黃宜豊 副教授

Yi-Li Huang

※各分機請先撥本校總機:(04)23590121

 

 

E-mail 實驗室
yifung@thu.edu.tw 信息安全實驗室
研究室位置 研究室分機 實驗室位置 實驗室分機
ST326 33823 ST334 33832
研究領域
網路安全、訊息安全、無線感測網路與手機通訊安全
最高學歷
中央大學 物理與天文研究所 碩士
經歷
服務單位 職稱 起迄年月
東海大學 資訊工程學系 副教授 2015年 01 月 至今
東海大學 資訊工程學系 講師 1985 年 08 月 至2015年 01 月
順序 名稱
1 Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Ilsun You*, Yu-Ling Huang, Cheng-Han Tsai, "AES-128 based Secure Low Power Communication for LoRaWAN IoT Environments,"IEEE Access, vol.6, July 2018, pp.45325-45334. (SCI)
2 Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu*, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu, "SQUARE KEY MATRIX MANAGEMENT SCHEME IN WIRELESS SENSOR NETWORKS,"Computing and Informatics, vol.36, issue 1, May 2017, pp.169-185. (SCI)
3 Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Ilsun You, "TTP based High-efficient Multi-Key Exchange Protocol,"IEEE Access, vol.4, September 2016, pp.6261-6271. (SCI)
4 Fang-Yie Leu*, Yi-Li Huang, Sheng-Mao Wang, “A secure m-commerce system based on credit card transaction,” Electronic Commerce Research and Applications, Accepted in June, 2015. (SCI, JCR’14=1.482, 44/139)
5 Yi-Li Huang, I-Long Lin, Fang-Yie Leu, Jung-Chun Liu, Fuu-Cheng Jiang, William Cheng-Chung Chu, Chao-Tung Yang, "A Secure Authentication System for Controlling Traffic Lights for Ambulances," Journal of Internet Technology, Vol. 16 No. 1, PP. 19-34, January 2015. (SCI, JCR’13=0.418, 118/135)
6 Yi-Li Huang, Cheng-Ru Dai, Fang-Yie Leu and Ilsun You*, “A secure data encryption method employing a sequential-logic style mechanism for a cloud system,” International Journal of Web and Grid Services, Vol. 11, No. 1, Pages 102-124, January 2015. (SCI, JCR’13=1.579, 24/105)
7 Ilsun You, Yi-Li Huang*, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo, "A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core," Journal of Internet Technology, vol. 15, no. 5, pp. 713-726, September 2014. (SCI, JCR’13=0.418, 118/135)
8 Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, and William Cheng-Chung Chu, “ A true Random-Number Encryption Method employing block cipher and PRNG,” Computer Science and Information Systems, vol. 11, no. 3, pp. 905-924, August 2014. (SCI, JCR’13=0.575, 101/135)
9 Fang-Yie Leu, Jung-Chun Liu, Ya-Ting Hsu, and Yi-Li Huang, “ The simulation of an emotional robot implemented with fuzzy logic,” Soft Computing, vol. 18, no. 9, pp. 1729-1743, January 2014. (SCI, JCR’13=1.304, 59/121)
10 Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu and Yi-Li Huang, “Designing A Healthcare Authorization Model Based on Cloud Authentication,” Intelligent Automation and Soft Computing, vol. 20, no. 3, pp. 365–379, March 2014. (SCI, JCR’12=0.155, 115/115)
11 Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yao-Kuo Sun, and Cheng-Chung Chu, “A Secure Wireless Communication System Integrating RSA, Diffie-Hellman PKDS, Intelligent Protection-key Chains and a Data Connection Core in 4G Environments,” Journal of Supercomputing, vol. 67, no. 3, pp. 635-652, March 2014. (SCI, JCR’11=0.578, 68/99)
12 Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu*, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu, "A Square Key Matrix Management Scheme in Wireless Sensor Networks," Computing and Informatics, Accepted in November, 2013. (SCI, JCR'12=0.254, 108/115)
13 Yi-Li Huang, Fang-Yie Leu, and Ko-Chung Wei, “A Secure Communication over Wireless Environments by using a Data Connection Core,” Mathematical and Computer Modelling, vol. 58, no. 5-6, pp. 1459-1474, September 2013. (SCI, JCR’11=1.346, 24/104)
14 Yi-Li Huang, Chu-Hsing Lin and Fang-Yie Leu, “A Batch Verification Scheme by using the Matrix-Detection Algorithm,” Journal of Internet Technology, vol. 13, no.4, pp. 681-690, July 2012. (SCI, JCR’11=0.508, 89/57)
15 Yi-Li Huang, and Fang-Yie Leu, “Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, pp. 96-107, Sept. 2011.
16 Yi-Fu Ciou, Fang-Yie Leu, Yi-Li Huang and Kangbin Yim, “A Handover Security Mechanism Employing Diffie-Hellman Key Exchange Approach for IEEE802.16e Wireless Networks,” Mobile Information Systems, vol. 7, no. 3, pp. 241–269 Sept. 2011. (SCI, JCR’11=2.432, 11/135)
17 Yi-Fung Huang, Fang-Yie Leu, Chao-Hong Chiu and I-Long Lin, “Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS,” Journal of Universal Computer Science, vol. 17, no. 6, pp. 891—911, Mar. 2011. (SCI, JCR’11=0.398, 85/104)
18 Fang-Yie Leu, Der-Jiunn Deng and, Yi-Fung Huang, “An Efficient Bandwidth-use Scheme over WLAN with the IEEE 802.11e Standard Deploying a Multi-polling Mechanism,” International Transaction on Computer Science and Engineering, vol. 56, no. 1, pp. 23-46, Oct. 2009.
19 Yi-Fung Huang, Chu-Hsing Lin and Kun-Li Wen, "A Pseudorandom Number Generator Based on Grey System Theory," Far East Journal of Mathematical Sciences, vol. 35, no. 1, pp. 1 ~ 17, Sept. 2009.
20 Yi-Fung Huang, Kun-Li Wen, “The Study of PSoC in GM(1,1) Error And its Application in Temperature Prediction”, Journal of Grey System, vol. 11, no. 4, pp. 199 ~ 204, December 2008.
21 Yi-Fung Huang, Mei-Li You, Kun-Li Wen, “The Development of GM(1,1) Error Toolbox Based on C Language”, Journal of Grey System, vol. 11, no. 2, pp. 67 ~ 72, June 2008.
22 Yi-Fung Huang, Kun-Li Wen, "Weighting analysis by using grey method," Journal of Discrete Mathematical Sciences & Cryptography, Vol.11, pp.33-58, Feb.2008.
23 Kun-Li Wen, Yi-Fung Huang, “The development of a grey clustering toolbox and its application to test score clustering,” World Transactions on Engineering and Technology Education, vol. 4, no.1, pp. 111 ~ 115. (2005)
24 Kun-Li Wen, Yi-Fung Huang, “The Analysis of Population in Taiwan Based on Grey Verhulst Method”, Journal of Grey System, vol. 8, no. 1, pp. 27 ~ 36, 2005.
25 Yi-Fung Huang, Kun-Li Wen, “Using GM(1,1) Meshsmooth Model to Construct Secure Network Communication System,” Journal of Grey System, vol. 7, no. 2, pp. 75 ~ 82. (2004)
26 溫坤禮、,黃宜豊,”灰色統計聚類電腦工具箱之開發暨應用於學習測驗成績之分類”,計量管理期刊,第一卷第二期 pp. 219 ~ 238 (2004),ISSN 1812-8572
27 溫坤禮、黃宜豊,“灰色級比等間距化序列之研究”,灰色系統學刊 第五卷第一期 pp. 23 ~ 28,中華民國九十一年三月
28 黃宜豊、,劉威廷、,楊益全,“無窮多變自動生成密碼系統”,中華民國資訊學會通訊 第四卷第一期 pp. 25 ~ 31,中華民國九十年三月
29 黃宜豊,“網路重要信息專送法”,中華民國資訊學會通訊 第三卷第一期 pp. 73 ~ 78,中華民國八十九年三月。
30 黃宜豊,“求最小權值路徑之演算法”,東海學報 第32卷 pp.565 ~ 570,中華民國八十年六月
31 T.M. Hsu, C.C. Chang, Y.F. Hwang and K.C. Lee, “The Dielectric Function of Silver by ATR Technique”, Chinese Journal of Physics Vol. 21 No. 1, 2 pp.26 ~ 32, Spring/Summer 1983
順序 名稱
1 陳俊穎、陳立人、劉珈珈、黃宜豊*.使用位移動態盒改良AES之安全與效能.第二十八屆全國資訊安全會議(CISC 2018) Cryptology and Information Security Conference 2018,國立臺灣科技大學.
2 Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu*, Xing-You Pan, and Li-Ren Chen.Generating Dynamic Box by using an Input String.The 2017 International Symposium on Mobile Internet Security,International Convention Center Jeju, Jeju Island, Republic of Korea.
3 Jung-Chun Liu, Yi-Li Huang, and Fang-Yie Leu.Enhancing Security of LTE using a Double Masking Technique.Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications (BWCCA–2016),Soonchunhyang (SCH) University, Asan, Korea.
4 Yi-Li Huang, Fang-Yie Leu, Ilsun You, Rong-Yi Su, Po-Hao Su, Hsing-Chung Chen.A 3D Encryption with Shifting Mapping Substitution Mechanism.The 5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2017),Las Vegas, USA.
5 Yi-Li Huang, Fang-Yie Leu, Ilsun You, Hsing-Chung Chen, Chishyan Liaw and Jung-Chun Liu.Random Cladding with Feedback Mechanism for Encrypting Mobile Messages.2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),San Francisco, CA, USA.
6 Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu.A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix.Tenth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016),Fukuoka Institute of Technology (FIT), Fukuoka, Japan.
7 Yi-Li Huang, Shih-Han Chen, Fang-Yie Leu(呂芳懌), Chia-Yin Ko(柯佳吟), Jung-Chun Liu(劉榮春).A secure traffic control system with emergency handling for ambulances.The 6th International Conference on Intelligent Networking and Collaborative Systems,SALERNO, ITALY.
8 Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, "Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters," The 9th International Conference on Availability, Reliability and Security, 2014, pp. 166–171. (EI)
9 Yi-Li Huang, Shih-Han Chen, Fang-Yie Leu, Chia-Yin Ko, Jung-Chun Liu, "An efficient traffic control system with emergency handling for ambulances," The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 356-361. (EI)
10 Yi-Li Huang, Sheng-Mao Wang, Fang-Yie Leu, Jung-Chun Liu, and Chia-Yin Ko, "A secure mobile shopping system based on credit card transaction," The 6th International Conference on Intelligent Networking and Collaborative Systems, 2014, pp. 336-341. (EI)
11 Kun-Lin Tsai, Jiu-Soon Tan, Fang-Yie Leu? and Yi-Li Huang, "A Group File Encryption Method using Dynamic System Environment Key," The International Conference on Network-Based Information Systems (NBiS), September 10-12, 2014. (EI)
12 Kun-Lin Tsai, Fang-Yie Leu, Yi-Li Huang, Jiu-Soon Tan and MengYuan Ye, "High-efficient Multi-Key Exchange Protocol based on Three-party Authentication," International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, July 2014, pp.487-492. (EI)
13 黃宜豊, 廖啟賢, 廖偉信, “植基於PW的包覆式回授加密法”, 第二十四屆全國資訊安全會議, 國立政治大學, May 30-31, 2014.
14 Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Ilsun You, Kangbin Yim, Jian-Hong Chen, "A Random Wrapping Encryption Method," International Workshop on Mobility Management in the Networks of the Future World, January 2014, pp.353-358. (EI)
15 Yu-Shin Huang, Fang-Yie Leu and Yi-Li Huang, "A handover scheme for LTE based on the assistance of GPS," The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp.399-403. (EI)
16 Yi-Li Huang, Fang-Yie Leu, Jung-chun Liu, Lih-Jiun Lo, William Cheng-Chung Chu, "A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS," The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 360-365. (EI)
17 Ya-Ting Hsu, Fang-Yie Leu, Jung-chun Liu, Yi-Li Huang, "The Simulation of an Emotional Robot Implemented with Fuzzy Logic," The International Workshop on Cloud, Wireless and e-Commerce Security, October 28-30, 2013, pp. 382-386. (EI)
18 Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu*, Feng-Ching Chiang, Chao-Tung Yang, and William Cheng-Chung Chu "A Multiple-key Management Scheme in Wireless Sensor Networks," The 8th International Conference on Availability, Reliability and Security, Regensburg, Germany, September 2-6, 2013, pp.337-344. (EI)
19 Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, Cheng-Chung Chu, Chao-Tung Yang, "A True Random-Number Encryption Method," The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp.654-659. (EI)
20 Yi-Li Huang, Fang-Yie Leu, Yao-Kuo Sun, Cheng-Chung Chu, Chao-Tung Yang, "A Secure Wireless Communication System by Integrating RSA and Diffie-Hellman PKDS in 4G Environments and an Intelligent Protection-key Chain with a Data Connection Core," the IEEE International Symposium on Industrial Electronics, 2013, pp. 11-16. (EI)
21 Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang, Chih-Wei Yu, Cheng-Chung Chu, Chao-Tung Yang, "Building a block cipher mode of operation with feedback keys," the IEEE International Symposium on Industrial Electronics, 2013, pp. 1-4.(EI)
22 Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang, "Building a block cipher mode of operation with Dual keys," The Asian Conference on Availability, Reliability and Security (AsiaARES 2013). Lecture Notes of Computer Science – LNCS 7804, March 2013, pp. 392-398. (EI)
23 Fang-Yie Leu, IlSun You, Yi-Li Huang, Kangbin Yim, Cheng-Ru Dai, “Improving Security Level of LTE Authentication and Key Agreement Procedure,” the International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2012), Dec. 2012, pp 1032-1036. (EI)
24 Fang-Yie Leu, Yi-Li Huang, Chien-Nan Chen, “The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link,” the IEEE International Workshop on Cloud, Wireless and e-Commerce Security, Nov. 12-14, 2012, Victoria, Canada, pp.452~457. (EI)
25 Fang-Yie Leu, Miao-Heng Chen, Yi-Li Huang, Chung-Chi Lin, “Controlling Traffic Lights for Ambulances,” the IEEE International Workshop on Cloud, Wireless and e-Commerce Security, Nov. 12-14, 2012, Victoria, Canada, pp.462~467. (EI)
26 Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai, “A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2012, pp.578-592. Lecture Notes of Computer Science – LNCS 7465. (EI)
27 Ko-Chung Wei, Yi-Li Huang, Fang-Yie Leu, “A Secure Communication over Wireless Environments by using a Data Connection Core,” The IEEE International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security, Palermo, Italy, 4-6 July 2012, pp.570-575 . (EI)
28 Fang-Yie Leu, Yi-Fu Ciou, Yi-Li Huang, “A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2011, pp.255-270. Lecture Notes of Computer Science – LNCS-67908 (EI)
29 Yi-Li Huang, Chu-Hsing Lin, and Fang-Yie Leu, “Verification of a Batch of Bad Signatures by using the Matrix-Detection Algorithm,” the International Conference on Data Compression, Communications and Processing, June 2011, Italy, pp. 299-306. (EI)
30 Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM Environment without Prior Authentication Connection,” The IEEE International Workshop on Cloud, Wireless and e-Commerce Security, Nov. 2010, Fukuoka, Japan, pp. 441- 446. (EI)
31 Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu, “Improving security levels of IEEE802.16e authentication by Involving Diffie-Hellman PKDS,” the International Conference on Complex, Intelligent and Software Intensive Systems, Feb. 2010, Krakow, Poland , pp. 391-397. (EI)
32 Yi-Fung Huang, Ko-Chung Wei, Fang-Yie Leu, “Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering Without Certificate Authorities,” the International Conference on Complex, Intelligent and Software Intensive Systems, pp. 384-390, Feb. 2010, Krakow, Poland. (EI)
33 Kun-Li Wen, Yi-Fung Huang, Mei-Li You, Wei-Shiuan Tsai, "The Development of GM(1,1) Error Toolbox," IEEE ICIAS 2007 Conference, KL Convention Centre, Kuala Lumpur, MALAYSIA, IEEE International Conference on Intelligent & Advanced Systems, Nov. 2007.
34 Kun-Li Wen, Cheng-Kai Yeh, Chien-Wen Wang, Yi-Fung Huang, “The Development of Grey Generating Toolbox Based on Matlab,” IEEE SMC 2006 Conference, The Grand Hotel, Taipei, Taiwan, IEEE International Conference on System, Man and Cybernetics, pp. 2286 ~ 2290, Oct. 2006 (EI)
35 Yi-Fung Huang, Kin-Li Wen, Chu-Hsing Lin, Jen-Chieh Chang, “A Grey Pseudo Random Number Generator”, 第十六屆全國資訊安全會議, 逢甲大學, pp. 171-178, June 8-9, 2006
36 Kun-Li Wen, Chia-Chang Tong, Mei-Li You, Yi-Fung Huang, “The Development of Grey Statistic Toolbox and Apply in Student’s Test Score,” 2005 IEEE International Conference on Systems, Man and Cybernetics Waikoloa, Hawaii October 10-12, 2005, pp.1108-1113 (EI)
37 Kun-Li Wen, Yi-Fung Huang, “The Development of Grey Verhulst Toolbox and The Analysis of Population Saturation State in Taiwan-Fukien” IEEE SMC’2004 Conference, Huage, Netherlands, pp.5007-5012, Oct. 2004. (EI)
38 Yi-Fung Huang, Kun-Li Wen, Ruei-Hau Hsu, Chu-Hsing Lin, “Infinite Generating Keys Based on Publish System”, IEEE SMC 2003 Conference, Hyatt Regency, Washington, D.C. USA, pp. 3238 ~ 3243, 2003, (EI)
39 Yi-Fung Huang, Lian-Kai Wang & Kun-Li Wen, ”GM(1,1) Toolbox for Engineering,” , 8th National Conference of Grey Theory And Applications, 大同大學-尚志教育研究館, C017, Dec. 2003
40 Kun-Li Wen, Yi-Fung Huang, Mei-Li You, ”Grey Entropy Toolbox in Weighting Analysis,” 8th National Conference of Grey Theory And Applications, 大同大學-尚志教育研究館,C056, Dec. 2003
41 Kun-Li Wen, Yi-Fung Huang, Chia-Chang Tong, “The Optimal in The Rolling GM(1,1) Model”, IASTED International Conference on Intelligent Systems and Control, Tsukuba, Japan, pp. 13 ~ 17, Otc. 2002
42 Kun-Li Wen, Yi-Fung Huang, Chia-Chang Tong, “Sequence Segment Reconstruction Using Class Ratio Method”, IASTED International Conference on Intelligent Systems and Control, Tsukuba, Japan, pp. 139 ~ 143, Otc. 2002
43 黃宜豊、溫坤禮、王廉凱、洪泰源、張文亮、陳靜冠、紀嘉雄、蘇友志, “灰關聯系統程式之研製”, 2002灰色系統理論與應用研討會, 遠東技術學院, pp. 155 ~ 160, Otc. 2002
44 Tzer-Shyong Chen, Yi-Fung Huang and Pei-Ying Huang,“A Cryptosystem Based on the Data Generation “, 2001灰色系統理論與應用研討會 P. C-65 ~ C69,2001年10月 25、26日
45 黃宜豊、溫坤禮、謝孟哲、范廷瑞、朱修賢、張士元、陳柏安,“灰色建模程式總管之研製”,2001灰色系統理論與應用研討會 P. E-37 ~ E46,2001年10月 25、26日
46 Yi-Fung Huang, Wei-Ting Liu, Yi-Chung Yang and Tzer-Shyong Chen, “Improvement the K-Q Lock Problems of Information Security”, 2000灰色系統理論與應用研討會 P.363 ~ P.371 ,2000年11月
順序 名稱
1 溫坤禮,黃宜豊,張偉哲,張廷政,游美利,賴家瑞,“灰關聯模型方法與應用”,高立圖書公司(NSC-89-2213-E270-024),2003。
2 溫坤禮,黃宜豊,陳繁雄,李元秉,連志峰,賴家瑞,”灰預測原理與應用”,全華圖書公司,2002。
3 溫坤禮,黃宜豊,張偉哲,張庭政,游美利,賴家瑞,2003. 03,“灰關聯模型方法與應用”,180頁,高立圖書公司,ISBN: 986-412-047-6。
4 溫坤禮,黃宜豊,陳繁雄,李元秉,連志峰,賴家瑞,2002. 09,“灰預測原理與應用”,186頁,全華圖書公司,05218007, ISBN: 957-21-3719-0.
5 呂芳憶, 林清祥, 朱正忠, 林正基, 林祝興, 周忠信, 黃宜豊, 傅金源, 蔡清欉, 1999. 09, 計算機概論與基礎資訊教育, 全華科技圖書有限公司, 0329302, ISBN: 957-21-2679-2
6 周忠信, 柯佳吟, 張文貴, 黃宜豊, 傅金源, 蔡清欉, 1997.09, 電腦與網路基本應用,全華科技圖書有限公司, 03293, ISBN: 957-21-2004-2.
順序 名稱
1 發明第 I 459784 號 發明名稱:具有三維運算、反饋控制與動態置換盒設計的加密方法 專利權人:黃宜豊、呂芳懌、林正基 發明人:黃宜豊、呂芳懌、林正基 專利權期間:自2014年11月1日至2032年1月5日止
2 發明第 I 434577 號 發明名稱:在無線/有線環境下安全金鑰交換的方法 專利權人:黃宜豊、呂芳懌 發明人:黃宜豊、呂芳懌 專利權期間:自2014年4月11日至2031年9月22日止
3 發明第 I 425845 號 發明名稱:具有動態金鑰雙向認證之無線通訊方法 專利權人:黃宜豊、呂芳懌 發明人:黃宜豊、呂芳懌 專利權期間:自2014年2月1日至2030年2月1日止
4 發明第 I 390381 號 發明名稱:立方體感應之主動式追日系統 專利權人:黃宜豊、蔡宗祈、鄭博仁、賴建成 發明人:黃宜豊、蔡宗祈、鄭博仁、賴建成 專利權期間:自2013年3月 21 日至2029年10月 8 日止
5 發明第 I 372551 號 發明名稱:安全的手機通訊雙向認證設備及方法 專利權人:黃宜豊 發明人:黃宜豊 專利權期間:自2012年9月11日至2028年10月8日止
順序 計畫名稱 計畫所屬機構 計畫編號 計畫日期
1 ?動裝置安全購物機制(Secure mobile devices shopping mechanism) 國科會個人研究計畫 申請中
2 東海大學 GREEnS總計畫四:建構優質的長青生活品質與環境之研究子計畫二:銀髮族優質照護U-Care的ICT整合平台分項計畫三:銀髮族優質行動照護生物感測與環境感測系統 2011-2014 東海大學 2011-2014
順序 作品名稱/活動名稱/主題 邀請單位 地點 日期
1 資訊安全 彰化縣芳苑鄉公所 彰化縣芳苑鄉公所三樓禮堂 2012-010-17~2012-10-17
順序 作品名稱/活動名稱/主題 頒獎單位 日期
1 World Congress on Engineering and Computer Science 2010 Workshop PC-Chair 2010年10月~
2 The First International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2010) Program committee member 2010年5月~2011年4月
3 The First International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS-2011) Program committee member 2011年2月~2012年1月
4 The Second International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2011) Program committee member 2011年5月~2012年4月
5 臺灣學術網路研討會 審稿委員 2011年9月~2011年10月
6 The Second International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS-2012) Program committee member 2012年2月~2013年1月
7 The Third International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2012) Program committee member 2012年5月~2013年4月
