Tian-Fu Lee

Orcid: 0000-0002-8454-5803

According to our database1, Tian-Fu Lee authored at least 41 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure and lightweight key agreement protocol for remote surgery over tactile internet using physically unclonable functions.
Peer Peer Netw. Appl., November, 2024

Extended chaotic map-based key management for hierarchical access control in e-medicine systems.
Peer Peer Netw. Appl., March, 2024

2023
Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones.
Internet Things, October, 2023

Security Enhancement of Authentication Scheme for Smart Healthcare Services.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

2022
Enhanced Authenticated Key Agreement for Surgical Applications in a Tactile Internet Environment.
Sensors, 2022

Anonymous Dynamic Group Authenticated Key Agreements Using Physical Unclonable Functions for Internet of Medical Things.
IEEE Internet Things J., 2022

Efficient Extended Chaotic Map-Based IBE for Industrial Environment.
IEEE Access, 2022

Security Analysis of Authentication and Key Agreement for Internet of Drones.
Proceedings of the 6th International Conference on Medical and Health Informatics, 2022

2021
Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things.
J. Inf. Secur. Appl., 2021

Anonymous Group-Oriented Time-Bound Key Agreement for Internet of Medical Things in Telemonitoring Using Chaotic Maps.
IEEE Internet Things J., 2021

A blockchain-based medical data preservation scheme for telecare medical information systems.
Int. J. Inf. Sec., 2021

Measurement Oxygen Saturation Based on Amplitude of Single Wavelength of Photoacoustic Signal from Finger Tips: This establishes the formula to map features of photoacoustic (PA) signals/images with oxygen saturation directly.
Proceedings of the ICMHI 2021: 5th International Conference on Medical and Health Informatics, 2021

A Secure and Efficient Access Control Scheme Based on PUF for Health Information Systems.
Proceedings of the ICMHI 2021: 5th International Conference on Medical and Health Informatics, 2021

2020
Efficient Signature Scheme Using Extended Chaotic Maps for Medical Imaging Records.
Proceedings of the ICMHI 2020: 4th International Conference on Medical and Health Informatics, 2020

2019
An Enhanced Lightweight Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring.
Sensors, 2019

A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems.
Multim. Tools Appl., 2019

Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems.
Proceedings of the third International Conference on Medical and Health Informatics 2019, 2019

An Efficient Date-constraint Hierarchical Key Management Scheme with Fast Key Validation Checking for Mobile Agents in E-Medicine System.
Proceedings of the third International Conference on Medical and Health Informatics 2019, 2019

2018
Provably Secure Anonymous Single-Sign-On Authentication Mechanisms Using Extended Chebyshev Chaotic Maps for Distributed Computer Networks.
IEEE Syst. J., 2018

2017
A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.
Sensors, 2017

2015
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.
Sensors, 2015

Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.
Sensors, 2015

Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.
J. Medical Syst., 2015

Enhancing the security of password authenticated key agreement protocols based on chaotic maps.
Inf. Sci., 2015

2014
Secure Verifier-Based Three-Party Authentication Schemes without Server Public Keys for Data Exchange in Telecare Medicine Information Systems.
J. Medical Syst., 2014

Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.
Comput. Methods Programs Biomed., 2014

2013
Efficient three-party encrypted key exchange using trapdoor functions.
Secur. Commun. Networks, 2013

User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks.
Secur. Commun. Networks, 2013

A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013

Simple Group Password-based Authenticated Key Agreements for the Integrated EPR Information System.
J. Medical Syst., 2013

A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System.
J. Medical Syst., 2013

An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems.
J. Medical Syst., 2013

2011
Provably secure and efficient authentication techniques for the global mobility network.
J. Syst. Softw., 2011

2010
Simple password-based three-party authenticated key exchange without server public keys.
Inf. Sci., 2010

2009
Enhanced delegation-based authentication protocol for PCSs.
IEEE Trans. Wirel. Commun., 2009

Communication-efficient three-party protocols for authentication and key agreement.
Comput. Math. Appl., 2009

2008
Communication-efficient AUTHMAC_DH protocols.
Comput. Stand. Interfaces, 2008

2005
Private Authentication Techniques for the Global Mobility Network.
Wirel. Pers. Commun., 2005

2004
Improved conference key distribution protocol based on a symmetric balanced incomplete block design.
ACM SIGOPS Oper. Syst. Rev., 2004

Enhanced three-party encrypted key exchange without server public keys.
Comput. Secur., 2004

1999
Partition search filter and its performance analysis.
J. Syst. Softw., 1999


  Loading...