林祝興 教授

Chu-Hsing Lin

 ※各分機請先撥本校總機:(04)23590121

E-mail 實驗室 老師個人網站
chlin@thu.edu.tw 資訊安全實驗室 http://www.islab.www.cs.thu.edu.tw
研究室位置 研究室分機 實驗室位置 實驗室分機
ST322 33820 ST333 33830
研究領域
資訊網路安全、應用密碼學、資料科學、機器學習
最高學歷
清華大學 資訊科學研究所 博士

 

經歷
服務單位 職稱 起迄年月
東海大學 工學院 院長 2022 年08 月 至今
東海大學 資訊工程系 系主任 2019 年08 月 至 2022年 07月
東海大學 圖書館 館長 2012 年08 月 至2013 年08 月
東海大學 資訊工程系 教授 1989 年 08 月 至今
東海大學 電子計算機中心 主任 1995 年 10 月 至 1999 年 07 月
東海大學 資訊工程學系 主任 2004 年 08 月 至 2007 年 07 月
東海大學 管理學院資訊中心 主任  
中華民國資訊安全學會 理事  
台中市電腦公會 顧問  
順序 名稱
1 Jung-Chun Liu, Chu-Hsing Lin*, Ken-Yu Lee, "Cloud-based Personal Data Protection System and its Performance Evaluation,"Journal of Internet Technology, vol.01, November 2019, pp.01-01. (SCI)
2 Chu-Hsing Lin, Jung-Chun Liu, JIZ Chen, TP Chu, "On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing,"Wireless Personal Communications, vol.1, issue 109, November 2019, pp.491-504. (SCI)
3 Jung-Chun Liu, Chu-Hsing Lin, and Chi-Yuan Lin, ""Accuracy Evaluation of Location Service Modes on Mobile Devices","Sensors and Materials, vol.30, issue 3, March 2019, pp.373-383. (SCI)
4 Chu-Hsing Lin, Jung-Chun Liu, and Ken-Yu Lee, "On Neural Networks for Biometric Authentication Based on Keystroke Dynamics,"Sensors and Materials, vol.30, issue 3, March 2018, pp.385-396. (SCI)
5 Cheng-Chieh Li, Chu-Hsing Lin and Jung-Chun Liu, "Parallel genetic algorithms on the graphics processing units using island model and simulated annealing,"Advances in Mechanical Engineering, vol.9, issue 7, July 2017, pp.1-14. (SCI)
6 Cheng-Chieh Li, Jung-Chun Liu, Chu-Hsing Lin, Winston Lo, "On the Accelerated Convergence of Genetic Algorithm Using GPU Parallel Operations," International Journal of Software Innovation, 3(4), October-December 2015, pp.1-17. (EI)
7 Fuu-Cheng Jiang, Chu-Hsing Lin, Hsiang-Wei Wu, "Lifetime Elongation of Ad hoc Networks under Flooding Attack Using Power-saving Technique," Ad Hoc Networks, Vol. 21, 2014, pp.84-96. (SCI) IF:1.943
8 Iong-Zong Chen and Chu-Hsing Lin, “Throughput Evaluation of a Novel Scheme to Mitigate the Congestion over WSNs,” accepted for publication in Wirelee Personal Communication, Wireless Personal Communications, Vol. 75, no. 4, 2014, pp.1863-1877. (SCI) IF=0.979
9 Iong-Zong Chen and Chu-Hsing Lin,"Algorithms for Promoting Anonymity of BS and for Prolonging Network Lifetime of WSN," Peer-to-Peer Networking and Applications, Vol. 7, No. 4, 2014, pp.710-722. (SCI) IF=0.456
10 Chu-Hsing Lin, Chen-Yu Lee, Krishna M. Kavi, Deng-Jyi Chen, Yi-Shiung Yeh, “Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms,” Journal of Information Science and Engineering, Vol. 29, 2013, pp.889-905. (SCI) IF=0.333
11 Joy Iong-Zong Chen, Lu-Tsou Yeh, Chu-Hsing Lin, "Performance Evaluation of Outage Probability and BER for MIMO-femtocell System over Spatial Correlated Channel," Computers and Electrical Engineering, Vol. 39, 2013, pp.1837–1845. (SCI) IF=0.992
12 Chu-Hsing Lin, Hung-Yan Lin, Tang-Wei Wu, Ying-Hsuan Chen, Chien-Hua Huang: Preserving Quality of Service for Normal Users against DDoS Attacks by Using Double Check Priority Queues, Journal of Ambient Intelligence and Humanized Computing, Vol. 4, No. 2, 2013, pp. 275-282. (EI, Springer) IF=1.766
13 Yi-Li Huang, Chu-Hsing Lin, Fang-Yie Leu, “A Batch Verification Scheme by using the Matrix-Detection Algorithm,” Journal of Internet Technology, Vol. 13, No. 4, 2012, pp.681-690. (SCI) IF = 0.481
14 Chu-Hsing Lin, Chen-Yu Lee, Tang-Wei Wu, “A Cloud-aided RSA Signature Scheme for Sealing and Storing the Digital Evidences in Computer Forensics,” International Journal of Security and Its Applications, Vol. 6, No. 2, April, 2012, pp. 241-244. (EI)
15 Chu-Hsing Lin, Chen-Yu Lee, Shin-Pin Lai and Wei-Shen Lai, “A Semantic Rule-based Detection Scheme against Flooding Attacks on Cloud Environment,” International Journal of Security and Its Applications, Vol. 6, No. 2, April, 2012, pp. 341-345. (EI)
16 Chen-Yu Lee, Chu-Hsing Lin, Deng-Jyi Chen, Yi-Shiung Yeh, “Generalized Secure Hash Algorithm: SHA-X,” International Journal of Advancements in Computing Technology, Vol. 4, No. 7, 2012, pp. 41-52. (EI)
17 Fuu-Cheng Jiang, Chu-Hsing Lin, Der-Chen Huang, Chao-Tung Yang, "Design strategy for optimizing power consumption of sensor node with Min(N, T) policy M/G/1 queuing models," International Journal of Communication Systems, Vol. 25, 2012, pp.652-671. (SCI) IF = 0.317
18 Fuu-Cheng Jiang, Chu-Hsing Lin, Der-Chen Huang, Chao-Tung Yang, “Dual Paths Node-disjoint Routing for Data Salvation in Mobile Ad hoc,” Journal of Supercomputing, Volume 59, Number 1, 2012, pp. 268-296. (SCI) IF = 0.687
19 Chu-Hsing Lin, Chen-Yu Lee and Deng-Jyi Chen, "Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET," COMPUTING AND INFORMATICS, Vol. 30, 2011, pp.1167-1180. (SCI) IF = 0.456
20 Lien Harn, Chu-Hsing Lin, “Contract Signatures in E-Commerce Applications,” Computers & Electrical Engineering, Vol. 37, Issue 2, March 2011, pp.169-173. (SCI) IF = 0.475
21 Chu-Hsing Lin*, Jung-Chun Liu, Chien-Ting Kuo, “Priority Queue-based Scheme to Maintain Quality of Service for Normal Users Suffering from Large DDoS Attacks,” International Journal of Future Generation Communication and Networking, Vol. 3, No. 2, June, 2010, pp.53-60. (EI)
22 Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao, “Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices," Computer Standards & Interfaces, Vol. 32, Issues 1-2, January 2010, pp. 10-17. (SCI, EI) IF=1.074
23 Yi-Fung Huang, Chu-Hsing Lin, and Kun-Lin Wen, “A Pseudorandom Number Generator Based on Energy System Theory,” Far East Journal of Mathematical Sciences (FJMS), Vol. 35, Issue 1, 2009, pp. 1-17. (Math Sci Net)
24 Yi-Shiung Yeh, Chen-Yu Lee, Ting-Yu Huang and Chu-Hsing Lin, “A Transpositional Advanced Encryption Standard (AES) Resists 3-round Square Attack,” International Journal of Innovative Computing, Information and Control, Vol.5, No.5, May 2009, pp.1-11. (SCI) IF=1.537
25 Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, and Tsung-Che Yang, “Safeguard Intranet Using Embedded and Distributed Firewall System,” International Journal of Future Generation Communication and Networking, Vol. 2, No. 1, March, 2009, pp.9-16. (SERSC, Korea, ISSN: 1738-995x)
26 C. S. Shih, P. A. Hsiung, C. H. Wan, C. S. Koong, T. K. Liu, Y. F. Yang, Chu-Hsing Lin, William C. C. Chu, “Integration of a Vision-based Tracking Platform, Visual Instruction, and Error Analysis, Models for an Efficient Billiard Training System,” Optical Engineering, 48(2), Feb. 2009. (SCI, EI) IF = 0.553
27 Chu-Hsing Lin, Jui-Ling Yu, Jung-Chun Liu, Wei-Shen Lai, Chia-Han Ho, “Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems,” International Journal of Hybrid Information Technology, Vol. 2, No. 1, January, 2009, pp.21-30. (SERSC, Korea, ISSN: 1738-9968)
28 Chu-Hsing Lin, Yu-Ying Lin, Frode Eika Sandnes, “Integrity Protection of Binary Text Document Images Based on Image Topologies,” International Journal of Pattern Recognition and Artificial Intelligence, Volume 22, Issue: 8, December 2008, pp.1599-1620. (SCI, EI) IF=0.66
29 Wei-Shen Lai, Chu-Hsing Lin, Jung-Chun Lu, Hsun-Chi Huang and Tsung-Che Yang, “Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks,” International Journal of Software Engineering and Its Applications, Vol. 2, No. 4, October 2008, pp.61-72. (SERSC, Korea, ISSN 1738-9984)
30 Lung-Chun Lu, Chu-Hsing Lin, Jui-Ling Yu, Wei-Shen Lai and Chia-Han Ho, “Anomaly Detection Using LibSVM Training Tools,” International Journal of Security and Its Applications, Vol. 2, No. 4, October 2008, pp.89-98. (SERSC, Korea, ISSN 1738-9976)
31 Jung-Chun Lu, Chu-Hsing Lin, Wei-Shen Lai, and Yan-Wei Lee, “A Robust Watermark Scheme for Copyright Protection,” International Journal of Software Engineering and Its Applications, Vol. 2, No. 4, October 2008, pp.61-72. (SERSC, Korea, ISSN 1738-9984)
32 C. S. Shih, L. A. Gerhardt, W. C. C. Chu, Chu-Hsing Lin, C. H. Chang, C. H. Wan, ” Non-Uniform Surface Sampling Techniques For 3D Object Inspection,” Optical Engineering, Vol. 47, No. 5, May 2008, pp.1-14. (SCI, EI)
33 C. C. Chang, Chu-Hsing Lin and C. Y. Chen, “A Conference Key Distribution Scheme Using Interpolating Polynomials,” International Journal of Security and Its Applications, Vol. 1, No. 2, October 2007, pp.9-20.
34 Jue-Sam Chou, Chu-Hsing Lin and Chia-Hung Chiu, ”Weakness of Shim’s New ID-based Tripartite Multiple-key Agreement,” WSEAS Transactions on Information Science and Applications, Issue 7, Volume 3, June 2006, pp.1407-1410. (EI)
35 Jue-Sam Chou, Chu-Hsing Lin and Chia-Hung Chiu, ”An Identity-Based Scheme for Ad Hoc Network Secure Routing Protocol from Pairing,” WSEAS Transations on computers, Issue 6, Volume 5, June 2006, pp.1214-1221. (EI)
36 Jue-Sam Chou, Chu-Hsing Lin, and Ting-Ying Lee, “A New Efficient Hierarchical Key Management Scheme,” GESTS International Transaction on Computer Science and Engineering, Vol. 2, No. 1, March 2005, pp.59-68.
37 Chu-Hsing Lin, Ruei-Hau Hsu and Lein Harn, “Improved DSA variant for batch verification,” Applied Mathematics and Computation, Vol 169/1, 2005, pp 75-81. (SCI) IF=0.96
38 Chu-Hsing Lin, C. Y. Lee and C. Y. Lee, “Comments on Saeednia's Improved Scheme for the Hill Cipher,” Journal of the Chinese Institute of Engineering, Vol. 27, No. 5, 2004, pp. 743-746. (EI, SCI)
39 Chu-Hsing Lin, Y. Y. Lai, “A flexible biometrics remote user authentication scheme,” Computer Standards & Interfaces, Vol. 27, Issue 1, 2004, pp.19-23. (EI, SCI)
40 C. T. Wang, C. C. Chang, and Chu-Hsing Lin, “Fast Cascade Exponentiation Schemes Based on String Compression Algorithms,” Asian Journal of Information Technology, Vol. 3, No. 9, 2004, pp.768-776.
41 Chu-Hsing Lin, C. Y. Lee, and W. Lee, “Comments on the Yang-Chang-Hwang Anonymous Conference Key Distribution System,” Computer Standards & Interfaces, Vol. 26, Issue 3, May 2004, pp.171-174. (EI, SCI)
42 Chu-Hsing Lin, W. C. Lee, “Design Role-based Access Control Systems Using XML Structure,” Asian Journal of Information Technology, Grace Publications Network, Vol. 2, No. 4, October-December, 2003, pp.283-293.
43 C. L. Lee, Chu-Hsing Lin, Y. S. Yeh and W.S. Lai, “A Software Anti-Piracy System using Undeniable Signature and Smart Cards,” Journal of Applied Systems Studies, Vol. 4, No. 3, 2003.
44 Chu-Hsing Lin and C. Y. Lee, “A Software Protection System for Internet Commerce,” Journal of Applied Systems Studies, Vol. 4, No. 3, 2003.
45 Chu-Hsing Lin, Y. S. Yeh, and C. Y. Lee, “Keyed/Unkeyed SHA-2,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 6, No. 1, April 2003, pp.45-58.
46 Chu-Hsing Lin and J. H. Lee, “An Efficient Hierarchical Key Management Scheme Based on Elliptic Curves,” Journal of Interdisciplinary Mathematics, Vol. 5, No. 3, October 2002, pp.293-301.
47 Yeh, Y. S., Chu-Hsing Lin, and W. S. Lai, “Construct Message Authentication Code with SHA and AEA,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 5, April 2002, pp 73-83.
48 Chu-Hsing Lin and Y. S Yeh, “Generalized GOST,” Journal of Information & Optimization Sciences, Vol. 23, No. 2, 2002, pp345-353. (EI)
49 Wang, C.T., C. C. Chang, and Chu-Hsing Lin, “A New Micro-Payment System using General Payword Chain,” Electronic Commerce Research, 2, 2002, pp. 159-168.
50 Chu-Hsing Lin, “Hierarchical Key Assignment without Public-key Cryptography,” Computers & Security, Volume 20, Number 7, December 2001, pp.612-619. (EI, SCI)
51 Yeh, Y. S., Chu-Hsing Lin, and C. C. Wang, “Dynamic GOST,” Journal of Information Science and Engineering, Vol. 16, No. 6, November 2000, pp.857-861. (EI, SCI)
52 Wang, C. T., C. C. Chang, and Chu-Hsing Lin, “Generalization of Threshold Signature and Authenticated Encryption for Group Communications,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No. 6, June 2000, pp.1228-1237. (EI, SCI)
53 Chang, C. C., C. T. Wang, and Chu-Hsing Lin, “Conference Key Distributions Using Self-Certified Public Keys,” International Journal of Applied Mathematics, Volume 2, No. 3, 2000, pp.327-337.
54 Hsieh, T. M., Y. S. Yeh, Chu-Hsing Lin, and S. H. Tuan, “One-Way Hash Functions with Changeable Parameters,” Information Sciences, Vol. 118, September 1999, pp.223-239. (EI, SCI Expanded)
55 Wang, C. T., C. C. Chang, and Chu-Hsing Lin, “A Method for Computing Lucas Sequences,” An International Journal Computers & Mathematics with Applications, Vol. 38, Issue 12, 1999, pp.187-196. (EI, SCI Expanded)
56 Chu-Hsing Lin and T. C. Lee, “A Confused Document Encrypting Scheme and Its Implementation,” Computers & Security, Vol. 17, No. 6, 1998, pp.543-551. (EI, SCI Expanded)
57 Wang, C. T., C. C. Chang and Chu-Hsing Lin, “Conference Key Supervision in a Level-Based Hierarchy,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, No. 10, Oct. 1998, pp. 2219-2227.(EI, SCI Expanded)
58 Wang, C. T., Chu-Hsing Lin and C. C. Chang, “Threshold Signature Schemes with Traceable Signers in Group Communications,“ Computer Communications, Vol. 21, No. 8, June 1998, pp.771-776. (EI, SCI Expanded)
59 Chu-Hsing Lin, “Dynamic Key Management Scheme for Access Control in Hierarchy,” Computer Communications, Vol. 20, No. 15, December 1997, pp.1381-1385. (EI, SCI Expanded)
60 Chu-Hsing Lin, C. T. Wang and C. C. Chang, "A Group-Oriented (t,n) Undeniable Signature Scheme without Trusted Center," Information Security and Privacy, Lecture Notes in Computer Science 1172, Edited by G. Goos, J. Hartmanis and J. van Leeuwen, Springer -Verlag, 1996, pp.266-274. (EI, SCI Expanded)
61 Chu-Hsing Lin, C. C. Chang and R. C. T. Lee, "A New Public-Key Cipher System Based on the Diophantine Equations," IEEE Transactions on Computers, Vol.44, No.1, January 1995. (EI, SCI)
62 Chu-Hsing Lin and C. C. Chang, "A Server-Aided Computation Protocol for RSA Enciphering Algorithm," International Journal of Computer Mathematics, Vol. 53, 1994, pp.149-155. (EI, SCI)
63 Chu-Hsing Lin and C. C. Chang, "A Method for Constructing a Group-oriented Cryptosystems," Computer Communications, Vol. 17, No. 11, November 1994, pp. 805-808. (EI, SCI Expanded)
64 Chu-Hsing Lin, C. C. Chang and R. C. T. Lee, "A Record-oriented Cryptosystem for Database Sharing," The Computer Journal, Vol.35, No.6, 1992, pp.658-660. (EI, SCI Expanded)
65 Chu-Hsing Lin, C. C. Chang and R. C. T. Lee, "Hierarchy Representations Based on Arithmetic Coding for Dynamic Information Protection Systems," Information Sciences, Vol. 64, 1992, pp. 35-48. (EI, SCI Expanded)
66 Chu-Hsing Lin, C. C. Chang and R. C. T. Lee, "A Conference Key Broadcasting System using Sealed Locks," Information Systems, Vol. 17, No. 4., 1992, pp.323-328. (EI, SCI Expanded)
67 Chu-Hsing Lin, C. C. Chang and R. C. T. Lee, "Password Authentication using Newton's Interpolating Polynomials," Information Systems, Vol. 16, No. 1, 1991, pp. 97-102. (EI, SCI Expanded)
68 Chang, C. C. and Chu-Hsing Lin, "A Reciprocal Confluence Tree Unit and Its Applications," BIT, Vol. 30, 1990, pp. 27-33. (SCI)
69 Chu-Hsing Lin, C. C. Chang and R. C. T. Lee, "A Dynamic Access Control Mechanism in Information Protection Systems," Journal of Information Science and Engineering, Vol. 6, 1990, pp. 25-35. (EI, SCI Expanded)
順序 名稱
1 Chu-Hsing Lin, Po-Kai Yang, Yu-Chiao Lin, and Pin-Kuei Fu (2020, May). On Machine Learning Models for Heart Disease Diagnosis. 2nd Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability 2020, Tainan, Taiwan. MOST 107-2221-E-029-005-MY3.
2 Chu-Hsing Lin, Jung-Chun Liu, Po-Kai Yang (2020, Jan). Performance Enhancement of GPU Parallel Computing Using Memory Allocation Optimization. 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM).
3 Chu-Hsing Lin, Po-Kai Yang, Yu-Chiao Lin (2020, Jan). Detecting Security Breaches in Personal Data Protection with Machine Learning. 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM).
4 Chu-Hsing Lin, Hsiao-Wen Lu (2019, Mar). Response to Co-Resident Threats in Cloud Computing Using Machine Learning. The 33-rd International Conference on Advanced Information Networking and Applications (AINA-2019), Kunibiki Messe, Matsue, Japan.
5 Chu-Hsing Lin, Hsuan Chi (2019, Mar). A Novel Movie Recommendation System Based on Collaborative Filtering and Neural Networks. The 33-rd International Conference on Advanced Information Networking and Applications (AINA-2019), Kunibiki Messe, Matsue, Japan. MOST 107-2221-E-029-005-MY3.
6 Ting-Chung Lee, Chu-Hsing Lin (2018, Apr). Filtering Spam Mails Using Convolutional Neural Networks and Parallel Computing, 2018 International Conference on Modern Management and Innovation, Hsinchu, Taiwan.
7 Chu-Hsing Lin, Jung-Chun Liu, and Po-Kai Yang (2018, Apr). On the Speedup of Parallel Fast Fourier Transform Using CUDA GPU. 4th IEEE International Conference on Applied System Innovation 2018, Chiba, Tokyo, Japan.
8 Chu-Hsing Lin, Chihhsiong Shih and Yi-Ting Hsiao (2018, Apr). Performance Evaluation of Collaborative Filtering Algorithms Based on Hadoop. 4th IEEE International Conference on Applied System Innovation 2018, Chiba, Tokyo, Japan.
9 Chu-Hsing Lin, Jung-Chun Liu, Tsung-Chi Peng (2017, May). Performance evaluation of cluster algorithms for Big Data analysis on cloud. IEEE 2017 International Conference on Applied System Innovation , Sapporo, Japan.
10 Cheng-Chieh Li, Chu-Hsing Lin, Jung-Chun Liu, "Parallel Genetic Algorithms on the GPU Using Island Model and Simulated Annealing," 2016 IEEE International Conference on Applied System Innovation (IEEE ICASI 2016), Okinawa, Japan, May 28-June 1.
11 Chu-Hsing Lin, Jung-Chun Liu, and Shiang-Lin Tsai, "On the Automatic Target Tracking and Recognition for Surveillance Systems," Proceedings of the Universal Academic Cluster International Winter Conferences, Hokkaido, Japan, Feb 22-24, 2016.
12 Chu-Hsing Lin, Jung-Chun Liu, Hsin-Jen Yao, Cheng-Chung Chu, Chao-Tung Yang, "Performance Evaluation of Parallel Genetic Algorithm using Single Program Multiple Data Technique," 2nd International Conference on Trustworthy Systems and Their Applications, Hualien, Taiwan, July 8-9, 2015.
13 Cheng-Chieh Li, Jung-Chun Liu, Chu-Hsing Lin and Winston Lo,"On the Accelerated Convergence of Genetic Algorithm Using GPU Parallel Operations," 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Springer, Takamatsu, Japan, Jun 01-03, 2015.
14 Chu-Hsing Lin, Jung-Chun Liu and Su-Ying Lin,"3-Dimensional Personal Identification and Its Applications Based on Kinect," International Conference on Applied System Innovation, Osaka, Japan, May 22-27, 2015.
15 Chu-Hsing Lin, Jung-Chun Liu and Wen-Chen Wu, "Designing QR Code with Authentication Capabilities," Workshop on Cryptography and Information Security, International Computer Symposium (ICS 2014), Tunghai University, Taichung, Taiwan, December 12-14, 2014.
