|
|
(採用HiTrust HiShop平台技術,此商店平台由東華大學資工系資訊安全實驗室所維護, 讓使用者試用SSL線上付款機制。) |
|
Department of Computer Science and Information Engineering National Dong Hwa University Shoufeng , Hualien 974, TAIWAN |
||
Email address: cnyang@mail.ndhu.edu.tw | |||
Fax: +886-3-8634010
Phone: +886-3-8634025 |
Resume of Professor James C.N. Yang (james_resume.pdf) |
國立交通大學電信工程系 (民國68年9月~民國72年7月)
國立交通大學電信研究所碩士 (民國72年9月~民國74年7月)
國立成功大學電機研究所博士 (民國82年9月~民國86年12月)
|
Research :
密碼學 資訊與網路安全 編碼理論 目前研究題目方向:
(1) 視覺式的秘密分享技術
(2) 影像秘密分享技術
(3) 資訊隱藏
(4) 數位浮水印技術
(6) 無線安全 (7) 電子商務安全 (8) 量子密碼 (9) 計算機記憶體編碼 計畫:
(1)"中央健康保險局南區分局醫療費用連線申報電子簽章雛型系統" 協同主持人
(2)" 階層式架構的視覺式秘密分享技術 " 主持人(89年度) (3)"視覺式(包含多重秘密、高畫質、動態影像)及聽覺式秘密分享技術之研究",主持人 (89年度)(4)"子圖片大小不擴張以及子圖片檔案具有錯誤更正與檢測能力的視覺式秘密分享技術之研究 (90年度) (5)" 可寫一次光碟防竄改保護技術之研究", 主持人 (91年度) (6)"不變動IV及秘密金鑰長度下讓IEEE 802.11b無線網路抵抗 keystream 重複使用攻擊以及RC4破密之研究" (92年度) (7)"台灣學術網路北區不當資訊防制計畫-高速網路下提高不當資訊偵測成功率技術之研究",計畫主持人 (92.4.~ 94.12.) (8)"環狀被動光纖網路上量子密鑰交換協定之研究",計畫主持人(92.12.~ 93.10.)
(11) "高性能與多功能的WebGrid系統的設計與製作-WebGrid下的安全服務(2/2)",計畫主持人(94年度) (12) "植基於JAVA智慧卡上的手機仿真器憑證申請系統",計畫主持人(94年度) (13)"植基於光學字元辨識與多重像素擴張的高實用性視覺式秘密分享系統之研製",計畫主持人(95年度) (14)"嵌入指紋特徵比對技術於智慧卡的高安全性憑證存取系統之研製",計畫主持人(95年度) (15)"應用視覺式秘密分享技術將私密資料嵌入二維條碼系統之研製",計畫主持人(96年度) (16)"應用RFID技術於校園電腦教室之滑鼠使用權限與網際網路存取控管",計畫主持人(96年度) (17)"結合RFID技術(電子通道)與二維條碼技術(光接觸通道)的兩種新型RFID應用系統研製: (1)防追蹤之產品保證書機制 (2)高安全性之紙鈔防衛機制",多年期計畫主持人(97、98年度) (18)產業交易安全環境評估與推動研究,工研院計畫98年4月-98年11月,計畫主持人 |
Courses :
|
Publications :
(A)期刊論文: (Use 2008 Impact Factor from Journal Citation Reports)
001. C.N. Yang, A.G. Peng and T.S. Chen, "MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on Resolving Alignment Difficulty," Signal Processing, Vol. 89, Issue 8, pp. 1602-1624, Aug., 2009. [SCI IF: 1.256]. 002. C.N. Yang, C.B. Ciou, "A Comment on "Sharing Secrets in Stego Images with Authentication","Pattern Recognition, Vol. 42, Issue 7, pp. 1615-1619, July, 2009. [SCI IF: 3.279]. 003. C.N. Yang, and Y.Y Yang, and C.Y. Chiu, "Image Library Systems: A Novel Installment Payment for Buying Images on the Web," Journal of Computers, Vol. 20, No.1, pp. 43-49, April 2009. 004. C.N. Yang and B.L. Lu, "Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes," JISE Journal of Information Science and Engineering, Vol. 25 No. 1, pp. 1-10, January 2009. [SCI IF: 0.242]. 005. C.N. Yang, A.G. Peng and T.S. Chen, "Secret Image Sharing: DPVCS A Two-in-One Combination of (D)eterministic and (P)robabilistic (V)isual (C)ryptography (S)chemes," Journal of Imaging Science and Technology, Vol. 52, No. 6, pp. 060508-1-060508-12, Nov./Dec., 2008. [SCI IF: 0.619]. 006. C.N. Yang, C.C. Wang and T.S. Chen "Visual Cryptography Schemes with Reversing," The Computer Journal, Vol. 51 No. 6, pp. 710-722, Nov. 2008.(doi:10.1093/comjnl/bxm118). [SCI IF: 1.000]. 007. C.N. Yang and T.S. Chen "Colored Visual Cryptography Scheme Based on Additive Color Mixing," Pattern Recognition, Vol. 41, Issue 10, pp. 3114-3129, October, 2008. [SCI IF: 3.279]. 008. C.N. Yang "Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit-Shift," IEEE Trans. on Computers, Vol. 57, No. 7, pp. 876-888, July, 2008. [SCI IF: 2.611]. 009. C.N. Yang and T.S. Chen "Security Analysis on Authentication of Images Using Recursive Visual Cryptography," Cryptologia, Volume 32, Issue 2, pp. 131-136, April 2008. [SCI IF: 0.074]. 010. C.N. Yang and T.S. Chen, "Visual Secret Sharing Scheme: Prioritizing the Secret Pixels with Different Pixel Expansions to Enhance the Image Contrast," Optical Engineering, Vol. 46, Issue 9, pp. 097005-1 - 097005-19, Sep., 2007. [SCI IF: 0.722]. 011. C.N. Yang, M.Y. Chen and C.S. Laih, "Applying RFID Technology in Warranty Service Information System," International Journal of Services Operations and Informatics, Vol. 2, No. 3, pp. 267-277, 2007. 012. C.N. Yang and T.S. Chen, "Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality," International Journal of Pattern Recognition and Artificial Intelligence, Vol. 21, No. 5, pp. 879-898, Aug., 2007. [SCI IF: 0.660]. 013. C.N. Yang, G.J. Chen, T.S. Chen, and R. Lukac, "Error Spreading Control in Image Steganographic Embedding Schemes Using Unequal Error Protection," Journal of Imaging Science and Technology, Vol. 51, No. 4, pp. 380-385, July/August, 2007. [SCI IF: 0.619]. 014. M.Y. Chen, C.N. Yang and C.S. Laih, "Authorized Tracking and Tracing for RFID Tags," International Journal of Security and Its Applications, Vol. 1, No. 1, pp. 1-13, July, 2007. 015. C.N. Yang, T.S. Chen, K.H. Yu and C.C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and software, Vol. 80, Issue 7, pp. 1070-1076, July, 2007.[SCI IF: 1.241]. 016. C.N. Yang, K.H. Yu and R. Lukac, "User-Friendly Image Sharing Using Polynomials with Different Primes," International Journal of Imaging Systems and Technology, Vol. 17, Issue 1, pp. 40-47, June, 2007. . [SCI IF: 0.415]. 017. C.N. Yang and D.J. Lee, “Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables,” IEEE Trans. on Computers., Vol. 55, Issue 7, pp. 924-927, July, 2006. [SCI IF: 2.611]. 018. C.N. Yang and T.S. Chen, “Reduce Shadow Size in Aspect Ratio Invariant Visual Secret Sharing Schemes using a Square Block-wise Operation,” Pattern Recognition, Vol. 39, Issue 7, pp. 1300-1314, July, 2006. [SCI IF: 3.279]. 019. C.N. Yang, T.S. Chen and M.H. Ching, “Embed Additional Private Information into Two-Dimensional Bar Codes by the Visual Secret Sharing Scheme,” Integrated Computer-Aided Engineering, Volume 13, Number 2, pp. 189-199, 2006. [SCI IF: 0.617]. 020. C.N. Yang and T.S. Chen, “New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,Vol.E89-A, No.2, pp. 620-625, Feb., 2006. [SCI IF: 0.437]. 021. C.N. Yang and T.S. Chen, “Size-Adjustable Visual Secret Sharing Schemes,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E88-A, No.9, pp. 2471-2474, Sep., 2005. [SCI IF:0.437]. 022. C.N. Yang, “Design of Efficient Second-Order Spectral-Null Codes,” IEEE Trans. on Information Theory, Vol. 51, No. 4, pp. 1580-1584, April, 2005. [SCI IF: 3.793]. 023. C.N. Yang and G.J. Chen, “A Comment on “Systematic Single Asymmetric Error-Correcting Codes”, IEEE Trans. on Information Theory, Vol. 51, No. 3,pp. 1214-1217, March, 2005. [SCI IF: 3.793]. 024. C.N. Yang, S.H. Chu and B.L. Lu, “Failure of Kak-Quantum Key Distribution Protocol,” Pramana - journal of physics, Vol.64, No.1, pp. 1-4, Jan. 2005. [SCI IF: 0.274]. 025. C.N. Yang and T.S. Chen, “Aspect Ratio Invariant Visual Secret Sharing Schemes with Minimum Pixel Expansion,” Pattern Recognition Letters, Vol. 26, Issue 2, pp. 193-206, 2005. [SCI IF: 1.559]. 026. C.N. Yang, “New Visual Secret Sharing Schemes Using Probabilistic Method,” Pattern Recognition Letters, Vol. 25, Issue 4, pp. 481-494, 2004. [SCI IF: 1.559]. 027. C.C. Lin, C.S. Laih and C.N. Yang, “New Audio Secret Sharing Schemes with Time Division Technique,”Journal of Information Science and Engineering, Vol.19 No.4, pp.605-614, July 2003. [SCI IF: 0.242]. 028. C.N. Yang, “A Note on Efficient Color Visual Encryption,” JISE Journal of Information Science and Engineering, Volume 18, Number 3, pp.367-372, May 2002. [SCI IF: 0.242]. 029. C.N. Yang, “Improvements on Audio and Optical Cryptography,” JISE Journal of Information Science and Engineering, Volume 18, Number 3, pp.381-391, May 2002. [SCI IF:0.242]. 030. C.N. Yang and C.S. Laih, "New Colored Visual Secret Sharing Schemes." Designs Codes and Cryptography, Volume 20, Issue 3, pp.325~336, July, 2000. [SCI IF: 0.745] 031. C.N. Yang and C.S. Laih, “DCm Codes for Constructing t-EC/AUED Codes,” IEEE Trans. Computers, vol. C-47,NO. 4, April 1998. [SCI IF:2.611]. 032. C.N. Yang and C.S. Laih, “A Systematic Construction of Inner Codes in Generalized Concatenated Codes for Correcting Unidirectional Byte Errors,” IEICE Trans. on Fundamentals of Electronics, Communications, and Computer Sciences, pp. 351-354, Feb., 1998. [SCI IF: 0.437]. 033. C.N. Yang and C.S. Laih, “Generating Functions for Asymmetric/ Unidirectional Error Correcting and Detecting Codes,” IEICE Trans. on Fundamentals of Electronics, Communications, and Computer Sciences, pp. 1135-1143, June, 1997. [SCI IF: 0.437]. 034. C.N. Yang and C.S. Laih, “A Note On Error-correcting Codes for Authentication and Subliminal Channels,” Information Processing Letters, vol. 62, pp.141-143, 1997. [SCI IF:0.706]. 035. C.S. Laih and C.N. Yang, “Deign of Efficient Balanced Codes with Minimum Distance 4,” IEE Proceedings-Communications, vol. 143, pp. 177-181, Aug. 1996. [SCI IF: 0.788]. 036. C.S. Laih and C.N. Yang, “On The Analysis and Design of Group Theoretical t-syEC/AUED Codes,” IEEE Trans. Computers, vol. C-45, pp. 103-108, Jan. 1996. [SCI IF: 2.611].
(B)研討會論文:
International Conference Papers:
001. C.N. Yang, C.C. Wu, C.Y. Chiu, S.Y. Chiou, and W.C. Liao, "Micropayment Schemes with Ability to Return Changes," accepted and to be published at the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS2009), Kuala Lumpur, Malaysia, Dec., 2009. 002. C.N. Yang, C.S. Laih, C.C. Wu, and G.C. Wu, "RWSIS: (R)FID-enabled (W)arranty (S)ervice (I)nformation (S)ystem on Resolving Security and Privacy," accepted and to be published at The 2009 International Symposium on IT and its Applications (ITA-09) in conjunction with IEEE CSA 2009, Jeju Island, Korea, Dec., 2009. 003. C.N. Yang, J.R. Chen, C.Y. Chiu, G.C. Wu, and C.C. Wu, "Enhancing Privacy and Security in RFID-Enabled Banknotes," the 2009 IEEE International Workshop on Security in e-Science and e-Research (ISSR2009) in conjunction with IEEE ISPA2009, pp 439-444, Chengdu, China, August 2009. 004. C.N. Yang, Jia-Sing Su and Shun-Yu Cheng, "A Multilevel Secure Key Predistribution Scheme in Wireless Sensor Networks," The 4th International Conferences on Information Security and Cryptology (Inscrypt 2008), Beijing, China, Dec. 2008. 005. C.N. Yang, Y.Y. Yang, T.S. Chen and G.C. Ye, "New Steganography Scheme in Halftone Images," 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), pp. 1520–1523, Harbin, China, Aug. 2008. 006. C.N. Yang, C.Y. Chiu, T.S. Chen and G.C. Ye, "Wireless Image Transmission Using Burst Error Correction Codes," The 5th IET Visual Information Engineering 2008 Conference (VIE'08) , pp. 331–336, Xi'an, China, July 2008. 007. C.N. Yang, A.G. Peng and T.S. Chen, " Reducing Shadow Size for Visual Cryptography Scheme," The Ninth International Conference on Information and Communications Security (ICICS 2007), Zhengzhou, China, Dec. 2007. 008. C.N. Yang and T.S. Chen, "An Image Secret Sharing Scheme with the Capability of Previewing the Secret Image," IEEE ICME 2007 International Conference on Multimedia & Expo (ICME'07), pp. 1535-1538, Beijing, China, July 2007. 009. C.N. Yang, K.H. Yu and R. Lukac, "User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes", LNCS 4352, pp. 443-452, MMM 2007 (International MultiMedia Modeling Conference), Singapore, January, 2007. 010. C.N. Yang and T.S. Chen, "Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image via Different Pixel Expansions," LNCS 4141, pp.468–479, 2006.,ICIAR (International Conference on Image Analysis and Recognition) 2006, Portugal, Sep., 2006. 011. M.Y. Chen, C.N. Yang and C.S. Laih, "Authorized Tracking and Tracing for RFID Tags," LNCS 4097, pp. 435–444, EUC 2006 Workshops: RFID and Ubiquitous Sensor Networks, Korea, Aug., 2006. 012. C.N. Yang, C.C. Wang and T.S. Chen, "Real Perfect Contrast Visual Secret Schemes with Reversing," LNCS 3989, pp. 433–447, ACNS (Applied Cryptography and Network Security) 2006, Singapore, June, 2006. 013. C.N. Yang and B.L. Lu, "Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes," P2P workshop in InfoScale2006, Hong Kong, May, 2006. 014. C.N. Yang and T.S. Chen, "Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels", LNCS 3656, pp. 1184–1191, ICIAR (International Conference on Image Analysis and Recognition) 2005, Canada, September, 2005. 015. C.N. Yang and T.S. Chen, "New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-wise Operation", LNCS 3656, pp. 1167–1174, ICIAR (International Conference on Image Analysis and Recognition) 2005,Canada, September, 2005. 016. C.N. Yang, T. Lin, and T.S. Chen, "Enhanced Fair Micropayment Scheme Based on Hash Chain To Avoid Merchant Collusion", pp. 39 - 42, ISCE 2005, Macau, June, 2005. 017. C.N. Yang and T.S. Chen,,"New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size", LNCS 3480, pp. 19–28, ICCSA (International Conference on Computational Science and its Applications) 2005, Singapore, May, 2005. 018. C.N. Yang, and G.J. Chen, “Error Spreading Control in Steganography Embedding Scheme Using Unequal Error Protection,” 2004 International Computer Symposium(ICS2004), pp.443-448, Dec., 2004. 019. C.N. Yang and T.S. Chen, “An Algorithm to Enumerate Codewords for Third-Order Spectral-Null Codes,” Proceedings, 2004 IEEE International Symposium on Information Theory, pp.88, June 27-July 2, 2004. 020. C.N. Yang, H.T. Teng and T.S. Chen, “Using One-way Hash Function to Solve the Reusable Unit Key Problem in Bluetooth Security,” The 8th World Multi-Conference on SYSTEMICS, CYBERNETICS AND INFORMATICS, SCI 2004, pp.29-32, July, 2004. 021. C.N. Yang and H.T. Teng,“An Efficient Method for Finding Minimum Hash Chain of Multi-Payword Chains in Micropayment,”IEEE Conference on E-Commerce, pp.45-48, June, 2003. 022. C.N. Yang, T.Y. Cheng and C.C. Kuo, “Enhanced Wireless IEEE 802.11b Protocols Resistant to the Keystream Reuse Attack,” Proceedings of the 2002 International Computer Symposium, Volume 2, pp.1035-1039, Dec., 2002. 023. C.N. Yang and C.C. Kuo, “Enhanced Quantum Key Distribution Protocols Using BB84 and B92,” Proceedings of the 2002 International Computer Symposium, Volume 2, pp.951-959, Dec., 2002. 024. C.N. Yang and C.C. Kuo, “A New Efficient Quantum Key Distribution Protocal,” Proceedings of SPIE, Vol. 4917, pp.54-58, Oct., 2002. 025. C.N. Yang, “An improvement on code for detection of tampering in write-once optical disks,” 2000 International Computer Symp.Proceedings(ICS 2000), Workshop on cryptology and information security,pp.84-90, Dec., 2000. 026. C.S. Laih, C.C. Lin, and C.N. Yang, “The Recent Development of E-government and PKI in ROC,” SSGRR 2000
Computer & eBusiness Conference, Italy, July 31~August 6, 2000.
027. C.N. Yang and C.S. Laih, “New
(k,k) visual secret sharing schemes using hierarchical structure technique,” 1998
International Computer Symp. Proceedings(ICS'98), Workshop on cryptology
and information security, pp.148-154, Dec., 1998.
028. C.N. Yang, Y.B. Yeh, and C.S. Laih, “A dynamic password visual authentication scheme through Internet,” 16-th International Telecommunication Symp. (ITS'98), vol. III, pp.163-167, Sep., 1998. 029. C.N. Yang and C.S. Laih, “On the design of t-EC/AUED codes,” IEEE International Symposium on Information Theory, June 29-July 4, 1997. 030. Y.C. Lee, C.N. Yang, and C.S. Laih, “An authentication protocol for the GSM,” 15-th International Telecommunication Symp.(ITS‘96), vol. I, pp.173-176,Nov.,1996.
