default search action
BibTeX records: Zhi-Jia Tzeng
@article{DBLP:journals/dcc/TzengT05, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, title = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares}, journal = {Des. Codes Cryptogr.}, volume = {35}, number = {1}, pages = {47--61}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-6150-3}, doi = {10.1007/S10623-003-6150-3}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TzengT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TzengT02, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Robust Key-Evolving Public Key Encryption Schemes}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {61--72}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_6}, doi = {10.1007/3-540-36159-6\_6}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/TzengT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/TzengT01, author = {Zhi{-}Jia Tzeng and Wen{-}Guey Tzeng}, title = {Practical and Efficient Electronic Voting Schemes}, journal = {J. Inf. Sci. Eng.}, volume = {17}, number = {6}, pages = {865--877}, year = {2001}, url = {http://www.iis.sinica.edu.tw/page/jise/2001/200111\_01.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/TzengT01, author = {Zhi{-}Jia Tzeng and Wen{-}Guey Tzeng}, title = {Authentication of Mobile Users in Third Generation Mobile Systems}, journal = {Wirel. Pers. Commun.}, volume = {16}, number = {1}, pages = {35--50}, year = {2001}, url = {https://doi.org/10.1023/A:1026530706019}, doi = {10.1023/A:1026530706019}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TzengT01, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Kwangjo Kim}, title = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {207--224}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_16}, doi = {10.1007/3-540-44586-2\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TzengT01a, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Kwangjo Kim}, title = {Robust Forward-Secure Signature Schemes with Proactive Security}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {264--276}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_19}, doi = {10.1007/3-540-44586-2\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TzengT01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TzengT01, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, title = {Robust key-evolving public key encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2001}, url = {http://eprint.iacr.org/2001/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/TzengT00, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Tatsuaki Okamoto}, title = {Round-Efficient Conference Key Agreement Protocols with Provable Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {614--628}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_47}, doi = {10.1007/3-540-44448-3\_47}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/TzengT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.