Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Cheng-Chi
    Last name: Lee
    DBLP: 81/2193
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 109  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Journal article
    Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang.
    A Secure and Efficient One-time Password Authentication Scheme for WSN.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Conference paper
    Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen.
    Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
    Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai, Chi-Tung Chen, Shun-der Chen.
    Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
    Wireless Personal Communications 2017, Volume 94 (0) 2017
    Conference paper
    Min-Shiang Hwang, Tsuei-Hung Sun, Cheng-Chi Lee.
    Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service.
    Journal of Circuits, Systems, and Computers 2017, Volume 26 (0) 2017
    Conference paper
    Manoj Kumar Chande, Te-Yu Chen, Cheng-Chi Lee.
    An improved multi-signature scheme for specified group of verifiers.
    IJESDF 2017, Volume 9 (0) 2017
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng.
    A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
    J. Medical Systems 2016, Volume 40 (0) 2016
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-der Chen.
    Time-bound key-aggregate encryption for cloud storage.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Song-Jhih Chen.
    A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
    J. Medical Systems 2016, Volume 40 (0) 2016
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Shih-Ting Chiu.
    A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
    ITC 2016, Volume 45 (0) 2016
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai, Pu-Jen Cheng.
    An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration.
    IEEE Intelligent Systems 2016, Volume 31 (0) 2016
    Conference paper
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
    Parallel Processing Letters 2016, Volume 26 (0) 2016
    Journal article
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    A CAE Scheme Using ECC Based Self Certified PKC.
    JCS 2016, Volume 12 (0) 2016
    Journal article
    Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li.
    Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen K. Chilamkurti, Seng-Soo Yeo.
    Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
    Multimedia Syst. 2015, Volume 21 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang.
    Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics.
    2015 International Conference on Information Networking, ICOIN 2015, Siem Reap, Cambodia, January 12-14, 2015 2015 (0) 2015
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai.
    Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee.
    A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Omid Mir, Theo P. van der Weide, Cheng-Chi Lee.
    A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai, Pu-Jen Cheng.
    An efficient multiple session key establishment scheme for VANET group integration.
    2015 IEEE Intelligent Vehicles Symposium, IV 2015, Seoul, South Korea, June 28 - July 1, 2015 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang.
    Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
    Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies (ANT 2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015), London, UK, June 2-5, 2015 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang.
    A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan.
    A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
    J. Inf. Sci. Eng. 2015, Volume 31 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen.
    Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments.
    Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng.
    A dynamic identity-based user authentication scheme for remote login systems.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Show item 1 to 25 of 109  

    Your query returned 109 matches in the database.