Wen-Shenq Juang
According to our database1,
Wen-Shenq Juang
authored at least 40 papers
between 1996 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016
Proceedings of the 6th International Conference on IT Convergence and Security, 2016
2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
An Efficient and Practical Fair Buyer-Anonymity Exchange Scheme Using Bilinear Pairings.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2011
Provably secure and efficient identification and key agreement protocol with user anonymity.
J. Comput. Syst. Sci., 2011
Comput. Commun., 2011
2010
RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings.
J. Syst. Softw., 2010
A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems.
Int. J. Ad Hoc Ubiquitous Comput., 2010
2009
Int. J. Mob. Commun., 2009
IEEE Commun. Lett., 2009
Two efficient two-factor authenticated key exchange protocols in public wireless LANs.
Comput. Electr. Eng., 2009
2008
IEEE Trans. Ind. Electron., 2008
Math. Comput. Model., 2008
Int. J. Netw. Secur., 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Electron. Commer. Res. Appl., 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions.
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2006
Appl. Math. Comput., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Computational Science and Its Applications, 2006
2005
Math. Comput. Model., 2005
Electron. Commer. Res. Appl., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
2004
IEEE Trans. Consumer Electron., 2004
Comput. Secur., 2004
2002
J. Inf. Sci. Eng., 2002
Int. J. Electron. Commer., 2002
Comput. J., 2002
2001
Fair blind threshold signatures based on discrete logarithm.
Comput. Syst. Sci. Eng., 2001
1999
Comput. Commun., 1999
Partially Blind Threshold signatures Based on Discrete Logarithm.
Comput. Commun., 1999
1996
Comput. Secur., 1996
Proceedings of the Concurrency and Parallelism, 1996