Publications
Journal Paper [2017~] · (2024) Lee, T.-F.*, Ye, X., Huang, W.-J. “Lightweight Privacy-Preserving
Authenticated Key Agreements Using Physically Unclonable
Functions for Internet of Drones,” Journal
of Information Security and Applications, vol. 87, 103915, Dec. 2024 (SCI,EI; IF=3.8; Rank Factor: 70/250 =28.0%; NSTC
110-2221-E-320-005-MY2 & TCMMP 112-02-03). · (2024) Lee,
T.-F.*, Chang I-P., Huang, W.-J. “A Privacy-preserving Authenticated Key
Agreement Scheme Based on Physically Unclonable
Functions for Multi-server Architecture,” IEEE
Transactions on Services Computing, vol. 17, no. 6, pp. 3065 - 3077
Nov.-Dec. 2024 (SCI,EI; IF=5.5; Rank Factor: 10/132=7.58%; NSTC
110-2221-E-320-005-MY2 & TCMMP 112-02-03). · (2024) Lee, T.F., Huang, W.-J., Chang I-P.*, “Secure and Lightweight Key
Agreement Protocol for Remote Surgery over Tactile Internet Using Physically Unclonable Functions,” Peer-to-Peer
Networking and Applications, vol. 17,
no. 6, pp. 4247–4263, Oct. 2024. (SCI; IF= 3.3; Rank Factor: 90/250=36.0%;
NSTC 110-2221-E-320-005-MY2 & TCMMP 112-02) · (2024) Lee,
T.F., Chang I-P.*, Wang, J.G., Chen, Y.C., Tsai, S.T., Chen, R.Y.
“Extended Chaotic Map-based Key Management for Hierarchical Access Control in
E-medicine Systems,” Peer-to-Peer Networking and
Applications, vol. 17, pp. 858–870, Jan. 2024. (SCI; IF= 3.3; Rank
Factor: 90/250=36.0%; MOST 110-2221-E-320-005-MY2 & TCMMP 112-02) · (2023) Lee, T.-F., Lou, D.-C.*, Chang, C.-H. “Enhancing
lightweight authenticated key agreement with privacy protection using dynamic
identities for Internet of Drones,” Internet
of Things, 23. 100877, Oct. 2023 (SCI,EI;
IF=5.9; Rank Factor: 53/275 =19.27%; NSTC 110-2221-E-320-005-MY2 , MOST
111-2221-E-182-048-, & BMRPB30). · (2023) Lee,
T.F., Chang I-P.*, Su, G.-J., “Compliance with HIPAA and GDPR in Certificateless-based Authenticated Key Agreement Using
Extended Chaotic Maps,” electronic,12(5), 1108, Feb. 2023. (SCI; IF= 2. 9; Rank
Factor:131/275=47.64%; MOST 110-2221-E-320-005-MY2 & TCMMP 112-02-03) · (2023) Lee, T.-F.*, Lin, K.-W., Hsieh, Y.-P., Lee,
K.-C. “Lightweight Cloud Computing-based RFID Authentication Protocols Using
PUF for e-Healthcare Systems,” IEEE
Sensors Journal, Vol. 23, No. 6, pp. 6338-6349, Mar. 2023 (SCI,EI;
IF=4.3; Rank Factor: 15/63=23.81%; NSTC 110-2221-E-320-005-MY2 & TCMMP
112-02-03). · (2023) Lee, T.F.*, Wang, J.G., Chen, Y.C. “Review of
hierarchical database access control for E-medicine systems,” Tzu Chi Medical
Journal, Vol. 35, No. 2, pp. 143-147, 2023. (MOST 110-2221-E-320-005-MY2). · (2022) Lee, T.F., Ye, X., Chen, W.Y., Chang, C.C.*, “Enhanced
Authenticated Key Agreement for Surgical Applications in Tactile Internet
Environment,” Sensors, 22, 7941,
Oct. 2022. https://doi.org/10.3390/s22207941 (SCI; IF=3.847; Rank Factor:
