學術著作
首頁 基本資料 學經歷 教授課程 研究領域 學術著作

 

學術著作

A) Journal Papers (期刊論文)

International Journal Papers

1.      Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw, “Robust and Efficient Password Authenticated Key Agreement Using Smart Cards,” IEEE Transactions on Industrial Electronics, accepted, New York , IEEE Press, 2008. (SCI,EI)

2.      Wen-Shenq Juang and Wei-Ken Nien, “Efficient Password Authenticated Key Agreement Using Bilinear Pairings,” Mathematical and Computer Modelling, in press, New York , Pergamon Press, 2008. (SCI, EI)

3.      Wen-Shenq Juang and Jing-Lin Wu, “Efficient User Authentication and Key Agreement with User Privacy Protection,” International Journal of Network Security, Vol. 7, No. 2, pp. 126~135, 2008. (EI)

4.      Wen-Shenq Juang, “D-Cash: A Flexible Pre-paid E-cash Scheme for Date-attachment,” Electronic Commerce Research and Applications, Vol. 6, No. 1, pp. 74-80, New York, Elsevier Press, 2007. (SSCI,SCI)

5.      Wen-Shenq Juang and Jyan-Cwan Wu, “An Efficient and Flexible Decentralized Multicast Key Distribution Scheme,” International Journal of Computer Science and Network Security, Vol. 6, No. 8B, pp. 141-150, Korea , August 2006.

6.      Horng-Twu Liaw, Wen-Shenq Juang and Chi-Kai Lin, “An Electronic Online Bidding Auction Protocol with Both Security and Efficiency,” Applied Mathematics and Computation, Vol. 174, No. 2, pp. 1487-1497, New York, Elsevier Press, March 2006. (SCI, EI)

7.      Wen-Shenq Juang, “A Practical Anonymous Off-line Multi-authority Payment Scheme,” Electronic Commerce Research and Applications, Vol. 4, No. 3, pp. 240-249, New York, Elsevier Press, Autumn 2005. (SSCI, SCI)

8.      Wen-Shenq Juang, Horng-Twu Liaw, Po-Chou Lin and Chi-Kai Lin, “The Design of a Secure and Fair Sealed-bid Auction Service,” Mathematical and Computer Modelling, Vol. 41, No. 8-9, pp. 973-985, New York, Pergamon Press, April - May 2005. (SCI, EI)

9.      Wen-Shenq Juang and Horng-Twu Liaw, “Fair Blind Threshold Signatures in Wallet with Observers,” Journal of Systems and Software, Vol. 72, No. 1, pp. 25-31, New York, Elsevier Press, June 2004. (SCI, EI)

10.  Wen-Shenq Juang, “Efficient Three-party Key Exchange Using Smart Cards,” IEEE Trans. on Consumer Electronics, Vol. 50, No. 2, pp. 619-624, New York, IEEE Press, May 2004.  (SCI, EI)

11.  Wen-Shenq Juang, “Efficient Password Authenticated Key Agreement Using Smart Cards,” Computers & Security, Vol. 23, No. 2, pp. 167-173, New York,  Elsevier Press, March 2004.  (SCI, EI)

12.  Wen-Shenq Juang, “Efficient Multi-server Password Authenticated Key Agreement Using Smart Cards,” IEEE Trans. on Consumer Electronics, Vol. 50, No. 1, pp. 251-255, New York, IEEE Press, February 2004.  (SCI, EI)

13.  Wen-Shenq Juang and Horng-Twu Liaw, “A Practical Anonymous Multi-authority E-cash Scheme,”  Applied Mathematics and Computation, Vol. 147, No. 3, pp. 699-711, New York, Elsevier Press, January 2004.  (SCI, EI) 

14.  Wen-Shenq Juang, “A Practical Anonymous Payment Scheme for Electronic Commerce,” Computers & Mathematics with Applications, Vol. 46, No. 12, pp. 1787~1798, New York, Pergamon Press, December 2003. (SCI, EI)

15.  Wen-Shenq Juang, Chin-Laung Lei and Horng-Twu Liaw, “Privacy and Anonymity Protection With Blind Threshold Signatures,” International Journal of Electronic Commerce, Vol. 7 , No. 1 , pp. 145-159, M. E. Shape Press, U.S.A.,  Winter 2002-2003. (SSCI, SCI)

16.  Wen-Shenq Juang, Chin-Laung Lei and Horng-Twu Liaw, “A Verifiable Multi-authority Secret Election Allowing Abstention From Voting,” The Computer Journal, Vol. 45 , No. 6, pp. 672-682, Oxford University Press, U. K., December 2002. (SCI, EI)

17.  Chin-Laung Lei, Wen-Shenq Juang and Pei-Ling Yu, “Provably Secure Blind Threshold Signatures Based on Discrete Logarithm,” Journal of Information Science and Engineering, Vol. 18, No. 1, pp. 23-39, Taipei, Institute of Information Science Academia Sinica Press, January 2002. (SCI, EI)

18.  Wen-Shenq Juang, Chin-Laung Lei and Horng-Twu Liaw, “Fair Blind Threshold Signatures Based on Discrete Logarithm,” International Journal of Computer Systems Sciences & Engineering, Vol. 16, No. 6, pp. 371-379, CRL Press, UK, November 2001. (SCI, EI)

19.  Wen-Shenq Juang, Chin-Laung Lei and Chih-Yuh Chang, “Anonymous Channel and Authentication in Wireless Communications,” Computer Communications, Vol. 22, No. 15-16, pp. 1502-1511, New York, IPC Science and Technology Press, August 1999. (SCI, EI)

20.  Wen-Shenq Juang and Chin-Laung Lei, “Partially Blind Threshold Signatures Based on Discrete Logarithm,” Computer Communications, Vol. 22, No. 1, pp. 73-86, New York, IPC Science and Technology Press, January 1999. (SCI, EI)

21.  Wen-Shenq Juang and Chin-Laung Lei, “A Secure and Practical Electronic Voting Scheme for Real World Environments,” IEICE Trans. on Fundamentals, Vol. E80-A, No. 1, pp. 64-71, Tokyo, IEICE Press, January 1997. (SCI, EI)

22.  Wen-Shenq Juang and Chin-Laung Lei, “A Collision Free Secret Ballot Protocol for Computerized General Election,” Computers & Security, Vol. 15, No. 4, pp. 339-348, New York, Elsevier Press, 1996. (SCI, EI)

Papers in Books

23.  Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, “A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost Problem,” In Proc. of the 2007 IFIP International Conference on Embedded and Ubiquitous Computing (EUC2007), Lecture Notes in Computer Science 4809, pp. 728-744, Springer-Verlag Press, German, 2007. (EI)

24.  Wen-Shenq Juang, “Efficient  User  Authentication  and  Key  Agreement  in  Wireless  Sensor  Networks,” In Proc. of  the 7th International Workshop on Information Security Applications (WISA’06), Lecture Notes in Computer Science 4298, pp. 15-29, Springer-Verlag Press, German, 2006. (SCI, EI, acceptance rate 21.2%)

25.  Wen-Shenq Juang, “Efficient User Authentication and Key Agreement in Ubiquitous Computing,” In Proc. of the 2006 International Conference on Computational Science and its Applications (ICCSA'06), Lecture Notes in Computer Science 3983, pp. 396-405, Springer-Verlag Press, German, 2006. (SCI, EI, acceptance rate 27.1%)

26.  Wen-Shenq Juang, “A Simple and Efficient Conference Scheme for Mobile Communications,” In Proc. of  the 6th International Workshop on Information Security Applications (WISA’05), Lecture Notes in Computer Science 3786, pp. 81-95, Springer-Verlag Press, German, 2005. (SCI, EI, acceptance rate 17.3%)

27.  Wen-Shenq Juang and Chin-Laung Lei, “Blind Threshold Signatures Based on Discrete Logarithm,” In Proc. of the second Asian Computing Science Conference (ASIAN'96), Lecture Notes in Computer Science 1179, pp. 172-181, Springer-Verlag Press, German, December 1996. (SCI, EI, acceptance rate 18.3%)

Local Journal Papers

28.  Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang, “Investigations in Cross-site Script on Web-systems Gathering Digital Evidence Against Cyber-Intrusions,” Journal of Computers, Vol. 18, No. 4, pp. 69-78, CSROC Press, Taiwan, 2008.

29.  Horng-Twu Liaw, Wen-Shenq Juang, Wei-Chen Wu and Kuan-Ying Chen, “The Certificate Management of Public Key Infrastructure,” Electronic Commerce  Studies, Vol. 2, No. 4, pp. 449-460, NTPU Press, Taipei, Taiwan, R.O.C., Winter 2004.

30.  Horng-Twu Liaw, Wen-Shenq Juang and Chi-Kai Lin, “The Research of Secure Internet Services,” Communications of IICM, invited paper, Vol. 6., No. 4, pp. 61-80, IICM Press, Taiwan, December 2003.

31.  Wen-Shenq Juang and Horng-Twu Liaw,Improved Blind Threshold Signature Schemes Based on Discrete Logarithm,” Communications of IICM, invited paper, Vol. 6, No. 1, pp. 1-10, IICM Press, Taiwan, March 2003.

32.  Wen-Shenq Juang and Horng-Twu Liaw,Yenmun Haung and Po-Chou Lin, “The Research of Multi-authority Payment Systems for Electronic Commerce,” Information Security Newsletter, invited paper, Vol. 7, No. 4, pp. 96-104, CCISA Press, Taiwan, September 2001.

33.  Chun-I Fan, Chin-Laung Lei and Wen-Shenq Juang, “Cryptanalysis on an Intractable Trapdoor One-way Function Based on Quadratic Residue,” Journal of Computers, pp.1-8, CSROC Press, Taiwan, 1994.

(B) Full Refereed Conference Papers (會議論文)

International Conference Papers

1.      Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, A Web Metering Scheme for Fair Advertisement Transactions, The IEEE 2nd International Conference on Information Security and Assurance (ISA 2008), Busan , Korea , April 2008. (EI)

2.      Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, An Anonymous and Deniable Conversation for a Thin Client, The IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA 2008), Okinawa, Japan, March 2008. (EI)

3.      Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang, Investigations in Cross-site Script on Web-systems Gathering Digital Evidence Against Cyber-Intrusions, IEEE International Conference on Future Generation Communication and Networking (FGCN 2007), Jeju Island, Korea, December 2007. (EI)

4.      Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost Problem, The IFIP 3rd International Symposium on Security in Ubiquitous Computing (SECUBIQ 2007), Taipei , December 2007. (EI)

5.      Ren-Chiun Wang,  Wen-Shenq Juang,  Chen-Chi Wu, and Chin-Laung Lei, A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments, IEEE International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), Seoul, Korea, April 2007. (EI)

6.      Wen-Shenq Juang and Jing-Lin Wu, Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection, IEEE Wireless Communications and Networking Conference (WCNC 2007), Hong Kong, March 2007. (EI)

7.      Wen-Shenq Juang and Sian-Teng Chen, Security Enhancement for Robust Password Authenticated Key Agreement Using Smart Cards, International Workshop on Web Technologies and Information Security (within ICS’06), pp. 898-903, Taipei, Taiwan, December 2006.

8.      Jing-Lin Wu, Wen-Shenq Juang and Sian-Teng Chen, Efficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection, International Workshop on Computer Networks and Wireless Communications (within ICS’06), pp. 540-545, Taipei, Taiwan, December 2006.

9.      Wen-Shenq Juang, Efficient  User  Authentication  and  Key  Agreement  in  Wireless  Sensor  Networks, The 7th International Workshop on Information Security Applications (WISA’06), pp. 71-85, Jeju Island, Korea, August 2006. (EI)

10.  Wen-Shenq Juang, Efficient User Authentication and Key Agreement in Ubiquitous Computing, the Workshop on Ubiquitous Application and Security Service (UASS’06, within ICCSA'06), pp. 396-405, Glasgow, Scotland, UK, May 2006. (EI)

11.  Wen-Shenq Juang, A Simple and Efficient Conference Scheme for Mobile Communications, The 6th International Workshop on Information Security Applications (WISA’05), pp. 207-222, Jeju Island, Korea, August 2005. (EI)

12.  Wen-Shenq Juang, Horng-Twu Liaw and Chin-Laung Lei, A Practical Anonymous Payment Scheme for Electronic Commerce, The 7th International Conference on Distributed Multimedia Systems (DMS’01), pp. 305-311, Taipei, Taiwan, September 2001.

13.  Wen-Shenq Juang ,Chin-Laung Lei and Pei-Ling Yu, A Verifiable Multi-Authorities Secret Election Allowing Abstaining from Voting, International Computer Symposium (ICS’98), Tainan, Taiwan, December 1998.

14.  Wen-Shenq Juang and Chin-Laung Lei. Blind Threshold Signatures Based on Discrete Logarithm, The Second Asian Computing Science Conference (ASIAN’96), pp. 172-181, Singapore, December 1996. (EI)

15.  Wen-Shenq Juang, Chin-Laung Lei and Chun-I Fan, Anonymous channel and authentication in wireless communications, International Conference on Networking and Multimedia (within ICS’96), pp. 227-234, December, Kaohsiung, Taiwan, R.O.C., 1996.

16.  Chih-Yuh Chang, Chin-Laung Lei, Wen-Shenq Juang, A Java Security Model Based on Information Flow Control, International Conference on Cryptology and Information Security (within ICS’96), pp. 176-183, December, Kaohsiung , Taiwan , R.O.C., 1996.

17.  Wen-Shenq Juang, Chin-Laung Lei and Chun-I Fan, A collision free secret ballot protocol for computerized general elections, International Computer Symposium (ICS’94), pp. 309-314, Taiwan, 1994.

Local Conference Papers

18.  Chi-Ying Chen and Wen-Shenq Juang, An Offline and Interestable E-cash, National Computer Symposium (NCS’07), Taichung , Taiwan , December 2007.

19.  Chia-Cho He and Wen-Shenq Juang, A Secure and Anonymous C2C Online Auction Scheme, the 17th Information Security Conference (ISC’07), pp. 568-578, Chiayi , Taiwan , June 2007.

20.  Wen-Shenq Juang and Sian-Teng Chen, Robust and Efficient Password Authenticated Key Agreement Using Smart Cards, the 16th Information Security Conference (ISC’06), pp. 291-298, Taichung, Taiwan, June 2006.

21.  Wen-Shenq Juang and Wei-Ken Nien, Efficient Password Authenticated Key Agreement Using Bilinear Pairings, the 16th Information Security Conference (ISC’06), pp. 214-221, Taichung , Taiwan , June 2006.

22.  Wen-Shenq Juang and Jing-Lin Wu, Efficient User Authentication and Key Agreement With Privacy Protection, National Computer Symposium (NCS’05), Tainan, Taiwan, December 2005.

23.  Wen-Shenq Juang and Jyan-Cwan Wu, An Efficient and Flexible Decentralized Multicast Key Distribution Scheme, the 11th Information Management and Implementation Conference (IMI’05), pp. 2005~2021, Taipei , Taiwan , R.O.C., December 2005.

24.  Wen-Shenq Juang and Jing-Lin Wu, An Efficient Two-Factor Authenticated Key Exchange Protocol Based on Elliptic Curve Cryptosystems, the 11th Information Management and Implementation Conference (IMI’05), pp. 299~306, Taipei, Taiwan, R.O.C., December 2005.

25.  Wen-Shenq Juang and Jing-Lin Wu, Two Efficient Two-Factor Authenticated Key Exchange Protocols in Public Wireless LANs, The 15th Information Security Conference (ISC’05), pp. 281~290, Kaohsiung, Taiwan, June 2005.

26.  Horng-Twu Liaw, Wen-Shenq JuangGuan-Ying ChenChun-Neng Wang, A Certificates Management Scheme Based on Public-key Infrastructure, Electronic Commerce and Digital Life Conference (EC’04), pp. 262~274, Taipei, Taiwan, R.O.C., April 2004. 

27.  Horng-Twu Liaw, Wen-Shenq JuangChi-Kai LinTsai-Yu Wang, An Efficient and Secure Information Goods digital Rights Management Scheme, ERP Research and Practice conference,  pp. 2~13, Taipei, Taiwan, R.O.C., January 2004.

28.  Horng-Twu Liaw, Wen-Shenq JuangYu-Wen Chen, Wei-Chen Wu,, An Electronic Trading Protocol Based on Digital-Rights, Digital Content and Innovation Conference, pp. 40~50, Taipei, Taiwan, November 2003. 

29.  Horng-Twu Liaw, Wen-Shenq Juang and Chi-Kai Lin, A Secure On-line Goods Trading Scheme, The 13th Information Security Conference (ISC’03), pp. 309-316, Tao-Yuan, Taiwan, August 2003.

30.  Horng-Twu Liaw, Wen-Shenq JuangJung-Shian Lin, A Role-based Digital Rights Access Control Scheme, The 13th Information Security Conference (ISC’03), pp. 97-103, Tao-Yuan, Taiwan, August 2003.

31.  Horng-Twu Liaw, Wen-Shenq JuangYenmun Haung. An Electronic Pre-pay Payment Scheme, Electronic Commerce and Digital Life Conference (EC’03), pp. 1865~1874, Taipei, Taiwan, R.O.C., April 2003.

32.  Horng-Twu Liaw, Wen-Shenq JuangMeng-You ChiouYu-Wen Chen. A Network Trading Model based on Digital Rights, ERP Research and Practice Conference, pp. 63~70,  Taipei, Taiwan, R.O.C., January 2003. 

33.  Horng-Twu Liaw, Wen-Shenq Juang, Yenmum Haung and Chung-Hsien Lin. Secure Electronic Payment Mechanism. ERP Research and Practice conference, pp. 449~456, Taipei, Taiwan, R.O.C., January 2003.

34.  Horng-Twu Liaw, Wen-Shenq Juang, Shiou-Wei Fan, Chi-Kai Lin. A Secure On-line Bidding Auction Scheme. The 8th Information Management and Implementation Conference (IMI’02), pp. 53~60, Kaohsiung, Taiwan, R.O.C., November 2002.  

35.  Horng-Twu Liaw, Wen-Shenq JuangGuan-Ying Chen. A  New Certificate Revocation List Concept and its Applications, The 8th Information Management and Implementation Conference (IMI’02), pp. 305~311, Kaohsiung, Taiwan, R.O.C., November 2002. 

36.  Shiou-Wei Fan, Horng-Twu Liaw, Meng-You Chiou, Wen-Shenq Juang, Shr-Ya Chen, Detection and Recording of bad behavior in Networks, The 6th Information Management and Police Information Conference, Taoyuan, Taiwan, June 2002.

37.  Po-Chou Lin, Wen-Shenq Juang, Horng-Twu Liaw and Meng-You Chiou. A Secure and Fair On-line Auction Scheme, The 12th Information Security Conference (ISC’02), pp. 415~422,  Taichung, Taiwan, May 2002. (Recipient of the Best Paper Award)

38.  Horng-Twu Liaw, Wen-Shenq JuangShiou-Wei FanYenmum Haung, Secure Anonymous Conditional Purchase Order Payment Mechanism, The 12th Information Security Conference (ISC’02), pp. 119~126, Taichung, Taiwan, May 2002.

39.  Wen-Shenq Juang, Horng-Twu Liaw and Yen-Mun Huang. A Practical Anonymous Off-line Multi-authorities Payment Scheme for Electronic Commerce. National Computer Symposium (NCS’01), pp. I280~I288, Taipei, Taiwan, December 2001.

40.  Wen-Shenq Juang, Horng-Twu Liaw, Chin-Laung Lei and Po-Chou Lin. Fair Blind Threshold Signatures in Wallet with Observers. National Computer Symposium (NCS’01), pp. F001~F008, Taipei, Taiwan, December 2001.

41.  Horng-Twu Liaw, Wen-Shenq Juang and Yen-Mun Huang. A Dynamic Authorization Inheritance Mechanism in a User Hierarchy. The 7th Information Management and Implementation Conference (IMI’01), Taipei, Taiwan, December 2001.

42.  Horng-Twu Liaw, Wen-Shenq Juang, Shiou-Wei Fan, Meng-You Chiou and Jr-Uang Chen, The Research of Electronic Voting Mechanism, The 5th Information Management and Police Information Conference, pp. 137-144, Taoyuan, Taiwan, June 2001.

43.  Wen-Shenq Juang, Horng-Twu Liaw, Chin-Laung Lei  and Pei-Ling Yu. A Secure and Anonymous Multi-authorities E-cash Scheme for Electronic Commerce. The 11th Information Security Conference (ISC’01), pp. 281-288, Tainan , Taiwan , May 2001.

44.  Chin-Laung Lei, Wen-Shenq Juang and Pei-Ling Yu. Provably secure blind threshold signatures based on discrete logarithm. National Computer Symposium (NCS’99), pp. (C-198)-(C-205), Taipei , Taiwan , December 1999 (Recipient of the Best Paper Award).

45.  Wen-Shenq Juang and Chin-Laung Lei. Fair Blind Threshold signatures based on discrete logarithm. National Computer Symposium (NCS’97), pp. (C-95)-(C-100), Taiwan, 1997.

46.  Wen-Shenq Juang, Chin-Laung Lei and Chun-I Fan. A secure and practical electronic voting scheme for real world environments. The 6th Information Security Conference (ISC’96), pp. 153-160, Taiwan, 1996.

47.  Chun-I Fan, Chin-Laung Lei and Wen-Shenq Juang. On the Analysis of public-key Cryptosystems," The 6th Information Security Conference (ISC’96), pp. 228-235, Taiwan, 1996.

Other Publications (其他著作)

1.      Tzong-Chen Wu, Adrian Perrig, Wen-Shenq Juang, Mike Reiter, Shiuh-Jeng Wang, Bo-Yin Yang, Cynthia Kuo, Mark Luk, Jon McCune, Ahren Studer, Hua-Yueh Chen, Jhoong-Wei Chen, Xiao-Yong Chen, Hung-Chin Chi, Ching-Yuang Fu, Yen-Ching Lin, Ken Tsay, and Zhi-Ran Yang, “Remote authentication and ubiquitous trust establishment technical report: scalable group key establishment,” Proceedings of 2007 Second iCAST/CMU/TRUST Joint Conference on Security and Privacy Technplogies, pp. 8-10, Taipei, Taiwan, June 2007.

2.      Wen-Shenq Juang, "Research of Key Management and Privacy Protection in Ubiquitous Computing," Report of National Science Council, 95-2221-E-128-004-MY2(1/2), May 2007.

3.      Tzong-Chen Wu, Xiao-Yong Chen, Chuan-Kuang Lin, Wen-Shenq Juang, Shiuh-Jeng Wang and Bo-Yin Yang. Introduction to Programming on Symbian OS, Technique Report of iCAST, May 2007.

4.      Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity, TWISC InfoComm Security Conference, Taipei, Taiwan, January 2007.

5.      Wen-Shenq Juang, "Research and Implementation of Decentralized Secure Multicast Key Distribution Systems," Report of National Science Council, NSC-94-2213-E-128-001, January 2007.

6.      Wen-Shenq Juang, Sian-Teng Chen and Chin-Laung Lei, VoIP Security,” Collected Papers on Information and Communication Security, Science & Technology Policy Research and Information Center, National Applied Research Laboratories, November 2006.

7.      Wen-Shenq Juang, "Research and Implementation of Remote User Authentication and Key Agreement Using Smart Cards," Report of National Science Council, NSC-93-2213-E-128-005, January 2006.

8.      Wen-Shenq Juang and Jing-Lin Wu, “E-voting,” Collected Papers on Information and Communication Security, Science & Technology Policy Research and Information Center, National Applied Research Laboratories, pp. 311~340, December 2005.

9.      Wen-Shenq Juang, "Research and Implementation of Off-line Electronic Payment Systems (II)," Report of National Science Council, NSC-92-2213-E-128-006, January 2005.

10.  Wen-Shenq Juang, "Research and Implementation of Off-line Electronic Payment Systems," Report of National Science Council, NSC-91-2213-E-128-005, January 2004.

11.  Chin-Laung Lei, Wen-Shenq Juang. Report of the Participation of Crypt’03 Conference. Communications of the CCISA, Vol. 9, No. 4, pp. 140-145, 2003.

12.  Wen-Shenq Juang, "Research and Implementation of a Secure and Practical Selectively Anonymous Payment System for Real World Environments," Report of National Science Council, NSC-90-2213-E-128-004, January 2003.

13.  Wen-Shenq Juang, "Research and Implementation of a Multi-authorities E-cash System for Electronic Commerce," Report of National Science Council, NSC-89-2218-E-128-001, March 2002.

14.  Wen-Shenq Juang, “Blind Threshold Signatures and Their Applications for Privacy Protection,” National Information Security Conference, pp. XXXVII-XLV, Taiwan, May 2000. (Invited Talk)

15.  Wen-Shenq Juang, "Secure and Anonymous Computerized General Elections," A Ph.D. dissertation, Department of Electrical Engineering, National Taiwan University, 1998. (Advisor: Prof. Chin-Laung Lei)

16.  Wen-Shenq Juang, "New Protocol for Digital Multisignatures," A master thesis, Department of Computer Science, College of Science, National Chiao Tung University, 1993. (Advisor: Prof. Wen-Guey Tzeng)