16 Chu-Hsing Lin, Jung-Chun Liu and Cheng-Chieh Li, "Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation," The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), Wuhan, China, September 3-5 , 2014. (EI)
17 Chu-Hsing Lin, Jung-Chun Liu and Cheng-Chieh Li, "Synchronized Schemes in Heterogeneous System for Cryptographic Applications," International Congress on Natural Sciences and Engineering (ICNSE 2014), Kyoto, Japan, May 7-9, 2014.
18 Chu-Hsing Lin, Jung-Chun Liu, Ming-Hong Liou, Wen-Chen Wu (2014, Jan). Shortest Driving Time Computation Based on Cloud Technologies and Genetic Algorithm. Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014), Langkawi, Malaysia.
19 Chu-Hsing Lin, Jung-Chun Liu, and Cheng-Chieh Li (2014, Jan). Speeding Up RSA Encryption Using GPU Parallelization. Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014), Langkawi, Malaysia.
20 Chu-Hsing Lin, Chen-Yu Lee, Shi-Pei Chien, “Digital Video Watermarking on Cloud Computing Environments,” The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), Kuala Lumpur, Malaysia, March 4-6, 2013. (EI)
21 Chu-Hsing Lin, Hung-Yan Lin, Wei-Bin Lee, “Routing Protocols with Power Saving and Data Salvation for Wireless Sensor Networks,” the Third International Workshop on Cloud, Wireless and e-Commerce Security, University of Victoria, Victoria, Canada, November 12-14, 2012. (EI)
22 Chu-Hsing Lin, Chen-Yu Lee, Tang-Wei Wu, “A Cloud-aided RSA Signature Scheme for Digital Forensics Applications,” The 6th International Conference on Information Security and Assurance (ISA 2012), Howard Johnson Hongqiao Airport Hotel Shanghai, Shanghai, China, April 28-30, 2012. (EI)
23 Chu-Hsing Lin, Chen-Yu Lee, Shin-Pin Lai, Wei-Shen Lai, “A Semantic Rule-based Detection Scheme against Flooding Attacks on Application Layer,” The 6th International Conference on Information Security and Assurance (ISA 2012), Howard Johnson Hongqiao Airport Hotel Shanghai, Shanghai, China, April 28-30, 2012. (EI)
24 Chu-Hsing Lin, Jung-Chun Liu, Wen-Chen Wu, Tsau-Wei You, and Ming-Hung Liu, “Mobile Computer System with User Friendly Environment and Security Protection,” The Second International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2012, Sanpaolo Palace Hotel, Palermo, Italy, July 4-6, 2012. (EI)
25 Chu-Hsing Lin, Jung-Chun Liu, Chien-Hsing Lee, and Tang-Wei Wu, “An Indoor Location-Aware System Based on Rotation Sampling in Positioning,” The 2011 International Conference on Future Generation Communication and Networking, in Jeju Grand Hotel, Jeju Island, Korea, December 8-10, 2011, pp.77-81.
26 Chu-Hsing Lin, Jung-Chun Liu, Sheng-Hsing Tsai, and Hung-Yan Lin, “Research on the ZigBee-Based Indoor Location Estimation Technology,” The 2011 International Conference on Future Generation Communication and Networking, in Jeju Grand Hotel, Jeju Island, Korea, December 8-10, 2011, pp.82-86.
27 Chu-Hsing Lin, Chen-Yu Lee, Tzu-Chien Yang, and Shin-Pin Lai, “Visible Watermarking Based on Multi-parameters Adjustable Gamma Correction,” The 2011 International Conference on Future Generation Communication and Networking, in Jeju Grand Hotel, Jeju Island, Korea, December 8-10, 2011, pp.86-92.
28 Chu-Hsing Lin, Chen-Yu Lee, Shu-Yuan Lu, and Shih-Pei Chien, “Unseen Visible Watermarking for Gray Level Images Based on Gamma Correction,” The 2011 International Conference on Future Generation Communication and Networking, in Jeju Grand Hotel, Jeju Island, Korea, December 8-10, 2011, pp.236-243.
29 Chu-Hsing Lin, Guan-Han Chen, and Shih-Pei Chien, “Energy Consumption Analysis for Cryptographic Algorithms with Different Clocks on Smart Cards in Mobile Devices,“ the Second International Workshop on Cloud, Wireless and e-Commerce Security (CWECS-2011), Technical University of Catalonia, Barcelona, Spain, October 26-28, 2011.
30 Chao-Tung Yang, Chu-Hsing Lin, Guey-Luen Chang, “Implementation of Image Watermarking Processes on Cloud Computing Environments,” The 2nd International Conference on Security-enriched Urban Computing and Smart Grids (SUComS 2011), Hualien, Taiwan, September 21-23, 2011.
31 Chu-Hsing Lin, Jung-Chun Liu, Guan-Han Chen, Ying-Hsuan Chen, and Chien-Hua Huang, “Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS attacks,” The First International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2011 (MCNCS 2011), Korean Bible University (KBU), Seoul, Korea, June 30 - July 2, 2011.
32 Yi-Li Huang, Chu-Hsing Lin, and Fang-Yie Leu, “Verification of a Batch of Bad Signatures by using the Matrix-Detection Algorithm,” 1st International Conference on Data Compression, Communications and Processing, Palinuro, Salerno, Italy, June 21-24, 2011.
33 Chu-Hsing Lin, Chen-Yu Lee, Yi-Shiung Yeh and Hung-Sheng Chien, “Generalized Secure Hash Algorithm: SHA-X,” EUROCON 2011 International Conference on Computer as a Tool, IST Congress Center, Lisbon, Portugal, April 27-29, 2011.
34 Chu-Hsing Lin, Shang-Sheng Yang, Jeng-Heng Chen and Yi-Zhu Cao, “Design and Implementation of Mouth-Controlled Mouse System,” EUROCON 2011 International Conference on Computer as a Tool, IST Congress Center, Lisbon, Portugal, April 27-29, 2011. (EI)
35 Lien Harn, Chu-Hsing Lin and Che-Wei Hu, “Contract Signatures in E-Commerce Applications,” 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, Nov 4-6, 2010, Fukuoka, Japan.
36 Fuu-Cheng Jiang , Hsiang-Wei Wu, Der-Chen Huang and Chu-Hsing Lin, “Lifetime Security Improvement in Wireless Sensor Network using Queue-based Techniques,” 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, Nov 4-6, 2010, Fukuoka, Japan.
37 Chu-Hsing Lin, Jung-Chung Liu, Wei-Cheng Hsu, Hsing-Weng Wang, Wei-Chih Lin, Jian-Wei Li, "Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks", The 2nd International Conference on Advanced Communication and Networking, June 23 - 25, 2010, Sheraton Grande Ocean Resort, Miyazaki, Japan. (Springer Verlag)
38 Chu-Hsing Lin and Chen-Yu Lee, "Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET," The 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS-2010), Andrzej Frycz Modrzewski Cracow College, Krakow, Poland, February, 15- 18, 2010.
39 Chu-Hsing Lin, Jung-Chun Liu, Hao-Ting Zou, “Investigations of Factors Affecting the Genetic Algorithm for Shortest Driving Time,” International Conference on SOft Computing and Pattern Recognition (SoCPaR 2009), December 4-7, 2009, Malacca, Malaysia. (EI)
40 Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, “Analysis of Priority Queue-based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks,” 2009 International Conference on Future Generation Communication and Networking (FGCN 2009), Jeju Island, Korea, December 10-12, 2009. (EI)
41 Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen, “Access Log Generator for Analyzing Malicious Website Browsing Behaviors,” The Fifth International Conference on Information Assurance and Security (IAS-2009), Xi'an, China, August 18-20, 2009. (EI)
42 Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng, Tsung-Che Yang, Mei-Chun Chou, “Energy Analysis of Multimedia Video Streaming on Mobile Devices,” The 3rd International Conference on Information Security and Assurance (ISA 2009), Seoul, Korea, June 25-27, 2009. (EI, LNCS 5576)
43 Chu-Hsing Lin, Jung-Chun Liu, Lun-Yuen Cheng, Jung-Jung Chung, "Binary Documents Recovery Based on Skeleton Extraction," The 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), June 4-6, 2009 Qingdao, China. (EI)
44 Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu “Counteract SYN Flooding Using Second Chance Packet Filtering,” Third International Conference on Ubiquitous Information Management and Communication (ICUIMC-09), January 15-16, 2009, SKKU, Suwon, Korea.(EI)
45 Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, Tsung-Che Yang, “Safeguard Intranet Using Embedded and Distributed Firewall System,” 2008 Second International Conference on Future Generation Communication and Networking (FGCN 2008), Hainan, China, December 13-15, 2008, pp.489-492(EI)
46 Chien-Ting Kuo, Chu-Hsing Lin, Jung-Chun Liu, and Mao-Hua Cheng, “Design and Implementation of a Distributed Security System with Embedded Firewalls,” National Symposium on Telecommunications, 2008 (NST-2008), Formosa University, Taiwan, December 5-6, 2008, PB1-32.
47 Chu-Hsing Lin, Fuu-Cheng Jiang, Jen-Chieh Chang and Frode Eika Sandnes, “Node-disjoint Alternative Dual-path Routing for Data Salvation in Mobile Ad hoc Networks,” The Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'08), Dunedin, New Zealand, December 1–4, 2008. pp.342-349(EI)
48 Chu-Hsing Lin, Jung-Chun Liu, Chih-Chieh Lien, “Detection Method Based on Reverse Proxy Against Web Flooding Attacks,” 8th International Conference on Intelligent Systems Design and Applications (ISDA-2008), Kaohsiung City, Taiwan, November 26-28, 2008, pp.281-284 (EI)
49 Chu-Hsing Lin, Jung-Chun Liu, and Chien-Ting Kuo, “An Effective Priority Queue-based Scheme to Alleviate Malicious Packet Flows from Distributed DoS attacks,” The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), Harbin, China, August 15-17, 2008, pp.1371-1374. (EI)
50 Chu-Hsing Lin, Fuu-Cheng Chiang, Jen-Chieh Chang, Chien-Ting Kuo, Frode Eika Sandnes, “Performance Effects of AODV-based Backup Routing Protocol Policies in Mobile Ad hoc Networks,” The 3rd Joint Workshop on Information Security (JWIS 2008), Hanyang University, Seoul, Korea, July 10-11, pp.346-356.
51 Chu-Hsing Lin, Jung-Chun Liu, Pei-Jean Han, “On the Security of the Full-Band Image Watermark for Copyright Protection,” The IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2008), Taichung, Taiwan, June 11-13, 2008. (EI)
52 Chu-Hsing Lin, Wei-Shen Lai, Yen-Ling Hwang and Mei-Chun Chou, “I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks,” The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea, April 24 - 26, 2008, pp.102-107. (EI)
53 Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Li, “A Robust Watermark Scheme for Copyright Protection,” The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea, April 24 - 26, 2008, pp.132-137. (EI)
54 Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Hwang, Tsung-Che Yang, “Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks,” The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea, April 24 - 26, 2008, pp.176-181. (EI)
55 Chu-Hsing Lin, Jung-Chun Liu, Jui-Ling Yu, Chia-Jen Li, “Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems,” The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea, April 24 - 26, 2008, pp.402-406. (EI)
56 Chu-Hsing Lin, Jung-Chun Liu, Chia-Han Ho, “Anomaly Detection Using LibSVM Training Tools,” The 2nd International Conference on Information Security and Assurance, Hanwha Resort Haeundae, Busan, Korea, April 24 - 26, 2008, pp.166-171. (EI)
57 Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou, “Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks,” 3rd International Workshop on Performance Analysis and Enhancement of Wireless Networks (PAEWN’08), GinoWan, Okinawa, Japan, March 25 - 28, 2008. (EI)
58 Chu-Hsing Lin, C. S. Shih, J. C. Liu, M. H. Cheng, and Y. W. Lee, “Energy Efficiency Measurement for Multimedia Audio Decoding on Embedded Systems,” The Second International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2008), Suwon, Korea, Jan. 31 – Feb. 1, 2008. (EI)
59 Chu-Hsing Lin, J. C. Liu, M. H. Cheng, “Energy Analysis of Multimedia Video Decoding on Embedded Systems,” The International Conference on Information Networking 2008 (ICOIN2008), Paradise Hotel, Busan, Korea, January 23 - Janury 25, 2008. (EI)
60 Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao, “Energy Consumption Analysis of Audio Applications on Mobile Handheld Devices,” Proceedings of IEEE TENCON 2007, Intelligent Information Communication Technologies for Better Human Life, Taipei, Taiwan, Oct. 31-Nov. 3, 2007. (EI)
61 Chu-Hsing Lin, Wen-Kui Chang, Yu-Ying Lin, and Lun-Yuen Cheng, “Binary Document Images Authentication by Thinning Digital Patterns,” The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, Nov. 26-28, 2007. (EI)
62 Chu-Hsing Lin, Jue-Sam Chou, and Yu-Wen Chen, “Integrity Protection of Document Assets by Computing Skeletons,” The Second International Conference on Innovative Computing, Information and Control (ICICIC 2007), Kumamoto, Japan, Sept. 5-7, 2007. (EI)
63 Chu-Hsing Lin, Jung-Chun Liu, Li-Ching Kuo, and Jen-Chieh Chang, “Robust Multi-scale Full-band Image Watermarking for Copyright Protection,” The 20th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA-AIE 2007), Kyoto, Japan, LNAI Vol. 4570, June 26-29, 2007, pp.176-184. (Springer-Verlag LNAI, SCI)
64 Chu-Hsing Lin; Jung-Chun Liu; Chun-Wei Liao, "Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices,” 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE07), Seoul, Korea, April 26-28, 2007, pp.120 – 125. (EI)
65 Chin-Chen Chang; Chu-Hsing Lin; Chien-Yuan Chen," A Conference Key Distribution Scheme Using Interpolating Polynomials," 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE07), Seou, Korea, April 26-28, 2007, pp.963 – 967. (EI)
66 Jen-Chieh Chang, Chu-Hsing Lin, Wei-Shen Lai, and Ruei-Hau Hsu, “Desing and Application of Batch Signature Scheme for Network Voting System,” 2007 Electronic Commerce and Digital Life Conference (ECDL 2007), Taipei, Taiwan, March 17, 2007, pp. 496-505.
67 Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin, “An Improvement of an Efficient User Identification Scheme Based on ID-based Cryptosystem,” Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06). (EI)
68 Chu-Hsing Lin, Fuu-Cheng Jiang, Yen-Lin Huang, and Chih-Hsiung Huang, ”A Secure and Efficient Model for Network Defensive Systems,”Proceedings of the International Computer Symposium 2006 (ICS 2006), Vol.2, Dec 4-6, 2006, Taipei, Taiwan, pp.856-861.
69 Chu-Hsing Lin, Chien-Liang Tsai, and Chen-Yu Lee, “A Secure Protocol for Mobile IP Using Smartcards,”Proceedings of the International Computer Symposium 2006 (ICS 2006), Vol.2, Dec 4-6, 2006, Taipei, Taiwan, pp.536-539.
70 Jung-Chun Liu, Chu-Hsing Lin, and Li-Ching Kuo, "A Robust Full-band Image Watermarking Scheme," Proceedings of 10th of International Conference of Communication Systems, Singapore, October 30 2006. (EI)
71 Chu-Hsing Lin, Hsiu-Hsia Lin, and Jen-Chieh Chang, “Multiparty Key Agreement for Secure Teleconfernecing,”2006 IEEE International Conference on Systems, Man, and Cybernetics (SMC2006), October 8-11, 2006, Taipei, Taiwan, pp.3702-3707. (EI)
72 C. C. Chang, K. L. Chen, Chu-Hsing Lin, “A Group-oriented (t, n) Threshold Signature Scheme Against Replay Attacks,” The 3rd International Conference on Ubiquitous Intelligence and Computing, Wuhan and Three Gorges, China, LNCS Vol. 4150, September 3-6, 2006, pp.816-825. (Springer-Verlag LNCS, SCI)
73 Yi-Fung Huang, Kun-Li Wen, Chu-Hsing Lin, and Jen-Chieh Chang,“A Grey Pseudo Random Number Generator,”The 16th Information Security Conference, June 8-9, 2006, Taichung, Taiwan, pp. 171-178.
74 C. H. Lin, J. S. Jen and L. C. Kuo, ”Distributed Discrete Wavelet Transformation for Copyright Protection,” 7th International Workshop on Image Analysis for Multimedia Interactive Services, Seoul, Korea, April 19-21, 2006, pp.53-56.
75 Chia-Yin Lee, Chin-Chen Chang, and Chu-Hsing Lin, “User Authentication with Anonymity for Global Mobility Networks,” IEE 2005 Mobility Conference, Guangzhou, China, November 15-17, 2005, pp.3-1B-6. (EI)
76 Chu-Hsing Lin, Wei-Shen Lai, Te-Fa Liao, “Extensive Multilayer IP Security Protocol for Wireless Networks,” 2005 Symposium on Digital Life and Internet Technologies, June 3, 2005, Tainan, Taiwan.
77 Chu-Hsing Lin, Wei-Shen Lai, Te-Fa Liao, “Improve the Throughput of 802.1b Using Forward Error Correction Function,” International Conference of Information Management (ICIM 2005), May 28, 2005, Taipei, Taiwan.
78 Chu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin and Yi-Yi Lai, “On the security of ID-based Password Authentication Scheme using Smart Cards and Fingerprints,” International Conference on Information Technology: Research and Education, Hsinchu, Taiwan, June 27-30, 2005, pp.230-232. (EI, SCI)
79 Chu-Hsing Lin, Jue-Sam Chou, Yi-Kang Ho, “A New Scheme for Remote Mutual Authentication Using Smart Card,” Conference on technology fusion of photonics, Symposium on Technology Fusion of Optoelectronics and Communications (STFOC 2005), Taipei, Taiwan, 2005, pp.70-71.
80 Chu-Hsing Lin and Wei Lee, “Efficient Secret Sharing with Access Structures in a Hierarchy,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei, Taiwan, March 28-30, 2005, Vol. 2, pp.123-126. (EI)
81 Chu-Hsing Lin, Wei Lee and Chien-Sheng Chen, “Dynamic Key Generations for Secret Sharing in Access Structures,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei, Taiwan, March 28-30, 2005, Vol.2, pp.127-130. (EI)
82 Chu-Hsing Lin and Hsiu-Hsia Lin, “Secure One-round Tripartite Authenticated Key Agreement Protocol from Weil pairing,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei, Taiwan, March 28-30, 2005, Vol. 2, pp.135-138. (EI)
83 Chia-Yin Lee, Chu-Hsing Lin and Chin-Chen Chang, “An Improved Low Computation Cost User Authentication Scheme for Mobile Communication,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei, Taiwan, March 28-30, 2005, Vol. 2, pp.249-252. (EI)
84 Chu-Hsing Lin, Wei Lee and Yi-Kang Ho, “An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei, Taiwan, March 28-30, 2005, Vol. 2, pp.399-402. (EI)
85 Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang and Kuo-Lun Chen, “Authenticated Encryption Schemes with Message Linkage for Threshold Signatures,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei, Taiwan, March 28-30, 2005, Vol. 2, pp.261-264. (EI)
86 Chu-Hsing Lin and Hsiu-Hsia Lin, “Cryptanalysis on Shim’s tripartite authenticated key agreement protocol from Weil pairing,” International Computer Symposium (ICS’2004), Taipei, Taiwan, December 15-17, 2004, pp1034-1035
87 Jue-Sam Chou,Chu-Hsing Lin,Ting-Ying Lee, “A Novel Hierarchical Key Management Scheme Based on Quadratic Residues,” Second International Symposium on Parallel and Distributed Processing and Applications (ISPA'2004), Hong Kong, China, December 13-15, 2004, LNCS 3358 Springer-Verlag, pp.858-865. (EI, SCI)
88 Chu-Hsing Lin and C. Y. Lee, “Cryptanalysis of a New Authentication Scheme with Anonymity for Wireless Environments,” Proceedings of the Second International Conference on Advances in Mobile Multimedia (MoMM 2004), Bali, Indonesia, September 22-24, 2004, pp.399-402.
89 Chu-Hsing Lin and Y. Y. Lai, “A Fingerprint-based User Authentication Scheme for Multimedia Systems,” Proceedings of the 2004 IEEE International Conference on Multimedia & Expo (ICME 2004), Taipei, Taiwan, June 27-30, 2004, Vol. 2, pp.935-938. (EI)
90 Chu-Hsing Lin, K. J. Huang and H. H. Lin, “Improving Shim's tripartite authenticated key agreement protocol based on Weil pairing,” Proceedings of 14th Information Security Conference, Taipei, Taiwan, June 10-11, 2004, pp.250-255.
91 C. T. Wang, C. C. Chang, and Chu-Hsing Lin, "Using IC Cards to Remotely Login Passwords without Verification Tables, " Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Japan, March 29-31, 2004, pp. 321-326. (EI)
92 C. T. Wang, Chu-Hsing Lin, and C. C. Chang, "Supervising Secret-Key Agreements in a Level-Based Hierarchy, " Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Japan, March 29-31, 2004, pp. 309-314. (EI)
93 Chu-Hsing Lin, W. Lee, and P. C. Hwang, "Secret Sharing with Access Structures in a Hierarchy, " Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Japan, March 29-31, 2004, pp. 31-34. (EI)
94 Chu-Hsing Lin, W. Lee, “A Simple and Secure Authentication Protocol for Global Roaming Service,” Proceedings of 10th Mobile Computing Workshop (第十屆行動計算研討會), Taichung, Taiwan, March 26, 2004, pp.231-237.
95 J. S. Chou, Chu-Hsing Lin, and J. I. Shiue, “A New Scheme for Remote User Authentication with Smart Cards,” Proceedings of International Conference on Informatics, Cybernetics, and Systems (ICICS 2003), Kaohsiung, Taiwan, December 14-16, 2003, pp.1353~1358.
96 Chu-Hsing Lin, J. S. Chou, T. Y. Lee, “A Secure Scheme for Users Classification and Contents Protection in Video-on-demand Systems,” Proceedings of International Conference on Informatics, Cybernetics, and Systems (ICICS 2003), Kaohsiung, Taiwan, December 14-16, 2003, pp.1347-1352.
97 Y. F. Huang, K.L. Wen, R. H. Hsu, and Chu-Hsing Lin, Infinite Generating Keys Based on Public System, Proceedings of IEEE International Conference On Systems, Man and Cybernetics, Washington, D.C., USA, October 5-8, 2003, pp. 3238-3243. (EI)
98 Y. S. Yeh, Chu-Hsing Lin, and W. S. Lai, “Apply SHA and RSA to Construct Non-deterministic Message Authentication Code,” Proceedings of 13th Information Security Conference, August 28-29, 2003, pp. 175-180.
99 Chu-Hsing Lin and T. K. Liu, “On the Security of Authenticated Key Agreement Protocols,” 2003年資訊技術應用與發展研討會,Taiwan, June 28, 2003, pp.94-98.
100 Chu-hsing Lin and K. L. Hwang, “Authenticated Key Agreement Based on Elliptic Curve Cryptography,” 第三屆離島資訊技術與應用研討會,Taiwan, June, 2003.
101 C. T. Wang, C. C. Chang and Chu-Hsing Lin, “Signature Scheme based on Two Hard Problems Simultaneously,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA2003), China, March 27-29, 2003, pp.557-560. (EI)
102 C. C. Chang, Y. T. Kao and Chu-Hsing Lin, “Fast Algorithms for Common-Multiplicands Multiplication and Exponentiation by Performing Complements,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA2003), China, March 27-29, 2003, pp.807-811. (EI)
103 Chu-Hsing Lin and C. Y. Lee, “A Software Protection System for Internet Commerce,” Proceedings Third IEEE Pacific Rim Conference on Multimedia, Hsinchu, Taiwan, December 2002; Advances in Multimedia Information Processing- PCM 2002, LNCS 2532 Springer-Verlag, pp.1033-1040. (EI, SCI)
104 Chu-Hsing Lin, C. Y. Lee and C. Y. Lee, “On How to Make the Hill Cipher Secure,” Proceedings of Workshop on Consumer Electronics (WCE 2002), Hsinchu, Taiwan, December 16, 2002, pp.18-21.
105 Chu-Hsing Lin and C. Y. Lee, “Dynamic Triple-DES,” Proceedings of the 2002 International Conference on Cryptology and Information Security—joint conference International Computer Symposium, Hsinchu, Taiwan, December 18-21, 2002, pp.1001-1003.
106 Chu-Hsing Lin and C. Y. Lee, “Keyed/Unkeyed SHA-2,” Proceedings of the Second International Workshop for Asian PKI, 2002, pp.77-81.
107 林祝興、李維貞,運用XML結構的角色機存取控制系統,Proceedings of the 13th International Conference on Information Management, May 25, 2002, Taipei, Taiwan, pp.59-66.
108 Lee, C. H. and Chu-Hsing Lin, “An Efficient Hierarchical Key Management Scheme Based on Elliptic Curves,” Proceedings of 12th National Information Security Conference, Taichung, Taiwan, May 16-17, 2002.
109 Lee, C. L. and Chu-hsing Lin, “Elliptic-Curve Undeniable Signatures using Smart Cards,” Proceedings of 12th National Information Security Conference, Taichung, Taiwan, May 16-17, 2002.
110 Lee, C. L. and Chu-Hsing Lin, “RSA-based Undeniable Signature using Smart Cards,” Proceedings of National Computer Symposium – Joint Conference on Information Security, Taipei, Taiwan, December 2001, ppF009-F018.
111 Chu-Hsing Lin and C. Y. Lee, “One-time Installation with Traitors Tracing for Copyright Program,” Proceedings of IEEE 35th International Carnahan Conference on Security Technology, London, UK, October 16-19, 2001, pp. 149-155 (EI)
112 Chu-Hsing Lin, T. C. Lee, and Y. C. Chen, “A Dynamic Stego-scheme for Data Protection,” Proceedings of The 2001 International Workshop on Cryptology and Network Security, Taipei, Taiwan, September 26-28, 2001, pp.219-226.
113 Wang, C. T., C. C. Chang, and Chu-Hsing Lin, “Group-oriented Authenticated Encryption Based on Self-certified Public Keys,” Proceedings of The Second International Workshop on Information Security Applications, Seoul, Korea, September 13-14, 2001, pp.385-395.
114 Chu-Hsing Lin and F. C. Jiang, “Copyright Protection of MP3 Files Using Watermarking Technique,” The 2nd International Conference on Parallel and Distributed Computing, Applications, and Technologies, Taipei, Taiwan, July 9-11, 2001, pp307-312.
115 Chu-Hsing Lin, and C. L. Lee, “Elliptic-curve Undeniable Signature Schemes,” Proceedings of 11th National Conference on Information Security, Tainan Taiwan, May 3-4, 2001, pp.331-338.
116 Chu-Hsing Lin, and S. W. Wang, “A Group-oriented Signature Scheme for Limited-bandwidth Devices in Wireless Environment,” Proceedings of 11th National Conference on Information Security, Tainan Taiwan, May 3-4, 2001, pp.339-347.
117 林祝興 王琇緯,入侵Redhat系統實例研究,21世紀數位生活與網際網路科技研討會,成功大學,May 2001。
118 林祝興 李鎮宇 葉義雄,植基於智慧卡的軟體保護機制,21世紀數位生活與網際網路科技研討會,成功大學,May 2001。
119 林祝興 王保利,一個適用於無線網路環境的安全通道之建立,21世紀數位生活與網際網路科技研討會,成功大學,May 2001。
120 Chu-Hsing Lin and K. H. Yang, “An Electronic Cash System Using Visual Secret Sharing,” Proceedings of TANET 2000, Tainan, Taiwan, 2000, pp.655-660.
121 Chu-Hsing Lin and C. Y. Lee, “A Software Protection Scheme on Internet: One-Time Install Solution,” Proceedings of 2000 Workshop on Internet & Distributed Systems, Taiwan, Taiwan, May 11-12, 2000, pp.438-441.
122 Chu-Hsing Lin and S. W. Wang, “Design and Implementation of a Secure Virtual Mall,” Proceedings of 2000 Workshop on Internet & Distributed Systems, Taiwan, Taiwan, May 11-12, 2000, pp.383-389.
123 Huang, D. Y., Y. S. Yeh, and Chu-Hsing Lin, “Generalized IDEA,” Proceedings of the 10th National Conference on Information Security, Hualein, Taiwan, May 4-6, 2000, pp. 161-167.
124 Wang, C. T., C. C. Chang, and Chu-Hsing Lin, “A New Micro-Payment System Using General Payword Chain,” Proceedings of the 10th National Conference on Information Security, Hualein, Taiwan, May 4-6, 2000, pp. 207-213.
125 Yeh, Y. S., Chu-Hsing Lin, Lai, W. S., and Wang, S. W. “Implementation of Modified PGP,” Journal of Computers, Vol. 12, No. 1, March 2000.
126 Chu-Hsing Lin, Y. S. Yeh, and J. S. Chou, “A Design of HiPi Cryptoscheme,” Proceedings of The Eighth National Conference on Science And Technology of National Defense, November 20, 1999, pp. 1-14. (in CD A01.doc)
127 Chu-Hsing Lin and W. C. Wu, “Image Protections in Networks – A Fractal Virtual Image Cryptosystem,” Proceedings of 1999 Workshop on Distributed System Technologies & Applications, Tainan, Taiwan, May 13-14, 1999, pp.25-34.
128 Yeh, Y. S., Chu-Hsing Lin and C. C. Wang, “Dynamic DES,” Proceedings of the Ninth National Conference on Information Security, Taichung, Taiwan, May 14-15, 1999, pp. 221-224.
129 Yeh, Y. S., Chu-Hsing Lin, Y. C. Hsieh and M. S. Chang, “One-Way Hash Functions with MVL Expressions,” Proceedings of the Eighth National Conference on Information Security, Kaoshiung, Taiwan, May 1998, pp. 337-346.
130 Chu-Hsing Lin “Integrated Key Management Schemes for Multi-Level Access Control,” 1998 Workshop on Distributed System Technologies and Applications, Taiwan, 1998, pp. 653-661.
131 Wang, C. T., C. C. Chang and Chu-Hsing Lin, “Group-oriented Threshold Signature Schemes with Traceable Signers,” Proceedings of National Computer Symposium, Taichung, Taiwan, December 1997, pp. C-114-119.
132 Chu-Hsing Lin, C. Y. Dai and T. S. Wu, “On the Secrecy of Image Transmission in Computer Network,” Proceedings 14th Workshop on Combinatorial Mathematics and Computation Theory, Taichung, Taiwan, June 1997, pp. 57-61.
133 Shieh, Y. H. and Chu-Hsing Lin, "Clamped Spline Public Key Cryptosystem," Proceedings of 6th Information Security Conference, Taichung, Taiwan, May 8, 1996.
134 Chang, C. C. and Chu-Hsing Lin "How to Converse Securely in a Conference," Proceedings of 30th IEEE Annual International Carnahan Conference on Security Technology, Lexington, Kentucky, October 2-4, 1996. (EI)
135 Chu-Hsing Lin and C. T. Wang, “Integrated authentication Based on Identities,” Proceedings of 30th IEEE Annual International Carnahan Conference on Security Technology, Lexington, Kentucky, October 2-4, 1996. (EI)
136 Chu-Hsing Lin and T. C. Lee, “A Confused Document Encrypting Scheme and Its Implementation,” Proceedings of 1996 International Conference on Cryptology and Information Security—join with 1996 International Computer Symposium, 1996.
137 Chu-Hsing Lin and C. T. Wang, "A New Undeniable Signature Scheme and Its Applications to Group Communications," Proceedings of National Computer Symposium, Taoyen, Taiwan, December 1995, pp.397-403.
138 Jan, J. K., Chu-Hsing Lin and G. C. Lee, "Keys Minimization in Single-Key Access Control Schemes," Proceedings of 11th Workshop on Combinatorial Mathematics and Computation Theory, May 6, 1995, pp. 61-65.
139 Chu-Hsing Lin "On the Group Oriented Secure Communication Schemes," Proceedings The Third Conference on Information Security, Chiayi, Taiwan, May 12, 1993, Section B2, pp.1-12.
140 Chu-Hsing Lin, C. C. Chang and R. C. T. Lee, "An Interactive Message Authentication Scheme," The Second Conference on Information Security, May 6, 1992, Tainan, Taiwan, pp.105-120.
141 Chang, C. C. and Chu-Hsing Lin, " An ID-based Signature Scheme Based Upon Rabin's Public Key Cryptosystem," Proceedins 25th Annual IEEE International Carnahan Conference on Security Technology, October 1-3, 1991, pp. 139-141. (EI)
142 Chen, W. T., Chu-Hsing Lin and W. C. Hwang, " An Adaptive Approach to Quantization for Video Image Compression," Proceedings of 1988 Telecommunications Symposium, Hsinchu, Taiwan, 1988, pp. 253-259.
143 Chang, C. C. and Chu-Hsing Lin, " An Information Secure Broadcasting Scheme Based upon Galosis Field Algebra," International Symposium MINI and MICROCOMPUTERS, Miami, U. S. A, December 1988.
144 Chang, C. C., M. D. Hsiao and Chu-Hsing Lin, " Algorithms to Allocate A File for Concurrent Disk Accessing," Proceedings of the 6th Advanced Database Symposium, Tokyo, Japan, August 1986, pp. 201-205.
145 Chang, C. C. and Chu-Hsing Lin, "A Fast Algorithm for Neareast Neighbor Search," Proceedings of National Computer Symposium, Kaohsiung, Taiwan, December 1985, pp. 625-635.
順序 名稱
1 林祝興、張明信,資訊安全概論 第二版,2016-03,旗標出版股份有限公司.
2 王旭正、林祝興、左瑞麟,數位鑑識:證據力與行動智慧應用,博碩文化,2013。
3 林祝興、黃志雄,資訊安全實務:數位憑證技術與應用,全華圖書,2011。
4 林祝興、張明信,資訊安全導論,416頁,旗標出版社,2009年4月。
5 王旭正、林祝興、ICCL資訊密碼暨建構實驗室,數位科技安全與鑑識-高科技犯罪預防與數位證據偵蒐,博碩,2009年3月。
6 資訊安全技術與應用,林祝興、張真誠合著,2005。
7 林祝興,張真誠,電子商務安全技術與應用,旗標出版公司,2004。
8 林祝興等,數位憑證技術,旗標出版公司,2004。
9 林祝興、 張真誠,電子商務安全技術與應用,旗標出版公司,2003。
10 Lin, C. H., “Integrated Key Management Schemes for Multilevel Access Control,” Technical Report, NSC-86-2213-E029-002, 1997.
11 Lin, C. H., “Integrated Authentications Based on Identities,” Technical Report, NSC-85-2213-E-029-001, 1996.
順序 名稱
1 Chu-Hsing Lin, “分散式安全系統在嵌入式平台之設計與實作(2/3),” Technical Report, National Science Council of ROC, NSC95-2221-E029-020-MY3, 2008.
2 Chu-Hsing Lin, “分散式安全系統在嵌入式平台之設計與實作(1/3),” Technical Report, National Science Council of ROC, NSC95-2221-E029-020-MY3, 2007.
