An Efficient Authentication and Service Key Agreement Scheme in IOT Environments.
Proceedings of the Intelligent Systems and Applications, 2014

Strongly Privacy-Preserving Communication Protocol for VANETs.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
An Efficient and Practical Fair Buyer-Anonymity Exchange Scheme Using Bilinear Pairings.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2011
Provably secure and efficient identification and key agreement protocol with user anonymity.
J. Comput. Syst. Sci., 2011

Robust authentication and key agreement scheme preserving the privacy of secret key.
Comput. Commun., 2011

2010
RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings.
J. Syst. Softw., 2010

A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems.
Int. J. Ad Hoc Ubiquitous Comput., 2010

2009
Robust and efficient authenticated key agreement in mobile communications.
Int. J. Mob. Commun., 2009

User authentication scheme with privacy-preservation for multi-server environment.
IEEE Commun. Lett., 2009

Two efficient two-factor authenticated key exchange protocols in public wireless LANs.
Comput. Electr. Eng., 2009

2008
Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2008

Efficient password authenticated key agreement using bilinear pairings.
Math. Comput. Model., 2008

Efficient User Authentication and Key Agreement with User Privacy Protection.
Int. J. Netw. Secur., 2008

An Anonymous and Deniable Conversation for a Thin Client.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
D-cash: A flexible pre-paid e-cash scheme for date-attachment.
Electron. Commer. Res. Appl., 2007

Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions.
Proceedings of the Future Generation Communication and Networking, 2007

A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
An electronic online bidding auction protocol with both security and efficiency.
Appl. Math. Comput., 2006

Efficient User Authentication and Key Agreement in Wireless Sensor Networks.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Efficient User Authentication and Key Agreement in Ubiquitous Computing.
Proceedings of the Computational Science and Its Applications, 2006

2005
The design of a secure and fair sealed-bid auction service<sup>, </sup>.
Math. Comput. Model., 2005

A practical anonymous off-line multi-authority payment scheme.
Electron. Commer. Res. Appl., 2005

A Simple and Efficient Conference Scheme for Mobile Communications.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2004
Efficient multi-server password authenticated key agreement using smart cards.
IEEE Trans. Consumer Electron., 2004

Fair blind threshold signatures in wallet with observers.
J. Syst. Softw., 2004

Efficient password authenticated key agreement using smart cards.
Comput. Secur., 2004

A practical anonymous multi-authority e-cash scheme.
Appl. Math. Comput., 2004

2002
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm.
J. Inf. Sci. Eng., 2002

Privacy and Anonymity Protection with Blind Threshold Signatures.
Int. J. Electron. Commer., 2002

A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting.
Comput. J., 2002

2001
Fair blind threshold signatures based on discrete logarithm.
Comput. Syst. Sci. Eng., 2001

1999
Anonymous channel and authentication in wireless communications.
Comput. Commun., 1999

Partially Blind Threshold signatures Based on Discrete Logarithm.
Comput. Commun., 1999

1996
A collision-free secret ballot protocol for computerized general elections.
Comput. Secur., 1996

Blind Threshold Signatures Based on Discrete Logarithm.
Proceedings of the Concurrency and Parallelism, 1996


  Loading...