The following pages link to Wen-Guey Tzeng (Q290185):
Displaying 38 items.
- On-line algorithms for the dominating set problem (Q290186) (← links)
- Common modulus and chosen-message attacks on public-key schemes with linear recurrence relations (Q294688) (← links)
- Three \(\sum^ P_ 2\)-complete problems in computational learning theory (Q685716) (← links)
- Optimal resilient threshold GQ signatures (Q881852) (← links)
- Learning probabilistic automata and Markov chains via queries (Q1189661) (← links)
- On path equivalence of nondeterministic finite automata (Q1351166) (← links)
- Inter-protocol interleaving attacks on some authentication and key distribution protocols (Q1607566) (← links)
- A light-weight bit commitment protocol based on unpredictable channel noise (Q1725688) (← links)
- Three-quarter approximation for the number of unused colors in graph coloring (Q1818979) (← links)
- A new approach for visual cryptography (Q1866015) (← links)
- Privacy-preserving ridge regression on distributed data (Q2195358) (← links)
- A public-key traitor tracing scheme with revocation using dynamic shares (Q2572960) (← links)
- (Q2707457) (← links)
- (Q2724596) (← links)
- (Q2724600) (← links)
- (Q3043934) (← links)
- Unique Signature with Short Output from CDH Assumption (Q3464417) (← links)
- Identity-Based Proxy Re-encryption Without Random Oracles (Q3507874) (← links)
- (Q3518415) (← links)
- Cheating Prevention in Visual Cryptography (Q3546441) (← links)
- Extracting Randomness from Multiple Independent Sources (Q3547226) (← links)
- On the Jensen–Shannon Divergence and Variational Distance (Q3547722) (← links)
- An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption (Q3593167) (← links)
- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures (Q3608928) (← links)
- A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata (Q3990650) (← links)
- (Q4247454) (← links)
- (Q4428328) (← links)
- (Q4428376) (← links)
- Corrections to "A secure fault-tolerant conference-key agreement protocol" (Q4571242) (← links)
- A secure fault-tolerant conference-key agreement protocol (Q4580245) (← links)
- (Q4950030) (← links)
- Permutation Arrays Under the Chebyshev Distance (Q5281440) (← links)
- An Optimal Data Hiding Scheme With Tree-Based Parity Check (Q5370013) (← links)
- Applied Cryptography and Network Security (Q5443099) (← links)
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Q5445465) (← links)
- Information Security (Q5493179) (← links)
- Public Key Cryptography - PKC 2005 (Q5711566) (← links)
- Public Key Cryptography - PKC 2006 (Q5898960) (← links)