Cheng-Chi Lee

Cheng-Chi Lee
Fu Jen Catholic University · Department of Library and Information Science

About

99
Publications
10,024
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,253
Citations
Citations since 2016
47 Research Items
1710 Citations
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
Introduction
Skills and Expertise

Publications

Publications (99)
Article
Full-text available
In the field of software development, the efficient prioritizing of software risks was essential and play significant roles. However, finding a viable solution to this issue is a difficult challenge. The software developers have to adhere strictly to risk management practice because each phase of SDLC is faced with its individual type of risk rathe...
Article
Full-text available
Modern cellular communication networks are already being perturbed by large and steadily increasing mobile subscribers in high demand for better service quality. To constantly and reliably deploy and optimally manage such mobile cellular networks, the radio signal attenuation loss between the path lengths of a base transmitter and the mobile statio...
Article
Full-text available
The rapid growth in the number of vehicles has led to traffic congestion, pollution, and delays in logistic transportation in metropolitan areas. IoT has been an emerging innovation, moving the universe towards automated processes and intelligent management systems. This is a critical contribution to automation and smart civilizations. Effective an...
Article
Full-text available
Atmospheric impairment-induced attenuation is the prominent source of signal degradation in radio wave communication channels. The computation-based modeling of radio wave atten-uation over the atmosphere is the stepwise application of relevant radio propagation models, data, and procedures to effectively and prognostically estimate the losses of t...
Article
Full-text available
Cassava is a crucial food and nutrition security crop cultivated by small-scale farmers because it can survive in a brutal environment. It is a significant source of carbohydrates in African countries. Sometimes, Cassava crops can be infected by leaf diseases, affecting the overall production and reducing farmers’ income. The existing Cassava disea...
Article
Up till now, numerous authentication and key agreement schemes have been proposed for ubiquitous networks. Recently, Arshad and Rasoolzadegan also proposed an authentication and key agreement scheme for ubiquitous network with user anonymity. However, we determined that Arshad and Rasoolzadegan’s scheme has the following flaws: (1) the login phase...
Article
Full-text available
An innovative image enhancement and feature extraction technique that is based on the modified sigmoid function and two-dimensional DCT has been developed. The proposed technique uses a modified sigmoid function that accommodates the original microscopic input image characteristics. A novel block-based input value coupled with the modified sigmoid...
Article
Full-text available
The birth of mass production started in the early 1900s. The manufacturing industries were transformed from mechanization to digitalization with the help of Information and Communication Technology (ICT). Now, the advancement of ICT and the Internet of Things has enabled smart manufacturing or Industry 4.0. Industry 4.0 refers to the various techno...
Article
Full-text available
Fog-driven IoT architecture located between IoT devices and the centralized cloud infrastructure is introduced to extend computing, storage and network services to the edge of the Internet and therefore resources and services of the fog nodes are available and are closer to the end user and end device for providing mobility, low latency and locatio...
Article
Full-text available
In the current medical insurance claims process, there are problems of low efficiency and complex services. When a patient applies for medical insurance claims, he/she must go to the hospital to apply for a diagnosis certificate and receipt and then send the relevant application documents to the insurance company. The patient will not receive compe...
Article
Full-text available
Telecare medicine information system (TMIS) is recognized as an important tool for improving the quality and protection of healthcare services. In addition to protecting the privacy of patients, many authentication techniques are being introduced in TMIS. After investigations, it is observed that many authentication techniques have security breache...
Article
Full-text available
In healthcare services, telecare medicine information systems (TMIS) is the viable solution offered currently. Moreover, to provide best security to the TMIS, it attracted the various researchers to investigate the security challenges in TMIS. Subsequently, the security of TMIS is improving but the application becoming widespread hence needs robust...
Article
Recent advancements in internet technology and the infrastructure have attracted more people and organizations to do everything online. Internet technologies have provided amazing and smooth ease for electronic sales and purchases. However, many people have refused to use these internet technologies in electronic purchases because of unstable and i...
Article
Full-text available
Wireless sensor networks (WSNs) are the backbones of numerous real-time monitoring systems that are applied to serve many different parts of our everyday lives including traffic management, telecare, pollution control, military application, among others. In most cases, WSN systems involve exchanges of sensitive/private data between the sensor nodes...
Article
Full-text available
Cloud computing technologies have been prospering in recent years and have opened an avenue for a wide variety of forms of adaptable data sharing. Taking advantage of these state‐of‐the‐art innovations, the cloud storage data owner must, however, use a suitable identity‐based cryptographic mechanism to ensure the safety prerequisites while sharing...
Article
Full-text available
Public key cryptosystems more recently developed have to be strong against newer and more advanced forms of attacks. The security protection of a public key cryptosystem relies heavily on the design of the public key. The key authentication procedure is one of the easiest and most advantageous authentication mechanisms used over insecure networks a...
Article
Full-text available
In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researche...
Article
Full-text available
Wireless sensor network (WSN) is a network system that involves spatially distributed devices such as wireless sensor nodes. As the data collected by the sensor nodes and transmitted through WSNs are mostly sensitive, confidential, or personal data, secure information transmission is a critical challenge, and one of the most significant security re...
Article
Full-text available
Mobile technologies are capable of offering individual level health care services to users. Mobile Healthcare (m-Healthcare) frameworks, which feature smartphone (SP) utilizations of ubiquitous computing made possible by applying wireless Body Sensor Networks (BSNs), have been introduced recently to provide SP clients with health condition monitori...
Article
Full-text available
In recent years, due to the rapid development of information techniques and network technologies, more and more medical documents have been replaced by electronic files for sharing and transmitting in real time. However, medical data transmitted over public communication channels may suffer from security attacks and privacy threats. Blockchain tech...
Article
Full-text available
The advancement of the cloud storage technology opens up a wide range of possibilities for adaptable data sharing. When sharing data to an extensive number of users with fuzzy identities, the data proprietor must use an appropriate identity-based encryption technique that satisfies both efficiency and security prerequisites. Identity-based encrypti...
Article
Full-text available
In recent years, Radio Frequency Identification (RFID) applications of various kinds have been blooming. However, along with the stunning advancement have come all sorts of security and privacy issues, for RFID tags oftentimes store private data and so the permission to read a tag or any other kind of access needs to be carefully controlled. Theref...
Article
Full-text available
Recently, the chaos theory has been dealt with as a decent approach to reducing the computational complexity of a cryptographic technique while fulfilling the security necessities. In an ID-based cryptographic system where public keys are distributed to individual users, the application of chaotic maps allows users to set their network addresses or...
Article
Radio Frequency Identification (RFID) is a wireless communication technology nowadays widely used in almost every aspect of our lives including healthcare, logistics and supply chain management, inventory tracking, race timing, access control, toll collection, and a lot more. In RFID systems, a tag usually stores private or sensitive information, a...
Article
The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., enables one to send a trapdoor containing a encrypted keyword to query data without revealing the keyword. In Boneh et al.’s design, the trapdoor has to be transferred through a secure channel, which is both costly and inefficient. Baek et al. then proposed an e...
Chapter
As wireless sensor networks (WSN) and Internet of things (IoT) have rapidly developed over recent years, the smart vehicular system is designed in the environment of WSN to provide vehicle related applications such as traffic safety for drivers, controlling traffic signal, broadcasting traffic information and speed monitoring etc. Recently, Mohit e...
Article
Due to the advancement of convenience technology for people, the era of Internet of Things (IoT) has going on thriving, which has brought more and more attention to Radio Frequency Identification (RFID), as RFID is key to the sensor technology in IoT. As promoting of IoT, kind of protocols combine cloud to store authentication data and perform heav...
Article
Digital rights management (DRM) systems are access control technologies used to restrict the use, modification, and distribution of protected digital contents. The success of a DRM system relies heavily on a good user authentication mechanism, and user identity verification through biometric information check is a great idea in that the biological...
Article
Full-text available
Three-party authenticated key exchange (3PAKE) protocol allows two communication users to authenticate each other and to establish a secure common session key with the help of a trusted remote server. Recently, Farash and Attari propose an efficient and secure 3PAKE protocol based on Chebyshev chaotic maps and their protocol is supported by the for...
Article
With the rapid development of information science and network technology, Internet has become an important platform for the dissemination of digital content, which can be easily copied and distributed through the Internet. Although convenience is increased, it causes significant damage to authors of digital content. Digital rights management system...
Article
The proxy blind signature scheme (PBSS), allows the authorized proxy signer to use his proxy private key to create a legal blind signature on behalf of original signer. Recently, Alghazzawi, Salim and Hasan (A-S-H), presented the elliptic curve cryptography (ECC) based PBSS. However, we found their scheme is vulnerable to a linkability attack, whic...
Article
Full-text available
The use of radio frequency identification (RFID) in Internet of things (IoT) has led to a significant progress in numerous intelligent devices. However, due to its restrictions on computation ability, storage space and battery capacity, RFID-based IoT system has to confront with various security and efficiency challenges. Recently, a lightweight RF...
Article
Full-text available
Certificate-based cryptography (CBC) was initially instigated during Eurocrypt 2003. A CBC scheme combines several merits of the public key cryptography (PKC) and identity-based cryptography (IBC) schemes while eliminating the problems inherited from both, i.e., the key management problem in PKC and the key escrow problem in IBC. In this paper, we...
Article
Full-text available
The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of in...
Article
Full-text available
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monit...
Article
Full-text available
Recently, user authentication schemes for mobile devices have become increasingly critical. Because of wide use, numerous services for mobile devices are provided, and will continue to be required in the future. Occasionally, users must log on to a server to obtain services, and the server must authenticate that user. Because device resources, such...
Conference Paper
Recently, Wu et al. proposed a secure channel free searchable encryption (SCF-PEKS) scheme which not only can guard against keyword guessing and record disclosure attacks but also can provide much better performance than other related scheme for shareable EMRs. However, in this paper, we demonstrated that Wu et al.’s SCF-PEKS scheme has some design...
Conference Paper
In the last decade, the technology of Radio Frequency Identification (RFID) has boomed in the wireless communication environment. Applications of RFID have matured and reached far into various fields such as smart building, healthcare, supply chain management, etc. However, along with the rapid advancement of RFID systems have come many security is...
Article
VANET (vehicular ad hoc network) is used to create communication networks for vehicles or other roadside devices so that they can quickly share and receive messages. However, VANET belongs to a family of wireless networks, which means that its functions are unsafe. To provide safe communication channels, key-agreements technology can be introduced...
Article
As cloud technologies thrive, researches in the field of cloud storage have switched their focus from encryption-decryption techniques that help data owners protect their privacy and data confidentiality to the application of searching techniques on encrypted data while maintaining high level security and privacy of outsource data. To begin with, S...
Article
Full-text available
Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login se...
Article
Full-text available
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves t...
Article
Full-text available
Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients’ health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit...
Article
Handling huge loads of data that are subject to change within every second, cloud storage services are facing the challenge of properly dealing with the problem of user legality management while making sure that the services are conveniently user-friendly. Ideally, the concept of attribute-based encryption should be applied, meaning that data shoul...
Article
Full-text available
Remote user authentication has been widely used in the integrated electronic patient record information system (EPRIS) to protect the security and integrity of communication sessions between the login user and the medical server. Recently, Wen 17 presented the user authentication and user anonymity scheme based on the quadratic residues and claimed...
Conference Paper
With the growing popularity of network technologies, cloud-based health care applications are becoming an essential part of telecare medical information systems have been widely studied in recent years. To protect patient privacy and restrict the access of precious services for legal privileged participants only, many secure medical data exchange p...
Article
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the...
Article
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based...
Conference Paper
VANET (Vehicular Ad-hoc Network) is the one mainly utilized to create communication networks for vehicles or other roadside devices so that they can quickly share and receive messages. Nevertheless, VANET belongs to the family of wireless networks, which means VANET functions are unsafe. In order to provide safe communication channels, we introduce...
Article
Three-party-authenticated key agreement allows two users to establish a common session key through a trusted server via an insecure communication channel. Early authenticated key agreement schemes were mostly based on either pairing operations, hash operations, or modular exponentiation operations. In 2011, Wang and Zhao took a new path and built t...
Article
Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS....
Article
As the era of pervasive and ubiquitous computing comes close, hand-held and smart devices are expected to achieve the dream of all time everywhere computing. Remote user authentication is important to verify the legitimacy of a login user over an insecure communication channel. Furthermore, in order to protect user privacy such that others cannot t...
Article
Two user authentication schemes for multi-server environments have been proposed by Tsai and Wang et al., respectively. However, there are some flaws existing in both schemes. Therefore, a new scheme for improving these drawbacks is proposed in this paper. The proposed scheme has the following benefits: (1) it complies with all the requirements for...
Article
As information technology continuously progresses, more applied technologies are developed, such as radio frequency identification (RFID). In this paper, we propose a novel digital television (DTV) structure that uses RFID for encryption. RFID is widely used for various applications because of its advantages such as an extended lifetime and securit...
Article
A designated verifier scheme can protect information from uncertainty. Only the designated verifier can verify the signature and make sure that the information is correct. In addition, a strong designated verifier scheme allows the verifier to maintain a transcript signature of the verifier's secret key. Recently, Yoon proposed an identity-based st...
Article
Full-text available
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication se...
Article
In this paper, we propose a scheme utilizing three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, which is more efficient and secure than previously proposed schemes. In order to enhance the efficiency and security, we use the extended chaotic maps to encrypt and decrypt the information tra...
Article
With the rapid development of wireless and mobile communication techniques, Wireless Sensor Networks (WSNs) have attracted great attention in recent years and have been widely used in practical applications, such as monitoring of ocean tsunami, detection of battlefield environment, entrance guard system, medical or science areas and even in our hom...
Article
Due to the rapid development and growth of computer networks, there have been greater and greater demands for remote password authentication protocols. Recently, the focus has been on protocols for multiserver environments that run on smart cards. These protocols typically count on the nonce or timestamp to provide protection against the replay att...
Article
Full-text available
With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access...
Article
Visual secret sharing (VSS) is a visual cryptography scheme which decodes secret messages into several enlarged shares, and distributes them to different participants. The participants can recover the secret messages by stacking their shares, and then secret message can be revealed by human visual sensitivity. Afterward some researchers start to re...
Article
This study proposes a three-factor control protocol for universal serial bus (USB) on an elliptic curve cryptosystem (ECC). USB is a universal interface used in an enormous number of devices. It has become the most popular interface standard for computer connections. However, since USB provides high transmission speed and is very convenient to carr...