A password authentication scheme over insecure networks IE Liao, CC Lee, MS Hwang Journal of Computer and System Sciences 72 (4), 727-740, 2006 | 343 | 2006 |
Security enhancement on a new authentication scheme with anonymity for wireless environments CC Lee, MS Hwang, IE Liao IEEE Transactions on Industrial Electronics 53 (5), 1683-1687, 2006 | 312 | 2006 |
Password authentication schemes: current status and key issues CS Tsai, CC Lee, MS Hwang International Journal of Network Security 3 (2), 101-115, 2006 | 247* | 2006 |
A simple remote user authentication scheme MS Hwang, CC Lee, YL Tang Mathematical and Computer Modelling 36 (1-2), 103-107, 2002 | 230 | 2002 |
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo Multimedia Systems 21 (1), 49-60, 2015 | 228 | 2015 |
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards CC Lee, TH Lin, RX Chang Expert Systems with Applications 38 (11), 13863-13870, 2011 | 205 | 2011 |
Security enhancement for a dynamic ID-based remote user authentication scheme IE Liao, CC Lee, MS Hwang International Conference on Next Generation Web Services Practices (NWeSP'05 …, 2005 | 197 | 2005 |
A flexible remote user authentication scheme using smart cards CC Lee, MS Hwang, WP Yang ACM SIGOPS Operating Systems Review 36 (3), 46-52, 2002 | 195 | 2002 |
A remote user authentication scheme using hash functions CC Lee, LH Li, MS Hwang ACM SIGOPS Operating Systems Review 36 (4), 23-29, 2002 | 189 | 2002 |
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. CC Lee, PS Chung, MS Hwang IJ Network Security 15 (4), 231-240, 2013 | 172 | 2013 |
Toward a secure batch verification with group testing for VANET CC Lee, YM Lai Wireless Networks 19 (6), 1441-1449, 2013 | 158 | 2013 |
A novel user authentication and privacy preserving scheme with smart cards for wireless communications CT Li, CC Lee Mathematical and Computer Modelling 55 (1-2), 35-44, 2012 | 130 | 2012 |
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks CT Li, CY Weng, CC Lee Sensors 13 (8), 9589-9603, 2013 | 113 | 2013 |
An extended chaotic maps-based key agreement protocol with user anonymity CC Lee, CL Chen, CY Wu, SY Huang Nonlinear Dynamics 69 (1), 79-87, 2012 | 101 | 2012 |
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps CC Lee, CW Hsu Nonlinear Dynamics 71 (1), 201-211, 2013 | 97 | 2013 |
Extension of authentication protocol for GSM CC Lee, MS Hwang, WP Yang IEE Proceedings-Communications 150 (2), 91-95, 2003 | 95 | 2003 |
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps CC Lee, CT Li, CW Hsu Nonlinear Dynamics 73 (1), 125-132, 2013 | 90 | 2013 |
Parking lot management system C Chen, LIN Iuon-Chang, C Lee, WU Shung-Kung, HC Chen, ... US Patent 8,502,698, 2013 | 84 | 2013 |
Mobile device integration of a fingerprint biometric remote authentication scheme CL Chen, CC Lee, CY Hsu International Journal of Communication Systems 25 (5), 585-597, 2012 | 81 | 2012 |
An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system CT Li, TY Wu, CL Chen, CC Lee, CM Chen Sensors 17 (7), 1482, 2017 | 71 | 2017 |