Publications

Journal Paper

[2017~]

·   (2024) Lee, T.-F.*, Ye, X., Huang, W.-J. “Lightweight Privacy-Preserving Authenticated Key Agreements Using Physically Unclonable Functions for Internet of Drones,” Journal of Information Security and Applications, vol. 87, 103915, Dec. 2024 (SCI,EI; IF=3.8; Rank Factor: 70/250 =28.0%; NSTC 110-2221-E-320-005-MY2 & TCMMP 112-02-03).

 

·   (2024) Lee, T.-F.*, Chang I-P., Huang, W.-J. “A Privacy-preserving Authenticated Key Agreement Scheme Based on Physically Unclonable Functions for Multi-server Architecture,” IEEE Transactions on Services Computing, vol. 17, no. 6, pp. 3065 - 3077 Nov.-Dec. 2024 (SCI,EI; IF=5.5; Rank Factor: 10/132=7.58%; NSTC 110-2221-E-320-005-MY2 & TCMMP 112-02-03).

 

·   (2024) Lee, T.F., Huang, W.-J., Chang I-P.*, “Secure and Lightweight Key Agreement Protocol for Remote Surgery over Tactile Internet Using Physically Unclonable Functions,” Peer-to-Peer Networking and Applications, vol. 17, no. 6, pp. 4247–4263, Oct. 2024. (SCI; IF= 3.3; Rank Factor: 90/250=36.0%; NSTC 110-2221-E-320-005-MY2 & TCMMP 112-02)

 

·   (2024) Lee, T.F., Chang I-P.*, Wang, J.G., Chen, Y.C., Tsai, S.T., Chen, R.Y. “Extended Chaotic Map-based Key Management for Hierarchical Access Control in E-medicine Systems,” Peer-to-Peer Networking and Applications, vol. 17, pp. 858–870, Jan. 2024. (SCI; IF= 3.3; Rank Factor: 90/250=36.0%; MOST 110-2221-E-320-005-MY2 & TCMMP 112-02)

 

·    (2023) Lee, T.-F., Lou, D.-C.*, Chang, C.-H. “Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones,” Internet of Things, 23. 100877, Oct. 2023 (SCI,EI; IF=5.9; Rank Factor: 53/275 =19.27%; NSTC 110-2221-E-320-005-MY2 , MOST 111-2221-E-182-048-, & BMRPB30).

 

·   (2023) Lee, T.F., Chang I-P.*, Su, G.-J., “Compliance with HIPAA and GDPR in Certificateless-based Authenticated Key Agreement Using Extended Chaotic Maps,” electronic,12(5), 1108, Feb. 2023. (SCI; IF= 2. 9; Rank Factor:131/275=47.64%; MOST 110-2221-E-320-005-MY2 & TCMMP 112-02-03)

 

·    (2023) Lee, T.-F.*, Lin, K.-W., Hsieh, Y.-P., Lee, K.-C. “Lightweight Cloud Computing-based RFID Authentication Protocols Using PUF for e-Healthcare Systems,” IEEE Sensors Journal, Vol. 23, No. 6, pp. 6338-6349, Mar. 2023 (SCI,EI; IF=4.3; Rank Factor: 15/63=23.81%; NSTC 110-2221-E-320-005-MY2 & TCMMP 112-02-03).

 

·   (2023) Lee, T.F.*, Wang, J.G., Chen, Y.C. “Review of hierarchical database access control for E-medicine systems,” Tzu Chi Medical Journal, Vol. 35, No. 2, pp. 143-147, 2023. (MOST 110-2221-E-320-005-MY2).

 

·   (2022) Lee, T.F., Ye, X., Chen, W.Y., Chang, C.C.*, “Enhanced Authenticated Key Agreement for Surgical Applications in Tactile Internet Environment,” Sensors, 22, 7941, Oct. 2022. https://doi.org/10.3390/s22207941 (SCI; IF=3.847; Rank Factor: 19/64=29.69%; MOST 109-2221-E-320-003, MOST 110-2221-E-320-005-MY2, MOST 110-2221-E-040-004-MY2 & TCRPP109001)

 

·   (2022) Lee, T.F., Gao, T.L., Chang, C.C.*, “Constructing a Secure Encryption and Secret Sharing Mechanism for Taiwan Biobank of a Medical Center,” Journal of Technology, Vol. 37, No. 3, pp. 211-224, Sep. 2022. (EI).

 

·   (2022) Lee, T.F.*, Huang, Y.-C., “Efficient Extended Chaotic Map-based IBE for Industrial Environment,” IEEE Access, vol. 10, pp. 71278 - 71283, July, 2022. (SCI; IF= 3.476; Rank Factor: 79/164=48.17%; 106-2221-E-320 -001, MOST 108-2221-E-320 -001; MOST 110-2221-E-320-005-MY2)

 

·   (2022) Lee, T.F.*, Ye, X., Lin, S.H. “Anonymous Dynamic Group Authenticated Key Agreements Using Physical Unclonable Functions for Internet of Medical Things,” IEEE Internet of Things Journal, Vol. 9, Issue: 16, pp. 15336 - 15348, Aug. 2022. (SCI; IF=10.238; Rank Factor: 9/164=5.49%; MOST 109-2221-E-320-003, MOST 110-2221-E-320-005-MY2).

 

·   (2022) Hsieh, Y.-P., Lee, K.-C., Lee, T.F.*, Su, G.-J., “Extended Chaotic-Map-Based User Authentication and Key Agreement for HIPAA Privacy/Security Regulations,” Applied Sciences, 12, 5701, June, 2022. https://doi.org/10.3390/app12115701 (SCI; IF= 2.838; Rank Factor: 39/92=42.39%;  MOST 110-2221-E-320-005-MY2)

 

·   (2021) Lee, T.F., Chang I-P.*, Kung T.-S., “Blockchain-based Healthcare Information Preservation Using Extended Chaotic Maps for HIPAA Privacy/Security Regulations,” Applied Sciences, vol. 11, no. 22, 10576, Nov., 2021. https://doi.org/10.3390/app112210576, (SCI; IF= 2.679; MOST 110-2221-E-320-005-MY2)

 

·   (2021) Lee, T.F.*, Chen, W.Y., “Lightweight Fog Computing-based Authentication Protocols Using Physically Unclonable Functions for Internet of Medical Things,” Journal of Information Security and Applications, Vol. 59, June 2021, 102817. doi.org/10.1016/j.jisa.2021.102817 (SCI; IF= 2.327; MOST 109-2221-E-320-003 and TCRPP109001)

 

·   (2021) Chen, F.M., Lee, T.F.*, “Anonymous Group-oriented Time-bound Key Agreement for Internet of Medical Things in Telemonitoring Using Chaotic-maps,” IEEE Internet of Things Journal, vol. 8, no. 18, pp. 13939 – 13949, 2021. (SCI; IF=9.936; Rank Factor: 11/307=3.58%; MOST 109-2221-E-320-003 and TCRPP109001).

 

·   (2020) Lee, T.F.*, Li H.-Z., Hsieh, Y.-P., “A Blockchain-based Medical Data Preservation Scheme for Telecare Medical Information Systems,” International Journal of Information Security, Published online, Aug. 2020. DOI 10.1007/s10207-020-00521-8 (SCI,EI; IF=1.494; Rank Factor: 53/108=49.07%; MOST 108-2221-E-320-001 and TCRPP107013)

 

·   (2020) Lee, T.F.*, Diao Y.-Y., Chen, F.M., “An Improved Authenticated Key Agreement Protocol with Privacy Protection for Mobile Healthcare Systems with Wearable Sensors,” International Journal of Business and Systems Research, Published online, Aug., 2020. (EI; MOST 106-2221-E-320 -001).

 

·    (2019) Lee, T.-F.*, Chen, F.M., “Lightweight Identity-based Group Key Agreements Using Extended Chaotic Maps for Wireless Sensor Networks,” IEEE Sensors Journal, vol.19 , no. 22, pp. 10910 – 10916, Nov., 2019 (SCI,EI; IF=3.076; Rank Factor: 13/61=21.31%; MOST 105-2221-E-320-003 and MOST 106-2221-E-320 -001).

 

·   (2019) Lee, T.F.*, Diao Y.-Y., Hsieh, Y.-P., “A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems,” Multimedia Tools and Applications, Published online, July 2019. DOI 10.1007/s11042-019-07949-8. (SCI,EI; IF=2.101; Rank Factor: 37/104=35.58%; TCRPP107013)

 

·    (2019) Chen, F.M., Lee, T.-F.*, Pan J.-I, “An Enhanced Lightweight Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring,” Sensors, vol. 19, no. 11, pp. 1146:1-25, March, 2019. doi:10.3390/s19051146 (SCI,EI; IF=3.031; Rank Factor: 15/61=24.59%; TCRPP107013).

 

·   (2018) Lee, T.-F.*, “Provably secure anonymous single sign-on authentication mechanisms using extended Chebyshev chaotic maps for distributed computer networks,” IEEE Systems Journal, vol. 12, no. 2, pp. 1499–1505, June 2018. DOI:10.1109/JSYST.2015.2471095. (SCI,EI; IF=3.882; Rank Factor:11/146=7.53%; MOST 103-2221-E-320 -003, MOST 104-2221-E-320 -002 and TCRPP103008).

 

·   (2018) Chen, F.M., Lee, T.F.*, “Enhancing dynamic identity based authentication and key agreement using extended chaotic maps for telecare medicine information systems,” Journal of Quality, vol. 25, no. 3, pp. 153-165, 2018. (EI; MOST 105-2221-E-320 -003 and MOST 106-2221-E-320 -001).

 

·    (2017) T.-H. Lin, Tsung, C.-K.*, Lee, T.-F., Wang, Z.-B., “Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting,” Sensors, vol. 17, no. 2793, pp. 1–24, Dec.  Nov. 2017. (SCI,EI; IF=2.677; Rank Factor:10/58=17.24%).

 

·   (2017) Lee, T.-F.*, Chen, P.-Q. and Hwang, S.-H., “An extended Chaotic map-based HIPAA-compliant key management scheme with revocation of authorization,” Communications of the CCISA, vol. 23, no.4, pp. 55-72, Oct. 2017. (MOST 105-2221-E-320 -003 and TCRPP105004).

 

·   (2017) Lee, T.-F. Hsiao, C.-H., Hwang, S.-H. and Lin, T.-H.*, “Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps,” PLOS ONE, vol.12, no.7, July 2017, e0181744. doi: 10.1371/journal.pone. 0181744. (SCI; IF=3.057; Rank Factor:11/63=17.46%; MOST 105-2221-E-320 -003 and TCRPP105004).

 

·   (2017) Lee, T.-F. and Hwang, T.*, “Three-party authenticated key agreements for optimal communication,” PLOS ONE, vol.12, no.3, Mar. 2017, e0174473. doi: 10.1371/journal.pone.0174473. (SCI; IF=3.057; Rank Factor:11/63=17.46%; MOST 105-2221-E-320 -003 and TCRPP105004).

 

[2012~2016]

·    Chang, I-P., Lee, T.-F.*, Lin, T.-H., Liu, C.-M., “Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks,” Sensors, vol.15, pp. 29841–29854, Nov. 2015. (SCI,EI; IF=2.245; Rank Factor:10/56=17.86%; MOST 104-2221-E-320 -002.).

 

·   Lee, T.-F., Lin, C.-Y., Lin, C.-L. and Hwang, T.*, “Provably secure extended chaotic map-based three-party key agreement protocols using password authentication,” Nonlinear Dynamics, vol. 82, issue 1, pp. 29-38, Oct. 2015. (SCI,EI; IF=2.849; Rank Factor:7/130=5.38%; MOST 103-2221-E-320 -003).

 

·    Lee, T.-F.* “Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie-Hellman assumption,” Nonlinear Dynamics, vol. 81, issue 4, pp. 2071-2078, Aug. 2015. (SCI,EI; IF=2.849; Rank Factor:7/130=5.38%; MOST 103-2221-E-320 -003 and TCRPP103008).

 

·    Lee, T.-F.* “Efficient and secure temporal credential-based authenticated key agreement using extended chaotic maps for wireless sensor networks,” Sensors, vol.15, pp.14960-14980, July 2015. (SCI,EI; IF=2.245; Rank Factor:10/56=17.86%; MOST 103-2221-E-320 -003 and TCRPP103008).

 

·    Lou, D.-C., Lee, T.-F.* and Lin, T.-H. "Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems," Journal of Medical Systems, vol. 39, pp. 58: 1-10, Mar. 2015. (SCI; IF=2.213; Rank Factor: 7/24=29.17%; MOST 103-2221-E-320 -003 and MOST 103-2221-E-182-032-MY3)

 

·    Lee, T.-F.*, “Enhancing the security of password authenticated key agreement protocols based on chaotic maps,” Information Sciences, vol. 290, pp. 63-67, Jan. 2015.(SCI,EI; IF=4.038; Rank Factor: 6/139=4.32%; NSC 102-2221-E-320-003).

 

·    Lee, T.-F.*, “An efficient dynamic ID-based user authentication scheme using smart cards without verifier tables,” Applied Mathematics & Information Sciences, Vol. 9, No.1, pages 1–6, Jan. 2015. (SCI; IF=1.232; Rank Factor: 53/250 (2013);NSC 100-2221-E-320-003 & NSC 101-2221-E-320-004)

 

·   Lee, T.-F.*, “Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems,” Computer Methods and Programs in Biomedicine, vol. 117, pp. 464-472, Dec. 2014. (SCI,EI; IF=1.897; Rank Factor: 15/102=14.71%; NSC 102-2221-E-320-003).

 

·    Lin, T.-H. and Lee, T.-F.*, "Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems," Journal of Medical Systems, vol.38, Issue 30, pp.30:1-9, May 2014. (SCI; IF=1.372; Rank Factor: 14/25; NSC102-2221-E-320-003; TCRPP102010)

 

·    Lee, T.-F.*, "An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems," Journal of Medical Systems, vol. 37, pp. 9958:1-9, Dec. 2013. (SCI; IF=1.783; Rank Factor: 11/23; NSC 102-2221-E-320-003)

 

·    Lee, T.-F.*, “User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks,” Security and Communication Networks, Vol. 6, Issue 11, pages 1404–1413, Nov. 2013. (SCI,EI; IF=0.414; NSC 100-2221-E-320-003)

 

·    Lee, T.-F.*, Chang, I-P. and Wang, C.-C., "Efficient three-party encrypted key exchange using trapdoor functions," Security and Communication Networks, Vol. 6, Issue 11, pages 1353–1358, Nov. 2013 (SCI,EI; IF=0.414; NSC 100-2221-E-320-003)

 

·    Lee, T.-F.*, Chang, I-P., Lin, T.-H. and Wang, C.-C., "A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system," Journal of Medical Systems, Vol. 37, Issue 3, pp. 9941:1-7, June 2013. (SCI; IF=1.783; Rank Factor: 11/23; NSC 101-2221-E-320-004)

 

·    Lee, T.-F. and Liu, Chuan-Ming*, "A secure smart-card based authentication and key agreement scheme for telecare medicine information systems," Journal of Medical Systems, Vol. 37, Issue 3, pp. 9933:1-8,  June 2013. (SCI; IF=1.783; Rank Factor: 11/23; NSC 101-2221-E-320-004)

 

·    Lee, T.-F.*, Chang, I-P. and Wang, C.-C., " Simple group password-based authenticated key agreements for the integrated EPR information system," Journal of Medical Systems, Vol. 37, issue 2, pp. 9916:1-6,  Apr. 2013. (SCI; IF=1.783; Rank Factor: 11/23; NSC 101-2221-E-320-004)

 

[2008~2011]

·    Lee, T.-F. and Hwang, T.* “Provably Secure and Efficient Authentication Techniques for the Global Mobility Network,” Journal of Systems and Software, Vol.84, pp.1717– 1725, 2011. (SCI,EI; IF=1.293; Rank Factor: 35/97)

 

·    Lee, T.-F. and Hwang, T.*, "Simple Password-Based Three-Party Authenticated Key Exchange without Server Public Keys", Information Sciences, vol.180, issue 9, pp. 1702–1714, May. 2010. (SCI,EI; IF=3.291; Rank Factor: 6/116)

 

·    Liu, J.-L.* and Lee, T.-F., " A Modified Non-dominated Sorting Genetic Algorithm with Fractional Factorial Design for Multi-objective Optimization Problems ", Journal of Mechanics, vol. 26, no. 2, pp. 127-140, June, 2010. (SCI,EI; IF=0.714; Rank Factor: 85/112)

 

·    Lee, T.-F., Liu, J.-L.*, M.-J. Sung, Yang, S.-B., and Chen, C.-M., "Communication- Efficient Three-Party Protocols for Authentication and Key Agreement", Computers and Mathematics with Applications, Vol.58, pp. 641-648, August 2009.(SCI, EI; IF=1.192; Rank Factor: 73/165)

 

·    Lee, T.-F., Chang, S.-H., Hwang, T.* and Chong, S.-K., “Enhanced Delegation-Based Authentication Protocol for PCSs”, IEEE Transactions on Wireless Communications, vol.8, no. 5, pp. 2166-6171, May 2009. (SCI, EI; IF=2.181; Rank Factor: 12/76)

 

·    Lee, T.-F.* and M.-J. Sung, "Communication-efficient AUTHMAC_DH protocols", Computer Standards & Interfaces, Vol. 30, pp.71-77, 2008. (SCI, EI; IF=1.074; Rank Factor: 31/44)

 

[1999~2007]

·    Lee, T.-F., Wen, H.-A. and Hwang, T.*, “A Weil Pairing-based Round-Efficient and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks”, IEEE Press - Sensor Network Operations, pp. 571-579, May, 2006.(IEEE Press Monograph)

 

·    Lee, T.-F., Chang, C.-C. and Hwang, T.*, "Private Authentication Techniques for the Global Mobility Network", Wireless Personal Communications,  Vol. 35,Issue: 4, pp. 329-336, December 2005. (SCI, EI; IF=0.311; Rank Factor: 42/59)

 

·    Wen, H.-A., Lee, T.-F. and Hwang, T.*, “A Provably Secure Three-Party Password-based Authenticated Key Exchange Protocol Using Weil Pairing”, IEE Proc. Communications, Vol. 152, No. 2, pp. 138-143, April 2005. (SCI, EI; IF=0.273; Rank Factor: 174/206)

 

·    Lee, T.-F., Hwang, T.* and Lin C.-L., "Enhanced Three-Party Encrypted Key Exchange without Server Public Keys”, Computers & Security, Vol. 23, Issue: 7, pp. 571-577, 2004. (SCI, EI; IF=1.075; Rank Factor: 59/78)

 

·    Lee, T.-F. and Hwang, T.*, "An Improved Conference Key Distribution Protocol Based on a Symmetric Balanced Incomplete Block Design,” ACM SIGOPS Operating Systems Review, Vol. 38, No. 3. pp. 58-63, July 2004.(EI)

 

·    Chang, C. C.*, Lee, T.-F., and Leu, J.-J. "Partition Search Filter and Its Performance Analysis," Journal of Systems and Software, Vol. 47, pp. 35-43, 1999. (SCI, EI; IF=0.744; Rank Factor: 56/82)

 

Conference Paper

 

·   Lee, T.-F.* and Guo, T.-L., “Security Threats of Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-based Healthcare,” 2025 International Conference on Medical and Health Informatics (ICMHI 2025), Kyoto, Japan, May 16-18, 2025. (Tzu Chi University; TCMMP 112-02-03)

 

·   李添福*, 郭采, “適用於物聯網基於PUF與區塊鏈的身份認證協定之效能和安全分析與其改善,” 第三十四屆全國資訊安全會議(CISC 2024) Cryptology and Information Security Conference 2024, 台灣台北, Aug.29-30, 2024. (TCMMP 112-02-03)

 

·   Lee*, T.-F. and Wu, W.-H., “Enhanced Lightweight Authenticated Key Agreement Protocol with Privacy Protection for Vehicle Cloud Computing,” 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023), New Taipei City, Taiwan, Dec. 7-9, 2023. (NSTC 110-2221-E-320-005-MY2 & TCMMP 112-02-03)

 

·   Lee, T.-F.*, Chu, Y.-W., Hsu, C.-W., Chen, Z.-Y.   and Huang, W.-J., “Security Enhancement of Authentication Scheme for Smart Healthcare Services,” 2023 International Conference on Medical and Health Informatics (ICMHI 2023), Kyoto, Japan, May 12-14, 2023. (NSTC 110-2221-E-320-005-MY2)

 

·    李添福*, 鄭伊伶, 王碩呈, 玟嫻, “基於PUF技術與秘密分享機制之電子病歷存取控制,” 2022 人工智慧技術及應用研討會(AITA2022), 最佳論文獎, 台灣台中, May 20, 2022. (NSTC 110-2221-E-320-005-MY2)

 

·   Lee, T.-F.* and Huang, W.-J., “Security Analysis of Authentication and Key Agreement for Internet of Drones,” 2022 International Conference on Medical and Health Informatics (ICMHI 2022), Kyoto, Japan, May 13-15, 2022. (NSTC 110-2221-E-320-005-MY2)

 

·    Tsai, M.-C., Shen*, T.-W., Ou, T.-K. and Lee, T.-F., “Measurement Oxygen Saturation Based on Amplitude of Single Wavelength of Photoacoustic Signal from Finger Tips,” 2021 International Conference on Medical and Health Informatics (ICMHI 2021), Kyoto, Japan, May 14-16, 2021.

 

·   Lee, T.-F.*, Wang, Y.-H., Huang, W.-J., Hsu, C.-W. and Lin, T.-H., “A Secure and Efficient Access Control Scheme Based on PUF for Health Information Systems,” 2021 International Conference on Medical and Health Informatics (ICMHI 2021), Kyoto, Japan, May 14-16, 2021.

 

·   李明修, 李添福*, 適用於藥品供應鏈環境基於區塊鏈技術之輕量化運算數據管控機制,” 第三十屆全國資訊安全會議(CISC 2020) Cryptology and Information Security Conference 2020, 台灣高雄, Sep.1-4, 2020.

 

·   Lee, T.-F.*, Kung, T.-S. and Chang  I-P., “Efficient Signature Scheme Using Extended Chaotic Maps for Medical Imaging Records,” 2020 International Conference on Medical and Health Informatics (ICMHI 2020), Kamakura, Japan, Aug. 14-16, 2020. (MOST 108-2221-E-320-001) ICPS Proceedings-ICMHI 2020 (EI)

 

·   Lee, T.-F. and Liu*, C.-M., “An Efficient Date-constraint Hierarchical Key Management Scheme with Fast Key Validation Checking for Mobile Agents in E-Medicine System,” 2019 International Conference on Medical and Health Informatics (ICMHI 2019), Xiamen, China, May 17-19, 2019. (TCRPP107013) ICPS Proceedings-ICMHI 2019 (EI)

 

·   Tsai, C.-S., Huang, Q.-X., Lin, T.-H. and  Lee, T.-F.*, “Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems,” 2019 International Conference on Medical and Health Informatics (ICMHI 2019), Xiamen, China, May 17-19, 2019. (TCRPP107013) ICPS Proceedings-ICMHI 2019 (EI)

 

·   Lee, T.-F.* and Diao, Y.-Y. Chen, M.-F., “An Improved Authenticated Key Agreement Protocol with Privacy Protection for Mobile Healthcare Systems with Wearable Sensors,” 2018 International Conference on Medical and Health Informatics (ICMHI 2018), Tsukuba, Japan, June 2018. (MOST 106-2221-E-320 -001)

 

·   Diao, Y-.Y., Lee, T.-F.*, and Yang, Z.-D., “適用於多伺服器與行動環境之植基於切比雪夫混沌映射改良式群體認證金鑰協商機制,” (CISC 2018) Cryptology and Information Security Conference 2018, Taipei, Taiwan, May 2018. (MOST 106-2221-E-320 -001)

 

·   Lee, T.-F.* and Diao, Y.-Y., “Enhanced multi-server authenticated key agreement using elliptic curve cryptography for telecare medicine information systems”, International Symposium on Engineering and Applied Science (ISEAS 2017), Osaka, Japan, August, 2017. (MOST 105-2221-E-320 -003 and TCRPP105004)

 

·   Chen, M. F. and Lee, T.-F.*, “Enhancing dynamic identity based authentication and key agreement using extended chaotic maps for telecare medicine information systems”, 2017 International Conference on International Conference on Medical and Health Informatics (ICMHI 2017), Taichung, Taiwan, May, 2017. (MOST 105-2221-E-320 -003 and TCRPP105004)(Excellent Paper Award in the Student Essay Prize Competition Awards)

 

·   李添福*, 黃立凱, 郭頌祥, ID-based 階層式電子病歷資料庫快速存取控制之研究, 2017 Conference on Information Technology and Applications in Outlying Islands (ITAOI 2017), Kinman, May, 2017. (MOST 105-2221-E-320 -003 and TCRPP105004)

 

·   Lee, T.-F.* and Su, G.-J., Enhanced Robust Biometric and Smartcard Based Authenticated Key Agreement with Privacy Protection for Multi-Server Environments, BAI2016 - International Conference on Business and Information, Nagoya, Japan, July, 2016. (MOST 104-2221-E-320 -002)

 

·   Lee, T.-F.* and Su, G.-J., “Security Enhancements of User Authentication and Key Agreements for HIPAA Privacy / Security Regulations,” (CISC 2016) Cryptology and Information Security Conference 2016, Taichung, Taiwan, May 26-27, 2016. (MOST 104-2221-E-320 -002)

 

·   Lee, T.-F.* and Liu, C.-M., An enhanced temporal credential-based authenticated key agreement scheme with privacy protection for wireless sensor networks, 2015 GCEAS, Hong Kong, July, 2015. (MOST 103-2221-E-320- 003-02)(Best Paper Award)

 

·    李添福*, 蕭嘉宏, 翁慶豪, 黃思翰, 可攜式裝置之電子病歷安全認證機制, (CISC 2015) Cryptology and Information Security Conference 2015, 台灣高雄, May, 2015(NSC102-2221-E-320-003, MOST 103-2221-E-320-003-02 and TCRPP103008)

 

·   施岳勳,黃思翰*,蕭嘉宏,李添福, 建構委外檢驗資安保護系統 Construction of Information Security for Outsourcing Inspection SystemJCMIT2014年國際醫學資訊聯合研討會Nov., 2014, 台灣,台北。(MOST 103-2221-E-320-003-02)

 

·    Lee, T.-F., Liu, C.-M., Lin, T.-H., " Efficient Chaotic Maps-Based Authenticated Key Agreements with Privacy Protection," NCS 2013 全國計算機會議, Dec. 13-14, 2013. (NSC 102-2221-E-320-003)

 

·   李添福*, 戴治仁, “結合生物辨識之智慧卡認證機制之研究,” (CISC 2013) Cryptology and Information Security Conference 2013, Tainan, Taiwan, May 23-24, 2013.(NSC 101-2221-E-320-004)

 

·   李添福*, 孫珮文, 林峻立, "使用Indefinite-index 之改良式RFID 認證機制", (CISC 2013) Cryptology and Information Security Conference 2013, Tainan, Taiwan, May 23-24, 2013. (NSC 101-2221-E-320-004)

 

·   Lee, T.-F.*, “Enhanced Clock-based Authentication Techniques Using Smart Cards for Resisting Parallel Sessions Attacks,” BAI 2013 International Conference on Business and Information, Indonesia, Bali, July 07-09, 2013.(NSC 101-2221-E-320-004)

 

·   Lee, T.-F.*, Chen, H.-C., Sun, P.-W., “An Efficient RFID Authentication Scheme with Privacy Protection for Multi-Services,” BAI 2012 International Conference on Business and Information, Sapporo, Japan, July 03-05, 2012.(NSC 100-2221-E-320-003)

 

·   Lee, T.-F., “A Gateway-Oriented Authenticated Key Exchange Protocol Using Weak Passwords”, 第六屆流通與全球運籌論文研討會, Taichung, Taiwan, May 2011.

 

·   Lee, T.-F.*, “Password authentication scheme using smart cards for multiple services,” BAI 2010 International Conference on Business and Information, Kitakyushu, Japan, July 05-07, 2010.(慈濟大學)

 

·   Lee, T.-F.*, Chang, J.-B. and Chung, L.-C., “Key Exchange and Pseudonym Delivery Protocol with Password Authentication for Vehicular Ad Hoc Networks”, The 21th International Conference on Information Management (ICIM 2010), Tainan, Taiwan, May 21-22, 2010.

 

·   李添福*,張志標,陳麒文,劉相君, “適用於智慧卡環境之相互認證機制,” The E-learning and Information Technology Symposium 2010 (EITS2010), Tainan, Taiwan, March 31, 2010.

 

·   Lee, T.-F.*, Chiang, C.-Y., Wen, H.-A. and Liu, H.-C., “Security Enhancement of Gateway-Oriented Password-Based Authenticated Key Exchange”, Information Management and Commerce Technology Conference 2009, Yunlin, Taiwan, May, 2009.

 

·   Lee, T.-F.*, Wen, H.-A., Jin Y.-C. and Chen C.- S., Password-Based Group Key Agreement with Server's Public Key for Hypergraphs”, 2008資通技術管理與應用會議, June 13, 2008.

 

·   Lee, T.-F.*, Sung, M.-J. and Yang, S.-B., “Communication- Efficient Three-Party Protocols for Authentication and Key Agreement”, 第二屆資訊管理學術暨專案管理實務研討會 2006, May 5, 2006.

 

·   Lee, T.-F.* and Hwang, T., "Improvement of the Round-Optimal Conference Key Agreement Protocol of Boyd and Nieto ", 16th Information Security Conference, June 8-9, 2006.

 

·   Chang, C. C.* and Lee, T. F., "A Generalized Non-redundant 2D String Representation for Symbolic Pictures," Proceedings of the International Conference on Distributed System, Software Engineering, and Database Systems, Kaohsiung, Taiwan, Dec., pp. 41-45, 1996.

 

Others

·   Lee, T. F., "A Vertex Ranking of Block Graphs," Master Thesis, Department of Computer Science and Information Engineering National Chung Cheng University, July 1998.

 

·   Lee, T.-F., “Communication Optimal Authenticated Key Agreements,” Dissertation for Doctor of Philosophy, Department of Computer Science and Information Engineering, National Cheng Kung University, June 2008.