His main research concerns Computer security, Password, Smart card, Computer network and Authentication protocol. His research related to Anonymity, Key, Mutual authentication, Authentication and Encryption might be considered part of Computer security. He focuses mostly in the field of Password, narrowing it down to topics relating to Challenge–response authentication and, in certain cases, S/KEY.
His studies deal with areas such as User authentication, Data Authentication Algorithm, Table and Multi-factor authentication as well as Smart card. Specifically, his work in Computer network is concerned with the study of SIMPLE. In his study, which falls under the umbrella issue of Authentication protocol, Host, Embedded system and Computer hardware is strongly linked to Mobile device.
Cheng-Chi Lee focuses on Computer security, Computer network, Authentication, Password and Authentication protocol. Anonymity, Key, Challenge–response authentication, Smart card and Mutual authentication are subfields of Computer security in which his conducts study. His biological study spans a wide range of topics, including Hash function and Cryptanalysis.
He has researched Smart card in several fields, including User authentication and Elliptic curve cryptography. His work in Computer network is not limited to one particular discipline; it also encompasses Wireless network. His work carried out in the field of Authentication brings together such families of science as Radio-frequency identification, Login, Security analysis, The Internet and Public-key cryptography.
The scientist’s investigation covers issues in Computer security, Authentication, Computer network, Public-key cryptography and Cloud computing. His Computer security study frequently draws connections to other fields, such as Correctness. His Authentication research incorporates elements of Radio-frequency identification, Key, Cryptography and Random oracle.
Cheng-Chi Lee studies Wireless sensor network, a branch of Computer network. His work deals with themes such as Encryption and Fuzzy logic, which intersect with Cloud computing. In his work, Password cracking is strongly intertwined with Universal composability, which is a subfield of Password.
Cheng-Chi Lee focuses on Computer security, Authentication, Radio-frequency identification, Public-key cryptography and Cloud computing. His research combines Computer network and Computer security. His Authentication study integrates concerns from other disciplines, such as Eavesdropping, Cache, Correctness, Cryptanalysis and Protocol.
Revocation is closely connected to Mutual authentication in his research, which is encompassed under the umbrella topic of Radio-frequency identification. His Public-key cryptography study incorporates themes from Cryptosystem, Cryptography and Chaotic. Cheng-Chi Lee interconnects Identity, Semantic security, Encryption and Chosen-ciphertext attack in the investigation of issues within Cloud computing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A password authentication scheme over insecure networks
I-En Liao;Cheng-Chi Lee;Min-Shiang Hwang.
Journal of Computer and System Sciences (2006)
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments
Cheng-Chi Lee;Min-Shiang Hwang;I-En Liao.
IEEE Transactions on Industrial Electronics (2006)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
Debiao He;Neeraj Kumar;Jianhua Chen;Cheng-Chi Lee.
Multimedia Systems (2015)
A simple remote user authentication scheme
Min-Shiang Hwang;Cheng-Chi Lee;Yuan-Liang Tang.
Mathematical and Computer Modelling (2002)
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
Cheng-Chi Lee;Cheng-Chi Lee;Tsung-Hung Lin;Rui-Xiang Chang.
Expert Systems With Applications (2011)
A flexible remote user authentication scheme using smart cards
Cheng-Chi Lee;Min-Shiang Hwang;Wei-Peng Yang.
Operating Systems Review (2002)
Security enhancement for a dynamic ID-based remote user authentication scheme
I-En Liao;Cheng-Chi Lee;Min-Shiang Hwang.
international conference on next generation web services practices (2005)
Toward a secure batch verification with group testing for VANET
Cheng-Chi Lee;Yan-Ming Lai.
Wireless Networks (2013)
A remote user authentication scheme using hash functions
Cheng-Chi Lee;Li-Hua Li;Min-Shiang Hwang.
Operating Systems Review (2002)
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments
Cheng-Chi Lee;Pei-Shan Chung;Min-Shiang Hwang.
International Journal of Network Security (2013)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Asia University Taiwan
University of Jordan
King Saud University
Luleå University of Technology
La Trobe University
Thapar University
University of New South Wales
Wuhan University
La Trobe University
Friedrich Schiller University Jena
University of Santiago de Compostela
Royal Institute of Technology
University of Delaware
University of Antwerp
Yangzhou University
Commonwealth Scientific and Industrial Research Organisation
Centre National D'Etudes Spatiales
Aix-Marseille University
University of Cologne
Stanford University
South African Medical Research Council
University of California, Los Angeles
The Ohio State University
QIMR Berghofer Medical Research Institute
University of the Witwatersrand