|
學術著作 A)
Journal Papers (期刊論文) International
Journal Papers 1.
Wen-Shenq
Juang,
Sian-Teng Chen and Horng-Twu
Liaw,
“Robust and Efficient Password
Authenticated Key Agreement Using Smart Cards,” IEEE
Transactions on Industrial Electronics,
accepted, 2.
Wen-Shenq
Juang
and
Wei-Ken Nien,
“Efficient Password Authenticated Key Agreement Using Bilinear Pairings,”
Mathematical and Computer Modelling,
in press, 3. Wen-Shenq Juang and Jing-Lin Wu, “Efficient User Authentication and Key Agreement with User Privacy Protection,” International Journal of Network Security, Vol. 7, No. 2, pp. 126~135, 2008. (EI) 4. Wen-Shenq Juang, “D-Cash: A Flexible Pre-paid E-cash Scheme for Date-attachment,” Electronic Commerce Research and Applications, Vol. 6, No. 1, pp. 74-80, New York, Elsevier Press, 2007. (SSCI,SCI) 5.
Wen-Shenq
Juang
and
Jyan-Cwan
Wu, “An Efficient and Flexible Decentralized Multicast Key Distribution
Scheme,” International
Journal of Computer Science and Network Security, Vol.
6, No. 8B, pp. 141-150, 6. Horng-Twu Liaw, Wen-Shenq Juang and Chi-Kai Lin, “An Electronic Online Bidding Auction Protocol with Both Security and Efficiency,” Applied Mathematics and Computation, Vol. 174, No. 2, pp. 1487-1497, New York, Elsevier Press, March 2006. (SCI, EI) 7.
Wen-Shenq
Juang,
“A Practical Anonymous Off-line Multi-authority Payment Scheme,” Electronic
Commerce Research and Applications, Vol. 4, No. 3, pp. 240-249, New York,
Elsevier Press, Autumn 2005.
(SSCI, SCI) 8.
Wen-Shenq
Juang,
Horng-Twu Liaw, Po-Chou
Lin and Chi-Kai Lin, “The Design of a
Secure and Fair Sealed-bid Auction Service,”
Mathematical and Computer Modelling,
Vol. 41, No. 8-9, pp. 973-985, New York, Pergamon
Press, April - May 2005. (SCI, EI) 9.
Wen-Shenq
Juang
and Horng-Twu Liaw,
“Fair Blind Threshold Signatures in Wallet with Observers,” Journal of
Systems and Software, Vol. 72, No. 1, pp. 25-31, New York, Elsevier Press, June
2004. (SCI, EI) 10.
Wen-Shenq
Juang,
“Efficient Three-party Key Exchange Using Smart Cards,” IEEE Trans. on
Consumer Electronics, Vol. 50, No. 2, pp. 619-624, New York, IEEE Press,
May 2004. (SCI, EI) 11.
Wen-Shenq
Juang,
“Efficient Password Authenticated Key Agreement Using Smart Cards,” Computers
& Security, Vol. 23, No. 2, pp.
167-173, New York, Elsevier Press, March 2004. (SCI, EI) 12.
Wen-Shenq
Juang,
“Efficient Multi-server Password Authenticated Key Agreement Using Smart
Cards,” IEEE Trans. on Consumer Electronics, Vol. 50, No. 1, pp.
251-255, New York, IEEE Press, February 2004. (SCI, EI) 13.
Wen-Shenq
Juang
and Horng-Twu Liaw, “A
Practical Anonymous Multi-authority E-cash Scheme,” Applied
Mathematics and Computation, Vol. 147, No. 3, pp. 699-711, New York,
Elsevier Press, January 2004. (SCI, EI) 14.
Wen-Shenq
Juang,
“A Practical Anonymous Payment Scheme for Electronic Commerce,” Computers
& Mathematics with Applications, Vol. 46, No. 12, pp. 1787~1798, New York, Pergamon
Press, December 2003. (SCI, EI) 15.
Wen-Shenq
Juang,
Chin-Laung Lei and Horng-Twu
Liaw, “Privacy and Anonymity Protection With Blind
Threshold Signatures,” International Journal of Electronic Commerce, Vol.
7 , No. 1 , pp. 145-159, M. E. Shape Press, U.S.A., Winter 2002-2003.
(SSCI, SCI) 16.
Wen-Shenq
Juang,
Chin-Laung Lei and Horng-Twu
Liaw, “A Verifiable Multi-authority Secret
Election Allowing Abstention From Voting,” The Computer Journal, Vol.
45 , No. 6, pp. 672-682, Oxford University Press, U. K., December
2002.
(SCI, EI) 17.
Chin-Laung
Lei, Wen-Shenq Juang and Pei-Ling Yu,
“Provably Secure Blind Threshold Signatures Based on Discrete Logarithm,” Journal
of Information Science and Engineering, Vol. 18, No. 1, pp. 23-39, Taipei,
Institute of Information Science Academia Sinica
Press, January 2002. (SCI, EI) 18.
Wen-Shenq
Juang,
Chin-Laung Lei and Horng-Twu
Liaw, “Fair Blind Threshold Signatures Based on
Discrete Logarithm,” International Journal of Computer Systems Sciences
& Engineering, Vol. 16, No. 6, pp. 371-379, CRL Press, UK, November 2001.
(SCI, EI) 19.
Wen-Shenq
Juang,
Chin-Laung Lei and Chih-Yuh
Chang, “Anonymous Channel and Authentication in Wireless Communications,” Computer
Communications, Vol. 22, No. 15-16, pp. 1502-1511, New York, IPC Science and
Technology Press, August 1999. (SCI, EI) 20.
Wen-Shenq
Juang
and Chin-Laung Lei, “Partially Blind Threshold
Signatures Based on Discrete Logarithm,” Computer Communications, Vol. 22,
No. 1, pp. 73-86, New York, IPC Science and Technology Press, January 1999.
(SCI, EI) 21.
Wen-Shenq
Juang
and Chin-Laung Lei, “A Secure and Practical
Electronic Voting Scheme for Real World Environments,” IEICE Trans. on
Fundamentals, Vol. E80-A, No. 1, pp. 64-71, Tokyo, IEICE Press, January 1997.
(SCI, EI) 22.
Wen-Shenq
Juang
and Chin-Laung Lei, “A Collision Free Secret
Ballot Protocol for Computerized General Election,” Computers &
Security, Vol. 15, No. 4, pp. 339-348, New York, Elsevier Press, 1996. (SCI,
EI) Papers
in Books 23.
Ren-Chiun
Wang, Wen-Shenq Juang and Chin-Laung
Lei, “A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost
Problem,” In Proc. of the 2007
IFIP International Conference on Embedded and Ubiquitous Computing (EUC2007), Lecture
Notes in Computer Science 4809,
pp. 728-744,
Springer-Verlag
Press, German, 2007.
(EI) 24.
Wen-Shenq
Juang,
“Efficient
User Authentication and Key Agreement in Wireless
Sensor Networks,”
In
Proc. of the
7th International Workshop on Information Security Applications
(WISA’06), Lecture
Notes in Computer Science 4298,
pp. 15-29, Springer-Verlag
Press, German, 2006.
(SCI,
EI,
acceptance rate 21.2%) 25.
Wen-Shenq
Juang,
“Efficient User Authentication and Key Agreement in Ubiquitous Computing,”
In Proc. of the
2006
International
Conference on Computational
Science and its Applications (ICCSA'06),
Lecture
Notes in Computer Science
3983,
pp. 396-405, Springer-Verlag
Press, German, 2006.
(SCI,
EI,
acceptance
rate 27.1%) 26.
Wen-Shenq
Juang,
“A
Simple and Efficient Conference Scheme for Mobile Communications,” In Proc. of
the 6th
International Workshop on Information Security Applications (WISA’05), Lecture
Notes in Computer Science
3786,
pp. 81-95, Springer-Verlag
Press, German, 2005.
(SCI,
EI,
acceptance rate 17.3%) 27.
Wen-Shenq
Juang
and Chin-Laung Lei, “Blind Threshold Signatures
Based on Discrete Logarithm,” In Proc. of the second Asian Computing Science
Conference (ASIAN'96), Lecture
Notes in Computer Science 1179,
pp. 172-181, Springer-Verlag Press, German, December
1996. (SCI, EI, acceptance rate 18.3%) Local
Journal Papers 28.
Shiuh-Jeng
Wang, Yao-Han Chang, Wen-Ya
Chiang, Wen-Shenq Juang,
“Investigations in Cross-site Script on Web-systems Gathering Digital Evidence
Against Cyber-Intrusions,” Journal
of Computers, Vol. 18, No. 4, pp. 69-78, CSROC Press, Taiwan, 2008. 29.
Horng-Twu
Liaw, Wen-Shenq Juang, Wei-Chen
Wu and Kuan-Ying Chen, “The Certificate Management
of Public Key Infrastructure,” Electronic
Commerce Studies, Vol. 2, No. 4, pp. 449-460, NTPU Press, Taipei, Taiwan,
R.O.C., Winter 2004. 30.
Horng-Twu
Liaw, Wen-Shenq Juang
and Chi-Kai
Lin,
“The Research of Secure Internet Services,”
Communications
of IICM, invited paper, Vol. 6., No. 4, pp. 61-80, IICM Press, Taiwan, December
2003.
31.
Wen-Shenq
Juang
and Horng-Twu Liaw,
“Improved Blind Threshold Signature Schemes Based on Discrete
Logarithm,” Communications of IICM,
invited paper, Vol. 6, No. 1, pp. 1-10, IICM Press, Taiwan, March 2003. 32.
Wen-Shenq
Juang
and Horng-Twu Liaw,Yenmun
Haung and Po-Chou Lin, “The Research of
Multi-authority Payment Systems for Electronic Commerce,” Information
Security Newsletter, invited paper, Vol. 7, No. 4, pp. 96-104, CCISA Press,
Taiwan, September 2001. 33.
Chun-I
Fan, Chin-Laung Lei and Wen-Shenq Juang,
“Cryptanalysis on an Intractable Trapdoor One-way Function Based on Quadratic
Residue,” Journal of Computers, pp.1-8,
CSROC Press, Taiwan, 1994. (B)
Full Refereed Conference Papers (會議論文) International
Conference Papers 1.
Ren-Chiun
Wang, Wen-Shenq Juang and Chin-Laung
Lei, A Web Metering Scheme
for Fair Advertisement Transactions,
The IEEE 2nd
International Conference on Information Security and Assurance
(ISA 2008), 2.
Ren-Chiun
Wang, Wen-Shenq Juang and Chin-Laung
Lei, An Anonymous and Deniable Conversation for a Thin Client, The IEEE 22nd
International Conference on Advanced Information Networking and Applications (AINA
2008), Okinawa, Japan, March 2008. (EI) 3.
Shiuh-Jeng
Wang, Yao-Han Chang, Wen-Ya
Chiang, Wen-Shenq Juang,
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence
Against Cyber-Intrusions, IEEE International Conference on Future Generation
Communication and Networking (FGCN 2007), Jeju
Island, Korea, December 2007. (EI) 4.
Ren-Chiun
Wang, Wen-Shenq Juang and Chin-Laung
Lei, A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost
Problem, The IFIP
3rd International
Symposium on Security in Ubiquitous Computing (SECUBIQ 2007),
5.
Ren-Chiun
Wang, Wen-Shenq Juang, Chen-Chi
Wu, and Chin-Laung Lei, A Lightweight Key Agreement
Protocol with User Anonymity in Ubiquitous Computing Environments, IEEE
International Conference on Multimedia and Ubiquitous Engineering (MUE 2007),
Seoul, Korea, April 2007. (EI) 6.
Wen-Shenq
Juang
and Jing-Lin Wu,
Efficient
3GPP Authentication and Key Agreement with Robust User Privacy Protection, IEEE
Wireless Communications and Networking Conference (WCNC 2007), Hong Kong, March
2007. (EI) 7.
Wen-Shenq
Juang
and Sian-Teng Chen, Security Enhancement for Robust
Password Authenticated Key Agreement Using Smart Cards, International
Workshop on Web Technologies and Information Security (within
ICS’06), pp. 898-903, Taipei, Taiwan, December 2006. 8.
Jing-Lin
Wu, Wen-Shenq Juang and Sian-Teng
Chen, Efficient GSM Authentication and Key Agreement Protocols with Robust User
Privacy Protection, International
Workshop on Computer Networks and Wireless Communications (within
ICS’06), pp. 540-545, Taipei, Taiwan, December 2006. 9.
Wen-Shenq
Juang,
Efficient
User Authentication and Key Agreement in Wireless
Sensor Networks,
The
7th International Workshop on Information Security Applications
(WISA’06), pp. 71-85, Jeju Island, Korea, August
2006. (EI) 10.
Wen-Shenq
Juang,
Efficient User Authentication and Key Agreement in Ubiquitous Computing,
the Workshop
on Ubiquitous
Application and Security Service
(UASS’06, within ICCSA'06),
pp.
396-405,
Glasgow,
Scotland, UK,
May
2006.
(EI) 11.
Wen-Shenq
Juang,
A
Simple and Efficient Conference Scheme for Mobile Communications, The
6th International Workshop on Information Security Applications
(WISA’05), pp. 207-222, Jeju Island, Korea, August
2005. (EI) 12.
Wen-Shenq
Juang,
Horng-Twu Liaw and Chin-Laung
Lei, A Practical Anonymous Payment Scheme for Electronic Commerce, The 7th
International Conference on Distributed Multimedia Systems (DMS’01), pp.
305-311, Taipei, Taiwan, September 2001. 13.
Wen-Shenq
Juang
,Chin-Laung Lei and Pei-Ling
Yu, A Verifiable Multi-Authorities Secret Election Allowing Abstaining from
Voting, International Computer Symposium (ICS’98), Tainan,
Taiwan, December 1998. 14.
Wen-Shenq
Juang
and Chin-Laung Lei. Blind Threshold Signatures Based
on Discrete Logarithm, The Second Asian Computing Science Conference
(ASIAN’96), pp. 172-181, Singapore,
December 1996. (EI) 15.
Wen-Shenq
Juang,
Chin-Laung Lei and Chun-I Fan, Anonymous channel and
authentication in wireless communications, International Conference on
Networking and Multimedia (within ICS’96), pp. 227-234, December, Kaohsiung,
Taiwan, R.O.C., 1996. 16.
Chih-Yuh
Chang, Chin-Laung Lei, Wen-Shenq Juang, A
Java Security Model Based on Information Flow Control, International Conference
on Cryptology and Information Security (within ICS’96), pp. 176-183, December,
17.
Wen-Shenq
Juang,
Chin-Laung Lei and Chun-I Fan, A collision free
secret ballot protocol for computerized general elections, International
Computer Symposium (ICS’94), pp. 309-314, Taiwan, 1994. Local
Conference Papers 18.
Chi-Ying
Chen and Wen-Shenq
Juang,
An Offline and Interestable E-cash, National
Computer Symposium (NCS’07), 19.
Chia-Cho
He and Wen-Shenq
Juang,
A Secure and Anonymous C2C Online Auction Scheme, the
17th Information Security Conference (ISC’07), pp. 568-578, 20.
Wen-Shenq
Juang
and
Sian-Teng Chen, Robust
and Efficient Password Authenticated Key Agreement Using Smart Cards, the 16th
Information Security Conference (ISC’06), pp. 291-298, Taichung,
Taiwan, June 2006. 21.
Wen-Shenq
Juang
and
Wei-Ken Nien, Efficient
Password Authenticated Key Agreement Using Bilinear Pairings,
the 16th Information Security Conference (ISC’06), pp. 214-221, 22.
Wen-Shenq
Juang
and Jing-Lin Wu,
Efficient
User Authentication and Key Agreement With Privacy Protection, National
Computer Symposium (NCS’05), Tainan, Taiwan,
December 2005. 23.
Wen-Shenq
Juang
and
Jyan-Cwan Wu, An
Efficient and Flexible Decentralized Multicast Key Distribution Scheme, the
11th Information Management and Implementation Conference
(IMI’05), pp. 2005~2021, 24.
Wen-Shenq
Juang
and Jing-Lin Wu,
An
Efficient Two-Factor Authenticated Key Exchange Protocol Based on Elliptic Curve
Cryptosystems, the 11th Information
Management and Implementation Conference (IMI’05),
pp. 299~306, Taipei, Taiwan, R.O.C., December
2005. 25.
Wen-Shenq
Juang
and Jing-Lin Wu, Two Efficient Two-Factor
Authenticated Key Exchange Protocols in Public Wireless LANs, The
15th Information Security Conference (ISC’05), pp. 281~290, Kaohsiung,
Taiwan, June 2005. 26.
Horng-Twu
Liaw, Wen-Shenq Juang、Guan-Ying
Chen、Chun-Neng
Wang, A Certificates Management Scheme Based on Public-key Infrastructure,
Electronic Commerce and Digital Life Conference (EC’04),
pp. 262~274, Taipei, Taiwan, R.O.C., April 2004.
27.
Horng-Twu
Liaw, Wen-Shenq Juang、Chi-Kai
Lin、Tsai-Yu
Wang, An Efficient and Secure Information Goods digital Rights Management
Scheme, ERP Research and Practice conference,
pp. 2~13, Taipei, Taiwan, R.O.C., January 2004. 28.
Horng-Twu
Liaw, Wen-Shenq Juang、Yu-Wen
Chen,
Wei-Chen
Wu,,
An Electronic Trading Protocol Based on
Digital-Rights, Digital Content and Innovation Conference, pp. 40~50, Taipei,
Taiwan, November 2003. 29.
Horng-Twu
Liaw, Wen-Shenq Juang
and Chi-Kai
Lin, A Secure On-line Goods Trading Scheme,
The 13th Information
Security Conference (ISC’03), pp. 309-316, Tao-Yuan, Taiwan, August 2003. 30.
Horng-Twu
Liaw, Wen-Shenq Juang、Jung-Shian
Lin, A Role-based Digital Rights Access Control Scheme,
The 13th Information
Security Conference (ISC’03), pp. 97-103, Tao-Yuan, Taiwan, August 2003. 31.
Horng-Twu
Liaw, Wen-Shenq Juang、Yenmun
Haung.
An Electronic Pre-pay Payment Scheme, Electronic Commerce and Digital Life
Conference (EC’03), pp. 1865~1874, Taipei, Taiwan, R.O.C., April 2003.
32.
Horng-Twu
Liaw, Wen-Shenq Juang、Meng-You
Chiou、Yu-Wen
Chen. A Network Trading Model based on
Digital Rights, ERP Research and Practice Conference,
pp. 63~70, Taipei, Taiwan, R.O.C., January 2003.
33.
Horng-Twu
Liaw, Wen-Shenq Juang, Yenmum
Haung and Chung-Hsien
Lin. Secure Electronic Payment Mechanism. ERP
Research and Practice conference, pp.
449~456, Taipei, Taiwan, R.O.C., January 2003. 34.
Horng-Twu
Liaw, Wen-Shenq Juang, Shiou-Wei
Fan,
Chi-Kai Lin. A Secure On-line Bidding
Auction Scheme. The 8th Information Management and
Implementation Conference (IMI’02), pp.
