期刊論文(共計21筆) |
序號 | 學年度 | 學期 | 年度 | 月份 | 作者 | 題目 | 通訊作者 | 作者順位 | 期刊名稱 | 卷數 | 頁數 | 關鍵字 |
1 | 088 | 1 | 2000 | 1 | T.S. Chen and F.G. Jeng | A Generation Lock and Its Cryptosystem | 是 | 第二順位 | 中華民國資訊學會通訊 | | | |
2 | 090 | 1 | 2002 | 1 | F.G. Jeng and C.M. Wang | Sampling on a Solid Angle by an Ellipsoidal Luminaire | 否 | 第一順位 | 中華民國資訊學會通訊 | | | |
3 | 091 | 1 | 2003 | 1 | F.G. Jeng and C.M. Wang | A Stratified Sampling Technique on an Ellipsoid Luminary | 否 | 第一順位 | 中華民國資訊學會通訊 | | | |
4 | 093 | 2 | 2005 | 3 | Fuh-Gwo Jeng, Chung-Ming Wang | A Study of Key Assignment Scheme for Hierarchical Access Control | 否 | 第一順位 | 中華民國資訊學會通訊 | | | |
5 | 094 | 2 | 2006 | 3 | JENG Fuh-gwo, WANG Chung-ming | A practical and dynamic key management scheme for a user hierarchy | 否 | 第一順位 | Journal of Zhejiang University SCIENCE (A) | | | |
6 | 095 | 1 | 2006 | 8 | Fuh-Gwo Jeng, Chung-Ming Wang | An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem | 否 | 第一順位 | The Journal of Systems and Software | | | |
7 | 095 | 2 | 2007 | 3 | Fuh-Gwo Jeng and Shu-Jen Lai | An Access Control Scheme for a Tree User Hierarchy | 否 | 第一順位 | Communications of IICM | | | |
8 | 095 | 2 | 2007 | 6 | Fuh-Gwo Jeng and Tzer-Shyong Chen | ECC-based Blind Signature Scheme with Lower Computation | 否 | 第一順位 | WSEAS Transactions on Information Science and Applications | | | |
9 | 095 | 2 | 2007 | 6 | Fuh-Gwo Jeng | Hierarchical Access Control with Time-Bound Constraints Based upon Chinese Remainder Theorem | 否 | 第一順位 | WSEAS Transactions on Information Science and Applications | | | |
10 | 096 | 2 | 2008 | 3 | Fuh-Gwo Jeng and Xiao-Wei Huang | An Efficient Key Assignment Scheme with Time-Bound Constraints for Hierarchical Access Control | 是 | 第一順位 | Communications of IICM | 0 | 1-14 | |
11 | 099 | 1 | 2010 | 8 | F. G. Jeng, T. L. Chen, and T. S. Chen | An ECC-Based Blind Signature Scheme | 是 | 第一順位 | Journal of Networks
| | | |
12 | 100 | 1 | 2011 | 10 | Bing-Jian Wang, Tzung-Her Chen, Fuh-Gwo Jeng | Security Improvement against Malicious Server’s attack for A dPEKS Scheme | 否 | 第三順位 | International Journal of Information and Education Technology | 1 | 350-353 | |
13 | 101 | 1 | 2012 | 10 | Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Lin and Tzung-Her Chen | On the Security of Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting | 否 | 第一順位 | ICIC Express Letters | 0 | 2541-2544 | |
14 | 103 | 1 | 2014 | 11 | Fuh-Gwo Jeng, Kai-Siang Lin, Chih-Hung Lin, and Tzung-Her Chen | Visual Multi-Secret Sharing with Friendliness | 否 | 第一順位 | Journal of Shanghai Jiaotong University (Science) | 19 | 455-465 | |
15 | 103 | 2 | 2015 | 3 | Fuh-Gwo Jeng, Wei-Lun Huang, Tzung-Her Chen | Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes | 否 | 第一順位 | Signal Processing: Image Communication | 34 | 45-51 | |
16 | 104 | 2 | 2016 | 5 | Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen | On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services | 否 | 第一順位 | International Journal of Network Security | 18 | 597-600 | |
17 | 104 | 2 | 2016 | 7 | Fuh-Gwo Jeng, Jyun-Ci Huang, and Tzung-Her Chen | An Improved Anonymous Buyer-Reseller Watermarking Protocol | 否 | 第一順位 | International Journal of Network Security | 18 | 728-735 | |
18 | 104 | 2 | 2016 | 7 | Fuh-Gwo Jeng, Yan-Ting Wu, Tzung-Her Chen | A Multi-Watermarking Protocol for Health Information Management | 否 | 第一順位 | Multimedia Tools and Applications | 75 | 8123–8135 | |
19 | 105 | 2 | 2017 | 4 | Jyun-Ci Huang, Fuh-Gwo Jeng and Tzung-Her Chen | A new buyer-seller watermarking protocol without multiple watermarks insertion | 否 | 第二順位 | Multimedia Tools and Applications | 76 | 9667-9679 | |
20 | 106 | 2 | 2018 | 5 | Fuh-Gwo Jeng, Bing-Jian Wang, Tzung-Her Chen | Security of a UUP Web Search Protocol with Privacy Preserving | 否 | 第一順位 | Journal of Chung Cheng Institute of Technology | 47 | 107-114 | |
21 | 107 | 1 | 2018 | 9 | Bing-Jian Wang, Tzer-Shyong Chen, Fuh-Gwo Jeng, Tzung-Her Chen | On The Security of Threshold Random Grid-based Visual Secret Sharing | 否 | 第三順位 | Multimedia Tools and Applications | 32 | 20-31 | |
會議論文(共計12筆) |
序號 | 學年度 | 學期 | 年度 | 月份 | 作者 | 題目 | 通訊作者 | 作者順位 | 發表性質 | 會議論文集或研討會名稱 | 地點 |
1 | 093 | 2 | 2005 | 5 | F.G. Jeng, X.W. Huang
| Access Control in a Hierarchy Using a Set of One-way Functions | 否 | | | 第六屆網際網路應用與發展學術研討會 | |
2 | 093 | 2 | 2005 | 5 | Fuh-Gwo Jeng, Xiao-Wei Huang, Chung-Ming Wang | Hierarchical Access Control Using a One-way Hash Function | 否 | | | 第十六屆國際資訊管理學術研討會 | |
3 | 095 | 1 | 2006 | 11 | Z. Y., Jeng , F. G. and Chen , T. S. | A Novel ID-based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery | 否 | | | Proceedings of the 2006 International Conference on Computational Intelligence and Security (EI) | Guangdong, China |
4 | 095 | 1 | 2006 | 12 | Chen, T. S., Jeng , F. G. and Liu, Y. C. | Hacking Tricks toward Security on Network Environments | 否 | | | Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies(EI) | Taipei, Taiwan |
5 | 094 | 2 | 2006 | 6 | Fuh-Gwo Jeng, Shu-Jen Lai | A Hierarchical Access Control Scheme based upon Rabin Cryptosystem | 否 | | | 第七屆網際網路應用與發展學術研討會 | |
6 | 098 | 1 | 2009 | 8 | F. G. Jeng, T. L. Chen, T. S. Chen | A Blind Signature Scheme Based on Elliptic Curve Cryptosystem | 否 | | | NCM 2009, Seoul, Korea | |
7 | 100 | 1 | 2011 | 10 | Yu-Lin Kuo, Bing-Jian Wang, Fuh-Gwo Jeng and Tzung-Her Chen | A designated-tester public key encryption scheme with conjunctive-subset keyword search | 否 | 第三順位 | 書面發表 | Proceedings of 2011 2nd International Conference on Managenment Science and | |
8 | 100 | 1 | 2011 | 9 | Bing-Jian Wang, Tzung-Her Chen, Fuh-Gwo Jeng | Security Improvement against Malicious Servers in dPEKS Scheme | 否 | 第三順位 | 書面發表 | Proceedings of 2011 International Conference on Network and Electronics Eng | |
9 | 102 | 1 | 2013 | 12 | 紀守程, 鄭富國 | 公開金鑰加密法在個人醫療紀錄系統中的應用 | 否 | 第二順位 | 書面發表 | 2013數位與科技生活創新應用學術研討會 | |
10 | 102 | 1 | 2013 | 9 | Kai-Siang Lin, Fuh-Gwo Jeng, Chih-Hung Lin, and Tzung-Her Chen | A friendly visual multi-secret sharing scheme | 否 | 第二順位 | 書面發表 | The Second Cross-Straits Conference on Information Security (CSCIS 2013) | |
11 | 102 | 2 | 2014 | 7 | Jing-Ya Yan, Fuh-Gwo Jeng, Tzung-Her Chen | An authenticated Concealed Data Aggregation Scheme Based on Secret Sharing for Smart Grid | 否 | 第二順位 | 書面發表 | The 5th International Conference on Systematic Innovation (ICSI) | |
12 | 102 | 2 | 2014 | 7 | Zhen-Hong Liao, Fuh-Gwo Jeng, Tzung-Her Chen | An Image Authentication Scheme for High Dynamic Range Images | 否 | 第二順位 | 書面發表 | The 5th International Conference on Systematic Innovation (ICSI) | |