default search action
Wen-Shenq Juang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c15]Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi:
Flexible Authentication Protocol with Key Reconstruction in WBAN Environments. ICITCS 2016: 1-5 - [c14]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, Hiroaki Kikuchi:
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments. MobiQuitous (Adjunct Proceedings) 2016: 88-93 - 2015
- [c13]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan:
A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments. AsiaJCIS 2015: 91-96 - 2014
- [c12]Chun-I Fan, Wei-Zhe Sun, Shih-Wei Huang, Wen-Shenq Juang, Jheng-Jia Huang:
Strongly Privacy-Preserving Communication Protocol for VANETs. AsiaJCIS 2014: 119-126 - [c11]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan:
An Efficient Authentication and Service Key Agreement Scheme in IOT Environments. ICS 2014: 715-723 - 2013
- [c10]Wen-Shenq Juang:
An Efficient and Practical Fair Buyer-Anonymity Exchange Scheme Using Bilinear Pairings. AsiaJCIS 2013: 19-26 - 2011
- [j25]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
Robust authentication and key agreement scheme preserving the privacy of secret key. Comput. Commun. 34(3): 274-280 (2011) - [j24]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
Provably secure and efficient identification and key agreement protocol with user anonymity. J. Comput. Syst. Sci. 77(4): 790-798 (2011) - 2010
- [j23]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems. Int. J. Ad Hoc Ubiquitous Comput. 6(3): 183-190 (2010) - [j22]Wen-Shenq Juang:
RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings. J. Syst. Softw. 83(4): 638-645 (2010)
2000 – 2009
- 2009
- [j21]Wen-Shenq Juang, Jing-Lin Wu:
Two efficient two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 35(1): 33-40 (2009) - [j20]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
User authentication scheme with privacy-preservation for multi-server environment. IEEE Commun. Lett. 13(2): 157-159 (2009) - [j19]Wen-Shenq Juang, Jing-Lin Wu:
Robust and efficient authenticated key agreement in mobile communications. Int. J. Mob. Commun. 7(5): 562-579 (2009) - 2008
- [j18]Wen-Shenq Juang, Jing-Lin Wu:
Efficient User Authentication and Key Agreement with User Privacy Protection. Int. J. Netw. Secur. 7(1): 120-129 (2008) - [j17]Wen-Shenq Juang, Wei-Ken Nien:
Efficient password authenticated key agreement using bilinear pairings. Math. Comput. Model. 47(11-12): 1238-1245 (2008) - [j16]Wen-Shenq Juang, Sian-Teng Chen, Horng-Twu Liaw:
Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. IEEE Trans. Ind. Electron. 55(6): 2551-2556 (2008) - [c9]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
An Anonymous and Deniable Conversation for a Thin Client. AINA Workshops 2008: 416-421 - 2007
- [j15]Wen-Shenq Juang:
D-cash: A flexible pre-paid e-cash scheme for date-attachment. Electron. Commer. Res. Appl. 6(1): 74-80 (2007) - [c8]Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. EUC Workshops 2007: 728-744 - [c7]Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang:
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. FGCN (2) 2007: 125-129 - [c6]Ren-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei:
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. MUE 2007: 313-318 - [c5]Wen-Shenq Juang, Jing-Lin Wu:
Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection. WCNC 2007: 2720-2725 - 2006
- [j14]Horng-Twu Liaw, Wen-Shenq Juang, Chi-Kai Lin:
An electronic online bidding auction protocol with both security and efficiency. Appl. Math. Comput. 174(2): 1487-1497 (2006) - [c4]Wen-Shenq Juang:
Efficient User Authentication and Key Agreement in Ubiquitous Computing. ICCSA (4) 2006: 396-405 - [c3]Wen-Shenq Juang:
Efficient User Authentication and Key Agreement in Wireless Sensor Networks. WISA 2006: 15-29 - 2005
- [j13]Wen-Shenq Juang:
A practical anonymous off-line multi-authority payment scheme. Electron. Commer. Res. Appl. 4(3): 240-249 (2005) - [j12]Wen-Shenq Juang, Horng-Twu Liaw, Po-Chou Lin, Chi-Kai Lin:
The design of a secure and fair sealed-bid auction service, . Math. Comput. Model. 41(8-9): 973-985 (2005) - [c2]Wen-Shenq Juang:
A Simple and Efficient Conference Scheme for Mobile Communications. WISA 2005: 81-95 - 2004
- [j11]Wen-Shenq Juang, Horng-Twu Liaw:
A practical anonymous multi-authority e-cash scheme. Appl. Math. Comput. 147(3): 699-711 (2004) - [j10]Wen-Shenq Juang:
Efficient password authenticated key agreement using smart cards. Comput. Secur. 23(2): 167-173 (2004) - [j9]Wen-Shenq Juang, Horng-Twu Liaw:
Fair blind threshold signatures in wallet with observers. J. Syst. Softw. 72(1): 25-31 (2004) - [j8]Wen-Shenq Juang:
Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. Consumer Electron. 50(1): 251-255 (2004) - 2002
- [j7]Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw:
A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. Comput. J. 45(6): 672-682 (2002) - [j6]Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw:
Privacy and Anonymity Protection with Blind Threshold Signatures. Int. J. Electron. Commer. 7(2): 143-157 (2002) - [j5]Chin-Laung Lei, Wen-Shenq Juang, Pei-Ling Yu:
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm. J. Inf. Sci. Eng. 18(1): 23-39 (2002) - 2001
- [j4]Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw:
Fair blind threshold signatures based on discrete logarithm. Comput. Syst. Sci. Eng. 16(6): 371-379 (2001)
1990 – 1999
- 1999
- [j3]Wen-Shenq Juang, Chin-Laung Lei:
Partially Blind Threshold signatures Based on Discrete Logarithm. Comput. Commun. 22(1): 73-86 (1999) - [j2]Wen-Shenq Juang, Chin-Laung Lei, C.-Y. Chang:
Anonymous channel and authentication in wireless communications. Comput. Commun. 22(15-16): 1502-1511 (1999) - 1996
- [j1]Wen-Shenq Juang, Chin-Laung Lei:
A collision-free secret ballot protocol for computerized general elections. Comput. Secur. 15(4): 339-348 (1996) - [c1]Wen-Shenq Juang, Chin-Laung Lei:
Blind Threshold Signatures Based on Discrete Logarithm. ASIAN 1996: 172-181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint