default search action
BibTeX records: Wen-Guey Tzeng
@article{DBLP:journals/tdsc/RezapourT22, author = {Amir Rezapour and Wen{-}Guey Tzeng}, title = {RL-Shield: Mitigating Target Link-Flooding Attacks Using {SDN} and Deep Reinforcement Learning Routing Algorithm}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {4052--4067}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3118081}, doi = {10.1109/TDSC.2021.3118081}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RezapourT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/RezapourT21, author = {Amir Rezapour and Wen{-}Guey Tzeng}, title = {RL-PMAgg: Robust aggregation for {PM2.5} using deep RL-based trust management system}, journal = {Internet Things}, volume = {13}, pages = {100347}, year = {2021}, url = {https://doi.org/10.1016/j.iot.2020.100347}, doi = {10.1016/J.IOT.2020.100347}, timestamp = {Fri, 05 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/RezapourT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiRT21, author = {Lyue Li and Amir Rezapour and Wen{-}Guey Tzeng}, title = {A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346264}, doi = {10.1109/DSC49826.2021.9346264}, timestamp = {Wed, 17 Feb 2021 11:46:28 +0100}, biburl = {https://dblp.org/rec/conf/desec/LiRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LinT20, author = {Chung{-}Yi Lin and Wen{-}Guey Tzeng}, title = {A Cooperative Game-Theoretic Model in Cloud Storage Auditing}, journal = {J. Inf. Sci. Eng.}, volume = {36}, number = {1}, pages = {127--143}, year = {2020}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=172\_2297}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LinT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/RezapourT20, author = {Amir Rezapour and Wen{-}Guey Tzeng}, title = {A Robust Algorithm for Predicting Attacks Using Collaborative Security Logs}, journal = {J. Inf. Sci. Eng.}, volume = {36}, number = {3}, pages = {597--619}, year = {2020}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=174\_2326}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/RezapourT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ChenRTT20, author = {Yi{-}Ren Chen and Amir Rezapour and Wen{-}Guey Tzeng and Shi{-}Chun Tsai}, title = {RL-Routing: An {SDN} Routing Algorithm Based on Deep Reinforcement Learning}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {7}, number = {4}, pages = {3185--3199}, year = {2020}, url = {https://doi.org/10.1109/TNSE.2020.3017751}, doi = {10.1109/TNSE.2020.3017751}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/ChenRTT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/GuanT19, author = {Albert Guan and Wen{-}Guey Tzeng}, title = {A light-weight bit commitment protocol based on unpredictable channel noise}, journal = {Theor. Comput. Sci.}, volume = {755}, pages = {29--37}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2018.06.051}, doi = {10.1016/J.TCS.2018.06.051}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/GuanT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenRT18, author = {Yi{-}Ruei Chen and Amir Rezapour and Wen{-}Guey Tzeng}, title = {Privacy-preserving ridge regression on distributed data}, journal = {Inf. Sci.}, volume = {451-452}, pages = {34--49}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.03.061}, doi = {10.1016/J.INS.2018.03.061}, timestamp = {Fri, 01 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChenRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ChenWT18, author = {Yen{-}Chung Chen and Yu{-}Sung Wu and Wen{-}Guey Tzeng}, title = {Phrase Search for Encrypted Cloud Storage}, journal = {J. Inf. Sci. Eng.}, volume = {34}, number = {2}, pages = {401--417}, year = {2018}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=161\_2124}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ChenWT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LeeRT18, author = {Wei{-}Min Lee and Amir Rezapour and Wen{-}Guey Tzeng}, title = {Monsieur Poirot: Detecting Botnets Using Re-Identification Algorithm and Nontrivial Feature Selection Technique}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422081}, doi = {10.1109/ICC.2018.8422081}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/LeeRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RezapourT18, author = {Amir Rezapour and Wen{-}Guey Tzeng}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {139--154}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0\_8}, doi = {10.1007/978-3-030-01704-0\_8}, timestamp = {Fri, 11 Jan 2019 16:16:24 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/RezapourT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCT18, author = {Shao{-}Chien Chen and Yi{-}Ruei Chen and Wen{-}Guey Tzeng}, title = {Effective Botnet Detection Through Neural Networks on Convolutional Features}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {372--378}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00062}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00062}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChenT17, author = {Yi{-}Ruei Chen and Wen{-}Guey Tzeng}, title = {Group key management with efficient rekey mechanism: {A} Semi-Stateful approach for out-of-Synchronized members}, journal = {Comput. Commun.}, volume = {98}, pages = {31--42}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2016.08.001}, doi = {10.1016/J.COMCOM.2016.08.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChenT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcmcst/GuanT17, author = {Albert Guan and Wen{-}Guey Tzeng}, title = {A light-weight oblivious transfer protocol based on channel noise}, journal = {Int. J. Comput. Math. Comput. Syst. Theory}, volume = {2}, number = {1}, pages = {28--38}, year = {2017}, url = {https://doi.org/10.1080/23799927.2017.1323798}, doi = {10.1080/23799927.2017.1323798}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcmcst/GuanT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GuanT17, author = {Albert Guan and Wen{-}Guey Tzeng}, title = {A secret key establishment protocol for wireless networks using noisy channels}, journal = {J. Comput. Secur.}, volume = {25}, number = {2}, pages = {139--151}, year = {2017}, url = {https://doi.org/10.3233/JCS-15807}, doi = {10.3233/JCS-15807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GuanT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LinT17, author = {Chung{-}Yi Lin and Wen{-}Guey Tzeng}, title = {Strategy analysis for cloud storage reliability management based on game theory}, journal = {J. Comput. Secur.}, volume = {25}, number = {2}, pages = {153--171}, year = {2017}, url = {https://doi.org/10.3233/JCS-16813}, doi = {10.3233/JCS-16813}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LinT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ChenST17, author = {Yi{-}Ruei Chen and Shiuan{-}Tzuo Shen and Wen{-}Guey Tzeng}, title = {Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over {\(\mathbb{Z}\)}\({}_{\mbox{p}}\)}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {1}, pages = {233--250}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=154\_2004}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ChenST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenT17, author = {Yi{-}Ruei Chen and Wen{-}Guey Tzeng}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {165--183}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_9}, doi = {10.1007/978-3-319-61204-1\_9}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChenT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeCT17, author = {Chih{-}Ning Lee and Yi{-}Ruei Chen and Wen{-}Guey Tzeng}, title = {An online subject-based spam filter using natural language features}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {479--487}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073830}, doi = {10.1109/DESEC.2017.8073830}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/desec/LeeCT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SuRT17, author = {Yuan{-}Hsiang Su and Amir Rezapour and Wen{-}Guey Tzeng}, title = {The forward-backward string: {A} new robust feature for botnet detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {485--492}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073831}, doi = {10.1109/DESEC.2017.8073831}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SuRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ShenT15, author = {Shiuan{-}Tzuo Shen and Wen{-}Guey Tzeng}, title = {Delegated integrity check for hierarchical cloud data}, journal = {J. Comput. Secur.}, volume = {23}, number = {4}, pages = {471--508}, year = {2015}, url = {https://doi.org/10.3233/JCS-150527}, doi = {10.3233/JCS-150527}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ShenT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/ShenLT15, author = {Shiuan{-}Tzuo Shen and Hsiao{-}Ying Lin and Wen{-}Guey Tzeng}, title = {An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems}, journal = {{IEEE} Trans. Reliab.}, volume = {64}, number = {3}, pages = {840--851}, year = {2015}, url = {https://doi.org/10.1109/TR.2015.2423192}, doi = {10.1109/TR.2015.2423192}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/ShenLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ShenRT15, author = {Shiuan{-}Tzuo Shen and Amir Rezapour and Wen{-}Guey Tzeng}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Unique Signature with Short Output from {CDH} Assumption}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {475--488}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_26}, doi = {10.1007/978-3-319-26059-4\_26}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ShenRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShenRT15, author = {Shiuan{-}Tzuo Shen and Amir Rezapour and Wen{-}Guey Tzeng}, title = {Unique Signature with Short Output from {CDH} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {830}, year = {2015}, url = {http://eprint.iacr.org/2015/830}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShenRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenST15, author = {Yi{-}Ruei Chen and Shiuan{-}Tzuo Shen and Wen{-}Guey Tzeng}, title = {Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {947}, year = {2015}, url = {http://eprint.iacr.org/2015/947}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChenWT14, author = {Yen{-}Chung Chen and Yu{-}Sung Wu and Wen{-}Guey Tzeng}, title = {Preserving user query privacy in cloud-based security services}, journal = {J. Comput. Secur.}, volume = {22}, number = {6}, pages = {997--1024}, year = {2014}, url = {https://doi.org/10.3233/JCS-140520}, doi = {10.3233/JCS-140520}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChenWT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ChuCTZD14, author = {Cheng{-}Kang Chu and Sherman S. M. Chow and Wen{-}Guey Tzeng and Jianying Zhou and Robert H. Deng}, title = {Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {2}, pages = {468--477}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.112}, doi = {10.1109/TPDS.2013.112}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ChuCTZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LinT14, author = {Chung{-}Yi Lin and Wen{-}Guey Tzeng}, title = {Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems}, booktitle = {Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014}, pages = {187--195}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE.2014.32}, doi = {10.1109/SERE.2014.32}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LinT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenCTZ13, author = {Yi{-}Ruei Chen and Cheng{-}Kang Chu and Wen{-}Guey Tzeng and Jianying Zhou}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {CloudHKA: {A} Cryptographic Approach for Hierarchical Access Control in Cloud Computing}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {37--52}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_3}, doi = {10.1007/978-3-642-38980-1\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChenCTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013asia, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2484313}, isbn = {978-1-4503-1767-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCTZ13, author = {Yi{-}Ruei Chen and Cheng{-}Kang Chu and Wen{-}Guey Tzeng and Jianying Zhou}, title = {CloudHKA: {A} Cryptographic Approach for Hierarchical Access Control in Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2013}, url = {http://eprint.iacr.org/2013/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LinT12, author = {Hsiao{-}Ying Lin and Wen{-}Guey Tzeng}, title = {A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {23}, number = {6}, pages = {995--1003}, year = {2012}, url = {https://doi.org/10.1109/TPDS.2011.252}, doi = {10.1109/TPDS.2011.252}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/LinT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LinTSL12, author = {Hsiao{-}Ying Lin and Wen{-}Guey Tzeng and Shiuan{-}Tzuo Shen and Bao{-}Shuh Paul Lin}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {544--560}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_32}, doi = {10.1007/978-3-642-31284-7\_32}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/LinTSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LinSTL12, author = {Hsiao{-}Ying Lin and Shiuan{-}Tzuo Shen and Wen{-}Guey Tzeng and Bao{-}Shuh Paul Lin}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System}, booktitle = {{IEEE} 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012}, pages = {740--747}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AINA.2012.28}, doi = {10.1109/AINA.2012.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/LinSTL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LinKT12, author = {Hsiao{-}Ying Lin and John Kubiatowicz and Wen{-}Guey Tzeng}, title = {A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {225--234}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.35}, doi = {10.1109/SERE.2012.35}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LinKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenT12, author = {Yi{-}Ruei Chen and Wen{-}Guey Tzeng}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {295--302}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.138}, doi = {10.1109/TRUSTCOM.2012.138}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/HouLTT11, author = {Chung{-}Li Hou and Chang{-}Chun Lu and Shi{-}Chun Tsai and Wen{-}Guey Tzeng}, title = {An Optimal Data Hiding Scheme With Tree-Based Parity Check}, journal = {{IEEE} Trans. Image Process.}, volume = {20}, number = {3}, pages = {880--886}, year = {2011}, url = {https://doi.org/10.1109/TIP.2010.2072513}, doi = {10.1109/TIP.2010.2072513}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/HouLTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/ChouCT11, author = {Kuei{-}Yi Chou and Yi{-}Ruei Chen and Wen{-}Guey Tzeng}, title = {An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems}, booktitle = {13th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2011, Taipei, Taiwan, September 21-23, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/APNOMS.2011.6077025}, doi = {10.1109/APNOMS.2011.6077025}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/apnoms/ChouCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ShenT11, author = {Shiuan{-}Tzuo Shen and Wen{-}Guey Tzeng}, editor = {Sihan Qing and Willy Susilo and Guilin Wang and Dongmei Liu}, title = {Delegable Provable Data Possession for Remote Data in the Clouds}, booktitle = {Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7043}, pages = {93--111}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25243-3\_8}, doi = {10.1007/978-3-642-25243-3\_8}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ShenT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChenTT11, author = {Yi{-}Ruei Chen and J. D. Tygar and Wen{-}Guey Tzeng}, title = {Secure group key management using uni-directional proxy re-encryption schemes}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {1952--1960}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5934999}, doi = {10.1109/INFCOM.2011.5934999}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ChenTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinTL11, author = {Hsiao{-}Ying Lin and Wen{-}Guey Tzeng and Bao{-}Shuh Paul Lin}, title = {A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {613--620}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.79}, doi = {10.1109/TRUSTCOM.2011.79}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LinTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LeeWYT10, author = {Chin{-}I Lee and Tzong{-}Chen Wu and Bo{-}Yin Yang and Wen{-}Guey Tzeng}, title = {New Secure Broadcasting Scheme Realizing Information Granularity}, journal = {J. Inf. Sci. Eng.}, volume = {26}, number = {4}, pages = {1509--1523}, year = {2010}, url = {http://www.iis.sinica.edu.tw/page/jise/2010/201007\_22.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LeeWYT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KloveLTT10, author = {Torleiv Kl{\o}ve and Te{-}Tsung Lin and Shi{-}Chun Tsai and Wen{-}Guey Tzeng}, title = {Permutation arrays under the Chebyshev distance}, journal = {{IEEE} Trans. Inf. Theory}, volume = {56}, number = {6}, pages = {2611--2617}, year = {2010}, url = {https://doi.org/10.1109/TIT.2010.2046212}, doi = {10.1109/TIT.2010.2046212}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KloveLTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LinT10, author = {Hsiao{-}Ying Lin and Wen{-}Guey Tzeng}, title = {A Secure Decentralized Erasure Code for Distributed Networked Storage}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {21}, number = {11}, pages = {1586--1594}, year = {2010}, url = {https://doi.org/10.1109/TPDS.2010.27}, doi = {10.1109/TPDS.2010.27}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/LinT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LinT09, author = {Hsiao{-}Ying Lin and Wen{-}Guey Tzeng}, title = {Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication}, journal = {J. Inf. Sci. Eng.}, volume = {25}, number = {3}, pages = {907--920}, year = {2009}, url = {http://www.iis.sinica.edu.tw/page/jise/2009/200905\_16.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LinT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ChuT09, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes}, journal = {J. Inf. Sci. Eng.}, volume = {25}, number = {5}, pages = {1465--1483}, year = {2009}, url = {http://www.iis.sinica.edu.tw/page/jise/2009/200909\_10.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ChuT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/TsaiTZ09, author = {Shi{-}Chun Tsai and Wen{-}Guey Tzeng and Kun{-}Yi Zhou}, title = {Key establishment schemes against storage-bounded adversaries in wireless sensor networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {8}, number = {3}, pages = {1218--1222}, year = {2009}, url = {https://doi.org/10.1109/TWC.2009.081048}, doi = {10.1109/TWC.2009.081048}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/TsaiTZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenT09, author = {Yi{-}Ruei Chen and Wen{-}Guey Tzeng}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {121--134}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_11}, doi = {10.1007/978-3-642-11145-7\_11}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ChenT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-2682, author = {Torleiv Kl{\o}ve and Te{-}Tsung Lin and Shi{-}Chun Tsai and Wen{-}Guey Tzeng}, title = {Permutation Arrays Under the Chebyshev Distance}, journal = {CoRR}, volume = {abs/0907.2682}, year = {2009}, url = {http://arxiv.org/abs/0907.2682}, eprinttype = {arXiv}, eprint = {0907.2682}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-2682.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChuT08, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Efficient k-out-of-n Oblivious Transfer Schemes}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {397--415}, year = {2008}, url = {https://doi.org/10.3217/jucs-014-03-0397}, doi = {10.3217/JUCS-014-03-0397}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/ChuT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LinTT08, author = {Te{-}Tsung Lin and Shi{-}Chun Tsai and Wen{-}Guey Tzeng}, editor = {Frank R. Kschischang and En{-}Hui Yang}, title = {Efficient encoding and decoding with permutation arrays}, booktitle = {2008 {IEEE} International Symposium on Information Theory, {ISIT} 2008, Toronto, ON, Canada, July 6-11, 2008}, pages = {211--214}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISIT.2008.4594978}, doi = {10.1109/ISIT.2008.4594978}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/LinTT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuT08, author = {Yi{-}Ru Liu and Wen{-}Guey Tzeng}, editor = {Ronald Cramer}, title = {Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {380--396}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_22}, doi = {10.1007/978-3-540-78440-1\_22}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Optimal resilient threshold {GQ} signatures}, journal = {Inf. Sci.}, volume = {177}, number = {8}, pages = {1834--1851}, year = {2007}, url = {https://doi.org/10.1016/j.ins.2006.11.001}, doi = {10.1016/J.INS.2006.11.001}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/HuT07, author = {Chi{-}Ming Hu and Wen{-}Guey Tzeng}, title = {Cheating Prevention in Visual Cryptography}, journal = {{IEEE} Trans. Image Process.}, volume = {16}, number = {1}, pages = {36--45}, year = {2007}, url = {https://doi.org/10.1109/TIP.2006.884916}, doi = {10.1109/TIP.2006.884916}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/HuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {323--337}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_24}, doi = {10.1007/978-3-540-73458-1\_24}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Identity-Based Proxy Re-encryption Without Random Oracles}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {189--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_13}, doi = {10.1007/978-3-540-75496-1\_13}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OuTT07, author = {Jheng{-}Ru Ou and Shi{-}Chun Tsai and Wen{-}Guey Tzeng}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {Efficient Large-Scale Distributed Key Generation against Burst Interruption}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {197--203}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OuTT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuT07, author = {Yi{-}Ru Liu and Wen{-}Guey Tzeng}, title = {Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2007}, url = {http://eprint.iacr.org/2007/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2007}, url = {http://eprint.iacr.org/2007/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Tzeng06, author = {Wen{-}Guey Tzeng}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {A secure system for data access based on anonymous authentication and time-dependent hierarchical keys}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {223--230}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128851}, doi = {10.1145/1128817.1128851}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Tzeng06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChuT06, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Conditional Oblivious Cast}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {443--457}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_29}, doi = {10.1007/11745853\_29}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChuT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TzengT05, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, title = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares}, journal = {Des. Codes Cryptogr.}, volume = {35}, number = {1}, pages = {47--61}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-6150-3}, doi = {10.1007/S10623-003-6150-3}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TzengT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LeeLTT05, author = {Chia{-}Jung Lee and Chi{-}Jen Lu and Shi{-}Chun Tsai and Wen{-}Guey Tzeng}, title = {Extracting randomness from multiple independent sources}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {6}, pages = {2224--2227}, year = {2005}, url = {https://doi.org/10.1109/TIT.2005.847746}, doi = {10.1109/TIT.2005.847746}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LeeLTT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TsaiTW05, author = {Shi{-}Chun Tsai and Wen{-}Guey Tzeng and Hsin{-}Lung Wu}, title = {On the Jensen-Shannon Divergence and Variational Distance}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {9}, pages = {3333--3336}, year = {2005}, url = {https://doi.org/10.1109/TIT.2005.853308}, doi = {10.1109/TIT.2005.853308}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/TsaiTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LinT05, author = {Hsiao{-}Ying Lin and Wen{-}Guey Tzeng}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {456--466}, year = {2005}, url = {https://doi.org/10.1007/11496137\_31}, doi = {10.1007/11496137\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LinT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HuT05, author = {Chi{-}Ming Hu and Wen{-}Guey Tzeng}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Compatible Ideal Contrast Visual Cryptography Schemes with Reversing}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {300--313}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_22}, doi = {10.1007/11556992\_22}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/HuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChuT05, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Serge Vaudenay}, title = {Efficient \emph{k}-Out-of-\emph{n} Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {172--183}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_12}, doi = {10.1007/978-3-540-30580-4\_12}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinT05, author = {Hsiao{-}Ying Lin and Wen{-}Guey Tzeng}, title = {An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2005}, url = {http://eprint.iacr.org/2005/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Tzeng04, author = {Wen{-}Guey Tzeng}, title = {Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters}, journal = {{IEEE} Trans. Computers}, volume = {53}, number = {2}, pages = {232--240}, year = {2004}, url = {https://doi.org/10.1109/TC.2004.1261831}, doi = {10.1109/TC.2004.1261831}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Tzeng04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuT04, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2004}, url = {http://eprint.iacr.org/2004/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuCT03, author = {Li{-}Shan Liu and Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {A Threshold {GQ} Signature Scheme}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {137--150}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_11}, doi = {10.1007/978-3-540-45203-4\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuCT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iadis/LinTTTY03, author = {Shun{-}Chieh Lin and Wen{-}Hsiang Tsai and Shian{-}Shyong Tseng and Wen{-}Guey Tzeng and Shyan{-}Ming Yuan}, title = {A Framework of High Confidence E-Healthcare Information System}, booktitle = {Proceedings of the {IADIS} International Conference WWW/Internet 2003, {ICWI} 2003, Algarve, Portugal, November 5-8, 2003}, pages = {493--500}, publisher = {{IADIS}}, year = {2003}, timestamp = {Thu, 18 Mar 2004 15:27:46 +0100}, biburl = {https://dblp.org/rec/conf/iadis/LinTTTY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/HwangT03, author = {Min{-}Shiang Hwang and Wen{-}Guey Tzeng}, editor = {Hyun{-}Kook Kahng}, title = {A Conference Key Distribution Scheme in a Totally-Ordered Hierarchy}, booktitle = {Information Networking, Networking Technologies for Enhanced Internet Services International Conference, {ICOIN} 2003, Cheju Island, Korea, February 12-14, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {2662}, pages = {757--761}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45235-5\_74}, doi = {10.1007/978-3-540-45235-5\_74}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/icoin/HwangT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuLT03, author = {Cheng{-}Kang Chu and Li{-}Shan Liu and Wen{-}Guey Tzeng}, title = {A Threshold {GQ} Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2003}, url = {http://eprint.iacr.org/2003/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuLT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TzengH02, author = {Wen{-}Guey Tzeng and Chi{-}Ming Hu}, title = {A New Approach for Visual Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {27}, number = {3}, pages = {207--227}, year = {2002}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TzengH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Tzeng02, author = {Wen{-}Guey Tzeng}, title = {A Secure Fault-Tolerant Conference-Key Agreement Protocol}, journal = {{IEEE} Trans. Computers}, volume = {51}, number = {4}, pages = {373--379}, year = {2002}, url = {https://doi.org/10.1109/12.995447}, doi = {10.1109/12.995447}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Tzeng02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Tzeng02a, author = {Wen{-}Guey Tzeng}, title = {Corrections to "A Secure Fault-Tolerant Conference-Key Agreement Protocol"}, journal = {{IEEE} Trans. Computers}, volume = {51}, number = {12}, pages = {1462}, year = {2002}, url = {https://doi.org/10.1109/TC.2002.1146714}, doi = {10.1109/TC.2002.1146714}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Tzeng02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/Tzeng02, author = {Wen{-}Guey Tzeng}, title = {A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {14}, number = {1}, pages = {182--188}, year = {2002}, url = {https://doi.org/10.1109/69.979981}, doi = {10.1109/69.979981}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/Tzeng02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TzengT02, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Robust Key-Evolving Public Key Encryption Schemes}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {61--72}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_6}, doi = {10.1007/3-540-36159-6\_6}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/TzengT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChuT02, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Distributed Key Generation as a Component of an Integrated Protocol}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {411--421}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_35}, doi = {10.1007/3-540-36159-6\_35}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChuT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Tzeng02, author = {Wen{-}Guey Tzeng}, editor = {David Naccache and Pascal Paillier}, title = {Efficient 1-Out-n Oblivious Transfer Schemes}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {159--171}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_11}, doi = {10.1007/3-540-45664-3\_11}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Tzeng02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/TzengT01, author = {Zhi{-}Jia Tzeng and Wen{-}Guey Tzeng}, title = {Practical and Efficient Electronic Voting Schemes}, journal = {J. Inf. Sci. Eng.}, volume = {17}, number = {6}, pages = {865--877}, year = {2001}, url = {http://www.iis.sinica.edu.tw/page/jise/2001/200111\_01.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/TzengT01, author = {Zhi{-}Jia Tzeng and Wen{-}Guey Tzeng}, title = {Authentication of Mobile Users in Third Generation Mobile Systems}, journal = {Wirel. Pers. Commun.}, volume = {16}, number = {1}, pages = {35--50}, year = {2001}, url = {https://doi.org/10.1023/A:1026530706019}, doi = {10.1023/A:1026530706019}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TzengT01, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Kwangjo Kim}, title = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {207--224}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_16}, doi = {10.1007/3-540-44586-2\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TzengT01a, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Kwangjo Kim}, title = {Robust Forward-Secure Signature Schemes with Proactive Security}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {264--276}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_19}, doi = {10.1007/3-540-44586-2\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TzengT01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TzengT01, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, title = {Robust key-evolving public key encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2001}, url = {http://eprint.iacr.org/2001/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tzeng01, author = {Wen{-}Guey Tzeng}, title = {Efficient oblivious transfer schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2001}, url = {http://eprint.iacr.org/2001/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tzeng01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/TzengT00, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Tatsuaki Okamoto}, title = {Round-Efficient Conference Key Agreement Protocols with Provable Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {614--628}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_47}, doi = {10.1007/3-540-44448-3\_47}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/TzengT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Tzeng00, author = {Wen{-}Guey Tzeng}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {1--13}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_1}, doi = {10.1007/978-3-540-46588-1\_1}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Tzeng00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/TzengH99, author = {Wen{-}Guey Tzeng and Chi{-}Ming Hu}, title = {Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols}, journal = {Inf. Process. Lett.}, volume = {69}, number = {6}, pages = {297--302}, year = {1999}, url = {https://doi.org/10.1016/S0020-0190(99)00023-X}, doi = {10.1016/S0020-0190(99)00023-X}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/TzengH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Tzeng99, author = {Wen{-}Guey Tzeng}, title = {Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations}, journal = {Inf. Process. Lett.}, volume = {70}, number = {3}, pages = {153--156}, year = {1999}, url = {https://doi.org/10.1016/S0020-0190(99)00055-1}, doi = {10.1016/S0020-0190(99)00055-1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Tzeng99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/TzengK99, author = {Wen{-}Guey Tzeng and Gow{-}Hsing King}, title = {Three-Quarter Approximation for the Number of Unused Colors in Graph Coloring}, journal = {Inf. Sci.}, volume = {114}, number = {1-4}, pages = {105--126}, year = {1999}, url = {https://doi.org/10.1016/S0020-0255(98)10058-0}, doi = {10.1016/S0020-0255(98)10058-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/TzengK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/KingT99, author = {Gow{-}Hsing King and Wen{-}Guey Tzeng}, title = {A New Graph Invariant for Graph Isomorphism: Probability Propagation Matrix}, journal = {J. Inf. Sci. Eng.}, volume = {15}, number = {3}, pages = {337--352}, year = {1999}, url = {http://www.iis.sinica.edu.tw/page/jise/1999/199905\_01.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/KingT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webnet/ChuTYY98, author = {Kuen{-}Feng Chu and Wen{-}Guey Tzeng and Ping{-}Jer Yeh and Shyan{-}Ming Yuan}, editor = {Hermann A. Maurer and Richard G. Olson}, title = {An Integrated System for Multilevel Secure Compound Documents}, booktitle = {Proceedings of WebNet 98 - World Conference on the {WWW} and Internet {\&} Intranet, Orlando, Florida, USA, November 7-12, 1998}, publisher = {{AACE}}, year = {1998}, timestamp = {Sat, 07 Sep 2019 11:59:24 +0200}, biburl = {https://dblp.org/rec/conf/webnet/ChuTYY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/KingT97, author = {Gow{-}Hsing King and Wen{-}Guey Tzeng}, title = {On-Line Algorithms for the Dominating Set Problem}, journal = {Inf. Process. Lett.}, volume = {61}, number = {1}, pages = {11--14}, year = {1997}, url = {https://doi.org/10.1016/S0020-0190(96)00191-3}, doi = {10.1016/S0020-0190(96)00191-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/KingT97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HwangTY96, author = {Min{-}Shiang Hwang and Wen{-}Guey Tzeng and Wei{-}Pang Yang}, title = {An access control scheme based on Chinese remainder theorem and time stamp concept}, journal = {Comput. Secur.}, volume = {15}, number = {1}, pages = {73--81}, year = {1996}, url = {https://doi.org/10.1016/0167-4048(95)00028-3}, doi = {10.1016/0167-4048(95)00028-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HwangTY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Tzeng96, author = {Wen{-}Guey Tzeng}, title = {On Path Equivalence of Nondeterministic Finite Automata}, journal = {Inf. Process. Lett.}, volume = {58}, number = {1}, pages = {43--46}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00039-7}, doi = {10.1016/0020-0190(96)00039-7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Tzeng96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ml/Tzeng92, author = {Wen{-}Guey Tzeng}, title = {Learning Probabilistic Automata and Markov Chains via Queries}, journal = {Mach. Learn.}, volume = {8}, pages = {151--166}, year = {1992}, url = {https://doi.org/10.1007/BF00992862}, doi = {10.1007/BF00992862}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ml/Tzeng92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/Tzeng92, author = {Wen{-}Guey Tzeng}, title = {A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata}, journal = {{SIAM} J. Comput.}, volume = {21}, number = {2}, pages = {216--227}, year = {1992}, url = {https://doi.org/10.1137/0221017}, doi = {10.1137/0221017}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/Tzeng92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/KoT91, author = {Ker{-}I Ko and Wen{-}Guey Tzeng}, title = {Three Sigma{\^{}}p{\_}2-Complete Problems in Computational Learning Theory}, journal = {Comput. Complex.}, volume = {1}, pages = {269--310}, year = {1991}, url = {https://doi.org/10.1007/BF01200064}, doi = {10.1007/BF01200064}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/KoT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/KoMT90, author = {Ker{-}I Ko and Assaf Marron and Wen{-}Guey Tzeng}, editor = {Bruce W. Porter and Raymond J. Mooney}, title = {Learning String Patterns and Tree Patterns from Examples}, booktitle = {Machine Learning, Proceedings of the Seventh International Conference on Machine Learning, Austin, Texas, USA, June 21-23, 1990}, pages = {384--391}, publisher = {Morgan Kaufmann}, year = {1990}, url = {https://doi.org/10.1016/b978-1-55860-141-3.50049-3}, doi = {10.1016/B978-1-55860-141-3.50049-3}, timestamp = {Thu, 25 Jul 2019 17:43:05 +0200}, biburl = {https://dblp.org/rec/conf/icml/KoMT90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Tzeng89, author = {Wen{-}Guey Tzeng}, title = {The Equivalence and Learning of Probabilistic Automata (Extended Abstract)}, booktitle = {30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989}, pages = {268--273}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SFCS.1989.63489}, doi = {10.1109/SFCS.1989.63489}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Tzeng89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.