default search action
Tzong-Sun Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j38]Pei-Yih Ting, Jia-Lun Tsai, Tzong-Sun Wu:
Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network. IEEE Syst. J. 12(3): 2385-2394 (2018) - 2017
- [j37]Han-Yu Lin, Tzong-Sun Wu:
Toward Secure CB-Signcryption for Wireless Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 36(1-4): 1-20 (2017) - 2016
- [j36]Ming-Lun Lee, Pei-Yih Ting, Tzong-Sun Wu:
Photograph watermarking. Multim. Tools Appl. 75(23): 16173-16189 (2016) - 2015
- [j35]Tzong-Chen Wu, Tzuoh-Yi Lin, Tzong-Sun Wu, Han-Yu Lin:
Efficient english auction scheme without a secure channel. Int. Arab J. Inf. Technol. 12(3): 246-252 (2015) - [c2]Pei-Yih Ting, Shao-Da Huang, Tzong-Sun Wu, Han-Yu Lin:
A Provable Watermark-Based Copyright Protection Scheme. AsiaJCIS 2015: 124-129 - 2014
- [j34]Tzong-Sun Wu, Ming-Lun Lee, Han-Yu Lin, Chao-Yuan Wang:
Shoulder-surfing-proof graphical password authentication scheme. Int. J. Inf. Sec. 13(3): 245-254 (2014) - [j33]Tzong-Sun Wu, Han-Yu Lin:
Provably secure proxy convertible authenticated encryption scheme based on RSA. Inf. Sci. 278: 577-587 (2014) - [j32]Tzong-Sun Wu, Yih-Sen Chen, Han-Yu Lin:
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System. KSII Trans. Internet Inf. Syst. 8(3): 1157-1177 (2014) - 2013
- [j31]Tzong-Sun Wu, Han-Yu Lin:
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network. Mob. Networks Appl. 18(5): 594-599 (2013) - [j30]Tzong-Sun Wu, Han-Yu Lin:
A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension. Secur. Commun. Networks 6(6): 757-764 (2013) - 2012
- [j29]Tzong-Sun Wu, Han-Yu Lin, Pei-Yih Ting:
A publicly verifiable PCAE scheme for confidential applications with proxy delegation. Trans. Emerg. Telecommun. Technol. 23(2): 172-185 (2012) - [j28]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:
Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs. J. Inf. Sci. Eng. 28(4): 739-753 (2012) - [j27]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:
An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce. J. Inf. Sci. Eng. 28(4): 771-785 (2012) - 2011
- [j26]Tzong-Sun Wu, Han-Yu Lin, Wang-Chieh Hu, Yih-Sen Chen:
Audio watermarking scheme with dynamic adjustment in mute period. Expert Syst. Appl. 38(6): 6787-6792 (2011) - [j25]Tzong-Sun Wu, Han-Yu Lin, Ming-Lun Lee, Won-Yi Chen:
Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue. J. Digit. Inf. Manag. 9(2): 51-54 (2011) - [j24]Han-Yu Lin, Tzong-Sun Wu, Yi-Shiung Yeh:
A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation. J. Inf. Sci. Eng. 27(2): 451-463 (2011) - 2010
- [j23]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang, Yi-Shiung Yeh:
Efficient proxy signcryption scheme with provable CCA and CMA security. Comput. Math. Appl. 60(7): 1850-1858 (2010)
2000 – 2009
- 2009
- [j22]Tzong-Sun Wu, Han-Yu Lin:
Secure Convertible Authenticated Encryption Scheme Based on RSA. Informatica (Slovenia) 33(4): 481-486 (2009) - [j21]Tzong-Sun Wu, Han-Yu Lin:
Efficient self-certified proxy CAE scheme and its variants. J. Syst. Softw. 82(6): 974-980 (2009) - 2008
- [j20]Tzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu:
Convertible multi-authenticated encryption scheme. Inf. Sci. 178(1): 256-263 (2008) - [c1]Han-Yu Lin, Tzong-Sun Wu, Ting-Yu Huang, Yi-Shiung Yeh:
Self-Certified Proxy Convertible Authenticated Encryption Scheme. ISDA (3) 2008: 479-483 - 2005
- [j19]Chien-Lung Hsu, Tzong-Sun Wu, Wei-Hua He:
New proxy multi-signature scheme. Appl. Math. Comput. 162(3): 1201-1206 (2005) - [j18]Chien-Lung Hsu, Tzong-Sun Wu:
Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability. Appl. Math. Comput. 164(1): 201-225 (2005) - [j17]Chien-Lung Hsu, Tzong-Sun Wu:
Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack. Appl. Math. Comput. 168(1): 305-319 (2005) - 2004
- [j16]Chien-Lung Hsu, Tzong-Sun Wu:
Efficient proxy signature schemes using self-certified public keys. Appl. Math. Comput. 152(3): 807-820 (2004) - [j15]Tzong-Sun Wu, Han-Yu Lin:
Robust key authentication scheme resistant to public key substitution attacks. Appl. Math. Comput. 157(3): 825-833 (2004) - [j14]Tzong-Sun Wu, Chien-Lung Hsu:
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Comput. Secur. 23(2): 120-125 (2004) - [j13]Tzong-Sun Wu, Chien-Lung Hsu:
Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers. Comput. Stand. Interfaces 26(5): 477-481 (2004) - [j12]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:
Group-oriented signature scheme with distinguished signing authoritie. Future Gener. Comput. Syst. 20(5): 865-873 (2004) - 2003
- [j11]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:
Improvement of threshold proxy signature scheme. Appl. Math. Comput. 136(2-3): 315-321 (2003) - [j10]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu, Chris J. Mitchell:
Improvement of modified authenticated key agreement protocol. Appl. Math. Comput. 142(2-3): 305-308 (2003) - [j9]Chien-Lung Hsu, Tzong-Sun Wu:
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Comput. Secur. 22(5): 453-456 (2003) - [j8]Tzong-Sun Wu, Chien-Lung Hsu, Han-Yu Lin, Po-Sheng Huang:
Improvement of the Miyazaki-Takaragi threshold digital signature scheme. Inf. Process. Lett. 88(4): 183-186 (2003) - [j7]Tzong-Sun Wu, Chien-Lung Hsu:
Threshold signature scheme using self-certified public keys. J. Syst. Softw. 67(2): 89-97 (2003) - 2002
- [j6]Tzong-Sun Wu, Chien-Lung Hsu:
ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures. Appl. Math. Comput. 131(2-3): 349-356 (2002) - [j5]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:
Improvements of generalization of threshold signature and authenticated encryption for group communications. Inf. Process. Lett. 81(1): 41-45 (2002) - [j4]Tzong-Sun Wu, Chien-Lung Hsu:
Convertible authenticated encryption scheme. J. Syst. Softw. 62(3): 205-209 (2002) - 2001
- [j3]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu:
New nonrepudiable threshold proxy signature scheme with known signers. J. Syst. Softw. 58(2): 119-124 (2001)
1990 – 1999
- 1996
- [j2]Tzong-Chen Wu, Shu-Lin Chou, Tzong-Sun Wu:
Two ID-based multisignature protocols for sequential and broadcasting architectures. Comput. Commun. 19(9-10): 851-856 (1996) - 1995
- [j1]Tzong-Chen Wu, Tzong-Sun Wu:
Group commitment protocol based on zero knowledge proofs. Comput. Commun. 18(9): 654-656 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint