Cheng-Chi Lee

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A secure authenticated semi-quantum key distribution scheme for semi-quantum environments
Quantum Information Processing
2025-01-24Paper
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
Soft Computing
2022-07-11Paper
Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme
Journal of Discrete Mathematical Sciences and Cryptography
2022-02-16Paper
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Soft Computing
2020-07-15Paper
Provable secure certificate-based signature scheme from bilinear pairing
 
2019-10-25Paper
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
Soft Computing
2019-08-15Paper
An ElGamal-like secure channel free public key encryption with keyword search scheme
International Journal of Foundations of Computer Science
2019-06-24Paper
scientific article; zbMATH DE number 6966248 (Why is no real title available?)
 
2018-10-26Paper
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
Soft Computing
2018-10-22Paper
A new self-certified convertible authenticated encryption scheme based on discrete logarithm problem
Parallel Processing Letters
2017-12-15Paper
Cryptanalysis and improvement of a proxy signature with message recovery using self-certified public key
Bulletin of the Korean Mathematical Society
2016-08-16Paper
A new three-party-authenticated key agreement scheme based on chaotic maps without password table
Nonlinear Dynamics
2015-08-27Paper
An extended chaotic-maps-based protocol with key agreement for multiserver environments
Nonlinear Dynamics
2015-08-26Paper
A new proxy signature scheme for a specified group of verifiers
Information Sciences
2014-08-01Paper
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
Nonlinear Dynamics
2014-02-19Paper
An extended chaotic maps-based key agreement protocol with user anonymity
Nonlinear Dynamics
2013-01-04Paper
A batch verification for multiple proxy signature
Parallel Processing Letters
2012-12-12Paper
Two attacks on a two-factor user authentication in wireless sensor networks
Parallel Processing Letters
2012-12-12Paper
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
Mathematical and Computer Modelling
2012-08-24Paper
Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy
International Journal of Foundations of Computer Science
2011-01-19Paper
On-line password guessing attack on Lu-Cao key agreement protocol for secure authentication
Journal of Discrete Mathematical Sciences and Cryptography
2010-05-14Paper
A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM
International Journal of Foundations of Computer Science
2009-06-23Paper
An efficient multi-round anonymous auction protocol
Journal of Discrete Mathematical Sciences and Cryptography
2008-03-06Paper
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
2006-06-30Paper
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures
Applied Mathematics and Computation
2006-04-28Paper
A new blind signature based on the discrete logarithm problem for untraceability
Applied Mathematics and Computation
2005-06-13Paper
scientific article; zbMATH DE number 2080695 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 1998329 (Why is no real title available?)
 
2004-02-18Paper
scientific article; zbMATH DE number 2006822 (Why is no real title available?)
 
2003-11-23Paper
A simple remote user authentication scheme
Mathematical and Computer Modelling
2003-10-14Paper
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
2003-09-09Paper
scientific article; zbMATH DE number 1876856 (Why is no real title available?)
 
2003-05-14Paper
An improvement of SPLICE/AS in WIDE against guessing attack
Informatica (Vilnius)
2002-02-28Paper
scientific article; zbMATH DE number 1877162 (Why is no real title available?)
 
2002-01-01Paper


Research outcomes over time


This page was built for person: Cheng-Chi Lee