Wen-Guey Tzeng

From MaRDI portal
Person:290185

Available identifiers

zbMath Open tzeng.wen-gueyMaRDI QIDQ290185

List of research outcomes





PublicationDate of PublicationType
Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security2022-07-01Paper
Privacy-preserving ridge regression on distributed data2020-09-08Paper
A light-weight bit commitment protocol based on unpredictable channel noise2019-02-14Paper
A secure fault-tolerant conference-key agreement protocol2018-08-14Paper
Corrections to "A secure fault-tolerant conference-key agreement protocol"2018-07-09Paper
An Optimal Data Hiding Scheme With Tree-Based Parity Check2017-10-19Paper
Permutation Arrays Under the Chebyshev Distance2017-07-27Paper
Common modulus and chosen-message attacks on public-key schemes with linear recurrence relations2016-06-16Paper
On-line algorithms for the dominating set problem2016-06-01Paper
Unique Signature with Short Output from CDH Assumption2016-01-27Paper
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures2009-03-06Paper
Cheating Prevention in Visual Cryptography2008-12-21Paper
Extracting Randomness from Multiple Independent Sources2008-12-21Paper
On the Jensen–Shannon Divergence and Variational Distance2008-12-21Paper
https://portal.mardi4nfdi.de/entity/Q35184152008-08-07Paper
Identity-Based Proxy Re-encryption Without Random Oracles2008-06-24Paper
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time2008-03-05Paper
Applied Cryptography and Network Security2008-02-19Paper
An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption2007-09-24Paper
Optimal resilient threshold GQ signatures2007-05-18Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Information Security2006-10-20Paper
Public Key Cryptography - PKC 20052005-12-07Paper
A public-key traitor tracing scheme with revocation using dynamic shares2005-11-07Paper
https://portal.mardi4nfdi.de/entity/Q30439342004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44283282003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44283762003-09-15Paper
A new approach for visual cryptography2003-04-03Paper
https://portal.mardi4nfdi.de/entity/Q27245962002-11-04Paper
Inter-protocol interleaving attacks on some authentication and key distribution protocols2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q27246002001-07-12Paper
https://portal.mardi4nfdi.de/entity/Q27074572001-04-03Paper
Three-quarter approximation for the number of unused colors in graph coloring2000-06-07Paper
https://portal.mardi4nfdi.de/entity/Q49500302000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42474541999-06-16Paper
On path equivalence of nondeterministic finite automata1997-02-27Paper
Three \(\sum^ P_ 2\)-complete problems in computational learning theory1993-10-10Paper
Learning probabilistic automata and Markov chains via queries1992-09-27Paper
A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata1992-06-28Paper

Research outcomes over time

This page was built for person: Wen-Guey Tzeng