3 Chu-Hsing Lin and Wen-Kui Chang, “植基於資料隱藏的文件完整性驗證技術之設計與實作,” Technical Report, National Science Council of ROC, NSC95-2221-E029-019, 2007.
4 Chu-Hsing Lin, “智慧型行車導航系統,” Technical Report, National Science Council of ROC, NSC94-2218-E029-002, 2006.
5 W. S. Lai, and Chu-Hsing Lin, “高效能之整批式簽章驗證機制之設計與建置,” Technical Report, National Science Council of ROC, NSC 94-2213-E-270-009, 2006.
6 Chu-Hsing Lin, “智慧型行車資訊系統之設計與實作,” Technical Report, National Science Council of ROC, NSC 94-2218-E-029-002, 2006.
7 Chu-Hsing Lin, and Y. S. Yeh, “智慧型網路安全防衛系統之設計與實作(3/3),” Technical Report, National Science Council of ROC, NSC 94-2213-E-029-001, 2006.
8 Chu-Hsing Lin, and Y. S. Yeh, “智慧型網路安全防衛系統之設計與實作(2/3),” Technical Report, National Science Council of ROC, NSC 93-2213-E-029-009, 2005.
9 林祝興, “一種應用於ERP系統的流程簽章之設計與製作,” Technical Report, National Science Council of ROC, NSC 93-2622-E-029-005-CC3029-005-CC3, 2004.
10 Chu-Hsing Lin, and Y. S. Yeh, “智慧型網路安全防衛系統之設計與實作(1/3),” Technical Report, National Science Council of ROC, NSC 92-2213-E-029-017, 2004.
11 林祝興,”一種具強韌性及適用於多種數位影像型態之數位浮水印系統設計與製作”,技術報告,行政院國家科學委員會,NSC 92-2622-E-029-006-CC3029-006-CC3, 2004.
12 Y. S. Yeh, and Chu-Hsing Lin, “行動代理人環境之入侵偵測系統之設計與實作,” Technical Report, National Science Council of ROC, NSC 91-2213-E-009–084, 2003.
13 Chu-Hsing Lin, and Y. S. Yeh, “電子競標系統之設計與製作(3/3)---子計畫一: 個別廠商資料庫之設計與製作,” Technical Report, National Science Council of ROC, NSC-91-2213-E-029-003, 2003.
14 Chu-Hsing Lin, and Y. S. Yeh, “安全遠端防火牆管理與稽核分析系統之設計與實作”, Technical Report,中山科學研究院第一研究所, XW91156P041 P00, 2002.
15 Chu-Hsing Lin, and Y. S. Yeh, “電子競標系統之設計與製作(2/3)---子計畫一: 個別廠商資料庫之設計與製作,” Technical Report, National Science Council of ROC, NSC-90-2213-E-029-004, 2002.
16 Chu-Hsing Lin, and Y. S. Yeh, “無線環境上群體簽章技術之研究與實作,” Technical Report, National Science Council of ROC, NSC-90-2213-E-029-009, 2002.
17 Chu-Hsing Lin, and Y. S. Yeh, “軟體式防火牆整合應用之研究”, Technical Report,中山科學研究院第一研究所, XW90368P 217 P00, 2001.
18 Chu-Hsing Lin, and Y. S. Yeh, “電子競標系統之設計與製作(1/3)---子計畫一: 個別廠商資料庫之設計與製作,” Technical Report, National Science Council of ROC, NSC-89-2213-E-029-023, 2001.
19 Chu-Hsing Lin and Y. S. Yeh, “Design and Implementation of RC6 and CAST-256 Against Fault-Based Attacks,” Technical Report Part III, National Science Council of ROC, NSC-89-2213-E-029-037, 2001.
20 Yeh, Y. S. and Chu-Hsing Lin,”設計及實現非決定性的MAC,” Technical Report, National Science Council of ROC, NSC-89-2213-E-009-156, 2000.
21 Chu-Hsing Lin and Y. S. Yeh, “Design and Implementation of RC6 and CAST-256 Against Fault-Based Attacks,” Technical Report Part II, National Science Council of ROC, NSC-89-2213-E-029-005, 2000.
22 Yeh, Y. S. and Chu-Hsing Lin, “PGP 改進的研究及實作,” Technical Report, National Science Council of ROC, NSC 89-2213-E-009-005, 2000.
23 Chu-Hsing Lin and Y. S. Yeh, “Design and Implementation of RC5 and GOST Against Fault-Based Attacks,” Technical Report Part I, National Science Council of ROC, NSC-88-2213-E-029-007, 1999.
24 Chu-Hsing Lin, “A Study on Image Protection for Networking Systems,” Technical Report, National Science Council of ROC, NSC-87-2213-E-029-001, 1998.
25 Chu-Hsing Lin, “Integrated Key Management Schemes for Multilevel Access Control,” Technical Report, National Science Council of ROC, NSC-86-2213-E-029-002, 1997.
26 Chu-Hsing Lin, “Integrated Authentications Based on Identities,” Technical Report, National Science Council of ROC, NSC-85-2213-E-029-001, 1996.
27 Chu-Hsing Lin and C. S. Chen, “Dynamic Cryptographic Key Management Schemes in Multilevel Data Security,” Technical Report TR95-12, Department of Computer and Information Sciences, Tunghai University, Taichung, Taiwan, 1995.
28 Chu-Hsing Lin "A Practical Undeniable Signature Scheme for Group-oriented Systems," Technical Report, National Science Council of ROC, NSC-84-2213-E-029-001, 1995.
29 Chang, C. C. and Chu-Hsing Lin, "An Efficient Conference Key Distribution Scheme Using Interpolating Polynomials," Technical Report TR94-08, Department of Computer and Information Sciences, Tunghai University, Taichung, Taiwan, 1994.
30 Chu-Hsing Lin and C. C. Chang, "A New Public-Key Cryptosystem," Technical Report TR93-08, Department of Computer and Information Sciences, Tunghai University, Taichung, Taiwan, 1993.
順序 計畫名稱 計畫所屬機構 計畫編號 計畫日期
1 (108)對抗共存攻擊之雲端安全與隱私機制及在醫療之應用(2/3) 科技部計畫 MOST 107-2221-E-029-005-MY3 108/08/01
2 (107)對抗共存攻擊之雲端安全與隱私機制及在醫療之應用(1/3) 科技部計畫 107-2221-E-029-005-MY3 107/08/01
3 遵循個資法的高準確與即時化隱私衝擊評估系統之開發(2/2) 科技部計畫 105-2221-E-029-012-MY2 106/08/01
4 遵循個資法的高準確與即時化隱私衝擊評估系統之開發(1/2) 科技部計畫 MOST 105-2221-E-029 -012 -MY2 105/08/01
5 個資法法規遵循的本土化隱私衝擊評鑑在桌上型電腦之發展與實作* 科技部計畫 MOST 104-2221-E-029-009 104/08/01
6 利用GPU平行化加速基因演算法效能策略之開發與應用 科技部計畫 MOST 103-2221-E-029 -020 103/08~104/07
7 結合雲端技術與GPU平行化特性設計與實作最佳行車時間之智慧型導航系統NSC102-2221-E-029-013 國科會個人研究計畫 NSC102-2221-E-029-013 2013/8/1
8 補助國內大專院校購置 S&P Compustat 企業財務分析資料庫專案102-2420-H-029-004-ED 國科會個人研究計畫 102-2420-H-029-004-ED 2013/1/1
9 補助國內大專院校購置 Datastream 財經資訊資料庫專案101-2420-H-029-006-ED 國科會個人研究計畫 101-2420-H-029-006-ED 2012/12/1
10 智慧型網路安全防衛系統之設計與實作(3/3) 國科會個人研究計畫 1002218 2011/8/1
11 應用於智慧電網之先進民生電能管理節能系統研發(3/3) 國科會個人研究計畫 1002218 2011/8/1
12 具資料備援低電耗及高安全的無線感測網路之設計與實作(1/3) 國科會個人研究計畫 992221 2010/8/1
13 具資料備援低電耗及高安全的無線感測網路之設計與實作(2/3)NSC99-2221-E-029-034-MY3 國科會個人研究計畫 992221 2010/8/1
14 具資料備援低電耗及高安全的無線感測網路之設計與實作(3/3)NSC99-2221-E-029-034-MY3 國科會個人研究計畫 992221 2010/8/1
15 網路鑑識環境數位影像驗證與偵測技術之研究(資安專案分項:國際合作研究計畫) 國科會個人研究計畫 98622 2009/10/1
16 網路鑑識環境數位影像驗證與偵測技術之研究(資安專案分項: 國際合作研究計畫) 國科會個人研究計畫 98656 2009/10/1
17 主動式全方位隨處照護系統之設計與實作* 國科會個人研究計畫 98410 2009/8/1
18 主動式全方位隨處照護系統之設計與實作 國科會個人研究計畫 98655 2009/8/1
19 主動式全方位隨處照護系統之設計與實作 國科會個人研究計畫 982221 2009/8/1
20 網路鑑識環境數位影像驗證與偵測技術之研究(資安專案分項: 國際合作研究計畫) 國科會個人研究計畫 982218 2009/8/1
21 分散式網路安全系統在嵌入式平台之設計與實作(3/3) 國科會個人研究計畫 97540 2008/8/1
22 分散式網路安全系統在嵌入式平台之設計與實作(3/3) 國科會個人研究計畫 97556 2008/8/1
23 東海大學跨學門科學人才培育銜接計畫子計畫---多媒體數位內容保護跨領域人才之培育 教育部研究計畫 97100 2008/2/1
24 教育部資通訊課程推廣計畫 教育部研究計畫 96525 2007/12/1
25 分散式網路安全系統在嵌入式平台之設計與實作(2/3) 國科會個人研究計畫 96430 2007/8/1
26 分散式網路安全系統在嵌入式平台之設計與實作(2/3) 國科會個人研究計畫 96591 2007/8/1
27 95年大專院校資訊人才培育先導計型畫—資通安全聯盟—資訊安全導論 教育部研究計畫 95347 2006/10/1
28 大專校院資訊人才培育先導型計畫-前瞻課程發展計畫 教育部卓越計畫 95904 2006/10/1
29 PKI應用發展與實施模式-中部場經費 其他研究合作計畫 95932 2006/9/18
30 東海大學重點系所獎勵計畫(3/3) 其他研究合作計畫 95321 2006/8/1
31 植基於資料隱藏的文件完整性驗證技術之設計與實作 國科會個人研究計畫 95320 2006/8/1
32 分散式網路安全系統在嵌入式平台之設計與實作(1/3) 國科會個人研究計畫 95789 2006/8/1
33 高效能之整批式簽章驗證機制之設計與建置 國科會個人研究計畫 94106 2005/8/1
34 智慧型網路安全防衛系統之設計與實作(3/3) 國科會個人研究計畫 94105 2005/8/1
35 東海大學重點系所獎勵計畫(2/3) 其他研究合作計畫 94104 2005/8/1
36 94年度大學科技系所人才培育計畫--A計畫 教育部研究計畫 94103 2005/8/1
37 智慧型行車資訊系統之設計與實作 國科會個人研究計畫 94102 2005/8/1
38 高效能之整批式簽章驗證機制之設計與建置 國科會個人研究計畫 94046 2005/8/1
39 東海大學重點系所獎勵計畫(2/3) 其他研究合作計畫 94045 2005/8/1
40 94年度大學科技系所人才培育計畫--A計畫 教育部卓越計畫 94044 2005/8/1
41 東海大學重點系所獎勵計畫(1/3) 其他研究合作計畫 94048 2005/8/1
42 智慧型行車資訊系統之設計與實作 國科會個人研究計畫 95252 2005/8/1
43 智慧型網路安全防衛系統之設計與實作(3/3) 國科會個人研究計畫 95251 2005/8/1
44 Java Card Combine with JSP for Exam and License System 國科會個人研究計畫 94047 2005/7/1
45 一種應用於ERP系統的流程簽章之設計與製作 國科會個人研究計畫 93042 2004/11/30
46 一種應用於ERP系統的流程簽章之設計與製作 國科會產學合作計畫 93119 2004/11/1
47 智慧型網路安全防衛系統之設計與實作(2/3) 國科會個人研究計畫 93121 2004/8/1
48 東海大學重點系所獎勵計畫(1/3) 教育部研究計畫 93118 2004/8/1
49 行動代理人環境之入侵偵測系統之設計與實作(2/2) 國科會個人研究計畫 93120 2004/8/1
50 93年度大學科技系所人才培育計畫--A計畫 教育部研究計畫 93117 2004/8/1
51 93年度大學科技系所人才培育計畫--A計畫 教育部卓越計畫 93041 2004/8/1
52 智慧型網路安全防衛系統之設計與實作(2/3) 國科會個人研究計畫 93045 2004/8/1
53 行動代理人環境之入侵偵測系統之設計與實作(2/2) 國科會個人研究計畫 93044 2004/8/1
54 應用行動代理人與電子憑證技術建置安全的求職環境 國科會個人研究計畫 93043 2004/7/1
55 智慧型網路安全防衛系統之設計與實作(1/3) 國科會個人研究計畫 92097 2003/8/1
56 行動代理人環境之入侵偵測系統之設計與實作(1/2) 國科會個人研究計畫 92028 2003/8/1
57 智慧型網路安全防衛系統之設計與實作(1/3) 國科會個人研究計畫 92029 2003/8/1
58 應用Java Card實作智慧型行動安全競標網站 國科會個人研究計畫 92030 2003/7/1
59 一種具強韌性及適用於多種數位影像型態之數位浮水印系統之研製 國科會個人研究計畫 92031 2003/6/30
60 一種具強韌性及適用於多種數位影像型態之數位浮水印系統之研製 國科會產學合作計畫 92098 2003/6/1
61 電子競標系統之設計與製作(3/3)---子計畫一: 個別廠商資料庫之設計與製作 跨校國科會研究計畫 91078 2002/8/1
62 行動代理人環境之入侵偵測系統之設計與實作 國科會個人研究計畫 91077 2002/8/1
63 行動代理人環境之入侵偵測系統之設計與實作 國科會個人研究計畫 91023 2002/8/1
64 電子競標系統之設計與製作(3/3)---子計畫一: 個別廠商資料庫之設計與製作 國科會個人研究計畫 91024 2002/8/1
65 一個快速且安全的電子病例分享模式 其他研究合作計畫 91075 2002/7/1
66 一個快速且安全的電子病例分享模式 其他研究合作計畫 91021 2002/7/1
67 安全遠端防火牆管理與稽核分析系統設計與製作 其他研究合作計畫 91076 2002/3/1
68 安全遠端防火牆管理與稽核分析系統設計與製作 其他研究合作計畫 91022 2002/3/1
69 有安全機制之遠端連線通訊協定之設計與製作 II 國科會個人研究計畫 91079 2002/1/1
70 有安全機制之遠端連線通訊協定之設計與製作 II 其他研究合作計畫 91025 2002/1/1
71 軟體式防火牆整合應用之研究 其他研究合作計畫 90069 2001/9/1
72 軟體式防火牆整合應用之研究 其他研究合作計畫 90022 2001/9/1
73 電子公文管理系統 國科會個人研究計畫 90068 2001/8/1
74 無線環境上群體簽章技術之研究與實作 國科會個人研究計畫 90067 2001/8/1
75 電子競標系統之設計與製作(2/3)---子計畫一: 個別廠商資料庫之設計與製作 跨校國科會研究計畫 90066 2001/8/1
76 電子公文管理系統 國科會個人研究計畫 90021 2001/8/1
77 電子競標系統之設計與製作(2/3)---子計畫一: 個別廠商資料庫之設計與製作 國科會個人研究計畫 90019 2001/8/1
78 無線環境上群體簽章技術之研究與實作 國科會個人研究計畫 90020 2001/8/1
79 參加2001Eurocrypt研討會暨參訪相關資訊安全研究機構 國科會個人研究計畫 90024 2001/5/5
80 有安全機制之遠端連線通訊協定之設計與製作 其他研究合作計畫 90070 2001/1/1
81 有安全機制之遠端連線通訊協定之設計與製作 其他研究合作計畫 90023 2001/1/1
82 PGP 改進的研究及實作 國科會個人研究計畫 89072 2000/8/1
83 具抵擋錯誤攻擊能力之RC6及CAST-256之研製(3/3) 跨校國科會研究計畫 89071 2000/8/1
84 設計及實現非決定性的MAC 國科會個人研究計畫 89070 2000/8/1
85 電子競標系統之設計與製作(1/3)---子計畫一: 個別廠商資料庫之設計與製作 跨校國科會研究計畫 89069 2000/8/1
86 電子競標系統之設計與製作(1/3)---子計畫一: 個別廠商資料庫之設計與製作 國科會個人研究計畫 89018 2000/8/1
87 PGP 改進的研究及實作 國科會個人研究計畫 89021 2000/8/1
88 設計及實現非決定性的MAC 國科會個人研究計畫 89019 2000/8/1
89 具抵擋錯誤攻擊能力之RC6及CAST-256之研製(3/3) 國科會個人研究計畫 89020 2000/8/1
90 符合AES標準之衍生DES密碼系統之研究 其他研究合作計畫 89074 2000/1/1
91 資訊安全教學網站規劃與建置 教育部研究計畫 89073 2000/1/1
92 符合AES標準之衍生DES密碼系統之研究 其他研究合作計畫 89023 2000/1/1
93 資訊安全教學網站規劃與建置 教育部研究計畫 89022 2000/1/1
94 具抵擋錯誤攻擊能力之RC6及CAST-256之研製(2/3) 跨校國科會研究計畫 88039 1999/8/1
95 具抵擋錯誤攻擊能力之RC6及CAST-256之研製(2/3) 國科會個人研究計畫 88008 1999/8/1
96 電子商務本土化教材大綱編纂 教育部研究計畫 88040 1999/1/1
97 電子商務本土化教材大綱編纂 教育部卓越計畫 88009 1999/1/1
98 制定通信安全密碼模組技術規範及開發相關驗證技術(整體計畫) 其他研究合作計畫 87038 1998/10/1
99 制定通信安全密碼模組技術規範及開發相關驗證技術(整體計畫) 其他研究合作計畫 87009 1998/10/1
100 具抵擋錯誤攻擊能力之RC5及GOST之研製 跨校國科會研究計畫 87037 1998/8/1
101 具抵擋錯誤攻擊能力之RC5及GOST之研製Design and Implementation of RC5 and GOST Against Fault-Based Attacks 國科會個人研究計畫 87008 1998/8/1
102 台灣樹蛙與金門鳥類的呼喚---光碟上網計畫 個人研究計畫(以個人名義合作) 87010 1998/4/30
103 台灣樹蛙與金門鳥類的呼喚---光碟上網計畫 其他研究合作計畫 87039 1998/4/1
104 網路上影像資料保密方法之研究 國科會個人研究計畫 86032 1997/8/1
105 網路上影像資料保密方法之研究 國科會個人研究計畫 86004 1997/8/1
106 多層次存取控制之整合性金匙管理策略研究 國科會個人研究計畫 85034 1996/8/1
107 多層次存取控制之整合性金匙管理策略研究Integrated Key Management Schemes for Multilevel Access Control 國科會個人研究計畫 85009 1996/8/1
108 植基於身分碼的整合性驗證方法之研究 國科會個人研究計畫 84028 1995/8/1
109 植基於身分碼的整合性驗證方法之研究 國科會個人研究計畫 84008 1995/8/1
110 適於群體導向系統的實用性無爭議簽章方法之研究 國科會個人研究計畫 83023 1994/8/1
111 適於群體導向系統的實用性無爭議簽章方法之研究 國科會個人研究計畫 83009 1994/8/1
順序 作品名稱/活動名稱/主題 邀請單位 地點 日期
1 認識勒索軟體 (Understanding Ransomware) 台中市電腦公會  台中國際商展會館 2016/08/05
2 Undeniable Signatures 雲林科技大學資管系 雲林 1996-05-01~1996-05-01
3 網路安全技術 台灣師範大學 台北 1996-10-01~1996-10-01
4 資訊系統與現代化企業 品質學會 台中 1997-05-24~1997-05-24
5 影像資訊保密技術 台灣科技大學電子系 台北 1997-12-19~1997-12-19
6 電子商業的未來 扶輪社 台中 1998-04-01~1998-04-01
7 網路世界的美麗與哀愁(資訊巡迴演講) 中興大學、教育部 台中 1998-05-15~1998-05-15
8 網路世界的善與惡 知德工商、嘉義縣政府 嘉義 1998-06-24~1998-06-25
9 校園網路之規劃與建置 埔里高工 台中 1998-10-01~1998-10-01
10 Invited Panelist: Security Technology in Electronic Commerce MOE,NSC,IEEE 台南 1998-12-16~1998-12-16
11 網路商業安全淺析---電子金錢(網路資訊安全研討會) 南開工商專校 台中 1998-12-11~1998-12-11
12 Generalized GOST and Generalized DES 中興大學資科所 台中 1999-03-25~1999-03-25
13 美國聯邦資訊處理標準FIPS 140-1 中華民國資訊安全學會 台北 1999-04-19~1999-04-19
14 網路安全事件分析與評估 台糖公司訓練中心 台南 1999-05-19~1999-05-19
15 密碼模組驗證技術 國防部通信資訊局 台北 1999-08-24~1999-08-24
16 引言人及主持人(資訊安全政策研討會) 中華民國資訊安全學會 台北 1999-11-25~1999-11-26
17 迎向電子商務的新世紀 中國生產力中心 台中 2000-04-28~2000-04-28
18 企業網路保全策略 東海大學企研所 台中 2000-04-12~2000-04-12
19 台灣虛擬商店現況與未來 自行車產業研究中心 台中 2000-03-28~2000-03-28
20 電子證書與認證中心(網路資訊安全研討會) 南開工商專校 台中 2000-05-19~2000-05-19
21 美國新一代保密標準AES Rijndaell Algorithm 國科會工程處、中華民國資安學會 台北 2001-03-01~2001-03-01
22 Hierarchical Key Management Schemes 國立彰化師範大學資訊管理系 彰化 2002-02-01~2002-02-01
23 電子商務簽章 嶺東技術學院 資訊學院 台中 2004-04-01~2004-04-01
24 『從金石到位元』?電子簽章法之技術介紹 經濟部(商業司) 台北 2004-05-01~2004-05-01
25 Batch Verification Techniques 中興大學資訊科學研究所 台中 2004-06-17~2004-06-17
26 實際資訊安全(Physical Security) 長庚大學企業管理研究所 桃園 2004-08-24~2004-08-24
27 資訊安全管理 中區國稅局 台中 2004-08-20~2004-08-30
28 網路攻擊分析 橋光技術學院資管系 台中 2004-12-15~2004-12-15
29 自然人憑證與應用 大同公司資訊系統處 台中 2004-12-21~2004-12-21
30 整批簽章技術Batch Verification Techniques 彰化師範大學資訊管理學系 彰化 2006-09-25~2006-09-25
31 PKI與電子商務安全 逢甲大學、中興大學 台中 2007-03-02~2007-03-02
