scispace - formally typeset
T

Tzong-Chen Wu

Researcher at National Taiwan University of Science and Technology

Publications -  109
Citations -  2246

Tzong-Chen Wu is an academic researcher from National Taiwan University of Science and Technology. The author has contributed to research in topics: Public-key cryptography & Authentication. The author has an hindex of 26, co-authored 109 publications receiving 2172 citations. Previous affiliations of Tzong-Chen Wu include National Chung Cheng University & National Taiwan University.

Papers
More filters
Journal ArticleDOI

Remote password authentication with smart cards

TL;DR: A remote password authentication scheme based on the Chinese remainder theorem is proposed that can verify the remote password without verification tables and provide a signature scheme and communication timestamps in the authentication phase against the potential attacks of replaying a previously intercepted login request.
Journal ArticleDOI

Two RFID-based Solutions to Enhance Inpatient Medication Safety

TL;DR: The weaknesses of the Huang–Ku scheme are shown, and two RFID-based solutions to enhance medication safety for two different scenarios are proposed, which are practical, secure and efficient for medication applications.
Journal ArticleDOI

New nonrepudiable threshold proxy signature scheme with known signers

TL;DR: A new nonrepudiable threshold proxy signature scheme is proposed that overcomes the above weakness and is more efficient than Sun's in terms of computational complexities and communication costs.
Proceedings ArticleDOI

GAnGS: gather, authenticate 'n group securely

TL;DR: GAnGS, a protocol for the secure exchange of authenticated information among a group of people, is proposed and designed to be robust to user errors, such as miscounting the number of participants or incorrectly comparing checksums.
Journal ArticleDOI

New dynamic ID authentication scheme using smart cards

TL;DR: It is demonstrated that both of the proposed schemes cannot achieve the security requirement for user anonymity and resist an impersonation attack yet, and a new dynamic ID authentication scheme is proposed to overcome the above security weaknesses.