Skip to main content

and
  1. No Access

    Article

    A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps

    Three-party authenticated key exchange (3PAKE) protocol allows two communication users to authenticate each other and to establish a secure common session key with the help of a trusted remote server. Recently...

    Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen in Soft Computing (2018)

  2. No Access

    Article

    A fair and secure group buying system based on arbitration computing mechanism

    Trading is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain a reasonable profit. If friends or family of a b...

    Chin-Ling Chen, Yong-Yuan Deng in Soft Computing (2018)

  3. No Access

    Article

    A secure key authentication scheme for cryptosystems based on GDLP and IFP

    The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fi...

    Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen in Soft Computing (2017)