Cheng-Chi Lee
Orcid: 0000-0002-8918-1703
According to our database1,
Cheng-Chi Lee
authored at least 173 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Module lattice based post quantum secure blockchain empowered vehicle to vehicle communication in the internet of vehicles.
Comput. Electr. Eng., 2024
Comput. Electr. Eng., 2024
Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones.
Comput. Electr. Eng., 2024
2023
Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network.
Multim. Tools Appl., September, 2023
Cryptogr., September, 2023
Dataset, August, 2023
Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment.
Future Internet, May, 2023
Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme.
Future Internet, March, 2023
Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms.
Inf., 2023
Strategies to Measure Soil Moisture Using Traditional Methods, Automated Sensors, Remote Sensing, and Machine Learning Techniques: Review, Bibliometric Analysis, Applications, Research Findings, and Future Directions.
IEEE Access, 2023
5GT-GAN: Enhancing Data Augmentation for 5G-Enabled Mobile Edge Computing in Smart Cities.
IEEE Access, 2023
An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks.
IEEE Access, 2023
2022
Performance Measurement System and Quality Management in Data-Driven Industry 4.0: A Review.
Sensors, 2022
LT-FS-ID: Log-Transformed Feature Learning and Feature-Scaling-Based Machine Learning Algorithms to Predict the k-Barriers for Intrusion Detection Using Wireless Sensor Network.
Sensors, 2022
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities.
Sensors, 2022
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications.
Sensors, 2022
Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate.
Inf., 2022
An IoT and machine learning-based routing protocol for reconfigurable engineering application.
IET Commun., 2022
Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks.
Future Internet, 2022
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases.
Future Internet, 2022
An efficient cluster head selection for wireless sensor network-based smart agriculture systems.
Comput. Electron. Agric., 2022
An improved user authentication and key agreement scheme for roaming service in ubiquitous network.
Ann. des Télécommunications, 2022
Image Enhancement and Features Extraction of Electron Microscopic Images Using Sigmoid Function and 2D-DCT.
IEEE Access, 2022
2021
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function.
J. Supercomput., 2021
An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle.
IEEE Syst. J., 2021
ECS-NL: An Enhanced Cuckoo Search Algorithm for Node Localisation in Wireless Sensor Networks.
Sensors, 2021
ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks.
Cryptogr., 2021
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services.
IEEE Access, 2021
An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS.
IEEE Access, 2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
2020
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem.
Soft Comput., 2020
Sensors, 2020
A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing.
Int. J. Commun. Syst., 2020
Effective spam filter based on a hybrid method of header checking and content parsing.
IET Networks, 2020
A Machine Learning Approach to Predict the Average Localization Error With Applications to Wireless Sensor Networks.
IEEE Access, 2020
OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network.
IEEE Access, 2020
A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System.
IEEE Access, 2020
2019
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
Soft Comput., 2019
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment.
Soft Comput., 2019
Inf. Syst. Frontiers, 2019
An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme.
Int. J. Found. Comput. Sci., 2019
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography.
Int. J. Electron. Secur. Digit. Forensics, 2019
Future Gener. Comput. Syst., 2019
2018
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018
Peer-to-Peer Netw. Appl., 2018
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
J. Inf. Sci. Eng., 2018
A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System.
Inf. Technol. Control., 2018
Int. J. Netw. Secur., 2018
IET Networks, 2018
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018
2017
Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
Soft Comput., 2017
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service.
J. Circuits Syst. Comput., 2017
Informatica, 2017
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
Int. J. Electron. Secur. Digit. Forensics, 2017
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
2016
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
Parallel Process. Lett., 2016
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
J. Medical Syst., 2016
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
J. Medical Syst., 2016
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
Inf. Technol. Control., 2016
IEEE Intell. Syst., 2016
Proceedings of the Fifth International Conference on Network, Communication and Computing, 2016
2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multim. Syst., 2015
A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems.
J. Medical Syst., 2015
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
J. Medical Syst., 2015
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
J. Medical Syst., 2015
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015
Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
Int. J. Netw. Secur., 2015
Comput. J., 2015
Proceedings of the IIAI 4th International Congress on Advanced Applied Informatics, 2015
Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics.
Proceedings of the 2015 International Conference on Information Networking, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
Proceedings of the 6th International Conference on Ambient Systems, 2015
2014
Design and analysis of a secure and effective emergency system for mountaineering events.
J. Supercomput., 2014
Telecommun. Syst., 2014
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014
J. Inf. Hiding Multim. Signal Process., 2014
Inf. Technol. Control., 2014
Autom. Softw. Eng., 2014
2013
Wirel. Pers. Commun., 2013
Wirel. Networks, 2013
Towards secure and efficient user authentication scheme using smart card for multi-server environments.
J. Supercomput., 2013
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
Sensors, 2013
Parallel Process. Lett., 2013
J. Medical Syst., 2013
An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.
J. Comput. Methods Sci. Eng., 2013
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
KSII Trans. Internet Inf. Syst., 2013
Inf. Technol. Control., 2013
J. Inf. Secur. Appl., 2013
A simple key agreement scheme based on chaotic maps for VSAT satellite communications.
Int. J. Satell. Commun. Netw., 2013
Int. J. Netw. Secur., 2013
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
Int. J. Netw. Secur., 2013
Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices.
IET Comput. Digit. Tech., 2013
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications.
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
A novel user authentication and privacy preserving scheme with smart cards for wireless communications.
Math. Comput. Model., 2012
Inf. Technol. Control., 2012
A simple and efficient authentication scheme for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2012
Int. J. Commun. Syst., 2012
2011
Telecommun. Syst., 2011
Parallel Process. Lett., 2011
A Practical U-Healthcare Network with Security and QoS.
J. Digit. Inf. Manag., 2011
J. Circuits Syst. Comput., 2011
Inf. Technol. Control., 2011
Int. J. Netw. Secur., 2011
Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme.
Int. J. Netw. Secur., 2011
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards.
Expert Syst. Appl., 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2010
Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings.
J. Digit. Inf. Manag., 2010
Improving Two Novel Three-Party Encrypted Key Exchange Protocols with Perfect Forward Secrecy.
Int. J. Found. Comput. Sci., 2010
Comput. Sci. Inf. Syst., 2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010
On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010
Proceedings of the International Conference on E-Business and E-Government, 2010
On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs.
Proceedings of the Computational Science and Its Applications, 2010
2009
A New Authentication Scheme for Session Initiation Protocol.
J. Digit. Inf. Manag., 2009
Inf. Manag. Comput. Secur., 2009
Int. J. Netw. Secur., 2009
Int. J. Found. Comput. Sci., 2009
IET Image Process., 2009
Ann. des Télécommunications, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
2008
Wirel. Commun. Mob. Comput., 2008
2006
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments.
IEEE Trans. Ind. Electron., 2006
Int. J. Netw. Secur., 2006
Appl. Math. Comput., 2006
Identity-based deniable authentication protocol from pairings.
Proceedings of the Tenth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), 2006
2005
Telecommun. Syst., 2005
Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object.
Int. J. Netw. Secur., 2005
Int. J. Netw. Secur., 2005
Int. J. Comput. Appl. Technol., 2005
Appl. Math. Comput., 2005
2004
ACM SIGOPS Oper. Syst. Rev., 2004
2003
Int. J. Commun. Syst., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Fundam. Informaticae, 2003
Appl. Math. Comput., 2003
Appl. Math. Comput., 2003
2002
ACM SIGOPS Oper. Syst. Rev., 2002
ACM SIGOPS Oper. Syst. Rev., 2002
J. Inf. Sci. Eng., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
1999
A Novel Application of the Phone Card and Its Authentication in Mobile Communications.
J. Inf. Sci. Eng., 1999