Tzeng, Wen-Guey
277  results:
Search for persons X
?
1

RL-Shield: Mitigating Target Link-Flooding Attacks Using SD..:

Rezapour, Amir ; Tzeng, Wen-Guey
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  6 - p. 4052-4067 , 2022
 
?
 
?
6

Permutation Arrays Under the Chebyshev Distance:

Klove, Torleiv ; Lin, Te-Tsung ; Tsai, Shi-Chun.
IEEE Transactions on Information Theory.  56 (2010)  6 - p. 2611-2617 , 2010
 
?
7

Optimal resilient threshold GQ signatures:

Chu, Cheng-Kang ; Tzeng, Wen-Guey
Information Sciences.  177 (2007)  8 - p. 1834-1851 , 2007
 
?
8

A Public-Key Traitor Tracing Scheme with Revocation Using D..:

Tzeng, Wen-Guey ; Tzeng, Zhi-Jia
Designs, Codes and Cryptography.  35 (2005)  1 - p. 47-61 , 2005
 
?
10

Common modulus and chosen-message attacks on public-key sch..:

Tzeng, Wen-Guey
Information Processing Letters.  70 (1999)  3 - p. 153-156 , 1999
 
?
11

On-line algorithms for the dominating set problem:

King, Gow-Hsing ; Tzeng, Wen-Guey
Information Processing Letters.  61 (1997)  1 - p. 11-14 , 1997
 
?
14

A Polynomial-Time Algorithm for the Equivalence of Probabil..:

Tzeng, Wen-Guey
SIAM Journal on Computing.  21 (1992)  2 - p. 216-227 , 1992
 
?
 
1-15