Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Cheng-Chi
    Last name: Lee
    DBLP: 81/2193
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 112  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Journal article
    Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang.
    A Secure and Efficient One-time Password Authentication Scheme for WSN.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Conference paper
    Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen.
    Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
    Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai, Chi-Tung Chen, Shun-der Chen.
    Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
    Wireless Personal Communications 2017, Volume 94 (0) 2017
    Conference paper
    Min-Shiang Hwang, Tsuei-Hung Sun, Cheng-Chi Lee.
    Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service.
    Journal of Circuits, Systems, and Computers 2017, Volume 26 (0) 2017
    Conference paper
    Manoj Kumar Chande, Te-Yu Chen, Cheng-Chi Lee.
    An improved multi-signature scheme for specified group of verifiers.
    IJESDF 2017, Volume 9 (0) 2017
    Conference paper
    Chun-Ta Li, Tsu-Yang Wu, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen.
    An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
    Sensors 2017, Volume 17 (0) 2017
    Journal article
    Chandrashekhar Meshram, Yuh-Min Tseng, Cheng-Chi Lee, Sarita Gajbhiye Meshram.
    An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP.
    Informatica, Lith. Acad. Sci. 2017, Volume 28 (0) 2017
    Conference paper
    Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen.
    A secure key authentication scheme for cryptosystems based on GDLP and IFP.
    Soft Comput. 2017, Volume 21 (0) 2017
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng.
    A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
    J. Medical Systems 2016, Volume 40 (0) 2016
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-der Chen.
    Time-bound key-aggregate encryption for cloud storage.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Song-Jhih Chen.
    A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
    J. Medical Systems 2016, Volume 40 (0) 2016
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Shih-Ting Chiu.
    A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
    ITC 2016, Volume 45 (0) 2016
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai, Pu-Jen Cheng.
    An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration.
    IEEE Intelligent Systems 2016, Volume 31 (0) 2016
    Conference paper
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
    Parallel Processing Letters 2016, Volume 26 (0) 2016
    Journal article
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    A CAE Scheme Using ECC Based Self Certified PKC.
    JCS 2016, Volume 12 (0) 2016
    Journal article
    Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li.
    Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen K. Chilamkurti, Seng-Soo Yeo.
    Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
    Multimedia Syst. 2015, Volume 21 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang.
    Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics.
    2015 International Conference on Information Networking, ICOIN 2015, Siem Reap, Cambodia, January 12-14, 2015 2015 (0) 2015
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai.
    Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee.
    A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Omid Mir, Theo P. van der Weide, Cheng-Chi Lee.
    A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai, Pu-Jen Cheng.
    An efficient multiple session key establishment scheme for VANET group integration.
    2015 IEEE Intelligent Vehicles Symposium, IV 2015, Seoul, South Korea, June 28 - July 1, 2015 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang.
    Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
    Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies (ANT 2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015), London, UK, June 2-5, 2015 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang.
    A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan.
    A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
    J. Inf. Sci. Eng. 2015, Volume 31 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen.
    Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments.
    Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng.
    A dynamic identity-based user authentication scheme for remote login systems.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Conference paper
    Chi-Tung Chen, Cheng-Chi Lee.
    A two-factor authentication scheme with anonymity for multi-server environments.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Conference paper
    Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu, Guo-Wei Chen, Chwei-Shyong Tsai.
    A new visual cryptography with multi-level encoding.
    J. Vis. Lang. Comput. 2014, Volume 25 (0) 2014
    Conference paper
    Min-Shiang Hwang, Cheng-Chi Lee, Tsuei-Hung Sun.
    Data error locations reported by public auditing in cloud storage service.
    Autom. Softw. Eng. 2014, Volume 21 (0) 2014
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng.
    A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
    J. Medical Systems 2014, Volume 38 (0) 2014
    Conference paper
    Chin-Ling Chen, Yu-Yi Chen, Cheng-Chi Lee, Cheng-Hsun Wu.
    Design and analysis of a secure and effective emergency system for mountaineering events.
    The Journal of Supercomputing 2014, Volume 70 (0) 2014
    Conference paper
    Cheng-Chi Lee, Chi-Tung Chen, Chun-Ta Li, Ping-Hsien Wu.
    A practical RFID authentication mechanism for digital television.
    Telecommunication Systems 2014, Volume 57 (0) 2014
    Conference paper
    Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee.
    A New Public Key Encryption with Conjunctive Field Keyword Search Scheme.
    ITC 2014, Volume 43 (0) 2014
    Journal article
    Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng.
    A new proxy signature scheme for a specified group of verifiers.
    Inf. Sci. 2013, Volume 227 (0) 2013
    Conference paper
    Li-Chin Huang, Cheng-Chi Lee, Min-Shiang Hwang.
    A n2+n MQV key agreement protocol.
    Int. Arab J. Inf. Technol. 2013, Volume 10 (0) 2013
    Journal article
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan.
    An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
    TIIS 2013, Volume 7 (0) 2013
    Conference paper
    Cheng-Chi Lee, Chin-Ling Chen, Hsia-Hung Ou, Lung Albert Chen.
    Extension of an Efficient 3GPP Authentication and Key Agreement Protocol.
    Wireless Personal Communications 2013, Volume 68 (0) 2013
    Journal article
    Cheng-Chi Lee, Chi-Tung Chen, Ping-Hsien Wu, Te-Yu Chen.
    Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices.
    IET Computers Digital Techniques 2013, Volume 7 (0) 2013
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai.
    Toward a secure batch verification with group testing for VANET.
    Wireless Networks 2013, Volume 19 (0) 2013
    Conference paper
    Cheng-Chi Lee.
    A simple key agreement scheme based on chaotic maps for VSAT satellite communications.
    Int. J. Satellite Communications Networking 2013, Volume 31 (0) 2013
    Journal article
    Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang.
    A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
    I. J. Network Security 2013, Volume 15 (0) 2013
    Journal article
    Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang.
    A Study of Conjunctive Keyword Searchable Schemes.
    I. J. Network Security 2013, Volume 15 (0) 2013
    Journal article
    Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang.
    Guessing Attacks on Strong-Password Authentication Protocol.
    I. J. Network Security 2013, Volume 15 (0) 2013
    Conference paper
    Song-Kong Chong, Cheng-Chi Lee, Min-Shiang Hwang.
    An Authentication Scheme for the Global Mobility Network.
    Parallel Processing Letters 2013, Volume 23 (0) 2013
    Conference paper
    Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-ke Jan.
    Towards secure and efficient user authentication scheme using smart card for multi-server environments.
    The Journal of Supercomputing 2013, Volume 66 (0) 2013
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu.
    Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
    Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings 2013 (0) 2013
    Journal article
    Cheng-Chi Lee, Yan-Ming Lai, Chin-Ling Chen, Lung Albert Chen.
    A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing.
    ITC 2013, Volume 42 (0) 2013
    Conference paper
    Cheng-Chi Lee, Che-Wei Hsu, Yan-Ming Lai, Athanasios V. Vasilakos.
    An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps.
    J. Medical Systems 2013, Volume 37 (0) 2013
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang.
    An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.
    J. Comput. Meth. in Science and Engineering 2013, Volume 13 (0) 2013
    Conference paper
    Cheng-Chi Lee, Yan-Ming Lai, Chin-Sung Hsiao.
    Cryptanalysis of a simple key assignment for access control based on polynomial.
    J. Inf. Sec. Appl. 2013, Volume 18 (0) 2013
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee.
    An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
    Sensors 2013, Volume 13 (0) 2013
    Journal article
    Chun-Ta Li, Cheng-Chi Lee.
    A novel user authentication and privacy preserving scheme with smart cards for wireless communications.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang.
    A simple and efficient authentication scheme for mobile satellite communication systems.
    Int. J. Satellite Communications Networking 2012, Volume 30 (0) 2012
    Conference paper
    Chin-Ling Chen, Cheng-Chi Lee, Chao-Yung Hsu.
    Mobile device integration of a fingerprint biometric remote authentication scheme.
    Int. J. Communication Systems 2012, Volume 25 (0) 2012
    Conference paper
    Chin-Ling Chen, Cheng-Chi Lee, Yuh-Min Tseng, Teng-Tai Chou.
    A private online system for executing wills based on a secret sharing mechanism.
    Security and Communication Networks 2012, Volume 5 (0) 2012
    Conference paper
    Cheng-Chi Lee, Tsung-Hung Lin, Chwei-Shyong Tsai.
    Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications.
    Security and Communication Networks 2012, Volume 5 (0) 2012
    Journal article
    Cheng-Chi Lee, Rui-Xiang Chang, Te-Yu Chen, Lung Albert Chen.
    An Improved Delegation-Based Authentication Protocol for PCSs.
    ITC 2012, Volume 41 (0) 2012
    Journal article
    Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang.
    An efficient authentication protocol for mobile communications.
    Telecommunication Systems 2011, Volume 46 (0) 2011
    Journal article
    Chi-Yu Liu, Cheng-Chi Lee, Tzu-Chun Lin.
    Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme.
    I. J. Network Security 2011, Volume 12 (0) 2011
    Journal article
    Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin.
    A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy.
    I. J. Network Security 2011, Volume 12 (0) 2011
    Journal article
    Shiang-Feng Tzeng, Cheng-Chi Lee, Min-Shiang Hwang.
    A Batch Verification for Multiple Proxy Signature.
    Parallel Processing Letters 2011, Volume 21 (0) 2011
    Journal article
    Cheng-Chi Lee, Chun-Ta Li, Shun-der Chen.
    Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks.
    Parallel Processing Letters 2011, Volume 21 (0) 2011
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Kuo-You Huang, Shiow-Yuan Huang.
    An Improvement of Remote Authentication and Key Agreement Schemes.
    Journal of Circuits, Systems, and Computers 2011, Volume 20 (0) 2011
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee.
    A Robust Remote User Authentication Scheme against Smart Card Security Breach.
    Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Cheng-Chi Lee, Tsung-Hung Lin, Rui-Xiang Chang.
    A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards.
    Expert Syst. Appl. 2011, Volume 38 (0) 2011
    Conference paper
    Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao.
    On the Security of Self-Certified Public Keys.
    IJISP 2011, Volume 5 (0) 2011
    Journal article
    Shiow-Yuan Huang, Cheng-Chan Hung, Cheng-Chi Lee.
    A Practical U-Healthcare Network with Security and QoS.
    JDIM 2011, Volume 9 (0) 2011
    Journal article
    Chun-Ta Li, Cheng-Chi Lee.
    A Robust Remote User Authentication Scheme Using Smart Card.
    ITC 2011, Volume 40 (0) 2011
    Conference paper
    Chin-Ling Chen, I-Hsien Lin, Cheng-Chi Lee, Yung-Fa Huang.
    A spare two-tier data aggregation for grid-based wireless sensor networks.
    Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010 2010 (0) 2010
    Conference paper
    Cheng-Chi Lee, Chin-Ling Chen.
    Authenticated Multiple Keys Exchange Protocol Based on Bilinear Pairings.
    The International Conference on E-Business and E-Government, ICEE 2010, 7-9 May 2010, Guangzhou, China, Proceedings 2010 (0) 2010
    Conference paper
    Cheng-Chi Lee, Rui-Xiang Chang, Hsien-Ju Ko.
    Improving Two Novel Three-Party Encrypted Key Exchange Protocols with Perfect Forward Secrecy.
    Int. J. Found. Comput. Sci. 2010, Volume 21 (0) 2010
    Conference paper
    Cheng-Chi Lee, Chin-Ling Chen, Chun-Ta Li, Rui-Xiang Chang.
    On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
    10th International Conference on Intelligent Systems Design and Applications, ISDA 2010, November 29 - December 1, 2010, Cairo, Egypt 2010 (0) 2010
    Conference paper
    Chun-Ta Li, Chen-Ju Liu, Cheng-Chi Lee, Chin-Wen Lee.
    Cryptanalysis of Khan et al.'s dynamic ID-based remote user authentication scheme.
    10th International Conference on Intelligent Systems Design and Applications, ISDA 2010, November 29 - December 1, 2010, Cairo, Egypt 2010 (0) 2010
    Journal article
    Tsung-Hung Lin, Cheng-Chi Lee, Chwei-Shyong Tsai, Shin-Dong Guo.
    A tabular steganography scheme for graphical password authentication.
    Comput. Sci. Inf. Syst. 2010, Volume 7 (0) 2010
    Journal article
    Cheng-Chi Lee, Ting-Yao Cheng, Te-Yu Chen.
    Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings.
    JDIM 2010, Volume 8 (0) 2010
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang.
    On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs.
    Computational Science and Its Applications - ICCSA 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part I 2010 (0) 2010
    Conference paper
    Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin.
    A new English auction scheme using the bulletin board system.
    Inf. Manag. Comput. Security 2009, Volume 17 (0) 2009
    Journal article
    Cheng-Chi Lee, Chu-Chi Yang, Shiow-Yuan Huang.
    A New Authentication Scheme for Session Initiation Protocol.
    JDIM 2009, Volume 7 (0) 2009
    Conference paper
    Cheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng.
    A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem.
    Int. J. Found. Comput. Sci. 2009, Volume 20 (0) 2009
    Conference paper
    Cheng-Chi Lee, Pi-Fang Ho, Min-Shiang Hwang.
    A secure e-auction scheme based on group signatures.
    Information Systems Frontiers 2009, Volume 11 (0) 2009
    Conference paper
    Cheng-Chi Lee.
    On Security of An Efficient Nonce-based Authentication Scheme for SIP.
    I. J. Network Security 2009, Volume 9 (0) 2009
    Conference paper
    Cheng-Chi Lee, Tsung-Hung Lin, Chwei-Shyong Tsai.
    A new authenticated group key agreement in a mobile environment.
    Annales des Télécommunications 2009, Volume 64 (0) 2009
    Conference paper
    Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai.
    Multi-level visual secret sharing scheme with smooth-looking.
    Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human 2009, Seoul, Korea, 24-26 November 2009 2009 (0) 2009
    Conference paper
    Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong.
    An improved address ownership in mobile IPv6.
    Computer Communications 2008, Volume 31 (0) 2008
    Conference paper
    Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao.
    A new authentication protocol based on pointer forwarding for mobile communications.
    Wireless Communications and Mobile Computing 2008, Volume 8 (0) 2008
    Journal article
    Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao.
    Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments.
    IEEE Transactions on Industrial Electronics 2006, Volume 53 (0) 2006
    Conference paper
    I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang.
    Identity-based deniable authentication protocol from pairings.
    Proceedings of the Tenth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), Honolulu, Hawaii, USA, August 14-16, 2006 2006 (0) 2006
    Conference paper
    I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang.
    A password authentication scheme over insecure networks.
    J. Comput. Syst. Sci. 2006, Volume 72 (0) 2006
    Conference paper
    Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang.
    Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.
    Applied Mathematics and Computation 2006, Volume 172 (0) 2006
    Conference paper
    Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang.
    Password Authentication Schemes: Current Status and Key Issues.
    I. J. Network Security 2006, Volume 3 (0) 2006
    Conference paper
    Cheng-Chi Lee, Ting Yi Chang, Min-Shiang Hwang.
    A simple broadcasting cryptosystem in computer networks using eXclusive-OR.
    IJCAT 2005, Volume 24 (0) 2005
    Conference paper
    Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, Chao-Chen Yang.
    A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography.
    Telecommunication Systems 2005, Volume 29 (0) 2005
    Conference paper
    Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang.
    A new blind signature based on the discrete logarithm problem for untraceability.
    Applied Mathematics and Computation 2005, Volume 164 (0) 2005
    Conference paper
    Min-Shiang Hwang, Cheng-Chi Lee.
    Research Issues and Challenges for Multiple Digital Signatures.
    I. J. Network Security 2005, Volume 1 (0) 2005
    Conference paper
    Cheng-Ying Yang, Cheng-Chi Lee, Shu-Yin Hsiao.
    Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object.
    I. J. Network Security 2005, Volume 1 (0) 2005
    Conference paper
    Cheng-Chi Lee.
    Two Attacks on the Wu-Hsu User Identification Scheme.
    I. J. Network Security 2005, Volume 1 (0) 2005
    Conference paper
    Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee.
    A key authentication scheme with non-repudiation.
    Operating Systems Review 2004, Volume 38 (0) 2004
    Conference paper
    Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao.
    A server assisted authentication protocol for detecting error vectors.
    Operating Systems Review 2004, Volume 38 (0) 2004
    Show item 1 to 100 of 112  

    Your query returned 112 matches in the database.