Chun-Ta Li
Chinese Version Curriculum Vitae ORCID Scopus Google Scholar Travel Life
Personal Information
Name: Chun-Ta Li
Education: Ph.D. in Computer Science and Engineering from NCHU (2004/09 ~ 2008/06)
Incumbency: Professor, Bachelor’s Program of Artificial Intelligence and Information Security , Fu Jen Catholic University (2023/02 ~ Present)
Experience: Professor, Department of Information Management, Tainan University of Technology (2020/08 ~ 2023/01); Associate Professor, Department of Information Management, Tainan University of Technology (2016/08 ~ 2020/07); Assistant Professor, Department of Information Management, Tainan University of Technology (2008/08 ~ 2016/07)
Address: No.510, Zhongzheng Rd., Xinzhuang District, New Taipei City 242062, TAIWAN (R.O.C.) (Bachelor's Program of Artificial Intelligence and Information Security, Fu Jen Catholic University)
E-mail: 157278@mail.fju.edu.tw
Phone: +886-2-29056499 (Office)
Fax: +886-2-29056018
Office: SF216
Teaching Courses
Information and Communication Security Practices
Introduction to Computer Networks
Digital Forensics
Introduction to Database Systems
Operating Systems
Introduction of Information Management
Database System and Management
Decision Support System
Article Writing Skill
Introduction to Computer Science
Computer Network Security
Information Security
Introduction to Cloud Technique
Multiple Service of Learning
Proposal Writing and Presentation
Research Interests
Information and Network Security
Wireless Sensor Networks
Mobile Computing Security
Internet of Things Security
Cloud Computing Security
Blockchain Security and Its Application
RFID Security and Its Application
Telemedicine Information System Security
Security Protocols for Ad Hoc Networks
Information Retrieval and Dictionary Search
Research Projects
[The Design and Study of Secure Communication Mechanisms in Smart Grids] , Fu Jen Catholic University, Project No.: A0112014 , 2023/08/01~2024/07/31 , Principle Investigator.
[The Design and Study of Secure Communication Mechanisms in Internet of Drones] , National Science and Technology Council, Project No.: NSTC 110 -2410-H-165-001-MY2 , 2021/08/01~2023/07/31 , Principle Investigator.
[The Design and Study of Security Protection and Storage System in Fog Computing Environments] , Ministry of Science and Technology, Project No.: MOST 109 -2410-H-165-001 , 2020/08/01~2021/07/31 , Principle Investigator.
[The Design and Study of Secure Medical Data Preservation and Data Aggregation Scheme via Blockchain] , Ministry of Science and Technology, Project No.: MOST 108 -2410-H-165-004 , 2019/08/01~2020/07/31 , Principle Investigator.
[The Study of Secure Group Communication with Privacy Preserving in Mobile Social Networking Service System] , Ministry of Science and Technology, Project No.: MOST 107 -2410-H-165-001 , 2018/08/01~2019/07/31 , Principle Investigator.
[The Study and Implementation of A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System] , Ministry of Science and Technology, Project No.: MOST 105 -2221-E-165-005 , 2016/08/01~2017/07/31 , Principle Investigator.
[The Design and Study of Secure Communication Mechanisms and Verification Systems for Internet of Things] , Ministry of Science and Technology, Project No.: MOST 104 -2221-E-165-004 , 2015/08/01~2016/07/31 , Principle Investigator.
[The Study of Keyword Search over Encrypted Data against Inside Keyword Guessing Attack in Cloud Storage Service] , Ministry of Science and Technology, Project No.: MOST 103 -2221-E-165-003 , 2014/08/01~2015/07/31 , Principle Investigator.
[The Study and Implementation of Privacy and Security for Remote User Authentication] , National Science Council, Project No.: NSC 101 -2221-E-165-002 , 2012/08/01~2013/07/31 , Principle Investigator.
[The Study and Implementation of A Secure Routing Scheme with Payment Mechanism to Prevent Node Selfishness in Wireless Ad Hoc Networks] , National Science Council, Project No.: NSC 100 -2221-E-165-002 , 2011/08/01~2012/07/31 , Principle Investigator.
[The Study and Implementation of Secure Billing Protocol for P2P Grid Computing Environments] , National Science Council, Project No.: NSC 99 -2221-E-165-001 , 2010/08/01~2011/07/31 , Principle Investigator.
[The Study and Implementation of Secure MMOGs Scheme] , National Science Council, Project No.: NSC 98 -2218-E-165-001 , 2009/08/01~2010/07/31 , Principle Investigator.
[The Study of Security Mechanisms for Wireless Ad Hoc Networks (II)] , Ministry of Education, Aiming for the Top University and Elite Research Center Development Plan , Project No.: CC99118 , 2010/01/01~2010/12/31 , Co-Investigator.
[The Study of Security Mechanisms for Wireless Ad Hoc Networks (I)] , Ministry of Education, Aiming for the Top University and Elite Research Center Development Plan , Project No.: CC98118 , 2009/05/01~2009/12/31 , Co-Investigator.
Publications
International Journal Papers
Chandrasen Pandey, Vaibhav Tiwari, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee, Dpitendu Sinha Roy, “5GT-GAN: Enhancing Data Augmentation for 5G-Enabled Mobile Edge Computing in Smart Cities,” IEEE Access, vol. 11, pp. 120983-120996, 2023. [SCIE] (IF: 3.9; Rank: 100/275 = 36.4%)
Moses Kazeem Abiodun, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, Abidemi Emmanuel Adeniyi, Ugbaja Chioma, Chun-Ta Li, “Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhanced Data Security in Cloud Computing Systems,” Journal of Library and Information Studies, vol. 21, no. 2, pp. 1-26, 2023. [ESCI]
Joseph Isabona, Agbotiname Lucky Imoize, Okiemute Roberts Omasheye, Emughedi Oghu, Cheng-Chi Lee, Chun-Ta Li, “Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms,” Information, vol. 14, no. 11, 621, pp. 1-22, 2023. [EI]
Sambit Pattanaik, Agbotiname Lucky Imoize, Chun-Ta Li, Sharmila Anand John Francis, Cheng-Chi Lee, Diptendu Sinha Roy, “Data-Driven Diffraction Loss Estimation for Future Intelligent Transportation Systems in 6G Networks,” Mathematics, vol. 11, no. 13, 3004, pp. 1-20, 2023. [SCIE] (IF: 2.4; Rank: 23/329 = 6.99%)
Muhammad Bilal Khan, Ali Althobaiti, Cheng-Chi Lee, Mohamed S. Soliman, Chun-Ta Li, “Some New Properties of Convex Fuzzy-Number-Valued Mappings on Coordinates Using Up and Down Fuzzy Relations and Related Inequalities,” Mathematics, vol. 11, no. 13, 2851, pp. 1-25, 2023. [SCIE] (IF: 2.592; Rank: 21/333 = 6.3%)
Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Olasupo Ahmed Olalekan, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee, “CBFISKD: A Combinatorial-Based Fuzzy Inference System for Keylogger Detection,” Mathematics, vol. 11, no. 8, 1899, pp. 1-24, 2023. [SCIE] (IF: 2.592; Rank: 21/333 = 6.3%)
Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize, Chun-Ta Li, AbdulRahman Tosho Abdulahi, Abdulwasiu Bolakale Adelodun, Samarendra Nath Sur, Cheng-Chi Lee, “Non-Orthogonal Multiple Access Enabled Mobile Edge Computing in 6G Communications: A Systematic Literature Review,” Sustainability, vol. 15, no. 9, 7315, 2023. [SSCI/SCIE] (IF: 3.889; Rank: 133/279 = 47.67%)
Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, Agbotiname Lucky Imoize, Julius Olusola Odunuga, Cheng-Chi Lee, Chun-Ta Li, Dinh-Thuan Do, “An Emsemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks,” Applied Sciences, vol. 13, no. 4, 2479, pp. 1-24, 2023. [SCIE] (IF: 2.838; Rank: 39/92 = 42.39%)
Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, Chun-Ta Li, “Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme,” Future Internet, vol. 15, no. 3, 99, pp. 1-34, 2023. [EI]
Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng, Agbotiname Lucky Imoize, “An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications,” Sensors, vol. 22, no. 23, 9534, pp. 1-19, 2022. [SCIE/EI] (IF: 3.847; Rank: 19/64 = 29.7%)
Joseph Bamidele Awotunde, Rasheed Gbenga Jimoh, Agbotiname Lucky Imoize, Akeem Tayo Abdulrazaq, Chun-Ta Li, Cheng-Chi Lee, “An Enhanced Deep Learning-Based DeepFake Video Detection and Classification System,” Electronics, vol. 12, no. 1, 87, pp. 1-25, 2022. [SCIE] (IF: 2.690; Rank: 139/276 = 50.4%)
Chin-Ling Chen, Long-Hui Guo, Ming Zhou, Woei-Jiunn Tsaur, Hongyu Sun, Wanbing Zhan, Yong-Yuan Deng, Chun-Ta Li, “Blockchain-Based Anti-Counterfeiting Management System for Traceable Luxury Products,” Sustainability, vol. 14, no. 19, 12814, 2022. [SSCI/SCIE] (IF: 3.889; Rank: 133/279 = 47.67%)
Joseph Isabona, Agbotiname Lucky Imoize, Stephen Ojo, Olukayode Karunwi, Yongsung Kim, Cheng-Chi Lee, Chun-Ta Li, “Development of a Multilayer Perceptron Neural Network for Optimal Predictive Modeling in Urban Microcellular Radio Environments,” Applied Sciences, vol. 12, no. 11, 5713, pp. 1-27, 2022. [SCIE] (IF: 2.679; Rank: 38/90 = 42.2%)
Umesh Kumar Lilhore, Agbotiname Lucky Imoize, Chun-Ta Li, Sarita Simaiya, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar, Cheng-Chi Lee, “Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities,” Sensors, vol. 22, no. 8, 2908, pp. 1-26, 2022. [SCI] (IF: 3.576; Rank: 14/64 = 21.8%)
Okiemute Roberts Omasheye, Samuel Azi, Joseph Isabona, Agbotiname Lucky Imoize, Chun-Ta Li, Cheng-Chi Lee, “Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks,” Future Internet, vol. 14, no. 12, 373, pp. 1-26, 2022. [EI]
Umesh Kumar Lilhore, Agbotiname Lucky Imoize, Cheng-Chi Lee, Sarita Simaiya, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar, Chun-Ta Li, “Enhanced Convolutional Neural Network Model for Cassava Leaf Disease Identification and Classification,” Mathematics, vol. 10, no. 4, 580, pp. 1-19, 2022. [SCIE] (IF: 2.258; Rank: 24/330 = 7.3%)
Joseph Isabona, Agbotiname Lucky Imoize, Stephen Ojo, Cheng-Chi Lee, Chun-Ta Li, “Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate,” Information, vol. 13, no. 3, 141, pp. 1-17, 2022. [EI]
Chi-Yao Weng, Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng, “A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services,” IEEE Access, vol. 9, pp. 145522-145537, 2021. [SCIE] (IF: 3.367; Rank: 94/273 = 34.4%)
Chin-Ling Chen, Yong-Yuan Deng, Woei-Jiunn Tsaur, Chun-Ta Li, Cheng-Chi Lee, Chih-Ming Wu, “A Traceable Online Insurance Claims System Based on Blockchain and Smart Contract Technology,” Sustainability, vol. 13, no. 16, 9386, 2021. [SSCI/SCIE] (IF: 3.251; Rank: 60/125 = 48%)
Vishesh P. Gaikwad, Jitendra V. Tembhurne, Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, “An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS,” IEEE Access, vol. 9, pp. 108586-108600, 2021. [SCIE] (IF: 3.367; Rank: 94/273 = 34.4%)
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, Chin-Ling Chen, Cheng-Chi Lee, “A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System,” IEEE Access, vol. 8, pp. 173904-173917, 2020. [SCI/EI] (IF: 3.745; Rank: 35/156 = 22.4%)
Chin-Ling Chen, Yong-Yuan Deng, Chun-Ta Li, Shunzhi Zhu, Yi-Jui Chiu, Pei-Zhi Chen, “An IoT-Based Traceable Drug Anti-Counterfeiting Management System,” IEEE Access, vol. 8, pp. 224532-224548, 2020. [SCI/EI] (IF: 3.745; Rank: 35/156 = 22.4%)
Chandrashekhar Meshram, Cheng-Chi, Lee, A. S. Ranadive, Chun-Ta Li, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne, “A Subtree-based Transformation Model for Cryptosystem using Chaotic Maps under Cloud Computing Environment for Fuzzy User Data Sharing,” International Journal of Communication Systems, vol. 33, no. 7, e4307, 2020. [SCI] (IF: 1.278; Rank: 73/88 = 82.9%)
Chin-Ling Chen, Jin-Xin Hu, Chun-Ta Li, Yong-Yuan Deng, Shunzhi Zhu, “Traceable and Private Satelite Communication for Emergency Notifications in VANET,” Journal of Internet Technology, vol. 21, no. 1, pp. 223-240, 2020. [SCI/EI] (IF: 0.715; Rank: 81/88 = 92.0%)
Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, Athanasios V. Vasilakos, “A Novel Group Ownership Delegate Protocol for RFID Systems,” Information Systems Frontiers, vol. 21, no. 5, pp. 1153-1166, 2019. [SCI/EI] (IF: 2.521; Rank: 20/104 = 19.2%)
Chandrashekhar Meshram, Cheng-Chi, Lee, Sarita Gajbhiye Meshram, Chun-Ta Li, “An Efficient ID-based Cryptographic Transformation Model for Extended Chaotic Map-Based Cryptosystem,” Soft Computing, vol. 23, no. 16, pp. 6937-6946, 2019. [SCI] (IF: 2.367; Rank: 40/105 = 38.1%)
Cheng-Chi Lee, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, “A Novel Group Ownership Transfer Protocol for RFID Systems,” Ad Hoc Networks, vol. 91, no. 101873, 2019. [SCI/EI] (IF: 3.151; Rank: 29/148 = 19.6%)
Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, “A Secure Trapdoor-Indistinguishable Public Encryption Scheme with Keyword Search for Cloud Storage Service,” Journal of Advances in Computer Networks, vol. 7, no. 1, pp. 1-6, 2019. [EI]
Cheng-Chi Lee, Shun-Der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai, “Security Enhancement on An RFID Ownership Transfer Protocol Based on Cloud,” Future Generation Computer Systems, vol. 93, pp. 266-277, 2019. [SCI/EI] (IF: 4.639; Rank: 7/103 = 6.8%)
Chandrashekhar Meshram, Chun-Ta Li, Sarita Gajbhiye Meshram, “An Effeicient Online/Offline ID-based Short Signature Procedure using Extended Chaotic Maps,” Soft Computing, vol. 23, no. 3, pp. 747-753, 2019. [SCI] (IF: 2.367; Rank: 40/105 = 38.1%)
Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Shun-Der Chen, Yan-Ming Lai, “A Novel Authentication Scheme for Anonymity and Digital Right Management Based on Elliptic Curve Cryptography,” International Journal of Electronic Security and Digital Forensics, vol. 11, no. 1, pp. 96-117, 2019. [EI]
Chun-Ta Li, Tsu-Yang Wu, Chien-Ming Chen, “A Provably Secure Group Key Agreement Scheme with Privacy Preservation for Online Social Networks Using Extended Chaotic Maps,” IEEE Access, vol. 6, pp. 66742-66753, 2018. [SCI/EI] (IF: 3.244; Rank: 27/146 = 18.5%)
Chin-Ling Chen, Yan-Ting Li, Yong-Yuan Deng, Chun-Ta Li, “Robust Identification and Authentication in a Robot Cloud Service System,” IEEE Access, vol. 6, pp. 56488-56503, 2018. [SCI/EI] (IF: 3.244; Rank: 27/146 = 18.5%)
Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai, “A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System,” Information Technology and Control, vol. 47, no. 2, pp. 262-274, 2018. [SCI] (IF: 0.800; Rank: 109/132 = 82.6%)
Chun-Ta Li, Chi-Yao Weng, Chien-Ming Chen, Cheng-Chi Lee, “An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps,” Journal of Advances in Computer Networks, vol. 6, no. 1, pp. 1-6, 2018. [EI]
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, “An Enhanced Network Admission and Communication Scheme for Internet of Things Based Body Area Network Healthcare System,” Journal of Advances in Computer Networks, vol. 6, no. 1, pp. 41-47, 2018. [EI]
Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai, Jiann-Cherng Shih, “An Improved E-DRM Scheme for Mobile Environments,” Journal of Information Security and Applications, DOI: 10.1016/j.jisa.2018.02.001, vol. 39, pp. 19-30, 2018. [EI]
Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen, “A Novel Three-party Password-based Authenticated Key Exchange Protocol with User Anonymity Based on Chaotic Maps,” Soft Computing, DOI: 10.1007/s00500-017-2504-z, vol. 22, no. 8, pp. 2495-2506, 2018. [SCI] (IF: 2.472; Rank: 33/105 = 31.4%)
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, “Cloud-Assisted Mutual Authentication and Privacy Preservation Protocol for Telecare Medical Information Systems,” Computer Methods and Programs in Biomedicine, DOI: 10.1016/j.cmpb.2018.02.002, vol. 157, pp. 191-203, 2018. [SCI/EI] (IF: 2.503; Rank: 21/104 = 20.2%)
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, “Cryptanalysis and Improvement of A ECDLP Based Proxy Blind Signature Scheme,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 21, no. 1, pp. 23-34, 2018. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment,” Journal of Internet Technology, vol. 19, no. 1, pp. 147-155, 2018. [SCI/EI] (IF: 1.930; Rank: 39/89 = 43.8%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “Security and Efficiency Enhancement of Robust ID based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks,” Journal of Information Science and Engineering, DOI: 10.6688/JISE.2018.34.1.10, vol. 34, no. 1, pp. 155-170, 2018. [SCI/EI] (IF: 0.468; Rank: 141/146 = 96.6%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen, “Towards Secure Authenticating of Cache in the Reader for RFID-based IoT Systems,” Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-017-0564-6, vol. 11, no. 1, pp. 198-208, 2018. [SCI/EI] (IF: 1.262; Rank: 60/89 = 67.4%)
Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, “A Secure Key Authentication Scheme for Cryptosystems Based on GDLP and IFP,” Soft Computing, vol. 21, no. 24, pp. 7285-7291, 2017. [SCI] (IF: 2.472; Rank: 33/105 = 31.4%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Chaotic Maps Based Key Agreement and User Anonymity Protocol Without Using Smart Cards and Symmetric Key En/Decryptions,” Journal of Internet Technology, vol. 18, no. 5, pp. 975-984, 2017. [SCI/EI] (IF: 1.930; Rank: 39/89 = 43.8%)
Chun-Ta Li, Tsu-Yang Wu, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen, “An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-based Medical Care System,” Sensors, DOI: 10.3390/s17071482, vol. 17, no. 7, article 1482, pp. 1-18, 2017. [SCI/EI] (IF: 2.677; Rank: 10/58 = 17.2%)
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, “Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys,” International Journal of Network Security, vol. 19, no. 3, pp. 340-346, 2017. [EI]
Chien-Ming Chen, Chun-Ta Li, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, “A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System,” IEEE Access, DOI: 10.1109/ACCESS.2017.2675163, vol. 5, no. 1, pp. 3410-3422, 2017. [SCI/EI] (IF: 3.244; Rank: 27/146 = 18.5%)
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, “A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem,” Parallel Processing Letters, vol. 26, no. 4, article 1650018, pp. 1-10, 2016. [EI]
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, “A CAE Scheme Using ECC Based Self Certified PKC,” Journal of Computer Science, vol. 12, no. 11, pp. 527-533, 2016.
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Song-Jhih Chen, “A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems,” Journal of Medical Systems, vol. 40, no. 11, article 233, pp. 1-10, DOI: 10.1007/s10916-016-0586-2, 2016. [SCI] (IF: 2.456; Rank: 28/90 = 31.1%)
Chun-Ta Li, “A Secure Chaotic Maps Based Privacy-protection Scheme for Multi-server Environments,” Security and Communication Networks, vol. 9, no. 14, pp. 2276-2290, 2016. [SCI/EI] (IF: 1.067; Rank: 111/146 = 76.0%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System,” Journal of Medical Systems, vol. 40, no. 5, article 117, pp. 1-15, DOI: 10.1007/s10916-016-0474-9, 2016. [SCI] (IF: 2.456; Rank: 28/90 = 31.1%)
Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Shih-Ting Chiu, “A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services,” Information Technology and Control, vol. 45, no. 3, pp. 289-299, 2016. [SCI] (IF: 0.475; Rank: 140/146 = 95.9%)
Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-Der Chen, “Time-bound Key-aggregate Encryption for Cloud Storage,” Security and Communication Networks, vol. 9, no. 13, pp. 2059-2069, 2016. [SCI/EI] (IF: 1.067; Rank: 111/146 = 76.0%)
Chun-Ta Li, Chin-Wen Lee, Jau-Ji Shen, “An Extended Chaotic Maps Based Keyword Search Scheme over Encrypted Data resist Outside and Inside Keyword Guessing Attacks in Cloud Storage Services,” Nonlinear Dynamics, vol. 80, no. 3, pp. 1601-1611, DOI: 10.1007/s11071-015-1965-9, 2015. [SCI/EI] (IF: 2.849; Rank: 7/130 = 5.4%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang, “A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System,” Journal of Medical Systems, vol. 39, no. 11, article 144, pp. 1-11, DOI: 10.1007/s10916-015-0322-3, 2015. [SCI] (IF: 2.213; Rank: 7/24 = 29.2%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture,” Journal of Information Science and Engineering, vol. 31, no. 6, pp. 1975-1992, 2015. [SCI/EI] (IF: 0.414; Rank: 129/139 = 92.8%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Dynamic Identity-based User Authentication Scheme for Remote Login Systems,” Security and Communication Networks, vol. 8, no. 18, pp. 3372-3382, 2015. [SCI/EI] (IF: 0.806; Rank: 57/82 = 69.5%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, “A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 39, no. 8, article 77, pp. 1-8, DOI: 10.1007/s10916-015-0260-0, 2015. [SCI] (IF: 2.213; Rank: 7/24 = 29.2%)
Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Yan-Ming Lai, “A New Three-party Authenticated Key Agreement Scheme Based on Chaotic Maps without Password Table,” Nonlinear Dynamics, vol. 79, no. 4, pp. 2485-2495, 2015. [SCI/EI] (IF: 2.849; Rank: 7/130 = 5.4%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chun-Cheng Wang, “Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS,” Procedia Computer Science, vol. 52, pp. 21-28, 2015. [EI]
Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li, “Improving Security of A Communication-efficient Three-party Password Authenticated Key Exchange Protocol,” International Journal of Network Security, vol. 17, no. 1, pp. 1-6, 2015. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 38, no. 9, article 77, pp. 1-11, DOI: 10.1007/s10916-014-0077-2, 2014. [SCI] (IF: 2.213; Rank: 7/24 = 29.2%)
Cheng-Chi Lee, Chi-Tung Chen, Chun-Ta Li, Ping Hsien Wu, “A Practical RFID Authentication Mechanism for Digital Television,” Telecommunication Systems, vol. 57, no. 3, pp. 239-246, DOI: 10.1007/s11235-013-09844-5, 2014. [SCI/EI] (IF: 0.705; Rank: 55/77 = 71.4%)
Chun-Ta Li, Cheng-Chi Lee, “A Novel User Authentication and Key Agreement Scheme with Smart Cards over Insecure Networks,” Information: An International Interdisciplinary Journal, vol. 17, no. 4, pp. 1271-1284, 2014. [SCI] (IF: 0.358; Rank: 71/90 = 78.9%)
Cheng-Chi Lee, Der-Chyuan Lou, Chun-Ta Li, Che-Wei Hsu, “An Extended Chaotic-Maps-Based Protocol with Key Agreement for Multiserver Environments,” Nonlinear Dynamics, vol. 76, no. 1, pp. 853-866, 2014. [SCI/EI] (IF: 2.849; Rank: 7/130 = 5.4%)
Cheng-Chi Lee, Chun-Ta Li, Ping-Hsien Wu, “A Novel Frequency Billing Service in Digital Television System,” Journal of Information Hiding and Mutimedia Signal Processing, vol. 5, no. 3, pp. 439-450, 2014. [EI]
Cheng-Chi Lee, Chun-Ta Li, Chia-Ying Wu, Shiow-Yuan Huang, “An Enhanced Fault-Tolerant Conference Key Agreement Protocol,” International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no. 12, pp. 2125-2129, 2014.
