教授著作

A. 學術期刊論文

[1]           Chang, C.C. and Wu, T.C., “A broadcasting cryptosystem based upon Euclidean geometry,” International Journal on Policy and Information, Vol. 13, No. 2, 1989, pp. 179-186.

[2]           Chang, C.C. and Wu, T.C., “A letter-oriented perfect hashing scheme based upon sparse table compression,” Software-Practice and Experience, Vol. 21, No. 1, 1991, pp. 35-49. (SCI, EI)

[3]           Lin, C.H., Chang, C.C., Wu, T.C. and Lee, R.C.T., “Password authentication using Newton’s interpolating polynomials,” Information Systems, Vol. 16, No. 1, 1991, pp. 97-102. (SCI, EI)

[4]           Chang, C.C. and Wu, T.C., “Remote password authentication with smart cards,” IEE Proceedings Computers and Digital Techniques, Vol. 138, No. 3, 1991, pp. 165-168. (SCI, EI)

[5]           Chang, C.C. and Wu, T.C., “Broadcasting cryptosystem in computer networks using interpolating polynomials,” International Journal of Computer Systems Science and Engineering, Vol. 6, No. 3, 1991, pp. 185-188. (SCI, EI)

[6]           Wu, T.C. and Chang, C.C., “A password authentication scheme based on discrete logarithms,” International Journal of Computer Mathematics, Vol. 41, No. 3+4, 1991, pp. 31-38. (SCI, EI)

[7]           Chang, C.C., Hwang, R.J., and Wu, T.C., “Cryptographic key assignment scheme for access control in a hierarchy,” Information Systems, Vol. 17, No. 3, 1992, pp. 243-247. (SCI, EI)

[8]           Chang, C.C. and Wu, T.C., “Retrieving the most similar symbolic pictures from pictorial databases,” Information Processing and Management, Vol. 28, No. 5, 1992, pp. 581-588. (SCI, EI)

[9]           Chang, C.C. and Wu, T.C., “Controlling the access requests in an information protection system,” Information Processing and Management, Vol. 29, No. 1, 1993, pp. 61-68. (SCI, EI)

[10]       Wu, T.C. and Yeh, Y.S., “A conference key distribution system based on cross-product,” Computers and Mathematics with Applications, Vol. 25, No. 4, 1993, pp. 39-46. (SCI, EI)

[11]       Wu, T.C. and Yeh, Y.S., “Cryptosystem for selectively broadcasting separate secrets,” International Journal of Computer Systems Science and Engineering, Vol. 8, No.2, 1993, pp. 121-124. (SCI, EI)

[12]       Wu, T.C., Yeh, Y.S., and Chang, C.C., “Algebraic operations on encrypted relational databases,” Information Systems, Vol. 18, No. 1, 1993, pp. 55-62.

[13]       Wu, T.C., Chang, C.C., and Yeh, Y.S., “An authentication-combined access control scheme using a one-way function,” Computers and Mathematics with Applications, Vol. 27, No. 5, 1993, pp. 63-70. (SCI, EI)

[14]       Chang, C.C. and Wu, T.C., “A hashing-oriented nearest neighbor searching scheme,” Pattern Recognition Letters, Vol. 14, 1993, pp. 625-630. (SCI, EI)

[15]       Chang, C.C., Kowng, H.C. and Wu, T.C., “A refinement of a compression-oriented addressing scheme,” BIT, Vol. 33, 1993, pp. 530-535. (SCI, EI)

[16]       Wu, T.C. and Chang, C.C., “Controlling access in tree hierarchies,” Information Sciences, Vol. 78, 1994, pp. 69-76. (SCI, EI)

[17]       Wu, T.C. and Chang, C.C., “Application of geometric hashing to iconic database retrieval,” Pattern Recognition Letters, Vol. 15, 1994, pp. 871-876. (SCI, EI)

[18]       Wu, T.C., “Cryptographic implementation of dynamic access control in user hierarchy,” International Journal of Information and Management Sciences, Vol. 5, No. 2, 1994, pp. 73-85.

[19]       Chang, C.C., Shen, J.J., and Wu, T.C., “Access control with binary keys,” Computers & Security, Vol. 13, No. 8, 1994, pp. 681-686. (EI)

[20]       吳宗成、吳宗杉、何煒華:通行碼確認演算法則之評析,資管評論(MIS REVIEW)(中華民國資訊管理學會發行),第四期,民國八十三年十二月,頁 43-52

[21]       吳宗成、黃博仁:使用者階層之多層次資料安全存取控制,電腦學刊(中華民國電腦學會發行),第六卷,第四期,民國八十三年十二月,頁 43-52

[22]       Chang, C.C., Wu, T.C., and Laih, C.S., “Cryptanalysis of a password authentication scheme using quadratic residues,” Computer Communications, Vol. 18, No. 1, 1995, pp. 45-47. (SCI, EI)

[23]       Wu, T.C. and Wu, T.S., “Group commitment protocol based on zero knowledge proofs,” Computer Communications, Vol. 18, No. 9, 1995, pp. 654-656. (SCI, EI)

[24]       Wu, T.C., “Remote login authentication scheme based on a geometric approach,” Computer Communications, Vol. 18, No. 12, 1995, pp. 959-963. (SCI, EI)

[25]       Wu, T.C., Wu, T.S. and He, W.H., “Dynamic access control scheme based on the Chinese remainder theorem,” International Journal of Computer Systems Science and Engineering, Vol. 10, No. 2, 1995, pp. 92- 99. (SCI, EI)

[26]       Chang, C.C. , Wu, W.B., and Wu, T.C., “Cryptanalysis and improvement on a conference key distribution system,” Journal of the Chinese Institute of Engineers(中國工程學刊), Vol. 18, No. 3, 1995, pp. 391-396. (EI)

[27]       Chang, C.C. and Wu, T.C., “An exact match retrieval scheme based upon principal components analysis,” Pattern Recognition Letters, Vol. 16, 1995, pp. 465-470. (SCI, EI)

[28]       Wu, T.C. and He, W.H., “A geometric approach for sharing secrets,” Computers & Security, Vol. 14, No. 2, 1995, pp. 135-145. (EI)

[29]       Wu, T.C. and Wu, T.S., “Cheating detection and cheater identification in secret sharing schemes,” IEE Proceedings Computers and Digital Techniques, Vol. 142, No. 5, 1995, pp. 367-369. (SCI, EI)

[30]       Wu, T.C. and Chang, Y.S., “Improved generalization common multiplicand multiplications algorithm of Yen and Laih,” Electronics Letters, Vol. 31, No. 20, 1995, pp. 1738-1739. (SCI, EI)

[31]       Wu, T.C. and Chang, C.C., “Retrieving Chinese characters with similar appearance from a reorganized Chinese dictionary,” International Journal of Information and Management Sciences, Vol. 7, No. 2, 1996, pp. 31-43.

[32]       Wu, T.C. and Sung, H.S., “An improved one-time digital signature scheme based on one-way function,” Journal of Information Science and Engineering, Vol. 12, No. 3, 1996, pp. 387-395. (EI)

[33]       Wu, T.C., Chou, S.L. and Wu, T.S., “Two ID-based multisignature protocols for sequential and broadcasting architectures,” Computer Communications, Vol. 19, 1996, pp. 851-856. (SCI, EI)

[34]       Wu, T.C. and Sung, H.S., “Authenticating passwords over an insecure channel,” Computers & Security, Vol. 15, No. 5, 1996, pp. 431-439. (EI)

[35]       Wu, T.C. and Hwang, B.R., “On the design of a secure anonymous conference key distribution system,” International Journal of Computer Systems Science and Engineering, Vol. 12, No. 4, 1997, pp. 239-244. (SCI, EI)

[36]       Chang, C.C., Lou, D.C. and Wu, T.C., “A binary access control method using prime factorization,” Information Sciences - Informatics and Computer Science Intelligent Systems Applications, Vol. 96, No. 1+2, 1997, pp. 15-26. (SCI, EI)

[37]       Wu, T.C., “Conference key distribution system with user anonymity based on algebraic approach,” IEE Proceedings Computers and Digital Techniques, Vol. 14, No. 2, 1997, pp. 145-148. (SCI, EI)

[38]       He, W.H. and Wu, T.C., “Improvement of Harn’s digital signature for Diffie-Hellman public keys,” Electronics Letters, Vol. 33, No. 15, July 1997, pp. 1304-1305. (SCI, EI)

[39]       Wu, T.C. and Su, R.L., “ID-based group-oriented cryptosystem and its digital signature scheme,” Computer Communications, Vol. 20, No. 11, 1997, pp. 1019-1026. (SCI, EI)

[40]       Chang, C.C. and Wu, T.C., “A smart card oriented password authentication scheme based on Rabin’s public key cryptosystem,” International Journal of Information and Management Sciences, Vol. 8, No. 3, 1997, pp. 63-73.

[41]       Wu, T.C. and Cheng, J., “Retrieving similar pictures from iconic databases using G-tree,” Pattern Recognition Letters, Vol. 18, 1997, pp. 595-603. (SCI, EI)

[42]       He, W.H. and Wu, T.C., “Improvement of the Nyang-Song fast digital signature scheme,” Electronics Letters, Vol. 33, No. 22, 1997, pp. 1861-1862. (SCI, EI)

[43]       Wu, T.S. and Wu, T.C., “Improvement of the Chang-Wu broadcasting cryptosystem using geometric properties of lines,” Electronics Letters, Vol. 33, No. 23, 1997, pp. 1940-1941. (SCI, EI)

[44]       Chang, C.C., Wu, T.C. and Yeh, Y.S., “Broadcasting secrets in communication networks,” International Journal of Computer Systems Science and Engineering, Vol. 13, No. 2, 1998, pp. 121-124. (SCI, EI)

[45]       Chang, Y.S. and Wu, T.C., “Group-oriented authentication mechanism with key exchange,” Computer Communications, Vol. 21, No. 5, 1998, pp. 485-497. (SCI, EI)

[46]       Wu, T.C., Chang, Y.S. and Lin, T.Y., “Improvement of Saeednia’s self-certified key exchange protocols,” Electronics Letters, Vol. 34, No. 11, 1998, pp. 1094-1095. (SCI, EI)

[47]       Hsu, C.L. and Wu, T.C., “Authenticated encryption scheme with (t, n) shared verification,” IEE Proceedings Computers and Digital Techniques, Vol. 145, No. 2, 1998, pp. 117-120. (SCI, EI)

[48]       Lin, T.Y and Wu, T.C., “Undeniable (t, n)-threshold signature scheme with cheater identification,” Journal of the Chinese Institute of Engineers (中國工程學刊), Vol. 21, No. 6, 1998, pp. 775-780. (EI)

[49]       李肇嚴、盧而輝、吳宗成、邱榮輝、張克章、王金印、楊耀波:電子公文系統安全環境之設計與實現,科學發展月刊(國科會發行),第二十六卷,第七期,民國八十七年七月,頁 844-853.

[50]       He, W.H. and Wu, T.C., “Cryptanalysis of Lee and Chang’s ID-based information security functions,” Computer Communications, Vol. 22, No. 8, 1999, pp. 723-726. (SCI, EI)

[51]       He, W.H. and Wu, T.C., “Cryptanalysis and improvement of Petersen-Michels signcryption scheme,” IEE Proceedings Computers and Digital Techniques, Vol. 146, No. 4, 1999, pp. 123-124. (SCI, EI)

[52]       Wu, T.C. and Chang, Y.S., “Authorization-based group-oriented secure broadcasting system,” Journal of Information Science and Engineering, Vol. 15, No. 5, 1999, pp. 653-667. (SCI, EI)

[53]       Lin, T.Y. and Wu, T.C., “(t, n)-threshold verifiable multisecret sharing scheme based on the factorisation and the discrete logarithm modulo a composite problems,” IEE Proceedings Computers and Digital Techniques, Vol. 146, No. 5, 1999, pp. 264-268. (SCI, EI).

[54]       Chang, Y.S., Wu, T.C. and Hwang, S.J., “ElGamal-like signature and multisignature schemes using self-certified public keys,” The Journal of Systems and Software, Vol. 50, No. 2, 2000, pp. 99-105. (SCI, EI)

[55]       He, W.H. and Wu, T.C., “Security of the Jan-Tseng integrated schemes of user authentication and access control,” IEE Proceedings Computers and Digital Techniques, Vol. 147, No. 5, 2000, pp. 365-368. (SCI, EI)

[56]       Wu, T.C., Huang, S.C. and Guan, D.J., “Delegated multisignature scheme with document decomposition,” The Journal of Systems and Software, Vol. 55, 2001, pp. 321-328. (SCI, EI)

[57]       Wu, T.C. and Chang, C.C., “Cryptographic key assignment scheme for hierarchical access control,” International Journal of Computer Systems Science and Engineering, Vol. 16, No. 1, 2001, pp. 25-28. (SCI, EI)

[58]       吳宗成、林祚儀、林之寅:具欺騙者識別之一般化多重秘密分享機制電腦學刊(中華民國電腦學會發行),第十二卷,第一期,民國八十九年,頁22-27.

[59]       Hsu, C.L., Wu, T.S. and Wu, T.C., “New nonrepudiable threshold proxy signature scheme with known signers,” The Journal of Systems and Software, Vol. 58, 2001, pp. 119-124. (SCI, EI)

[60]       Wu, T.C., “Digital signature/multisignature schemes giving public key verification and message recovery simultaneously,” International Journal of Computer Systems Science and Engineering, Vol. 16, No. 6, 2001, pp. 329-337. (SCI, EI)

[61]       Chien, H.Y., Wu, T.C., Jan, J.K., and Tseng, Y.M., “Cryptanalysis of Chang-Wu’s group-oriented authentication and key exchange protocols,” Information Processing Letters, Vol. 80, pp. 113-117, 2001. (SCI, EI)

[62]       Hsu, C.L., Wu, T.S., and Wu, T.C., “Improvements of generation of threshold signature and authenticated encryption for group communications,” Information Processing Letters, Vol. 81, pp. 41-45, 2002. (SCI, EI)

[63]       Wu, T.C., Lin, T.Y. and Chang, C.C., “Modifications of ElGamal’s cryptoscheme with/without one-way hash function,” Journal of the Chinese Institute of Engineers (中國電機工程學刊), Vol. 9, No. 1, 2002, pp. 57-61. (EI)

[64]       He, W.H., Wu, T.C., and Lin, C.Y., “Remarks on using RSA with low exponent in a public network,” Journal of Information Science and Engineering, Vol. 18, No. 2, 2002, pp.341-344. (SCI, EI)

[65]       Wu, T.C. and Hsu, C.L., “Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems,” IEEE Trans. Vehicular Technology, Vol. 52, No. 2, 2003, pp. 462-465. (SCI, EI)

[66]       Hsu, C.L., Wu, T.S., and Wu, T.C., “Improvement of threshold proxy signature scheme,” Applied Mathematics and Computation, Vol. 136, No. 2-3, 2003, pp 315-321. (SCI, EI)

[67]       Hsu, C.L., Wu, T.S., and Wu, T.C., and Mitchell, C., “Improvement of modified authenticated key agreement protocol,” Applied Mathematics and Computation, Vol. 142, No. 2-3, 2003, pp 305-308. (SCI, EI)

[68]       Hsu, C.L., Wu, T.S., and Wu, T.C., “Group-oriented signature scheme with distinguished signing authorities,” Future Generation Computer Systems, Vol. 20, 2004, pp. 865-873. (SCI, EI)

[69]       Harn, L., Lin, C.Y., and Wu, T.C., “Structured multisignature algorithms,” IEE Proceedings Computers and Digital Techniques, Vol. 151, No. 3, 2004, pp. 231-234. (SCI, EI)

[70]       Lin, C.Y., Wu, T.C., Zhang, F., and Hwang, J.J., “New identity-based society oriented signature schemes from pairings on elliptic curves,” Applied Mathematics and Computation, Vol. 160, 2005, pp. 245-260. (SCI, EI)

[71]       Wu, T.S., Hsu, C.L., Tsai, K.Y., Lin, H.Y., and Wu, T.C., “Convertible multi-authenticated encryption scheme,” Information Sciences, Vol. 178, 2008, pp. 256-263. (SCI, EI)

[72]       Wu, T.C., Huang, T.T., Hsu, C.L., and Tsai, K.Y., “Recursive protocol for group-oriented authentication with key distribution,” The Journal of Systems and Software, Vol. 81, No. 7, 2008, pp. 1227-1239. (SCI, EI)

[73]       Chien, H.Y. and Wu, T.C., “Improving varying-pseudonym-based RFID authentication protocols to resist denial-of-service attacks,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 18, No. 6B, 2008, pp. 259-269.

[74]       Lin, T.Y., Wu, T.C., Lee, C.I., and Wu, T.S., “A (t, n)-fair dynamic threshold secret sharing scheme,” International Journal of Innovative Computing, Information and Control, Vol.5, No.5, 2009, pp. 1395-1406. (SCI, EI)

[75]       Chien, H.Y. and Wu, T.C., “Provably secure password-based three-party key exchange with optical message steps,” The Computer Journal, Vol. 52, No. 6, 2009, pp. 646-655. (SCI, EI)

[76]       Tsai, H.C., Lo, N.W., and Wu, T.C., “A threshold-adaptive reputation system on mobile ad hoc networks,” IEICE Transactions on Information and Systems, Vol. E92.D, No.5, 2009, pp.777-786. (SCI, EI)

[77]       Lu, C.F., Wu, T.C., and Hsu, C.L., “Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks” WSEAS Transactions on Communications, Vol. 8, No. 11, 2009, pp. 1145-1159. (EI)

[78]       Tsai, K.Y., Hsu, C.L., and Wu, T.C., “Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks,” International Journal of Security and Networks, Vol. 5, No.1, 2010, pp. 45 - 52. (EI)

[79]       Lin, Y.L., Wu, T.C., and Hsu, C.L., “Secure and efficient time-bound key assignment scheme for access control in hierarchical structure,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 2, 2010, pp. 439-447. (SCI, EI)

[80]       Huang, J.C., Hu, C., and Wu, T.C., “Psychometric properties of the Chinese version of the workaholism battery,” Journal of Psychology: Interdisciplinary and Applied, Vol. 144, No. 2, 2010, pp. 163-183. (SSCI)

[81]       Tsai, J.L., Wu, T.C., and Tsai, K.Y., “A novel multisignature scheme for special verifier group against clerk attack,” Journal of Zhejiang University-SCIENCE C: Computers & Electronics, Vol. 11, No. 4, 2010, pp. 290-295. (SCI, EI)

[82]       Tsai, J.L., Wu, T.C., and Tsai, K.Y., “New dynamic ID authentication scheme using smart cards,” International Journal of Communication Systems, Vol. 23, pp. 1449-1462, 2010. (SCI)

[83]       Tsai, J.L., Wu, T.C., and Tsai, K.Y., “Self-certified multi-authenticated encryption scheme,Journal of Internet Technology, Vol. 11, No. 7, pp. 917-922, 2010. (SCI)

[84]       Lee, C.I., Wu, T.C., Yang, B.Y., and Tzeng, W.G., “New secure broadcasting scheme realizing information granularity,” Journal of Information Science and Engineering, Vol. 26 No. 4, 2010, pp. 1509-1523. (SCI, EI)

[85]       Chang, L.P., Wu, T.C., Hsu, C.L., and Lu, C.F., “Two level authenticated group key agreement protocol with privacy-preservation for resource-limited mobile devices,Journal of Internet Technology, Vol. 11, No. 4, 2010, pp. 519-528. (EI)

[86]       Chien, H.Y. and Wu, T.C., “Efficient and scalable key agreement schemes for mobile RFID readers and servers,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 12, pp. 5463-5471, 2010. (SCI, EI)

[87]       Chien, H.Y., Lee, C.F., Liu, S.B., and Wu, T.C., “Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls,” International Journal of Internet Protocol Technology, Vol. 5, No.3,  pp. 166 - 173, 2010. (EI)

[88]       Hsu, C.L., Chang, L.P, and Wu, T.C., “A supervising authenticated encryption scheme for multilevel security,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 1, pp. 1087-1095, 2011. (SCI, EI)

[89]       Tsai, K.Y., Wu, T.C., and Hsu, C.L., “New secret key traitor tracing scheme with dispute settlement from bilinear maps,” International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 7, No. 3, pp. 1499-1510, 2011. (SCI, EI)

[90]       Chien, H.Y., Yang, C.C., Wu, T.C., and Lee, C.F., “Two RFID-based solutions to enhance inpatient medication safety,” accepted by Journal of Medical Systems, 2010. (SCI)

[91]       Chung, Y.H., Huo, H., Xu, Y., Zhang, H., and Wu, T.C., “Wireless sensor networks based healthcare system: a survey on the view of communication paradigms,” accepted by International Journal of Ad Hoc and Ubiquitous Computing, 2010. (SCI)

 
 

 

B. 會議及研討會論文

[1]           Wu, T.C. and Chang, C.C., “An authentication scheme in computer networks based upon Euclidean geometry,” Proceedings 1988 International Computer Symposium, Taipei, R.O.C., December 1988, pp. 1498-1502.

[2]           Chang, C.C. and Wu, T.C., “A password authentication scheme without verification tables,” Proceedings Eighth IASTED International Symposium APPLIED INFORMA-TICS, February 1990, Innsbruck, Austria, pp. 202-204.

[3]           Chang, C.C. and Wu, T.C., “The study of an irregular mesh generator,” Proceedings Eighth IASTED International Symposium APPLIED INFORMATICS, February 1990, Innsbruck, Austria, pp. 228-233.

[4]           Chang, C.C. and Wu, T.C., “A binary implementation of single-key-lock scheme for dynamic access control,” Proceedings 1990 International Computer Symposium, Hsinchu, Taiwan, R.O.C., December 1990, pp. 321-327.

[5]           Yeh, Y.S., Wu, T.C., Chang, C.C. , and Yang, W.C., “A new cryptosystem using matrix transformation,” Proceedings 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, Taipei, R.O.C., October, 1991, pp. 131-138.

[6]           Yeh, Y.S., Wu, T.C., Chang, C.C., and Chang, D., “A private key cryptosystem based upon enforced random substitution scheme,” Proceedings 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, Taipei, R.O.C., October, 1991, pp. 319-324.

[7]           Yeh, Y.S. , Wu, T.C., and Chen, W.K., “A modified Playfair cipher,” 第二屆全國資訊安全會議論文集,台南,成功大學,八十一年五月,pp. 1-20.

[8]           Yeh, Y.S. and Wu, T.C., “An enforced Playfair cipher,” 第二屆全國資訊安全會議論文集,台南,成功大學,八十一年五月,pp. 169-178.

[9]           Chang, C.C., Wu, T.C. and Yeh, Y.S., “On the design of a secure broadcasting cryptosystem,” Proceedings 1992 International Conference on Microwaves and Communications, Nanjing, China, July 1992, pp. 216-221.

[10]       Chang, C.C., Hwang, R.J., and Wu, T.C., “A cryptographic key management scheme for access control in a tree structure,” Proceedings 1992 Inter-national Computer Symposium, Taichung, Taiwan, R.O.C., Dec-ember 1992, pp. 174-178.

[11]       Chang, C.C., Wu, T.C., and Chen, C.P., “The design of a conference key distribution system,” Advances in Cryptology - AUSCRYPT’ 92, Lecture Notes in Computer Sciences 718, J. Seberry and Y. Zheng (Eds.), Springer-Verlag, Berlin, 1993, pp. 459-466.

[12]       Wu, T.C., Chang, C.C., and Yeh, Y.S., “A scheme for holding secure electronic conferences in computer networks,” 第三屆全國資訊安全會議論文集,嘉義,中正大學,八十二年五月,pp. A.1 -4.1-A.1-4.9.

[13]       Wu, T.C., “Cryptographic implementation of the access control problem in user hierarchy,” 第三屆全國資訊安全會議論文集,嘉義,中正大學,八十二年五月,pp. A.2-1.1-A.2-1.15.

[14]       Chang, C.C. and Wu, T.C., “Authenticating pass-words with smart cards,” Proceedings InfoScience ‘93, Seoul, Korea, October 1993, pp. 559-564.

[15]       Chang, C.C. and Wu, T.C., “Interactive remote login authentication scheme with smart cards,” 第四屆全國資訊安全會議論文集,台北,國防管理學院,八十三年五月,pp. 151-156.

[16]       Wu, T.C. and He, W.H., “Noninteractive remote login authentication based on factoring and discrete logarithms,” 第四屆全國資訊安全會議論文集,台北,國防管理學院,八十三年五月,pp. 157-172.

[17]       樊國楨、莊文獻、吳宗成:電子公文交換作業芻議,第五屆全國資訊安全會議論文集,台北,台灣科技大學,八十四年五月, pp. 1-5.

[18]       Wu, T.C. and Su, C.Y. : “On the design of authorization-based group-oriented conference key distribution systems,” 第五屆全國資訊安全會議論文集,台北,台灣科技大學,八十四年五月, pp. 61-67.

[19]       Chang, C.C. and Wu, T.C., “A group-oriented secret sharing protocol in computer networks,” 第五屆全國資訊安全會議論文集,台北,台灣科技大學,八十四年五月,pp. 144-146.

[20]       吳宗成、張裕幸:門檻授權策略之群體導向安全廣播技術,第四屆國防管理學術暨實務研討會論文集,臺北,八十五年三月, pp. 647-656.

[21]       吳宗成、許貴富:植基於 Lucas 函數的通行碼確認技術,第四屆國防管理學術暨實務研討會論文集,臺北,八十五年三月, pp. 686-696.

[22]       張裕幸、李國光、吳宗成:策略資訊系統規劃本質之探討,第四屆國防管理學術暨實務研討會論文集,臺北,八十五年三月, pp. 739-756.

[23]       程捷生、吳宗成:以 G-tree 資料結構解決自圖形資料庫中抓取相似圖形之研究策略資訊系統規劃本質之探討,第四屆國防管理學術暨實務研討會論文集,臺北,八十五年三月,pp. 819-830.

[24]       Wu, T.C. and Chang, Y.S., “Authorization-based group-oriented secure broadcasting system,” 第六屆全國資訊安全會議論文集,台中,中興大學,八十五年五月,pp. 70-77.

[25]       Wu, T.C., Wu, T.S. and Liao, H.F., “Cryptographic implementation of access control for authorization-based group hierarchy,” 第六屆全國資訊安全會議論文集,台中,中興大學,八十五年五月,pp. 99-106.

[26]       Wu, T.C. and Sheu, G.F., “Smart card model password authentication scheme based on Lucas functions,” 1996 International Computer Symposium (ICS’96) Proceedings Workshop on Cryptology and Information Security, Kaohsiung, Taiwan, December 1996, pp. 145-150.

[27]       Wu, T.S. and, Wu, T.C., “Supervising secure communications for level-based hierarchy,” 1996 International Computer Symposium (ICS’96) Proceedings Workshop on Cryptology and Information Security, Kaohsiung, Taiwan, December 1996, pp. 125-130.

[28]       Wu, T.C. and Huang, S.C., “Discretionary digital multisignature scheme,” 第七屆全國資訊安全會議論文集,台北,交通大學,八十六年五月,pp. 124-129.

[29]       He, W.H., Wu, T.C. and Wu, T.S., “Efficient authenticated encryption scheme with message linkage,” 第七屆全國資訊安全會議論文集,台北,交通大學,八十六年五月,pp. 134-138.

[30]       Chang, Y.S. and Wu, T.C., “Group-oriented authentication mechanism with key exchange,” 第七屆全國資訊安全會議論文集,台北,交通大學,八十六年五月,pp. 173-183.

[31]       Wu, T.S. and Wu, T.C., “Improvement of the Chang-Wu broadcasting cryptosystem using interpolating polynomials,” 1997 Proceedings National Computer Symposium (NCS’97), Taichung, Taiwan, December 1997, pp. C-136-C-139.

[32]       Huang, Y.F., Wu, T.C., and Wu, T.S., “Yet another fair reconstruction method for secret sharing schemes,” 1997 Proceedings National Computer Symposium (NCS’97), Taichung, Taiwan, December 1997, pp. C-165-C-169.

[33]       Wu, T.C., Hsu, C.L. and Wu, T.S.: “Authentication-based group-oriented conference key distribution system,” 1997分散式系統技術及應用研討會,台南,成功大學,八十六年五月,pp. 666-672.

[34]       Wu, T.S. and Wu, T.C., “On the design of ID-based digital signature scheme based on Rabin’s public key cryptosystem,” 第八屆全國資訊安全會議論文集,高雄,中山大學,八十七年五月,pp. 205-214.

[35]       吳宗成、何煒華、吳宗杉、許建隆:適用於網際網路EDI之密碼學探討,1998網際網路應用論壇 -- 產業標準之競爭、整合與應用,新竹,交通大學,八十七年七月,pp. 15-30.

[36]       張裕幸、吳宗成,邱榮輝:使用自我憑證公開金鑰之具訊息回復的數位多重簽章方法,1998年國際資訊管理研究暨實務研討會,台北,輔仁大學,八十七年八月,pp. 77-85.

[37]       Chang, Y.S., Wu, T.C. and Chiu, J.H., “Digital multisignature scheme giving message recovery using RSA-based self-certified public keys,” 1998 International Computer Symposium (ICS’98) Proceedings Workshop on Cryptology and Information Security, Tainan, Taiwan, R.O.C., December 17-19, 1998, pp. 36-40.

[38]       Hsu, C.L., Wu, T.C. and He, W.H., “Attacks on the signature scheme based on discrete logarithm without using one-way hash function,” 第九屆全國資訊安全會議論文集,台中,朝陽科技大學,八十八年五月,pp. 173-175.

[39]       Wu, T.S., Wu, T.C. and He, W.H., “Authenticated encryption schemes with double message linkage,” 第九屆全國資訊安全會議論文集,台中,朝陽科技大學,八十八年五月,pp. 303-308.

[40]       Wu, T.C. and He, W.H., “Authenticating passwords with multiple cryptographic assumptions,” 第九屆全國資訊安全會議論文集,台中,朝陽科技大學,八十八年五月,pp. 324-331.

[41]       Wu, T.S. and Wu, T.C., “Cryptographic implementation of supervising secure communications for rooted poset user hierarchy,” 第十屆國際資訊管理學術研討會,桃園,中央警察大學,八十八年六月,pp. 627-633.

[42]       黃孝慈、盧希鵬、吳宗成:從「使用者角度」來看電子商務付費方式之比較,第十屆國際資訊管理學術研討會,桃園,中央警察大學,八十八年六月,pp. 1056-1062.

[43]       Chien, H.Y., Wu, T.C., Jan, J.K., and Tseng, Y.M, “Improvements of Chang-Wu group-oriented authentication and key exchange protocols,” Proceedings 1999 National Computer Symposium, Volume 3, Taipei, Taiwan, Tamkang University, December 20-21, 1999, pp. c210-c214.

[44]       Wu, T.C. and He, W.H., “Improvement of Yen-Laih dynamic access control scheme with user authentication,” Proceedings 1999 National Computer Symposium, Volume 3, Taipei, Taiwan, Tamkang University, December 20-21, 1999, pp. c248-c249.

[45]       Hsu, C.L., Wu, T.S., and Wu, T.C., “Comments on efficient group signature scheme based on discrete logarithm,” 第十屆全國資訊安全會議論文集,花蓮,東華大學,八十九年五月,pp. 1-3.

[46]       Hsu, C.L. and Wu, T.C., “Group-oriented signature by discretionary signatories with document division,” 第十屆全國資訊安全會議論文集,花蓮,東華大學,八十九年五月,pp. 13-21.

[47]       Wu, T.C., Liao, H.J., and He, W.H., “Verifiable multisecret sharing scheme for hierarchical organizations,” 第十屆全國資訊安全會議論文集,花蓮,東華大學,八十九年五月,pp. 298-304.

[48]       Wu, T.C., Lin, C.Y., Lin, T.Y, and Hwang, J.J., “A generalized secret sharing scheme realizing ordered access structure,” 2000 International Computer Symposium (ICS’00) Proceedings Workshop on Cryptology and Information Security, Chiayi, Taiwan, National Chung Cheng University, December 6-8, 2000, pp. 81-83.

[49]       Hsu, C.L., Wu, T.S. and Wu, T.C., “Improvement of ElGamal-like digital signature and multisignature schemes using self-certified public keys,” 第十一屆全國資訊安全會議論文集,台南,成功大學,九十年五月,pp. 61-65.

[50]       吳宗成、李雅文、蔡國裕、盧登臨:適用於GSM系統之可鑑別金鑰交換協定第十一屆全國資訊安全會議論文集,台南,成功大學,九十年五月,pp. 215-220.

[51]       Wu, T.C., Hsu, C.L., and Lin, C.Y., “On the security of Burmester et al.’s structured ElGamal-type multisignature scheme,” 第十一屆全國資訊安全會議論文集,台南,成功大學,九十年五月,pp. 349-352.

[52]       Lin, C.Y., Wu, T.C., and Hwang, J.J., “Generalized multisecret sharing scheme realizing ordered access structures,” Proceedings the Seventh International Conference on Distributed Multimedia Systems, Taipei, Taiwan, September 26-28, 2001, pp. 162-166.

[53]       Lin, C.Y., Wu, T.C., and Hwang, J.J., “ID-based structured multisignature schemes,” Advances in Network and Distributed Systems Security, Proceedings IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 26-27, 2001, pp. 45-59.

[54]       吳宗成、林育梨、許建隆:適用於變動式組織之存取控制的密碼金鑰指定方法第十二屆全國資訊安全會議論文集,台中,台中健康暨管理學院,九十一年五月,pp.49-58.

[55]       林祚儀、吳宗成適用於大群體之有效率可轉變式群體簽章方法第十二屆全國資訊安全會議論文集,台中,台中健康暨管理學院,九十一年五月,pp. 293-298.

[56]       吳宗成、陳奎聿、林祚儀:適用於網際網路環境之英式拍賣機制第十二屆全國資訊安全會議論文集,台中,台中健康暨管理學院,九十一年五月,pp. 331-338.

[57]       Lin, C.Y., Wu, T.C., and Hwang, J.J., “Multi-proxy signature schemes for partial delegation with cheater identification,” Proceedings the Second International Workshop for Asian Public Key Infrastructures (IWAP 2002), Taipei, Taiwan, October 30 – November 1, 2002, pp. 147-152.

[58]       吳宗成、許建隆、蔡國裕:適用於群體導向應用之匿名代理鑑別加密法第十三屆全國資訊安全會議論文集,台北,長庚大學,九十二年八月,pp. 74-82.

[59]       Lin, C.Y., Wu, T.C., and Zhang, F., “Proxy signature and proxy multi-signature from bilinear pairings,” Proceedings 2003 International Conference on Informatics, Cybernetics, and Systems (ICICS 2003), Kaoshiong, Taiwan, December 14-16, 2003.

[60]       Wu, T.C. and Lin, Y.C., “Password-only authenticated key agreement protocols based on self-certified approach,” Proceedings International Workshop on Advanced Developments in Software and System Security (WADIS 2003), Taipei, Taiwan, December 5-7, 2003.

[61]       吳宗成、黃士原:無需揭露未得標價之第(M+1)高價秘密競標協定2003全國計算機會議論文集(NCS 2003),台中,逢甲大學,九十二年十二月。

[62]       Lin, C.Y. and Wu, T.C., “An identity-based ring signature scheme from bilinear pairings,” Proceedings The 18th International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Japan, March 29-31, 2004.

[63]       吳宗成、陳昭君、林燕卿:適用於多金融聯盟共同發行之電子現金第十四屆全國資訊安全會議論文集,台北,台灣科技大學,九十三年六月,pp. 128-135

[64]       吳宗成、劉昆豪、林燕卿:適用於計次付費服務之匿名式廣播加密機制第十四屆全國資訊安全會議論文集,台北,台灣科技大學,九十三年六月,pp. 144-151

[65]       吳宗成、許建隆、蔡國裕:適用於電子化企業環境之代理驗證鑑別加密法第十四屆全國資訊安全會議論文集,台北,台灣科技大學,九十三年六月,pp. 201-210

[66]       吳宗成、曾蕙如、黃士原:具時限性之安全廣播機制第十四屆全國資訊安全會議論文集,台北,台灣科技大學,九十三年六月,pp. 211-218

[67]       吳宗成、李敏勤、蔡國裕:動態洩密者追蹤之金鑰管理機制第十四屆全國資訊安全會議論文集,台北,台灣科技大學,九十三年六月,pp. 219-227

[68]       Wu, T.C., Chang, L.P., and Hsu, C.L., “A Supervising authenticated encryption scheme for group oriented applications,” 第十五屆全國資訊安全會議集文集,高雄,中山大學,九十四年.

[69]       吳宗成、蔡國裕、李昭德:具條件接取與時限之廣播加密法第十六屆全國資訊安全會議集文集,台中,逢甲大學,九十五年六月,pp. 190-197

[70]       吳宗成、蔡國裕、尤弘任、許駿鵬:具長期安全之電子文件系統第十七屆全國資訊安全會議,嘉義,嘉義大學,九十六年,pp. 702-713

[71]       Lin, Y.L., Wu, T.C., Hsu, C.L., and Chou, Y.C., “Standard operating procedure and privilege management in Taiwan digital forensics,” Proceedings 2007 International Conference on Future Generation Communication and Networking (FGCN 2007), Jeju-Island, Korea, December 6-8, 2007.

[72]       吳宗成、陳華嶽、呂崇富、林燕卿、陳惠婷:適用於第三代行通訊系統之金鑰協議機制第十八屆全國資訊安全會議,花蓮,東華大學,九十七年,pp. 509-523

[73]       吳宗成、王威智、林燕卿、呂崇富、曾秩暉:基於橢圓曲線之自我驗證公開金鑰系統的匿名行動付費協定第十八屆全國資訊安全會議,花蓮,東華大學,九十七年,pp. 574-588

[74]       Lin, H.Y., Huang, T.Y., Wu, T.S., and Wu T.C., “Analysis of location-based compromise-tolerant security mechanisms for wireless sensor networks,” Proceedings the 3rd Joint Workshop on Information Security (JWIS’08), Seoul, Korea, 2008, p.p. 427-435.

[75]       Chang, L.P., Wu, T.C., and Hsu, C.L., “Efficient date-attachment scheme for secure electronic cash payment system,” Proceedings the 3rd Joint Workshop on Information Security (JWIS’08), Seoul, Korea, 2008, p.p. 508-515.

[76]       Chang, L.P. and Wu, T.C., “New authenticated encryption scheme for multilevel security,” Proceedings the 3rd Joint Workshop on Information Security (JWIS’08), Seoul, Korea, 2008, p.p.587-595.

[77]       Chien, H.Y. and Wu, T.C., “Highly efficient password-based three-party key exchange in random oracle model,” Proceedings Intelligence and Security Informatics (IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008), Taipei, Taiwan, 2008, p.p. 69-76.

[78]       Chen, C.H., Chen, C.W., Kuo, C., Lai, Y.H., McCune, J.M., Studer, A., Perrig, A, Yang, B.Y., and Wu, T.C., “GAnGS: gather, authenticate 'n group securely,” Proceedings the 14th Annual International Conference on Mobile Computing and Networking (MOBICOM’08), San Francisco, California, USA, 2008, p.p. 92-103.

[79]       吳宗成、林喬雯、林燕卿:以樹狀結構實現資訊粗細度之廣播加密法 第十九屆全國資訊安全會議,台北,台灣科技大學,九十八年,pp. 186-191

[80]       吳宗成、陳孝勇、林燕卿:適用於無線感測網路之動態式事前金鑰分配機制 第十九屆全國資訊安全會議,台北,台灣科技大學,九十八年,pp. 232-237

[81]       Chien, H.Y., Tu, C.S., and Wu, T.C., “RFID-Based, anonymous authentication scheme,” The 2009 International Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (UIC-ATC ’09), Brisbane, Australia, July 2009, pp. 22-27.

[82]       Wu, T.C. and Chien, H.Y., Comments on gateway-oriented password-based authenticated key exchange protocol,” The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP’09), Kyoto, Japan, September 2009.

[83]       Lin, Y.L., Hsu, C.L., Wu, T.C., Yen, S.L., and Tseng, C.L., “Secure key management scheme for hierarchical access control based on ECC,” The 43rd Annual IEEE International Carnahan Conference on Security Technology (ICCST’09), Zürich, Switzerland.

[84]       Tsai, J.L. and Wu, T.C., “A new multisignature scheme with message recovery using self-certified public keys without trustworthy system authority,” 2009台灣網際網路研討會,彰化,台灣。(最佳論文獎)

[85]       Hsu, C.L., Wu, T.C., and Tsai, K.Y., “Certificateless authenticated key distribution and conference key distribution schemes,” Proceedings 2010 e-CASE & e-Tech International Conference, Grand Lisboa, Macau, 2010, pp. 2532-2548. (Distinguished Paper Award)

[86]       Tsai, K.Y., Wu, T.C., Hsu, C.L., and Martin, K., Provably secure concurrent multisignature with document decomposition, Proceedings Cryptology and Information Security Conference 2010, May 27-28, 2010, NCTU, Hsinchu, Taiwan. (Best Paper Award)

[87]       Lu, C.F., Wu, T.C., and Shih, T.F., “Authenticated group key agreement protocol for unbalanced wireless mobile networks,” Proceedings 2010 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), Krakow, Poland, 15-18 February 2010, pp. 827-832.

[88]       Chien, H.Y., Yen, J.Z., and Wu, T.C., “An unconditionally secure lightweight RFID authentication protocol with untraceability,” Proceedings the 5th Joint Workshop on Information Security (JWIS’10), Guangzhou, China, 2010. (Best Paper Award)

[89]       Yeh, K.H., Lo, N.W., and Wu, T.C., “Formal analysis on RFID authentication availability,” Proceedings the 5th Joint Workshop on Information Security (JWIS’10), Guangzhou, China, 2010.

 

 

C. 專書及專書論文

[1]           Wu, T.C., The Studies of Computer Authentication and Secure Broadcasting Based upon Euclidean Geometry, Master Thesis, Institute of Applied Mathematics, National Chung Hsin University, 1989.

[2]           Wu, T.C., The Study of Cryptoschemes and Control Mechanisms in Information Protection Systems, Ph.D. Dissertation, Institute of Computer Science and Information Engineering, National Chiao Tung University, 1992. (1992年財團法人全錄文教基金會資訊科技類學術論文獎) (81學年度第二期國科會甲種獎助代表作)

[3]           吳宗成:系統分析與設計,三民書局(大專用書),臺北,民國八十四年。

[4]           吳宗成主編:資通安全專輯之三資通安全技術資源簡介,行政院國家科學委員會科學技術資料中心,民國九十一年。

[5]           吳宗成主編:資通安全專輯之九電子商務安全,行政院國家科學委員會科學技術資料中心,民國九十二年。

[6]           吳宗成主編:資通安全專輯之二十資安法規與政策管理(Regulation and Policy for Information Security),行政院國家科學委員會科學技術資料中心,民國九十四年。

[7]           Wu, T.C. and Lin, Y.C., “Self-certified Approach for Authentication Key Agreement,” Computer Security in the 21st Century, pp.61-66, Springer Science+Business Media, Inc., New York, NY, 2005.

[8]           Wu, T.C., Lei, C.L., Rijmen, V., and Lee, D.T. (EDs), Information Security, 11th International Conference, ISC 2008, Taipei, Sept. 2008 Proceedings, LNCS 5222, Springer, 2008.

[9]           吳宗成、黃丙喜、覃冠豪、欒斌、周子銓、張順教、陳櫻琴、方立維、簡剛民、翁樸棟、黃鵬、馮輝:山寨風暴,理財家,臺北,民國九十八年。

 
 


D. 專利

[1]           樊國楨、莊文獻、楊晉寧、吳宗成、葉志煌:電子文件之防偽用校對字組的輸出方法,中華民國專利(八十八年十一月),發明第108925號。

[2]           魏石麟、楊松諺、吳宗成、蔡國裕、許建隆:集中式自我驗證標記方法,中華民國專利(九十五年五月),發明第I255627號。

[3]           吳宗成、曾仁煌、黃裕峰、蕭節中、何煒華:電子刊物安全訂閱系統,中華民國專利(九十五年十二月),發明第I269571號。

[4]           許建隆、吳宗成、林燕卿:安全視訊會議系統及方法,中華民國專利申請中(申請案號:097136477),公開編號:200901721

 
 

E. 獎項

[1]           林祚儀、吳宗成:開放式資訊安全系統 (SECURITY)(82學年度教育部校園軟體創作比賽資訊管理類優等),民國82年。

[2]           蔡國裕、吳宗成、許建隆、楊松諺:自我驗證標記系統。(90學年度教育部校園軟體創作比賽電腦系統佳),民國90年。

[3]           顏志達、潘明杰、曾信田、吳宗成:光芒畢露獎。(98年度第四屆全國大專院校資安技能金盾獎競賽),民國98年。

[4]           翁浩正、蔡政達、王志清、吳宗成:第二名。(第五屆全國大專校院資安技能金盾獎競賽),民國99年。

[5]           Tsai, K.Y., Wu, T.C, Hsu, C.L., and Martin, K., Provably Secure Concurrent Multisignature with Document Decomposition, Proceedings Cryptology and Information Security Conference 2010, May 27-28, NCTU, Hsinchu, Taiwan, 2010. (Best Paper Award)

[6]           Hsu, C.L., Wu, T.C., and Tsai, K.Y., Certificateless authenticated key distribution and conference key distribution schemes, Proceedings 2010 e-CASE & e-Tech International Conference, Grand Lisboa, Macau, 2010, pp. 2532-2548. (Distinguished Paper Award)

[7]           Chien, H.Y., Yen, J.Z., and Wu, T.C., “An unconditionally secure lightweight rfid authentication protocol with untraceability,” Proceedings the 5th Joint Workshop on Information Security (JWIS’10), Guangzhou, P.R.China, 2010. (Best Paper Award)

 
 

 

F. 學術活動-期刊

[1]           Guest Associate Editors (2008, 2009, 2010), IEICE (Institute of Electronics, Information and Communication Engineers) Transactions on Information and Systems, Special Section on Information and Communication System Security. (SCI journal)

[2]           Editor (2008, 2009, 2010), Journal of Information Science and Engineering. (SCI journal)

[3]           Reviewer for the following international journals: IEEE Internet Computing, Journal of Information Science and Engineering, Computer Communications, Information Sciences, Journal of Communication and Networks, Journal of Systems and Software, The Computer Journal, International Journal on Computers and Electrical Engineering, International Journal on Computers and Electrical Engineering, International Journal of Communication Systems, Algorithmica.

 
 

 

G. 學術活動-會議

[1]           Program Committee Member, 2002 International Workshop on Cryptology and Network Security (CANS02), USA, 2002.

[2]           Program Committee Member, 2003 International Workshop on Cryptology and Network Security (CANS03), USA, 2003.

[3]           Invited Speaker, International Workshop on Advanced Developments in Software and Systems Security, Taiwan, 2003.

[4]           Treasure Chair & Program Committee Member, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), Taiwan, 2005.

[5]           Session Chair, 2005 International Telecommunications and Networks Seminar, Taiwan, 2005.

[6]           Treasurer, ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS’06), Taiwan, 2006.

[7]           Invited Speaker, 2nd Joint Workshop on Information Security 2007 (JWIS 2007), Japan, 2007.

[8]           Program Committee Member, 3rd International Symposium on Smart Home (SH’08), P.R. China, 2008.

[9]           Program Committee Member, ProvSec 2008, P.R. China, 2008.

[10]       Invited Speaker, Taiwan-Japan Joint Workshop on Information Security, Taiwan, 2008.

[11]       Program Co-Chair & Volume Editor, 11th International Conference on Information Security, Taiwan, 2008.

[12]       Program Committee Member, International Workshop on Forensics for Future Generation Communication environments (F2GC-08), P.R. China, 2008.

[13]       General Co-Chair, 3rd Joint Workshop on Information Security (JWIS 2008), Korea, 2008.

[14]       Program Committee Chairs, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2008), Taiwan, 2008.

[15]       Program Committee Member, International Workshop on Forensics for Future Generation Communication environments (F2GC-09), Korea, 2009.

[16]       Program Committee Member, The Second International Symposium on Web Information Systems and Applications (WISA 2009), P.R. China, 2009.

[17]       Program Committee Member, 2009 International Symposium on Intelligent Information Systems and Applications (IISA 2009), P.R. China, 2009.

[18]       Advisory Committee Member, Taiwan Academic Network Conference 2009 (TANET 2009), Taiwan, 2009.

[19]       Program Committee Member, 2nd International Workshop on Computer Science and Engineering, China, 2009.

[20]       Program Committee Member, 2009 International Symposium on Information Processing, China, 2009.

[21]       Steering Committee Member, 2nd International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS 2009), Korea, 2009.

[22]       Steering Committee Member, 4th Joint Workshop on Information Security 2009 (JWIS 2009), Taiwan.

[23]       Program Committee Member, ProvSec 2009, China, 2009.

[24]       Committee Member, 3rd International Symposium Computer Science and Computational Technology (ISCSCT 2010), China, 2010.

[25]       Program Committee Member, 2nd International Symposium on Networking and Network Security, China, 2010.

[26]       Communication Systems Technical Committee Member, APSIPA Annual Summit and Conference 2010 (APSIPA ASC 2010), Singapore, 2010.

[27]       Program Committee Member, 2nd International Workshop on RFID/USN Security and Cryptography 2010 (RISC’10), UK, 2010.

[28]       General Chairs, 5th Joint Workshop on Information Security (JWIS’10), Guangzhou, China, 2010.

[29]       Program Committee Member, 6th International Symposium on Wireless sensor network Technologies and Applications for Smart Space (WTA 2010), Korea, 2010.

[30]       Program Committee Member, 3rd International Symposium on Electronic Commerce and Security (ISECS 2010), China, 2010.

[31]       Program Committee Member, 7th Web Information System and Applications Conference, China, 2010.

[32]       Program Committee Member, International Workshop on Forensics for Future Generation Communication environments (F2GC-10), Philippines, 2010.

[33]       Workshop Chairs, 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, UAE, 2011.

[34]       Program Committee Member, 7th Information Security Practice and Experience Conference (ISPEC 2011), China, 2011.

 
 

 

H. 近五年內執行計畫 (計畫名稱、擔任工作、起迄年月、委託機構)

[1]           具洩密者追蹤之廣播加密機制,主持人,2004/8/1~2005/7/31,行政院國家科學委員會。

[2]           電子文件長期安全機制之評估,主持人,2005/2/1~2005/10/31,國家檔案管理局。

[3]           資通安全國家標準之研訂與推廣,主持人,2005/2/1~2005/11/30,經濟部標準檢驗局。

[4]           資通安全國家標準之研訂與推廣,主持人,2006/3/1~2006/11/30,經濟部標準檢驗局。

[5]           資通安全人才培育計畫-教學及研究,主持人,2005/4/1~2006/8/31,行政院國家科學委員會。

[6]           虛實整合商務交易情境驗證計畫,主持人,2005/5/1~2005/12/15,財團法人資訊工業策進會。

[7]           資訊人才培育先導型計畫-資訊安全學程先期規劃,主持人,2005/7/1~2005/12/31,教育部。

[8]           資通訊人才培育先導型計畫-資通訊安全聯盟計畫辦公室,主持人,2006/1/1~2006/12/31,教育部。

[9]           資通訊人才培育先導型計畫-資通安全(ISC)聯盟中心,主持人,2007/1/1~2008/2/29,教育部。

[10]       電子文件長期安全探討,主持人,2005/8/1~2007/7/31,行政院國家科學委員會。

[11]       匿名式廣播加密之選項閱聽機制,主持人,2005/8/1~2006/7/31,行政院國家科學委員會。

[12]       資通安全人才培育計畫(II)-資通安全研究與教學中心(II),主持人,2006/4/1~2007/8/31,行政院國家科學委員會。

[13]       資通安全人才培育計畫(II)-資通安全人才培育計畫(II),共同主持人,2006/4/1~2007/8/31,行政院國家科學委員會。

[14]       資通安全人才培育計畫-子計畫一:資通安全人才培育計畫-國立台灣科技大學資通安全研究與教學中心,主持人,2007/4/1~2008/6/30,行政院國家科學委員會。

[15]       資安人才培育計畫-總計畫:資安人才培育計畫,共同主持人,2007/4/1~2008/6/30,行政院國家科學委員會。

[16]       資通安全人才培育計畫-子計畫一:資通安全人才培育計畫-國立台灣科技大學資通安全研究與教學中心,主持人,2008/5/1~2009/3/31 ,行政院國家科學委員會。

[17]       使用低資源行動裝置之遠端身分鑑別與金鑰交換機制,主持人,2006/8/1~2008/7/31,行政院國家科學委員會。

[18]       實現資訊粗細度之授權廣播加密機制,主持人,2007/8/1~2009/7/31,行政院國家科學委員會。

[19]       資安科技跨國研究總計畫暨「安全網絡(Secure Cyberspace)核心技術與關鍵系統」計畫,共同主持人,2008/8/1~2010/7/31,行政院國家科學委員會。

[20]       電子商務流量與銷量認證及稽核機制,主持人,2009/5~2009/12,經濟部商業司。

[21]       硬軟體安全檢測平台,主持人,2009/4/1~2009/12/31,行政院國家科學委員會。

[22]       軟硬體應用安全檢測平台建置計畫,主持人,2010/1/1~2010/12/31,行政院國家科學委員會。

[23]       適用於行動應用之鑑別與隱私保護機制,主持人,2009/8/1~2012/7/31,行政院國家科學委員會。

[24]       資通安全學程,主持人,2009/09/01-2010/01/31,教育部。

[25]       具隱私協商與風險管理之聯合服務架構-總計畫,主持人,2009/10/1~2010/8/10,行政院國家科學委員會。

[26]       資通安全學程,主持人,2010/02/01-2011/01/31,教育部。

[27]       電子書數位版權傳遞技術研究,協同主持人,2010/4/2~2010/12/31,財團法人資訊工業策進會。

[28]       適用於NFC應用環境之聯合安全服務平台-總計畫,主持人,2010/8/1~2011/7/31,行政院國家科學委員會。

[29]       應用定位即播技術之浮水印與系統安全性研發計畫,共同主持人,2010/04~2010/12,龍捲風科技股份有限公司。

[30]       適用於Android平台之社群整合與API開發,主持人,2010/10/08~2011/03/07,正崴精密工業股份有限公司。

[31]       軟硬體應用安全檢測平台建置計畫(III),主持人,2011/01/01~2011/12/31,行政院國家科學委員會。