English  |  正體中文  |  简体中文  |  2808638  
???header.visitor??? :  26763917    ???header.onlineuser??? :  305
???header.sponsordeclaration???
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
???ui.leftmenu.abouttair???

???ui.leftmenu.bartitle???

???index.news???

???ui.leftmenu.copyrighttitle???

???ui.leftmenu.link???

"tzeng wg"???jsp.browse.items-by-author.description???

???jsp.browse.items-by-author.back???
???jsp.browse.items-by-author.order1??? ???jsp.browse.items-by-author.order2???

Showing items 1-25 of 28  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page

Institution Date Title Author
國立交通大學 2014-12-08T15:03:47Z A 2-KEY-LOCK-PAIR ACCESS-CONTROL METHOD USING PRIME FACTORIZATION AND TIME STAMP HWANG, MS; TZENG, WG; YANG, WP
國立交通大學 2014-12-08T15:41:40Z A new approach for visual cryptography Tzeng, WG; Hu, CM
國立交通大學 2014-12-08T15:46:40Z A new graph invariant for graph isomorphism: Probability propagation matrix King, GH; Tzeng, WG
國立交通大學 2014-12-08T15:45:53Z A practical and secure fault-tolerant conference-key agreement protocol Tzeng, WG
國立交通大學 2014-12-08T15:19:25Z A public-key traitor tracing scheme with revocation using dynamic shares Tzeng, WG; Tzeng, ZJ
國立交通大學 2014-12-08T15:44:21Z A public-key traitor tracing scheme with revocation using dynamic shares Tzeng, WG; Tzeng, ZJ
國立交通大學 2014-12-08T15:42:32Z A secure fault-tolerant conference-key agreement protocol Tzeng, WG
國立交通大學 2014-12-08T15:41:42Z A secure fault-tolerant conference-key agreement protocol (vol 51, pg 373, 2002) Tzeng, WG
國立交通大學 2014-12-08T15:41:35Z A threshold GQ signature scheme Liu, LS; Chu, CK; Tzeng, WG
國立交通大學 2014-12-08T15:43:00Z A time-bound cryptographic key assignment scheme for access control in a hierarchy Tzeng, WG
國立交通大學 2014-12-08T15:02:57Z An access control scheme based on Chinese remainder theorem and time stamp concept Hwang, MS; Tzeng, WG; Yang, WP
國立交通大學 2014-12-08T15:36:38Z An efficient solution to the millionaires' problem based on homomorphic encryption Lin, HY; Tzeng, WG
國立交通大學 2014-12-08T15:44:22Z Authentication of mobile users in third generation mobile systems Tzeng, ZJ; Tzeng, WG
國立交通大學 2014-12-08T15:46:36Z Common modulus and chosen-message attacks on public-key schemes with linear recurrence relations Tzeng, WG
國立交通大學 2014-12-08T15:37:08Z Compatible ideal contrast visual cryptography schemes with reversing Hu, CM; Tzeng, WG
國立交通大學 2014-12-08T15:43:07Z Distributed key generation as a component of an integrated protocol Chu, CK; Tzeng, WG
國立交通大學 2014-12-08T15:39:37Z Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters Tzeng, WG
國立交通大學 2014-12-08T15:36:43Z Efficient k-out-of-n oblivious transfer schemes. with adaptive and non-adaptive queries Chu, CK; Tzeng, WG
國立交通大學 2014-12-08T15:19:03Z Extracting randomness from multiple independent sources Lee, CJ; Lu, CJ; Tsai, SC; Tzeng, WG
國立交通大學 2014-12-08T15:46:45Z Inter-protocol interleaving attacks on some authentication and key distribution protocols Tzeng, WG; Hu, CM
國立交通大學 2014-12-08T15:02:43Z On path equivalence of nondeterministic finite automata Tzeng, WG
國立交通大學 2014-12-08T15:18:35Z On the Jensen-Shannon divergence and variational distance Tsai, SC; Tzeng, WG; Wu, HL
國立交通大學 2014-12-08T15:02:04Z On-line algorithms for the dominating set problem King, GH; Tzeng, WG
國立交通大學 2014-12-08T15:43:20Z Practical and efficient electronic voting schemes Tzeng, ZJ; Tzeng, WG
國立交通大學 2014-12-08T15:44:26Z Robust forward-secure signature schemes with proactive security Tzeng, WG; Tzeng, ZJ

Showing items 1-25 of 28  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page