Wen-Guey Tzeng

From MaRDI portal
(Redirected from Person:290185)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security2022-07-01Paper
Privacy-preserving ridge regression on distributed data
Information Sciences
2020-09-08Paper
A light-weight bit commitment protocol based on unpredictable channel noise
Theoretical Computer Science
2019-02-14Paper
A secure fault-tolerant conference-key agreement protocol
IEEE Transactions on Computers
2018-08-14Paper
Corrections to "A secure fault-tolerant conference-key agreement protocol"
IEEE Transactions on Computers
2018-07-09Paper
An Optimal Data Hiding Scheme With Tree-Based Parity Check
IEEE Transactions on Image Processing
2017-10-19Paper
Permutation Arrays Under the Chebyshev Distance
IEEE Transactions on Information Theory
2017-07-27Paper
Common modulus and chosen-message attacks on public-key schemes with linear recurrence relations
Information Processing Letters
2016-06-16Paper
On-line algorithms for the dominating set problem
Information Processing Letters
2016-06-01Paper
Unique signature with short output from CDH assumption
Provable Security
2016-01-27Paper
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
Information Security and Privacy
2009-03-06Paper
Cheating Prevention in Visual Cryptography
IEEE Transactions on Image Processing
2008-12-21Paper
Extracting Randomness from Multiple Independent Sources
IEEE Transactions on Information Theory
2008-12-21Paper
On the Jensen–Shannon Divergence and Variational Distance
IEEE Transactions on Information Theory
2008-12-21Paper
Efficient \(k\)-out-of-\(n\) oblivious transfer schemes2008-08-07Paper
Identity-Based Proxy Re-encryption Without Random Oracles
Lecture Notes in Computer Science
2008-06-24Paper
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption
Applied Cryptography and Network Security
2007-09-24Paper
Optimal resilient threshold GQ signatures
Information Sciences
2007-05-18Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
A public-key traitor tracing scheme with revocation using dynamic shares
Designs, Codes and Cryptography
2005-11-07Paper
scientific article; zbMATH DE number 2085428 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 1980949 (Why is no real title available?)2003-09-15Paper
scientific article; zbMATH DE number 1980978 (Why is no real title available?)2003-09-15Paper
A new approach for visual cryptography
Designs, Codes and Cryptography
2003-04-03Paper
scientific article; zbMATH DE number 1618051 (Why is no real title available?)2002-11-04Paper
Inter-protocol interleaving attacks on some authentication and key distribution protocols
Information Processing Letters
2002-08-04Paper
scientific article; zbMATH DE number 1618054 (Why is no real title available?)2001-07-12Paper
scientific article; zbMATH DE number 1583810 (Why is no real title available?)2001-04-03Paper
Three-quarter approximation for the number of unused colors in graph coloring
Information Sciences
2000-06-07Paper
scientific article; zbMATH DE number 1440045 (Why is no real title available?)2000-05-07Paper
scientific article; zbMATH DE number 1302187 (Why is no real title available?)1999-06-16Paper
On path equivalence of nondeterministic finite automata
Information Processing Letters
1997-02-27Paper
Three \(\sum^ P_ 2\)-complete problems in computational learning theory
Computational Complexity
1993-10-10Paper
Learning probabilistic automata and Markov chains via queries
Machine Learning
1992-09-27Paper
A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata
SIAM Journal on Computing
1992-06-28Paper


Research outcomes over time


This page was built for person: Wen-Guey Tzeng