The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wei-Bin Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wei-Bin Lee, Hsing-Bai Chen, Chyi-Ren Dow
    Remote User Authentication Scheme with User Anonymity. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:412-420 [Conf]
  2. Wei-Bin Lee, Jia-Hong Li, Chyi-Ren Dow
    Efficient Date-Constraint Hierarchical Key Assignment Scheme. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:51-57 [Conf]
  3. Tzong-Jye Liu, Chia-Lin Lee, Chyi-Ren Dow, Wei-Bin Lee, Hsing-Bai Chen
    Self-Stabilization Neighborhood Synchronizer for Uniform Rings. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2005, pp:346-352 [Conf]
  4. Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee
    A Scheme for Obtaining a Message from the Digital Multisignature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:154-163 [Conf]
  5. Chin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee
    Conference key distribution schemes for portable communication systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:12, pp:1160-1164 [Journal]
  6. Wei-Bin Lee, Chin-Chen Chang
    Three ID-based information security functions. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:14, pp:1301-1307 [Journal]
  7. Wei-Bin Lee, Chin-Chen Chang
    Authenticity of public keys in asymmetric cryptosystems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:195-198 [Journal]
  8. Wei-Bin Lee, Chin-Chen Chang
    Using RSA with low exponent in a public network. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:3, pp:284-286 [Journal]
  9. Wei-Bin Lee, Chin-Chen Chang
    Integrating Authentication in Public Key Distribution System. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:57, n:1, pp:49-52 [Journal]
  10. Wei-Bin Lee, Chin-Chen Chang
    Authenticated Encryption Schemes with Linkage Between Message Blocks. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:63, n:5, pp:247-250 [Journal]
  11. Wei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur
    A novel deniable authentication protocol using generalized ElGamal signature scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:6, pp:1376-1381 [Journal]
  12. Wei-Bin Lee, Chin-Chen Chang
    On Key Changeable ID-Based Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1996, v:12, n:3, pp:381-386 [Journal]
  13. Wei-Bin Lee, Chin-Chen Chang
    (t, n) Threshold Digital Signature With Traceability Property. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:5, pp:669-678 [Journal]
  14. Ren-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang
    A concept of designing cheater identification methods for secret sharing. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1999, v:46, n:1, pp:7-11 [Journal]
  15. Wei-Bin Lee, Tung-Her Chen
    A public verifiable copy protection technique for still images. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:62, n:3, pp:195-204 [Journal]
  16. Wei-Bin Lee, Kuan-Chieh Liao
    Improved self-certified group-oriented cryptosystem without a combiner. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:4, pp:502-506 [Journal]
  17. Chiung-Chou Tsai, Kuan-Chieh Liao, Tzungher Chen, Wei-Bin Lee
    Security enhancement of a novel proxy key generation protocol. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:681-688 [Conf]
  18. Chia Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur
    A secure protocol for misbehavior-penalization-based fair digital signature exchange. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:138-139 [Conf]
  19. Wei-Bin Lee, Kuan-Chieh Liao
    Constructing identity-based cryptosystems for discrete logarithm based cryptosystems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2004, v:27, n:4, pp:191-199 [Journal]

  20. Enhancement of the RFID security method with ownership transfer. [Citation Graph (, )][DBLP]


Search in 0.057secs, Finished in 0.058secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002