D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 39 Citations 6,235 206 World Ranking 6130 National Ranking 47

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Cryptography
  • The Internet

His main research concerns Computer security, Password, Smart card, Computer network and Authentication protocol. His research related to Anonymity, Key, Mutual authentication, Authentication and Encryption might be considered part of Computer security. He focuses mostly in the field of Password, narrowing it down to topics relating to Challenge–response authentication and, in certain cases, S/KEY.

His studies deal with areas such as User authentication, Data Authentication Algorithm, Table and Multi-factor authentication as well as Smart card. Specifically, his work in Computer network is concerned with the study of SIMPLE. In his study, which falls under the umbrella issue of Authentication protocol, Host, Embedded system and Computer hardware is strongly linked to Mobile device.

His most cited work include:

  • A password authentication scheme over insecure networks (240 citations)
  • Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments (225 citations)
  • Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks (181 citations)

What are the main themes of his work throughout his whole career to date?

Cheng-Chi Lee focuses on Computer security, Computer network, Authentication, Password and Authentication protocol. Anonymity, Key, Challenge–response authentication, Smart card and Mutual authentication are subfields of Computer security in which his conducts study. His biological study spans a wide range of topics, including Hash function and Cryptanalysis.

He has researched Smart card in several fields, including User authentication and Elliptic curve cryptography. His work in Computer network is not limited to one particular discipline; it also encompasses Wireless network. His work carried out in the field of Authentication brings together such families of science as Radio-frequency identification, Login, Security analysis, The Internet and Public-key cryptography.

He most often published in these fields:

  • Computer security (90.00%)
  • Computer network (43.75%)
  • Authentication (48.33%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (90.00%)
  • Authentication (48.33%)
  • Computer network (43.75%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Computer security, Authentication, Computer network, Public-key cryptography and Cloud computing. His Computer security study frequently draws connections to other fields, such as Correctness. His Authentication research incorporates elements of Radio-frequency identification, Key, Cryptography and Random oracle.

Cheng-Chi Lee studies Wireless sensor network, a branch of Computer network. His work deals with themes such as Encryption and Fuzzy logic, which intersect with Cloud computing. In his work, Password cracking is strongly intertwined with Universal composability, which is a subfield of Password.

Between 2017 and 2021, his most popular works were:

  • Towards secure authenticating of cache in the reader for RFID-based IoT systems (20 citations)
  • Towards secure authenticating of cache in the reader for RFID-based IoT systems (20 citations)
  • An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment (11 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • The Internet

Cheng-Chi Lee focuses on Computer security, Authentication, Radio-frequency identification, Public-key cryptography and Cloud computing. His research combines Computer network and Computer security. His Authentication study integrates concerns from other disciplines, such as Eavesdropping, Cache, Correctness, Cryptanalysis and Protocol.

Revocation is closely connected to Mutual authentication in his research, which is encompassed under the umbrella topic of Radio-frequency identification. His Public-key cryptography study incorporates themes from Cryptosystem, Cryptography and Chaotic. Cheng-Chi Lee interconnects Identity, Semantic security, Encryption and Chosen-ciphertext attack in the investigation of issues within Cloud computing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A password authentication scheme over insecure networks

I-En Liao;Cheng-Chi Lee;Min-Shiang Hwang.
Journal of Computer and System Sciences (2006)

360 Citations

Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments

Cheng-Chi Lee;Min-Shiang Hwang;I-En Liao.
IEEE Transactions on Industrial Electronics (2006)

331 Citations

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He;Neeraj Kumar;Jianhua Chen;Cheng-Chi Lee.
Multimedia Systems (2015)

298 Citations

A simple remote user authentication scheme

Min-Shiang Hwang;Cheng-Chi Lee;Yuan-Liang Tang.
Mathematical and Computer Modelling (2002)

242 Citations

A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards

Cheng-Chi Lee;Cheng-Chi Lee;Tsung-Hung Lin;Rui-Xiang Chang.
Expert Systems With Applications (2011)

218 Citations

A flexible remote user authentication scheme using smart cards

Cheng-Chi Lee;Min-Shiang Hwang;Wei-Peng Yang.
Operating Systems Review (2002)

205 Citations

Security enhancement for a dynamic ID-based remote user authentication scheme

I-En Liao;Cheng-Chi Lee;Min-Shiang Hwang.
international conference on next generation web services practices (2005)

205 Citations

Toward a secure batch verification with group testing for VANET

Cheng-Chi Lee;Yan-Ming Lai.
Wireless Networks (2013)

204 Citations

A remote user authentication scheme using hash functions

Cheng-Chi Lee;Li-Hua Li;Min-Shiang Hwang.
Operating Systems Review (2002)

200 Citations

A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments

Cheng-Chi Lee;Pei-Shan Chung;Min-Shiang Hwang.
International Journal of Network Security (2013)

189 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Cheng-Chi Lee

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 90

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 79

Min-Shiang Hwang

Min-Shiang Hwang

Asia University Taiwan

Publications: 75

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 65

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 47

Debiao He

Debiao He

Wuhan University

Publications: 45

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 44

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 43

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 40

SK Hafizul Islam

SK Hafizul Islam

Indian Institute of Information Technology, Kalyani

Publications: 35

Shehzad Ashraf Chaudhry

Shehzad Ashraf Chaudhry

Abu Dhabi University

Publications: 27

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 22

Daniel C. Chung

Daniel C. Chung

Harvard University

Publications: 19

Fan Wu

Fan Wu

Shanghai Jiao Tong University

Publications: 16

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 15

Mohammad Wazid

Mohammad Wazid

Graphic Era University

Publications: 14

Trending Scientists

Friedrich Huisken

Friedrich Huisken

Friedrich Schiller University Jena

Eugenio Uriarte

Eugenio Uriarte

University of Santiago de Compostela

Göran Lindbergh

Göran Lindbergh

Royal Institute of Technology

Robert H. Wood

Robert H. Wood

University of Delaware

Freddy Adams

Freddy Adams

University of Antwerp

Hong Yin

Hong Yin

Yangzhou University

Cathy M. Trudinger

Cathy M. Trudinger

Commonwealth Scientific and Industrial Research Organisation

Olivier Hagolle

Olivier Hagolle

Centre National D'Etudes Spatiales

André Jean

André Jean

Aix-Marseille University

Christian Unkelbach

Christian Unkelbach

University of Cologne

Nalini Ambady

Nalini Ambady

Stanford University

Charles Shey Wiysonge

Charles Shey Wiysonge

South African Medical Research Council

Jonathan G. Goldin

Jonathan G. Goldin

University of California, Los Angeles

David Axelson

David Axelson

The Ohio State University

David C. Whiteman

David C. Whiteman

QIMR Berghofer Medical Research Institute

Mark A. Collinson

Mark A. Collinson

University of the Witwatersrand

Something went wrong. Please try again later.