Chun-Ta Li
Chun-Ta Li
Professor, Department of Information Management, Tainan University of Technology
Verified email at mail.tut.edu.tw - Homepage
Title
Cited by
Cited by
Year
An efficient biometrics-based remote user authentication scheme using smart cards
CT Li, MS Hwang
Journal of Network and computer applications 33 (1), 1-5, 2010
5852010
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
CT Li, MS Hwang, YP Chu
Computer Communications 31 (12), 2803-2814, 2008
2862008
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
CT Li, CC Lee
Mathematical and Computer Modelling 55 (1-2), 35-44, 2012
1332012
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
CT Li, CY Weng, CC Lee
Sensors 13 (8), 9589-9603, 2013
1172013
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
CT Li
IET Information Security 7 (1), 3-10, 2013
952013
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
CC Lee, CT Li, CW Hsu
Nonlinear Dynamics 73 (1), 125-132, 2013
902013
Challenges in e-government and security of information
MS Hwang, CT Li, JJ Shen, YP Chu
Information & Security 15 (1), 9-20, 2004
902004
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
CT Li, TY Wu, CL Chen, CC Lee, CM Chen
Sensors 17 (7), 1482, 2017
812017
An electronic voting protocol with deniable authentication for mobile ad hoc networks
CT Li, MS Hwang, CY Liu
Computer Communications 31 (10), 2534-2540, 2008
752008
An extended chaotic-maps-based protocol with key agreement for multiserver environments
CC Lee, DC Lou, CT Li, CW Hsu
Nonlinear Dynamics 76 (1), 853-866, 2014
682014
A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
CT Li, CC Lee, CY Weng
Journal of medical systems 38 (9), 1-11, 2014
642014
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
CT Li, MS Hwang
Information Sciences 181 (23), 5333-5347, 2011
602011
An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
CT Li, MS Hwang, YP Chu
International Journal of Innovative Computing, Information and Control 5 (8 …, 2009
602009
A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system
CT Li, CY Weng, CC Lee
Journal of medical systems 39 (8), 77, 2015
582015
A robust remote user authentication scheme using smart card
CT Li, CC Lee
Information Technology and Control 40 (3), 236-245, 2011
562011
A secure cloud-assisted wireless body area network in mobile emergency medical care system
CT Li, CC Lee, CY Weng
Journal of medical systems 40 (5), 117, 2016
532016
An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards
CT Li, MS Hwang
network 3 (4), 5, 2010
532010
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
CT Li, CC Lee, CY Weng
Nonlinear Dynamics 74 (4), 1133-1143, 2013
522013
A simple and efficient authentication scheme for mobile satellite communication systems
CC Lee, CT Li, RX Chang
International Journal of Satellite Communications and Networking 30 (1), 29-38, 2012
502012
An extended multi-server-based user authentication and key agreement scheme with user anonymity
CT Li, CC Lee, CY Weng, CI Fan
KSII Transactions on Internet and Information Systems (TIIS) 7 (1), 119-131, 2013
482013
The system can't perform the operation now. Try again later.
Articles 1–20