Cheng-Chi Lee

According to our database1, Cheng-Chi Lee authored at least 122 papers between 1999 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography.
IJESDF, 2019

Security enhancement on an RFID ownership transfer protocol based on cloud.
Future Generation Comp. Syst., 2019

A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018

Towards secure authenticating of cache in the reader for RFID-based IoT systems.
Peer-to-Peer Networking and Applications, 2018

Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
J. Inf. Sci. Eng., 2018

A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System.
ITC, 2018

An improved E-DRM scheme for mobile environments.
J. Inf. Sec. Appl., 2018

Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle.
I. J. Network Security, 2018

Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs.
IET Networks, 2018

A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018

Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

A secure key authentication scheme for cryptosystems based on GDLP and IFP.
Soft Comput., 2017

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017

Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service.
Journal of Circuits, Systems, and Computers, 2017

An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP.
Informatica, Lith. Acad. Sci., 2017

A Secure and Efficient One-time Password Authentication Scheme for WSN.
I. J. Network Security, 2017

Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys.
I. J. Network Security, 2017

An improved multi-signature scheme for specified group of verifiers.
IJESDF, 2017

Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Time-bound key-aggregate encryption for cloud storage.
Security and Communication Networks, 2016

A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
Parallel Processing Letters, 2016

A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
J. Medical Systems, 2016

A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
J. Medical Systems, 2016

A CAE Scheme Using ECC Based Self Certified PKC.
JCS, 2016

A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
ITC, 2016

A dynamic identity-based user authentication scheme for remote login systems.
Security and Communication Networks, 2015

A two-factor authentication scheme with anonymity for multi-server environments.
Security and Communication Networks, 2015

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multimedia Syst., 2015

A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems.
J. Medical Systems, 2015

A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
J. Medical Systems, 2015

A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
J. Medical Systems, 2015

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015

Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
I. J. Network Security, 2015

Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks.
Comput. J., 2015

An efficient multiple session key establishment scheme for VANET group integration.
Proceedings of the 2015 IEEE Intelligent Vehicles Symposium, 2015

A Dynamic Key Aggregate Cryptosystem in Cloud Environment.
Proceedings of the IIAI 4th International Congress on Advanced Applied Informatics, 2015

Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics.
Proceedings of the 2015 International Conference on Information Networking, 2015

Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
Proceedings of the 6th International Conference on Ambient Systems, 2015

A new visual cryptography with multi-level encoding.
J. Vis. Lang. Comput., 2014

Design and analysis of a secure and effective emergency system for mountaineering events.
The Journal of Supercomputing, 2014

A practical RFID authentication mechanism for digital television.
Telecommunication Systems, 2014

A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
J. Medical Systems, 2014

A New Public Key Encryption with Conjunctive Field Keyword Search Scheme.
ITC, 2014

Data error locations reported by public auditing in cloud storage service.
Autom. Softw. Eng., 2014

Extension of an Efficient 3GPP Authentication and Key Agreement Protocol.
Wireless Personal Communications, 2013

Toward a secure batch verification with group testing for VANET.
Wireless Networks, 2013

Towards secure and efficient user authentication scheme using smart card for multi-server environments.
The Journal of Supercomputing, 2013

An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
Sensors, 2013

An Authentication Scheme for the Global Mobility Network.
Parallel Processing Letters, 2013

An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps.
J. Medical Systems, 2013

An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.
J. Comput. Meth. in Science and Engineering, 2013

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
TIIS, 2013

A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing.
ITC, 2013

Cryptanalysis of a simple key assignment for access control based on polynomial.
J. Inf. Sec. Appl., 2013

A new proxy signature scheme for a specified group of verifiers.
Inf. Sci., 2013

A simple key agreement scheme based on chaotic maps for VSAT satellite communications.
Int. J. Satellite Communications Networking, 2013

Guessing Attacks on Strong-Password Authentication Protocol.
I. J. Network Security, 2013

A Study of Conjunctive Keyword Searchable Schemes.
I. J. Network Security, 2013

A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
I. J. Network Security, 2013

Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices.
IET Computers & Digital Techniques, 2013

A n2+n MQV key agreement protocol.
Int. Arab J. Inf. Technol., 2013

Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications.
Security and Communication Networks, 2012

A private online system for executing wills based on a secret sharing mechanism.
Security and Communication Networks, 2012

A novel user authentication and privacy preserving scheme with smart cards for wireless communications.
Mathematical and Computer Modelling, 2012

An Improved Delegation-Based Authentication Protocol for PCSs.
ITC, 2012

A simple and efficient authentication scheme for mobile satellite communication systems.
Int. J. Satellite Communications Networking, 2012

Mobile device integration of a fingerprint biometric remote authentication scheme.
Int. J. Communication Systems, 2012

An efficient authentication protocol for mobile communications.
Telecommunication Systems, 2011

A Batch Verification for Multiple Proxy Signature.
Parallel Processing Letters, 2011

Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks.
Parallel Processing Letters, 2011

A Practical U-Healthcare Network with Security and QoS.
JDIM, 2011

An Improvement of Remote Authentication and Key Agreement Schemes.
Journal of Circuits, Systems, and Computers, 2011

A Robust Remote User Authentication Scheme Using Smart Card.
ITC, 2011

A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy.
I. J. Network Security, 2011

Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme.
I. J. Network Security, 2011

On the Security of Self-Certified Public Keys.
IJISP, 2011

A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards.
Expert Syst. Appl., 2011

A Robust Remote User Authentication Scheme against Smart Card Security Breach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings.
JDIM, 2010

Improving Two Novel Three-Party Encrypted Key Exchange Protocols with Perfect Forward Secrecy.
Int. J. Found. Comput. Sci., 2010

A tabular steganography scheme for graphical password authentication.
Comput. Sci. Inf. Syst., 2010

A spare two-tier data aggregation for grid-based wireless sensor networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Cryptanalysis of Khan et al.'s dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

Authenticated Multiple Keys Exchange Protocol Based on Bilinear Pairings.
Proceedings of the International Conference on E-Business and E-Government, 2010

On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs.
Proceedings of the Computational Science and Its Applications, 2010

A New Authentication Scheme for Session Initiation Protocol.
JDIM, 2009

A secure e-auction scheme based on group signatures.
Information Systems Frontiers, 2009

A new English auction scheme using the bulletin board system.
Inf. Manag. Comput. Security, 2009

On Security of An Efficient Nonce-based Authentication Scheme for SIP.
I. J. Network Security, 2009

A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem.
Int. J. Found. Comput. Sci., 2009

A new authenticated group key agreement in a mobile environment.
Annales des Télécommunications, 2009

Multi-level visual secret sharing scheme with smooth-looking.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A new authentication protocol based on pointer forwarding for mobile communications.
Wireless Communications and Mobile Computing, 2008

An improved address ownership in mobile IPv6.
Computer Communications, 2008

Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments.
IEEE Trans. Industrial Electronics, 2006

A password authentication scheme over insecure networks.
J. Comput. Syst. Sci., 2006

Password Authentication Schemes: Current Status and Key Issues.
I. J. Network Security, 2006

Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.
Applied Mathematics and Computation, 2006

Identity-based deniable authentication protocol from pairings.
Proceedings of the Tenth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), 2006

A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography.
Telecommunication Systems, 2005

Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object.
I. J. Network Security, 2005

Two Attacks on the Wu-Hsu User Identification Scheme.
I. J. Network Security, 2005

Research Issues and Challenges for Multiple Digital Signatures.
I. J. Network Security, 2005

A simple broadcasting cryptosystem in computer networks using eXclusive-OR.
IJCAT, 2005

A new blind signature based on the discrete logarithm problem for untraceability.
Applied Mathematics and Computation, 2005

A server assisted authentication protocol for detecting error vectors.
Operating Systems Review, 2004

A key authentication scheme with non-repudiation.
Operating Systems Review, 2004

A new privacy and authentication protocol for end-to-end mobile users.
Int. J. Communication Systems, 2003

Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem.
Fundam. Inform., 2003

A new key authentication scheme based on discrete logarithms.
Applied Mathematics and Computation, 2003

Traceability on RSA-based partially signature with low computation.
Applied Mathematics and Computation, 2003

A remote user authentication scheme using hash functions.
Operating Systems Review, 2002

A flexible remote user authentication scheme using smart cards.
Operating Systems Review, 2002

Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines.
J. Inf. Sci. Eng., 2002

Cryptanalysis of the Hwang-Shi Proxy Signature Scheme.
Fundam. Inform., 2002

An Improvement of SPLICE/AS in WIDE against Guessing Attack.
Informatica, Lith. Acad. Sci., 2001

Two Simple Batch Verifying Multiple Digital Signatures.
Proceedings of the Information and Communications Security, Third International Conference, 2001

A Novel Application of the Phone Card and Its Authentication in Mobile Communications.
J. Inf. Sci. Eng., 1999