Cheng-Chi Lee

Orcid: 0000-0002-8918-1703

According to our database1, Cheng-Chi Lee authored at least 169 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network.
Multim. Tools Appl., September, 2023

Privacy-Preserving Techniques in Cloud/Fog and Internet of Things.
Cryptogr., September, 2023

Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment.
Future Internet, May, 2023

Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme.
Future Internet, March, 2023

Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms.
Inf., 2023

Strategies to Measure Soil Moisture Using Traditional Methods, Automated Sensors, Remote Sensing, and Machine Learning Techniques: Review, Bibliometric Analysis, Applications, Research Findings, and Future Directions.
IEEE Access, 2023

5GT-GAN: Enhancing Data Augmentation for 5G-Enabled Mobile Edge Computing in Smart Cities.
IEEE Access, 2023

An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks.
IEEE Access, 2023

2022
Performance Measurement System and Quality Management in Data-Driven Industry 4.0: A Review.
Sensors, 2022

LT-FS-ID: Log-Transformed Feature Learning and Feature-Scaling-Based Machine Learning Algorithms to Predict the k-Barriers for Intrusion Detection Using Wireless Sensor Network.
Sensors, 2022

Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities.
Sensors, 2022

An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications.
Sensors, 2022

Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate.
Inf., 2022

An IoT and machine learning-based routing protocol for reconfigurable engineering application.
IET Commun., 2022

Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks.
Future Internet, 2022

Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases.
Future Internet, 2022

An efficient cluster head selection for wireless sensor network-based smart agriculture systems.
Comput. Electron. Agric., 2022

An improved user authentication and key agreement scheme for roaming service in ubiquitous network.
Ann. des Télécommunications, 2022

Image Enhancement and Features Extraction of Electron Microscopic Images Using Sigmoid Function and 2D-DCT.
IEEE Access, 2022

2021
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function.
J. Supercomput., 2021

An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle.
IEEE Syst. J., 2021

ECS-NL: An Enhanced Cuckoo Search Algorithm for Node Localisation in Wireless Sensor Networks.
Sensors, 2021

Palm Vein Recognition Based on Convolutional Neural Network.
Informatica, 2021

ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks.
Cryptogr., 2021

A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services.
IEEE Access, 2021

An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS.
IEEE Access, 2021

E-book Circulation System Based on Blockchain.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem.
Soft Comput., 2020

Security and Privacy in Wireless Sensor Networks: Advances and Challenges.
Sensors, 2020

An Efficient Mobile-Healthcare Emergency Framework.
J. Medical Syst., 2020

A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing.
Int. J. Commun. Syst., 2020

Effective spam filter based on a hybrid method of header checking and content parsing.
IET Networks, 2020

A Machine Learning Approach to Predict the Average Localization Error With Applications to Wireless Sensor Networks.
IEEE Access, 2020

OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network.
IEEE Access, 2020

A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System.
IEEE Access, 2020

2019
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
Soft Comput., 2019

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment.
Soft Comput., 2019

A Novel Group Ownership Delegate Protocol for RFID Systems.
Inf. Syst. Frontiers, 2019

An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme.
Int. J. Found. Comput. Sci., 2019

A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography.
Int. J. Electron. Secur. Digit. Forensics, 2019

Security enhancement on an RFID ownership transfer protocol based on cloud.
Future Gener. Comput. Syst., 2019

A novel group ownership transfer protocol for RFID systems.
Ad Hoc Networks, 2019

2018
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018

Towards secure authenticating of cache in the reader for RFID-based IoT systems.
Peer-to-Peer Netw. Appl., 2018

Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
J. Inf. Sci. Eng., 2018

A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System.
Inf. Technol. Control., 2018

An improved E-DRM scheme for mobile environments.
J. Inf. Secur. Appl., 2018

Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle.
Int. J. Netw. Secur., 2018

Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs.
IET Networks, 2018

A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018

Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

2017
Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

A secure key authentication scheme for cryptosystems based on GDLP and IFP.
Soft Comput., 2017

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017

Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service.
J. Circuits Syst. Comput., 2017

An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP.
Informatica, 2017

A Secure and Efficient One-time Password Authentication Scheme for WSN.
Int. J. Netw. Secur., 2017

Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys.
Int. J. Netw. Secur., 2017

An improved multi-signature scheme for specified group of verifiers.
Int. J. Electron. Secur. Digit. Forensics, 2017

Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017

Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Time-bound key-aggregate encryption for cloud storage.
Secur. Commun. Networks, 2016

A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
Parallel Process. Lett., 2016

A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
J. Medical Syst., 2016

A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
J. Medical Syst., 2016

A CAE Scheme Using ECC Based Self Certified PKC.
J. Comput. Sci., 2016

A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
Inf. Technol. Control., 2016

An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration.
IEEE Intell. Syst., 2016

Cryptanalysis of Dimitriou's Key Evolving RFID Systems.
Proceedings of the Fifth International Conference on Network, Communication and Computing, 2016

2015
A dynamic identity-based user authentication scheme for remote login systems.
Secur. Commun. Networks, 2015

A two-factor authentication scheme with anonymity for multi-server environments.
Secur. Commun. Networks, 2015

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multim. Syst., 2015

A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems.
J. Medical Syst., 2015

A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
J. Medical Syst., 2015

A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
J. Medical Syst., 2015

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015

Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
Int. J. Netw. Secur., 2015

Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks.
Comput. J., 2015

A Dynamic Key Aggregate Cryptosystem in Cloud Environment.
Proceedings of the IIAI 4th International Congress on Advanced Applied Informatics, 2015

Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics.
Proceedings of the 2015 International Conference on Information Networking, 2015

Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
A new visual cryptography with multi-level encoding.
J. Vis. Lang. Comput., 2014

Design and analysis of a secure and effective emergency system for mountaineering events.
J. Supercomput., 2014

A practical RFID authentication mechanism for digital television.
Telecommun. Syst., 2014

A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014

A Novel Frequency Billing Service in Digital Television System.
J. Inf. Hiding Multim. Signal Process., 2014

A New Public Key Encryption with Conjunctive Field Keyword Search Scheme.
Inf. Technol. Control., 2014

Data error locations reported by public auditing in cloud storage service.
Autom. Softw. Eng., 2014

2013
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol.
Wirel. Pers. Commun., 2013

Toward a secure batch verification with group testing for VANET.
Wirel. Networks, 2013

Towards secure and efficient user authentication scheme using smart card for multi-server environments.
J. Supercomput., 2013

An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
Sensors, 2013

An Authentication Scheme for the Global Mobility Network.
Parallel Process. Lett., 2013

An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps.
J. Medical Syst., 2013

An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.
J. Comput. Methods Sci. Eng., 2013

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
KSII Trans. Internet Inf. Syst., 2013

A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing.
Inf. Technol. Control., 2013

Cryptanalysis of a simple key assignment for access control based on polynomial.
J. Inf. Secur. Appl., 2013

A new proxy signature scheme for a specified group of verifiers.
Inf. Sci., 2013

A simple key agreement scheme based on chaotic maps for VSAT satellite communications.
Int. J. Satell. Commun. Netw., 2013

Guessing Attacks on Strong-Password Authentication Protocol.
Int. J. Netw. Secur., 2013

A Study of Conjunctive Keyword Searchable Schemes.
Int. J. Netw. Secur., 2013

A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
Int. J. Netw. Secur., 2013

Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices.
IET Comput. Digit. Tech., 2013

A n2+n MQV key agreement protocol.
Int. Arab J. Inf. Technol., 2013

Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications.
Secur. Commun. Networks, 2012

A private online system for executing wills based on a secret sharing mechanism.
Secur. Commun. Networks, 2012

A novel user authentication and privacy preserving scheme with smart cards for wireless communications.
Math. Comput. Model., 2012

An Improved Delegation-Based Authentication Protocol for PCSs.
Inf. Technol. Control., 2012

A simple and efficient authentication scheme for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2012

Mobile device integration of a fingerprint biometric remote authentication scheme.
Int. J. Commun. Syst., 2012

2011
An efficient authentication protocol for mobile communications.
Telecommun. Syst., 2011

A Batch Verification for Multiple Proxy Signature.
Parallel Process. Lett., 2011

Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks.
Parallel Process. Lett., 2011

A Practical U-Healthcare Network with Security and QoS.
J. Digit. Inf. Manag., 2011

An Improvement of Remote Authentication and Key Agreement Schemes.
J. Circuits Syst. Comput., 2011

A Robust Remote User Authentication Scheme Using Smart Card.
Inf. Technol. Control., 2011

A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy.
Int. J. Netw. Secur., 2011

Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme.
Int. J. Netw. Secur., 2011

On the Security of Self-Certified Public Keys.
Int. J. Inf. Secur. Priv., 2011

A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards.
Expert Syst. Appl., 2011

A Robust Remote User Authentication Scheme against Smart Card Security Breach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings.
J. Digit. Inf. Manag., 2010

Improving Two Novel Three-Party Encrypted Key Exchange Protocols with Perfect Forward Secrecy.
Int. J. Found. Comput. Sci., 2010

A tabular steganography scheme for graphical password authentication.
Comput. Sci. Inf. Syst., 2010

A spare two-tier data aggregation for grid-based wireless sensor networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Cryptanalysis of Khan et al.'s dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

Authenticated Multiple Keys Exchange Protocol Based on Bilinear Pairings.
Proceedings of the International Conference on E-Business and E-Government, 2010

On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs.
Proceedings of the Computational Science and Its Applications, 2010

2009
A New Authentication Scheme for Session Initiation Protocol.
J. Digit. Inf. Manag., 2009

A secure e-auction scheme based on group signatures.
Inf. Syst. Frontiers, 2009

A new English auction scheme using the bulletin board system.
Inf. Manag. Comput. Secur., 2009

On Security of An Efficient Nonce-based Authentication Scheme for SIP.
Int. J. Netw. Secur., 2009

A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem.
Int. J. Found. Comput. Sci., 2009

A new steganographic scheme based on vector quantisation and search-order coding.
IET Image Process., 2009

A new authenticated group key agreement in a mobile environment.
Ann. des Télécommunications, 2009

Multi-level visual secret sharing scheme with smooth-looking.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
A new authentication protocol based on pointer forwarding for mobile communications.
Wirel. Commun. Mob. Comput., 2008

An improved address ownership in mobile IPv6.
Comput. Commun., 2008

2006
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments.
IEEE Trans. Ind. Electron., 2006

A password authentication scheme over insecure networks.
J. Comput. Syst. Sci., 2006

Password Authentication Schemes: Current Status and Key Issues.
Int. J. Netw. Secur., 2006

Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.
Appl. Math. Comput., 2006

Identity-based deniable authentication protocol from pairings.
Proceedings of the Tenth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), 2006

2005
A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography.
Telecommun. Syst., 2005

Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object.
Int. J. Netw. Secur., 2005

Two Attacks on the Wu-Hsu User Identification Scheme.
Int. J. Netw. Secur., 2005

Research Issues and Challenges for Multiple Digital Signatures.
Int. J. Netw. Secur., 2005

A simple broadcasting cryptosystem in computer networks using eXclusive-OR.
Int. J. Comput. Appl. Technol., 2005

A new blind signature based on the discrete logarithm problem for untraceability.
Appl. Math. Comput., 2005

2004
A server assisted authentication protocol for detecting error vectors.
ACM SIGOPS Oper. Syst. Rev., 2004

A key authentication scheme with non-repudiation.
ACM SIGOPS Oper. Syst. Rev., 2004

2003
A new privacy and authentication protocol for end-to-end mobile users.
Int. J. Commun. Syst., 2003

An Untraceable Blind Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Traceability on Stadler et al.'s Fair Blind Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem.
Fundam. Informaticae, 2003

A new key authentication scheme based on discrete logarithms.
Appl. Math. Comput., 2003

Traceability on RSA-based partially signature with low computation.
Appl. Math. Comput., 2003

2002
A remote user authentication scheme using hash functions.
ACM SIGOPS Oper. Syst. Rev., 2002

A flexible remote user authentication scheme using smart cards.
ACM SIGOPS Oper. Syst. Rev., 2002

Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines.
J. Inf. Sci. Eng., 2002

Traceability on Low-Computation Partially Blind Signatures for Electronic Cash.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Cryptanalysis of the Hwang-Shi Proxy Signature Scheme.
Fundam. Informaticae, 2002

2001
An Improvement of SPLICE/AS in WIDE against Guessing Attack.
Informatica, 2001

Two Simple Batch Verifying Multiple Digital Signatures.
Proceedings of the Information and Communications Security, Third International Conference, 2001

1999
A Novel Application of the Phone Card and Its Authentication in Mobile Communications.
J. Inf. Sci. Eng., 1999


  Loading...