Chun-Ta Li
Chun-Ta Li
Professor, Department of Information Management, Tainan University of Technology
Verified email at mail.tut.edu.tw - Homepage
Title
Cited by
Cited by
Year
An efficient biometrics-based remote user authentication scheme using smart cards
CT Li, MS Hwang
Journal of Network and computer applications 33 (1), 1-5, 2010
5892010
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
CT Li, MS Hwang, YP Chu
Computer Communications 31 (12), 2803-2814, 2008
2862008
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
CT Li, CC Lee
Mathematical and Computer Modelling 55 (1-2), 35-44, 2012
1342012
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
CT Li, CY Weng, CC Lee
Sensors 13 (8), 9589-9603, 2013
1202013
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
CT Li
IET Information Security 7 (1), 3-10, 2013
952013
Challenges in e-government and security of information
MS Hwang, CT Li, JJ Shen, YP Chu
Information & Security 15 (1), 9-20, 2004
932004
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
CC Lee, CT Li, CW Hsu
Nonlinear Dynamics 73 (1), 125-132, 2013
912013
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
CT Li, TY Wu, CL Chen, CC Lee, CM Chen
Sensors 17 (7), 1482, 2017
852017
An electronic voting protocol with deniable authentication for mobile ad hoc networks
CT Li, MS Hwang, CY Liu
Computer Communications 31 (10), 2534-2540, 2008
742008
An extended chaotic-maps-based protocol with key agreement for multiserver environments
CC Lee, DC Lou, CT Li, CW Hsu
Nonlinear Dynamics 76 (1), 853-866, 2014
682014
A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
CT Li, CC Lee, CY Weng
Journal of medical systems 38 (9), 1-11, 2014
672014
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
CT Li, MS Hwang
Information Sciences 181 (23), 5333-5347, 2011
602011
An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
CT Li, MS Hwang, YP Chu
International Journal of Innovative Computing, Information and Control 5 (8 …, 2009
602009
A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system
CT Li, CY Weng, CC Lee
Journal of medical systems 39 (8), 77, 2015
592015
A robust remote user authentication scheme using smart card
CT Li, CC Lee
Information Technology and Control 40 (3), 236-245, 2011
552011
A secure cloud-assisted wireless body area network in mobile emergency medical care system
CT Li, CC Lee, CY Weng
Journal of medical systems 40 (5), 117, 2016
542016
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
CT Li, CC Lee, CY Weng
Nonlinear Dynamics 74 (4), 1133-1143, 2013
532013
An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards
CT Li, MS Hwang
network 3 (4), 5, 2010
532010
A simple and efficient authentication scheme for mobile satellite communication systems
CC Lee, CT Li, RX Chang
International Journal of Satellite Communications and Networking 30 (1), 29-38, 2012
512012
An extended multi-server-based user authentication and key agreement scheme with user anonymity
CT Li, CC Lee, CY Weng, CI Fan
KSII Transactions on Internet and Information Systems (TIIS) 7 (1), 119-131, 2013
482013
The system can't perform the operation now. Try again later.
Articles 1–20