Tzong-Chen Wu
According to our database1,
Tzong-Chen Wu
authored at least 92 papers
between 1991 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
2015
Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
J. Inf. Sci. Eng., 2015
RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model.
IEICE Trans. Inf. Syst., 2015
Int. Arab J. Inf. Technol., 2015
2014
Secure anonymous authentication scheme without verification table for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2014
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings.
Int. J. Commun. Syst., 2014
2013
Wirel. Pers. Commun., 2013
A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks.
Wirel. Pers. Commun., 2013
IEEE Trans. Ind. Informatics, 2013
Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks.
Secur. Commun. Networks, 2013
Efficient and secure three-party authenticated key exchange protocol for mobile environments.
J. Zhejiang Univ. Sci. C, 2013
J. Inf. Sci. Eng., 2013
Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks.
J. Inf. Sci. Eng., 2013
Inf. Technol. Control., 2013
Exploring design-fits for the strategic alignment of information systems with business objectives.
Inf. Res., 2013
Int. J. Distributed Sens. Networks, 2013
ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices.
Ad Hoc Sens. Wirel. Networks, 2013
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
2012
J. Medical Syst., 2012
Establish a secure and trustworthy ICT environment for educational systems: a case study.
J. Intell. Manuf., 2012
KSII Trans. Internet Inf. Syst., 2012
IEEE Commun. Lett., 2012
Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
2011
J. Zhejiang Univ. Sci. C, 2011
J. Medical Syst., 2011
Wireless-Sensor-Networks-based healthcare system: a survey on the view of communication paradigms.
Int. J. Ad Hoc Ubiquitous Comput., 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
2010
A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks.
J. Zhejiang Univ. Sci. C, 2010
J. Inf. Sci. Eng., 2010
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks.
Int. J. Secur. Networks, 2010
Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls.
Int. J. Internet Protoc. Technol., 2010
IET Inf. Secur., 2010
Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations.
Proceedings of the Communication and Networking, 2010
Proceedings of the CISIS 2010, 2010
2009
IEICE Trans. Inf. Syst., 2009
Comput. J., 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
J. Syst. Softw., 2008
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008
Proceedings of the Intelligence and Security Informatics, 2008
2007
Proceedings of the Future Generation Communication and Networking, 2007
2005
New identity-based society oriented signature schemes from pairings on elliptic curves.
Appl. Math. Comput., 2005
Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Joint Window Nonadjacent Form.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005
2004
Future Gener. Comput. Syst., 2004
2003
Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Veh. Technol., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Appl. Math. Comput., 2003
2002
Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002
2001
J. Syst. Softw., 2001
Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett., 2001
Cryptographic key assignment scheme for hierarchical access control.
Comput. Syst. Sci. Eng., 2001
Digital signature/multisignature schemes giving public key verification and message recovery simultaneously.
Comput. Syst. Sci. Eng., 2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001
An Efficient Method for Computing the Feasible Region with Translational Containment between Two Convex Polygons.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001
2000
ElGamal-like digital signature and multisignature schemes using self-certified public keys.
J. Syst. Softw., 2000
1999
J. Inf. Sci. Eng., 1999
Comput. Commun., 1999
1998
1997
Pattern Recognit. Lett., 1997
Comput. Commun., 1997
1996
J. Inf. Sci. Eng., 1996
Comput. Commun., 1996
1995
Pattern Recognit. Lett., 1995
Comput. Commun., 1995
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Comput. Commun., 1995
1994
Pattern Recognit. Lett., 1994
1993
Inf. Process. Manag., 1993
1992
Inf. Syst., 1992
Inf. Process. Manag., 1992
Proceedings of the Advances in Cryptology, 1992
1991
Softw. Pract. Exp., 1991
Int. J. Comput. Math., 1991