default search action
Chun-Ta Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j63]Chandrasen Pandey, Vaibhav Tiwari, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee, Diptendu Sinha Roy:
5GT-GAN: Enhancing Data Augmentation for 5G-Enabled Mobile Edge Computing in Smart Cities. IEEE Access 11: 120983-120996 (2023) - [j62]Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, Chun-Ta Li:
Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme. Future Internet 15(3): 99 (2023) - [j61]Joseph Isabona, Agbotiname Lucky Imoize, Oluwasayo Akinloye Akinwumi, Okiemute Roberts Omasheye, Emughedi Oghu, Cheng-Chi Lee, Chun-Ta Li:
Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms. Inf. 14(11): 621 (2023) - 2022
- [j60]Okiemute Roberts Omasheye, Samuel Azi, Joseph Isabona, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee:
Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks. Future Internet 14(12): 373 (2022) - [j59]Joseph Isabona, Agbotiname Lucky Imoize, Stephen Ojo, Cheng-Chi Lee, Chun-Ta Li:
Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate. Inf. 13(3): 141 (2022) - [j58]Umesh Kumar Lilhore, Agbotiname Lucky Imoize, Chun-Ta Li, Sarita Simaiya, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar Rana, Cheng-Chi Lee:
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities. Sensors 22(8): 2908 (2022) - [j57]Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng, Agbotiname Lucky Imoize:
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications. Sensors 22(23): 9534 (2022) - 2021
- [j56]Vishesh P. Gaikwad, Jitendra V. Tembhurne, Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li:
An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS. IEEE Access 9: 108586-108600 (2021) - [j55]Chi-Yao Weng, Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng:
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services. IEEE Access 9: 145522-145537 (2021) - [c23]Cheng-Chi Lee, Chung-Wei Li, Chun-Ta Li, Chin-Ling Chen:
E-book Circulation System Based on Blockchain. CSCI 2021: 615-619 - 2020
- [j54]Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, Chin-Ling Chen, Cheng-Chi Lee:
A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System. IEEE Access 8: 173904-173917 (2020) - [j53]Chin-Ling Chen, Yong-Yuan Deng, Chun-Ta Li, Shunzhi Zhu, Yi-Jui Chiu, Peizhi Chen:
An IoT-Based Traceable Drug Anti-Counterfeiting Management System. IEEE Access 8: 224532-224548 (2020) - [j52]Chandrashekhar Meshram, Cheng-Chi Lee, Abhay S. Ranadive, Chun-Ta Li, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne:
A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int. J. Commun. Syst. 33(7) (2020) - [c22]Chi-Yao Weng, Cheng-Hsing Yang, Guang-Yih Hsu, Rong-Jaye Chen, Chun-Ta Li:
Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process. ICFET 2020: 108-112
2010 – 2019
- 2019
- [j51]Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
A novel group ownership transfer protocol for RFID systems. Ad Hoc Networks 91 (2019) - [j50]Cheng-Chi Lee, Shun-der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
Security enhancement on an RFID ownership transfer protocol based on cloud. Future Gener. Comput. Syst. 93: 266-277 (2019) - [j49]Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Shun-Der Chen, Yan-Ming Lai:
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography. Int. J. Electron. Secur. Digit. Forensics 11(1): 96-117 (2019) - [j48]Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, Athanasios V. Vasilakos:
A Novel Group Ownership Delegate Protocol for RFID Systems. Inf. Syst. Frontiers 21(5): 1153-1166 (2019) - [j47]Chandrashekhar Meshram, Chun-Ta Li, Sarita Gajbhiye Meshram:
An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput. 23(3): 747-753 (2019) - [j46]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Chun-Ta Li:
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput. 23(16): 6937-6946 (2019) - 2018
- [j45]Chin-Ling Chen, Yanting Li, Yong-Yuan Deng, Chun-Ta Li:
Robot Identification and Authentication in a Robot Cloud Service System. IEEE Access 6: 56488-56503 (2018) - [j44]Chun-Ta Li, Tsu-Yang Wu, Chien-Ming Chen:
A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps. IEEE Access 6: 66742-66753 (2018) - [j43]Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai, Jiann-Cherng Shieh:
An improved E-DRM scheme for mobile environments. J. Inf. Secur. Appl. 39: 19-30 (2018) - [j42]Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai:
A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System. Inf. Technol. Control. 47(2): 262-274 (2018) - [j41]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks. J. Inf. Sci. Eng. 34(1): 155-170 (2018) - [j40]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen:
Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw. Appl. 11(1): 198-208 (2018) - [j39]Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen:
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput. 22(8): 2495-2506 (2018) - [c21]Cheng-Chi Lee, Shun-der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud. CSCloud/EdgeCom 2018: 134-139 - [c20]Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee:
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System. IOV 2018: 278-288 - 2017
- [j38]Chien-Ming Chen, Chun-Ta Li, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan:
A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System. IEEE Access 5: 3410-3422 (2017) - [j37]Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li:
Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys. Int. J. Netw. Secur. 19(3): 340-346 (2017) - [j36]Chun-Ta Li, Tsu-Yang Wu, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen:
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors 17(7): 1482 (2017) - [j35]Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen:
A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput. 21(24): 7285-7291 (2017) - [c19]Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen:
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems. GPC 2017: 116-126 - [c18]Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang:
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment. ICISA 2017: 241-248 - [c17]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen:
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System". ICISA 2017: 282-289 - 2016
- [j34]Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Shih-Ting Chiu:
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services. Inf. Technol. Control. 45(3): 289-299 (2016) - [j33]Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li:
A CAE Scheme Using ECC Based Self Certified PKC. J. Comput. Sci. 12(11): 527-533 (2016) - [j32]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System. J. Medical Syst. 40(5): 117:1-117:15 (2016) - [j31]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Song-Jhih Chen:
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems. J. Medical Syst. 40(11): 233:1-233:10 (2016) - [j30]Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li:
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem. Parallel Process. Lett. 26(4): 1650018:1-1650018:10 (2016) - [j29]Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-der Chen:
Time-bound key-aggregate encryption for cloud storage. Secur. Commun. Networks 9(13): 2059-2069 (2016) - [j28]Chun-Ta Li:
A secure chaotic maps-based privacy-protection scheme for multi-server environments. Secur. Commun. Networks 9(14): 2276-2290 (2016) - [c16]Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li:
Cryptanalysis of Dimitriou's Key Evolving RFID Systems. ICNCC 2016: 229-233 - 2015
- [j27]Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li:
Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol. Int. J. Netw. Secur. 17(1): 1-6 (2015) - [j26]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. J. Inf. Sci. Eng. 31(6): 1975-1992 (2015) - [j25]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee:
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System. J. Medical Syst. 39(8): 77 (2015) - [j24]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang:
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System. J. Medical Syst. 39(11): 144:1-144:11 (2015) - [j23]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A dynamic identity-based user authentication scheme for remote login systems. Secur. Commun. Networks 8(18): 3372-3382 (2015) - [c15]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang:
Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS. ANT/SEIT 2015: 21-28 - [c14]Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen:
Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments. ICA3PP (Workshops and Symposiums) 2015: 435-444 - [c13]Chun-Ta Li, Chin-Wen Lee, Jau-Ji Shen:
A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service. ICOIN 2015: 31-36 - [c12]Chun-Ta Li, Cheng-Chi Lee, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang:
Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. ICOIN 2015: 498-502 - 2014
- [j22]Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu:
A Novel Frequency Billing Service in Digital Television System. J. Inf. Hiding Multim. Signal Process. 5(3): 439-450 (2014) - [j21]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(9): 77 (2014) - [j20]Cheng-Chi Lee, Chi-Tung Chen, Chun-Ta Li, Ping-Hsien Wu:
A practical RFID authentication mechanism for digital television. Telecommun. Syst. 57(3): 239-246 (2014) - [c11]Chun-Ta Li, Jau-Ji Shen, Chin-Wen Lee:
Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services. IOV 2014: 367-375 - 2013
- [j19]Chun-Ta Li:
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf. Secur. 7(1): 3-10 (2013) - [j18]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Trans. Internet Inf. Syst. 7(1): 119-131 (2013) - [j17]Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang:
An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol. J. Comput. Methods Sci. Eng. 13(5-6): 455-460 (2013) - [j16]Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee:
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks. Sensors 13(8): 9589-9603 (2013) - [c10]Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu:
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards. CSS 2013: 338-348 - 2012
- [j15]Chun-Ta Li, Chou Chen Yang, Min-Shiang Hwang:
A secure routing protocol with node selfishness resistance in MANETs. Int. J. Mob. Commun. 10(1): 103-118 (2012) - [j14]Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang:
A simple and efficient authentication scheme for mobile satellite communication systems. Int. J. Satell. Commun. Netw. 30(1): 29-38 (2012) - [j13]Chun-Ta Li:
A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications. Inf. Technol. Control. 41(1): 69-76 (2012) - [j12]Chun-Ta Li, Cheng-Chi Lee:
A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1-2): 35-44 (2012) - 2011
- [j11]Chun-Ta Li, Min-Shiang Hwang:
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks. Inf. Sci. 181(23): 5333-5347 (2011) - [j10]Chun-Ta Li:
Secure Smart Card Based Password Authentication Scheme with User Anonymity. Inf. Technol. Control. 40(2): 157-162 (2011) - [j9]Chun-Ta Li, Cheng-Chi Lee:
A Robust Remote User Authentication Scheme Using Smart Card. Inf. Technol. Control. 40(3): 236-245 (2011) - [j8]Cheng-Chi Lee, Chun-Ta Li, Kuo-You Huang, Shiow-Yuan Huang:
An Improvement of Remote Authentication and Key Agreement Schemes. J. Circuits Syst. Comput. 20(4): 697-707 (2011) - [j7]Cheng-Chi Lee, Chun-Ta Li, Shun-der Chen:
Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks. Parallel Process. Lett. 21(1): 21-26 (2011) - [c9]Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee:
A Robust Remote User Authentication Scheme against Smart Card Security Breach. DBSec 2011: 231-238 - 2010
- [j6]Chun-Ta Li, Min-Shiang Hwang:
An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1): 1-5 (2010) - [c8]Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang:
On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs. ICCSA (1) 2010: 599-609 - [c7]Cheng-Chi Lee, Chin-Ling Chen, Chun-Ta Li, Rui-Xiang Chang:
On security of a more efficient and secure dynamic ID-based remote user authentication scheme. ISDA 2010: 1371-1375 - [c6]Chun-Ta Li, Chen-Ju Liu, Cheng-Chi Lee, Chin-Wen Lee:
Cryptanalysis of Khan et al.'s dynamic ID-based remote user authentication scheme. ISDA 2010: 1382-1387
2000 – 2009
- 2009
- [j5]Chun-Ta Li, Yen-Ping Chu:
Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks. Int. J. Netw. Secur. 8(2): 166-168 (2009) - [c5]Chun-Ta Li:
An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. IAS 2009: 517-520 - [c4]Chia-Hui Wei, Yeo-Hao Chin, Chun-Ta Li:
A Secure Billing Protocol for Grid Computing. ITNG 2009: 320-325 - [c3]Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai:
A Verifiable Electronic Voting Scheme over the Internet. ITNG 2009: 449-454 - [c2]Chun-Ta Li, Min-Shiang Hwang:
Improving the Security of Non-PKI Methods for Public Key Distribution. ITNG 2009: 1695-1696 - 2008
- [j4]Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu:
An electronic voting protocol with deniable authentication for mobile ad hoc networks. Comput. Commun. 31(10): 2534-2540 (2008) - [j3]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12): 2803-2814 (2008) - [j2]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Comput. Commun. 31(18): 4255-4258 (2008) - [j1]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Comput. Syst. Sci. Eng. 23(3) (2008) - 2007
- [c1]Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li:
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. ICCSA (3) 2007: 273-284
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 19:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint