Chinese Version     Travel Life

    Personal Information

    項目符號

    Name: Chun-Ta LI

    項目符號

    Education: Ph.D. in Computer Science and Engineering from NCHU (2004/09 ~ 2008/06)

    項目符號

    Incumbency: Assistant Professor, Department of Information Management, Tainan University of Technology (2008/08 ~ Present) 

    項目符號

    Address: No.529, Zhongzheng Rd., Yongkang District, Tainan City 71002, TAIWAN (R.O.C.) (Department of Information Management, Tainan University of Technology)

    項目符號

    E-mail: th0040@mail.tut.edu.tw

    項目符號

    Phone: +886-6-2532106 ext. 5155 (Office)

    項目符號

    Fax: +886-6-2434897

    項目符號

    Office: L7095, The Building of Library and Information

    Teaching Courses

    項目符號

    Operating Systems PPT download

    項目符號

    Introduction of Information Management  PPT download

    項目符號

    Database System and Management PPT download

    項目符號

    Decision Support System PPT download

    項目符號

    Article Writing Skill PPT download

    項目符號

    Introduction to Computer Science PPT download

    項目符號

    Computer Network Security PPT download    

    項目符號

    Information Security PPT download

    項目符號

    Introduction to Cloud Technique PPT download

    項目符號

    Multiple Service of Learning I PPT download

    Teaching Timetables

    項目符號

    The first half of 2008 Academic Year Timetable download

    項目符號

    The later half of 2008 Academic Year Timetable download

    項目符號

    The first half of 2009 Academic Year Timetable download

    項目符號

    The later half of 2009 Academic Year Timetable download

    項目符號

    The first half of 2010 Academic Year Timetable download

    項目符號

    The later half of 2010 Academic Year Timetable download

    項目符號

    The first half of 2011 Academic Year Timetable download

    項目符號

    The later half of 2011 Academic Year Timetable download

    項目符號

    The first half of 2012 Academic Year Timetable download

    項目符號

    The later half of 2012 Academic Year Timetable download

    項目符號

    The first half of 2013 Academic Year Timetable download

    項目符號

    The later half of 2013 Academic Year Timetable download

    項目符號

    The first half of 2014 Academic Year Timetable download

     

    Research Interests

    項目符號

    Information and Network Security

    項目符號

    Wireless Sensor Networks

    項目符號

    Mobile Computing Security

    項目符號

    Cloud Computing Security

    項目符號

    RFID Security and Its Application

    項目符號

    Security Protocols for Ad Hoc Networks

    項目符號

    Information Retrieval and Dictionary Search

     

    Research Projects

    項目符號

    [The Study of Keyword Search over Encrypted Data against Inside Keyword Guessing Attack in Cloud Storage Service], Ministry of Science and Technology, Project No.: MOST 103-2221-E-165-003, 2014/08/01~2015/07/31, Principle Investigator.

    項目符號

    [The Study and Implementation of Privacy and Security for Remote User Authentication], National Science Council, Project No.: NSC 101-2221-E-165-002, 2012/08/01~2013/07/31, Principle Investigator.

    項目符號

    [The Study and Implementation of A Secure Routing Scheme with Payment Mechanism to Prevent Node Selfishness in Wireless Ad Hoc Networks], National Science Council, Project No.: NSC 100-2221-E-165-002, 2011/08/01~2012/07/31, Principle Investigator.

    項目符號

    [The Study and Implementation of Secure Billing Protocol for P2P Grid Computing Environments], National Science Council, Project No.: NSC 99-2221-E-165-001, 2010/08/01~2011/07/31, Principle Investigator.

    項目符號

    [The Study and Implementation of Secure MMOGs Scheme], National Science Council, Project No.: NSC 98-2218-E-165-001, 2009/08/01~2010/07/31, Principle Investigator.

    項目符號

    [The Study of Security Mechanisms for Wireless Ad Hoc Networks (II)], Ministry of Education, Aiming for the Top University and Elite Research Center Development Plan, Project No.: CC99118, 2010/01/01~2010/12/31, Co-Investigator

    項目符號

    [The Study of Security Mechanisms for Wireless Ad Hoc Networks (I)], Ministry of Education, Aiming for the Top University and Elite Research Center Development Plan, Project No.: CC98118, 2009/05/01~2009/12/31, Co-Investigator

     

    Publications

    項目符號

    International Journal Papers

    1. Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 38, no. 9, article 77, pp. 1-11, DOI 10.1007/s10916-014-0077-2, 2014. [SCI/EI] (IF: 1.372; Rank: 54/85 = 63.5%)

    2. Cheng-Chi Lee, Chi-Tung Chen, Chun-Ta Li, Pin Hsien Wu, “A Practical RFID Authentication Mechanism for Digital Television,” Telecommunication Systems, vol. 57, no. 3, pp. 239-246, DOI 10.1007/s11235-013-09844-5, 2014. [SCI/EI] (IF: 1.163; Rank: 37/78 = 47.4%)

    3. Chun-Ta Li, C. C. Lee, “A Novel User Authentication and Key Agreement Scheme with Smart Cards over Insecure Networks,” Information: An International Interdisciplinary Journal, vol. 17, no. 4, pp. 1271-1284, 2014. [SCI] (IF: 0.358; Rank: 71/90 = 78.9%)

    4. Cheng-Chi Lee, Der-Chyuan Lou, Chun-Ta Li, Che-Wei Hsu, “An Extended Chaotic-Maps-Based Protocol with Key Agreement for Multiserver Environments,” Nonlinear Dynamics, vol. 76, no. 1, pp. 853-866, 2014. [SCI/EI] (IF: 2.419; Rank: 11/138 = 7.9%)

    5. Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture,” Journal of Information Science and Engineering, Article in press, 2014. [SCI/EI] (IF: 0.333; Rank: 128/135 = 94.8%)

    6. Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu, “A Novel Frequency Billing Service in Digital Television System,” Journal of Information Hiding and Multimedia Signal Processing, vol. 5, no. 3, pp. 439-450, 2014. [EI]

    7. Chun-Ta Li, Chin-Wen Lee, Jau-Ji Shen, “An Extended Chaotic Maps Based Keyword Search Scheme over Encrypted Data against Outside and Inside Keyword Guessing Attacks in Cloud Storage Services,” Nonlinear Dynamics, Accepted with minor revision, 2014. [SCI/EI] (IF: 2.419; Rank: 11/138 = 7.9%)

    8. Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Yan-Ming Lai, “A New Three-party Authenticated Key Agreement Scheme Based on Chaotic Maps without Password Table,” Nonlinear Dynamics, Accepted with minor revision, 2014. [SCI/EI] (IF: 2.419; Rank: 11/138 = 7.9%)

    9. Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “An Extended Chaotic Maps Based User Authentication and Privacy Preserving Scheme against DoS Attacks in Pervasive and Ubiquitous Computing Environments,” Nonlinear Dynamics, vol. 74, no. 4, pp. 1133-1143, DOI 10.1007/s11071-013-1029-y, 2013. [SCI/EI] (IF: 2.419; Rank: 11/138 = 7.9%)

    10. Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, “An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks,” Sensors, vol. 13, no. 8, pp. 9589-9603, 2013. [SCI/EI] (IF: 2.048; Rank: 10/57 = 17.5%)

    11. Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity,” KSII Transactions on Internet and Information Systems, vol. 7, no. 1, pp. 119-131, 2013. [SCI/EI] (IF: 0.345; Rank: 72/78 = 92.3%)

    12. Chun-Ta Li, “A New Password Authentication and User Anonymity Scheme Based on Elliptic Curve Cryptography and Smart Card,” IET Information Security, vol. 7, no. 1, pp. 3-10, 2013. [SCI/EI] (IF: 0.631; Rank: 63/102 = 61.8%)

    13. Chun-Ta Li, Cheng-Chi Lee, Chin-Wen Lee, “An Improved Two-Factor User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography,” Sensor Letters, vol. 11, no. 5, pp. 958-965, 2013. [SCI] (IF: 0.558; Rank: 45/57 = 78.9%)

    14. Chun-Ta Li, C. C. Lee, “More Secure Authenticated Group Key Agreement in a Mobile Environment,” Information: An International Interdisciplinary Journal, vol. 16, no. 9(B), pp. 6817-6830, 2013. [SCI] (IF: 0.358; Rank: 71/90 = 78.9%)

    15. Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Jian-Jhong Jheng, Yi-Rui Zhu, Xiao-Qian Zhang, “A Dynamic Identity Based User Authentication Scheme for Remote Login Systems,” Security and Communication Networks, Accepted with minor revision, 2013. [SCI/EI] (IF: 0.433; Rank: 116/135 = 85.9%)

    16. Cheng-Chi Lee, Chun-Ta Li, Che-Wei Hsu, “A Three-party Password-based Authenticated Key Exchange Protocol with User Anonymity using Extended Chaotic Maps,” Nonlinear Dynamics, vol. 73, no. 1-2, pp. 125-132, 2013. [SCI/EI] (IF: 2.419; Rank: 11/138 = 7.9%)

    17. Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chin-Wen Lee, “Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks,” International Journal of Security and Its Applications, vol. 7, no. 3, pp. 249-257, 2013. [EI]

    18. Chun-Ta Li, Min-Shiang Hwang, “A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol,” International Journal of Security and Its Applications, vol. 7, no. 1, pp. 59-70, 2013. [EI]

    19. Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang, “An Undetectable On-line Password Guessing Attack on Nam et al.'s Three-party Key Exchange Protocol,” Journal of Computational Methods in Sciences and Engineering, vol. 13, no. 5-6, pp. 455-460, 2013. [EI]

    20. Chun-Ta Li, Yan-Ming Lai, Cheng-Chi Lee, “Enhanced Threshold Anonymous Announcement in VANETs,” International Journal of Information Technology and Computer Science, vol. 12, no. 2, pp. 16-23, 2013.

    21. Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chin-Wen Lee, Ping-Nan Chiu, Cheng-Yi Wu, “Security Flaws of A Password Authentication Scheme for Hierarchical WSNs,” Journal of Advances in Computer Networks, vol. 1, no. 2, pp. 121-124, 2013.

