BibTeX records: Zhi-Jia Tzeng

download as .bib file

@article{DBLP:journals/dcc/TzengT05,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  title        = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic
                  Shares},
  journal      = {Des. Codes Cryptogr.},
  volume       = {35},
  number       = {1},
  pages        = {47--61},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-6150-3},
  doi          = {10.1007/S10623-003-6150-3},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TzengT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TzengT02,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Robust Key-Evolving Public Key Encryption Schemes},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_6},
  doi          = {10.1007/3-540-36159-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/TzengT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/TzengT01,
  author       = {Zhi{-}Jia Tzeng and
                  Wen{-}Guey Tzeng},
  title        = {Practical and Efficient Electronic Voting Schemes},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {17},
  number       = {6},
  pages        = {865--877},
  year         = {2001},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2001/200111\_01.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/TzengT01,
  author       = {Zhi{-}Jia Tzeng and
                  Wen{-}Guey Tzeng},
  title        = {Authentication of Mobile Users in Third Generation Mobile Systems},
  journal      = {Wirel. Pers. Commun.},
  volume       = {16},
  number       = {1},
  pages        = {35--50},
  year         = {2001},
  url          = {https://doi.org/10.1023/A:1026530706019},
  doi          = {10.1023/A:1026530706019},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TzengT01,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Kwangjo Kim},
  title        = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic
                  Shares},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {207--224},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_16},
  doi          = {10.1007/3-540-44586-2\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TzengT01a,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Kwangjo Kim},
  title        = {Robust Forward-Secure Signature Schemes with Proactive Security},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {264--276},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_19},
  doi          = {10.1007/3-540-44586-2\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TzengT01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TzengT01,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  title        = {Robust key-evolving public key encryption schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/TzengT00,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Tatsuaki Okamoto},
  title        = {Round-Efficient Conference Key Agreement Protocols with Provable Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {614--628},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_47},
  doi          = {10.1007/3-540-44448-3\_47},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/TzengT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}