Cheng-Chi Lee

From MaRDI portal
Person:445350

Available identifiers

zbMath Open lee.cheng-chiWikidataQ50871375 ScholiaQ50871375MaRDI QIDQ445350

List of research outcomes





PublicationDate of PublicationType
A secure authenticated semi-quantum key distribution scheme for semi-quantum environments2025-01-24Paper
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem2022-07-11Paper
Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme2022-02-16Paper
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment2020-07-15Paper
https://portal.mardi4nfdi.de/entity/Q52378122019-10-25Paper
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem2019-08-15Paper
An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme2019-06-24Paper
https://portal.mardi4nfdi.de/entity/Q46921202018-10-26Paper
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps2018-10-22Paper
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem2017-12-15Paper
CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY2016-08-16Paper
A new three-party-authenticated key agreement scheme based on chaotic maps without password table2015-08-27Paper
An extended chaotic-maps-based protocol with key agreement for multiserver environments2015-08-26Paper
A new proxy signature scheme for a specified group of verifiers2014-08-01Paper
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps2014-02-19Paper
An extended chaotic maps-based key agreement protocol with user anonymity2013-01-04Paper
A BATCH VERIFICATION FOR MULTIPLE PROXY SIGNATURE2012-12-12Paper
TWO ATTACKS ON A TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS2012-12-12Paper
A novel user authentication and privacy preserving scheme with smart cards for wireless communications2012-08-24Paper
IMPROVING TWO NOVEL THREE-PARTY ENCRYPTED KEY EXCHANGE PROTOCOLS WITH PERFECT FORWARD SECRECY2011-01-19Paper
On-line password guessing attack on Lu-Cao key agreement protocol for secure authentication2010-05-14Paper
A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM2009-06-23Paper
An efficient multi-round anonymous auction protocol2008-03-06Paper
A password authentication scheme over insecure networks2006-06-30Paper
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures2006-04-28Paper
A new blind signature based on the discrete logarithm problem for untraceability2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q44735992004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44329632004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44361192003-11-23Paper
A simple remote user authentication scheme2003-10-14Paper
A new key authentication scheme based on discrete logarithms2003-09-09Paper
https://portal.mardi4nfdi.de/entity/Q47965292003-05-14Paper
An improvement of SPLICE/AS in WIDE against guessing attack2002-02-28Paper
https://portal.mardi4nfdi.de/entity/Q47967582002-01-01Paper

Research outcomes over time

This page was built for person: Cheng-Chi Lee