19/64=29.69%; MOST 109-2221-E-320-003, MOST 110-2221-E-320-005-MY2, MOST
110-2221-E-040-004-MY2 & TCRPP109001) · (2022) Lee,
T.F., Gao, T.L., Chang, C.C.*, “Constructing a
Secure Encryption and Secret Sharing Mechanism for Taiwan Biobank
of a Medical Center,” Journal of
Technology, Vol. 37, No. 3, pp. 211-224, Sep. 2022. (EI). · (2022) Lee, T.F.*, Huang, Y.-C., “Efficient Extended Chaotic
Map-based IBE for Industrial Environment,” IEEE Access, vol. 10, pp. 71278 - 71283, July, 2022. (SCI; IF= 3.476; Rank
Factor: 79/164=48.17%; 106-2221-E-320 -001, MOST 108-2221-E-320 -001; MOST
110-2221-E-320-005-MY2) · (2022) Lee,
T.F.*, Ye, X., Lin, S.H. “Anonymous Dynamic Group Authenticated Key
Agreements Using Physical Unclonable Functions for
Internet of Medical Things,” IEEE
Internet of Things Journal, Vol. 9, Issue: 16,
pp. 15336 - 15348, Aug. 2022. (SCI; IF=10.238; Rank Factor: 9/164=5.49%;
MOST 109-2221-E-320-003, MOST 110-2221-E-320-005-MY2). · (2022) Hsieh, Y.-P., Lee, K.-C.,
Lee, T.F.*, Su, G.-J.,
“Extended Chaotic-Map-Based User Authentication and Key Agreement for HIPAA
Privacy/Security Regulations,” Applied
Sciences, 12, 5701, June, 2022. https://doi.org/10.3390/app12115701 (SCI;
IF= 2.838; Rank Factor: 39/92=42.39%; MOST 110-2221-E-320-005-MY2) · (2021) Lee,
T.F., Chang I-P.*, Kung T.-S., “Blockchain-based
Healthcare Information Preservation Using Extended Chaotic Maps for HIPAA
Privacy/Security Regulations,” Applied
Sciences, vol. 11, no. 22, 10576, Nov., 2021.
https://doi.org/10.3390/app112210576, (SCI; IF= 2.679; MOST
110-2221-E-320-005-MY2) · (2021) Lee, T.F.*, Chen, W.Y.,
“Lightweight Fog Computing-based Authentication Protocols Using Physically Unclonable Functions for Internet of Medical Things,” Journal of Information Security and
Applications, Vol. 59, June 2021, 102817. doi.org/10.1016/j.jisa.2021.102817
(SCI; IF= 2.327; MOST 109-2221-E-320-003 and TCRPP109001) · (2021) Chen, F.M., Lee, T.F.*, “Anonymous Group-oriented Time-bound Key Agreement
for Internet of Medical Things in Telemonitoring
Using Chaotic-maps,” IEEE Internet of
Things Journal, vol. 8, no. 18, pp. 13939 – 13949, 2021. (SCI; IF=9.936; Rank Factor: 11/307=3.58%;
MOST 109-2221-E-320-003 and TCRPP109001). · (2020) Lee, T.F.*, Li H.-Z., Hsieh, Y.-P., “A Blockchain-based Medical Data
Preservation Scheme for Telecare Medical
Information Systems,” International
Journal of Information Security, Published online, Aug. 2020. DOI
10.1007/s10207-020-00521-8 (SCI,EI; IF=1.494; Rank
Factor: 53/108=49.07%; MOST 108-2221-E-320-001 and TCRPP107013) · (2020) Lee,
T.F.*, Diao Y.-Y., Chen, F.M., “An Improved Authenticated
Key Agreement Protocol with Privacy Protection for Mobile Healthcare Systems
with Wearable Sensors,” International
Journal of Business and Systems Research, Published online, Aug., 2020.
(EI; MOST 106-2221-E-320 -001). · (2019) Lee, T.-F.*, Chen, F.M., “Lightweight
Identity-based Group Key Agreements Using Extended Chaotic Maps for Wireless
Sensor Networks,” IEEE Sensors Journal,
vol.19 , no. 22, pp. 10910 – 10916, Nov., 2019 (SCI,EI; IF=3.076; Rank
Factor: 13/61=21.31%; MOST 105-2221-E-320-003 and MOST 106-2221-E-320 -001). · (2019) Lee,
T.F.*, Diao Y.-Y., Hsieh, Y.-P., “A
ticket-based multi-server biometric authentication scheme using extended
chaotic maps for telecare medical information
systems,” Multimedia Tools and
Applications, Published online, July 2019. DOI
10.1007/s11042-019-07949-8. (SCI,EI; IF=2.101; Rank Factor: 37/104=35.58%;
TCRPP107013) · (2019) Chen, F.M., Lee, T.-F.*, Pan J.-I, “An Enhanced Lightweight
Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme
Using Wireless Sensor Networks for Agriculture Monitoring,” Sensors, vol. 19, no. 11, pp.
1146:1-25, March, 2019. doi:10.3390/s19051146
(SCI,EI; IF=3.031; Rank Factor: 15/61=24.59%; TCRPP107013). ·
(2018) Lee, T.-F.*,
“Provably secure anonymous single sign-on authentication mechanisms using
extended Chebyshev chaotic maps for distributed
computer networks,” IEEE Systems
Journal, vol. 12, no. 2, pp. 1499–1505, June 2018. DOI:10.1109/JSYST.2015.2471095.
(SCI,EI;
IF=3.882; Rank Factor:11/146=7.53%; MOST 103-2221-E-320 -003, MOST
104-2221-E-320 -002 and TCRPP103008). · (2018) Chen, F.M., Lee, T.F.*, “Enhancing dynamic
identity based authentication and key agreement using extended chaotic maps
for telecare medicine information systems,” Journal of Quality, vol. 25, no. 3,
pp. 153-165, 2018. (EI; MOST
105-2221-E-320 -003 and MOST 106-2221-E-320 -001). ·
(2017) T.-H. Lin, Tsung, C.-K.*, Lee, T.-F., Wang, Z.-B., “Round-Efficient
Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group
Cloud Meeting,” Sensors, vol. 17, no. 2793, pp. 1–24, Dec. Nov. 2017. (SCI,EI;
IF=2.677; Rank Factor:10/58=17.24%). · (2017) Lee, T.-F.*, Chen,
P.-Q. and Hwang, S.-H.,
“An extended Chaotic map-based HIPAA-compliant key management scheme with
revocation of authorization,” Communications
of the CCISA, vol. 23, no.4, pp. 55-72, Oct. 2017. (MOST 105-2221-E-320
-003 and TCRPP105004). · (2017) Lee,
T.-F. Hsiao, C.-H., Hwang, S.-H. and Lin,
T.-H.*, “Enhanced smartcard-based password-authenticated key agreement using
extended chaotic maps,” PLOS ONE, vol.12, no.7, July 2017, e0181744. doi: 10.1371/journal.pone.
0181744. (SCI; IF=3.057; Rank Factor:11/63=17.46%;
MOST 105-2221-E-320 -003 and TCRPP105004). · (2017) Lee, T.-F. and Hwang, T.*,
“Three-party authenticated key agreements for optimal communication,” PLOS ONE, vol.12, no.3, Mar. 2017,
e0174473. doi:
10.1371/journal.pone.0174473. (SCI;
IF=3.057; Rank Factor:11/63=17.46%; MOST
105-2221-E-320 -003 and TCRPP105004). [2012~2016] · Chang, I-P., Lee,
T.-F.*, Lin, T.-H., Liu, C.-M., “Enhanced two-factor authentication and
key agreement using dynamic identities in wireless sensor networks,” Sensors,
vol.15, pp. 29841–29854, Nov. 2015. (SCI,EI;
IF=2.245; Rank Factor:10/56=17.86%; MOST 104-2221-E-320 -002.). · Lee, T.-F., Lin, C.-Y., Lin, C.-L. and Hwang, T.*, “Provably
secure extended chaotic map-based three-party key agreement protocols using
password authentication,” Nonlinear
Dynamics, vol. 82, issue 1, pp. 29-38, Oct. 2015. (SCI,EI; IF=2.849; Rank
Factor:7/130=5.38%; MOST 103-2221-E-320 -003). ·
Lee, T.-F.* “Efficient
three-party authenticated key agreements based on Chebyshev
chaotic map-based Diffie-Hellman assumption,” Nonlinear Dynamics, vol. 81, issue 4,
pp. 2071-2078, Aug. 2015. (SCI,EI; IF=2.849; Rank Factor:7/130=5.38%; MOST
103-2221-E-320 -003 and TCRPP103008). · Lee, T.-F.* “Efficient and secure temporal credential-based
authenticated key agreement using extended chaotic maps for wireless sensor
networks,” Sensors, vol.15,
pp.14960-14980, July 2015. (SCI,EI; IF=2.245; Rank Factor:10/56=17.86%; MOST
103-2221-E-320 -003 and TCRPP103008). ·
Lou, D.-C., Lee, T.-F.* and
Lin, T.-H. "Efficient biometric authenticated key agreements based on
extended chaotic maps for telecare medicine
information systems," Journal of
Medical Systems, vol. 39, pp. 58: 1-10, Mar. 2015. (SCI; IF=2.213; Rank Factor: 7/24=29.17%; MOST 103-2221-E-320 -003
and MOST 103-2221-E-182-032-MY3) · Lee, T.-F.*, “Enhancing the security of password authenticated
key agreement protocols based on chaotic maps,” Information Sciences, vol. 290, pp. 63-67, Jan. 2015.(SCI,EI;
IF=4.038; Rank Factor: 6/139=4.32%; NSC 102-2221-E-320-003). ·
Lee, T.-F.*, “An efficient
dynamic ID-based user authentication scheme using smart cards without
verifier tables,” Applied Mathematics
& Information Sciences, Vol. 9, No.1, pages 1–6, Jan. 2015. (SCI; IF=1.232; Rank Factor: 53/250 (2013);NSC
100-2221-E-320-003 & NSC 101-2221-E-320-004) · Lee, T.-F.*, “Verifier-based three-party authentication schemes
using extended chaotic maps for data exchange in telecare
medicine information systems,” Computer
Methods and Programs in Biomedicine, vol. 117, pp. 464-472, Dec. 2014. (SCI,EI;
IF=1.897; Rank Factor: 15/102=14.71%; NSC 102-2221-E-320-003). ·
Lin, T.-H. and Lee, T.-F.*,
"Secure verifier-based three-party authentication schemes without server
public keys for data exchange in telecare medicine
information systems," Journal of
Medical Systems, vol.38, Issue 30, pp.30:1-9, May 2014. (SCI; IF=1.372; Rank Factor: 14/25;
NSC102-2221-E-320-003; TCRPP102010) · Lee, T.-F.*, "An efficient chaotic maps-based authentication
and key agreement scheme using smartcards for telecare
medicine information systems," Journal
of Medical Systems, vol. 37, pp. 9958:1-9, Dec. 2013. (SCI; IF=1.783; Rank Factor: 11/23;
NSC 102-2221-E-320-003) ·
Lee, T.-F.*, “User authentication
scheme with anonymity, unlinkability and untrackability for global mobility networks,” Security and Communication Networks,
Vol. 6, Issue 11, pages 1404–1413, Nov. 2013. (SCI,EI; IF=0.414; NSC 100-2221-E-320-003) · Lee, T.-F.*, Chang, I-P. and Wang, C.-C., "Efficient
three-party encrypted key exchange using trapdoor functions," Security and Communication Networks,
Vol. 6, Issue 11, pages 1353–1358, Nov. 2013 (SCI,EI; IF=0.414; NSC 100-2221-E-320-003) ·
Lee, T.-F.*, Chang, I-P.,
Lin, T.-H. and Wang, C.-C., "A secure and efficient password-based user
authentication scheme using smart cards for the integrated EPR information
system," Journal of Medical
Systems, Vol. 37, Issue 3, pp. 9941:1-7, June 2013. (SCI; IF=1.783; Rank Factor: 11/23; NSC 101-2221-E-320-004) · Lee, T.-F. and Liu, Chuan-Ming*,
"A secure smart-card based authentication and key agreement scheme for telecare medicine information systems," Journal
of Medical Systems, Vol. 37, Issue 3, pp. 9933:1-8, June 2013. (SCI; IF=1.783; Rank Factor: 11/23; NSC 101-2221-E-320-004) ·
Lee, T.-F.*, Chang, I-P. and Wang, C.-C., " Simple group password-based authenticated key
agreements for the integrated EPR information system," Journal
of Medical Systems, Vol. 37, issue 2, pp. 9916:1-6, Apr. 2013. (SCI; IF=1.783; Rank Factor: 11/23; NSC 101-2221-E-320-004) [2008~2011] ·
Lee, T.-F. and Hwang, T.* “Provably Secure and Efficient
Authentication Techniques for the Global Mobility Network,” Journal of Systems and Software, Vol.84,
pp.1717– 1725, 2011. (SCI,EI;
IF=1.293; Rank Factor: 35/97) ·
Lee, T.-F. and Hwang, T.*, "Simple Password-Based Three-Party
Authenticated Key Exchange without Server Public Keys", Information
Sciences, vol.180, issue 9, pp. 1702–1714, May. 2010. (SCI,EI; IF=3.291; Rank Factor: 6/116) ·
Liu, J.-L.* and Lee, T.-F.,
" A Modified Non-dominated Sorting Genetic Algorithm with Fractional
Factorial Design for Multi-objective Optimization Problems ", Journal of Mechanics, vol. 26, no. 2,
pp. 127-140, June, 2010. (SCI,EI;
IF=0.714; Rank Factor: 85/112) ·
Lee, T.-F., Liu, J.-L.*,
M.-J. Sung, Yang, S.-B., and Chen, C.-M., "Communication- Efficient
Three-Party Protocols for Authentication and Key Agreement", Computers and Mathematics with
Applications, Vol.58, pp. 641-648, August 2009.(SCI, EI; IF=1.192; Rank Factor: 73/165) ·
Lee, T.-F., Chang, S.-H.,
Hwang, T.* and Chong, S.-K., “Enhanced Delegation-Based Authentication
Protocol for PCSs”, IEEE Transactions
on Wireless Communications, vol.8, no. 5, pp. 2166-6171, May 2009. (SCI, EI; IF=2.181; Rank Factor: 12/76) ·
Lee, T.-F.* and M.-J. Sung,
"Communication-efficient AUTHMAC_DH protocols", Computer Standards & Interfaces,
Vol. 30, pp.71-77, 2008. (SCI, EI;
IF=1.074; Rank Factor: 31/44) [1999~2007] ·
Lee, T.-F., Wen, H.-A. and
Hwang, T.*, “A Weil Pairing-based Round-Efficient and Fault-Tolerant Group
Key Agreement Protocol for Sensor Networks”, IEEE Press - Sensor Network Operations, pp. 571-579, May, 2006.(IEEE
Press Monograph) ·
Lee, T.-F., Chang, C.-C. and Hwang, T.*, "Private Authentication Techniques
for the Global Mobility Network", Wireless
Personal Communications, Vol.
35,Issue: 4, pp. 329-336, December 2005. (SCI, EI; IF=0.311; Rank Factor: 42/59) ·
Wen, H.-A., Lee, T.-F. and
Hwang, T.*, “A Provably Secure Three-Party Password-based Authenticated Key
Exchange Protocol Using Weil Pairing”,
IEE Proc. Communications, Vol.
152, No. 2, pp. 138-143, April 2005. (SCI,
EI; IF=0.273; Rank Factor: 174/206) ·
Lee, T.-F., Hwang, T.* and Lin C.-L., "Enhanced Three-Party Encrypted
Key Exchange without Server Public Keys”, Computers
& Security, Vol. 23, Issue: 7, pp. 571-577, 2004. (SCI, EI; IF=1.075; Rank Factor:
59/78) ·
Lee, T.-F. and Hwang, T.*,
"An Improved Conference Key Distribution Protocol Based on a Symmetric
Balanced Incomplete Block Design,” ACM
SIGOPS Operating Systems Review, Vol. 38, No. 3. pp. 58-63, July 2004.(EI) ·
Chang, C. C.*, Lee, T.-F., and Leu,
J.-J. "Partition Search Filter and Its Performance Analysis," Journal of Systems and Software, Vol.
47, pp. 35-43, 1999. (SCI, EI; IF=0.744;
Rank Factor: 56/82) Conference Paper · Lee, T.-F.* and Guo, T.-L., “Security Threats of Lightweight and
Anonymity-Preserving User Authentication Scheme for IoT-based
Healthcare,” 2025 International Conference on Medical and Health Informatics
(ICMHI 2025), Kyoto, Japan, May 16-18, 2025. (Tzu Chi University; TCMMP
112-02-03) · 李添福*, 郭采羚, “適用於物聯網基於PUF與區塊鏈的身份認證協定之效能和安全分析與其改善,” 第三十四屆全國資訊安全會議(CISC 2024) Cryptology and Information Security
Conference 2024, 台灣台北, Aug.29-30, 2024. (TCMMP 112-02-03) · Lee*, T.-F. and Wu, W.-H., “Enhanced
Lightweight Authenticated Key Agreement Protocol with Privacy Protection for Vehicle
Cloud Computing,” 2023 International Conference on Security and Information
Technologies with AI, Internet Computing and Big-data Applications (SITAIBA
2023), New Taipei City, Taiwan, Dec. 7-9, 2023. (NSTC 110-2221-E-320-005-MY2
& TCMMP 112-02-03) · Lee, T.-F.*, Chu, Y.-W., Hsu, C.-W., Chen, Z.-Y. and Huang, W.-J., “Security Enhancement
of Authentication Scheme for Smart Healthcare Services,” 2023 International
Conference on Medical and Health Informatics (ICMHI 2023), Kyoto, Japan, May
12-14, 2023. (NSTC 110-2221-E-320-005-MY2) · 李添福*, 鄭伊伶, 王碩呈, 吳玟嫻, “基於PUF技術與秘密分享機制之電子病歷存取控制,” 2022 人工智慧技術及應用研討會(AITA2022), 最佳論文獎, 台灣台中, May 20,
2022. (NSTC 110-2221-E-320-005-MY2) · Lee, T.-F.* and Huang,
W.-J., “Security Analysis of Authentication and Key Agreement for Internet of
Drones,” 2022 International Conference on Medical and Health Informatics
(ICMHI 2022), Kyoto, Japan, May 13-15, 2022. (NSTC 110-2221-E-320-005-MY2) · Tsai, M.-C., Shen*, T.-W., Ou, T.-K. and Lee, T.-F.,
“Measurement Oxygen Saturation Based on Amplitude of Single Wavelength of Photoacoustic Signal from Finger Tips,” 2021
International Conference on Medical and Health Informatics (ICMHI 2021),
Kyoto, Japan, May 14-16, 2021. · Lee,
T.-F.*, Wang, Y.-H., Huang, W.-J., Hsu, C.-W. and Lin, T.-H., “A Secure and Efficient
Access Control Scheme Based on PUF for Health Information Systems,” 2021
International Conference on Medical and Health Informatics (ICMHI 2021),
Kyoto, Japan, May 14-16, 2021. · 李明修, 李添福*, “適用於藥品供應鏈環境基於區塊鏈技術之輕量化運算數據管控機制,” 第三十屆全國資訊安全會議(CISC 2020)
Cryptology and Information Security Conference 2020, 台灣高雄, Sep.1-4,
2020. · Lee, T.-F.*, Kung, T.-S.
and Chang I-P., “Efficient Signature Scheme Using
Extended Chaotic Maps for Medical Imaging Records,” 2020 International
Conference on Medical and Health Informatics (ICMHI 2020), Kamakura, Japan,
Aug. 14-16, 2020. (MOST 108-2221-E-320-001) ICPS Proceedings-ICMHI 2020 (EI) · Lee, T.-F. and Liu*, C.-M., “An Efficient Date-constraint
Hierarchical Key Management Scheme with Fast Key Validation Checking for
Mobile Agents in E-Medicine System,” 2019 International Conference on Medical
and Health Informatics (ICMHI 2019), Xiamen, China, May 17-19, 2019.
(TCRPP107013) ICPS Proceedings-ICMHI 2019 (EI) · Tsai, C.-S., Huang, Q.-X., Lin, T.-H. and
Lee, T.-F.*,
“Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems,” 2019
International Conference on Medical and Health Informatics (ICMHI 2019),
Xiamen, China, May 17-19, 2019. (TCRPP107013) ICPS Proceedings-ICMHI 2019
(EI) · Lee, T.-F.* and Diao, Y.-Y. Chen, M.-F.,
“An Improved Authenticated Key Agreement Protocol with Privacy Protection for
Mobile Healthcare Systems with Wearable Sensors,” 2018 International
Conference on Medical and Health Informatics (ICMHI 2018), Tsukuba, Japan,
June 2018. (MOST 106-2221-E-320 -001) · Diao,
Y-.Y., Lee, T.-F.*, and Yang,
Z.-D., “適用於多伺服器與行動環境之植基於切比雪夫混沌映射改良式群體認證金鑰協商機制,” (CISC 2018) Cryptology and
Information Security Conference 2018, Taipei, Taiwan, May 2018. (MOST
106-2221-E-320 -001) · Lee, T.-F.* and Diao, Y.-Y., “Enhanced
multi-server authenticated key agreement using elliptic curve cryptography
for telecare medicine information systems”, International Symposium on Engineering and
Applied Science (ISEAS 2017), Osaka, Japan, August, 2017. (MOST
105-2221-E-320 -003 and TCRPP105004) · Chen, M. F. and Lee, T.-F.*, “Enhancing dynamic identity
based authentication and key agreement using extended chaotic maps for telecare medicine information systems”, 2017 International Conference on
International Conference on Medical and Health Informatics (ICMHI 2017),
Taichung, Taiwan,
May, 2017. (MOST 105-2221-E-320 -003
and TCRPP105004)(Excellent Paper Award in the Student
Essay Prize Competition Awards) · 李添福*, 黃立凱, 郭頌祥, ID-based 階層式電子病歷資料庫快速存取控制之研究, 2017
Conference on Information Technology and Applications in Outlying Islands (ITAOI
2017), Kinman, May, 2017. (MOST 105-2221-E-320
-003 and TCRPP105004) · Lee, T.-F.* and Su, G.-J., Enhanced Robust Biometric and
Smartcard Based Authenticated Key Agreement with Privacy Protection for
Multi-Server Environments, BAI2016 -
International Conference on Business and Information, Nagoya, Japan, July, 2016. (MOST 104-2221-E-320 -002) · Lee, T.-F.* and Su, G.-J., “Security Enhancements of User
Authentication and Key Agreements for HIPAA Privacy / Security Regulations,” (CISC 2016) Cryptology and Information
Security Conference 2016, Taichung, Taiwan, May 26-27, 2016. (MOST
104-2221-E-320 -002) · Lee, T.-F.* and Liu, C.-M., An enhanced temporal credential-based
authenticated key agreement scheme with privacy protection for wireless
sensor networks, 2015 GCEAS, Hong
Kong,
July, 2015. (MOST 103-2221-E-320-
003-02)(Best Paper Award) · 李添福*, 蕭嘉宏, 翁慶豪, 黃思翰, 可攜式裝置之電子病歷安全認證機制, (CISC 2015)
Cryptology and Information Security Conference 2015, 台灣高雄, May, 2015。(NSC102-2221-E-320-003,
MOST 103-2221-E-320-003-02 and TCRPP103008) · 施岳勳,黃思翰*,蕭嘉宏,李添福, 建構委外檢驗資安保護系統 Construction of Information Security
for Outsourcing Inspection System。JCMIT2014年國際醫學資訊聯合研討會,Nov., 2014, 台灣,台北。(MOST 103-2221-E-320-003-02) · Lee, T.-F., Liu, C.-M., Lin, T.-H., " Efficient
Chaotic Maps-Based Authenticated Key Agreements with Privacy
Protection," NCS 2013 全國計算機會議, Dec. 13-14,
2013. (NSC 102-2221-E-320-003) · 李添福*, 戴治仁, “結合生物辨識之智慧卡認證機制之研究,” (CISC 2013)
Cryptology and Information Security Conference 2013, Tainan, Taiwan, May
23-24, 2013.(NSC 101-2221-E-320-004) · 李添福*, 孫珮文, 林峻立, "使用Indefinite-index
之改良式RFID 認證機制", (CISC 2013) Cryptology and Information
Security Conference 2013, Tainan, Taiwan, May 23-24, 2013. (NSC
101-2221-E-320-004) · Lee, T.-F.*, “Enhanced Clock-based Authentication Techniques
Using Smart Cards for Resisting Parallel Sessions Attacks,” BAI 2013 International Conference on
Business and Information, Indonesia, Bali, July 07-09, 2013.(NSC 101-2221-E-320-004) · Lee,
T.-F.*, Chen, H.-C., Sun, P.-W., “An Efficient RFID
Authentication Scheme with Privacy Protection for Multi-Services,” BAI 2012 International Conference on
Business and Information, Sapporo, Japan, July 03-05, 2012.(NSC 100-2221-E-320-003) · Lee, T.-F., “A Gateway-Oriented Authenticated Key Exchange
Protocol Using Weak Passwords”, 第六屆流通與全球運籌論文研討會, Taichung, Taiwan, May 2011. · Lee,
T.-F.*, “Password authentication scheme using smart
cards for multiple services,” BAI 2010 International Conference on Business
and Information, Kitakyushu, Japan, July 05-07, 2010.(慈濟大學) · Lee, T.-F.*, Chang, J.-B. and Chung,
L.-C., “Key Exchange and Pseudonym Delivery Protocol with Password Authentication
for Vehicular Ad Hoc Networks”, The 21th International Conference on
Information Management (ICIM 2010), Tainan, Taiwan, May 21-22, 2010. · 李添福*,張志標,陳麒文,劉相君, “適用於智慧卡環境之相互認證機制,” The E-learning and Information Technology Symposium
2010 (EITS2010), Tainan, Taiwan, March 31, 2010. · Lee, T.-F.*, Chiang, C.-Y., Wen, H.-A. and
Liu, H.-C., “Security Enhancement of Gateway-Oriented Password-Based
Authenticated Key Exchange”, Information Management and Commerce Technology
Conference 2009, Yunlin, Taiwan, May, 2009. · Lee, T.-F.*, Wen, H.-A., Jin Y.-C. and
Chen C.- S., Password-Based Group Key Agreement with Server's Public Key for Hypergraphs”, 2008資通技術管理與應用會議, June 13, 2008. · Lee, T.-F.*, Sung, M.-J. and Yang,
S.-B., “Communication- Efficient Three-Party Protocols for Authentication and
Key Agreement”, 第二屆資訊管理學術暨專案管理實務研討會 2006, May 5, 2006. · Lee, T.-F.* and Hwang, T., "Improvement of the Round-Optimal
Conference Key Agreement Protocol of Boyd and Nieto ", 16th Information
Security Conference, June 8-9, 2006. · Chang, C. C.* and Lee, T. F., "A Generalized
Non-redundant 2D String Representation for Symbolic Pictures,"
Proceedings of the International Conference on Distributed System, Software
Engineering, and Database Systems, Kaohsiung, Taiwan, Dec., pp. 41-45, 1996. Others · Lee, T. F., "A Vertex
Ranking of Block Graphs," Master Thesis, Department of Computer Science
and · Lee, T.-F., “Communication
Optimal Authenticated Key Agreements,” Dissertation for Doctor of Philosophy,
Department of Computer Science and Information Engineering, National Cheng
Kung University, June 2008. |