Biblio

Found 6 results
Filters: Author is Tzonelih Hwang  [Clear All Filters]
2000
Lin, Chun-Li, Tzonelih Hwang, and Hung-Min Sun. "Three-Party Encrypted Key Exchange: Attacks and a Solution." ACM Operating Systems Review 34, no. 4 (2000): 12-20.
1999
Sun, Hung-Min, Tzonelih Hwang, and Narn-Yih Lee. Nonrepudiable Threshold Proxy Signatures In 9th National Conference on Information Security. Taiwan, 1999.
Lee, Narn-Yih, and Tzonelih Hwang. "On the Security of Fair Blind Signature Scheme Using Oblivious Transfer." Computer Communications 22, no. 3 (1999): 287-290.
Sun, Hung-Min, Tzonelih Hwang, and Narn-Yih Lee. "Threshold Proxy Signatures." IEE Proceedings- Computers and Digital Techniques 146, no. 5 (1999): 259-263.
1990
Hwang, Tzonelih, Yihwa Chen, and Chi Sung Laih. "Non-Interactive Password Authentication without Password Tables." In EEE 10th Regional Conference on Computer and Communication Systems., 1990.