
Cheng-Chi Lee
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j120]Chandrashekhar Meshram, Cheng-Chi Lee
, Sarita Gajbhiye Meshram, Akshaykumar Meshram:
OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network. IEEE Access 8: 80063-80073 (2020) - [j119]Chun-Ta Li
, Dong-Her Shih
, Chun-Cheng Wang, Chin-Ling Chen
, Cheng-Chi Lee
:
A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System. IEEE Access 8: 173904-173917 (2020) - [j118]Abhilash Singh
, Vaibhav Kotiyal
, Sandeep Sharma
, Jaiprakash Nagar, Cheng-Chi Lee
:
A Machine Learning Approach to Predict the Average Localization Error With Applications to Wireless Sensor Networks. IEEE Access 8: 208253-208263 (2020) - [j117]Ko-Tsung Chu, Hua-Ting Hsu, Jyh-Jian Sheu, Wei-Pang Yang, Cheng-Chi Lee:
Effective spam filter based on a hybrid method of header checking and content parsing. IET Networks 9(6): 338-347 (2020) - [j116]Chandrashekhar Meshram
, Cheng-Chi Lee
, Abhay S. Ranadive, Chun-Ta Li, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne:
A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int. J. Commun. Syst. 33(7) (2020) - [j115]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Rakesh Jagdish Ramteke, Akshaykumar Meshram:
An Efficient Mobile-Healthcare Emergency Framework. J. Medical Syst. 44(3): 58 (2020) - [j114]Cheng-Chi Lee
:
Security and Privacy in Wireless Sensor Networks: Advances and Challenges. Sensors 20(3): 744 (2020) - [j113]Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem. Soft Comput. 24(9): 6531-6537 (2020)
2010 – 2019
- 2019
- [j112]Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
A novel group ownership transfer protocol for RFID systems. Ad Hoc Networks 91 (2019) - [j111]Cheng-Chi Lee, Shun-der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
Security enhancement on an RFID ownership transfer protocol based on cloud. Future Gener. Comput. Syst. 93: 266-277 (2019) - [j110]Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Shun-Der Chen, Yan-Ming Lai:
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography. Int. J. Electron. Secur. Digit. Forensics 11(1): 96-117 (2019) - [j109]Min-Shiang Hwang, Cheng-Chi Lee
, Shih-Ting Hsu:
An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme. Int. J. Found. Comput. Sci. 30(2): 255-273 (2019) - [j108]Cheng-Chi Lee
, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, Athanasios V. Vasilakos:
A Novel Group Ownership Delegate Protocol for RFID Systems. Inf. Syst. Frontiers 21(5): 1153-1166 (2019) - [j107]Chandrashekhar Meshram, Cheng-Chi Lee
, Sarita Gajbhiye Meshram
, Chun-Ta Li:
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput. 23(16): 6937-6946 (2019) - [j106]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram
, Muhammad Khurram Khan:
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput. 23(24): 13127-13138 (2019) - 2018
- [j105]Chandrashekhar Meshram, Pournima L. Powar
, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram
:
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs. IET Networks 7(6): 363-367 (2018) - [j104]Chandrashekhar Meshram, Sarita Gajbhiye Meshram, Cheng-Chi Lee:
Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle. Int. J. Netw. Secur. 20(3): 568-574 (2018) - [j103]Cheng-Chi Lee
, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai, Jiann-Cherng Shieh:
An improved E-DRM scheme for mobile environments. J. Inf. Secur. Appl. 39: 19-30 (2018) - [j102]Cheng-Chi Lee
, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai:
A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System. Inf. Technol. Control. 47(2): 262-274 (2018) - [j101]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks. J. Inf. Sci. Eng. 34(1): 155-170 (2018) - [j100]Chun-Ta Li, Cheng-Chi Lee
, Chi-Yao Weng, Chien-Ming Chen
:
Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer Peer Netw. Appl. 11(1): 198-208 (2018) - [j99]Chun-Ta Li
, Chin-Ling Chen, Cheng-Chi Lee
, Chi-Yao Weng, Chien-Ming Chen:
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput. 22(8): 2495-2506 (2018) - [c19]Cheng-Chi Lee, Shun-der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud. CSCloud/EdgeCom 2018: 134-139 - [c18]Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee:
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System. IOV 2018: 278-288 - 2017
- [j98]Manoj Kumar Chande, Te-Yu Chen, Cheng-Chi Lee:
An improved multi-signature scheme for specified group of verifiers. Int. J. Electron. Secur. Digit. Forensics 9(2): 180-190 (2017) - [j97]Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang:
A Secure and Efficient One-time Password Authentication Scheme for WSN. Int. J. Netw. Secur. 19(2): 177-181 (2017) - [j96]Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li:
Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys. Int. J. Netw. Secur. 19(3): 340-346 (2017) - [j95]Chandrashekhar Meshram, Yuh-Min Tseng, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP. Informatica 28(3): 471-484 (2017) - [j94]Min-Shiang Hwang, Tsuei-Hung Sun, Cheng-Chi Lee
:
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service. J. Circuits Syst. Comput. 26(5): 1750072:1-1750072:16 (2017) - [j93]Chun-Ta Li
, Tsu-Yang Wu
, Chin-Ling Chen, Cheng-Chi Lee
, Chien-Ming Chen:
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors 17(7): 1482 (2017) - [j92]Chandrashekhar Meshram, Cheng-Chi Lee
, Chun-Ta Li
, Chin-Ling Chen:
A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput. 21(24): 7285-7291 (2017) - [j91]Cheng-Chi Lee
, Yan-Ming Lai, Chi-Tung Chen, Shun-der Chen:
Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 94(3): 1281-1296 (2017) - [c17]Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee
, Chien-Ming Chen:
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems. GPC 2017: 116-126 - [c16]Chun-Ta Li, Cheng-Chi Lee
, Chi-Yao Weng, Tsu-Yang Wu
, Chien-Ming Chen
:
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System". ICISA 2017: 282-289 - 2016
- [j90]Cheng-Chi Lee
, Yan-Ming Lai, Pu-Jen Cheng:
An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration. IEEE Intell. Syst. 31(6): 35-43 (2016) - [j89]Cheng-Chi Lee
, Chun-Ta Li
, Chin-Ling Chen, Shih-Ting Chiu:
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services. Inf. Technol. Control. 45(3): 289-299 (2016) - [j88]Manoj Kumar Chande, Cheng-Chi Lee
, Chun-Ta Li:
A CAE Scheme Using ECC Based Self Certified PKC. J. Comput. Sci. 12(11): 527-533 (2016) - [j87]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng:
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System. J. Medical Syst. 40(5): 117:1-117:15 (2016) - [j86]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng, Song-Jhih Chen:
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems. J. Medical Syst. 40(11): 233:1-233:10 (2016) - [j85]Manoj Kumar Chande, Cheng-Chi Lee
, Chun-Ta Li
:
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem. Parallel Process. Lett. 26(4): 1650018:1-1650018:10 (2016) - [j84]Cheng-Chi Lee
, Chun-Ta Li
, Shih-Ting Chiu, Shun-der Chen:
Time-bound key-aggregate encryption for cloud storage. Secur. Commun. Networks 9(13): 2059-2069 (2016) - 2015
- [j83]Cheng-Chi Lee
, Yan-Ming Lai:
Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks. Comput. J. 58(4): 934-943 (2015) - [j82]Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li:
Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol. Int. J. Netw. Secur. 17(1): 1-6 (2015) - [j81]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. J. Inf. Sci. Eng. 31(6): 1975-1992 (2015) - [j80]Chun-Ta Li
, Chi-Yao Weng, Cheng-Chi Lee
:
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System. J. Medical Syst. 39(8): 77 (2015) - [j79]Omid Mir, Theo P. van der Weide, Cheng-Chi Lee
:
A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems. J. Medical Syst. 39(9): 89:1-89:16 (2015) - [j78]Chun-Ta Li
, Chi-Yao Weng, Cheng-Chi Lee
, Chun-Cheng Wang:
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System. J. Medical Syst. 39(11): 144:1-144:11 (2015) - [j77]Debiao He
, Neeraj Kumar
, Jianhua Chen, Cheng-Chi Lee
, Naveen K. Chilamkurti, Seng-Soo Yeo:
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multim. Syst. 21(1): 49-60 (2015) - [j76]Chi-Tung Chen, Cheng-Chi Lee
:
A two-factor authentication scheme with anonymity for multi-server environments. Secur. Commun. Networks 8(8): 1608-1625 (2015) - [j75]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng:
A dynamic identity-based user authentication scheme for remote login systems. Secur. Commun. Networks 8(18): 3372-3382 (2015) - [c15]Chun-Ta Li
, Chi-Yao Weng, Cheng-Chi Lee
, Chun-Cheng Wang:
Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS. ANT/SEIT 2015: 21-28 - [c14]Chun-Ta Li
, Cheng-Chi Lee
, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen:
Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments. ICA3PP (Workshops and Symposiums) 2015: 435-444 - [c13]Chun-Ta Li
, Cheng-Chi Lee
, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang:
Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. ICOIN 2015: 498-502 - [c12]Jiann-Cherng Shieh, Cheng-Chi Lee
, Shu-Yu Lee:
A Dynamic Key Aggregate Cryptosystem in Cloud Environment. IIAI-AAI 2015: 73-78 - [c11]Cheng-Chi Lee
, Yan-Ming Lai, Pu-Jen Cheng
:
An efficient multiple session key establishment scheme for VANET group integration. Intelligent Vehicles Symposium 2015: 1316-1321 - 2014
- [j74]Min-Shiang Hwang, Cheng-Chi Lee
, Tsuei-Hung Sun:
Data error locations reported by public auditing in cloud storage service. Autom. Softw. Eng. 21(3): 373-390 (2014) - [j73]Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee
:
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme. Inf. Technol. Control. 43(3): 277-288 (2014) - [j72]Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu:
A Novel Frequency Billing Service in Digital Television System. J. Inf. Hiding Multim. Signal Process. 5(3): 439-450 (2014) - [j71]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng:
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(9): 77 (2014) - [j70]Cheng-Chi Lee
, Chi-Tung Chen, Chun-Ta Li
, Ping-Hsien Wu:
A practical RFID authentication mechanism for digital television. Telecommun. Syst. 57(3): 239-246 (2014) - [j69]Chin-Ling Chen, Yu-Yi Chen, Cheng-Chi Lee
, Cheng-Hsun Wu:
Design and analysis of a secure and effective emergency system for mountaineering events. J. Supercomput. 70(1): 54-74 (2014) - [j68]Cheng-Chi Lee
, Hong-Hao Chen, Hung-Ting Liu, Guo-Wei Chen, Chwei-Shyong Tsai:
A new visual cryptography with multi-level encoding. J. Vis. Lang. Comput. 25(3): 243-250 (2014) - 2013
- [j67]Li-Chin Huang, Cheng-Chi Lee, Min-Shiang Hwang:
A n2+n MQV key agreement protocol. Int. Arab J. Inf. Technol. 10(2): 137-142 (2013) - [j66]Cheng-Chi Lee
, Chi-Tung Chen, Ping-Hsien Wu, Te-Yu Chen:
Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices. IET Comput. Digit. Tech. 7(1): 48-56 (2013) - [j65]Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang:
Guessing Attacks on Strong-Password Authentication Protocol. Int. J. Netw. Secur. 15(1): 64-67 (2013) - [j64]Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang:
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. Int. J. Netw. Secur. 15(4): 231-240 (2013) - [j63]Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang:
A Study of Conjunctive Keyword Searchable Schemes. Int. J. Netw. Secur. 15(5): 321-330 (2013) - [j62]Cheng-Chi Lee
:
A simple key agreement scheme based on chaotic maps for VSAT satellite communications. Int. J. Satell. Commun. Netw. 31(4): 177-186 (2013) - [j61]Min-Shiang Hwang, Cheng-Chi Lee
, Shiang-Feng Tzeng:
A new proxy signature scheme for a specified group of verifiers. Inf. Sci. 227: 102-115 (2013) - [j60]Cheng-Chi Lee
, Yan-Ming Lai, Chin-Sung Hsiao:
Cryptanalysis of a simple key assignment for access control based on polynomial. J. Inf. Secur. Appl. 18(4): 215-218 (2013) - [j59]Cheng-Chi Lee
, Yan-Ming Lai, Chin-Ling Chen, Lung Albert Chen:
A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing. Inf. Technol. Control. 42(3): 247-252 (2013) - [j58]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Trans. Internet Inf. Syst. 7(1): 119-131 (2013) - [j57]Cheng-Chi Lee
, Chun-Ta Li
, Rui-Xiang Chang:
An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol. J. Comput. Methods Sci. Eng. 13(5-6): 455-460 (2013) - [j56]Cheng-Chi Lee
, Che-Wei Hsu, Yan-Ming Lai, Athanasios V. Vasilakos:
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps. J. Medical Syst. 37(5): 9973 (2013) - [j55]Song-Kong Chong, Cheng-Chi Lee
, Min-Shiang Hwang:
An Authentication Scheme for the Global Mobility Network. Parallel Process. Lett. 23(3) (2013) - [j54]Chun-Ta Li
, Chi-Yao Weng, Cheng-Chi Lee
:
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks. Sensors 13(8): 9589-9603 (2013) - [j53]Te-Yu Chen, Cheng-Chi Lee
, Min-Shiang Hwang, Jinn-Ke Jan:
Towards secure and efficient user authentication scheme using smart card for multi-server environments. J. Supercomput. 66(2): 1008-1032 (2013) - [j52]Cheng-Chi Lee
, Yan-Ming Lai:
Toward a secure batch verification with group testing for VANET. Wirel. Networks 19(6): 1441-1449 (2013) - [j51]Cheng-Chi Lee
, Chin-Ling Chen, Hsia-Hung Ou, Lung Albert Chen:
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol. Wirel. Pers. Commun. 68(3): 861-872 (2013) - [c10]Cheng-Chi Lee
, Chun-Ta Li
, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu:
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards. CSS 2013: 338-348 - 2012
- [j50]Chin-Ling Chen, Cheng-Chi Lee
, Chao-Yung Hsu:
Mobile device integration of a fingerprint biometric remote authentication scheme. Int. J. Commun. Syst. 25(5): 585-597 (2012) - [j49]Cheng-Chi Lee
, Chun-Ta Li
, Rui-Xiang Chang:
A simple and efficient authentication scheme for mobile satellite communication systems. Int. J. Satell. Commun. Netw. 30(1): 29-38 (2012) - [j48]Cheng-Chi Lee
, Rui-Xiang Chang, Te-Yu Chen, Lung Albert Chen:
An Improved Delegation-Based Authentication Protocol for PCSs. Inf. Technol. Control. 41(3): 258-267 (2012) - [j47]Chun-Ta Li
, Cheng-Chi Lee
:
A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1-2): 35-44 (2012) - [j46]Chin-Ling Chen, Cheng-Chi Lee
, Yuh-Min Tseng, Teng-Tai Chou:
A private online system for executing wills based on a secret sharing mechanism. Secur. Commun. Networks 5(7): 725-737 (2012) - [j45]Cheng-Chi Lee
, Tsung-Hung Lin, Chwei-Shyong Tsai:
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications. Secur. Commun. Networks 5(12): 1375-1378 (2012) - 2011
- [j44]Cheng-Chi Lee
, Tsung-Hung Lin, Rui-Xiang Chang:
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Syst. Appl. 38(11): 13863-13870 (2011) - [j43]Cheng-Chi Lee
, Min-Shiang Hwang, I-En Liao:
On the Security of Self-Certified Public Keys. Int. J. Inf. Secur. Priv. 5(2): 54-60 (2011) - [j42]Chi-Yu Liu, Cheng-Chi Lee, Tzu-Chun Lin:
Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme. Int. J. Netw. Secur. 12(1): 58-60 (2011) - [j41]Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin:
A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy. Int. J. Netw. Secur. 12(3): 178-180 (2011) - [j40]Chun-Ta Li
, Cheng-Chi Lee
:
A Robust Remote User Authentication Scheme Using Smart Card. Inf. Technol. Control. 40(3): 236-245 (2011) - [j39]Cheng-Chi Lee
, Chun-Ta Li
, Kuo-You Huang, Shiow-Yuan Huang:
An Improvement of Remote Authentication and Key Agreement Schemes. J. Circuits Syst. Comput. 20(4): 697-707 (2011) - [j38]Shiow-Yuan Huang, Cheng-Chan Hung, Cheng-Chi Lee:
A Practical U-Healthcare Network with Security and QoS. J. Digit. Inf. Manag. 9(2): 87-94 (2011) - [j37]Cheng-Chi Lee
, Chun-Ta Li
, Shun-der Chen:
Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks. Parallel Process. Lett. 21(1): 21-26 (2011) - [j36]Shiang-Feng Tzeng, Cheng-Chi Lee
, Min-Shiang Hwang:
A Batch Verification for Multiple Proxy Signature. Parallel Process. Lett. 21(1): 77-84 (2011) - [j35]Cheng-Chi Lee
, I-En Liao, Min-Shiang Hwang:
An efficient authentication protocol for mobile communications. Telecommun. Syst. 46(1): 31-41 (2011) - [c9]Chun-Ta Li
, Cheng-Chi Lee
, Chen-Ju Liu, Chin-Wen Lee:
A Robust Remote User Authentication Scheme against Smart Card Security Breach. DBSec 2011: 231-238 - 2010
- [j34]Tsung-Hung Lin, Cheng-Chi Lee
, Chwei-Shyong Tsai, Shin-Dong Guo:
A tabular steganography scheme for graphical password authentication. Comput. Sci. Inf. Syst. 7(4): 823-841 (2010) - [j33]Cheng-Chi Lee
, Rui-Xiang Chang, Hsien-Ju Ko:
Improving Two Novel Three-Party Encrypted Key Exchange Protocols with Perfect Forward Secrecy. Int. J. Found. Comput. Sci. 21(6): 979-991 (2010) - [j32]Cheng-Chi Lee, Ting-Yao Cheng, Te-Yu Chen:
Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings. J. Digit. Inf. Manag. 8(5): 298-303 (2010) - [c8]Chun-Ta Li
, Cheng-Chi Lee, Lian-Jun Wang:
On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs. ICCSA (1) 2010: 599-609 - [c7]Cheng-Chi Lee
, Chin-Ling Chen:
Authenticated Multiple Keys Exchange Protocol Based on Bilinear Pairings. ICEE 2010: 1303-1306 - [c6]Cheng-Chi Lee
, Chin-Ling Chen, Chun-Ta Li
, Rui-Xiang Chang:
On security of a more efficient and secure dynamic ID-based remote user authentication scheme. ISDA 2010: 1371-1375 - [c5]Chun-Ta Li
, Chen-Ju Liu, Cheng-Chi Lee
, Chin-Wen Lee:
Cryptanalysis of Khan et al.'s dynamic ID-based remote user authentication scheme. ISDA 2010: 1382-1387 - [c4]Chin-Ling Chen, I-Hsien Lin, Cheng-Chi Lee
, Yung-Fa Huang
:
A spare two-tier data aggregation for grid-based wireless sensor networks. IWCMC 2010: 1203-1207
2000 – 2009
- 2009
- [j31]Cheng-Chi Lee
, Tsung-Hung Lin, Chwei-Shyong Tsai:
A new authenticated group key agreement in a mobile environment. Ann. des Télécommunications 64(11-12): 735-744 (2009) - [j30]Cheng-Chi Lee
, W.-H. Ku, S.-Y. Huang:
A new steganographic scheme based on vector quantisation and search-order coding. IET Image Process. 3(4): 243-248 (2009) - [j29]Cheng-Chi Lee
, Min-Shiang Hwang, Shiang-Feng Tzeng:
A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. Int. J. Found. Comput. Sci. 20(2): 351-359 (2009) - [j28]Cheng-Chi Lee:
On Security of An Efficient Nonce-based Authentication Scheme for SIP. Int. J. Netw. Secur. 9(3): 201-203 (2009) - [j27]Cheng-Chi Lee
, Min-Shiang Hwang, Chih-Wei Lin:
A new English auction scheme using the bulletin board system. Inf. Manag. Comput. Secur. 17(5): 408-417 (2009) - [j26]Cheng-Chi Lee
, Pi-Fang Ho, Min-Shiang Hwang:
A secure e-auction scheme based on group signatures. Inf. Syst. Frontiers 11(3): 335-343 (2009) - [j25]Cheng-Chi Lee, Chu-Chi Yang, Shiow-Yuan Huang:
A New Authentication Scheme for Session Initiation Protocol. J. Digit. Inf. Manag. 7(3): 133-142 (2009) - [c3]Hong-Hao Chen, Cheng-Chi Lee
, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai:
Multi-level visual secret sharing scheme with smooth-looking. Int. Conf. Interaction Sciences 2009: 155-160 - 2008
- [j24]Min-Shiang Hwang, Cheng-Chi Lee
, Song-Kong Chong:
An improved address ownership in mobile IPv6. Comput. Commun. 31(14): 3250-3252 (2008) - [j23]Cheng-Chi Lee
, Min-Shiang Hwang, I-En Liao:
A new authentication protocol based on pointer forwarding for mobile communications. Wirel. Commun. Mob. Comput. 8(5): 661-672 (2008) - 2006
- [j22]Feng Bao, Cheng-Chi Lee
, Min-Shiang Hwang:
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Appl. Math. Comput. 172(2): 1195-1200 (2006) - [j21]Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang:
Password Authentication Schemes: Current Status and Key Issues. Int. J. Netw. Secur. 3(2): 101-115 (2006) - [j20]I-En Liao, Cheng-Chi Lee
, Min-Shiang Hwang:
A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4): 727-740 (2006) - [j19]Cheng-Chi Lee
, Min-Shiang Hwang, I-En Liao:
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments. IEEE Trans. Ind. Electron. 53(5): 1683-1687 (2006) - [c2]