Gwoboa Horng

From MaRDI portal
(Redirected from Person:293186)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Comment on “Cheating Prevention in Visual Cryptography”
IEEE Transactions on Image Processing
2017-10-27Paper
Privacy protection in on-line shopping for electronic documents
Information Sciences
2017-01-31Paper
An active attack on protocols for server-aided RSA signature computation
Information Processing Letters
2016-06-09Paper
A Fast VQ Codebook Generation Algorithm Based on Otsu Histogram Threshold
Fundamenta Informaticae
2009-06-23Paper
Public key authentication schemes for local area networks2009-01-28Paper
Solving flexible flow-shop problems by LPT and LN scheduling algorithms
International Mathematical Forum
2008-08-12Paper
Computing the modular inverses is as simple as computing the GCDs
Finite Fields and their Applications
2008-02-06Paper
Trade-off between time complexity and makespan for flexible flow-shop group scheduling problems with two machine centers2007-10-29Paper
Further refinement of pairing computation based on Miller's algorithm
Applied Mathematics and Computation
2007-09-17Paper
A secure YS-like user authentication scheme2007-08-07Paper
A cheating prevention scheme for binary visual cryptography with homogeneous secret images
Pattern Recognition
2007-05-23Paper
Performance improvement for the GGM-construction of pseudorandom functions
Applied Mathematics and Computation
2007-02-13Paper
Cheating in visual cryptography
Designs, Codes and Cryptography
2006-05-29Paper
Remarks on some signature schemes based on factoring and discrete logarithms
Applied Mathematics and Computation
2005-11-14Paper
scientific article; zbMATH DE number 2103900 (Why is no real title available?)2004-09-28Paper
An efficient and secure protocol for multi-party key establishment
The Computer Journal. Section A Section B
2002-05-14Paper
Password authentication without using a password table
Information Processing Letters
1997-02-28Paper


Research outcomes over time


This page was built for person: Gwoboa Horng