default search action
Cheng-Chi Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j152]Dushyant Kumar Yadav, Hemlal Sahu, Dharminder Chaudhary, Cheng-Chi Lee:
Module lattice based post quantum secure blockchain empowered vehicle to vehicle communication in the internet of vehicles. Comput. Electr. Eng. 117: 109245 (2024) - [j151]Jothi Ramalingam, Satyabrat Rath, Lakshmi Kuppusamy, Cheng-Chi Lee:
Accelerating QKD post-processing by secure offloading of information reconciliation. Comput. Electr. Eng. 120: 109721 (2024) - [j150]Dharminder Chaudhary, Cheng-Chi Lee:
Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones. Comput. Electr. Eng. 120: 109774 (2024) - 2023
- [j149]Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Ting-Yi Chang, Cheng-Chi Lee, Dinh-Thuan Do:
An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks. IEEE Access 11: 1306-1323 (2023) - [j148]Abhilash Singh, Kumar Gaurav, Gaurav Kailash Sonkar, Cheng-Chi Lee:
Strategies to Measure Soil Moisture Using Traditional Methods, Automated Sensors, Remote Sensing, and Machine Learning Techniques: Review, Bibliometric Analysis, Applications, Research Findings, and Future Directions. IEEE Access 11: 13605-13635 (2023) - [j147]Chandrasen Pandey, Vaibhav Tiwari, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee, Diptendu Sinha Roy:
5GT-GAN: Enhancing Data Augmentation for 5G-Enabled Mobile Edge Computing in Smart Cities. IEEE Access 11: 120983-120996 (2023) - [j146]Cheng-Chi Lee, Mehdi Gheisari, Mohammad Javad Shayegan, Milad Taleby Ahvanooey, Yang Liu:
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things. Cryptogr. 7(4): 51 (2023) - [j145]Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, Chun-Ta Li:
Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme. Future Internet 15(3): 99 (2023) - [j144]Agbotiname Lucky Imoize, Friday Udeji, Joseph Isabona, Cheng-Chi Lee:
Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment. Future Internet 15(5): 181 (2023) - [j143]Joseph Isabona, Agbotiname Lucky Imoize, Oluwasayo Akinloye Akinwumi, Okiemute Roberts Omasheye, Emughedi Oghu, Cheng-Chi Lee, Chun-Ta Li:
Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms. Inf. 14(11): 621 (2023) - [j142]Priyansi Parida, Chittaranjan Pradhan, Jafar Ahmad Abed Alzubi, Amir Javadpour, Mehdi Gheisari, Yang Liu, Cheng-Chi Lee:
Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network. Multim. Tools Appl. 82(22): 33637-33662 (2023) - [d1]Abhilash Singh, Vaibhav Kotiyal, Sandeep Sharma, Jaiprakash Nagar, Cheng-Chi Lee:
Average Localization Error (ALE) in sensor node localization process in WSNs. UCI Machine Learning Repository, 2023 - 2022
- [j141]Vivek Arya, Hemant Choubey, Sandeep Sharma, Te-Yu Chen, Cheng-Chi Lee:
Image Enhancement and Features Extraction of Electron Microscopic Images Using Sigmoid Function and 2D-DCT. IEEE Access 10: 76742-76751 (2022) - [j140]Shaheena Khatoon, Te-Yu Chen, Cheng-Chi Lee:
An improved user authentication and key agreement scheme for roaming service in ubiquitous network. Ann. des Télécommunications 77(9): 621-640 (2022) - [j139]Mehdi Gheisari, Mahdi Safaei Yaraziz, Jafar Ahmad Abed Alzubi, Christian Fernández-Campusano, Mohammad Reza Feylizadeh, Saied Pirasteh, Aaqif Afzaal Abbasi, Yang Liu, Cheng-Chi Lee:
An efficient cluster head selection for wireless sensor network-based smart agriculture systems. Comput. Electron. Agric. 198: 107105 (2022) - [j138]Rasheed Gbenga Jimoh, Olayinka Olufunmilayo Olusanya, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize, Cheng-Chi Lee:
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases. Future Internet 14(11): 305 (2022) - [j137]Okiemute Roberts Omasheye, Samuel Azi, Joseph Isabona, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee:
Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks. Future Internet 14(12): 373 (2022) - [j136]Yuvaraj Natarajan, Kannan Srihari, Gaurav Dhiman, Selvaraj Chandragandhi, Mehdi Gheisari, Yang Liu, Cheng-Chi Lee, Krishna Kant Singh, Kusum Yadav, Hadeel Fahad Alharbi:
An IoT and machine learning-based routing protocol for reconfigurable engineering application. IET Commun. 16(5): 464-475 (2022) - [j135]Joseph Isabona, Agbotiname Lucky Imoize, Stephen Ojo, Cheng-Chi Lee, Chun-Ta Li:
Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate. Inf. 13(3): 141 (2022) - [j134]Parkash Tambare, Chandrashekhar Meshram, Cheng-Chi Lee, Rakesh Jagdish Ramteke, Agbotiname Lucky Imoize:
Performance Measurement System and Quality Management in Data-Driven Industry 4.0: A Review. Sensors 22(1): 224 (2022) - [j133]Abhilash Singh, J. Amutha, Jaiprakash Nagar, Sandeep Sharma, Cheng-Chi Lee:
LT-FS-ID: Log-Transformed Feature Learning and Feature-Scaling-Based Machine Learning Algorithms to Predict the k-Barriers for Intrusion Detection Using Wireless Sensor Network. Sensors 22(3): 1070 (2022) - [j132]Umesh Kumar Lilhore, Agbotiname Lucky Imoize, Chun-Ta Li, Sarita Simaiya, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar Rana, Cheng-Chi Lee:
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities. Sensors 22(8): 2908 (2022) - [j131]Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng, Agbotiname Lucky Imoize:
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications. Sensors 22(23): 9534 (2022) - 2021
- [j130]Vishesh P. Gaikwad, Jitendra V. Tembhurne, Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li:
An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS. IEEE Access 9: 108586-108600 (2021) - [j129]Chi-Yao Weng, Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng:
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services. IEEE Access 9: 145522-145537 (2021) - [j128]K. S. Suvidha, Jothi Rangasamy, Shyam S. Kamath, Cheng-Chi Lee:
ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks. Cryptogr. 5(4): 35 (2021) - [j127]Yong-Yi Fanjiang, Cheng-Chi Lee, Yan-Ta Du, Shi-Jinn Horng:
Palm Vein Recognition Based on Convolutional Neural Network. Informatica 32(4): 687-708 (2021) - [j126]Vaibhav Kotiyal, Abhilash Singh, Sandeep Sharma, Jaiprakash Nagar, Cheng-Chi Lee:
ECS-NL: An Enhanced Cuckoo Search Algorithm for Node Localisation in Wireless Sensor Networks. Sensors 21(11): 3576 (2021) - [j125]Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle. IEEE Syst. J. 15(4): 4927-4938 (2021) - [j124]Vishesh P. Gaikwad, Jitendra V. Tembhurne, Chandrashekhar Meshram, Cheng-Chi Lee:
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function. J. Supercomput. 77(8): 8281-8304 (2021) - [c21]Cheng-Chi Lee, Chung-Wei Li, Chun-Ta Li, Chin-Ling Chen:
E-book Circulation System Based on Blockchain. CSCI 2021: 615-619 - 2020
- [j123]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Akshaykumar Meshram:
OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network. IEEE Access 8: 80063-80073 (2020) - [j122]Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, Chin-Ling Chen, Cheng-Chi Lee:
A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System. IEEE Access 8: 173904-173917 (2020) - [j121]Abhilash Singh, Vaibhav Kotiyal, Sandeep Sharma, Jaiprakash Nagar, Cheng-Chi Lee:
A Machine Learning Approach to Predict the Average Localization Error With Applications to Wireless Sensor Networks. IEEE Access 8: 208253-208263 (2020) - [j120]Ko-Tsung Chu, Hua-Ting Hsu, Jyh-Jian Sheu, Wei-Pang Yang, Cheng-Chi Lee:
Effective spam filter based on a hybrid method of header checking and content parsing. IET Networks 9(6): 338-347 (2020) - [j119]Chandrashekhar Meshram, Cheng-Chi Lee, Abhay S. Ranadive, Chun-Ta Li, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne:
A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int. J. Commun. Syst. 33(7) (2020) - [j118]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Rakesh Jagdish Ramteke, Akshaykumar Meshram:
An Efficient Mobile-Healthcare Emergency Framework. J. Medical Syst. 44(3): 58 (2020) - [j117]Cheng-Chi Lee:
Security and Privacy in Wireless Sensor Networks: Advances and Challenges. Sensors 20(3): 744 (2020) - [j116]Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem. Soft Comput. 24(9): 6531-6537 (2020)
2010 – 2019
- 2019
- [j115]Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
A novel group ownership transfer protocol for RFID systems. Ad Hoc Networks 91 (2019) - [j114]Cheng-Chi Lee, Shun-der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
Security enhancement on an RFID ownership transfer protocol based on cloud. Future Gener. Comput. Syst. 93: 266-277 (2019) - [j113]Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Shun-Der Chen, Yan-Ming Lai:
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography. Int. J. Electron. Secur. Digit. Forensics 11(1): 96-117 (2019) - [j112]Min-Shiang Hwang, Cheng-Chi Lee, Shih-Ting Hsu:
An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme. Int. J. Found. Comput. Sci. 30(2): 255-273 (2019) - [j111]Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, Athanasios V. Vasilakos:
A Novel Group Ownership Delegate Protocol for RFID Systems. Inf. Syst. Frontiers 21(5): 1153-1166 (2019) - [j110]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Chun-Ta Li:
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput. 23(16): 6937-6946 (2019) - [j109]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Muhammad Khurram Khan:
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput. 23(24): 13127-13138 (2019) - 2018
- [j108]Chandrashekhar Meshram, Pournima L. Powar, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs. IET Networks 7(6): 363-367 (2018) - [j107]Chandrashekhar Meshram, Sarita Gajbhiye Meshram, Cheng-Chi Lee:
Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle. Int. J. Netw. Secur. 20(3): 568-574 (2018) - [j106]Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai, Jiann-Cherng Shieh:
An improved E-DRM scheme for mobile environments. J. Inf. Secur. Appl. 39: 19-30 (2018) - [j105]Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai:
A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System. Inf. Technol. Control. 47(2): 262-274 (2018) - [j104]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks. J. Inf. Sci. Eng. 34(1): 155-170 (2018) - [j103]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen:
Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw. Appl. 11(1): 198-208 (2018) - [j102]Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen:
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput. 22(8): 2495-2506 (2018) - [c20]Cheng-Chi Lee, Shun-der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud. CSCloud/EdgeCom 2018: 134-139 - [c19]Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee:
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System. IOV 2018: 278-288 - 2017
- [j101]Manoj Kumar Chande, Te-Yu Chen, Cheng-Chi Lee:
An improved multi-signature scheme for specified group of verifiers. Int. J. Electron. Secur. Digit. Forensics 9(2): 180-190 (2017) - [j100]Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang:
A Secure and Efficient One-time Password Authentication Scheme for WSN. Int. J. Netw. Secur. 19(2): 177-181 (2017) - [j99]Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li:
Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys. Int. J. Netw. Secur. 19(3): 340-346 (2017) - [j98]Chandrashekhar Meshram, Yuh-Min Tseng, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP. Informatica 28(3): 471-484 (2017) - [j97]Min-Shiang Hwang, Tsuei-Hung Sun, Cheng-Chi Lee:
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service. J. Circuits Syst. Comput. 26(5): 1750072:1-1750072:16 (2017) - [j96]Chun-Ta Li, Tsu-Yang Wu, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen:
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors 17(7): 1482 (2017) - [j95]Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen:
A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput. 21(24): 7285-7291 (2017) - [j94]Cheng-Chi Lee, Yan-Ming Lai, Chi-Tung Chen, Shun-der Chen:
Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 94(3): 1281-1296 (2017) - [c18]Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen:
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems. GPC 2017: 116-126 - [c17]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen:
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System". ICISA 2017: 282-289 - 2016
- [j93]Cheng-Chi Lee, Yan-Ming Lai, Pu-Jen Cheng:
An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration. IEEE Intell. Syst. 31(6): 35-43 (2016) - [j92]Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Shih-Ting Chiu:
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services. Inf. Technol. Control. 45(3): 289-299 (2016) - [j91]Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li:
A CAE Scheme Using ECC Based Self Certified PKC. J. Comput. Sci. 12(11): 527-533 (2016) - [j90]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System. J. Medical Syst. 40(5): 117:1-117:15 (2016) - [j89]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Song-Jhih Chen:
