Enhanced authentication scheme with anonymity for roaming service in global mobility networks CC Chang, CY Lee, YC Chiu Computer Communications 32 (4), 611-618, 2009 | 215 | 2009 |
A secure single sign-on mechanism for distributed computer networks CC Chang, CY Lee IEEE Transactions on Industrial Electronics 59 (1), 629-637, 2011 | 90 | 2011 |
Comments on Saeednia's improved scheme for the Hill cipher CH Lin, CY Lee, CY Lee Journal of the Chinese institute of engineers 27 (5), 743-746, 2004 | 58 | 2004 |
An improved low computation cost user authentication scheme for mobile communication CY Lee, CH Lin, CC Chang 19th International Conference on Advanced Information Networking and …, 2005 | 36 | 2005 |
Secure key transfer protocol based on secret sharing for group communications CY Lee, ZH Wang, L Harn, CC Chang IEICE TRANSACTIONS on Information and Systems 94 (11), 2069-2076, 2011 | 32 | 2011 |
A Smart Card-based Authentication Scheme Using User Identify Cryptography. CC Chang, CY Lee Int. J. Netw. Secur. 15 (2), 139-147, 2013 | 31 | 2013 |
Active versus passive malware collection YD Lin, CY Lee, YS Wu, PH Ho, FY Wang, YL Tsai Computer 47 (4), 59-65, 2013 | 19 | 2013 |
Three‐phase behavior‐based detection and classification of known and unknown malware YD Lin, YC Lai, CN Lu, PK Hsu, CY Lee Security and Communication Networks 8 (11), 2004-2015, 2015 | 17 | 2015 |
User authentication with anonymit for global mobility networks CY Lee, CC Chang, CH Lin IET Digital Library, 2005 | 15 | 2005 |
Fully deniable message authentication protocols preserving confidentiality L Harn, CY Lee, C Lin, CC Chang The Computer Journal 54 (10), 1688-1699, 2011 | 12 | 2011 |
Comments on the Yang–Chang–Hwang anonymous conference key distribution system CH Lin, CY Lee, W Lee Computer Standards & Interfaces 26 (3), 171-174, 2004 | 12 | 2004 |
A friendly password mutual authentication scheme for remote login network systems CC Chang, CY Lee International Journal of Multimedia and Ubiquitous Engineering 3 (1), 59-63, 2008 | 11 | 2008 |
Cryptanalysis and improvement of a secure authentication scheme with anonymity for wireless communications CC Chang, CY Lee, WB Lee 2009 Fifth International Conference on Intelligent Information Hiding and …, 2009 | 9 | 2009 |
Cryptanalysis of a new authentication scheme with anonymity for wireless environments CH Lin, CY Lee Proceedings of the 2nd International Conference on Advances in Mobile Multimedia, 2004 | 9 | 2004 |
A robust and efficient smart card oriented remote user authentication protocol CC Chang, HD Le, CY Lee, CH Chang 2011 Seventh International Conference on Intelligent Information Hiding and …, 2011 | 5 | 2011 |
An efficient e‐mail protocol providing perfect forward secrecy for mobile devices CC Chang, CY Lee, YC Chiu International Journal of Communication Systems 23 (12), 1463-1473, 2010 | 5 | 2010 |
Redefining security criteria for networking devices with case studies YD Lin, CY Lee, HC Tsai IEEE security & privacy 12 (1), 43-53, 2014 | 4 | 2014 |
A secure e-mail protocol for mobile devices CC Chang, CY Lee International Journal of Innovative Computing, Information and Control 7 (9 …, 2011 | 2 | 2011 |
A mutual authenticated key agreement scheme over insecure networks CC Chang, CY Lee, YW Su Journal of Discrete Mathematical Sciences and Cryptography 10 (5), 603-612, 2007 | 2 | 2007 |
Authenticated encryption schemes with message linkage for threshold signatures CH Huang, CY Lee, CH Lin, CC Chang, KL Chen 19th International Conference on Advanced Information Networking and …, 2005 | 2 | 2005 |