1 |
陳俊穎、陳立人、劉珈珈、黃宜豊*.使用位移動態盒改良AES之安全與效能.第二十八屆全國資訊安全會議(CISC 2018) Cryptology and Information Security Conference 2018,國立臺灣科技大學. |
2 |
Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu*, Xing-You Pan, and Li-Ren Chen.Generating Dynamic Box by using an Input String.The 2017 International Symposium on Mobile Internet Security,International Convention Center Jeju, Jeju Island, Republic of Korea. |
3 |
Jung-Chun Liu, Yi-Li Huang, and Fang-Yie Leu.Enhancing Security of LTE using a Double Masking Technique.Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications (BWCCA–2016),Soonchunhyang (SCH) University, Asan, Korea. |
4 |
Yi-Li Huang, Fang-Yie Leu, Ilsun You, Rong-Yi Su, Po-Hao Su, Hsing-Chung Chen.A 3D Encryption with Shifting Mapping Substitution Mechanism.The 5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2017),Las Vegas, USA. |
5 |
Yi-Li Huang, Fang-Yie Leu, Ilsun You, Hsing-Chung Chen, Chishyan Liaw and Jung-Chun Liu.Random Cladding with Feedback Mechanism for Encrypting Mobile Messages.2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),San Francisco, CA, USA. |
6 |
Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu.A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix.Tenth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016),Fukuoka Institute of Technology (FIT), Fukuoka, Japan. |
7 |
Yi-Li Huang, Shih-Han Chen, Fang-Yie Leu(呂芳懌), Chia-Yin Ko(柯佳吟), Jung-Chun Liu(劉榮春).A secure traffic control system with emergency handling for ambulances.The 6th International Conference on Intelligent Networking and Collaborative Systems,SALERNO, ITALY. |
8 |
Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, "Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters," The 9th International Conference on Availability, Reliability and Security, 2014, pp. 166–171. (EI) |
9 |
Yi-Li Huang, Shih-Han Chen, Fang-Yie Leu, Chia-Yin Ko, Jung-Chun Liu, "An efficient traffic control system with emergency handling for ambulances," The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 356-361. (EI) |
10 |
Yi-Li Huang, Sheng-Mao Wang, Fang-Yie Leu, Jung-Chun Liu, and Chia-Yin Ko, "A secure mobile shopping system based on credit card transaction," The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 336-341. (EI) |
11 |
Kun-Lin Tsai, Jiu-Soon Tan, Fang-Yie Leu? and Yi-Li Huang, "A Group File Encryption Method using Dynamic System Environment Key," The International Conference on Network-Based Information Systems (NBiS), September 10-12, 2014. (EI) |
12 |
Kun-Lin Tsai, Fang-Yie Leu, Yi-Li Huang, Jiu-Soon Tan and MengYuan Ye, "High-efficient Multi-Key Exchange Protocol based on Three-party Authentication," International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.487-492. (EI) |
13 |
黃宜豊, 廖啟賢, 廖偉信, “植基於PW的包覆式回授加密法”, 第二十四屆全國資訊安全會議, 國立政治大學, May 30-31, 2014. |
14 |
Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Ilsun You, Kangbin Yim, Jian-Hong Chen, "A Random Wrapping Encryption Method," International Workshop on Mobility Management in the Networks of the Future World, January 2014, pp.353-358. (EI) |
15 |
Yu-Shin Huang, Fang-Yie Leu and Yi-Li Huang, "A handover scheme for LTE based on the assistance of GPS," The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp.399-403. (EI) |
16 |
Yi-Li Huang, Fang-Yie Leu, Jung-chun Liu, Lih-Jiun Lo, William Cheng-Chung Chu, "A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS," The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 360-365. (EI) |
17 |
Ya-Ting Hsu, Fang-Yie Leu, Jung-chun Liu, Yi-Li Huang, "The Simulation of an Emotional Robot Implemented with Fuzzy Logic," The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 382-386. (EI) |
18 |
Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu*, Feng-Ching Chiang, Chao-Tung Yang, and William Cheng-Chung Chu "A Multiple-key Management Scheme in Wireless Sensor Networks," The 8th International Conference on Availability, Reliability and Security, Regensburg, Germany, September 2-6, 2013, pp.337-344. (EI) |
19 |
Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, Cheng-Chung Chu, Chao-Tung Yang, "A True Random-Number Encryption Method," The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp.654-659. (EI) |
20 |
Yi-Li Huang, Fang-Yie Leu, Yao-Kuo Sun, Cheng-Chung Chu, Chao-Tung Yang, "A Secure Wireless Communication System by Integrating RSA and Diffie-Hellman PKDS in 4G Environments and an Intelligent Protection-key Chain with a Data Connection Core," the IEEE International Symposium on Industrial Electronics, 2013, pp. 11-16. (EI) |
21 |
Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang, Chih-Wei Yu, Cheng-Chung Chu, Chao-Tung Yang, "Building a block cipher mode of operation with feedback keys," the IEEE International Symposium on Industrial Electronics, 2013, pp. 1-4.(EI) |
22 |
Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, "Building a block cipher mode of operation with Dual keys," The Asian Conference on Availability, Reliability and Security (AsiaARES 2013). Lecture Notes of Computer Science – LNCS 7804, March 2013, pp. 392-398. (EI) |
23 |
Fang-Yie Leu, IlSun You, Yi-Li Huang, Kangbin Yim, Cheng-Ru Dai, “Improving Security Level of LTE Authentication and Key Agreement Procedure,” the International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2012), Dec. 2012, pp 1032-1036. (EI) |
24 |
Fang-Yie Leu, Yi-Li Huang, Chien-Nan Chen, “The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link,” the IEEE International Workshop on Cloud, Wireless and e-Commerce Security, Nov. 12-14, 2012, Victoria, Canada, pp.452~457. (EI) |
25 |
Fang-Yie Leu, Miao-Heng Chen, Yi-Li Huang, Chung-Chi Lin, “Controlling Traffic Lights for Ambulances,” the IEEE International Workshop on Cloud, Wireless and e-Commerce Security, Nov. 12-14, 2012, Victoria, Canada, pp.462~467. (EI) |
26 |
Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai, “A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2012, pp.578-592. Lecture Notes of Computer Science – LNCS 7465. (EI) |
27 |
Ko-Chung Wei, Yi-Li Huang, Fang-Yie Leu, “A Secure Communication over Wireless Environments by using a Data Connection Core,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Palermo, Italy, 4-6 July 2012, pp.570-575 . (EI) |
28 |
Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang, “A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2011, pp.255-270. Lecture Notes of Computer Science – LNCS-67908 (EI) |
29 |
Yi-Li Huang, Chu-Hsing Lin, and Fang-Yie Leu, “Verification of a Batch of Bad Signatures by using the Matrix-Detection Algorithm,” the International Conference on Data Compression, Communications and Processing, June 2011, Italy, pp. 299-306. (EI) |
30 |
Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM Environment without Prior Authentication Connection,” The IEEE International Workshop on Cloud, Wireless and e-Commerce Security, Nov. 2010, Fukuoka, Japan, pp. 441- 446. (EI) |
31 |
Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Improving security levels of IEEE802.16e authentication by Involving Diffie-Hellman PKDS,” the International Conference on Complex, Intelligent and Software Intensive Systems, Feb. 2010, Krakow, Poland , pp. 391-397. (EI) |
32 |
Yi-Fung Huang, Ko-Chung Wei, Fang-Yie Leu, “Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering Without Certificate Authorities,” the International Conference on Complex, Intelligent and Software Intensive Systems, pp. 384-390, Feb. 2010, Krakow, Poland. (EI) |
33 |
Kun-Li Wen, Yi-Fung Huang, Mei-Li You, Wei-Shiuan Tsai, "The Development of GM(1,1) Error Toolbox," IEEE ICIAS 2007 Conference, KL Convention Centre, Kuala Lumpur, MALAYSIA, IEEE International Conference on Intelligent & Advanced Systems, Nov. 2007. |
34 |
Kun-Li Wen, Cheng-Kai Yeh, Chien-Wen Wang, Yi-Fung Huang, “The Development of Grey Generating Toolbox Based on Matlab,” IEEE SMC 2006 Conference, The Grand Hotel, Taipei, Taiwan, IEEE International Conference on System, Man and Cybernetics, pp. 2286 ~ 2290, Oct. 2006 (EI) |
35 |
Yi-Fung Huang, Kin-Li Wen, Chu-Hsing Lin, Jen-Chieh Chang, “A Grey Pseudo Random Number Generator”, 第十六屆全國資訊安全會議, 逢甲大學, pp. 171-178, June 8-9, 2006 |
36 |
Kun-Li Wen, Chia-Chang Tong, Mei-Li You, Yi-Fung Huang, “The Development of Grey Statistic Toolbox and Apply in Student’s Test Score,” 2005 IEEE International Conference on Systems, Man and Cybernetics Waikoloa, Hawaii October 10-12, 2005, pp.1108-1113 (EI) |
37 |
Kun-Li Wen, Yi-Fung Huang, “The Development of Grey Verhulst Toolbox and The Analysis of Population Saturation State in Taiwan-Fukien” IEEE SMC’2004 Conference, Huage, Netherlands, pp.5007-5012, Oct. 2004. (EI) |
38 |
Yi-Fung Huang, Kun-Li Wen, Ruei-Hau Hsu, Chu-Hsing Lin, “Infinite Generating Keys Based on Publish System”, IEEE SMC 2003 Conference, Hyatt Regency, Washington, D.C. USA, pp. 3238 ~ 3243, 2003, (EI) |
39 |
Yi-Fung Huang, Lian-Kai Wang & Kun-Li Wen, ”GM(1,1) Toolbox for Engineering,” , 8th National Conference of Grey Theory And Applications, 大同大學-尚志教育研究館, C017, Dec. 2003 |
40 |
Kun-Li Wen, Yi-Fung Huang, Mei-Li You, ”Grey Entropy Toolbox in Weighting Analysis,” 8th National Conference of Grey Theory And Applications, 大同大學-尚志教育研究館,C056, Dec. 2003 |
41 |
Kun-Li Wen, Yi-Fung Huang, Chia-Chang Tong, “The Optimal in The Rolling GM(1,1) Model”, IASTED International Conference on Intelligent Systems and Control, Tsukuba, Japan, pp. 13 ~ 17, Otc. 2002 |
42 |
Kun-Li Wen, Yi-Fung Huang, Chia-Chang Tong, “Sequence Segment Reconstruction Using Class Ratio Method”, IASTED International Conference on Intelligent Systems and Control, Tsukuba, Japan, pp. 139 ~ 143, Otc. 2002 |
43 |
黃宜豊、溫坤禮、王廉凱、洪泰源、張文亮、陳靜冠、紀嘉雄、蘇友志, “灰關聯系統程式之研製”, 2002灰色系統理論與應用研討會, 遠東技術學院, pp. 155 ~ 160, Otc. 2002 |
44 |
Tzer-Shyong Chen, Yi-Fung Huang and Pei-Ying Huang,“A Cryptosystem Based on the Data Generation “, 2001灰色系統理論與應用研討會 P. C-65 ~ C69,2001年10月 25、26日 |
45 |
黃宜豊、溫坤禮、謝孟哲、范廷瑞、朱修賢、張士元、陳柏安,“灰色建模程式總管之研製”,2001灰色系統理論與應用研討會 P. E-37 ~ E46,2001年10月 25、26日 |
46 |
Yi-Fung Huang, Wei-Ting Liu, Yi-Chung Yang and Tzer-Shyong Chen, “Improvement the K-Q Lock Problems of Information Security”, 2000灰色系統理論與應用研討會 P.363 ~ P.371 ,2000年11月 |