The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Cheng-Chi Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang
    Two Simple Batch Verifying Multiple Digital Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:233-237 [Conf]
  2. I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang
    Identity-based deniable authentication protocol from pairings. [Citation Graph (0, 0)][DBLP]
    IMSA, 2006, pp:112-114 [Conf]
  3. Min-Shiang Hwang, Cheng-Chi Lee, Shin-Jia Hwang
    Cryptanalysis of the Hwang-Shi Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2002, v:53, n:2, pp:131-134 [Journal]
  4. Cheng-Chi Lee, Wei-Pang Yang, Min-Shiang Hwang
    Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:55, n:3-4, pp:307-320 [Journal]
  5. Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang
    An Improvement of SPLICE/AS in WIDE against Guessing Attack. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2001, v:12, n:2, pp:297-302 [Journal]
  6. I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang
    A password authentication scheme over insecure networks. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:4, pp:727-740 [Journal]
  7. Min-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang
    Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:373-379 [Journal]
  8. Min-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang
    Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:373-379 [Journal]
  9. Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang
    A Novel Application of the Phone Card and Its Authentication in Mobile Communications. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:4, pp:471-484 [Journal]
  10. Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee
    A key authentication scheme with non-repudiation. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:3, pp:75-78 [Journal]
  11. Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao
    A server assisted authentication protocol for detecting error vectors. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:2, pp:93-96 [Journal]
  12. Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang
    A flexible remote user authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:3, pp:46-52 [Journal]
  13. Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang
    A remote user authentication scheme using hash functions. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:23-29 [Journal]
  14. Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, Chao-Chen Yang
    A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2005, v:29, n:3, pp:165-180 [Journal]
  15. Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang
    Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:172, n:2, pp:1195-1200 [Journal]

  16. On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs. [Citation Graph (, )][DBLP]


  17. A spare two-tier data aggregation for grid-based wireless sensor networks. [Citation Graph (, )][DBLP]


  18. Multi-level visual secret sharing scheme with smooth-looking. [Citation Graph (, )][DBLP]


  19. A new authenticated group key agreement in a mobile environment. [Citation Graph (, )][DBLP]


  20. An improved address ownership in mobile IPv6. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002