| 序號 | 題名 | 作者 | 日期 |
| 1 | An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks | Li,Chun TaHwang,Min ShiangLiu,Chi Yu | |
| 2 | A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy ... | Li,Chun TaHwang,Min ShiangChu,Yen Ping | |
| 3 | An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks | Li,Chun-TaHwang,Min-ShiangLiu, Chi-Yu | |
| 4 | ... the Security of A Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc ... | Li,Chun-TaHwang,Min-ShiangChu,Yen-Ping | |
| 5 | authenticated path-key establishment scheme for secure communications in wireless sensor networks | 李俊達Chun-Ta LiMin-Shiang HwangYen-Ping Chu | |
| 6 | An efficient biometrics-based remote user authentication scheme using smart cards | Chun-Ta Li, Min-Shiang Hwang李俊達 | |
| 7 | An Efficient and Secure Communication Scheme for Trusted Computing Environments | 李俊達 | |
| 8 | A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insec | Chun-Ta Li1Cheng-Chi LeeLian-Jun Wang | |
| 9 | A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System | 李俊達 | |
| 10 | A Secure Trapdoor-Indistinguishable Public Encryption Scheme with Keyword Search for Cloud Storage ... | 李俊達李正吉邱詩婷 | |
| 11 | Security Enhancement on An RFID Ownership Transfer Protocol Based on Cloud | 李俊達Cheng-Chi LeeShun-Der ChenChung-Lun ChengYan-Ming Lai | |
| 12 | An efficient online/offline ID-based short signature procedure using extended chaotic maps | 李俊達Chandrashekhar MeshramSarita Gajbhiye Meshram | |
| 13 | ... Provably Secure Group Key Agreement Scheme with Privacy Preservation for Online Social Networks ... | 李俊達Tsu-Yang WuChien-Ming Chen | |
| 14 | Robot Identification and Authentication in a Robot Cloud Service System | 李俊達Chin-Ling ChenYan-Ting LiYong-Yuan Deng | |
| 15 | A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System | 李俊達李正吉陳致瑋賴彥銘 | |
| 16 | An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps | 李俊達翁麒耀陳建銘李正吉 | |
| 17 | Eavesdropping Detection based on Power-Comparisons to Reconfigure Signature Keys in Optical Coding A | 陳見生楊朝欽Kai-Chun Lin黃振發 | |
| 18 | Cloud-Assisted Mutual Authentication and Privacy Preservation Protocol for Telecare Medical Informat | 李俊達施東河王浚丞 | |
| 19 | A Novel Three-party Password-based Authenticated Key Exchange Protocol with User Anonymity Based on | 李俊達陳金鈴李正吉翁麒耀陳建銘 | |
| 20 | A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things ... | 李俊達李正吉翁麒耀 | |