Follow
WeiBin Lee
WeiBin Lee
Verified email at mail.fcu.edu.tw
Title
Cited by
Cited by
Year
A secure authentication scheme with anonymity for wireless communications
CC Wu, WB Lee, WJ Tsaur
IEEE Communications Letters 12 (10), 722-723, 2008
2432008
A cryptographic key management solution for HIPAA privacy/security regulations
WB Lee, CD Lee
IEEE Transactions on Information Technology in Biomedicine 12 (1), 34-41, 2008
2072008
User identification and key distribution maintaining anonymity for distributed computer networks
WB Lee, CC Chang
Comput Syst Sci Eng 15 (4), 211-214, 2000
1402000
A publicly verifiable copyright-proving scheme resistant to malicious attacks
TH Chen, G Horng, WB Lee
IEEE Transactions on industrial electronics 52 (1), 327-334, 2005
1372005
A smart card-based remote scheme for password authentication in multi-server Internet services
WJ Tsaur, CC Wu, WB Lee
Computer Standards & Interfaces 27 (1), 39-51, 2004
1192004
Authenticated encryption scheme without using a one way function
WB Lee, CC Chang
Electronics letters 31 (19), 1656-1657, 1995
1171995
A new delegation-based authentication protocol for use in portable communication systems
WB Lee, CK Yeh
IEEE Transactions on Wireless Communications 4 (1), 57-64, 2005
1032005
A self-verification authentication mechanism for mobile satellite communication systems
TH Chen, WB Lee, HB Chen
Computers & Electrical Engineering 35 (1), 41-48, 2009
952009
A public verifiable copy protection technique for still images
WB Lee, TH Chen
Journal of Systems and Software 62 (3), 195-204, 2002
932002
An efficient and secure multi-server authentication scheme with key agreement
WJ Tsaur, JH Li, WB Lee
Journal of Systems and Software 85 (4), 876-882, 2012
912012
A round-and computation-efficient three-party authenticated key exchange protocol
TH Chen, WB Lee, HB Chen
Journal of Systems and Software 81 (9), 1581-1590, 2008
742008
An enhanced user authentication scheme for multi-server internet services
WJ Tsaur, CC Wu, WB Lee
Applied Mathematics and Computation 170 (1), 258-266, 2005
742005
A novel deniable authentication protocol using generalized ElGamal signature scheme
WB Lee, CC Wu, WJ Tsaur
Information Sciences 177 (6), 1376-1381, 2007
702007
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
HB Chen, TH Chen, WB Lee, CC Chang
Computer Standards & Interfaces 30 (1-2), 95-99, 2008
562008
Authenticated encryption schemes with linkage between message blocks
WB Lee, CC Chang
Information processing letters 63 (5), 247-250, 1997
541997
A new method for using hash functions to solve remote user authentication
TH Chen, WB Lee
Computers & Electrical Engineering 34 (1), 53-62, 2008
522008
Visible light communication system technology review: Devices, architectures, and applications
TC Yu, WT Huang, WB Lee, CW Chow, SW Chang, HC Kuo
Crystals 11 (9), 1098, 2021
502021
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
WB Lee, KC Liao
Journal of Network and Computer Applications 27 (4), 191-199, 2004
462004
Enhancement of the RFID security method with ownership transfer
HB Chen, WB Lee, YH Zhao, YL Chen
Proceedings of the 3rd International Conference on Ubiquitous Information …, 2009
442009
Secure SAS-like password authentication schemes
TH Chen, WB Lee, G Horng
Computer Standards & Interfaces 27 (1), 25-31, 2004
412004
The system can't perform the operation now. Try again later.
Articles 1–20