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems. J. Medical Syst. 40(11): 233:1-233:10 (2016) - [j88]Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li:
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem. Parallel Process. Lett. 26(4): 1650018:1-1650018:10 (2016) - [j87]Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-der Chen:
Time-bound key-aggregate encryption for cloud storage. Secur. Commun. Networks 9(13): 2059-2069 (2016) - [c16]Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li:
Cryptanalysis of Dimitriou's Key Evolving RFID Systems. ICNCC 2016: 229-233 - 2015
- [j86]Cheng-Chi Lee, Yan-Ming Lai:
Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks. Comput. J. 58(4): 934-943 (2015) - [j85]Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li:
Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol. Int. J. Netw. Secur. 17(1): 1-6 (2015) - [j84]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. J. Inf. Sci. Eng. 31(6): 1975-1992 (2015) - [j83]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee:
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System. J. Medical Syst. 39(8): 77 (2015) - [j82]Omid Mir, Theo P. van der Weide, Cheng-Chi Lee:
A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems. J. Medical Syst. 39(9): 89:1-89:16 (2015) - [j81]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang:
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System. J. Medical Syst. 39(11): 144:1-144:11 (2015) - [j80]Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen K. Chilamkurti, Seng-Soo Yeo:
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multim. Syst. 21(1): 49-60 (2015) - [j79]Chi-Tung Chen, Cheng-Chi Lee:
A two-factor authentication scheme with anonymity for multi-server environments. Secur. Commun. Networks 8(8): 1608-1625 (2015) - [j78]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A dynamic identity-based user authentication scheme for remote login systems. Secur. Commun. Networks 8(18): 3372-3382 (2015) - [c15]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang:
Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS. ANT/SEIT 2015: 21-28 - [c14]Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen:
Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments. ICA3PP (Workshops and Symposiums) 2015: 435-444 - [c13]Chun-Ta Li, Cheng-Chi Lee, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang:
Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. ICOIN 2015: 498-502 - [c12]Jiann-Cherng Shieh, Cheng-Chi Lee, Shu-Yu Lee:
A Dynamic Key Aggregate Cryptosystem in Cloud Environment. IIAI-AAI 2015: 73-78 - [c11]Cheng-Chi Lee, Yan-Ming Lai, Pu-Jen Cheng:
An efficient multiple session key establishment scheme for VANET group integration. Intelligent Vehicles Symposium 2015: 1316-1321 - 2014
- [j77]Min-Shiang Hwang, Cheng-Chi Lee, Tsuei-Hung Sun:
Data error locations reported by public auditing in cloud storage service. Autom. Softw. Eng. 21(3): 373-390 (2014) - [j76]Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee:
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme. Inf. Technol. Control. 43(3): 277-288 (2014) - [j75]Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu:
A Novel Frequency Billing Service in Digital Television System. J. Inf. Hiding Multim. Signal Process. 5(3): 439-450 (2014) - [j74]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(9): 77 (2014) - [j73]Cheng-Chi Lee, Chi-Tung Chen, Chun-Ta Li, Ping-Hsien Wu:
A practical RFID authentication mechanism for digital television. Telecommun. Syst. 57(3): 239-246 (2014) - [j72]Chin-Ling Chen, Yu-Yi Chen, Cheng-Chi Lee, Cheng-Hsun Wu:
Design and analysis of a secure and effective emergency system for mountaineering events. J. Supercomput. 70(1): 54-74 (2014) - [j71]Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu, Guo-Wei Chen, Chwei-Shyong Tsai:
A new visual cryptography with multi-level encoding. J. Vis. Lang. Comput. 25(3): 243-250 (2014) - 2013
- [j70]Li-Chin Huang, Cheng-Chi Lee, Min-Shiang Hwang:
A n2+n MQV key agreement protocol. Int. Arab J. Inf. Technol. 10(2): 137-142 (2013) - [j69]Cheng-Chi Lee, Chi-Tung Chen, Ping-Hsien Wu, Te-Yu Chen:
Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices. IET Comput. Digit. Tech. 7(1): 48-56 (2013) - [j68]Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang:
Guessing Attacks on Strong-Password Authentication Protocol. Int. J. Netw. Secur. 15(1): 64-67 (2013) - [j67]Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang:
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. Int. J. Netw. Secur. 15(4): 231-240 (2013) - [j66]Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang:
A Study of Conjunctive Keyword Searchable Schemes. Int. J. Netw. Secur. 15(5): 321-330 (2013) - [j65]Cheng-Chi Lee:
A simple key agreement scheme based on chaotic maps for VSAT satellite communications. Int. J. Satell. Commun. Netw. 31(4): 177-186 (2013) - [j64]Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng:
A new proxy signature scheme for a specified group of verifiers. Inf. Sci. 227: 102-115 (2013) - [j63]Cheng-Chi Lee, Yan-Ming Lai, Chin-Sung Hsiao:
Cryptanalysis of a simple key assignment for access control based on polynomial. J. Inf. Secur. Appl. 18(4): 215-218 (2013) - [j62]Cheng-Chi Lee, Yan-Ming Lai, Chin-Ling Chen, Lung Albert Chen:
A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing. Inf. Technol. Control. 42(3): 247-252 (2013) - [j61]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Trans. Internet Inf. Syst. 7(1): 119-131 (2013) - [j60]Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang:
An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol. J. Comput. Methods Sci. Eng. 13(5-6): 455-460 (2013) - [j59]Cheng-Chi Lee, Che-Wei Hsu, Yan-Ming Lai, Athanasios V. Vasilakos:
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps. J. Medical Syst. 37(5): 9973 (2013) - [j58]Song-Kong Chong, Cheng-Chi Lee, Min-Shiang Hwang:
An Authentication Scheme for the Global Mobility Network. Parallel Process. Lett. 23(3) (2013) - [j57]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee:
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks. Sensors 13(8): 9589-9603 (2013) - [j56]Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan:
Towards secure and efficient user authentication scheme using smart card for multi-server environments. J. Supercomput. 66(2): 1008-1032 (2013) - [j55]Cheng-Chi Lee, Yan-Ming Lai:
Toward a secure batch verification with group testing for VANET. Wirel. Networks 19(6): 1441-1449 (2013) - [j54]Cheng-Chi Lee, Chin-Ling Chen, Hsia-Hung Ou, Lung Albert Chen:
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol. Wirel. Pers. Commun. 68(3): 861-872 (2013) - [c10]Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu:
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards. CSS 2013: 338-348 - 2012
- [j53]Chin-Ling Chen, Cheng-Chi Lee, Chao-Yung Hsu:
Mobile device integration of a fingerprint biometric remote authentication scheme. Int. J. Commun. Syst. 25(5): 585-597 (2012) - [j52]Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang:
A simple and efficient authentication scheme for mobile satellite communication systems. Int. J. Satell. Commun. Netw. 30(1): 29-38 (2012) - [j51]Cheng-Chi Lee, Rui-Xiang Chang, Te-Yu Chen, Lung Albert Chen:
An Improved Delegation-Based Authentication Protocol for PCSs. Inf. Technol. Control. 41(3): 258-267 (2012) - [j50]Chun-Ta Li, Cheng-Chi Lee:
A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1-2): 35-44 (2012) - [j49]Chin-Ling Chen, Cheng-Chi Lee, Yuh-Min Tseng, Teng-Tai Chou:
A private online system for executing wills based on a secret sharing mechanism. Secur. Commun. Networks 5(7): 725-737 (2012) - [j48]Cheng-Chi Lee, Tsung-Hung Lin, Chwei-Shyong Tsai:
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications. Secur. Commun. Networks 5(12): 1375-1378 (2012) - 2011
- [j47]Cheng-Chi Lee, Tsung-Hung Lin, Rui-Xiang Chang:
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Syst. Appl. 38(11): 13863-13870 (2011) - [j46]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
On the Security of Self-Certified Public Keys. Int. J. Inf. Secur. Priv. 5(2): 54-60 (2011) - [j45]Chi-Yu Liu, Cheng-Chi Lee, Tzu-Chun Lin:
Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme. Int. J. Netw. Secur. 12(1): 58-60 (2011) - [j44]Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin:
A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy. Int. J. Netw. Secur. 12(3): 178-180 (2011) - [j43]Chun-Ta Li, Cheng-Chi Lee:
A Robust Remote User Authentication Scheme Using Smart Card. Inf. Technol. Control. 40(3): 236-245 (2011) - [j42]Cheng-Chi Lee, Chun-Ta Li, Kuo-You Huang, Shiow-Yuan Huang:
An Improvement of Remote Authentication and Key Agreement Schemes. J. Circuits Syst. Comput. 20(4): 697-707 (2011) - [j41]Shiow-Yuan Huang, Cheng-Chan Hung, Cheng-Chi Lee:
A Practical U-Healthcare Network with Security and QoS. J. Digit. Inf. Manag. 9(2): 87-94 (2011) - [j40]Cheng-Chi Lee, Chun-Ta Li, Shun-der Chen:
Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks. Parallel Process. Lett. 21(1): 21-26 (2011) - [j39]Shiang-Feng Tzeng, Cheng-Chi Lee, Min-Shiang Hwang:
A Batch Verification for Multiple Proxy Signature. Parallel Process. Lett. 21(1): 77-84 (2011) - [j38]Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang:
An efficient authentication protocol for mobile communications. Telecommun. Syst. 46(1): 31-41 (2011) - [c9]Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee:
A Robust Remote User Authentication Scheme against Smart Card Security Breach. DBSec 2011: 231-238 - 2010
- [j37]Tsung-Hung Lin, Cheng-Chi Lee, Chwei-Shyong Tsai, Shin-Dong Guo:
A tabular steganography scheme for graphical password authentication. Comput. Sci. Inf. Syst. 7(4): 823-841 (2010) - [j36]Cheng-Chi Lee, Rui-Xiang Chang, Hsien-Ju Ko:
Improving Two Novel Three-Party Encrypted Key Exchange Protocols with Perfect Forward Secrecy. Int. J. Found. Comput. Sci. 21(6): 979-991 (2010) - [j35]Cheng-Chi Lee, Ting-Yao Cheng, Te-Yu Chen:
Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings. J. Digit. Inf. Manag. 8(5): 298-303 (2010) - [c8]Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang:
On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs. ICCSA (1) 2010: 599-609 - [c7]Cheng-Chi Lee, Chin-Ling Chen:
Authenticated Multiple Keys Exchange Protocol Based on Bilinear Pairings. ICEE 2010: 1303-1306 - [c6]Cheng-Chi Lee, Chin-Ling Chen, Chun-Ta Li, Rui-Xiang Chang:
On security of a more efficient and secure dynamic ID-based remote user authentication scheme. ISDA 2010: 1371-1375 - [c5]Chun-Ta Li, Chen-Ju Liu, Cheng-Chi Lee, Chin-Wen Lee:
Cryptanalysis of Khan et al.'s dynamic ID-based remote user authentication scheme. ISDA 2010: 1382-1387 - [c4]Chin-Ling Chen, I-Hsien Lin, Cheng-Chi Lee, Yung-Fa Huang:
A spare two-tier data aggregation for grid-based wireless sensor networks. IWCMC 2010: 1203-1207
2000 – 2009
- 2009
- [j34]Cheng-Chi Lee, Tsung-Hung Lin, Chwei-Shyong Tsai:
A new authenticated group key agreement in a mobile environment. Ann. des Télécommunications 64(11-12): 735-744 (2009) - [j33]Cheng-Chi Lee, W.-H. Ku, S.-Y. Huang:
A new steganographic scheme based on vector quantisation and search-order coding. IET Image Process. 3(4): 243-248 (2009) - [j32]Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng:
A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. Int. J. Found. Comput. Sci. 20(2): 351-359 (2009) - [j31]Cheng-Chi Lee:
On Security of An Efficient Nonce-based Authentication Scheme for SIP. Int. J. Netw. Secur. 9(3): 201-203 (2009) - [j30]Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin:
A new English auction scheme using the bulletin board system. Inf. Manag. Comput. Secur. 17(5): 408-417 (2009) - [j29]Cheng-Chi Lee, Pi-Fang Ho, Min-Shiang Hwang:
A secure e-auction scheme based on group signatures. Inf. Syst. Frontiers 11(3): 335-343 (2009) - [j28]Cheng-Chi Lee, Chu-Chi Yang, Shiow-Yuan Huang:
A New Authentication Scheme for Session Initiation Protocol. J. Digit. Inf. Manag. 7(3): 133-142 (2009) - [c3]Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai:
Multi-level visual secret sharing scheme with smooth-looking. ICIS 2009: 155-160 - 2008
- [j27]Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong:
An improved address ownership in mobile IPv6. Comput. Commun. 31(14): 3250-3252 (2008) - [j26]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
A new authentication protocol based on pointer forwarding for mobile communications. Wirel. Commun. Mob. Comput. 8(5): 661-672 (2008) - 2006
- [j25]Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang:
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Appl. Math. Comput. 172(2): 1195-1200 (2006) - [j24]Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang:
Password Authentication Schemes: Current Status and Key Issues. Int. J. Netw. Secur. 3(2): 101-115 (2006) - [j23]I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang:
A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4): 727-740 (2006) - [j22]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments. IEEE Trans. Ind. Electron. 53(5): 1683-1687 (2006) - [c2]I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang:
Identity-based deniable authentication protocol from pairings. IMSA 2006: 112-114 - 2005
- [j21]Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang:
A new blind signature based on the discrete logarithm problem for untraceability. Appl. Math. Comput. 164(3): 837-841 (2005) - [j20]Cheng-Chi Lee, Ting Yi Chang, Min-Shiang Hwang:
A simple broadcasting cryptosystem in computer networks using eXclusive-OR. Int. J. Comput. Appl. Technol. 24(3): 180-183 (2005) - [j19]Min-Shiang Hwang, Cheng-Chi Lee:
Research Issues and Challenges for Multiple Digital Signatures. Int. J. Netw. Secur. 1(1): 1-7 (2005) - [j18]Cheng-Ying Yang, Cheng-Chi Lee, Shu-Yin Hsiao:
Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object. Int. J. Netw. Secur. 1(2): 81-83 (2005) - [j17]Cheng-Chi Lee:
Two Attacks on the Wu-Hsu User Identification Scheme. Int. J. Netw. Secur. 1(3): 147-148 (2005) - [j16]Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, Chao-Chen Yang:
A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography. Telecommun. Syst. 29(3): 165-180 (2005) - 2004
- [j15]Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
A server assisted authentication protocol for detecting error vectors. ACM SIGOPS Oper. Syst. Rev. 38(2): 93-96 (2004) - [j14]Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee:
A key authentication scheme with non-repudiation. ACM SIGOPS Oper. Syst. Rev. 38(3): 75-78 (2004) - 2003
- [j13]Cheng-Chi Lee, Min-Shiang Hwang, Li-Hua Li:
A new key authentication scheme based on discrete logarithms. Appl. Math. Comput. 139(2-3): 343-349 (2003) - [j12]Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai:
Traceability on RSA-based partially signature with low computation. Appl. Math. Comput. 145(2-3): 465-468 (2003) - [j11]Cheng-Chi Lee, Wei-Pang Yang, Min-Shiang Hwang:
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem. Fundam. Informaticae 55(3-4): 307-320 (2003) - [j10]Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai:
Traceability on Stadler et al.'s Fair Blind Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(2): 513-514 (2003) - [j9]Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai:
An Untraceable Blind Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(7): 1902-1906 (2003) - [j8]Cheng-Chi Lee, Chao-Chen Yang, Min-Shiang Hwang:
A new privacy and authentication protocol for end-to-end mobile users. Int. J. Commun. Syst. 16(9): 799-808 (2003) - 2002
- [j7]Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang:
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme. Fundam. Informaticae 53(2): 131-134 (2002) - [j6]Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai:
Traceability on Low-Computation Partially Blind Signatures for Electronic Cash. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(5): 1181-1182 (2002) - [j5]Min-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang:
Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. J. Inf. Sci. Eng. 18(3): 373-379 (2002) - [j4]Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang:
A flexible remote user authentication scheme using smart cards. ACM SIGOPS Oper. Syst. Rev. 36(3): 46-52 (2002) - [j3]Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang:
A remote user authentication scheme using hash functions. ACM SIGOPS Oper. Syst. Rev. 36(4): 23-29 (2002) - 2001
- [j2]Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang:
An Improvement of SPLICE/AS in WIDE against Guessing Attack. Informatica 12(2): 297-302 (2001) - [c1]Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang:
Two Simple Batch Verifying Multiple Digital Signatures. ICICS 2001: 233-237
1990 – 1999
- 1999
- [j1]Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang:
A Novel Application of the Phone Card and Its Authentication in Mobile Communications. J. Inf. Sci. Eng. 15(4): 471-484 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint