Author of the publication

On the security of Wu and Yeh's conference key distribution system.

, , , and . Computer Communications, 18 (12): 978-981 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hwang, Tzonelih
add a person with the name Hwang, Tzonelih
 

Other publications of authors with the same name

On the security of fair blind signature scheme using oblivious transfer., and . Computer Communications, 22 (3): 287-290 (1999)The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures., , and . Inf. Process. Lett., 70 (2): 79-81 (1999)On the traceability on RSA-based partially signature with low computation., , , and . Applied Mathematics and Computation, 162 (1): 421-425 (2005)Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication., and . Computers & Security, 16 (4): 339-344 (1997)EPR quantum key distribution protocols with potential 100% qubit efficiency., and . IET Information Security, 1 (1): 43-45 (2007)Unitary operation attack and the improvement on probabilistic quantum key distribution., , and . Quantum Information & Computation, 14 (9-10): 757-762 (2014)Simple password-based three-party authenticated key exchange without server public keys., and . Inf. Sci., 180 (9): 1702-1714 (2010)Proxy-protected signature secure against the undelegated proxy signature attack., , , and . Computers & Electrical Engineering, 33 (3): 177-185 (2007)Security analysis of the generalized key agreement and password authentication protocol., , and . IEEE Communications Letters, 5 (11): 462-463 (2001)Author's Reply.. IEEE Trans. Communications, 46 (1): 22 (1998)