


default search action
Cheng-Chi Lee
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j154]Dushyant Kumar Yadav, Hemlal Sahu, Dharminder Chaudhary, Cheng-Chi Lee
:
Module lattice based post quantum secure blockchain empowered vehicle to vehicle communication in the internet of vehicles. Comput. Electr. Eng. 117: 109245 (2024) - [j153]Jothi Ramalingam
, Satyabrat Rath
, Lakshmi Kuppusamy, Cheng-Chi Lee
:
Accelerating QKD post-processing by secure offloading of information reconciliation. Comput. Electr. Eng. 120: 109721 (2024) - [j152]Dharminder Chaudhary, Cheng-Chi Lee
:
Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones. Comput. Electr. Eng. 120: 109774 (2024) - [j151]Chi-Tung Chen, Cheng-Chi Lee:
A secure authenticated semi-quantum key distribution scheme for semi-quantum environments. Quantum Inf. Process. 23(12): 409 (2024) - [j150]BalaAnand Muthu, C. B. Sivaparthipan, R. Lakshmana Kumar, S. Jayanthi, Cheng-Chi Lee:
Trust-Based Energy Efficient Protocol Over MANET Using PTORA and RRFO. Wirel. Pers. Commun. 139(1): 653-678 (2024) - 2023
- [j149]Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, Agbotiname Lucky Imoize
, Joseph Bamidele Awotunde
, Ting-Yi Chang, Cheng-Chi Lee
, Dinh-Thuan Do
:
An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks. IEEE Access 11: 1306-1323 (2023) - [j148]Abhilash Singh
, Kumar Gaurav
, Gaurav Kailash Sonkar
, Cheng-Chi Lee
:
Strategies to Measure Soil Moisture Using Traditional Methods, Automated Sensors, Remote Sensing, and Machine Learning Techniques: Review, Bibliometric Analysis, Applications, Research Findings, and Future Directions. IEEE Access 11: 13605-13635 (2023) - [j147]Chandrasen Pandey
, Vaibhav Tiwari
, Agbotiname Lucky Imoize
, Chun-Ta Li
, Cheng-Chi Lee
, Diptendu Sinha Roy
:
5GT-GAN: Enhancing Data Augmentation for 5G-Enabled Mobile Edge Computing in Smart Cities. IEEE Access 11: 120983-120996 (2023) - [j146]Cheng-Chi Lee
, Mehdi Gheisari
, Mohammad Javad Shayegan
, Milad Taleby Ahvanooey
, Yang Liu
:
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things. Cryptogr. 7(4): 51 (2023) - [j145]Oluwakemi Christiana Abikoye
, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize
, Joseph Bamidele Awotunde
, Cheng-Chi Lee
, Chun-Ta Li
:
Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme. Future Internet 15(3): 99 (2023) - [j144]Agbotiname Lucky Imoize
, Friday Udeji, Joseph Isabona
, Cheng-Chi Lee
:
Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment. Future Internet 15(5): 181 (2023) - [j143]Joseph Isabona
, Agbotiname Lucky Imoize
, Oluwasayo Akinloye Akinwumi, Okiemute Roberts Omasheye, Emughedi Oghu, Cheng-Chi Lee
, Chun-Ta Li
:
Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms. Inf. 14(11): 621 (2023) - [j142]Priyansi Parida, Chittaranjan Pradhan, Jafar Ahmad Abed Alzubi, Amir Javadpour, Mehdi Gheisari
, Yang Liu
, Cheng-Chi Lee:
Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network. Multim. Tools Appl. 82(22): 33637-33662 (2023) - [d1]Abhilash Singh, Vaibhav Kotiyal, Sandeep Sharma, Jaiprakash Nagar, Cheng-Chi Lee:
Average Localization Error (ALE) in sensor node localization process in WSNs. UCI Machine Learning Repository, 2023 - 2022
- [j141]Vivek Arya
, Hemant Choubey, Sandeep Sharma
, Te-Yu Chen
, Cheng-Chi Lee
:
Image Enhancement and Features Extraction of Electron Microscopic Images Using Sigmoid Function and 2D-DCT. IEEE Access 10: 76742-76751 (2022) - [j140]Shaheena Khatoon, Te-Yu Chen, Cheng-Chi Lee
:
An improved user authentication and key agreement scheme for roaming service in ubiquitous network. Ann. des Télécommunications 77(9): 621-640 (2022) - [j139]Mehdi Gheisari
, Mahdi Safaei Yaraziz
, Jafar Ahmad Abed Alzubi, Christian Fernández-Campusano
, Mohammad Reza Feylizadeh, Saied Pirasteh, Aaqif Afzaal Abbasi
, Yang Liu
, Cheng-Chi Lee
:
An efficient cluster head selection for wireless sensor network-based smart agriculture systems. Comput. Electron. Agric. 198: 107105 (2022) - [j138]Rasheed Gbenga Jimoh, Olayinka Olufunmilayo Olusanya, Joseph Bamidele Awotunde
, Agbotiname Lucky Imoize
, Cheng-Chi Lee
:
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases. Future Internet 14(11): 305 (2022) - [j137]Okiemute Roberts Omasheye, Samuel Azi, Joseph Isabona
, Agbotiname Lucky Imoize
, Chun-Ta Li
, Cheng-Chi Lee
:
Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks. Future Internet 14(12): 373 (2022) - [j136]Yuvaraj Natarajan, Kannan Srihari, Gaurav Dhiman
, Selvaraj Chandragandhi, Mehdi Gheisari
, Yang Liu
, Cheng-Chi Lee
, Krishna Kant Singh
, Kusum Yadav
, Hadeel Fahad Alharbi:
An IoT and machine learning-based routing protocol for reconfigurable engineering application. IET Commun. 16(5): 464-475 (2022) - [j135]Joseph Isabona
, Agbotiname Lucky Imoize
, Stephen Ojo
, Cheng-Chi Lee
, Chun-Ta Li
:
Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate. Inf. 13(3): 141 (2022) - [j134]Parkash Tambare, Chandrashekhar Meshram, Cheng-Chi Lee
, Rakesh Jagdish Ramteke, Agbotiname Lucky Imoize
:
Performance Measurement System and Quality Management in Data-Driven Industry 4.0: A Review. Sensors 22(1): 224 (2022) - [j133]Abhilash Singh
, J. Amutha
, Jaiprakash Nagar
, Sandeep Sharma
, Cheng-Chi Lee
:
LT-FS-ID: Log-Transformed Feature Learning and Feature-Scaling-Based Machine Learning Algorithms to Predict the k-Barriers for Intrusion Detection Using Wireless Sensor Network. Sensors 22(3): 1070 (2022) - [j132]Umesh Kumar Lilhore
, Agbotiname Lucky Imoize
, Chun-Ta Li
, Sarita Simaiya, Subhendu Kumar Pani
, Nitin Goyal
, Arun Kumar Rana
, Cheng-Chi Lee
:
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities. Sensors 22(8): 2908 (2022) - [j131]Chun-Ta Li
, Chi-Yao Weng, Chin-Ling Chen
, Cheng-Chi Lee
, Yong-Yuan Deng, Agbotiname Lucky Imoize
:
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications. Sensors 22(23): 9534 (2022) - 2021
- [j130]Vishesh P. Gaikwad, Jitendra V. Tembhurne
, Chandrashekhar Meshram
, Cheng-Chi Lee
, Chun-Ta Li
:
An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS. IEEE Access 9: 108586-108600 (2021) - [j129]Chi-Yao Weng
, Chun-Ta Li
, Chin-Ling Chen
, Cheng-Chi Lee
, Yong-Yuan Deng
:
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services. IEEE Access 9: 145522-145537 (2021) - [j128]K. S. Suvidha, Jothi Rangasamy, Shyam S. Kamath, Cheng-Chi Lee
:
ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks. Cryptogr. 5(4): 35 (2021) - [j127]Yong-Yi Fanjiang, Cheng-Chi Lee
, Yan-Ta Du, Shi-Jinn Horng:
Palm Vein Recognition Based on Convolutional Neural Network. Informatica 32(4): 687-708 (2021) - [j126]Vaibhav Kotiyal
, Abhilash Singh
, Sandeep Sharma
, Jaiprakash Nagar
, Cheng-Chi Lee
:
ECS-NL: An Enhanced Cuckoo Search Algorithm for Node Localisation in Wireless Sensor Networks. Sensors 21(11): 3576 (2021) - [j125]Chandrashekhar Meshram
, Mohammad S. Obaidat
