H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 42 Citations 7,032 221 World Ranking 4183 National Ranking 23

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Cryptography
  • The Internet

His main research concerns Computer security, Password, Smart card, Computer network and Authentication protocol. His research related to Anonymity, Key, Mutual authentication, Authentication and Encryption might be considered part of Computer security. He focuses mostly in the field of Password, narrowing it down to topics relating to Challenge–response authentication and, in certain cases, S/KEY.

His studies deal with areas such as User authentication, Data Authentication Algorithm, Table and Multi-factor authentication as well as Smart card. Specifically, his work in Computer network is concerned with the study of SIMPLE. In his study, which falls under the umbrella issue of Authentication protocol, Host, Embedded system and Computer hardware is strongly linked to Mobile device.

His most cited work include:

  • A password authentication scheme over insecure networks (240 citations)
  • Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments (225 citations)
  • Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks (181 citations)

What are the main themes of his work throughout his whole career to date?

Cheng-Chi Lee focuses on Computer security, Computer network, Authentication, Password and Authentication protocol. Anonymity, Key, Challenge–response authentication, Smart card and Mutual authentication are subfields of Computer security in which his conducts study. His biological study spans a wide range of topics, including Hash function and Cryptanalysis.

He has researched Smart card in several fields, including User authentication and Elliptic curve cryptography. His work in Computer network is not limited to one particular discipline; it also encompasses Wireless network. His work carried out in the field of Authentication brings together such families of science as Radio-frequency identification, Login, Security analysis, The Internet and Public-key cryptography.

He most often published in these fields:

  • Computer security (90.00%)
  • Computer network (43.75%)
  • Authentication (48.33%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (90.00%)
  • Authentication (48.33%)
  • Computer network (43.75%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Computer security, Authentication, Computer network, Public-key cryptography and Cloud computing. His Computer security study frequently draws connections to other fields, such as Correctness. His Authentication research incorporates elements of Radio-frequency identification, Key, Cryptography and Random oracle.

Cheng-Chi Lee studies Wireless sensor network, a branch of Computer network. His work deals with themes such as Encryption and Fuzzy logic, which intersect with Cloud computing. In his work, Password cracking is strongly intertwined with Universal composability, which is a subfield of Password.

Between 2017 and 2021, his most popular works were:

  • Towards secure authenticating of cache in the reader for RFID-based IoT systems (20 citations)
  • Towards secure authenticating of cache in the reader for RFID-based IoT systems (20 citations)
  • An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment (11 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • The Internet

Cheng-Chi Lee focuses on Computer security, Authentication, Radio-frequency identification, Public-key cryptography and Cloud computing. His research combines Computer network and Computer security. His Authentication study integrates concerns from other disciplines, such as Eavesdropping, Cache, Correctness, Cryptanalysis and Protocol.

Revocation is closely connected to Mutual authentication in his research, which is encompassed under the umbrella topic of Radio-frequency identification. His Public-key cryptography study incorporates themes from Cryptosystem, Cryptography and Chaotic. Cheng-Chi Lee interconnects Identity, Semantic security, Encryption and Chosen-ciphertext attack in the investigation of issues within Cloud computing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A password authentication scheme over insecure networks

I-En Liao;Cheng-Chi Lee;Min-Shiang Hwang.
Journal of Computer and System Sciences (2006)

354 Citations

Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments

Cheng-Chi Lee;Min-Shiang Hwang;I-En Liao.
IEEE Transactions on Industrial Electronics (2006)

321 Citations

Parking lot management system

Chi-Tung Chen;Iuon-Chang Lin;Cheng-Chi Lee;Shung-Kung Wu.
(2011)

246 Citations

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He;Neeraj Kumar;Jianhua Chen;Cheng-Chi Lee.
Multimedia Systems (2015)

242 Citations

A simple remote user authentication scheme

Min-Shiang Hwang;Cheng-Chi Lee;Yuan-Liang Tang.
Mathematical and Computer Modelling (2002)

236 Citations

A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards

Cheng-Chi Lee;Cheng-Chi Lee;Tsung-Hung Lin;Rui-Xiang Chang.
Expert Systems With Applications (2011)

215 Citations

Security enhancement for a dynamic ID-based remote user authentication scheme

I-En Liao;Cheng-Chi Lee;Min-Shiang Hwang.
international conference on next generation web services practices (2005)

204 Citations

A flexible remote user authentication scheme using smart cards

Cheng-Chi Lee;Min-Shiang Hwang;Wei-Peng Yang.
Operating Systems Review (2002)

202 Citations

A remote user authentication scheme using hash functions

Cheng-Chi Lee;Li-Hua Li;Min-Shiang Hwang.
Operating Systems Review (2002)

194 Citations

A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments

Cheng-Chi Lee;Pei-Shan Chung;Min-Shiang Hwang.
International Journal of Network Security (2013)

181 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Cheng-Chi Lee

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 90

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 79

Min-Shiang Hwang

Min-Shiang Hwang

Asia University Taiwan

Publications: 75

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 65

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 47

Debiao He

Debiao He

Wuhan University

Publications: 45

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 44

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 43

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 40

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 22

Daniel C. Chung

Daniel C. Chung

Harvard University

Publications: 19

Fan Wu

Fan Wu

Shanghai Jiao Tong University

Publications: 16

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 15

Mohammad S. Obaidat

Mohammad S. Obaidat

University of Jordan

Publications: 14

Yixian Yang

Yixian Yang

Beijing University of Posts and Telecommunications

Publications: 13

Jianwei Niu

Jianwei Niu

Beihang University

Publications: 12

Something went wrong. Please try again later.