53~60, Kaohsiung, Taiwan, R.O.C., November
2002. 35.
Horng-Twu
Liaw, Wen-Shenq Juang、Guan-Ying
Chen. A
New Certificate Revocation List Concept and its Applications, The 8th
Information Management and Implementation Conference (IMI’02),
pp. 305~311, Kaohsiung, Taiwan, R.O.C., November
2002. 36.
Shiou-Wei
Fan, Horng-Twu Liaw, Meng-You
Chiou, Wen-Shenq Juang, Shr-Ya
Chen, Detection and Recording of bad behavior in Networks,
The 6th Information Management and Police Information Conference,
Taoyuan, Taiwan, June 2002.
37.
Po-Chou
Lin, Wen-Shenq
Juang, Horng-Twu Liaw
and Meng-You Chiou. A
Secure and Fair On-line Auction Scheme, The 12th Information Security
Conference (ISC’02), pp. 415~422, Taichung,
Taiwan, May 2002. (Recipient of the Best Paper Award) 38.
Horng-Twu
Liaw, Wen-Shenq Juang、Shiou-Wei
Fan、Yenmum
Haung, Secure Anonymous Conditional Purchase Order
Payment Mechanism, The 12th Information Security Conference
(ISC’02), pp. 119~126, Taichung, Taiwan, May 2002. 39.
Wen-Shenq
Juang,
Horng-Twu Liaw and Yen-Mun
Huang. A Practical Anonymous Off-line Multi-authorities Payment Scheme for
Electronic Commerce. National Computer Symposium (NCS’01), pp. I280~I288,
Taipei, Taiwan, December 2001. 40.
Wen-Shenq
Juang,
Horng-Twu Liaw, Chin-Laung
Lei and Po-Chou Lin. Fair Blind Threshold Signatures in Wallet with Observers.
National Computer Symposium (NCS’01), pp. F001~F008, Taipei, Taiwan, December
2001. 41.
Horng-Twu
Liaw, Wen-Shenq Juang and Yen-Mun
Huang. A Dynamic Authorization Inheritance Mechanism in a User Hierarchy. The 7th
Information Management and Implementation Conference (IMI’01), Taipei, Taiwan,
December 2001. 42.
Horng-Twu
Liaw, Wen-Shenq Juang, Shiou-Wei
Fan, Meng-You Chiou and Jr-Uang
Chen, The Research of Electronic Voting Mechanism, The 5th
Information Management and Police Information Conference, pp. 137-144, Taoyuan,
Taiwan, June 2001. 43.
Wen-Shenq
Juang,
Horng-Twu Liaw, Chin-Laung
Lei and Pei-Ling Yu. A Secure and Anonymous
Multi-authorities E-cash Scheme for Electronic Commerce. The 11th
Information Security Conference (ISC’01), pp. 281-288, 44.
Chin-Laung
Lei, Wen-Shenq Juang and Pei-Ling Yu.
Provably secure blind threshold signatures based on discrete logarithm. National
Computer Symposium (NCS’99), pp. (C-198)-(C-205), 45.
Wen-Shenq
Juang
and Chin-Laung Lei. Fair Blind Threshold signatures
based on discrete logarithm. National Computer Symposium (NCS’97), pp.
(C-95)-(C-100), Taiwan, 1997. 46.
Wen-Shenq
Juang,
Chin-Laung Lei and Chun-I Fan. A secure and
practical electronic voting scheme for real world environments. The 6th
Information Security Conference (ISC’96), pp. 153-160, Taiwan, 1996. 47.
Chun-I
Fan, Chin-Laung Lei and Wen-Shenq Juang. On
the Analysis of public-key Cryptosystems," The 6th Information
Security Conference (ISC’96), pp. 228-235, Taiwan, 1996. Other
Publications (其他著作)
1.
Tzong-Chen
Wu, Adrian Perrig, Wen-Shenq
Juang,
Mike Reiter, Shiuh-Jeng
Wang, Bo-Yin Yang, Cynthia Kuo, Mark Luk,
Jon McCune, Ahren Studer,
Hua-Yueh Chen, Jhoong-Wei
Chen, Xiao-Yong Chen, Hung-Chin Chi, Ching-Yuang Fu,
Yen-Ching Lin, Ken Tsay,
and Zhi-Ran Yang, “Remote authentication and
ubiquitous trust establishment technical report: scalable group key
establishment,” Proceedings of 2007 Second iCAST/CMU/TRUST
Joint Conference on Security and Privacy Technplogies,
pp. 8-10, Taipei, Taiwan, June 2007. 2.
Wen-Shenq
Juang, "Research
of Key Management and Privacy Protection in Ubiquitous Computing," Report
of National Science Council, 95-2221-E-128-004-MY2(1/2),
May 2007. 3.
Tzong-Chen
Wu, Xiao-Yong Chen, Chuan-Kuang Lin, Wen-Shenq
Juang,
Shiuh-Jeng
Wang and Bo-Yin Yang. Introduction to Programming on Symbian
OS, Technique Report of iCAST, May 2007. 4.
Ren-Chiun
Wang, Wen-Shenq Juang and Chin-Laung
Lei, Provably Secure and Efficient Identification and Key Agreement Protocol
with User Anonymity, TWISC InfoComm Security
Conference, Taipei, Taiwan, January 2007. 5.
Wen-Shenq
Juang, "Research
and Implementation of Decentralized Secure Multicast Key Distribution
Systems," Report of National Science Council, NSC-94-2213-E-128-001,
January 2007. 6.
Wen-Shenq
Juang,
Sian-Teng
Chen and Chin-Laung Lei, “VoIP
Security,” Collected Papers on Information and Communication Security, Science
& Technology Policy Research and Information Center, National Applied
Research Laboratories, November 2006. 7.
Wen-Shenq
Juang, "Research
and Implementation of Remote User Authentication and Key Agreement Using Smart
Cards," Report of National Science Council, NSC-93-2213-E-128-005,
January 2006. 8.
Wen-Shenq
Juang
and Jing-Lin Wu,
“E-voting,”
Collected Papers on Information and Communication Security, Science &
Technology Policy Research and Information Center, National Applied Research
Laboratories,
pp. 311~340, December 2005. 9.
Wen-Shenq
Juang, "Research
and Implementation of Off-line Electronic Payment Systems (II)," Report
of National Science Council, NSC-92-2213-E-128-006, January 2005. 10.
Wen-Shenq
Juang, "Research
and Implementation of Off-line Electronic Payment Systems," Report of
National Science Council, NSC-91-2213-E-128-005, January 2004. 11.
Chin-Laung
Lei, Wen-Shenq Juang. Report
of the Participation of Crypt’03 Conference. Communications of the CCISA, Vol.
9, No. 4, pp. 140-145, 2003. 12.
Wen-Shenq
Juang, "Research
and Implementation of a Secure and Practical Selectively Anonymous Payment
System for Real World Environments," Report of National Science
Council, NSC-90-2213-E-128-004, January 2003. 13.
Wen-Shenq
Juang, "Research
and Implementation of a Multi-authorities E-cash System for Electronic
Commerce," Report of National Science Council, NSC-89-2218-E-128-001, March
2002. 14.
Wen-Shenq
Juang, “Blind
Threshold Signatures and Their Applications for Privacy Protection,” National
Information Security Conference, pp. XXXVII-XLV, Taiwan, May 2000. (Invited
Talk) 15.
Wen-Shenq
Juang,
"Secure and Anonymous Computerized General Elections," A Ph.D.
dissertation, Department of Electrical Engineering, National Taiwan University,
1998. (Advisor: Prof. Chin-Laung Lei) 16.
Wen-Shenq
Juang,
"New Protocol for Digital Multisignatures,"
A master thesis, Department of Computer Science, College of Science, National Chiao
Tung University, 1993. (Advisor: Prof. Wen-Guey
Tzeng)
|