dblp.uni-trier.dewww.uni-trier.de

Cheng-Chi Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
20EECheng-Chi Lee, Min-Shiang Hwang, Shiang-Feng Tzeng: A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. Int. J. Found. Comput. Sci. 20(2): 351-359 (2009)
2008
19EEMin-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong: An improved address ownership in mobile IPv6. Computer Communications 31(14): 3250-3252 (2008)
18EECheng-Chi Lee, Min-Shiang Hwang, I-En Liao: A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communications and Mobile Computing 8(5): 661-672 (2008)
2006
17 I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang: Identity-based deniable authentication protocol from pairings. IMSA 2006: 112-114
16EEFeng Bao, Cheng-Chi Lee, Min-Shiang Hwang: Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Applied Mathematics and Computation 172(2): 1195-1200 (2006)
15EEI-En Liao, Cheng-Chi Lee, Min-Shiang Hwang: A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4): 727-740 (2006)
2005
14EECheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang: A new blind signature based on the discrete logarithm problem for untraceability. Applied Mathematics and Computation 164(3): 837-841 (2005)
13EECheng-Chi Lee, Ting Yi Chang, Min-Shiang Hwang: A simple broadcasting cryptosystem in computer networks using eXclusive-OR. IJCAT 24(3): 180-183 (2005)
12EEMin-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, Chao-Chen Yang: A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography. Telecommunication Systems 29(3): 165-180 (2005)
2004
11EECheng-Chi Lee, Min-Shiang Hwang, I-En Liao: A server assisted authentication protocol for detecting error vectors. Operating Systems Review 38(2): 93-96 (2004)
10EEMin-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee: A key authentication scheme with non-repudiation. Operating Systems Review 38(3): 75-78 (2004)
2003
9EECheng-Chi Lee, Wei-Pang Yang, Min-Shiang Hwang: Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem. Fundam. Inform. 55(3-4): 307-320 (2003)
2002
8EEMin-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang: Cryptanalysis of the Hwang-Shi Proxy Signature Scheme. Fundam. Inform. 53(2): 131-134 (2002)
7EEMin-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang: Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. J. Inf. Sci. Eng. 18(3): 373-379 (2002)
6EEMin-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang: Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. J. Inf. Sci. Eng. 18(3): 373-379 (2002)
5EECheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang: A flexible remote user authentication scheme using smart cards. Operating Systems Review 36(3): 46-52 (2002)
4EECheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang: A remote user authentication scheme using hash functions. Operating Systems Review 36(4): 23-29 (2002)
2001
3EEMin-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang: Two Simple Batch Verifying Multiple Digital Signatures. ICICS 2001: 233-237
2EEMin-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang: An Improvement of SPLICE/AS in WIDE against Guessing Attack. Informatica, Lith. Acad. Sci. 12(2): 297-302 (2001)
1999
1EECheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang: A Novel Application of the Phone Card and Its Authentication in Mobile Communications. J. Inf. Sci. Eng. 15(4): 471-484 (1999)

Coauthor Index

1Feng Bao [16]
2Ting Yi Chang [6] [7] [13]
3Song-Kong Chong [19]
4Min-Shiang Hwang [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20]
5Shin-Jia Hwang [8]
6Ji-Zhe Lee [12]
7Li-Hua Li [4] [10]
8I-En Liao [11] [15] [17] [18]
9Yuan-Liang Tang [2] [3]
10Shiang-Feng Tzeng [20]
11Chao-Chen Yang [12]
12Wei-Pang Yang [1] [5] [9] [14]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)