| 國立交通大學 |
2014-12-08T15:18:08Z |
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
|
Chen, Yi-Ruei; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:17:39Z |
Conditional oblivious cast
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:15:03Z |
Cheating prevention in visual cryptography
|
Hu, Chih-Ming; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:13:03Z |
Efficient large-scale distributed key generation against burst interruption
|
Ou, Jheng-Ru; Tsai, Shi-Chun; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:12:52Z |
Efficient k-out-of-n oblivious transfer schemes
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:12:05Z |
An Optimal Data Hiding Scheme With Tree-Based Parity Check
|
Hou, Chung-Li; Lu, ChangChun; Tsai, Shi-Chun; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:10:43Z |
Identity-committable signatures and their extension to group-oriented ring signatures
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:09:56Z |
Key Establishment Schemes against Storage-Bounded Adversaries in Wireless Sensor Networks
|
Tsai, Shi-Chun; Tzeng, Wen-Guey; Zhou, Kun-Yi |
| 國立交通大學 |
2014-12-08T15:09:35Z |
Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication
|
Lin, Hsiao-Ying; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:08:53Z |
Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:07:01Z |
Identity-based proxy re-encryption without random oracles
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:06:45Z |
Permutation Arrays Under the Chebyshev Distance
|
Klove, Torleiv; Lin, Te-Tsung; Tsai, Shi-Chun; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:06:39Z |
New Secure Broadcasting Scheme Realizing Information Granularity
|
Lee, Chin-I; Wu, Tzong-Chen; Yang, Bo-Yin; Tzeng, Wen-Guey |
| 淡江大學 |
2006-07 |
A Framework of High Confidence e-healthcare Information System
|
林順傑; Lin, Shun-Chieh; Tseng, Shian-shyong; Tzeng, Wen-guey; Yuan, Shyan-ming |