default search action
Gwoboa Horng
Person information
- affiliation: National Chung Hsing University, Taichung, Taiwan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j50]Yu-Chi Chen, Gwoboa Horng:
Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes. J. Vis. Commun. Image Represent. 85: 103489 (2022) - 2021
- [j49]Hung-Jui Ko, Cheng-Ta Huang, Zhi-Wei Zhuang, Gwoboa Horng, Shiuh-Jeng Wang:
Cloud evidence tracks of storage service linking with iOS systems. J. Supercomput. 77(1): 77-94 (2021) - 2020
- [j48]Hung-Jui Ko, Cheng-Ta Huang, Gwoboa Horng, Shiuh-Jeng Wang:
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 517: 128-147 (2020)
2010 – 2019
- 2018
- [j47]Chih-Cheng Chen, Ching-Yen Lee, Gwoboa Horng, Lee-Jang Yang, Ying-Hsuan Huang:
Prediction-Based Reversible Data Hiding Using Energy Deviation Strategy. J. Inf. Hiding Multim. Signal Process. 9(2): 293-302 (2018) - 2016
- [j46]Chao-Liang Liu, Gwoboa Horng, Du-Shiau Tsai:
Speeding up Pairing Computation Using Non-adjacent Form and ELM Method. Int. J. Netw. Secur. 18(1): 108-115 (2016) - [j45]Chih-Cheng Chen, Hanmin Chien, Gwoboa Horng:
Cryptanalysis of a Compact Certificateless Aggregate Signature Scheme. Int. J. Netw. Secur. 18(4): 793-797 (2016) - [j44]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang:
Very efficient variable-length codes for the lossless compression of VQ indices. Multim. Tools Appl. 75(6): 3537-3552 (2016) - 2015
- [j43]Wien Hong, Gwoboa Horng, Chih-Wei Shiu, Tung-Shou Chen, Yu-Chi Chen:
Reversible Steganographic Method Using Complexity Control and Human Visual System. Comput. J. 58(10): 2583-2594 (2015) - [j42]Gwoboa Horng:
Accelerating DSA Signature Generation. Cryptologia 39(2): 121-125 (2015) - [j41]Ying-Hsuan Huang, Chin-Chen Chang, Meng-Chieh Lin, Gwoboa Horng:
Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification. J. Inf. Hiding Multim. Signal Process. 6(4) (2015) - [j40]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Tai-Jung Hsu:
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems. J. Inf. Hiding Multim. Signal Process. 6(5): 956-967 (2015) - [j39]Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, Ruei-Hau Hsu:
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes. J. Inf. Sci. Eng. 31(1): 297-314 (2015) - [j38]Chuan Qin, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen:
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Secur. Commun. Networks 8(6): 899-906 (2015) - [j37]Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, Gwoboa Horng:
Certificateless aggregate signature with efficient verification. Secur. Commun. Networks 8(13): 2232-2243 (2015) - 2014
- [j36]Yu-Chi Chen, Chao-Liang Liu, Gwoboa Horng:
Cryptanalysis of some user identification schemes for distributed computer networks. Int. J. Commun. Syst. 27(11): 2909-2917 (2014) - [j35]Yu-Chi Chen, Gwoboa Horng, Chang-Chin Huang:
Privacy protection in on-line shopping for electronic documents. Inf. Sci. 277: 321-326 (2014) - [j34]Jeanne Chen, Tung-Shou Chen, Wien Hong, Gwoboa Horng, Han-Yan Wu, Chih-Wei Shiu:
A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map. KSII Trans. Internet Inf. Syst. 8(3): 1105-1118 (2014) - [j33]Zhi-Hui Wang, Hai-Rui Yang, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang:
Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks. KSII Trans. Internet Inf. Syst. 8(8): 2913-2929 (2014) - [j32]Gwoboa Horng, Ying-Hsuan Huang, Chin-Chen Chang, Yanjun Liu:
(k, n)-Image Reversible Data Hiding. J. Inf. Hiding Multim. Signal Process. 5(2): 152-164 (2014) - [j31]Yu-Chi Chen, Chih-Wei Shiu, Gwoboa Horng:
Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25(5): 1164-1170 (2014) - [c14]Kuo-Chang Chen, Yu-Chi Chen, Gwoboa Horng, Raylin Tso:
Efficient public key encryption with user-friendly keywords search for searchable cloud storage. ICS 2014: 724-733 - 2013
- [j30]Yu-Chi Chen, Du-shiau Tsai, Gwoboa Horng:
Visual secret sharing with cheating prevention revisited. Digit. Signal Process. 23(5): 1496-1504 (2013) - [j29]Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu:
Strong non-repudiation based on certificateless short signatures. IET Inf. Secur. 7(3): 253-263 (2013) - [j28]Yu-Chi Chen, Raylin Tso, Gwoboa Horng:
Security Analysis of Choi et al.'s Certificateless Short Signature Scheme. J. Inf. Hiding Multim. Signal Process. 4(3): 147-154 (2013) - [j27]Yu-Chi Chen, Gwoboa Horng, Yi-Jheng Lin, Kuo-Chang Chen:
Privacy Preserving Index for Encrypted Electronic Medical Records. J. Medical Syst. 37(6): 9992 (2013) - [c13]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Yung-Ming Hsu:
A high payload data embedding scheme using dual stego-images with reversibility. ICICS 2013: 1-5 - [i4]Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng:
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes. IACR Cryptol. ePrint Arch. 2013: 193 (2013) - 2012
- [j26]Tsung-Chih Hsiao, Zhen Yu Wu, Yu-Fang Chung, Tzer-Shyong Chen, Gwoboa Horng:
A Secure Integrated Medical Information System. J. Medical Syst. 36(5): 3103-3113 (2012) - [j25]Tsung-Chih Hsiao, Yu-Ting Liao, Jen-Yan Huang, Tzer-Shyong Chen, Gwoboa Horng:
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks. J. Medical Syst. 36(6): 3649-3664 (2012) - [j24]Yu-Chi Chen, Du-shiau Tsai, Gwoboa Horng:
A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography. J. Vis. Commun. Image Represent. 23(8): 1225-1233 (2012) - [j23]Yu-Chi Chen, Gwoboa Horng, Du-shiau Tsai:
Comment on "Cheating Prevention in Visual Cryptography". IEEE Trans. Image Process. 21(7): 3319-3323 (2012) - [c12]Tsung-Chih Hsiao, Yu-Ting Liao, Jen-Yan Huang, Tzer-Shyong Chen, Gwoboa Horng:
Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks. AINA Workshops 2012: 502-507 - 2011
- [i3]Yu-Chi Chen, Gwoboa Horng:
On the security models for certificateless signature schemes achieving level 3 security. IACR Cryptol. ePrint Arch. 2011: 554 (2011) - [i2]Yu-Chi Chen, Du-shiau Tsai, Gwoboa Horng:
On the Security of a Cheating Immune Visual Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2011: 631 (2011) - 2010
- [j22]Eric Jui-Lin Lu, Gwoboa Horng, Chia-Ssu Yu, Ling-ying Chou:
Extended Relation Metadata for SCORM-based Learning Content Management Systems. J. Educ. Technol. Soc. 13(1): 220-235 (2010)
2000 – 2009
- 2009
- [j21]Chang-Chin Huang, Du-shiau Tsai, Gwoboa Horng:
A Fast VQ Codebook Generation Algorithm Based on Otsu Histogram Threshold. Fundam. Informaticae 91(3-4): 563-579 (2009) - [j20]Du-shiau Tsai, Gwoboa Horng, Tzungher Chen, Yao-Te Huang:
A novel secret image sharing scheme for true-color images with size constraint. Inf. Sci. 179(19): 3247-3254 (2009) - [c11]Yu-Chi Chen, Gwoboa Horng, Chang-Chin Huang:
Privacy Protection in On-line Shopping for Electronic Documents. IAS 2009: 105-108 - 2008
- [j19]Chao-Liang Liu, Gwoboa Horng, Hsin-Yu Liu:
Computing the modular inverses is as simple as computing the GCDs. Finite Fields Their Appl. 14(1): 65-75 (2008) - [j18]Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang:
Public Key Authentication Schemes for Local Area Networks. Informatica 19(1): 3-16 (2008) - [c10]Chang-Chin Huang, Du-shiau Tsai, Gwoboa Horng:
Efficient Vector Quantization Codebook Generation Based on Histogram Thresholding Algorithm. IIH-MSP 2008: 1141-1145 - 2007
- [j17]Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen:
Further refinement of pairing computation based on Miller's algorithm. Appl. Math. Comput. 189(1): 395-409 (2007) - [j16]Tzungher Chen, Gwoboa Horng:
A lightweight and anonymous copyright-protection protocol. Comput. Stand. Interfaces 29(2): 229-237 (2007) - [j15]Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu:
A Secure YS-Like User Authentication Scheme. Informatica 18(1): 27-36 (2007) - [j14]Du-shiau Tsai, Tzungher Chen, Gwoboa Horng:
A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognit. 40(8): 2356-2366 (2007) - [c9]Eric Jui-Lin Lu, Gwoboa Horng, Chia-Ssu Yu, Ling-ying Chou:
A Web-Based Authoring System Supporting Metadata. CBMS 2007: 645-650 - [c8]Chin-Ling Chen, Chih-Cheng Chen, Ling-Chun Liu, Gwoboa Horng:
A server-aided signature scheme for mobile commerce. IWCMC 2007: 565-570 - 2006
- [j13]Yu-Sheng Chen, Gwoboa Horng, Chao-Liang Liu:
Performance improvement for the GGM-construction of pseudorandom functions. Appl. Math. Comput. 183(1): 486-490 (2006) - [j12]Gwoboa Horng, Tzungher Chen, Du-shiau Tsai:
Cheating in Visual Cryptography. Des. Codes Cryptogr. 38(2): 219-236 (2006) - [c7]Chien-Lung Wang, Gwoboa Horng, Yu-Sheng Chen, Tzung-Pei Hong:
An Efficient Key-Update Scheme for Wireless Sensor Networks. International Conference on Computational Science (1) 2006: 1026-1029 - [c6]Chien-Lung Wang, Tzung-Pei Hong, Gwoboa Horng, Wen-Hung Wang:
A Key Renewal Scheme under the Power Consumption for Wireless Sensor Networks. JCIS 2006 - [c5]Chun-Hua Chen, Gwoboa Horng:
More Robust Private Information. SECRYPT 2006: 297-302 - [i1]Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen:
Further Refinement of Pairing Computation Based on Miller's Algorithm. IACR Cryptol. ePrint Arch. 2006: 106 (2006) - 2005
- [j11]Tzungher Chen, Wei-Bin Lee, Gwoboa Horng:
Remarks on some signature schemes based on factoring and discrete logarithms. Appl. Math. Comput. 169(2): 1070-1075 (2005) - [j10]Chao-Liang Liu, Gwoboa Horng, Hsin-Yu Liu:
Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. IEICE Trans. Commun. 88-B(5): 2171-2172 (2005) - [j9]Tzungher Chen, Gwoboa Horng, Wei-Bin Lee:
A publicly verifiable copyright-proving scheme resistant to malicious attacks. IEEE Trans. Ind. Electron. 52(1): 327-334 (2005) - [c4]Chun-Hua Chen, Chi-Min Lan, Gwoboa Horng:
Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme. ICITA (2) 2005: 580-583 - [c3]Chun-Hua Chen, Chi-Min Lan, Gwoboa Horng:
A practical voting system for small-scale election. ITRE 2005: 322-326 - 2004
- [j8]Tzungher Chen, Wei-Bin Lee, Gwoboa Horng:
Secure SAS-like password authentication schemes. Comput. Stand. Interfaces 27(1): 25-31 (2004) - [c2]Chun-Hua Chen, Gwoboa Horng:
Protecting the Privacy of Users in e-Commerce Environment. CCCT (1) 2004: 63-67 - 2001
- [j7]Gwoboa Horng:
An Efficient and Secure Protocol for Multi-party Key Establishment. Comput. J. 44(5): 463-470 (2001) - [j6]Gwoboa Horng:
A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing. J. Inf. Sci. Eng. 17(6): 959-965 (2001) - 2000
- [j5]Gwoboa Horng:
A Secure Server-Aided RSA Signature Computation Protocol for Smart Cards. J. Inf. Sci. Eng. 16(6): 847-855 (2000)
1990 – 1999
- 1999
- [j4]Gwoboa Horng, Ming-Deh A. Huang:
Solving polynomials by radicals with roots of unity in minimum depth. Math. Comput. 68(226): 881-885 (1999) - 1998
- [j3]Gwoboa Horng:
An Active Attack on Protocols for Server-Aided RSA Signature Computation. Inf. Process. Lett. 65(2): 71-73 (1998) - 1996
- [j2]Gwoboa Horng, Chuan-Sheng Yang:
Key authentication scheme for cryptosystems based on discrete logarithms. Comput. Commun. 19(9-10): 848-850 (1996) - 1995
- [j1]Gwoboa Horng:
Password Authentication Without Using a Password Table. Inf. Process. Lett. 55(5): 247-250 (1995) - 1990
- [c1]Gwoboa Horng, Ming-Deh A. Huang:
Simplifying Nested Radicals and Solving Polynomials by Radicals in Minimum Depth. FOCS 1990: 847-856
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint