Prof. Cheng-Chi Lee (李正吉)
Prof. Cheng-Chi Lee (李正吉)
在 的電子郵件地址已通過驗證 - 首頁
A password authentication scheme over insecure networks
IE Liao, CC Lee, MS Hwang
Journal of Computer and System Sciences 72 (4), 727-740, 2006
Security enhancement on a new authentication scheme with anonymity for wireless environments
CC Lee, MS Hwang, IE Liao
IEEE Transactions on Industrial Electronics 53 (5), 1683-1687, 2006
A simple remote user authentication scheme
MS Hwang, CC Lee, YL Tang
Mathematical and Computer Modelling 36 (1-2), 103-107, 2002
A remote user authentication scheme using hash functions
CC Lee, LH Li, MS Hwang
ACM SIGOPS Operating Systems Review 36 (4), 23-29, 2002
A flexible remote user authentication scheme using smart cards
CC Lee, MS Hwang, WP Yang
ACM SIGOPS Operating Systems Review 36 (3), 46-52, 2002
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
CC Lee, TH Lin, RX Chang
Expert Systems with Applications 38 (11), 13863-13870, 2011
Security enhancement for a dynamic ID-based remote user authentication scheme
IE Liao, CC Lee, MS Hwang
International Conference on Next Generation Web Services Practices (NWeSP'05 …, 2005
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21 (1), 49-60, 2015
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
CC Lee, PS Chung, MS Hwang
IJ Network Security 15 (4), 231-240, 2013
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
CT Li, CC Lee
Mathematical and Computer Modelling 55 (1-2), 35-44, 2012
An extended chaotic maps-based key agreement protocol with user anonymity
CC Lee, CL Chen, CY Wu, SY Huang
Nonlinear Dynamics 69 (1-2), 79-87, 2012
Parking lot management system
CT Chen, LIN Iuon-Chang, CC Lee, WU Shung-Kung, HC Chen, ...
US Patent 8,502,698, 2013
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
CT Li, CY Weng, CC Lee
Sensors 13 (8), 9589-9603, 2013
Extension of authentication protocol for GSM
CC Lee, MS Hwang, WP Yang
IEE Proceedings-Communications 150 (2), 91-95, 2003
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
CC Lee, CT Li, CW Hsu
Nonlinear Dynamics 73 (1-2), 125-132, 2013
Toward a secure batch verification with group testing for VANET
CC Lee, YM Lai
Wireless Networks 19 (6), 1441-1449, 2013
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
CC Lee, CW Hsu
Nonlinear Dynamics 71 (1-2), 201-211, 2013
An improvement of SPLICE/AS in WIDE against guessing attack
MS Hwang, CC Lee, YL Tang
Informatica 12 (2), 297-302, 2001
Mobile device integration of a fingerprint biometric remote authentication scheme
CL Chen, CC Lee, CY Hsu
International Journal of Communication Systems 25 (5), 585-597, 2012
A robust remote user authentication scheme using smart card
CT Li, CC Lee
Information Technology and Control 40 (3), 236-245, 2011
文章 1–20