, Cheng-Chi Lee
, Sarita Gajbhiye Meshram
:
An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle. IEEE Syst. J. 15(4): 4927-4938 (2021) - [j124]Vishesh P. Gaikwad, Jitendra V. Tembhurne, Chandrashekhar Meshram, Cheng-Chi Lee
:
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function. J. Supercomput. 77(8): 8281-8304 (2021) - [c21]Cheng-Chi Lee, Chung-Wei Li, Chun-Ta Li
, Chin-Ling Chen:
E-book Circulation System Based on Blockchain. CSCI 2021: 615-619 - 2020
- [j123]Chandrashekhar Meshram, Cheng-Chi Lee
, Sarita Gajbhiye Meshram
, Akshaykumar Meshram
:
OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network. IEEE Access 8: 80063-80073 (2020) - [j122]Chun-Ta Li
, Dong-Her Shih
, Chun-Cheng Wang, Chin-Ling Chen
, Cheng-Chi Lee
:
A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System. IEEE Access 8: 173904-173917 (2020) - [j121]Abhilash Singh
, Vaibhav Kotiyal
, Sandeep Sharma
, Jaiprakash Nagar
, Cheng-Chi Lee
:
A Machine Learning Approach to Predict the Average Localization Error With Applications to Wireless Sensor Networks. IEEE Access 8: 208253-208263 (2020) - [j120]Ko-Tsung Chu, Hua-Ting Hsu, Jyh-Jian Sheu, Wei-Pang Yang, Cheng-Chi Lee
:
Effective spam filter based on a hybrid method of header checking and content parsing. IET Networks 9(6): 338-347 (2020) - [j119]Chandrashekhar Meshram
, Cheng-Chi Lee
, Abhay S. Ranadive, Chun-Ta Li
, Sarita Gajbhiye Meshram
, Jitendra V. Tembhurne
:
A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int. J. Commun. Syst. 33(7) (2020) - [j118]Chandrashekhar Meshram, Cheng-Chi Lee
, Sarita Gajbhiye Meshram
, Rakesh Jagdish Ramteke, Akshaykumar Meshram
:
An Efficient Mobile-Healthcare Emergency Framework. J. Medical Syst. 44(3): 58 (2020) - [j117]Cheng-Chi Lee
:
Security and Privacy in Wireless Sensor Networks: Advances and Challenges. Sensors 20(3): 744 (2020) - [j116]Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee
, Sarita Gajbhiye Meshram
:
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem. Soft Comput. 24(9): 6531-6537 (2020)
2010 – 2019
- 2019
- [j115]Cheng-Chi Lee
, Chun-Ta Li
, Chung-Lun Cheng, Yan-Ming Lai:
A novel group ownership transfer protocol for RFID systems. Ad Hoc Networks 91 (2019) - [j114]Cheng-Chi Lee
, Shun-der Chen, Chun-Ta Li
, Chung-Lun Cheng, Yan-Ming Lai:
Security enhancement on an RFID ownership transfer protocol based on cloud. Future Gener. Comput. Syst. 93: 266-277 (2019) - [j113]Cheng-Chi Lee
, Chun-Ta Li, Zhi-Wei Chen, Shun-Der Chen, Yan-Ming Lai:
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography. Int. J. Electron. Secur. Digit. Forensics 11(1): 96-117 (2019) - [j112]Min-Shiang Hwang, Cheng-Chi Lee
, Shih-Ting Hsu:
An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme. Int. J. Found. Comput. Sci. 30(2): 255-273 (2019) - [j111]Cheng-Chi Lee
, Chun-Ta Li
, Chung-Lun Cheng, Yan-Ming Lai, Athanasios V. Vasilakos
:
A Novel Group Ownership Delegate Protocol for RFID Systems. Inf. Syst. Frontiers 21(5): 1153-1166 (2019) - [j110]Chandrashekhar Meshram, Cheng-Chi Lee
, Sarita Gajbhiye Meshram
, Chun-Ta Li
:
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput. 23(16): 6937-6946 (2019) - [j109]Chandrashekhar Meshram, Cheng-Chi Lee
, Sarita Gajbhiye Meshram
, Muhammad Khurram Khan
:
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput. 23(24): 13127-13138 (2019) - 2018
- [j108]Chandrashekhar Meshram, Pournima L. Powar
