Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 8 results:
RTF
EndNote XML
Filters:
Author
is
Cheng-Chi Lee
[Clear All Filters]
2022
Jimoh, Rasheed Gbenga
,
Olayinka Olufunmila Olusanya
,
Joseph Bamidele Awotunde
,
Agbotiname Lucky Imoize
, and
Cheng-Chi Lee
.
"
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases
."
Future Internet
14, no. 305 (2022).
Google Scholar
RTF
EndNote XML
2005
Liao, I-En
,
Cheng-Chi Lee
, and
Min-Shiang Hwang
.
Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme
In
International Conference on Next Generation Web Services Practices
., 2005.
DOI
Google Scholar
RTF
EndNote XML
2003
Hwang, Min-Shiang
,
Cheng-Chi Lee
, and
Yan-Chi Lai
.
"
An Untraceable Blind Signature Scheme
."
IEICE Transactions on Foundations
7 (2003): 1902-1906.
Google Scholar
RTF
EndNote XML
2002
Lee, Cheng-Chi
,
Min-Shiang Hwang
, and
Wei-Peng Yang
.
"
A Flexible Remote User Authentication Scheme with Smart Cards
."
ACM Operating System Review
36, no. 3 (2002): 46-52.
Google Scholar
RTF
EndNote XML
Lee, Cheng-Chi
,
Li-Hua Li
, and
Min-Shiang Hwang
.
"
A Remote User Authentication Scheme Using Hash Functions
."
ACM SIGOPS Operating Systems Review
36, no. 4 (2002): 23-29.
Google Scholar
RTF
EndNote XML
Lee, Cheng-Chi
,
Li-Hua Li
, and
Min-Shiang Hwang
.
"
A Remote User Authentication Scheme Using Smart Cards
."
ACM Operating Systems Review
36, no. 4 (2002): 23-29.
Google Scholar
RTF
EndNote XML
Tang, Yuan-Liang
,
Cheng-Chi Lee
, and
Min-Shiang Hwang
.
"
A Simple Remote User Authentication Scheme
."
Mathematical and Computer Modelling
36 (2002): 103-107.
Google Scholar
RTF
EndNote XML
Hwang, Min-Shiang
,
Yan-Chi Lai
, and
Cheng-Chi Lee
.
"
Traceability on Low-Computation Partially Blind Signatures for Electronic Cash
."
IEICE Fundamentals on Electronics, Communications and Computer Sciences E85-A
5 (2002): 1181-1182.
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance