Chun-Ta Li

According to our database1, Chun-Ta Li authored at least 67 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
An efficient online/offline ID-based short signature procedure using extended chaotic maps.
Soft Comput., 2019

A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography.
IJESDF, 2019

Security enhancement on an RFID ownership transfer protocol based on cloud.
Future Generation Comp. Syst., 2019

2018
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018

Towards secure authenticating of cache in the reader for RFID-based IoT systems.
Peer-to-Peer Networking and Applications, 2018

Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
J. Inf. Sci. Eng., 2018

A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System.
ITC, 2018

An improved E-DRM scheme for mobile environments.
J. Inf. Sec. Appl., 2018

A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps.
IEEE Access, 2018

Robot Identification and Authentication in a Robot Cloud Service System.
IEEE Access, 2018

A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018

Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

2017
A secure key authentication scheme for cryptosystems based on GDLP and IFP.
Soft Comput., 2017

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017

Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys.
I. J. Network Security, 2017

A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
IEEE Access, 2017

On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment.
Proceedings of the Information Science and Applications 2017, 2017

Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017

Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
A secure chaotic maps-based privacy-protection scheme for multi-server environments.
Security and Communication Networks, 2016

Time-bound key-aggregate encryption for cloud storage.
Security and Communication Networks, 2016

A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
Parallel Processing Letters, 2016

A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
J. Medical Systems, 2016

A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
J. Medical Systems, 2016

A CAE Scheme Using ECC Based Self Certified PKC.
JCS, 2016

A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
ITC, 2016

2015
A dynamic identity-based user authentication scheme for remote login systems.
Security and Communication Networks, 2015

A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
J. Medical Systems, 2015

A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
J. Medical Systems, 2015

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015

Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
I. J. Network Security, 2015

A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service.
Proceedings of the 2015 International Conference on Information Networking, 2015

Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics.
Proceedings of the 2015 International Conference on Information Networking, 2015

Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
A practical RFID authentication mechanism for digital television.
Telecommunication Systems, 2014

A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
J. Medical Systems, 2014

Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

2013
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
Sensors, 2013

An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.
J. Comput. Meth. in Science and Engineering, 2013

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
TIIS, 2013

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card.
IET Information Security, 2013

Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
A novel user authentication and privacy preserving scheme with smart cards for wireless communications.
Mathematical and Computer Modelling, 2012

A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications.
ITC, 2012

A simple and efficient authentication scheme for mobile satellite communication systems.
Int. J. Satellite Communications Networking, 2012

A secure routing protocol with node selfishness resistance in MANETs.
IJMC, 2012

2011
Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks.
Parallel Processing Letters, 2011

An Improvement of Remote Authentication and Key Agreement Schemes.
Journal of Circuits, Systems, and Computers, 2011

A Robust Remote User Authentication Scheme Using Smart Card.
ITC, 2011

Secure Smart Card Based Password Authentication Scheme with User Anonymity.
ITC, 2011

A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks.
Inf. Sci., 2011

A Robust Remote User Authentication Scheme against Smart Card Security Breach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
An efficient biometrics-based remote user authentication scheme using smart cards.
J. Network and Computer Applications, 2010

Cryptanalysis of Khan et al.'s dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs.
Proceedings of the Computational Science and Its Applications, 2010

2009
Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks.
I. J. Network Security, 2009

A Secure Billing Protocol for Grid Computing.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Verifiable Electronic Voting Scheme over the Internet.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Improving the Security of Non-PKI Methods for Public Key Distribution.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Syst. Sci. Eng., 2008

An electronic voting protocol with deniable authentication for mobile ad hoc networks.
Computer Communications, 2008

Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments.
Computer Communications, 2008

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks.
Computer Communications, 2008

2007
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period.
Proceedings of the Computational Science and Its Applications, 2007


  Loading...