An efficient biometrics-based remote user authentication scheme using smart cards CT Li, MS Hwang Journal of Network and computer applications 33 (1), 1-5, 2010 | 650 | 2010 |
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks CT Li, MS Hwang, YP Chu Computer Communications 31 (12), 2803-2814, 2008 | 310 | 2008 |
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks CT Li, CY Weng, CC Lee Sensors 13 (8), 9589-9603, 2013 | 154 | 2013 |
A novel user authentication and privacy preserving scheme with smart cards for wireless communications CT Li, CC Lee Mathematical and Computer Modelling 55 (1-2), 35-44, 2012 | 143 | 2012 |
An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system CT Li, TY Wu, CL Chen, CC Lee, CM Chen Sensors 17 (7), 1482, 2017 | 141 | 2017 |
Challenges in e-government and security of information MS Hwang, CT Li, JJ Shen, YP Chu Information & Security 15 (1), 9-20, 2004 | 119 | 2004 |
Design and implementation of an ML and IoT based adaptive traffic-management system for smart cities UK Lilhore, AL Imoize, CT Li, S Simaiya, SK Pani, N Goyal, A Kumar, ... Sensors 22 (8), 2908, 2022 | 110 | 2022 |
Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems CT Li, DH Shih, CC Wang Computer methods and programs in biomedicine 157, 191-203, 2018 | 108 | 2018 |
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps CC Lee, CT Li, CW Hsu Nonlinear Dynamics 73, 125-132, 2013 | 103 | 2013 |
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card CT Li IET Information Security 7 (1), 3-10, 2013 | 101 | 2013 |
A secure cloud-assisted wireless body area network in mobile emergency medical care system CT Li, CC Lee, CY Weng Journal of medical systems 40 (5), 117, 2016 | 88 | 2016 |
A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system CT Li, CY Weng, CC Lee Journal of medical systems 39 (8), 77, 2015 | 86 | 2015 |
A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems CT Li, CC Lee, CY Weng Journal of medical systems 38, 1-11, 2014 | 83 | 2014 |
An electronic voting protocol with deniable authentication for mobile ad hoc networks CT Li, MS Hwang, CY Liu Computer Communications 31 (10), 2534-2540, 2008 | 78 | 2008 |
A simple and efficient authentication scheme for mobile satellite communication systems CC Lee, CT Li, RX Chang International Journal of Satellite Communications and Networking 30 (1), 29-38, 2012 | 77 | 2012 |
An extended chaotic-maps-based protocol with key agreement for multiserver environments CC Lee, DC Lou, CT Li, CW Hsu Nonlinear Dynamics 76 (1), 853-866, 2014 | 76 | 2014 |
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems CT Li, CC Lee, CY Weng, SJ Chen Journal of medical systems 40 (11), 233, 2016 | 70 | 2016 |
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks CT Li, MS Hwang Information Sciences 181 (23), 5333-5347, 2011 | 69 | 2011 |
Enhanced convolutional neural network model for cassava leaf disease identification and classification UK Lilhore, AL Imoize, CC Lee, S Simaiya, SK Pani, N Goyal, A Kumar, ... Mathematics 10 (4), 580, 2022 | 68 | 2022 |
An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks CT Li, MS Hwang, YP Chu International Journal of Innovative Computing, Information and Control 5 (8 …, 2009 | 65 | 2009 |