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, “An Extended Chaotic Maps Based User Authentication and Privacy Preserving Scheme against DoS Attacks in Pervasive and Ubiquitous Computing Environments,” Nonlinear Dynamics, vol. 74, no. 4, pp. 1133-1143, DOI 10.1007/s11071-013-1029-y, 2013. [SCI/EI] (IF: 2.419; Rank: 11/138 = 7.9%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, “An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks,” Sensors, vol. 13, no. 8, pp. 9589-9603, 2013. [SCI/EI] (IF: 2.048; Rank: 10/57 = 17.5%)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity,” KSII Transactions on Internet and Information Systems, vol. 7, no. 1, pp. 119-131, 2013. [SCI/EI] (IF: 0.345; Rank: 72/78 = 92.3%)
Chun-Ta Li, “A New Password Authentication and User Anonymity Scheme Based on Elliptic Curve Cryptography and Smart Card,” IET Information Security, vol. 7, no. 1, pp. 3-10, 2013. [SCI/EI] (IF: 0.631; Rank: 63/102 = 61.8%)
Chun-Ta Li, Cheng-Chi Lee, Chin-Wen Lee, “An Improved Two-Factor User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography,” Sensor Letters, vol. 11, no. 5, pp. 958-965, 2013. [SCI] (IF: 0.558; Rank: 45/57 = 78.9%)
Chun-Ta Li, Cheng-Chi Lee, “More Secure Authenticated Group Key Agreement in a Mobile Environment,” Information: An International Interdisciplinary Journal, vol. 16, no. 9(B), pp. 6817-6830, 2013. [SCI] (IF: 0.358; Rank: 71/90 = 78.9%)
Cheng-Chi Lee, Chun-Ta Li, Che-Wei Hsu, “A Three-party Password-based Authenticated Key Exchange Protocol with User Anonymity using Extended Chaotic Maps,” Nonlinear Dynamics, vol. 73, no. 1-2, pp. 125-132, 2013. [SCI/EI] (IF: 2.419; Rank: 11/138 = 7.9%)
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chin-Wen Lee, “Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks,” International Journal of Security and Its Applications, vol. 7, no. 3, pp. 249-257, 2013. [EI]
Chun-Ta Li, Min-Shiang Hwang, “A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol,” International Journal of Security and Its Applications, vol. 7, no. 1, pp. 59-70, 2013. [EI]
Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang, “An Undetectable On-line Password Guessing Attack on Nam et al.'s Three-party Key Exchange Protocol,” Journal of Computational Methods in Sciences and Engineering, vol. 13, no. 5-6, pp. 455-460, 2013. [EI]
Chun-Ta Li, Yan-Ming Lai, Cheng-Chi Lee, “Enhanced Threshold Anonymous Announcement in VANETs,” International Journal of Information Technology and Computer Science, vol. 12, no. 2, pp. 16-23, 2013.
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chin-Wen Lee, Ping-Nan Chiu, Cheng-Yi Wu, “Security Flaws of A Password Authentication Scheme for Hierarchical WSNs,” Journal of Advances in Computer Networks, vol. 1, no. 2, pp. 121-124, 2013.
Chun-Ta Li, Cheng-Chi Lee, “A Novel User Authentication and Privacy Preserving Scheme with Smart Cards for Wireless Communications,” Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 35-44, 2012. [SCI/EI] (IF: 1.420; Rank: 38/247 = 15.4%) (This article was one of the Top 25 Hottest Articles during January to December 2011 full year of Mathematical and Computer Modelling)
Chun-Ta Li, Chou-Chen Yang, Min-Shiag Hwang, “A Secure Routing Protocol with Node Selfishness Resistance in MANETs,” International Journal of Mobile Communications, vol. 10, no. 1, pp. 103-118, 2012. [SSCI/EI] (IF: 0.94; Rank: 25/67 = 37.3%)
Cheng-Chi Lee, Chun-Ta Li, Rui-Xiang Chang, “A Simple and Efficient Authentication Scheme for Mobile Satellite Communication Systems,” International Journal of Satellite Communications and Networking, vol. 30, no. 1, pp. 29-38, 2012. [SCI/EI] (IF: 0.535; Rank: 14/27 = 51.9%)
Chun-Ta Li, “A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications,” Information Technology and Control, vol. 41, no. 1, pp. 69-76, 2012. [SCI] (IF: 0.667; Rank: 88/132 = 66.7%)
Cheng-Chi Lee, Chun-Ta Li, Te-Yu Chen, Chia-Ying Wu, “Towards Secure User Authentication and Key Agreement Protocol Based on Bilinear Pairings for Mobile Client-Server Environments,” Telecommunication Systems, 2013, Article in press. [SCI/EI] (IF: 1.163; Rank: 37/78 = 47.4%)
Chun-Ta Li, Cheng-Chi Lee, Hsing Mei, Chia-Hao Yang, “A Password and Smart Card Based User Authentication Mechanism for Multi-Server Environments,” International Journal of Future Generation Communication and Networking, vol. 5, no. 4, pp. 153-163, 2012. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “A RFID-Based Macro-Payment Scheme with Security and Authentication for Retailing Services,” ICIC Express Letters, vol. 6, no. 12, pp. 3163-3170, 2012. [EI]
Chun-Ta Li, Chi-Yao Weng, Chun-I Fan, “Two-Factor User Authentication in Multi-Server Networks,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 261-267, 2012. [EI]
Chun-Ta Li, Min-Shiang Hwang, “Security Enhancement of Chang-Lee Anonymous E-Voting Scheme,” International Journal of Smart Home, vol. 6, no. 2, pp. 45-51, 2012. [EI]
Cheng-Chi Lee, Yan-Ming Lai, Chun-Ta Li, “An Improved Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 203-209, 2012. [EI]
Chun-Ta Li, Min-Shiang Hwang, “A Lightweight Anonymous Routing Protocol Without Public Key En/Decryptions for Wireless Ad Hoc Networks,” Information Sciences, vol. 181, no. 23, pp. 5333-5347, 2011. [SCI/EI] (IF: 2.833; Rank: 9/133 = 6.8%)
Chun-Ta Li, Cheng-Chi Lee, “A Robust Remote User Authentication Scheme Using Smart Card,” Information Technology and Control, vol. 40, no. 3, pp. 236-245, 2011. [SCI] (IF: 0.880; Rank:73/133 = 54.9%)
Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang, Chen-Ju Liu, “A Secure Billing Service with Two-Factor User Authentication in Wireless Sensor Networks,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 8, pp. 4821-4831, 2011. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)
Chun-Ta Li, “Secure Smart Card Based Password Authentication Scheme with User Anonymity,” Information Technology and Control, vol. 40, no. 2, pp. 157-162, 2011. [SCI] (IF: 0.880; Rank:73/133 = 54.9%)
Cheng-Chi Lee, Chun-Ta Li, Kou-You Huang, Shiow-Yuan Huang, “An Improvement of Remote Authentication and Key Agreement Schemes,” Journal of Circuits, Systems, and Computers, vol. 20, no. 4, pp. 697-707, 2011. [SCI/EI] (IF: 0.281; Rank: 216/244 = 88.5%)
Cheng-Chi Lee, Chun-Ta Li, Shun-Der Chen, “Two Attacks on A Two-Factor User Authentication in Wireless Sensor Networks,” Parallel Processing Letters, vol. 21, no. 1, pp. 21-26, 2011. [EI]
Chun-Ta Li, Min-Shiang Hwang, “An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1-5, 2010. [SCI/EI] (IF: 0.66; Rank: 34/48 = 71%) (This article was one of the Most Cited Journal of Network and Computer Applications Articles published since 2008)
Chun-Ta Li, Min-Shiang Hwang, “An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 5, pp. 2181-2188, 2010. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)
Chun-Ta Li, C. H. Wei, C. C. Lee, Y. H. Chin, L. J. Wang, “A Secure and Undeniable Billing Protocol among Charged Parties for Grid Computing Environments,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 11, pp. 5061-5076, 2010. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)
Chun-Ta Li, Min-Shiang Hwang, “A Batch Verifying and Detecting the Illegal Signatures,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 12, pp. 5311-5320, 2010. [SCI/EI] (IF: 1.664; Rank: 12/60 = 20%)
Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang, “A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels,” Journal of Information Assurance and Security, vol. 5, no. 3, pp. 201-208, 2010.
Chun-Ta Li, C. H. Wei, Y. H. Chin, “A Secure Event Update Protocol for Peer-To-Peer Massively Multiplayer Online Games Against Masquerade Attacks,” International Journal of Innovative Computing, Information and Control, vol. 5, no. 12(A), pp. 4715-4723, 2009. [SCI/EI] (IF: 2.932; Rank: 3/59 = 5.1%)
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “An Efficient Sensor-To-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks,” International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, 2009. [SCI/EI] (IF: 2.932; Rank: 3/59 = 5.1%) (This article won 2011 IJICIC Most Cited Paper Award)
Chun-Ta Li, “An Efficient and Secure Communication Scheme for Trusted Computing Environments,” Journal of Computers, vol. 20, no. 3, pp. 17-24, 2009.
