Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Chun-Ta
    Last name: Li
    DBLP: 95/1180
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 51  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Conference paper
    Chien-Ming Chen, Chun-Ta Li, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan.
    A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
    IEEE Access 2017, Volume 5 (0) 2017
    Conference paper
    Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen.
    Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
    Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng.
    A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
    J. Medical Systems 2016, Volume 40 (0) 2016
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-der Chen.
    Time-bound key-aggregate encryption for cloud storage.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Chun-Ta Li.
    A secure chaotic maps-based privacy-protection scheme for multi-server environments.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Shih-Ting Chiu.
    A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
    ITC 2016, Volume 45 (0) 2016
    Conference paper
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
    Parallel Processing Letters 2016, Volume 26 (0) 2016
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Song-Jhih Chen.
    A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
    J. Medical Systems 2016, Volume 40 (0) 2016
    Journal article
    Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li.
    A CAE Scheme Using ECC Based Self Certified PKC.
    JCS 2016, Volume 12 (0) 2016
    Journal article
    Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li.
    Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Chun-Ta Li, Chin-Wen Lee, Jau-Ji Shen.
    A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service.
    2015 International Conference on Information Networking, ICOIN 2015, Siem Reap, Cambodia, January 12-14, 2015 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang.
    Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics.
    2015 International Conference on Information Networking, ICOIN 2015, Siem Reap, Cambodia, January 12-14, 2015 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee.
    A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang.
    Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
    Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies (ANT 2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015), London, UK, June 2-5, 2015 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang.
    A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan.
    A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
    J. Inf. Sci. Eng. 2015, Volume 31 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen.
    Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments.
    Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng.
    A dynamic identity-based user authentication scheme for remote login systems.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Conference paper
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng.
    A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
    J. Medical Systems 2014, Volume 38 (0) 2014
    Conference paper
    Chun-Ta Li, Jau-Ji Shen, Chin-Wen Lee.
    Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services.
    Internet of Vehicles - Technologies and Services - First International Conference, IOV, Beijing, China, September 1-3, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Cheng-Chi Lee, Chi-Tung Chen, Chun-Ta Li, Ping-Hsien Wu.
    A practical RFID authentication mechanism for digital television.
    Telecommunication Systems 2014, Volume 57 (0) 2014
    Journal article
    Chun-Ta Li.
    A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card.
    IET Information Security 2013, Volume 7 (0) 2013
    Journal article
    Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan.
    An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
    TIIS 2013, Volume 7 (0) 2013
    Conference paper
    Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu.
    Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
    Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings 2013 (0) 2013
    Show item 1 to 25 of 51  

    Your query returned 51 matches in the database.