BibTeX records: Wen-Guey Tzeng

download as .bib file

@article{DBLP:journals/tdsc/RezapourT22,
  author       = {Amir Rezapour and
                  Wen{-}Guey Tzeng},
  title        = {RL-Shield: Mitigating Target Link-Flooding Attacks Using {SDN} and
                  Deep Reinforcement Learning Routing Algorithm},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {4052--4067},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3118081},
  doi          = {10.1109/TDSC.2021.3118081},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/RezapourT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/RezapourT21,
  author       = {Amir Rezapour and
                  Wen{-}Guey Tzeng},
  title        = {RL-PMAgg: Robust aggregation for {PM2.5} using deep RL-based trust
                  management system},
  journal      = {Internet Things},
  volume       = {13},
  pages        = {100347},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.iot.2020.100347},
  doi          = {10.1016/J.IOT.2020.100347},
  timestamp    = {Fri, 05 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/RezapourT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/LiRT21,
  author       = {Lyue Li and
                  Amir Rezapour and
                  Wen{-}Guey Tzeng},
  title        = {A Black-Box Adversarial Attack via Deep Reinforcement Learning on
                  the Feature Space},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021,
                  Aizuwakamatsu, Japan, January 30 - February 2, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC49826.2021.9346264},
  doi          = {10.1109/DSC49826.2021.9346264},
  timestamp    = {Wed, 17 Feb 2021 11:46:28 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/LiRT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LinT20,
  author       = {Chung{-}Yi Lin and
                  Wen{-}Guey Tzeng},
  title        = {A Cooperative Game-Theoretic Model in Cloud Storage Auditing},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {127--143},
  year         = {2020},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=172\_2297},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LinT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/RezapourT20,
  author       = {Amir Rezapour and
                  Wen{-}Guey Tzeng},
  title        = {A Robust Algorithm for Predicting Attacks Using Collaborative Security
                  Logs},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {36},
  number       = {3},
  pages        = {597--619},
  year         = {2020},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=174\_2326},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/RezapourT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ChenRTT20,
  author       = {Yi{-}Ren Chen and
                  Amir Rezapour and
                  Wen{-}Guey Tzeng and
                  Shi{-}Chun Tsai},
  title        = {RL-Routing: An {SDN} Routing Algorithm Based on Deep Reinforcement
                  Learning},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {3185--3199},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSE.2020.3017751},
  doi          = {10.1109/TNSE.2020.3017751},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/ChenRTT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GuanT19,
  author       = {Albert Guan and
                  Wen{-}Guey Tzeng},
  title        = {A light-weight bit commitment protocol based on unpredictable channel
                  noise},
  journal      = {Theor. Comput. Sci.},
  volume       = {755},
  pages        = {29--37},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2018.06.051},
  doi          = {10.1016/J.TCS.2018.06.051},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/GuanT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenRT18,
  author       = {Yi{-}Ruei Chen and
                  Amir Rezapour and
                  Wen{-}Guey Tzeng},
  title        = {Privacy-preserving ridge regression on distributed data},
  journal      = {Inf. Sci.},
  volume       = {451-452},
  pages        = {34--49},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.03.061},
  doi          = {10.1016/J.INS.2018.03.061},
  timestamp    = {Fri, 01 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChenRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ChenWT18,
  author       = {Yen{-}Chung Chen and
                  Yu{-}Sung Wu and
                  Wen{-}Guey Tzeng},
  title        = {Phrase Search for Encrypted Cloud Storage},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {34},
  number       = {2},
  pages        = {401--417},
  year         = {2018},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=161\_2124},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ChenWT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LeeRT18,
  author       = {Wei{-}Min Lee and
                  Amir Rezapour and
                  Wen{-}Guey Tzeng},
  title        = {Monsieur Poirot: Detecting Botnets Using Re-Identification Algorithm
                  and Nontrivial Feature Selection Technique},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422081},
  doi          = {10.1109/ICC.2018.8422081},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LeeRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RezapourT18,
  author       = {Amir Rezapour and
                  Wen{-}Guey Tzeng},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {A Robust Intrusion Detection Network Using Thresholdless Trust Management
                  System with Incentive Design},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {139--154},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0\_8},
  doi          = {10.1007/978-3-030-01704-0\_8},
  timestamp    = {Fri, 11 Jan 2019 16:16:24 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/RezapourT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCT18,
  author       = {Shao{-}Chien Chen and
                  Yi{-}Ruei Chen and
                  Wen{-}Guey Tzeng},
  title        = {Effective Botnet Detection Through Neural Networks on Convolutional
