Chun-Ta Li

Orcid: 0000-0003-0637-5666

According to our database1, Chun-Ta Li authored at least 86 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme.
Future Internet, March, 2023

Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms.
Inf., 2023

5GT-GAN: Enhancing Data Augmentation for 5G-Enabled Mobile Edge Computing in Smart Cities.
IEEE Access, 2023

2022
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities.
Sensors, 2022

An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications.
Sensors, 2022

Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate.
Inf., 2022

Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks.
Future Internet, 2022

2021
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services.
IEEE Access, 2021

An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS.
IEEE Access, 2021

E-book Circulation System Based on Blockchain.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing.
Int. J. Commun. Syst., 2020

A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System.
IEEE Access, 2020

An IoT-Based Traceable Drug Anti-Counterfeiting Management System.
IEEE Access, 2020

Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process.
Proceedings of the ICFET 2020, 2020

2019
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
Soft Comput., 2019

An efficient online/offline ID-based short signature procedure using extended chaotic maps.
Soft Comput., 2019

A Novel Group Ownership Delegate Protocol for RFID Systems.
Inf. Syst. Frontiers, 2019

A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography.
Int. J. Electron. Secur. Digit. Forensics, 2019

Security enhancement on an RFID ownership transfer protocol based on cloud.
Future Gener. Comput. Syst., 2019

A novel group ownership transfer protocol for RFID systems.
Ad Hoc Networks, 2019

2018
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018

Towards secure authenticating of cache in the reader for RFID-based IoT systems.
Peer-to-Peer Netw. Appl., 2018

Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
J. Inf. Sci. Eng., 2018

A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System.
Inf. Technol. Control., 2018

An improved E-DRM scheme for mobile environments.
J. Inf. Secur. Appl., 2018

A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps.
IEEE Access, 2018

Robot Identification and Authentication in a Robot Cloud Service System.
IEEE Access, 2018

A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018

Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

2017
A secure key authentication scheme for cryptosystems based on GDLP and IFP.
Soft Comput., 2017

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017

Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys.
Int. J. Netw. Secur., 2017

A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
IEEE Access, 2017

On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment.
Proceedings of the Information Science and Applications 2017, 2017

Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017

Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
A secure chaotic maps-based privacy-protection scheme for multi-server environments.
Secur. Commun. Networks, 2016

Time-bound key-aggregate encryption for cloud storage.
Secur. Commun. Networks, 2016

A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
Parallel Process. Lett., 2016

A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
J. Medical Syst., 2016

A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
J. Medical Syst., 2016

A CAE Scheme Using ECC Based Self Certified PKC.
J. Comput. Sci., 2016

A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
Inf. Technol. Control., 2016

Cryptanalysis of Dimitriou's Key Evolving RFID Systems.
Proceedings of the Fifth International Conference on Network, Communication and Computing, 2016

2015
A dynamic identity-based user authentication scheme for remote login systems.
Secur. Commun. Networks, 2015

A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
J. Medical Syst., 2015

A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
J. Medical Syst., 2015

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015

Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
Int. J. Netw. Secur., 2015

A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service.
Proceedings of the 2015 International Conference on Information Networking, 2015

Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics.
Proceedings of the 2015 International Conference on Information Networking, 2015

Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
A practical RFID authentication mechanism for digital television.
Telecommun. Syst., 2014

A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014

A Novel Frequency Billing Service in Digital Television System.
J. Inf. Hiding Multim. Signal Process., 2014

Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

2013
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
Sensors, 2013

An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.
J. Comput. Methods Sci. Eng., 2013

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
KSII Trans. Internet Inf. Syst., 2013

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card.
IET Inf. Secur., 2013

Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
A novel user authentication and privacy preserving scheme with smart cards for wireless communications.
Math. Comput. Model., 2012

A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications.
Inf. Technol. Control., 2012

A simple and efficient authentication scheme for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2012

A secure routing protocol with node selfishness resistance in MANETs.
Int. J. Mob. Commun., 2012

2011
Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks.
Parallel Process. Lett., 2011

An Improvement of Remote Authentication and Key Agreement Schemes.
J. Circuits Syst. Comput., 2011

A Robust Remote User Authentication Scheme Using Smart Card.
Inf. Technol. Control., 2011

Secure Smart Card Based Password Authentication Scheme with User Anonymity.
Inf. Technol. Control., 2011

A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks.
Inf. Sci., 2011

A Robust Remote User Authentication Scheme against Smart Card Security Breach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
An efficient biometrics-based remote user authentication scheme using smart cards.
J. Netw. Comput. Appl., 2010

Cryptanalysis of Khan et al.'s dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs.
Proceedings of the Computational Science and Its Applications, 2010

2009
Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks.
Int. J. Netw. Secur., 2009

A Secure Billing Protocol for Grid Computing.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Verifiable Electronic Voting Scheme over the Internet.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Improving the Security of Non-PKI Methods for Public Key Distribution.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Syst. Sci. Eng., 2008

An electronic voting protocol with deniable authentication for mobile ad hoc networks.
Comput. Commun., 2008

Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments.
Comput. Commun., 2008

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks.
Comput. Commun., 2008

2007
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period.
Proceedings of the Computational Science and Its Applications, 2007


  Loading...