Tzong-Sun Wu
According to our database1,
Tzong-Sun Wu
authored at least 40 papers
between 1995 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
IEEE Syst. J., 2018
2017
Ad Hoc Sens. Wirel. Networks, 2017
2016
2015
Int. Arab J. Inf. Technol., 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System.
KSII Trans. Internet Inf. Syst., 2014
Inf. Sci., 2014
Int. J. Inf. Sec., 2014
2013
A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.
Secur. Commun. Networks, 2013
Mob. Networks Appl., 2013
2012
An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce.
J. Inf. Sci. Eng., 2012
J. Inf. Sci. Eng., 2012
A publicly verifiable PCAE scheme for confidential applications with proxy delegation.
Trans. Emerg. Telecommun. Technol., 2012
2011
J. Inf. Sci. Eng., 2011
Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue.
J. Digit. Inf. Manag., 2011
Expert Syst. Appl., 2011
2010
Comput. Math. Appl., 2010
2009
Informatica (Slovenia), 2009
2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2005
Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.
Appl. Math. Comput., 2005
Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability.
Appl. Math. Comput., 2005
2004
Future Gener. Comput. Syst., 2004
Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers.
Comput. Stand. Interfaces, 2004
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
Comput. Secur., 2004
Appl. Math. Comput., 2004
Appl. Math. Comput., 2004
2003
Inf. Process. Lett., 2003
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
Comput. Secur., 2003
Appl. Math. Comput., 2003
2002
Improvements of generalization of threshold signature and authenticated encryption for group communications.
Inf. Process. Lett., 2002
ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
Appl. Math. Comput., 2002
2001
J. Syst. Softw., 2001
1996
Comput. Commun., 1996
1995