                  Features},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {372--378},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00062},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00062},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChenT17,
  author       = {Yi{-}Ruei Chen and
                  Wen{-}Guey Tzeng},
  title        = {Group key management with efficient rekey mechanism: {A} Semi-Stateful
                  approach for out-of-Synchronized members},
  journal      = {Comput. Commun.},
  volume       = {98},
  pages        = {31--42},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comcom.2016.08.001},
  doi          = {10.1016/J.COMCOM.2016.08.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChenT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/GuanT17,
  author       = {Albert Guan and
                  Wen{-}Guey Tzeng},
  title        = {A light-weight oblivious transfer protocol based on channel noise},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {2},
  number       = {1},
  pages        = {28--38},
  year         = {2017},
  url          = {https://doi.org/10.1080/23799927.2017.1323798},
  doi          = {10.1080/23799927.2017.1323798},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/GuanT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GuanT17,
  author       = {Albert Guan and
                  Wen{-}Guey Tzeng},
  title        = {A secret key establishment protocol for wireless networks using noisy
                  channels},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {139--151},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-15807},
  doi          = {10.3233/JCS-15807},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GuanT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LinT17,
  author       = {Chung{-}Yi Lin and
                  Wen{-}Guey Tzeng},
  title        = {Strategy analysis for cloud storage reliability management based on
                  game theory},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {153--171},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-16813},
  doi          = {10.3233/JCS-16813},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LinT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ChenST17,
  author       = {Yi{-}Ruei Chen and
                  Shiuan{-}Tzuo Shen and
                  Wen{-}Guey Tzeng},
  title        = {Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations
                  over {\(\mathbb{Z}\)}\({}_{\mbox{p}}\)},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {1},
  pages        = {233--250},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=154\_2004},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ChenST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenT17,
  author       = {Yi{-}Ruei Chen and
                  Wen{-}Guey Tzeng},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement
                  and Extended KI-Security},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {165--183},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_9},
  doi          = {10.1007/978-3-319-61204-1\_9},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChenT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/LeeCT17,
  author       = {Chih{-}Ning Lee and
                  Yi{-}Ruei Chen and
                  Wen{-}Guey Tzeng},
  title        = {An online subject-based spam filter using natural language features},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017,
                  Taipei, Taiwan, August 7-10, 2017},
  pages        = {479--487},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/DESEC.2017.8073830},
  doi          = {10.1109/DESEC.2017.8073830},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/LeeCT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/SuRT17,
  author       = {Yuan{-}Hsiang Su and
                  Amir Rezapour and
                  Wen{-}Guey Tzeng},
  title        = {The forward-backward string: {A} new robust feature for botnet detection},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017,
                  Taipei, Taiwan, August 7-10, 2017},
  pages        = {485--492},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/DESEC.2017.8073831},
  doi          = {10.1109/DESEC.2017.8073831},
  timestamp    = {Sat, 06 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/SuRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ShenT15,
  author       = {Shiuan{-}Tzuo Shen and
                  Wen{-}Guey Tzeng},
  title        = {Delegated integrity check for hierarchical cloud data},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {471--508},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-150527},
  doi          = {10.3233/JCS-150527},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ShenT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/ShenLT15,
  author       = {Shiuan{-}Tzuo Shen and
                  Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng},
  title        = {An Effective Integrity Check Scheme for Secure Erasure Code-Based
                  Storage Systems},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {64},
  number       = {3},
  pages        = {840--851},
  year         = {2015},
  url          = {https://doi.org/10.1109/TR.2015.2423192},
  doi          = {10.1109/TR.2015.2423192},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/ShenLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ShenRT15,
  author       = {Shiuan{-}Tzuo Shen and
                  Amir Rezapour and
                  Wen{-}Guey Tzeng},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Unique Signature with Short Output from {CDH} Assumption},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {475--488},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_26},
  doi          = {10.1007/978-3-319-26059-4\_26},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ShenRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShenRT15,
  author       = {Shiuan{-}Tzuo Shen and
                  Amir Rezapour and
                  Wen{-}Guey Tzeng},
  title        = {Unique Signature with Short Output from {CDH} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {830},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/830},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShenRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenST15,
  author       = {Yi{-}Ruei Chen and
                  Shiuan{-}Tzuo Shen and
                  Wen{-}Guey Tzeng},
  title        = {Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations
                  over Zp},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {947},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/947},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChenWT14,
  author       = {Yen{-}Chung Chen and
                  Yu{-}Sung Wu and
                  Wen{-}Guey Tzeng},
  title        = {Preserving user query privacy in cloud-based security services},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {6},
  pages        = {997--1024},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140520},
  doi          = {10.3233/JCS-140520},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChenWT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ChuCTZD14,
  author       = {Cheng{-}Kang Chu and
                  Sherman S. M. Chow and
                  Wen{-}Guey Tzeng and
                  Jianying Zhou and
                  Robert H. Deng},
  title        = {Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {2},
  pages        = {468--477},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2013.112},
  doi          = {10.1109/TPDS.2013.112},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ChuCTZD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinT14,
  author       = {Chung{-}Yi Lin and
                  Wen{-}Guey Tzeng},
  title        = {Game-Theoretic Strategy Analysis for Data Reliability Management in
                  Cloud Storage Systems},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {187--195},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.32},
  doi          = {10.1109/SERE.2014.32},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenCTZ13,
  author       = {Yi{-}Ruei Chen and
                  Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng and
                  Jianying Zhou},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {CloudHKA: {A} Cryptographic Approach for Hierarchical Access Control
                  in Cloud Computing},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_3},
  doi          = {10.1007/978-3-642-38980-1\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChenCTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013asia,
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2484313},
  isbn         = {978-1-4503-1767-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2013asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCTZ13,
  author       = {Yi{-}Ruei Chen and
                  Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng and
                  Jianying Zhou},
  title        = {CloudHKA: {A} Cryptographic Approach for Hierarchical Access Control
                  in Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LinT12,
  author       = {Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng},
  title        = {A Secure Erasure Code-Based Cloud Storage System with Secure Data
                  Forwarding},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {23},
  number       = {6},
  pages        = {995--1003},
  year         = {2012},
  url          = {https://doi.org/10.1109/TPDS.2011.252},
  doi          = {10.1109/TPDS.2011.252},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/LinT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LinTSL12,
  author       = {Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng and
                  Shiuan{-}Tzuo Shen and
                  Bao{-}Shuh Paul Lin},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {A Practical Smart Metering System Supporting Privacy Preserving Billing
                  and Load Monitoring},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {544--560},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_32},
  doi          = {10.1007/978-3-642-31284-7\_32},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LinTSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/LinSTL12,
  author       = {Hsiao{-}Ying Lin and
                  Shiuan{-}Tzuo Shen and
                  Wen{-}Guey Tzeng and
                  Bao{-}Shuh Paul Lin},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {Toward Data Confidentiality via Integrating Hybrid Encryption Schemes
                  and Hadoop Distributed File System},
  booktitle    = {{IEEE} 26th International Conference on Advanced Information Networking
                  and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012},
  pages        = {740--747},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AINA.2012.28},
  doi          = {10.1109/AINA.2012.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/LinSTL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinKT12,
  author       = {Hsiao{-}Ying Lin and
                  John Kubiatowicz and
                  Wen{-}Guey Tzeng},
  title        = {A Secure Fine-Grained Access Control Mechanism for Networked Storage
                  Systems},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {225--234},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.35},
  doi          = {10.1109/SERE.2012.35},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenT12,
  author       = {Yi{-}Ruei Chen and
                  Wen{-}Guey Tzeng},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Efficient and Provably-Secure Group Key Management Scheme Using Key
                  Derivation},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {295--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.138},
  doi          = {10.1109/TRUSTCOM.2012.138},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/HouLTT11,
  author       = {Chung{-}Li Hou and
                  Chang{-}Chun Lu and
                  Shi{-}Chun Tsai and
                  Wen{-}Guey Tzeng},
  title        = {An Optimal Data Hiding Scheme With Tree-Based Parity Check},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {20},
  number       = {3},
  pages        = {880--886},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIP.2010.2072513},
  doi          = {10.1109/TIP.2010.2072513},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/HouLTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apnoms/ChouCT11,
  author       = {Kuei{-}Yi Chou and
                  Yi{-}Ruei Chen and
                  Wen{-}Guey Tzeng},
  title        = {An efficient and secure group key management scheme supporting frequent
                  key updates on Pay-TV systems},
  booktitle    = {13th Asia-Pacific Network Operations and Management Symposium, {APNOMS}
                  2011, Taipei, Taiwan, September 21-23, 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/APNOMS.2011.6077025},
  doi          = {10.1109/APNOMS.2011.6077025},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/apnoms/ChouCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ShenT11,
  author       = {Shiuan{-}Tzuo Shen and
                  Wen{-}Guey Tzeng},
  editor       = {Sihan Qing and
                  Willy Susilo and
                  Guilin Wang and
                  Dongmei Liu},
  title        = {Delegable Provable Data Possession for Remote Data in the Clouds},
  booktitle    = {Information and Communications Security - 13th International Conference,
                  {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7043},
  pages        = {93--111},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25243-3\_8},
  doi          = {10.1007/978-3-642-25243-3\_8},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ShenT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChenTT11,
  author       = {Yi{-}Ruei Chen and
                  J. D. Tygar and
                  Wen{-}Guey Tzeng},
  title        = {Secure group key management using uni-directional proxy re-encryption
                  schemes},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {1952--1960},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5934999},
  doi          = {10.1109/INFCOM.2011.5934999},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ChenTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinTL11,
  author       = {Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng and
                  Bao{-}Shuh Paul Lin},
  title        = {A Decentralized Repair Mechanism for Decentralized Erasure Code Based
                  Storage Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {613--620},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.79},
  doi          = {10.1109/TRUSTCOM.2011.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinTL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LeeWYT10,
  author       = {Chin{-}I Lee and
                  Tzong{-}Chen Wu and
                  Bo{-}Yin Yang and
                  Wen{-}Guey Tzeng},
  title        = {New Secure Broadcasting Scheme Realizing Information Granularity},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {26},
  number       = {4},
  pages        = {1509--1523},
  year         = {2010},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2010/201007\_22.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LeeWYT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KloveLTT10,
  author       = {Torleiv Kl{\o}ve and
                  Te{-}Tsung Lin and
                  Shi{-}Chun Tsai and
                  Wen{-}Guey Tzeng},
  title        = {Permutation arrays under the Chebyshev distance},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {56},
  number       = {6},
  pages        = {2611--2617},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIT.2010.2046212},
  doi          = {10.1109/TIT.2010.2046212},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KloveLTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LinT10,
  author       = {Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng},
  title        = {A Secure Decentralized Erasure Code for Distributed Networked Storage},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {21},
  number       = {11},
  pages        = {1586--1594},
  year         = {2010},
  url          = {https://doi.org/10.1109/TPDS.2010.27},
  doi          = {10.1109/TPDS.2010.27},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/LinT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LinT09,
  author       = {Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng},
  title        = {Anonymous Password Based Authenticated Key Exchange with Sub-Linear
                  Communication},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {25},
  number       = {3},
  pages        = {907--920},
  year         = {2009},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2009/200905\_16.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LinT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ChuT09,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Efficient Identity-Committable Signature and Group-Oriented Ring Signature
                  Schemes},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {25},
  number       = {5},
  pages        = {1465--1483},
  year         = {2009},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2009/200909\_10.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ChuT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/TsaiTZ09,
  author       = {Shi{-}Chun Tsai and
                  Wen{-}Guey Tzeng and
                  Kun{-}Yi Zhou},
  title        = {Key establishment schemes against storage-bounded adversaries in wireless
                  sensor networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {8},
  number       = {3},
  pages        = {1218--1222},
  year         = {2009},
  url          = {https://doi.org/10.1109/TWC.2009.081048},
  doi          = {10.1109/TWC.2009.081048},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/TsaiTZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenT09,
  author       = {Yi{-}Ruei Chen and
                  Wen{-}Guey Tzeng},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {121--134},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_11},
  doi          = {10.1007/978-3-642-11145-7\_11},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ChenT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-2682,
  author       = {Torleiv Kl{\o}ve and
                  Te{-}Tsung Lin and
                  Shi{-}Chun Tsai and
                  Wen{-}Guey Tzeng},
  title        = {Permutation Arrays Under the Chebyshev Distance},
  journal      = {CoRR},
  volume       = {abs/0907.2682},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.2682},
  eprinttype    = {arXiv},
  eprint       = {0907.2682},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-2682.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChuT08,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Efficient k-out-of-n Oblivious Transfer Schemes},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {397--415},
  year         = {2008},
  url          = {https://doi.org/10.3217/jucs-014-03-0397},
  doi          = {10.3217/JUCS-014-03-0397},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/ChuT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LinTT08,
  author       = {Te{-}Tsung Lin and
                  Shi{-}Chun Tsai and
                  Wen{-}Guey Tzeng},
  editor       = {Frank R. Kschischang and
                  En{-}Hui Yang},
  title        = {Efficient encoding and decoding with permutation arrays},
  booktitle    = {2008 {IEEE} International Symposium on Information Theory, {ISIT}
                  2008, Toronto, ON, Canada, July 6-11, 2008},
  pages        = {211--214},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISIT.2008.4594978},
  doi          = {10.1109/ISIT.2008.4594978},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LinTT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuT08,
  author       = {Yi{-}Ru Liu and
                  Wen{-}Guey Tzeng},
  editor       = {Ronald Cramer},
  title        = {Public Key Broadcast Encryption with Low Number of Keys and Constant
                  Decryption Time},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {380--396},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_22},
  doi          = {10.1007/978-3-540-78440-1\_22},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Optimal resilient threshold {GQ} signatures},
  journal      = {Inf. Sci.},
  volume       = {177},
  number       = {8},
  pages        = {1834--1851},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ins.2006.11.001},
  doi          = {10.1016/J.INS.2006.11.001},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/HuT07,
  author       = {Chi{-}Ming Hu and
                  Wen{-}Guey Tzeng},
  title        = {Cheating Prevention in Visual Cryptography},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {16},
  number       = {1},
  pages        = {36--45},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIP.2006.884916},
  doi          = {10.1109/TIP.2006.884916},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/HuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Identity-Committable Signatures and Their Extension to Group-Oriented
                  Ring Signatures},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {323--337},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_24},
  doi          = {10.1007/978-3-540-73458-1\_24},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Identity-Based Proxy Re-encryption Without Random Oracles},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {189--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_13},
  doi          = {10.1007/978-3-540-75496-1\_13},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OuTT07,
  author       = {Jheng{-}Ru Ou and
                  Shi{-}Chun Tsai and
                  Wen{-}Guey Tzeng},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Efficient Large-Scale Distributed Key Generation against Burst Interruption},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {197--203},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OuTT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuT07,
  author       = {Yi{-}Ru Liu and
                  Wen{-}Guey Tzeng},
  title        = {Public Key Broadcast Encryption with Low Number of Keys and Constant
                  Decryption Time (Version 2)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Identity-Committable Signatures and Their Extension to Group-Oriented
                  Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Tzeng06,
  author       = {Wen{-}Guey Tzeng},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {A secure system for data access based on anonymous authentication
                  and time-dependent hierarchical keys},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {223--230},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128851},
  doi          = {10.1145/1128817.1128851},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Tzeng06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChuT06,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Conditional Oblivious Cast},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {443--457},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_29},
  doi          = {10.1007/11745853\_29},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChuT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TzengT05,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  title        = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic
                  Shares},
  journal      = {Des. Codes Cryptogr.},
  volume       = {35},
  number       = {1},
  pages        = {47--61},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-6150-3},
  doi          = {10.1007/S10623-003-6150-3},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TzengT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LeeLTT05,
  author       = {Chia{-}Jung Lee and
                  Chi{-}Jen Lu and
                  Shi{-}Chun Tsai and
                  Wen{-}Guey Tzeng},
  title        = {Extracting randomness from multiple independent sources},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {6},
  pages        = {2224--2227},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2005.847746},
  doi          = {10.1109/TIT.2005.847746},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LeeLTT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TsaiTW05,
  author       = {Shi{-}Chun Tsai and
                  Wen{-}Guey Tzeng and
                  Hsin{-}Lung Wu},
  title        = {On the Jensen-Shannon Divergence and Variational Distance},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {9},
  pages        = {3333--3336},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2005.853308},
  doi          = {10.1109/TIT.2005.853308},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/TsaiTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LinT05,
  author       = {Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {An Efficient Solution to the Millionaires' Problem Based on Homomorphic
                  Encryption},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {456--466},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_31},
  doi          = {10.1007/11496137\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LinT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HuT05,
  author       = {Chi{-}Ming Hu and
                  Wen{-}Guey Tzeng},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Compatible Ideal Contrast Visual Cryptography Schemes with Reversing},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {300--313},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_22},
  doi          = {10.1007/11556992\_22},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HuT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChuT05,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Serge Vaudenay},
  title        = {Efficient \emph{k}-Out-of-\emph{n} Oblivious Transfer Schemes with
                  Adaptive and Non-adaptive Queries},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {172--183},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_12},
  doi          = {10.1007/978-3-540-30580-4\_12},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChuT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinT05,
  author       = {Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng},
  title        = {An Efficient Solution to The Millionaires' Problem Based on Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Tzeng04,
  author       = {Wen{-}Guey Tzeng},
  title        = {Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable
                  Parameters},
  journal      = {{IEEE} Trans. Computers},
  volume       = {53},
  number       = {2},
  pages        = {232--240},
  year         = {2004},
  url          = {https://doi.org/10.1109/TC.2004.1261831},
  doi          = {10.1109/TC.2004.1261831},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Tzeng04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuT04,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and
                  Non-Adaptive Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiuCT03,
  author       = {Li{-}Shan Liu and
                  Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {A Threshold {GQ} Signature Scheme},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {137--150},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_11},
  doi          = {10.1007/978-3-540-45203-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiuCT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iadis/LinTTTY03,
  author       = {Shun{-}Chieh Lin and
                  Wen{-}Hsiang Tsai and
                  Shian{-}Shyong Tseng and
                  Wen{-}Guey Tzeng and
                  Shyan{-}Ming Yuan},
  title        = {A Framework of High Confidence E-Healthcare Information System},
  booktitle    = {Proceedings of the {IADIS} International Conference WWW/Internet 2003,
                  {ICWI} 2003, Algarve, Portugal, November 5-8, 2003},
  pages        = {493--500},
  publisher    = {{IADIS}},
  year         = {2003},
  timestamp    = {Thu, 18 Mar 2004 15:27:46 +0100},
  biburl       = {https://dblp.org/rec/conf/iadis/LinTTTY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/HwangT03,
  author       = {Min{-}Shiang Hwang and
                  Wen{-}Guey Tzeng},
  editor       = {Hyun{-}Kook Kahng},
  title        = {A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy},
  booktitle    = {Information Networking, Networking Technologies for Enhanced Internet
                  Services International Conference, {ICOIN} 2003, Cheju Island, Korea,
                  February 12-14, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2662},
  pages        = {757--761},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45235-5\_74},
  doi          = {10.1007/978-3-540-45235-5\_74},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/HwangT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuLT03,
  author       = {Cheng{-}Kang Chu and
                  Li{-}Shan Liu and
                  Wen{-}Guey Tzeng},
  title        = {A Threshold {GQ} Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuLT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TzengH02,
  author       = {Wen{-}Guey Tzeng and
                  Chi{-}Ming Hu},
  title        = {A New Approach for Visual Cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {27},
  number       = {3},
  pages        = {207--227},
  year         = {2002},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TzengH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Tzeng02,
  author       = {Wen{-}Guey Tzeng},
  title        = {A Secure Fault-Tolerant Conference-Key Agreement Protocol},
  journal      = {{IEEE} Trans. Computers},
  volume       = {51},
  number       = {4},
  pages        = {373--379},
  year         = {2002},
  url          = {https://doi.org/10.1109/12.995447},
  doi          = {10.1109/12.995447},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Tzeng02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Tzeng02a,
  author       = {Wen{-}Guey Tzeng},
  title        = {Corrections to "A Secure Fault-Tolerant Conference-Key Agreement
                  Protocol"},
  journal      = {{IEEE} Trans. Computers},
  volume       = {51},
  number       = {12},
  pages        = {1462},
  year         = {2002},
  url          = {https://doi.org/10.1109/TC.2002.1146714},
  doi          = {10.1109/TC.2002.1146714},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Tzeng02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/Tzeng02,
  author       = {Wen{-}Guey Tzeng},
  title        = {A Time-Bound Cryptographic Key Assignment Scheme for Access Control
                  in a Hierarchy},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {14},
  number       = {1},
  pages        = {182--188},
  year         = {2002},
  url          = {https://doi.org/10.1109/69.979981},
  doi          = {10.1109/69.979981},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/Tzeng02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TzengT02,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Robust Key-Evolving Public Key Encryption Schemes},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_6},
  doi          = {10.1007/3-540-36159-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/TzengT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChuT02,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Distributed Key Generation as a Component of an Integrated Protocol},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {411--421},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_35},
  doi          = {10.1007/3-540-36159-6\_35},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChuT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Tzeng02,
  author       = {Wen{-}Guey Tzeng},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Efficient 1-Out-n Oblivious Transfer Schemes},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_11},
  doi          = {10.1007/3-540-45664-3\_11},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Tzeng02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/TzengT01,
  author       = {Zhi{-}Jia Tzeng and
                  Wen{-}Guey Tzeng},
  title        = {Practical and Efficient Electronic Voting Schemes},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {17},
  number       = {6},
  pages        = {865--877},
  year         = {2001},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2001/200111\_01.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/TzengT01,
  author       = {Zhi{-}Jia Tzeng and
                  Wen{-}Guey Tzeng},
  title        = {Authentication of Mobile Users in Third Generation Mobile Systems},
  journal      = {Wirel. Pers. Commun.},
  volume       = {16},
  number       = {1},
  pages        = {35--50},
  year         = {2001},
  url          = {https://doi.org/10.1023/A:1026530706019},
  doi          = {10.1023/A:1026530706019},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TzengT01,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Kwangjo Kim},
  title        = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic
                  Shares},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {207--224},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_16},
  doi          = {10.1007/3-540-44586-2\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TzengT01a,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Kwangjo Kim},
  title        = {Robust Forward-Secure Signature Schemes with Proactive Security},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {264--276},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_19},
  doi          = {10.1007/3-540-44586-2\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TzengT01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TzengT01,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  title        = {Robust key-evolving public key encryption schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tzeng01,
  author       = {Wen{-}Guey Tzeng},
  title        = {Efficient oblivious transfer schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tzeng01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/TzengT00,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Tatsuaki Okamoto},
  title        = {Round-Efficient Conference Key Agreement Protocols with Provable Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {614--628},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_47},
  doi          = {10.1007/3-540-44448-3\_47},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/TzengT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Tzeng00,
  author       = {Wen{-}Guey Tzeng},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_1},
  doi          = {10.1007/978-3-540-46588-1\_1},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Tzeng00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/TzengH99,
  author       = {Wen{-}Guey Tzeng and
                  Chi{-}Ming Hu},
  title        = {Inter-Protocol Interleaving Attacks on Some Authentication and Key
                  Distribution Protocols},
  journal      = {Inf. Process. Lett.},
  volume       = {69},
  number       = {6},
  pages        = {297--302},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0190(99)00023-X},
  doi          = {10.1016/S0020-0190(99)00023-X},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/TzengH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Tzeng99,
  author       = {Wen{-}Guey Tzeng},
  title        = {Common Modulus and Chosen-Message Attacks on Public-Key Schemes with
                  Linear Recurrence Relations},
  journal      = {Inf. Process. Lett.},
  volume       = {70},
  number       = {3},
  pages        = {153--156},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0190(99)00055-1},
  doi          = {10.1016/S0020-0190(99)00055-1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Tzeng99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/TzengK99,
  author       = {Wen{-}Guey Tzeng and
                  Gow{-}Hsing King},
  title        = {Three-Quarter Approximation for the Number of Unused Colors in Graph
                  Coloring},
  journal      = {Inf. Sci.},
  volume       = {114},
  number       = {1-4},
  pages        = {105--126},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0255(98)10058-0},
  doi          = {10.1016/S0020-0255(98)10058-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/TzengK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/KingT99,
  author       = {Gow{-}Hsing King and
                  Wen{-}Guey Tzeng},
  title        = {A New Graph Invariant for Graph Isomorphism: Probability Propagation
                  Matrix},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {15},
  number       = {3},
  pages        = {337--352},
  year         = {1999},
  url          = {http://www.iis.sinica.edu.tw/page/jise/1999/199905\_01.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/KingT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webnet/ChuTYY98,
  author       = {Kuen{-}Feng Chu and
                  Wen{-}Guey Tzeng and
                  Ping{-}Jer Yeh and
                  Shyan{-}Ming Yuan},
  editor       = {Hermann A. Maurer and
                  Richard G. Olson},
  title        = {An Integrated System for Multilevel Secure Compound Documents},
  booktitle    = {Proceedings of WebNet 98 - World Conference on the {WWW} and Internet
                  {\&} Intranet, Orlando, Florida, USA, November 7-12, 1998},
  publisher    = {{AACE}},
  year         = {1998},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/webnet/ChuTYY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KingT97,
  author       = {Gow{-}Hsing King and
                  Wen{-}Guey Tzeng},
  title        = {On-Line Algorithms for the Dominating Set Problem},
  journal      = {Inf. Process. Lett.},
  volume       = {61},
  number       = {1},
  pages        = {11--14},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0020-0190(96)00191-3},
  doi          = {10.1016/S0020-0190(96)00191-3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/KingT97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HwangTY96,
  author       = {Min{-}Shiang Hwang and
                  Wen{-}Guey Tzeng and
                  Wei{-}Pang Yang},
  title        = {An access control scheme based on Chinese remainder theorem and time
                  stamp concept},
  journal      = {Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {73--81},
  year         = {1996},
  url          = {https://doi.org/10.1016/0167-4048(95)00028-3},
  doi          = {10.1016/0167-4048(95)00028-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HwangTY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Tzeng96,
  author       = {Wen{-}Guey Tzeng},
  title        = {On Path Equivalence of Nondeterministic Finite Automata},
  journal      = {Inf. Process. Lett.},
  volume       = {58},
  number       = {1},
  pages        = {43--46},
  year         = {1996},
  url          = {https://doi.org/10.1016/0020-0190(96)00039-7},
  doi          = {10.1016/0020-0190(96)00039-7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Tzeng96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ml/Tzeng92,
  author       = {Wen{-}Guey Tzeng},
  title        = {Learning Probabilistic Automata and Markov Chains via Queries},
  journal      = {Mach. Learn.},
  volume       = {8},
  pages        = {151--166},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00992862},
  doi          = {10.1007/BF00992862},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ml/Tzeng92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/Tzeng92,
  author       = {Wen{-}Guey Tzeng},
  title        = {A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata},
  journal      = {{SIAM} J. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {216--227},
  year         = {1992},
  url          = {https://doi.org/10.1137/0221017},
  doi          = {10.1137/0221017},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/Tzeng92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/KoT91,
  author       = {Ker{-}I Ko and
                  Wen{-}Guey Tzeng},
  title        = {Three Sigma{\^{}}p{\_}2-Complete Problems in Computational Learning
                  Theory},
  journal      = {Comput. Complex.},
  volume       = {1},
  pages        = {269--310},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF01200064},
  doi          = {10.1007/BF01200064},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/KoT91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/KoMT90,
  author       = {Ker{-}I Ko and
                  Assaf Marron and
                  Wen{-}Guey Tzeng},
  editor       = {Bruce W. Porter and
                  Raymond J. Mooney},
  title        = {Learning String Patterns and Tree Patterns from Examples},
  booktitle    = {Machine Learning, Proceedings of the Seventh International Conference
                  on Machine Learning, Austin, Texas, USA, June 21-23, 1990},
  pages        = {384--391},
  publisher    = {Morgan Kaufmann},
  year         = {1990},
  url          = {https://doi.org/10.1016/b978-1-55860-141-3.50049-3},
  doi          = {10.1016/B978-1-55860-141-3.50049-3},
  timestamp    = {Thu, 25 Jul 2019 17:43:05 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/KoMT90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Tzeng89,
  author       = {Wen{-}Guey Tzeng},
  title        = {The Equivalence and Learning of Probabilistic Automata (Extended Abstract)},
  booktitle    = {30th Annual Symposium on Foundations of Computer Science, Research
                  Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  pages        = {268--273},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SFCS.1989.63489},
  doi          = {10.1109/SFCS.1989.63489},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Tzeng89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}