Chun-Ta Li, Yen-Ping Chu, “Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks,” International Journal of Network Security, vol. 8, no. 2, pp. 166-168, 2009. [EI]
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks,” Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008. [SCI/EI] (IF: 0.884; Rank: 32/67 = 47.8%) (This article was one of the Most Cited Computer Communications Articles published since 2008)
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Improving the Security of A Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc Networks,” International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, 2008. [SCI/EI] (IF: 0.277; Rank: 41/45 = 91.1%)
Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu, “Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments,” Computer Communications, vol. 31, no. 18, pp. 4255-4258, 2008. [SCI/EI] (IF: 0.884; Rank: 32/67 = 47.8%)
Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu, “An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks,” Computer Communications, vol. 31, no. 10, pp. 2534-2540, 2008. [SCI/EI] (IF: 0.884; Rank: 32/67 = 47.8%)
Jau-Ji Shen, Chun-Ta Li, “A Two-Layer Dictionary Organization for Quickly Retrieval,” Journal of Applied Sciences, vol. 6, no. 5, pp. 1066-1070, 2006.
Min-Shiang Hwang, Chun-Ta Li, Jau-Ji Shen, Yen-Ping Chu, “Challenges in E-Government and Security of Information," Information & Security. An International Journal, vol. 15, no. 1, pp. 9-20, 2004.
Book Chapters
Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Chun-Ta Li, “Reversible Data Hiding in Encrypted Image Based on MSB Inversion,” The 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021), Smart Innovation, Systems and Technologies, vol. 314, pp. 3-13, Springer, Cham (2023), November 18-20, 2021, Taichung, Taiwan. [EI]
Chun-Ta Li, Chi-Yao Weng, Chien-Ming Chen,Chin-Ling Chen, Cheng-Chi Lee, “A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System",” The 5th International Conference on Internet of Vehicles (IOV 2018), Lecture Notes in Computer Science, vol. 11253, pp. 278-288, Springer, Switzerland (2018), November 19-22, 2018, Paris, France. [EI]
Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen, “Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme using Elliptic Curve Cryptosystems",” The 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), Lecture Notes in Computer Science, vol. 10232, pp. 116-126, Springer, Switzerland (2017), May 11-14, 2017, Cetara, Amalfi Coast, Italy. [EI]
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang, “On the Security of A Privacy Authentication Scheme Based on Cloud for Medical Environment,” 8th iCatse Conference on Information Science and Applications (ICISA 2017), Lecture Notes in Electrical Engineering, vol. 424, pp. 241-248, Springer, Singapore (2017), March 20-23, 2017, Macau, China. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen, “Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-based System",” 8th iCatse Conference on Information Science and Applications (ICISA 2017), Lecture Notes in Electrical Engineering, vol. 424, pp. 282-289, Springer, Singapore (2017), March 20-23, 2017, Macau, China. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen, “Design Flaws in A Secure Medical Data Exchange Protocol Based on Cloud Environments,” The 2nd International Workshop on Security and Privacy Protection in Computer and Network Systems (SPPCN 2015), Lecture Notes in Computer Science, vol. 9532, pp. 435-444, Springer, Switzerland (2015), November 18-20, 2015, Zhangjiajie, China. [EI]
Chun-Ta Li, Jau-Ji Shen, Chin-Wen Lee, “Security and Efficiency Analysis on A Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services,” The 4th International Symposium on Cloud and Services Computing (SC2 2014), Lecture Notes in Computer Science, vol. 8662, pp. 367-375, Springer, Switzerland (2014), September 01-03, 2014, Beijing, China. [EI]
Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu, “Cryptanalysis and Improvement of An ECC-based Password Authentication Scheme Using Smart Cards,” The 5th International Symposium on Cyberspace Safety and Security (CSS 2013), Lecture Notes in Computer Science, vol. 8300, pp. 338-348, Springer, Switzerland (2013), November 13-15, 2013, Zhangjiajie, China. [EI]
Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee, “A Robust Remote User Authentication Scheme Against Smart Card Security Breach,” 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2011), Lecture Notes in Computer Science, vol. 6818, pp. 231-238, Springer, Heidelberg (2011), July 11-13, 2011, Richmond, USA. [EI]
Chun-Ta Li, “Security of Wireless Sensor Networks: Current Status and Key Issues,” INTECH, Book: Smart Wireless Sensor Networks, ISBN 978-953-307-261-6, pp. 299-313, December 2010.
Chun-Ta Li, Cheng-Chi Lee, Lian-Jun Wang, “On the Security Enhancement of An Efficient and Secure Event Signature Protocol for P2P MMOGs,” The 2010 International Conference on Computational Science and Its Applications (ICCSA 2010), Lecture Notes in Computer Science, vol. 6016, pp. 599-609, Springer, Heidelberg (2010), March 23-26, 2010, Fukuoka, Japan. [EI]
Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li, “A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period,” The 2007 International Conference on Computational Science and Its Applications (ICCSA 2007), Lecture Notes in Computer Science, vol. 4707, pp. 273-284, Springer, Heidelberg (2007), August 26-29, 2007, Kuala Lumpur, Malaysia. [EI]
National Journal Papers
Cheng-Chi Lee, Shang-Bang Lin, Chun-Ta Li, “Patterns of Reading Internet Literature: A Case Study of Users of the Bahamut Gaming Information Website,” Research of Educational Communications and Technology, no. 133, pp. 21-43, December 2023.
Chun-Ta Li, “Drone - Emerging Technology or Threat?,” MJIB, vol. 42, no. 11, pp. 22-28, November 2022.
Cheng-Hsing Yang, Chi-Yao Weng, Chia-Chun Chiang, Chun-Ta Li, “High-capacity Reversible Data Hiding in Encrypted Images by Secret Sharing Approach,” Journal of Information Management, vol. 29, no. 2, pp. 181-197, April 2022.
Chun-Ta Li, Min-Shiang Hwang, “A Research on Integrated Personnel Administration System using Wireless Sensor Network - A Safety Entrance Guard System,” Personnel Monthly, vol. 47, no. 1, pp. 22-29, July 2008.
International Conference Papers
Chun-Ta Li, Cheng-Chi Lee, Chin-Ling Chen, Chi-Yao Weng, “Cryptanalysis of a Lightweight Authentication and Key Agreement Scheme for Internet of Drones,” The 2021 International Conference on Security and Management (SAM'21), Springer Nature - Book Series: Transactions on Computational Science & Computational Intelligence, July 26-29, 2021, Las Vegas, USA. [EI]
Cheng-Chi Lee, Chung-Wei Li, Chun-Ta Li, Chin-Ling Chen, “E-book Circulation System Based on Blockchain,” 2021 International Conference on Computational Science and Computational Intelligence (CSCI 2021), IEEE CS, pp. 615-619, December 15-17, 2021, Las Vegas, USA. [EI]
Chi-Yao Weng, Cheng-Hsing Yang, Guang-Yih Hsu, Rong-Jaye Chen, Chun-Ta Li, “Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process,” 2020 5th International Conference on Knowledge Engineering and Applications (ICKEA 2020), ACM Digital Library, pp. 108-112, June 5-8, 2020, Tokyo, Japan. [EI]
Cheng-Chi Lee, Shun-Der Chen, Chun-Ta Li, Chun-Lun Cheng, Yan-Ming Lai, “Cryptanalysis of An RFID Ownership Transfer Protocol Based on Cloud,” 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2018), IEEE CS, pp. 134-139, June 22-24, 2018, Shanghai, China. [EI]
Cheng-Chi Lee, Chun-Lun Cheng, Yan-Ming Lai, Chun-Ta Li, “Cryptanalysis of Dimitriou's Key Evolving RFID Systems,” 2016 5th International Conference on Network Communication and Computing (ICNCC 2016), ACM Digital Library, pp. 229-233, Dec. 17-21, 2016, Kyoto, Japan. [EI]
Chun-Ta Li, Chin-Wen Lee, Jau-Ji Shen, “A Secure Three-party Authenticated Key Exchange Protocol Based on Extended Chaotic Maps in Cloud Storage Service,” The 2015 International Conference on Information Networking (ICOIN 2015), IEEE CS, pp. 31-36, Jan. 12-14, 2015, Siem Reap, Cambodia. [EI]
Chun-Ta Li, Cheng-Chi Lee, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang, “Cryptanalysis of An Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics,” The 2015 International Conference on Information Networking (ICOIN 2015), IEEE CS, pp. 498-502, Jan. 12-14, 2015, Siem Reap, Cambodia. [EI]
Chun-Ta Li, Chin-Wen Lee, Yi-Rui Zhu, Jian-Jhong Jheng, Xiao-Qian Zhang, “Cryptanalysis of A Dynamic Password Based User Authentication Scheme for HWSNs,” The 7th International Conference on Information Security and Assurance (ISA 2013), Advanced Science and Technology Letters, vol. 21, pp. 1-4, April 26-28, 2013, Cebu, Philippines.
