Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Cheng-Chi
    Last name: Lee
    DBLP: 81/2193
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 104  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Journal article
    Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang.
    A Secure and Efficient One-time Password Authentication Scheme for WSN.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng.
    A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
    J. Medical Systems 2016, Volume 40 (0) 2016
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-der Chen.
    Time-bound key-aggregate encryption for cloud storage.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Song-Jhih Chen.
    A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
    J. Medical Systems 2016, Volume 40 (0) 2016
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Shih-Ting Chiu.
    A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
    ITC 2016, Volume 45 (0) 2016
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai, Pu-Jen Cheng.
    An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration.
    IEEE Intelligent Systems 2016, Volume 31 (0) 2016
    Conference paper
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
    Parallel Processing Letters 2016, Volume 26 (0) 2016
    Journal article
    Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li.
    Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen K. Chilamkurti, Seng-Soo Yeo.
    Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
    Multimedia Syst. 2015, Volume 21 (0) 2015
    Show item 1 to 10 of 104  

    Your query returned 104 matches in the database.