, Mohammad S. Obaidat, Cheng-Chi Lee
, Sarita Gajbhiye Meshram
:
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs. IET Networks 7(6): 363-367 (2018) - [j107]Chandrashekhar Meshram, Sarita Gajbhiye Meshram, Cheng-Chi Lee:
Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle. Int. J. Netw. Secur. 20(3): 568-574 (2018) - [j106]Cheng-Chi Lee
, Chun-Ta Li
, Zhi-Wei Chen, Yan-Ming Lai, Jiann-Cherng Shieh:
An improved E-DRM scheme for mobile environments. J. Inf. Secur. Appl. 39: 19-30 (2018) - [j105]Cheng-Chi Lee
, Chun-Ta Li
, Zhi-Wei Chen, Yan-Ming Lai:
A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System. Inf. Technol. Control. 47(2): 262-274 (2018) - [j104]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks. J. Inf. Sci. Eng. 34(1): 155-170 (2018) - [j103]Chun-Ta Li, Cheng-Chi Lee
, Chi-Yao Weng, Chien-Ming Chen
:
Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw. Appl. 11(1): 198-208 (2018) - [j102]Chun-Ta Li
, Chin-Ling Chen, Cheng-Chi Lee
, Chi-Yao Weng, Chien-Ming Chen:
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput. 22(8): 2495-2506 (2018) - [c20]Cheng-Chi Lee
, Shun-der Chen, Chun-Ta Li
, Chung-Lun Cheng, Yan-Ming Lai:
Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud. CSCloud/EdgeCom 2018: 134-139 - [c19]Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee
:
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System. IOV 2018: 278-288 - 2017
- [j101]Manoj Kumar Chande, Te-Yu Chen, Cheng-Chi Lee:
An improved multi-signature scheme for specified group of verifiers. Int. J. Electron. Secur. Digit. Forensics 9(2): 180-190 (2017) - [j100]Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang:
A Secure and Efficient One-time Password Authentication Scheme for WSN. Int. J. Netw. Secur. 19(2): 177-181 (2017) - [j99]Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li:
Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys. Int. J. Netw. Secur. 19(3): 340-346 (2017) - [j98]Chandrashekhar Meshram, Yuh-Min Tseng, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP. Informatica 28(3): 471-484 (2017) - [j97]Min-Shiang Hwang, Tsuei-Hung Sun, Cheng-Chi Lee
:
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service. J. Circuits Syst. Comput. 26(5): 1750072:1-1750072:16 (2017) - [j96]Chun-Ta Li
, Tsu-Yang Wu
, Chin-Ling Chen, Cheng-Chi Lee
, Chien-Ming Chen:
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors 17(7): 1482 (2017) - [j95]Chandrashekhar Meshram, Cheng-Chi Lee
, Chun-Ta Li
, Chin-Ling Chen:
A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput. 21(24): 7285-7291 (2017) - [j94]Cheng-Chi Lee
, Yan-Ming Lai, Chi-Tung Chen, Shun-der Chen:
Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 94(3): 1281-1296 (2017) - [c18]Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee
, Chien-Ming Chen:
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems. GPC 2017: 116-126 - [c17]Chun-Ta Li, Cheng-Chi Lee
, Chi-Yao Weng, Tsu-Yang Wu
, Chien-Ming Chen
:
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System". ICISA 2017: 282-289 - 2016
- [j93]Cheng-Chi Lee
, Yan-Ming Lai, Pu-Jen Cheng:
An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration. IEEE Intell. Syst. 31(6): 35-43 (2016) - [j92]Cheng-Chi Lee
, Chun-Ta Li
, Chin-Ling Chen, Shih-Ting Chiu:
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services. Inf. Technol. Control. 45(3): 289-299 (2016) - [j91]Manoj Kumar Chande
, Cheng-Chi Lee
