Chun-Ta Li
Orcid: 0000-0003-0637-5666
According to our database1,
Chun-Ta Li
authored at least 89 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
Low-Temperature Adhesive Hybrid Bonding Technology with Novel Area-Selective Passivation Layer.
Proceedings of the International 3D Systems Integration Conference, 2024
Proceedings of the International 3D Systems Integration Conference, 2024
2023
Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme.
Future Internet, March, 2023
Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms.
Inf., 2023
5GT-GAN: Enhancing Data Augmentation for 5G-Enabled Mobile Edge Computing in Smart Cities.
IEEE Access, 2023
2022
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities.
Sensors, 2022
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications.
Sensors, 2022
Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate.
Inf., 2022
Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks.
Future Internet, 2022
2021
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services.
IEEE Access, 2021
An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS.
IEEE Access, 2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
2020
A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing.
Int. J. Commun. Syst., 2020
A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System.
IEEE Access, 2020
Proceedings of the ICFET 2020, 2020
2019
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
Soft Comput., 2019
An efficient online/offline ID-based short signature procedure using extended chaotic maps.
Soft Comput., 2019
Inf. Syst. Frontiers, 2019
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography.
Int. J. Electron. Secur. Digit. Forensics, 2019
Future Gener. Comput. Syst., 2019
2018
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
Soft Comput., 2018
Peer-to-Peer Netw. Appl., 2018
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.
J. Inf. Sci. Eng., 2018
A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System.
Inf. Technol. Control., 2018
A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps.
IEEE Access, 2018
IEEE Access, 2018
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018
2017
Soft Comput., 2017
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.
Sensors, 2017
Int. J. Netw. Secur., 2017
A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
IEEE Access, 2017
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment.
Proceedings of the Information Science and Applications 2017, 2017
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System".
Proceedings of the Information Science and Applications 2017, 2017
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
2016
Secur. Commun. Networks, 2016
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
Parallel Process. Lett., 2016
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
J. Medical Syst., 2016
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
J. Medical Syst., 2016
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services.
Inf. Technol. Control., 2016
Proceedings of the Fifth International Conference on Network, Communication and Computing, 2016
2015
Secur. Commun. Networks, 2015
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
J. Medical Syst., 2015
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
J. Medical Syst., 2015
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015
Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
Int. J. Netw. Secur., 2015
A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service.
Proceedings of the 2015 International Conference on Information Networking, 2015
Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics.
Proceedings of the 2015 International Conference on Information Networking, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS.
Proceedings of the 6th International Conference on Ambient Systems, 2015
2014
Telecommun. Syst., 2014
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014
J. Inf. Hiding Multim. Signal Process., 2014
Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014
2013
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
Sensors, 2013
An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.
J. Comput. Methods Sci. Eng., 2013
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
KSII Trans. Internet Inf. Syst., 2013
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card.
IET Inf. Secur., 2013
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
A novel user authentication and privacy preserving scheme with smart cards for wireless communications.
Math. Comput. Model., 2012
A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications.
Inf. Technol. Control., 2012
A simple and efficient authentication scheme for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2012
Int. J. Mob. Commun., 2012
2011
Parallel Process. Lett., 2011
J. Circuits Syst. Comput., 2011
Inf. Technol. Control., 2011
Inf. Technol. Control., 2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks.
Inf. Sci., 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2010
J. Netw. Comput. Appl., 2010
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010
On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010
On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs.
Proceedings of the Computational Science and Its Applications, 2010
2009
Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks.
Int. J. Netw. Secur., 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Syst. Sci. Eng., 2008
An electronic voting protocol with deniable authentication for mobile ad hoc networks.
Comput. Commun., 2008
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments.
Comput. Commun., 2008
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks.
Comput. Commun., 2008
2007
Proceedings of the Computational Science and Its Applications, 2007