Cheng-Chi Lee, Chun-Ta Li, “Security Analysis on Two Diffie-Hellman Based Protocols,” The 2013 FTRA International Conference on Advanced IT, Engineering and Management (AIM 2013), Feb. 21-23, 2013, Seoul, Korea.
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan, “A Secure Payment Scheme Using RFID Technique for Retailing Services,” The Third International Conference Ubiquitous Computing and Multimedia Applications (UCMA 2012), Advanced Science and Technology Letters, vol. 7, pp. 36-41, June 28-30, 2012, Bali, Indonesia.
Chun-Ta Li, Chi-Yao Weng, Chun-I Fan, “Cryptanalysis of A Robust and Efficient Smart Card Based Remote Login Mechanism for Multi-Server Architecture,” The 6th International Conference on Information Security and Assurance (ISA 2012), Advanced Science and Technology Letters, vol. 1, pp. 4-6, April 28-30, 2012, Shanghai, China.
Chun-Ta Li, Min-Shiang Hwang, “Comments on Chang-Lee's Anonymous E-Voting Scheme,” The 6th International Conference on Information Security and Assurance (ISA 2012), Advanced Science and Technology Letters, vol. 1, pp. 41-43, April 28-30, 2012, Shanghai, China.
Cheng-Chi Lee, Yan-Ming Lai, Chun-Ta Li, “On Security of A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment,” The 6th International Conference on Information Security and Assurance (ISA 2012), Advanced Science and Technology Letters, vol. 1, pp. 22-25, April 28-30, 2012, Shanghai, China.
Cheng-Chi Lee, Chun-Ta Li, Te-Yu Chen, Ping-Hsien Wu, Chi-Tung Chen, “A New Key Exchange Protocol with Anonymity between STB and Smart Card in IPTV Broadcasting,” 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2011), IEEE CS, Sep. 23-25, 2011, Wuhan, China. [EI]
Chun-Ta Li, Min-Shiag Hwang, Pin-Chieh Huang, “An Efficient Authenticated Key Agreement Scheme Without Using Smart Card,” 4th International Multi-Conference on Engineering and Technological Innovation (IMETI 2011), vol. 2, pp. 94-98, July 19-22, 2011, Orlando, Florida, USA.
Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee, “Cryptanalysis of Khan et al.'s Dynamic ID-based Remote User Authentication Scheme,” 10th International Conference on Intelligent Systems Design and Applications (ISDA 2010), IEEE CS, pp. 1382-1387, Nov. 29-Dec. 01, 2010, Cairo, Egypt. [EI]
Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen, Rui-Xiang Chang, “On Security of A More Efficient and Secure Dynamic ID-based Remote User Authentication Scheme,” 10th International Conference on Intelligent Systems Design and Applications (ISDA 2010), IEEE CS, pp. 1371-1375, Nov. 29-Dec. 01, 2010, Cairo, Egypt. [EI]
Chun-Ta Li, “An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards,” 5th International Conference on Information Assurance and Security (IAS 2009), IEEE CS, pp. 517-520, August 18-20, 2009, Xi'an, China. [EI]
Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai, “A Verifiable Electronic Voting Scheme Over the Internet,” 6th International Conference on Information Technology: New Generations (ITNG 2009), IEEE CS, pp. 449-454, April 27-29, 2009, Las Vegas, Nevada, USA. [EI]
Chun-Ta Li, Min-Shiang Hwang, “Improving the Security of Non-PKI Methods for Public Key Distribution,” 6th International Conference on Information Technology: New Generations (ITNG 2009), IEEE CS, pp. 1695-1696, April 27-29, 2009, Las Vegas, Nevada, USA. [EI]
C. H. Wei, Y. H. Chin, Chun-Ta Li, “A Secure Billing Protocol for Grid Computing,” 6th International Conference on Information Technology: New Generations (ITNG 2009), IEEE CS, pp. 320-325, April 27-29, 2009, Las Vegas, Nevada, USA. [EI]
Chun-Ta Li, Yan-Chi Lai, Min-Shiang Hwang, Yen-Ping Chu, “An Electronic Cash Scheme with Crime-Resistance,” International Computer Symposium 2006 (ICS 2006), December, 2006, Taipei, Taiwan.
Jau-Ji Shen, Chun-Ta Li, “Full Text Retrieval on Distributed Digital Libraries,” 2003 International Conference on Informatics, Cybernetics and Systems (ICICS 2003), December, 2003, Kaohsiung, Taiwan.
National Conference Papers
Chun-Ta Li et al., “Security Analysis of Secure User Authentication Scheme for Wireless Healthcare Sensor Networks”,2016 Symposium on Digital Life Technologies, pp.359-366, Pingtung, June 18~June 19, 2016.
Chun-Ta Li et al., “A Mailing System using Registered Cards”,2015 Symposium on Digital Life Technologies, pp.1073-1079, Kaohsiung, June 26~June 27, 2015.
Chun-Ta Li et al., “A Practical Electronic Payment Mechanism with Non-Synchronization Transaction Problem”,2013 Conference on Electronic Business and Practice Application, ISBN 978-986-6341-39-7, pp.1-14, Tainan, May 16, 2013.
Chun-Ta Li et al., “A Tag Identification and Orientation System for Amusement Parks using RFID Technique”, The E-Learning and Information Technology Symposium 2012, ISBN 978-986-6975-50-9, Tainan, Mar. 28, 2012.
Chun-Ta Li et al., “An Unmanned System for Ordering Meals and Placing Dishes using RFID Technique”,2011 Conference on Electronic Business and Practice Application, ISBN 978-986-6541-53-7, pp.27-44, Tainan, Dec. 09, 2011.
Cheng-Chi Lee, Chia-Ying Wu, Chun-Ta Li, Shiow-Yuan Huang, “Cryptanalysis and Improvement of Fault-tolerant Conference Key Agreement”,2011 Information Management Research and Application Conference, Taipei, May 24, 2011..
Chun-Ta Li et al., “A Multi-Language Exposition System using RFID Technique”,2010 Conference on Global Logistic Management and Industry Practice Research, ISBN 978-986-6541-31-5, pp.1-15, Tainan, Dec. 23, 2010.
Cheng-Chi Lee, Meng-Chia Wu, Chun-Ta Li, “A New Mutual Authentication Scheme for RFID Conforming to EPC Class 1 Generation 2 Standards”,2010 Network & RFID Technology Conference, Changhua, June 4, 2010.
Chun-Ta Li et al., “RFID Macro Payment System for High-Level Liquor Application”,2009 Conference on Global Logistic Management and Industry Practice Research, pp.512-527, Tainan, Dec. 17, 2009.
Chun-Ta Li et al., “A RFID Payment Mechanism with Secure Communication and Mutual Authentication”,2009 Conference on Global Logistic Management and Industry Practice Research, pp.528-543, Tainan, Dec. 17, 2009.
Min-Shiang Hwang, Chun-Ta Li, “A Research on Interactive Education Environment using Wireless Sensor System - Take Department of MIS in a Teaching Institution as an Example”,2008 Conference on Global Logistic Management and Industry Practice Research, pp.538-554, Tainan, Dec. 25, 2008.
Academic Activities
International Journal/Conferences Reviewer
Editorial Board: International Journal of Network Security (2012/01~Now)
Publishing Editor: International Journal of Network Security (2005/07~2011/12)
Guest Editor: Mathematics (Special Issue on Network Security in Artificial Intelligence Systems)
Guest Editor: Cryptography (Special Issue on Advances in Authentication, Authorization and Privacy for Securing Smart Communications)
Guest Editor: Sensors (Special Issue on Blockchain Security and Its Application in Internet of Things)
Guest Editor: Future Internet (Special Issue on Privacy and Aurthentication for Communication Networks)
Guest Editor: Cryptography (Special Issue on RFID Security and Its Application)
Guest Editor: Journal of Computers (Special Issue on Trusted Computing and Communications)
Program Committee: 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023)
Technique Program Committee: 2021 4th International Conference on Computer Science and Software Engineering (CSSE 2021)
Technique Program Committee: 2020 5th International Conference on Knowledge Engineering and Applications (ICKEA 2020)
Program Committee: 2019 7th International Conference on Smart City and Information (iSCI 2019)
Technique Program Committee: 2019 4th International Conference on Information and Network Technologies (ICINT 2019)
Technique Program Committee: 2018 3rd International Conference on Information and Network Technologies (ICINT 2018)
Technical Committee: 2017 International Conference on Communication and Information Systems (ICCIS 2017)
Program Committee: The First International Conference on Vehicular Technology, Transportation, Communication and Applications (VTCA-2017)
Technical Committee: 2016 International Conference on Communication and Information Systems (ICCIS 2016)
Program Committee: The 6th International Symposium on Cyberspace Safety and Security (CSS 2014)
Program Committee: The 5th International Conference on Computer and Communication Technology (ICCCT-2014)
Technical Committee: The 6th International Conference on Communication Software and Networks (ICCSN 2014)
Technique Program Committee: The 2013 National Symposium Workshop on Digital - Forensics, Security and Privacy (NCS 2013)
Program Committee: The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)
Program Committee: The International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking (InfoSecHiComNet 2011)
Program Committee: The 2010 International Conference on Computer Technology (ICCT 2010)
Session Chair: The 2010 International Conference on Intelligent Systems Design and Applications (ISDA 2010)
Paper Review: Cognitive Systems Research: 2018
Paper Review: Information Sciences: 2018
Paper Review: Neural Computing and Applications: 2018
Paper Review: Future Generation Computer Systems: 2018
Paper Review: Journal of Ambient Intelligence and Humanized Computing: 2018
Paper Review: Wireless Communications and Mobile Computing: 2018
Paper Review: Multimedia Tools and Applications: 2018
Paper Review: Journal of Internet Technology: 2018
Paper Review: Quality & Quantity: 2018
Paper Review: IEEE Internet of Things: 2018
Paper Review: IEEE Access: 2018
Paper Review: IEEE Systems Journal: 2018
Paper Review: IEEE Transactions on Dependable and Secure Computing: 2018
Paper Review: ACM Transactions on Privacy and Security: 2018
Paper Review: IEEE Transactions on Cloud Computing: 2018
Paper Review: IEEE Transactions on Industrial Informatics: 2018
Paper Review: IEEE Consumer Electronics Magazine: 2018
Paper Review: International Journal of Communication Systems: 2018
Paper Review: Journal of Medical Systems: 2018
Paper Review: International Journal of Network Security: 2018
Paper Review: Security and Communication Networks: 2018
Paper Review: IEEE Consumer Electronics Magazine: 2017
Paper Review: Informatics in Medicine Unlocked: 2017
Paper Review: Journal of the Chinese Institute of Engineers: 2017
Paper Review: Energies: 2017
Paper Review: China Communications: 2017
Paper Review: Future Generation Computer Systems: 2017
Paper Review: Journal of Parallel and Distributed Computing: 2017
Paper Review: International Journal of Distributed Sensor Networks: 2017
Paper Review: Journal of Internet Technology: 2017
Paper Review: Wireless Communications and Mobile Computing: 2017
Paper Review: International Journal of Electronic Security and Digital Forensics: 2017
Paper Review: International Journal of Communication Systems: 2017
Paper Review: IEEE Access: 2017
Paper Review: IEEE Transactions on Industrial Informatics: 2017
Paper Review: Computers & Electrical Engineering: 2017
Paper Review: Nonlinear Dynamics: 2017
Paper Review: Computers & Electrical Engineering: 2016
Paper Review: Transactions on Emerging Telecommunications Technologies: 2016
Paper Review: KSII Transactions on Internet and Information Systems: 2016
Paper Review: Journal of Internet Technology: 2016
Paper Review: Computer Methods and Programs in Biomedicine: 2016
Paper Review: Journal of Information Science and Engineering: 2016
Paper Review: International Journal of Distributed Sensor Networks: 2016
Paper Review: Nonlinear Dynamics: 2016
Paper Review: Security and Communication Networks: 2016
Paper Review: IET Networks: 2016
Paper Review: IEEE Transactions on Industrial Electronics: 2015
Paper Review: Sensors: 2015
Paper Review: Information Security Journal: 2015
Paper Review: International Journal of Network Management: 2015
Paper Review: Journal of Intelligent Transportation Systems: 2015
Paper Review: Information Sciences: 2015
Paper Review: Nonlinear Dynamics: 2015
Paper Review: Journal of Medical Systems: 2015
Paper Review: Future Generation Computer Systems: 2015
Paper Review: Journal of Internet Services and Information Security: 2015
Paper Review: International Journal of Satellite Communications and Networking: 2015
Paper Review: Cryptologia: 2015
Paper Review: Telecommunication Systems: 2015
Paper Review: Security and Communication Networks: 2015
Paper Review: IEEE Systems Journal: 2015
Paper Review: IEEE Transactions on Vehicular Technology: 2014
Paper Review: IEEE Access: 2014
Paper Review: Pervasive and Mobile Computing: 2014
Paper Review: Computers & Security: 2014
Paper Review: Security and Communication Networks: 2014
Paper Review: Soft Computing: 2014
Paper Review: Computers: 2014
Paper Review: Sensors: 2014
Paper Review: Nonlinear Dynamics: 2014
Paper Review: Information Sciences: 2014
Paper Review: KSII Transactions on Internet and Information Systems: 2014
Paper Review: Computer Methods and Programs in Biomedicine: 2014
Paper Review: Computers in Biology and Medicine: 2014
Paper Review: International Journal of Ad Hoc and Ubiquitous Computing: 2014
Paper Review: Information Sciences Letters: 2014
Paper Review: Journal of Medical Systems: 2014
Paper Review: International Journal of Communication Systems: 2014
Paper Review: Future Generation Computer Systems: 2014
Paper Review: Journal of Information Security and Applications: 2014
Paper Review: ICCCT 2014: The 5th International Conference on Computer and Communication Technology
Paper Review: IEEE Transactions on Dependable and Secure Computing: 2013
Paper Review: Journal of King Saud University - Computer and Information Sciences: 2013
Paper Review: Journal of Information Security and Applications: 2013
Paper Review: Security and Communication Networks: 2013
Paper Review: International Journal of Communication Systems: 2013
Paper Review: International Journal of Distributed Sensor Networks: 2013
Paper Review: International Journal of Communication Networks and Distributed Systems: 2013
Paper Review: Journal of Medical Systems: 2013
Paper Review: IET Information Security: 2013
Paper Review: Information Security Journal: 2013
Paper Review: Journal of Medical and Biological Engineering: 2013
Paper Review: Journal of Communications and Networks: 2013
Paper Review: International Journal of Ad Hoc and Ubiquitous Computing: 2013
Paper Review: Information Technology and Control: 2013
Paper Review: TANET 2013: Taiwan Academic Network Conference 2013
Paper Review: IEEE Transactions on Services Computing: 201 2
Paper Review: IEEE Transactions on Industrial Informatics: 201 2
Paper Review: IEEE Transactions on Parallel and Distributed Systems: 201 2
Paper Review: Scientia Iranica: 2012
Paper Review: IET Information Security: 2012
Paper Review: Journal of Medical Systems: 2012
Paper Review: International Journal of Communication Systems: 2012
Paper Review: Information Technology and Control: 2012
Paper Review: Wireless Networks: 201 2
Paper Review: Networking Science: 201 2
Paper Review: Journal Computer Science and Technology: 201 2
Paper Review: ISA 2012: The 6th International Conference on Information Security and Assurance
Paper Review: IEEE Transactions on Dependable and Secure Computing: 201 1
Paper Review: IEEE Transactions on Mobile Computing: 201 1
Paper Review: IEEE Journal on Selected Areas in Communications: 201 1
Paper Review: International Journal of Communication Systems: 201 1
Paper Review: Information Technology and Control: 201 1
Paper Review: KSII Transactions on Internet and Information Systems: 201 1
Paper Review: Mathematical and Computer Modelling: 201 1
Paper Review: Scientia Iranica: 201 1
Paper Review: IETE Technical Review: 201 1
Paper Review: IET Wireless Sensor Systems: 201 1
Paper Review: The Image Science Journal: 201 1
Paper Review: Computers and Mathematics with Applications: 201 1
Paper Review: Sensors: 2011
Paper Review: Journal of Medical Systems: 201 1
Paper Review: Networking and Electronic Commerce Journal: 201 1
Paper Review: The Computer Journal: 201 1
Paper Review: Security and Communication Networks: 201 1
Paper Review: Journal of Computers: 201 1
Paper Review: IEEE Transactions on Vehicular Technology: 2010
Paper Review: ICCT 2010: The 2010 International Conference on Computer Technology
Paper Review: Security and Communication Networks: 2010
Paper Review: International Journal of Network Security: 2010
Paper Review: Sensors: 2010
Paper Review: Wireless Communications and Mobile Computing: 2010
Paper Review: International Journal of Network Security: 2009
Paper Review: IET Communications: 2009
Paper Review: Journal of Internet Technology: 2009
Paper Review: IETE Technical Review: 2009
Paper Review: ITNG 2009: The 6th International Conference on Information Technology: New Generations
Paper Review: International Journal of Network Security: 2008
Attendant Conference
2023/12/07-12/09(New Taipei, Taiwan) 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023) - Paper Presentation
2023/04/21-04/25(Tokyo, Japan) 2023 9th International Conference on Applied System Innovation (ICASI 2023) - Poster Presentation
2021/11/18-11/20(Taichung, Taiwan) 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021) - Paper Presentation
2021/07/26-07/29(Las Vegas, USA) 2021 International Conference on Security and Management (SAM'21)-Online Paper Presentation
2021/05/14-05/15(Pingtung, Taiwan) 2021 Symposium on Digital Life Technologies - Online Paper Presentation(@ NPTU)
2020/06/05-06/08(Tokyo, Japan) 2020 5th International Conference on Knowledge Engineering and Applications (ICKEA 2020) - Online Paper Presentation
2019/05/25-05/27(Kyoto, Japan) 2019 4th International Conference on Information and Network Technologies (ICINT 2019) - Paper Presentation
2018/11/19-11/22(Paris, France) 2018 5th International Conference on Internet of Vehicles (IOV 2018) - Paper Presentation
2018/05/24-05/26(Osaka, Japan) 2018 3rd International Conference on Information and Network Technologies (ICINT 2018) - Paper Presentation
2017/05/11-05/14(Amalfi Coast, Italy) The 12th International Conference on Green, Pervasive and Cloud Computing 2017 (GPC 2017) - Paper Presentation
2017/03/20-03/23(Macau, China ) The 8th iCatse Conference on Information Science and Applications 2017 (ICISA 2017) - Paper Presentation
2016/06/18-06/19(Pingtung, Taiwan) 2016 Symposium on Digital Life Technologies - Paper Presentation(@ NPTU)
2016/04/14-04/17(Yokohama, Japan) 2016 IEEE 17th International Conference on High Performances Switching and Routing (IEEE HPSR 2016) - Paper Presentation
2015/11/18-11/20(Zhangjiajie, China) The 2nd International Workshop on Security and Privacy Protection in Computer and Network Systems (SPPCN 2015) - Paper Presentation
2015/06/26-06/27(Kaohsiung, Taiwan) 2015 Symposium on Digital Life Technologies - Paper Presentation(@ NKFUST)
2015/06/02-06/05(London, United Kingdom) The 6th International Conference on Ambient Systems, Networks and Technologies (ANT 2015) - Paper Presentation
2015/01/12-01/14(Siem Reap, Cambodia) The 2015 International Conference on Information Networking (ICOIN 2015) - Paper Presentation
2014/09/01-09/03(Beijing, China) The 2014 International Symposium on Cloud and Services Computing (SC2 2014) - Paper Presentation
2013/10/30-10/31(Sydney, Australia) The 2013 International Conference on Advances in Computer, Electrical & Electronic Engineering (ICACEEE 2013) - Paper Presentation
2013/05/14(Tainan, Taiwan) 2013 Conference on Electronic Business and Practice Application - Paper Presentation(@ TUT)
2013/04/26-04/28(Cebu, Philippines) The 2013 International Conference on Information Security and Assurance (ISA 2013) - Paper Presentation
2013/04/08-04/09(Bangkok, Thailand) The 2013 International Conference on Information and Network Security (ICINS 2013) - Paper Presentation
2012/06/28-06/30(Bali, Indonesia) The Third International Conference Ubiquitous Computing and Multimedia Applications (UCMA 2012) - Paper Presentation
2012/04/28-04/30(Shanghai, China) The 6th International Conference on Information Security and Assurance (ISA 2012) - Paper Presentation
2012/03/28(Tainan, Taiwan) The E-Learning and Information Technology Symposium 2012 - Paper Presentation(@ STUT)
2011/12/12-12/15(Jeju, Korea) The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2011) - Paper Presentation
2011/12/09(Tainan, Taiwan) 2010 Conference on Electronic Business and Practice Application - Paper Presentation(@ TUT)
2011/-07/11-07/13(Richmond, USA) 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2011) - Paper Presentation
2010/12/23(Tainan, Taiwan) 2010 Conference on Global Logistic Management and Industry Practice Research - Paper Presentation(@ TUT)
2010/12/09-12/01(Gwangju, Korea) The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010) - Paper Presentation
2010/11/29-12/01(Cairo, Egypt) 2010 International Conference on Intelligent Systems Design and Applications (ISDA 2010) - Paper Presentation
2010/03/23-03/26(Fukuoka, Japan) 2010 International Conference on Computational Science and Its Applications (ICCSA 2010) - Paper Presentation
2009/12/17(Tainan, Taiwan) 2009 Conference on Global Logistic Management and Industry Practice Research - Paper Presentation(@ TUT)
2009/08/18-08/20(Xi'an, China) The 5th International Conference on Information Assurance and Security (IAS 2009) - Paper Presentation
2009/04/27-04/29(Las Vegas, USA) The 6th International Conference on Information Technology: New Generations (ITNG 2009) - Paper Presentation
2008/12/25(Tainan, Taiwan) 2008 Conference on Global Logistic Management and Industry Practice Research - Paper Presentation(@ TUT)
2007/08/26-08/29(Kuala Lumpur, Malaysia) 2007 International Conference on Computational Science and Its Applications (ICCSA 2007) - Paper Presentation
2006/12/04-12/06(Taipei, Taiwan) International Computer Symposium 2006 (ICS 2006) - Paper Presentation
2003/12/14-12/16(Kaohsiung, Taiwan) 2003 International Conference on Informatics, Cybernetics and Systems (ICICS 2003) - Paper Presentation
Attendant Academic Society
Senior Member of IEEE (No. 91163422)
Member of Chinese Cryptography Information Security Association (CCISA; No. R109009)
Member of Sina Smart Computing Institute (SSCI)
Member of E-Security Analysis and Management Association (ESAM)
Member of Machine Intelligence Research Labs (MIR Labs)
Patents
Chun-Ta Li, Chin-Wen Lee, A Secure Cloud Storage Service with Keyword Search Method , No.: I585608, TAIWAN (R.O.C.) (June 2017~November 2035)
Chun-Ta Li, Jau-Ji Shen, A Two-Layer Dictionary Indexing Method , No.: I463338, TAIWAN (R.O.C.) (December 2014~September 2030)
Chun-Ta Li, A Device of Online Game , No.: M384690, TAIWAN (R.O.C.) (July 2010~March 2020)
Chun-Ta Li, A Multi-Language Exposition Device , No.: M395863, TAIWAN (R.O.C.) (Jan. 2011~Aug. 2020)
Chun-Ta Li, Chin-Wen Lee, An Unmanned Device for Ordering Meals and Paying Expenses , No.: M425350, TAIWAN (R.O.C.) (Mar. 2012~Nov. 2021)
Chun-Ta Li, Jian-Jhong Jheng, Yi-Rui Zhu, Xiao-Qian Zhang, A RFID-Based Vehicular Monitoring System , No.: M463403, TAIWAN (R.O.C.) (Oct. 2013~June 2026)
Chun-Ta Li, Chun-Cheng Wang, Hua-Hsuan Chen, Chiung-Li Hsu, Min-Chieh Hsu, A RFID-Based Amusement Park Management System , No.: M504290, TAIWAN (R.O.C.) (July 2015~Dec. 2024)
Chun-Ta Li, Chun-Cheng Wang, Song-Jhih Chen, A Stamp and Post Device with Registered Card , No.: M520170, TAIWAN (R.O.C.) (Apr. 2016~Dec. 2025)
Dissertations
Ph.D. Thesis: On the Security Mechanisms for Wireless Ad Hoc Networks and Their Applications (June 2008)
Master's Thesis: A Multi-Layer Searching Technique for Quickly Retrieval (June 2004)
Last updated: December 28, 2023