    22. Cheng-Chi Lee, Chun-Ta Li, Min-Shiang Hwang, “Cryptanalysis of Two Multi-party Keys Based on The Diffie-Hellman Technique,” WSEAS Transactions on Communications, Article in press, 2013. [EI]

    23. Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li, “Improving Security of A Communication-efficient Three-party Password Authenticated Key Exchange Protocol,” International Journal of Network Security, Article in press, 2013. [EI]

    24. Chun-Ta Li, C. C. Lee, “A Novel User Authentication and Privacy Preserving Scheme with Smart Cards for Wireless Networks,” Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 35-44, 2012. [SCI/EI] (IF: 1.420; Rank: 38/247 = 15.4%) (This article was one of the Top 25 Hottest Articles during January to December 2011 full year of Mathematical and Computer Modelling)

    25. Chun-Ta Li, Chou-Chen Yang, Min-Shiang Hwang, “A Secure Routing Protocol with Node Selfishness Resistance in MANETs,” International Journal of Mobile Communications, vol. 10, no. 1, pp. 103-118, 2012. [SSCI/EI] (IF: 0.94; Rank: 25/67 = 37.3%)

    26. Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang, “A Simple and Efficient Authentication Scheme for Mobile Satellite Communication Systems,” International Journal of Satellite Communications and Networking, vol. 30, no. 1, pp. 29-38, 2012. [SCI/EI] (IF: 0.535; Rank: 14/27 = 51.9%)

    27. Chun-Ta Li, “A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications,” Information Technology and Control, vol. 41, no. 1, pp. 69-76, 2012. [SCI] (IF: 0.667; Rank: 88/132 = 66.7%)

    28. Cheng-Chi Lee, Chun-Ta Li, Te-Yu Chen, Chia-Ying Wu, “Towards Secure User Authentication and Key Agreement Protocol Based on Bilinear Pairings for Mobile Client-Server Environments,” Telecommunication Systems, Article in press, 2013. [SCI/EI] (IF: 1.163; Rank: 37/78 = 47.4%)

    29. Chun-Ta Li, Cheng-Chi Lee, Hsing Mei, Chia-Hao Yang, “A Password and Smart Card Based User Authentication Mechanism for Multi-Server Environments,” International Journal of Future Generation Communication and Networking, vol. 5, no. 4, pp. 153-163, 2012. [EI]

    30. Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “A RFID-Based Macro-Payment Scheme with Security and Authentication for Retailing Services,” ICIC Express Letters, vol. 6, no. 12, pp. 3163-3170, 2012. [EI]

    31. Chun-Ta Li, Chi-Yao Weng, Chun-I Fan, “Two-Factor User Authentication in Multi-Server Networks,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 261-267, 2012. [EI]

    32. Chun-Ta Li, Min-Shiang Hwang, “Security Enhancement of Chang-Lee Anonymous E-Voting Scheme,” International Journal of Smart Home, vol. 6, no. 2, pp. 45-51, 2012. [EI]

    33. Cheng-Chi Lee, Yan-Ming Lai, Chun-Ta Li, “An Improved Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 203-209, 2012. [EI]

    34. Chun-Ta Li, Min-Shiang Hwang, “A Lightweight Anonymous Routing Protocol Without Public Key En/Decryptions for Wireless Ad Hoc Networks,” Information Sciences, vol. 181, no. 23, pp. 5333-5347, 2011. [SCI/EI] (IF: 2.833; Rank: 9/133 = 6.8%)

    35. Chun-Ta Li, Cheng-Chi Lee, “A Robust Remote User Authentication Scheme Using Smart Card,” Information Technology and Control, vol. 40, no. 3, pp. 236-245, 2011. [SCI] (IF: 0.880; Rank: 73/133 = 54.9%)

    36. Chun-Ta Li, C. C. Lee, L. J. Wang, C. J. Liu, “A Secure Billing Service with Two-Factor User Authentication in Wireless Sensor Networks,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 8, pp. 4821-4831, 2011. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)

    37. Chun-Ta Li, “Secure Smart Card Based Password Authentication Scheme with User Anonymity,” Information Technology and Control, vol. 40, no. 2, pp. 157-162, 2011. [SCI] (IF: 0.880; Rank: 73/133 = 54.9%)

    38. Cheng-Chi Lee, Chun-Ta Li, Kou-You Huang, Shiow-Yuan Huang, “An Improvement of Remote Authentication and Key Agreement Schemes,” Journal of Circuits, Systems, and Computers, vol. 20, no. 4, pp. 697-707, 2011. [SCI/EI] (IF: 0.281; Rank: 216/244 = 88.5%)

    39. Cheng-Chi Lee, Chun-Ta Li, Shun-Der Chen, “Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks,” Parallel Processing Letters, vol. 21, no. 1, pp. 21-26, 2011. [EI]

    40. Chun-Ta Li, Min-Shiang Hwang, “An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1-5, 2010. [SCI/EI] (IF: 0.66; Rank: 34/48 = 71%) (This article was one of the Most Cited Journal of Network and Computer Applications Articles published since 2008)

    41. Chun-Ta Li, Min-Shiang Hwang, “An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 5, pp. 2181-2188, 2010. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)

    42. Chun-Ta Li, C. H. Wei, C. C. Lee, Y. H. Chin, L. J. Wang, “A Secure and Undeniable Billing Protocol among Charged Parties for Grid Computing Environments,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 11, pp. 5061-5076, 2010. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)

    43. Chun-Ta Li, Min-Shiang Hwang, “A Batch Verifying and Detecting the Illegal Signatures,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 12, pp. 5311-5320, 2010. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)

    44. Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang, “A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels,” Journal of Information Assurance and Security, vol. 5, no. 3, pp. 201-208, 2010.

