Wen-Guey Tzeng
Orcid: 0000-0002-0441-5006
According to our database1,
Wen-Guey Tzeng
authored at least 93 papers
between 1989 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm.
IEEE Trans. Dependable Secur. Comput., 2022
2021
Internet Things, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
IEEE Trans. Netw. Sci. Eng., 2020
J. Inf. Sci. Eng., 2020
J. Inf. Sci. Eng., 2020
2019
Theor. Comput. Sci., 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design.
Proceedings of the Security and Privacy in Communication Networks, 2018
Monsieur Poirot: Detecting Botnets Using Re-Identification Algorithm and Nontrivial Feature Selection Technique.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over ℤ<sub>p</sub>.
J. Inf. Sci. Eng., 2017
J. Comput. Secur., 2017
J. Comput. Secur., 2017
Int. J. Comput. Math. Comput. Syst. Theory, 2017
Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members.
Comput. Commun., 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security.
Proceedings of the Applied Cryptography and Network Security, 2017
2015
IEEE Trans. Reliab., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
J. Comput. Secur., 2014
Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014
2013
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
IACR Cryptol. ePrint Arch., 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
IEEE Trans. Image Process., 2011
A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
J. Inf. Sci. Eng., 2010
2009
Key establishment schemes against storage-bounded adversaries in wireless sensor networks.
IEEE Trans. Wirel. Commun., 2009
J. Inf. Sci. Eng., 2009
J. Inf. Sci. Eng., 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time.
Proceedings of the Public Key Cryptography, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
2007
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2).
IACR Cryptol. ePrint Arch., 2007
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
IACR Cryptol. ePrint Arch., 2007
Efficient Large-Scale Distributed Key Generation against Burst Interruption.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the Information Security, 10th International Conference, 2007
2006
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
IEEE Trans. Inf. Theory, 2005
IEEE Trans. Inf. Theory, 2005
IACR Cryptol. ePrint Arch., 2005
Des. Codes Cryptogr., 2005
Efficient <i>k</i>-Out-of-<i>n</i> Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Information Security, 8th International Conference, 2005
2004
IEEE Trans. Computers, 2004
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries.
IACR Cryptol. ePrint Arch., 2004
2003
Proceedings of the Information Networking, 2003
A Framework of High Confidence E-Healthcare Information System.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
2002
IEEE Trans. Knowl. Data Eng., 2002
IEEE Trans. Computers, 2002
IEEE Trans. Computers, 2002
A New Approach for Visual Cryptography.
Des. Codes Cryptogr., 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2001
Wirel. Pers. Commun., 2001
Proceedings of the Public Key Cryptography, 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Advances in Cryptology, 2000
1999
J. Inf. Sci. Eng., 1999
Inf. Sci., 1999
Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols.
Inf. Process. Lett., 1999
Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations.
Inf. Process. Lett., 1999
1998
An Integrated System for Multilevel Secure Compound Documents.
Proceedings of WebNet 98, 1998
1997
1996
Comput. Secur., 1996
1992
SIAM J. Comput., 1992
1991
Comput. Complex., 1991
1990
Proceedings of the Machine Learning, 1990
1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989