8 International Journal of Communication Networks and Distributed Systems (IJCNDS) SPECIAL ISSUE ON Emerging Wireless and Sensor Networks and Their Application Guest Editors 2013年2月~2013年8月
9 The Third International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS-2013) Program committee member 2013年2月~2014年1月
10 The Fourth International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2013) Program committee member 2013年5月~2014年4月
11 The Fifth International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2014) Committee members 2014年5月~2014年11月
順序 作品名稱/活動名稱/主題 頒獎單位 獲獎項目
1 2003 年榮獲東海大學績優導師獎勵。 東海大學 績優導師
2 2005年指導專題學生謝文琦、彭偉豪,榮獲資工系專題成果競賽第三名,專題名稱:“Combining Diffie-Hellman PKDS and Stream Cipher Technique to Construct Network Communication System”。 東海大學資工系 第三名
3 2006年指導專題學生盧予敬,榮獲資工系專題成果競賽佳作,專題名稱:“Polar Bear PRNG & Multi-πPRNG”。 東海大學資工系 佳作
4 2007年指導專題學生粘仲仁、張承偉,榮獲資工系專題成果競賽第二名,專題名稱:“Grey Pseudo Random Number Generator”。 東海大學資工系 第二名
5 2008年指導專題學生鄭建宏、鍾智揚、葉倫豪,榮獲資工系專題成果競賽佳作,專題名稱:“擬亂數產生器設計”。 東海大學資工系 佳作
6 2010年指導專題學生李榮祥、王詩博、吳孟寰、鄭新霖,榮獲資工系專題成果競賽佳作,專題名稱:“動態金鑰雙向認證之無線通訊系統”。 東海大學資工系 佳作
7 2010年指導專題學生李榮祥、王詩博、吳孟寰、鄭新霖,榮獲98學年度大學校院網路通訊軟體與創意應用競賽,系統設計組佳作,競賽專題名稱:“動態金鑰雙向認證之無線通訊系統”。 教育部 佳作
8 2012年指導專題學生洪紹騰、羅守賢、蘇詳茗、吳炳彣,榮獲資工系專題成果競賽第二名,專題名稱:“具有三維運算暨回受控制與動態置換盒之加密系統”。 東海大學資工系 第二名
9 2012年指導專題學生洪紹騰、羅守賢、蘇詳茗、吳炳彣,榮獲第二屆中部地區資訊專題成果競賽暨觀摩會,電腦系統組佳作,競賽專題名稱:“具有三維運算暨回受控制與動態置換盒之加密系統”。 中區專題競賽 佳作
10 2012年指導專題學生林昀佑、羅立鈞、程奎賀、江豐慶,榮獲資工系專題成果競賽佳作,專題名稱:“結合RSA 與Diffie-Hellman PKDS 建構安全的無線通訊系統”。 東海大學資工系 佳作
11 2012年指導專題學生林昀佑、羅立鈞、程奎賀、江豐慶,榮獲100學年度大學校院網路通訊軟體與創意應用競賽,系統設計組佳作,競賽專題名稱:“結合RSA 與Diffie-Hellman PKDS 建構安全的無線通訊系統”。 教育部 佳作
12 2013年指導專題學生陳詩涵、羅愉婷,榮獲資工系專題成果競賽佳作,專題名稱:“救護車道路暢行系統”。 東海大學資工系 佳作
13 2014年指導專題學生徐池秉、陳又樫、蔡旻諺,榮獲資工系專題成果競賽佳作,專題名稱:“一個整合回授與鏈結的加密方法”。 東海大學資工系 佳作
14 2014年榮獲東海大學資工系優良導師獎勵。 東海大學 工學院 優良導師