    45. Chun-Ta Li, C. H. Wei, Y. H. Chin, “A Secure Event Update Protocol for Peer-To-Peer Massively Multiplayer Online Games Against Masquerade Attacks,” International Journal of Innovative Computing, Information and Control, vol. 5, no. 12(A), pp. 4715-4723, 2009. [SCI/EI] (IF: 2.932; Rank: 3/59 = 5.1%)

    46. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “An Efficient Sensor-To-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks,” International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, 2009. [SCI/EI] (IF: 2.932; Rank: 3/59 = 5.1%) (This article won 2011 IJICIC Most Cited Paper Award)

    47. Chun-Ta Li, “An Efficient and Secure Communication Scheme for Trusted Computing Environments,” Journal of Computers, vol. 20, no. 3, pp. 17-24, 2009.

    48. Chun-Ta Li, Yen-Ping Chu, “Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks,” International Journal of Network Security, vol. 8, no. 2, pp. 166-168, 2009. [EI]

    49. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks,” Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008. [SCI/EI] (IF: 0.884; Rank: 32/67 = 47.8%) (This article was one of the Most Cited Computer Communication Articles published since 2008)

    50. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Improving the Security of A Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks,” International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, 2008. [SCI/EI] (IF: 0.277; Rank: 41/45 = 91.1%)

    51. Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments,” Computer Communications, vol. 31, no. 18, pp. 4255-4258, 2008. [SCI/EI] (IF: 0.884; Rank: 32/67 = 47.8%)

    52. Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu, “An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks,” Computer Communications, vol. 31, no. 10, pp. 2534-2540, 2008. [SCI/EI] (IF: 0.884; Rank: 32/67 = 47.8%)

    53. Jau-Ji Shen, Chun-Ta Li, “A Two-Layer Dictionary Organization for Quickly Retrieval,” Journal of Applied Sciences, vol. 6, no. 5, pp. 1066-1070, 2006.

    54. Min-Shiang Hwang, Chun-Ta Li, Jau-Ji Shen, Yen-Ping Chu, “Challenges in E-Government and Security of Information," Information & Security. An International Journal, vol. 15, no. 1, pp. 9-20, 2004.

     

    項目符號

    Book Chapters

    1. Chun-Ta Li, Jau-Ji Shen, Chin-Wen Lee, “Security and Efficiency Analysis on A Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services,” The 4th International Symposium on Cloud and Services Computing (SC2 2014), LNCS, vol. 8662, pp. 367-375, Springer, Switzerland (2014), September 01-03, 2014, Beijing, China. [EI]

    2. Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu, “Cryptanalysis and Improvement of An ECC-based Password Authentication Scheme Using Smart Cards,” The 5th International Symposium on Cyberspace Safety and Security (CSS 2013), LNCS, vol. 8300, pp. 338-348, Springer, Switzerland (2013), November 13-15, 2013, Zhangjiajie, China. [EI]

    3. Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee, “A Robust Remote User Authentication Scheme Against Smart Card Security Breach,” 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2011), LNCS, vol. 6818, pp. 231-238, Springer, Heidelberg (2011), July 11-13, 2011, Richmond, USA. [EI]

    4. Chun-Ta Li, “Security of Wireless Sensor Networks,” INTECH, Book: Smart Wireless Sensor Networks, ISBN 978-953-307-261-6, pp. 299-313, December 2010.

    5. Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang, “On the Security Enhancement of An Efficient and  Secure Event Signature Protocol for P2P MMOGs,” The 2010 International Conference on Computational Science and Its Applications (ICCSA 2010), LNCS, vol. 6016, pp. 599-609, Springer, Heidelberg (2010), March 23-26, 2010, Fukuoka, Japan. [EI]

    6. Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li, “A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period,” The 2007 International Conference on Computational Science and Its Applications (ICCSA 2007), LNCS, vol. 4707, pp. 273-284, Springer, Heidelberg (2007), August 26-29, 2007, Kuala Lumpur, Malaysia. [EI]

     

    項目符號

    National Journal Papers

    1. Chun-Ta Li, Min-Shiang Hwang, “A Research on Integrated Personnel Administration System using Wireless Sensor Network - A Safety Entrance Guard System,” Personnel Monthly, vol. 47, no. 1, pp. 22-29, July 2008.

     

     

    項目符號

    International Conference Papers

    1. Chun-Ta Li, Chin-Wen Lee, Jau-Ji Shen, A Secure Three-party Authenticated Key Exchange Protocol Based on Extended Chaotic Maps in Cloud Storage Service,” The 29th International Conference on Information Networking (ICOIN 2015), IEEE CS, Jan. 12-14, 2015, Siem Reap, Cambodia. [EI]

    2. Chun-Ta Li, Cheng-Chi Lee, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang, “Cryptanalysis of An Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics,” The 29th International Conference on Information Networking (ICOIN 2015), IEEE CS, Jan. 12-14, 2015, Siem Reap, Cambodia. [EI]

    3. Chun-Ta Li, Chin-Wen Lee, Yi-Rui Zhu, Jian-Jhong Jheng, Xiao-Qian Zhang, “Cryptanalysis of A Dynamic Password Based User Authentication Scheme for HWSNs,” The 7th International Conference on Information Security and Assurance (ISA 2013), Advanced Science and Technology Letters, vol. 21, pp. 1-4, April 26-28, 2013, Cebu, Philippines.

    4. Cheng-Chi Lee, Chun-Ta Li, “Security Analysis on Two Diffie-Hellman Based Protocols,” The 2013 FTRA International Conference on Advanced IT, Engineering and Management (AIM 2013), Feb. 21-23, 2013, Seoul, Korea.

    5. Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “A Secure Payment Scheme Using RFID Technique for Retailing Services,” The Third International Conference Ubiquitous Computing and Multimedia Applications (UCMA 2012), Advanced Science and Technology Letters, vol. 7, pp. 36-41, June 28-30, 2012, Bali, Indonesia.

    6. Chun-Ta Li, Chi-Yao Weng, Chun-I Fan, “Cryptanalysis of A Robust and Efficient Smart Card Based Remote Login Mechanism for Multi-Server Architecture,” The 6th International Conference on Information Security and Assurance (ISA 2012), Advanced Science and Technology Letters, vol. 1, pp. 4-6, April 28-30, 2012, Shanghai, China.

    7. Chun-Ta Li, Min-Shiang Hwang, “Comments on Chang-Lee's Anonymous E-Voting Scheme,” The 6th International Conference on Information Security and Assurance (ISA 2012), Advanced Science and Technology Letters, vol. 1, pp. 41-43, April 28-30, 2012, Shanghai, China.

    8. Cheng-Chi Lee, Yan-Ming Lai, Chun-Ta Li, “On Security of A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment,” The 6th International Conference on Information Security and Assurance (ISA 2012), Advanced Science and Technology Letters, vol. 1, pp. 22-25, April 28-30, 2012, Shanghai, China.

    9. Cheng-Chi Lee, Chun-Ta Li, Te-Yu Chen, Ping-Hsien Wu, Chi-Tung Chen, “A New Key Exchange Protocol with Anonymity between STB and Smart Card in IPTV Broadcasting,” 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2011), IEEE CS, Sep. 23-25, 2011, Wuhan, China. [EI]

    10. Chun-Ta Li, Min-Shiang Hwang, Pin-Chieh Huang, “An Efficient Authenticated Key Agreement Scheme Without Using Smart Card,” 4th International Multi-Conference on Engineering and Technological Innovation (IMETI 2011), vol., 2, pp. 94-98, July 19-22, 2011, Orlando, Florida, USA.

    11. Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, “Cryptanalysis of Khan et al.'s Dynamic ID-based Remote User Authentication Scheme,” 10th International Conference on Intelligent Systems Design and Applications (ISDA 2010), IEEE CS, pp. 1382-1387, Nov. 29-Dec. 01, 2010, Cairo, Egypt. [EI]

    12. Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Rui-Xiang Chang, “On Security of A More Efficient and Secure Dynamic ID-based Remote User Authentication Scheme,” 10th International Conference on Intelligent Systems Design and Applications (ISDA 2010), IEEE CS, pp. 1371-1375, Nov. 29-Dec. 01, 2010, Cairo, Egypt. [EI]

    13. Chun-Ta Li, “An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards,” 5th International Conference on Information Assurance and Security (IAS 2009), IEEE CS, pp. 517-520, August 18-20, 2009, Xi'an, China. [EI]

    14. Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai, “A Verifiable Electronic Voting Scheme Over the Internet,” 6th International Conference on Information Technology: New Generations (ITNG 2009), IEEE CS, pp. 449-454, April 27-29, 2009, Las Vegas, Nevada, USA. [EI]

    15. Chun-Ta Li, Min-Shiang Hwang, “Improving the Security of Non-PKI Methods for Public Key Distribution,” 6th International Conference on Information Technology: New Generations (ITNG 2009), IEEE CS, pp. 1695-1696, April 27-29, 2009, Las Vegas, Nevada, USA. [EI]

    16. C. H. Wei, Y. H. Chin, Chun-Ta Li, “A Secure Billing Protocol for Grid Computing,” 6th International Conference on Information Technology: New Generations (ITNG 2009), IEEE CS, pp. 320-325, April 27-29, 2009, Las Vegas, Nevada, USA. [EI]

    17. Chun-Ta Li, Yan-Chi Lai, Min-Shiang Hwang, Yen-Ping Chu, “An Electronic Cash Scheme with Crime-Resistance,” International Computer Symposium 2006 (ICS 2006), December, 2006, Taipei, Taiwan.

    18. Jau-Ji Shen, Chun-Ta Li, “Full Text Retrieval on Distributed Digital Libraries,” 2003 International Conference on Informatics, Cybernetics and Systems (ICICS 2003), December, 2003, Kaohsiung, Taiwan.

     

    項目符號

    National Conference Papers

    1. Chun-Ta Li et al., “A Practical Electronic Payment Mechanism with Non-Synchronization Transaction Problem”2013 Conference on Electronic Business and Practice Application, ISBN 978-986-6341-39-7, pp.1-14, Tainan, May 16, 2013.

    2. Chun-Ta Li et al., “A Tag Identification and Orientation System for Amusement Parks using RFID Technique”, The E-Learning and Information Technology Symposium 2012, ISBN 978-986-6975-50-9, Tainan, Mar. 28, 2012.

    3. Chun-Ta Li et al., “An Unmanned System for Ordering Meals and Placing Dishes using RFID Technique”2011 Conference on Electronic Business and Practice Application, ISBN 978-986-6541-53-7, pp.27-44, Tainan, Dec. 09, 2011.

    4. Cheng-Chi Lee, Chia-Ying Wu, Chun-Ta Li, Shiow-Yuan Huang, “Cryptanalysis and Improvement of Fault-tolerant Conference Key Agreement”2011 Information Management Research and Application Conference, Taipei, May 24, 2011..

    5. Chun-Ta Li et al., “A Multi-Language Exposition System using RFID Technique”2010 Conference on Global Logistic Management and Industry Practice Research, ISBN 978-986-6541-31-5, pp.1-15, Tainan, Dec. 23, 2010.

    6. Cheng-Chi Lee, Meng-Chia Wu, Chun-Ta Li, “A New Mutual Authentication Scheme for RFID Conforming to EPC Class 1 Generation 2 Standards”2010 Network & RFID Technology Conference, Changhua, June 4, 2010.

    7. Chun-Ta Li et al., “RFID Macro Payment System for High-Level Liquor Application”2009 Conference on Global Logistic Management and Industry Practice Research, pp.512-527, Tainan, Dec. 17, 2009.

    8. Chun-Ta Li et al., “A RFID Payment Mechanism with Secure Communication and Mutual Authentication”2009 Conference on Global Logistic Management and Industry Practice Research, pp.528-543, Tainan, Dec. 17, 2009.

    9. Min-Shiang Hwang, Chun-Ta Li, “A Research on Interactive Education Environment using Wireless Sensor System - Take Department of MIS in a Teaching Institution as an Example”2008 Conference on Global Logistic Management and Industry Practice Research, pp.538-554, Tainan, Dec. 25, 2008.

    Academic Activities

    項目符號

    International Journal/Conferences Reviewer

    項目符號

    Editorial Board: International Journal of Network Security (2012/01~Now)

    項目符號

    Publishing Editor: International Journal of Network Security (2005/07~2011/12)

    項目符號

    Guest Editor: Journal of Computers (Special Issue on Trusted Computing and Communications)

    項目符號

    Program Committee: The 6th International Symposium on Cyberspace Safety and Security (CSS 2014)

    項目符號

    Program Committee: The 5th International Conference on Computer and Communication Technology (ICCCT-2014)

    項目符號

    Technical Committee: The 6th International Conference on Communication Software and Networks (ICCSN 2014)

    項目符號

    Technique Program Committee: The 2013 National Symposium Workshop on Digital - Forensics, Security and Privacy (NCS 2013)

    項目符號

    Program Committee: The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)

    項目符號

    Program Committee: The International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking (InfoSecHiComNet 2011)

    項目符號

    Program Committee: The 2010 International Conference on Computer Technology (ICCT 2010)

    項目符號

    Session Chair: The 2010 International Conference on Intelligent Systems Design and Applications (ISDA 2010)

    項目符號

    Paper Review: IEEE Transactions on Vehicular Technology: 2014

    項目符號

    Paper Review: Security and Communication Networks: 2014

    項目符號

    Paper Review: Soft Computing: 2014

    項目符號

    Paper Review: Computers: 2014

    項目符號

    Paper Review: Sensors: 2014

    項目符號

    Paper Review: Nonlinear Dynamics: 2014

    項目符號

    Paper Review: Information Sciences: 2014

    項目符號

    Paper Review: KSII Transactions on Internet and Information Systems: 2014

    項目符號

    Paper Review: Computer Methods and Programs in Biomedicine: 2014

    項目符號

    Paper Review: Computers in Biology and Medicine: 2014

    項目符號

    Paper Review: International Journal of Ad Hoc and Ubiquitous Computing: 2014

    項目符號

    Paper Review: Information Sciences Letters: 2014

    項目符號

    Paper Review: Journal of Medical Systems: 2014

    項目符號

    Paper Review: International Journal of Communication Systems: 2014

    項目符號

    Paper Review: Future Generation Computer Systems: 2014

    項目符號

    Paper Review: Journal of Information Security and Applications: 2014

    項目符號

    Paper Review: ICCCT 2014: The 5th International Conference on Computer and Communication Technology

    項目符號

    Paper Review: IEEE Transactions on Dependable and Secure Computing: 2013

    項目符號

    Paper Review: Journal of King Saud University - Computer and Information Sciences: 2013

    項目符號

    Paper Review: Journal of Information Security and Applications: 2013

    項目符號

    Paper Review: Security and Communication Networks: 2013

    項目符號

    Paper Review: International Journal of Communication Systems: 2013

    項目符號

    Paper Review: International Journal of Distributed Sensor Networks: 2013

    項目符號

    Paper Review: International Journal of Communication Networks and Distributed Systems: 2013

    項目符號

    Paper Review: Journal of Medical Systems: 2013

    項目符號

    Paper Review: IET Information Security: 2013

    項目符號

    Paper Review: Information Security Journal: 2013

    項目符號

    Paper Review: Journal of Medical and Biological Engineering: 2013

    項目符號

    Paper Review: Journal of Communications and Networks: 2013

    項目符號

    Paper Review: International Journal of Ad Hoc and Ubiquitous Computing: 2013

    項目符號

    Paper Review: Information Technology and Control: 2013

    項目符號

    Paper Review: TANET 2013: Taiwan Academic Network Conference 2013

    項目符號

    Paper Review: IEEE Transactions on Services Computing: 2012

    項目符號

    Paper Review: IEEE Transactions on Industrial Informatics: 2012

    項目符號

    Paper Review: IEEE Transactions on Parallel and Distributed Systems: 2012

    項目符號

    Paper Review: Scientia Iranica: 2012

    項目符號

    Paper Review: IET Information Security: 2012

    項目符號

    Paper Review: Journal of Medical Systems: 2012

    項目符號

    Paper Review: International Journal of Communication Systems: 2012

    項目符號

    Paper Review: Information Technology and Control: 2012

    項目符號

    Paper Review: Wireless Networks: 2012

    項目符號

    Paper Review: Networking Science: 2012

    項目符號

    Paper Review: Journal Computer Science and Technology: 2012

    項目符號

    Paper Review: ISA 2012: The 6th International Conference on Information Security and Assurance

    項目符號

    Paper Review: IEEE Transactions on Dependable and Secure Computing: 2011

    項目符號

    Paper Review: IEEE Transactions on Mobile Computing: 2011

    項目符號

    Paper Review: IEEE Journal on Selected Areas in Communications: 2011

    項目符號

    Paper Review: International Journal of Communication Systems: 2011

    項目符號

    Paper Review: Information Technology and Control: 2011

    項目符號

    Paper Review: KSII Transactions on Internet and Information Systems: 2011

    項目符號

    Paper Review: Mathematical and Computer Modelling: 2011

    項目符號

    Paper Review: Scientia Iranica: 2011

    項目符號

    Paper Review: IETE Technical Review: 2011

    項目符號

    Paper Review: IET Wireless Sensor Systems: 2011

    項目符號

    Paper Review: The Image Science Journal: 2011

    項目符號

    Paper Review: Computers and Mathematics with Applications: 2011

    項目符號

    Paper Review: Sensors: 2011

    項目符號

    Paper Review: Journal of Medical Systems: 2011

    項目符號

    Paper Review: Networking and Electronic Commerce Journal: 2011

    項目符號

    Paper Review: The Computer Journal: 2011

    項目符號

    Paper Review: Security and Communication Networks: 2011

    項目符號

    Paper Review: Journal of Computers: 2011

    項目符號

    Paper Review: IEEE Transactions on Vehicular Technology: 2010

    項目符號

    Paper Review: ICCT 2010: The 2010 International Conference on Computer Technology

    項目符號

    Paper Review: Security and Communication Networks: 2010

    項目符號

    Paper Review: International Journal of Network Security: 2010

    項目符號

    Paper Review: Sensors: 2010

    項目符號

    Paper Review: Wireless Communications and Mobile Computing: 2010

    項目符號

    Paper Review: International Journal of Network Security: 2009

    項目符號

    Paper Review: IET Communications: 2009

    項目符號

    Paper Review: Journal of Internet Technology: 2009

    項目符號

    Paper Review: IETE Technical Review: 2009

    項目符號

    Paper Review: ITNG 2009: The 6th International Conference on Information Technology: New Generations

    項目符號

    Paper Review: International Journal of Network Security: 2008

     

    項目符號

    Attendant Conference

    項目符號

    2014/09/01-09/03(Beijing, China) The 2014 International Symposium on Cloud and Services Computing (SC2 2014) - Paper Presentation

    項目符號

    2013/10/30-10/31(Sydney, Australia) The 2013 International Conference on Advances in Computer, Electrical & Electronic Engineering   (ICACEEE 2013) - Paper Presentation

    項目符號

    2013/05/14(Tainan, Taiwan) 2013 Conference on Electronic Business and Practice Application - Paper Presentation(@ TUT)

    項目符號

    2013/04/26-04/28(Cebu, Philippines) The 2013 International Conference on Information Security and Assurance   (ISA 2013) - Paper Presentation

    項目符號

    2013/04/08-04/09(Bangkok, Thailand) The 2013 International Conference on Information and Network Security  (ICINS 2013) - Paper Presentation

    項目符號

    2012/06/28-06/30(Bali, Indonesia) The Third International Conference Ubiquitous Computing and Multimedia Applications  (UCMA 2012) - Paper Presentation

    項目符號

    2012/04/28-04/30(Shanghai, China) The 6th International Conference on Information Security and Assurance   (ISA 2012) - Paper Presentation

    項目符號

    2012/03/28(Tainan, Taiwan) The E-Learning and Information Technology Symposium 2012 - Paper Presentation(@ STUT)

    項目符號

    2011/12/12-12/15(Jeju, Korea) The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2011) - Paper Presentation

    項目符號

    2011/12/09(Tainan, Taiwan) 2010 Conference on Electronic Business and Practice Application - Paper Presentation(@ TUT)

    項目符號

    2011/-07/11-07/13(Richmond, USA) 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2011) - Paper Presentation

    項目符號

    2010/12/23(Tainan, Taiwan) 2010 Conference on Global Logistic Management and Industry Practice Research - Paper Presentation(@ TUT)

    項目符號

    2010/12/09-12/01(Gwangju, Korea) The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010) - Paper Presentation

    項目符號

    2010/11/29-12/01(Cairo, Egypt) 2010 International Conference on Intelligent Systems Design and Applications (ISDA 2010) - Paper Presentation

    項目符號

    2010/03/23-03/26(Fukuoka, Japan) 2010 International Conference on Computational Science and Its Applications (ICCSA 2010) - Paper Presentation

    項目符號

    2009/12/17(Tainan, Taiwan) 2009 Conference on Global Logistic Management and Industry Practice Research - Paper Presentation(@ TUT)

    項目符號

    2009/08/18-08/20(Xi'an, China) The 5th International Conference on Information Assurance and Security (IAS 2009) - Paper Presentation

    項目符號

    2009/04/27-04/29(Las Vegas, USA) The 6th International Conference on Information Technology: New Generations (ITNG 2009) - Paper Presentation

    項目符號

    2008/12/25(Tainan, Taiwan) 2008 Conference on Global Logistic Management and Industry Practice Research - Paper Presentation(@ TUT)

    項目符號

    2007/08/26-08/29(Kuala Lumpur, Malaysia) 2007 International Conference on Computational Science and Its Applications (ICCSA 2007) - Paper Presentation

    項目符號

    2006/12/04-12/06(Taipei, Taiwan) International Computer Symposium 2006 (ICS 2006) - Paper Presentation

    項目符號

    2003/12/14-12/16(Kaohsiung, Taiwan) 2003 International Conference on Informatics, Cybernetics and Systems (ICICS 2003) - Paper Presentation

     

    項目符號

    Attendant Academic Society

    項目符號

    Member of IEEE (No. 91163422)

    項目符號

    Member of Chinese Cryptography Information Security Association (CCISA; No. R109009)

    項目符號

    Member of Future Technology Research Association International (FTRA)

    項目符號

    Member of Machine Intelligence Research Labs (MIR Labs)

    項目符號

    Member of IFIP WG 11.3

     

    Patents

    項目符號

    Chun-Ta Li, A Device of Online Game, No.: M384690, TAIWAN (R.O.C.) (July 2010~March 2020)

    項目符號

    Chun-Ta Li, A Multi-Language Exposition Device, No.: M395863, TAIWAN (R.O.C.) (Jan. 2011~Aug. 2020)

    項目符號

    Chun-Ta Li, Chin-Wen Lee, An Unmanned Device for Ordering Meals and Paying Expenses, No.: M425350, TAIWAN (R.O.C.) (Mar. 2012~Nov. 2021)

    項目符號

    Chun-Ta Li, Jian-Jhong Jheng, Yi-Rui Zhu, Xiao-Qian Zhang, A RFID-Based Vehicular Monitoring System, No.: M463403, TAIWAN (R.O.C.) (Oct. 2013~June 2026)

     

    Dissertations

    項目符號

    Ph.D. Thesis: On the Security Mechanisms for Wireless Ad Hoc Networks and Their Applications (June 2008)

    項目符號

    Master's Thesis: A Multi-Layer Searching Technique for Quickly Retrieval (June 2004)

    Links

    項目符號

    Tainan University of Technology
    http://www.tut.edu.tw/

    項目符號

    Department of Information Management
    http://www.mis.tut.edu.tw/

    項目符號

    TUT Teacher Information Web
    http://teacher.tut.edu.tw/

    項目符號

    TUT Network Teaching 
    http://wisdom.tut.edu.tw/

    項目符號

    Facebook
    http://www.facebook.com/

    項目符號

    Yahoo!
    http://tw.yahoo.com/

    項目符號

    Google
    http://www.google.com.tw/

    項目符號

    International Journal of Network Security
    http://ijns.femto.com.tw/

    項目符號

    TUT Web Mail
    http://mail.tut.edu.tw/

    項目符號

    Call for Papers
    http://grid.hust.edu.cn:8080/call/cfp.jsp

                   You are the  visitor since Dec. 2008

                           (Last updated: Nov. 15, 2014)