, Chun-Ta Li:
A CAE Scheme Using ECC Based Self Certified PKC. J. Comput. Sci. 12(11): 527-533 (2016) - [j90]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng:
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System. J. Medical Syst. 40(5): 117:1-117:15 (2016) - [j89]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng, Song-Jhih Chen:
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems. J. Medical Syst. 40(11): 233:1-233:10 (2016) - [j88]Manoj Kumar Chande
, Cheng-Chi Lee
, Chun-Ta Li
:
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem. Parallel Process. Lett. 26(4): 1650018:1-1650018:10 (2016) - [j87]Cheng-Chi Lee
, Chun-Ta Li
, Shih-Ting Chiu, Shun-der Chen:
Time-bound key-aggregate encryption for cloud storage. Secur. Commun. Networks 9(13): 2059-2069 (2016) - [c16]Cheng-Chi Lee
, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li:
Cryptanalysis of Dimitriou's Key Evolving RFID Systems. ICNCC 2016: 229-233 - 2015
- [j86]Cheng-Chi Lee
, Yan-Ming Lai:
Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks. Comput. J. 58(4): 934-943 (2015) - [j85]Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li:
Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol. Int. J. Netw. Secur. 17(1): 1-6 (2015) - [j84]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. J. Inf. Sci. Eng. 31(6): 1975-1992 (2015) - [j83]Chun-Ta Li
, Chi-Yao Weng, Cheng-Chi Lee
:
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System. J. Medical Syst. 39(8): 77 (2015) - [j82]Omid Mir, Theo P. van der Weide, Cheng-Chi Lee
:
A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems. J. Medical Syst. 39(9): 89:1-89:16 (2015) - [j81]Chun-Ta Li
, Chi-Yao Weng, Cheng-Chi Lee
, Chun-Cheng Wang:
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System. J. Medical Syst. 39(11): 144:1-144:11 (2015) - [j80]Debiao He
, Neeraj Kumar
, Jianhua Chen, Cheng-Chi Lee
, Naveen K. Chilamkurti, Seng-Soo Yeo:
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multim. Syst. 21(1): 49-60 (2015) - [j79]Chi-Tung Chen, Cheng-Chi Lee
:
A two-factor authentication scheme with anonymity for multi-server environments. Secur. Commun. Networks 8(8): 1608-1625 (2015) - [j78]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng:
A dynamic identity-based user authentication scheme for remote login systems. Secur. Commun. Networks 8(18): 3372-3382 (2015) - [c15]Chun-Ta Li
, Chi-Yao Weng, Cheng-Chi Lee
, Chun-Cheng Wang:
Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS. ANT/SEIT 2015: 21-28 - [c14]Chun-Ta Li
, Cheng-Chi Lee
, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen:
Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments. ICA3PP (Workshops and Symposiums) 2015: 435-444 - [c13]Chun-Ta Li
, Cheng-Chi Lee
, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang:
Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. ICOIN 2015: 498-502 - [c12]Jiann-Cherng Shieh, Cheng-Chi Lee
, Shu-Yu Lee:
A Dynamic Key Aggregate Cryptosystem in Cloud Environment. IIAI-AAI 2015: 73-78 - [c11]Cheng-Chi Lee
, Yan-Ming Lai, Pu-Jen Cheng
:
An efficient multiple session key establishment scheme for VANET group integration. Intelligent Vehicles Symposium 2015: 1316-1321 - 2014
- [j77]Min-Shiang Hwang, Cheng-Chi Lee
, Tsuei-Hung Sun:
Data error locations reported by public auditing in cloud storage service. Autom. Softw. Eng. 21(3): 373-390 (2014) - [j76]Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee
:
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme. Inf. Technol. Control. 43(3): 277-288 (2014) - [j75]Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu:
A Novel Frequency Billing Service in Digital Television System. J. Inf. Hiding Multim. Signal Process. 5(3): 439-450 (2014) - [j74]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng:
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(9): 77 (2014) - [j73]Cheng-Chi Lee
, Chi-Tung Chen, Chun-Ta Li
, Ping-Hsien Wu:
A practical RFID authentication mechanism for digital television. Telecommun. Syst. 57(3): 239-246 (2014) - [j72]Chin-Ling Chen, Yu-Yi Chen, Cheng-Chi Lee
, Cheng-Hsun Wu:
Design and analysis of a secure and effective emergency system for mountaineering events. J. Supercomput. 70(1): 54-74 (2014) - [j71]Cheng-Chi Lee
, Hong-Hao Chen, Hung-Ting Liu, Guo-Wei Chen, Chwei-Shyong Tsai:
A new visual cryptography with multi-level encoding. J. Vis. Lang. Comput. 25(3): 243-250 (2014) - 2013
- [j70]Li-Chin Huang, Cheng-Chi Lee, Min-Shiang Hwang:
A n2+n MQV key agreement protocol. Int. Arab J. Inf. Technol. 10(2): 137-142 (2013) - [j69]Cheng-Chi Lee
, Chi-Tung Chen, Ping-Hsien Wu, Te-Yu Chen:
Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices. IET Comput. Digit. Tech. 7(1): 48-56 (2013) - [j68]Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang:
Guessing Attacks on Strong-Password Authentication Protocol. Int. J. Netw. Secur. 15(1): 64-67 (2013) - [j67]Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang:
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. Int. J. Netw. Secur. 15(4): 231-240 (2013) - [j66]Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang:
A Study of Conjunctive Keyword Searchable Schemes. Int. J. Netw. Secur. 15(5): 321-330 (2013) - [j65]Cheng-Chi Lee
:
A simple key agreement scheme based on chaotic maps for VSAT satellite communications. Int. J. Satell. Commun. Netw. 31(4): 177-186 (2013) - [j64]Min-Shiang Hwang, Cheng-Chi Lee
, Shiang-Feng Tzeng:
A new proxy signature scheme for a specified group of verifiers. Inf. Sci. 227: 102-115 (2013) - [j63]Cheng-Chi Lee
, Yan-Ming Lai, Chin-Sung Hsiao:
Cryptanalysis of a simple key assignment for access control based on polynomial. J. Inf. Secur. Appl. 18(4): 215-218 (2013) - [j62]Cheng-Chi Lee
, Yan-Ming Lai, Chin-Ling Chen, Lung Albert Chen:
A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing. Inf. Technol. Control. 42(3): 247-252 (2013) - [j61]Chun-Ta Li
, Cheng-Chi Lee
, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Trans. Internet Inf. Syst. 7(1): 119-131 (2013) - [j60]Cheng-Chi Lee
, Chun-Ta Li
, Rui-Xiang Chang:
An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol. J. Comput. Methods Sci. Eng. 13(5-6): 455-460 (2013) - [j59]Cheng-Chi Lee
, Che-Wei Hsu, Yan-Ming Lai, Athanasios V. Vasilakos
:
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps. J. Medical Syst. 37(5): 9973 (2013) - [j58]Song-Kong Chong, Cheng-Chi Lee
, Min-Shiang Hwang:
An Authentication Scheme for the Global Mobility Network. Parallel Process. Lett. 23(3) (2013) - [j57]Chun-Ta Li
, Chi-Yao Weng, Cheng-Chi Lee
:
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks. Sensors 13(8): 9589-9603 (2013) - [j56]Te-Yu Chen, Cheng-Chi Lee
, Min-Shiang Hwang, Jinn-Ke Jan:
Towards secure and efficient user authentication scheme using smart card for multi-server environments. J. Supercomput.