A secure authentication scheme with anonymity for wireless communications CC Wu, WB Lee, WJ Tsaur IEEE Communications Letters 12 (10), 722-723, 2008 | 245 | 2008 |
A cryptographic key management solution for HIPAA privacy/security regulations WB Lee, CD Lee IEEE Transactions on Information Technology in Biomedicine 12 (1), 34-41, 2008 | 211 | 2008 |
User identification and key distribution maintaining anonymity for distributed computer networks WB Lee, CC Chang Comput Syst Sci Eng 15 (4), 211-214, 2000 | 143 | 2000 |
A publicly verifiable copyright-proving scheme resistant to malicious attacks TH Chen, G Horng, WB Lee IEEE Transactions on industrial electronics 52 (1), 327-334, 2005 | 141 | 2005 |
A smart card-based remote scheme for password authentication in multi-server Internet services WJ Tsaur, CC Wu, WB Lee Computer Standards & Interfaces 27 (1), 39-51, 2004 | 119 | 2004 |
Authenticated encryption scheme without using a one way function WB Lee, CC Chang Electronics letters 31 (19), 1656-1657, 1995 | 117 | 1995 |
A self-verification authentication mechanism for mobile satellite communication systems TH Chen, WB Lee, HB Chen Computers & Electrical Engineering 35 (1), 41-48, 2009 | 107 | 2009 |
A new delegation-based authentication protocol for use in portable communication systems WB Lee, CK Yeh IEEE Transactions on Wireless Communications 4 (1), 57-64, 2005 | 102 | 2005 |
A public verifiable copy protection technique for still images WB Lee, TH Chen Journal of Systems and Software 62 (3), 195-204, 2002 | 94 | 2002 |
An efficient and secure multi-server authentication scheme with key agreement WJ Tsaur, JH Li, WB Lee Journal of Systems and Software 85 (4), 876-882, 2012 | 90 | 2012 |
An enhanced user authentication scheme for multi-server internet services WJ Tsaur, CC Wu, WB Lee Applied Mathematics and Computation 170 (1), 258-266, 2005 | 76 | 2005 |
A round-and computation-efficient three-party authenticated key exchange protocol TH Chen, WB Lee, HB Chen Journal of Systems and Software 81 (9), 1581-1590, 2008 | 74 | 2008 |
A novel deniable authentication protocol using generalized ElGamal signature scheme WB Lee, CC Wu, WJ Tsaur Information Sciences 177 (6), 1376-1381, 2007 | 71 | 2007 |
Visible light communication system technology review: Devices, architectures, and applications TC Yu, WT Huang, WB Lee, CW Chow, SW Chang, HC Kuo Crystals 11 (9), 1098, 2021 | 69 | 2021 |
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks HB Chen, TH Chen, WB Lee, CC Chang Computer Standards & Interfaces 30 (1-2), 95-99, 2008 | 57 | 2008 |
Authenticated encryption schemes with linkage between message blocks WB Lee, CC Chang Information processing letters 63 (5), 247-250, 1997 | 54 | 1997 |
A new method for using hash functions to solve remote user authentication TH Chen, WB Lee Computers & Electrical Engineering 34 (1), 53-62, 2008 | 53 | 2008 |
Enhancement of the RFID security method with ownership transfer HB Chen, WB Lee, YH Zhao, YL Chen Proceedings of the 3rd International Conference on Ubiquitous Information …, 2009 | 48 | 2009 |
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems WB Lee, KC Liao Journal of Network and Computer Applications 27 (4), 191-199, 2004 | 46 | 2004 |
Secure SAS-like password authentication schemes TH Chen, WB Lee, G Horng Computer Standards & Interfaces 27 (1), 25-31, 2004 | 42 | 2004 |