Cryptographers' World
 

Wen-Guey Tzeng


Author's Web Page Link

12 papers in database with 322 citations Star

H-number: 8

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Wen-Guey Tzeng,  Zhi-Jia Tzeng,  A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares, Designs, Codes and Cryptography, Volume 35(1), pp. 47 - 61, Springer, 2005.

[Electronic Edition][Cited 58 times Red Star]

2. Wen-Guey Tzeng,  Chi-Ming Hu,  A New Approach for Visual Cryptography, Designs, Codes and Cryptography, Volume 27(3), pp. 207 - 227, Springer, 2002.

[Electronic Edition][Cited 15 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yi-Ru Liu,  Wen-Guey Tzeng,  Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time, pp. 380 - 396, PKC 2008.

[Electronic Edition][Cited 3 times ]

2. Cheng-Kang Chu,  Wen-Guey Tzeng,  Conditional Oblivious Cast, pp. 443 - 457, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

3. Hsiao-Ying Lin,  Wen-Guey Tzeng,  An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption, pp. 456 - 466, ACNS 2005.

[Electronic Edition][Cited 31 times ]

4. Cheng-Kang Chu,  Wen-Guey Tzeng,  Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries, pp. 172 - 183, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

5. Li-Shan Liu,  Cheng-Kang Chu,  Wen-Guey Tzeng,  A Threshold GQ Signature Scheme, pp. 137 - 150, ACNS 2003.

[Electronic Edition][Cited 8 times ]

6. Wen-Guey Tzeng,  Efficient 1-Out-n Oblivious Transfer Schemes, pp. 159 - 171, PKC 2002.

[Electronic Edition][Cited 48 times ]

7. Wen-Guey Tzeng,  Zhi-Jia Tzeng,  Robust Forward-Secure Signature Schemes with Proactive Security, pp. 264 - 276, PKC 2001.

[Electronic Edition][Cited 16 times ]

8. Wen-Guey Tzeng,  Zhi-Jia Tzeng,  A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares, pp. 207 - 224, PKC 2001.

[Electronic Edition][Cited 79 times Red Star]

9. Wen-Guey Tzeng,  Zhi-Jia Tzeng,  Round-Efficient Conference Key Agreement Protocols with Provable Security, pp. 614 - 628, ASIACRYPT 2000.

[Electronic Edition][Cited 49 times ]

10. Wen-Guey Tzeng,  A Practical and Secure-Fault-Tolerant Conference-Key Agreement Protocol, pp. 1 - 13, PKC 2000.

[Electronic Edition][Cited 37 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...