Local Conference Papers: 001. C.N. Yang,
002. C.N. Yang,
003. C.N. Yang
004. C.N. Yang,
005. C.N. Yang,
006. C.N. Yang,
007. C.N. Yang,
008. C.N. Yang, F.R. Zhou, J.R. Lu, T. Zheng and T.S. Chen, "Applying CAPTCHA Technology to Prevent Click Fraud in E-Commercials," ECDL2007, pp. 492-499, March, 2007. 009. C.N. Yang, T.S. Chen and A.G. Peng, "Certificate Services for Cellular Phone Emulator Based on JAVA Card,"OpenSource Code 2006, Nov. 2006. 010. C.N. Yang, T.S. Chen, Y.C. Lin, Y.F. Yu, Y.F. Chen, C.Y. Chiu and U.F. Lee "Access Control for Mouse and Network Functions in Computer Classroom Using RFID Technique," TANET 2006, Nov. 2006. 011. C.N. Yang, T.S. Chen, K.H. Yu and C.C. Wang, "Cheating-Immune Secret Image Sharing Scheme with Steganography," Information Security Conference, pp.250-257, June, 2006. 012. C.N. Yang, K. N. Chen and A.G. Peng , “A Reliable Tree-Based Revocation Scheme in Grid Computing System”, The Second Workshop on Grid Technologies and Applications WOGTA 2005, pp. 44-50, Dec. 2005. 013. Y.F. Lee,
B.F. Liou, C.N. Yang,
H.C. Chi,
"Automatic IP Management," Proc. TANET 2005,
014. C.N. Yang, Z.W. Chen and C.C. Chiang, “A Slight Secret Key Storage Requirement Watermarking Scheme For Image Authentication”, 18th IPPR Conference on Computer Vision, Graphics and Image Processing (CVGIP 2005), pp. 1038-1041, Aug. 2005. 015. C.N. Yang and S.H. Chu, “A Simple and Efficient Quantum Dense Key Distribution Protocol Using Single Polarized Photon”, Information Security Conference, pp. 382-388, June 2004. 016. C.N. Yang and T.S. Chen, “Image Size Invariant Visual Secret Sharing Schemes for Gray Level Image”, Information Security Conference, pp.464-471, June 2003. 017. C.N. Yang, C.C. Kuo, and T.Y. Cheng, “Enhancement of Known IV attack for WEP-like Systems”, National Computer Symposium on Information Security, pp.1205-1212, Dec 2003. 018. C.C. Lin, C.S. Laih and C.N. Yang, “Audio Cryptography Schemes based on the time division technique,” 2002 Proceedings of the Eleventh National Conference on Information Security, pp.407-414, May 2002. 019. C.N. Yang ,Y.H. Liang ,and W.H. Chou, “New Visual Secret Sharing Scheme with Non-Expansible Shadow Size Using Non-binary Sub Pixel,” National Computer Symposium on Information Security, pp.F074~F085. 020. C.N. Yang and T.L. Wu, “Visual Secret Sharing Schemes with Multiple Shared Secrets,” 2000 Proceedings of the Eleventh National Conference on Information Security,pp. 99-105, May 2001. 021. C.H. Shi, S.L. Peng, and C.N. Yang, “Efficient
Generation of Constant Weight Codes in Cryptosystem,” 2000 Proceedings
of the Tenth National Conference on Information Security, pp. 149-160,
May, 2000.
022. C.N. Yang and T.L. Wu, “A
Colored Visual Secret Sharing Scheme Based on the Additive Color Mixing of
Light,” 2000 Proceedings of the Tenth National Conference on Information
Security, pp. 180-189, May, 2000.
023. C.N. Yang and C.S. Laih, “Some new types of visual secret sharing
schemes,” 1999
National Computer Symp. (NCS'99), vol. III, pp.260-268, Dec., 1999.
(C)著作、專書、專章:
001. R. Lukac, K.N. Plataniotis, and C.N. Yang, Image Secret Sharing. In Encyclopedia of Multimedia, (ed.) B. Furth, Springer-Verlag, pp. 328-335, January 2006. Including short articles: Compression in Image Secret Sharing (pp. 86-87), Halftoning-Based Visual Secret Sharing (pp. 363-364), Image Watermarking Using Visual Cryptography (pp. 337-338), Private-Key Cryptosystem (pp. 712- 714), Threshold Schemes with Minimum Pixel Expansion (pp. 849-850), Visual Cryptography (pp. 950-951). ISBN 0-387-24395-X . 002. 楊慶隆,“數據編碼與錯誤控制” ,中華電信訓練所訓練叢書,編號:T311,1995。 003. 楊慶隆,“新型感應器與保全電路” ,全華書局,1994。 中華民國專利 :
(1) 距離等於4平衡碼編碼/解碼器
(2) 視覺式秘密分享技術 Serve in International Conferences: • BIFE 2010- Program Committee Member of 2010 International Conference on Business Intelligence and Financial Engineering • ICIC 2010- Program Committee Member of 2010 International Conference on Intelligent Computing • GPC2010- Publication Chair of 2010 5th International Conference on Grid Pervasive Computing • ITA 2009- Session Chair of the 2009 International Symposium on IT and its Applications (ITA-09) in conjunction with IEEE CSA 2009 • ISSR2009- Session Chair of IEEE International Workshop on Security in e-Science and e-Research (ISSR2009) in conjunction with IEEE ISPA2009. • MPIS 2009- Program Committee Member of the Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems in conjunction with CSA 2009 • ICPADS'09- Program Committee Member of Security and Trustworthy Computing for The Fifteenth International Conference on Parallel and Distributed Systems • BIFE 2009- Program Committee Member of 2009 International Conference on Business Intelligence and Financial Engineering • FIP 2009- Program Committee Member of 2009 International Symposium on Financial Information Processing • ICIC 2009- Program Committee Member of 2009 International Conference on Intelligent Computing • JWIS 2009- Program Committee Member of 2009 Joint Workshop on Information Security • Inscrypt 2008- Session Chair of 2008 International Conference on Information Security and Cryptology • MPIS 2008- Program Committee Member of The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems in conjunction with IEEE APSCC 2008 • CLD 2008- Program Committee Member of ACM International Workshop on Cross Layer Design • ICIC 2008- Program Committee Member of 2009 International Conference on Intelligent Computing • ICIC 2007- Program Committee Member of 2009 International Conference on Intelligent Computing
|
畢業校友 |
|
吳宗霖
|
兩種新式的視覺密碼機制:視覺式多重秘密分享和彩色視覺式秘密分享 |
|
Two New Visual Cryptography Schemes: Visual Multi-Secrets Sharing Scheme And Colored Visual Secret Sharing Scheme |
||||
|
梁蘊翔 | 非擴張的視覺式秘密分享及動態的視覺式秘密分享技術之研究 |
||
A Study Of Non-Expansible And Motion Picture Visual Secret Sharing Schemes |
||||
畢業校友 |
|
周萬祥 | 可寫一次光碟防竄改保護技術之研究 |
|
Detection Of Tampering In Noisy Environment For Write-Once Optical Disks |
||||
|
鄧旭敦 | 植基於數位傳輸內容保護標準的兩項研究議題: 設計具備安全認證機制的隨選視訊和會議金鑰之通訊協定 |
||
Implementation Of Secure Video On Demand System And Conference Key Establishment Based On Digital Trandmission Content Protection | ||||
畢業校友
|
|
郭振欽 | 無線網路WEP-like系統已知IV攻擊法的增強研究 | |
Enhancement of Known IV Attack for WEP-like Systems | ||||
|
孫維婕 | 新型非二元聽覺式秘密分享系統 |
||
New Nonbinary Audio Secret Sharing Schemes |
||||
|
鄭琮元 | 不變動IV和秘密金鑰長度下讓IEEE 802.11b 無線網路協定抵抗keystream重複使用攻擊以及己知IV攻擊 | ||
Enhanced Wireless IEEE 802.11b Protocols Resistant to the Keystream Reuse Attack and Known IV Attack | ||||
畢業校友
|
|
林曉偉
|
資料探勘技術應用於網路入侵偵測特徵值搜尋之研究 |
|
Data Mining Techniques For Signature Search In Network Intrusion Detection |
||||
|
陳國詔
|
以不效效保護碼在隱藏學加密過程中防止錯誤擴散之技術研究 | ||
Error Spreading Control In Steganographic Embedding Scheme Based On UEP Codes |
||||
|
簡銘宏
|
視覺秘密分享技術應用在二維條碼嵌入私密訊息之研究 | ||
Embed Additional Private Information Into Two-Dimensional Bar Codes Based Cards By Using The Visual Secret Sharing Scheme | ||||
|
陳坤男
|
使用霍夫曼樹建立具實用性的憑證廢止機制 | ||
A Practical Certificate Revocation Scheme By Using Huffman Tree | ||||
畢業校友
|
|
陳澤世 (博士生) |
具有較小子影像的視覺密碼研究 Visual Cryptography Schemes with Small Shadow Size |
|
|
呂秉霖 | 可容錯誤與共謀攻擊的指紋碼之溯演算法的改進 | ||
Enhanced Tracing Algorithms For Random-Error-Resilient Collusion-Secure Fingerprinting codes | ||||
|
朱書玄 | 一個簡單且有麥率的單量子金鑰交換協定和對於 Kak 量子交換協定的攻擊 | ||
A Simple And Efficient Quantum Dense Key Distribution Protocol Using Single Polarized Photon And The Failure of Kak Quantum Key Distribution Protocol | ||||
|
吳胤鋒 | RS 碼在 IP 路徑回溯上的應用 | ||
Reed-Solomon code Marking Scheme For IP Traceback | ||||
|
丁士峯 | 新一代無線網路通訊安全定 TKIP 的破密分析 | ||
Cryptanalysis Of The Key Mixing Function In TKIP |
畢業校友 |
李東璟 | 新型有效率的無二階頻譜成份的平衡碼設計 |
||
Design Of Some New Efficient Second-Order Spectral-Null Codes |
||||
林 宗 | 植基於小額付款技術之行動隨意網路的封包計費機制 |
|||
Packet Pricing In Mobile Ad Hoc Networks Based On Micropayment Scheme | ||||
余崑玄 | 秘密影像分享機制:可顯示秘密子影像及可預覽秘密影像的兩種機制之研究 | |||
Secret Image Sharing: User-Friendly And Preview-Secret Schemes | ||||
王鐘諄 | 以反相運算達成完美對比之視覺式秘密分享機制 | |||
Real Perfect Contrast Visual Secret Sharing Schemes With Reversing |
畢業校友 |
彭安國 | 具偏移容忍性之視覺式秘密分享系統 Reducing the Alignment Problem of Visual Secret Sharing Scheme Using Two-Sized Subpixels |
||
陳潔如 | 應用無線射頻認證技術之紙鈔防偽機制 Enhancing Privacy and Security in RFID Banknote Protection Scheme |
|||
|
蕭輔中 | 植基於影像分佈統計之快速指紋分類 Fast Fingerprint Classification Based on Normalized Histogram Statistic |
畢業校友 |
蘇嘉興 | 多階層安全的無線感測網路金鑰分配機制 A Multilevel Secure Key Predistribution Scheme in Sensor Networks |
||
張仕翰 | 基於空間填充曲線之像素差異資訊隱藏技術 A New Pixel-Value Differencing Steganography Scheme Based on Space Filling Curve |
畢業校友 |
鄭順友 |
結合RFID(電子通道)與二維條碼技術(光接觸通道)於防追蹤之產品保證書機制 Combining RFID and Two-Dimensional Barcode Effectively for Privacy Protection in Warranty Service Information System |
||
邱志揚 |
植基於新式鴿家原理之有效率無二階頻譜成份的平衡碼設計 Efficient Second-Order Spectral-Null Codes Based on the New Pigeon Home Principle |
|||
楊燿宇 |
具高清晰度子影像的新型擴展式視覺密碼技術 New Extended Visual Cryptography Schemes with Clearer Shadow Images |
|||
黃信銘 |
新型的(k, n)比例式秘密影像分享機制 A New k-out-of-n Scalable Secret Image Sharing Scheme |
|||
葉國勤 |
植基於XOR區塊運算差異最小化的新半色調影像秘密分享 New XOR-Based Image Secret Sharing in Halftone Images with Difference Minimization Using Block-wise Operation |
邱垂邦 |
具有無失真恢復以及預覽雙重解碼功能的秘密影像分享 Image Secret Sharing Method with Two-Decoding-Options: LosslessRecovery and Previewing Capability |
|
吳志成 |
邱志揚 |
|
龔郁晴 |
|||
鍾庭顥 |
||||
吳根丞 |
|
李佳侯 | |||
何駿彥 | ||||
朱瑀瑩 | ||||
陳品維 | ||||