|
Taiwan Academic Institutional Repository >
Browse by Author
|
"tzeng wg"
Showing items 1-25 of 28 (2 Page(s) Totally) 1 2 > >> View [10|25|50] records per page
國立交通大學 |
2014-12-08T15:46:53Z |
Three-quarter approximation for the number of unused colors in graph coloring
|
Tzeng, WG; King, GH |
國立交通大學 |
2014-12-08T15:46:45Z |
Inter-protocol interleaving attacks on some authentication and key distribution protocols
|
Tzeng, WG; Hu, CM |
國立交通大學 |
2014-12-08T15:46:40Z |
A new graph invariant for graph isomorphism: Probability propagation matrix
|
King, GH; Tzeng, WG |
國立交通大學 |
2014-12-08T15:46:36Z |
Common modulus and chosen-message attacks on public-key schemes with linear recurrence relations
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:45:53Z |
A practical and secure fault-tolerant conference-key agreement protocol
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:45:52Z |
Round-efficient conference key agreement protocols with provable security
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:44:26Z |
Robust forward-secure signature schemes with proactive security
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:44:22Z |
Authentication of mobile users in third generation mobile systems
|
Tzeng, ZJ; Tzeng, WG |
國立交通大學 |
2014-12-08T15:44:21Z |
A public-key traitor tracing scheme with revocation using dynamic shares
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:43:20Z |
Practical and efficient electronic voting schemes
|
Tzeng, ZJ; Tzeng, WG |
國立交通大學 |
2014-12-08T15:43:07Z |
Distributed key generation as a component of an integrated protocol
|
Chu, CK; Tzeng, WG |
國立交通大學 |
2014-12-08T15:43:07Z |
Robust key-evolving public key encryption schemes
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:43:00Z |
A time-bound cryptographic key assignment scheme for access control in a hierarchy
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:42:32Z |
A secure fault-tolerant conference-key agreement protocol
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:41:42Z |
A secure fault-tolerant conference-key agreement protocol (vol 51, pg 373, 2002)
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:41:40Z |
A new approach for visual cryptography
|
Tzeng, WG; Hu, CM |
國立交通大學 |
2014-12-08T15:41:35Z |
A threshold GQ signature scheme
|
Liu, LS; Chu, CK; Tzeng, WG |
國立交通大學 |
2014-12-08T15:39:37Z |
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:37:08Z |
Compatible ideal contrast visual cryptography schemes with reversing
|
Hu, CM; Tzeng, WG |
國立交通大學 |
2014-12-08T15:36:43Z |
Efficient k-out-of-n oblivious transfer schemes. with adaptive and non-adaptive queries
|
Chu, CK; Tzeng, WG |
國立交通大學 |
2014-12-08T15:36:38Z |
An efficient solution to the millionaires' problem based on homomorphic encryption
|
Lin, HY; Tzeng, WG |
國立交通大學 |
2014-12-08T15:19:25Z |
A public-key traitor tracing scheme with revocation using dynamic shares
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:19:03Z |
Extracting randomness from multiple independent sources
|
Lee, CJ; Lu, CJ; Tsai, SC; Tzeng, WG |
國立交通大學 |
2014-12-08T15:18:35Z |
On the Jensen-Shannon divergence and variational distance
|
Tsai, SC; Tzeng, WG; Wu, HL |
國立交通大學 |
2014-12-08T15:03:47Z |
A 2-KEY-LOCK-PAIR ACCESS-CONTROL METHOD USING PRIME FACTORIZATION AND TIME STAMP
|
HWANG, MS; TZENG, WG; YANG, WP |
Showing items 1-25 of 28 (2 Page(s) Totally) 1 2 > >> View [10|25|50] records per page
|