dblp.uni-trier.dewww.uni-trier.de

Wei-Bin Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
26EEHsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen: Enhancement of the RFID security method with ownership transfer. ICUIMC 2009: 251-254
2008
25EETzungher Chen, Wei-Bin Lee: A new method for using hash functions to solve remote user authentication. Computers & Electrical Engineering 34(1): 53-62 (2008)
24EEWei-Bin Lee, Chien-Ding Lee: A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations. IEEE Transactions on Information Technology in Biomedicine 12(1): 34-41 (2008)
23EETzungher Chen, Wei-Bin Lee, Hsing-Bai Chen: A round- and computation-efficient three-party authenticated key exchange protocol. Journal of Systems and Software 81(9): 1581-1590 (2008)
2007
22EEChiung-Chou Tsai, Kuan-Chieh Liao, Tzungher Chen, Wei-Bin Lee: Security enhancement of a novel proxy key generation protocol. COMPSAC (2) 2007: 681-688
21EEChia Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur: A secure protocol for misbehavior-penalization-based fair digital signature exchange. IWCMC 2007: 138-139
20EEWei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur: A novel deniable authentication protocol using generalized ElGamal signature scheme. Inf. Sci. 177(6): 1376-1381 (2007)
2006
19EEWei-Bin Lee, Kuan-Chieh Liao: Improved self-certified group-oriented cryptosystem without a combiner. Journal of Systems and Software 79(4): 502-506 (2006)
2005
18 Tzong-Jye Liu, Chia-Lin Lee, Chyi-Ren Dow, Wei-Bin Lee, Hsing-Bai Chen: Self-Stabilization Neighborhood Synchronizer for Uniform Rings. PDPTA 2005: 346-352
17 Wei-Bin Lee, Hsing-Bai Chen, Chyi-Ren Dow: Remote User Authentication Scheme with User Anonymity. Security and Management 2005: 412-420
16 Wei-Bin Lee, Jia-Hong Li, Chyi-Ren Dow: Efficient Date-Constraint Hierarchical Key Assignment Scheme. Security and Management 2005: 51-57
15EETzungher Chen, Wei-Bin Lee, Gwoboa Horng: Remarks on some signature schemes based on factoring and discrete logarithms. Applied Mathematics and Computation 169(2): 1070-1075 (2005)
14EEWoei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee: An enhanced user authentication scheme for multi-server Internet services. Applied Mathematics and Computation 170(1): 258-266 (2005)
13EEWei-Bin Lee, Chang-Kuo Yeh: A new delegation-based authentication protocol for use in portable communication systems. IEEE Transactions on Wireless Communications 4(1): 57-64 (2005)
2004
12EEWei-Bin Lee, Kuan-Chieh Liao: Constructing identity-based cryptosystems for discrete logarithm based cryptosystems. J. Network and Computer Applications 27(4): 191-199 (2004)
2002
11EEWei-Bin Lee, Tzungher Chen: A public verifiable copy protection technique for still images. Journal of Systems and Software 62(3): 195-204 (2002)
1999
10EEChin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee: Conference key distribution schemes for portable communication systems. Computer Communications 22(12): 1160-1164 (1999)
9EEWei-Bin Lee, Chin-Chen Chang: (t, n) Threshold Digital Signature With Traceability Property. J. Inf. Sci. Eng. 15(5): 669-678 (1999)
8EERen-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang: A concept of designing cheater identification methods for secret sharing. Journal of Systems and Software 46(1): 7-11 (1999)
1998
7EEChin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee: A Scheme for Obtaining a Message from the Digital Multisignature. Public Key Cryptography 1998: 154-163
6EEWei-Bin Lee, Chin-Chen Chang: Authenticity of public keys in asymmetric cryptosystems. Computer Communications 21(2): 195-198 (1998)
5EEWei-Bin Lee, Chin-Chen Chang: Using RSA with low exponent in a public network. Computer Communications 21(3): 284-286 (1998)
1997
4EEWei-Bin Lee, Chin-Chen Chang: Three ID-based information security functions. Computer Communications 20(14): 1301-1307 (1997)
3EEWei-Bin Lee, Chin-Chen Chang: Authenticated Encryption Schemes with Linkage Between Message Blocks. Inf. Process. Lett. 63(5): 247-250 (1997)
1996
2EEWei-Bin Lee, Chin-Chen Chang: Integrating Authentication in Public Key Distribution System. Inf. Process. Lett. 57(1): 49-52 (1996)
1EEWei-Bin Lee, Chin-Chen Chang: On Key Changeable ID-Based Digital Signature Scheme. J. Inf. Sci. Eng. 12(3): 381-386 (1996)

Coauthor Index

1Chin-Chen Chang [1] [2] [3] [4] [5] [6] [7] [8] [9] [10]
2Hsing-Bai Chen [17] [18] [23] [26]
3Tzungher Chen [11] [15] [22] [23] [25]
4Yin-Long Chen [26]
5Chyi-Ren Dow [16] [17] [18]
6Gwoboa Horng [15]
7Pai-Cheng Huang [7] [10]
8Ren-Junn Hwang [8]
9Chia-Lin Lee [18]
10Chien-Ding Lee [24]
11Jyh-Jong Leu [7]
12Jia-Hong Li [16]
13Kuan-Chieh Liao [12] [19] [22]
14Tzong-Jye Liu [18]
15Chiung-Chou Tsai [22]
16Woei-Jiunn Tsaur [14] [20] [21]
17Chia Chun Wu [14] [20] [21]
18Chang-Kuo Yeh [13]
19Yong-Hong Zhao [26]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)