32 保護數位內容完整性的安全機制之探討 高雄師範大學資訊教育研究所 高雄 2007-05-09~2007-05-09
33 Binary Document Authentication by Computing Digital Patterns 中興大學資訊科學系 台中 2007-06-01~2007-06-01
34 認識資訊時代的危險與對策 彰化看守所 彰化看守所 2007/09/11~2007/09/11
35 電腦資訊安全之觀念與方法 彰化看守所 彰化看守所 2007/09/12~2007/09/12
36 Tamper Detection Techniques for Binary Text Documents Protection 朝陽科技大學資管系 朝陽科技大學 2008/05/26~2008/05/26
37 Routing Protocols with Data Salvation for Mobile Ad hoc Networks 朝陽科技大學資訊工程系 朝陽科技大學 2009/03/06~2009/03/06
38 Backup Routing Protocols in Mobile Adhoc Networks 靜宜大學資訊傳播系 靜宜大學 2010/03/26~2010/03/26
39 電子憑證技術與應用 靜宜大學應用數學系 靜宜大學 2010/11/16~2010/11/16
40 100年度南區資通安全種子師資研習營:資訊安全導論 高雄中山大學 高雄中山大學 2011/05/12~2011/05/12
41 無線隨意網路資料備援問題探討 長榮大學管理學院 長榮大學 2011/05/18~2011/05/18
42 二元文件完整性驗證技術探討 彰化師範大學數位內容科技與管理研究所 彰化師範大學 2011/07/12~2011/07/12
43 臺灣PKI應用體系建設情況及對電子商務的影響 海峽兩岸電子認證應用交流會,中華電子商務產業協會,福建省福州市 2011/12/08~2011/12/09
44 公鑰基礎建設與電子商務應用 彰化師範大學資訊管理系 彰化師範大學 2012/06/08~2012/06/08
45 使用網路常見的一些風險與對策 靜宜大學資訊傳播系 靜宜大學 2012/10/01~2012/10/01
46 數位憑證技術及其應用 台中教育大學資訊科學系 台中教育大學 2012/11/19~2012/11/19
47 資訊安全導論教材介紹與教學分享 台北文化大學 台北文化大學 2012/12/21~2012/12/21
48 Batch Verifications and Its Aoolications 雲林科技大學資訊管理研究所 雲林科技大學 2013/01/09~2013/01/09
49 數位科技於培訓之應用與趨勢 行政院人事行政總處地方行政研習中心 南投 2013/03/18~2013/03/18
50 數位科技於培訓之應用 高雄市政府 高雄市政府 2013/04/08~2013/04/08
51 淺探人腦與電腦的感官世界 長庚大學電機系 長庚大學 2013/06/16~2013/06/16
順序 作品名稱/活動名稱/主題 頒獎單位 日期
1 The 6th World Congress on Information and Communication Technology (WICT 16) 擔任國際學術組織要員 2016/12/14
2 Sixteenth International Conference on Intelligent Systems Design and Applications (ISDA 2016) 擔任國際學術組織要員 2016/12/13
3 The 16th International Conference on Hybrid Intelligent Systems (HIS 16) 擔任國際學術組織要員 2016/11/21
4 The 11th Asia Joint Conference on Information Security (AsiaJCIS 2016) 擔任國際學術組織要員 2016/08/04
5 2016 International Conference on Applied System Innovation 出席國際學術會議 2016/05/28
6 Universal Academic Cluster International Winter Conference in Hokkaido 出席國際學術會議 2016/02/22
7 2nd International Conference on Trustworthy Systems and Their Applications 出席國際學術會議 2015/7/8
8 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 出席國際學術會議 2015/07/01
9 International Conference on Applied System Innovation 出席國際學術會議 2015/05/22
10 2015 International Conference on Applied System Innovation 出席國際學術會議 2015/05/22
11 Workshop on Cryptography and Information Security, International Computer Symposium (ICS 2014) 擔任國際學術組織要員 2014/12/12
12 Second International Symposium on Knowledge-intensive Software Engineering (KiSE 14), 擔任國際學術組織要員 2014/09/24
13 The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014) 擔任國際學術組織要員 2014/09/03
14 Binary Document Authentication by Computing Digital Patterns 中興大學資訊科學系 2007/06/01~2007/06/01
15 保護數位內容完整性的安全機制之探討 高雄師範大學資訊教育研究所 2007/05/09~2007/05/09
16 PKI與電子商務安全 逢甲大學、中興大學 2007/03/02~2007/03/02
17 整批簽章技術Batch Verification Techniques 彰化師範大學資訊管理學系 2006/09/25~2006/09/25
18 自然人憑證與應用 大同公司資訊系統處 2004/12/21~2004/12/21
19 網路攻擊分析 橋光技術學院資管系 2004/12/15~2004/12/15
20 實際資訊安全(Physical Security) 長庚大學企業管理研究所 2004/08/24~2004/08/24
21 資訊安全管理 中區國稅局 2004/08/20~2004/08/30
22 Batch Verification Techniques 中興大學資訊科學研究所 2004/06/17~2004/06/17
23 『從金石到位元』?電子簽章法之技術介紹 經濟部(商業司) 2004/05/01~2004/05/01
24 電子商務簽章 嶺東技術學院 資訊學院 2004/04/01~2004/04/01
25 Hierarchical Key Management Schemes 國立彰化師範大學資訊管理系 2002/02/01~2002/02/01
26 美國新一代保密標準AES Rijndaell Algorithm 國科會工程處、中華民國資安學會 2001/03/01~2001/03/01
27 電子證書與認證中心(網路資訊安全研討會) 南開工商專校 2000/05/19~2000/05/19
28 迎向電子商務的新世紀 中國生產力中心 2000/04/28~2000/04/28
29 企業網路保全策略 東海大學企研所 2000/04/12~2000/04/12
30 台灣虛擬商店現況與未來 自行車產業研究中心 2000/03/28~2000/03/28
31 引言人及主持人(資訊安全政策研討會) 中華民國資訊安全學會 1999/11/25~1999/11/26
32 密碼模組驗證技術 國防部通信資訊局 1999/08/24~1999/08/24
33 網路安全事件分析與評估 台糖公司訓練中心 1999/05/19~1999/05/19
34 美國聯邦資訊處理標準FIPS 140-1 中華民國資訊安全學會 1999/04/19~1999/04/19
35 Generalized GOST and Generalized DES 中興大學資科所 1999/03/25~1999/03/25
36 Invited Panelist: Security Technology in Electronic Commerce MOE,NSC,IEEE 1998/12/16~1998/12/16
37 網路商業安全淺析---電子金錢(網路資訊安全研討會) 南開工商專校 1998/12/11~1998/12/11
38 校園網路之規劃與建置 埔里高工 1998/10/01~1998/10/01
39 網路世界的善與惡 知德工商、嘉義縣政府 1998/06/24~1998/06/25
40 網路世界的美麗與哀愁(資訊巡迴演講) 中興大學、教育部 1998/05/15~1998/05/15
41 電子商業的未來 扶輪社 1998/04/01~1998/04/01
42 影像資訊保密技術 台灣科技大學電子系 1997/12/19~1997/12/19
43 資訊系統與現代化企業 資訊系統與現代化企業 1997/05/24~1997/05/24
44 網路安全技術 台灣師範大學 1996/10/01~1996/10/01
45 Undeniable Signatures 雲林科技大學資管系 1996/05/01~1996/05/01
順序 作品名稱/活動名稱/主題 頒獎單位 獲獎項目
1 95年度全國大專院校資安技能金盾獎競賽全國第二名 財團法人資訊工業策進會 指導教授獎
2 2006年中華民國資訊學會最佳碩、博士論文獎 中華民國資訊學會 指導教授獎
3 東海大學資工系 95 學年度專題成果競賽-最佳路徑導向的動態行車系統之設計與實作 東海大學資訊工程與科學系 指導教授獎
4 2000年第一屆全國SMART盃電子商務軟體競賽-指導教授 南台科技大學 全國第一名
5 東海大學資工系 93 學年度專題成果競賽-指導教授 東海大學資工系 佳作
6 2005東海網站設計全校系競賽-指導教授 東海大學 優選獎
7 2006東海網站設計全校系競賽-指導教授 東海大學 優選獎
8 2007裕隆日產汽車創新風雲賞:車用電子系統設計-指導教授 裕隆日產汽車 參加獎
9 東海大學資工系 95 學年度專題成果競賽-指導教授 東海大學資工系 第一名
10 2008年指導連志捷、陳慶儒、陳俊龍,榮獲資訊工業策進會主辦,第三屆全國大專院校資安技能金盾獎競賽全國冠軍,獲頒指導教授獎。 工業策進會 指導教授獎
11 2008年指導研究生韓培真,榮獲中華民國資訊學會最佳碩、博士論文獎佳作,獲頒指導教授獎。 中華民國資訊學會 指導教授獎
12 2009指導專題生陳柏安、張哲睿榮獲資工系專題成果競賽第三名,題目:嘴控滑鼠之設計與實作。 東海大學資工系 第三名
13 2009指導專題生王興文、李建維、林威志榮獲資工系專題成果競賽第二名,題目:數位文件竄改偵測及復原方法之設計與實作。 東海大學資工系 第二名
14 2010年指導研究生連志捷,榮獲中華民國資訊學會最佳碩、博士論文獎佳作,獲頒指導教授獎。 中華民國資訊學會 指導教授獎
15 2010年榮獲國家科學委員會研究特殊優秀人才獎勵。 國家科學委員會 特殊優秀人才
16 2011年指導研究生楊子見,榮獲「第六屆智慧生活科技研討會」最佳論文獎佳作。 第六屆智慧生活科技研討會 最佳論文獎佳作
17 2011年指導研究生呂書源,榮獲「2011電子通訊與應用研討會」最佳論文獎佳作。 2011電子通訊與應用研討會 最佳論文獎佳作
18 2011年指導研究生李建興,榮獲中華民國品質學會「卓越博碩士論文獎」碩士銀帶獎。 中華民國品質學會 碩士銀帶獎
19 2011年榮獲國家科學委員會研究特殊優秀人才獎勵。 國家科學委員會 特殊優秀人才
20 2012年指導研究生林泓彥、簡詩蓓、陳侑廷及劉俊良,榮獲「智慧電子創新應用與設計競賽」,全國「綠能電子創意組」佳作。 智慧電子創新應用與設計競賽 佳作
21 2012年指導專題生王傑立榮獲專題競賽第一名,題目:一個新遊戲模式之創作與設計:以打蟑螂遊戲為例。 中區專題競賽 第一名
22 2012年指導專題生王傑立參加中區專題競賽,榮獲佳作。 中區專題競賽 佳作
23 2012 年榮獲東海大學優良導師獎勵。 東海大學 優良導師
24 2012年度榮獲教育部教學卓越計畫彈性薪資獎勵。 教育部 教育部
順序 邀請單位 擔任職務 日期
1 八十四年度電腦軟體設計競賽-中區專科命題 評分委員 1995/1/1
2 八十五年度電腦軟體設計競賽-中區專科乙組 召集人兼命題及評分委員 1996/1/1
3 東海大學-東海榮譽學生赴美學術交流 領隊 1999/1/1
4 國科會-補助『提昇私立大學校院研發能量專案』三年計畫 召集人 2000/1/1
5 歐洲密碼研究機構訪問團 訪談交流學者 2001/1/1
6 資訊系統可信賴作業體制研討會 主持人及評述兼與談人 2001/1/1
7 中國大陸重要密碼機構訪問團 訪談交流學者 2002/1/1
8 教育部-補助『九十一年提昇大學競爭力重點發展計畫─B計畫』 召集人 2002/1/1
9 行政院主計處電子處理資料中心『九十三年資通安全外部稽核』 領隊暨稽核員 2003/1/1
10 朝陽科技大教授資格審格 審查委員 2004/1/1
11 行政院主計處電子處理資料中心『九十三年資通安全外部稽核』 領隊暨稽核員 2004/1/1
12 財政部台灣省中區國稅局政府機關資通安全外部稽核 領隊 2004/1/1
13 台灣省台中農田水利會服務建議書審查 審查委員 2005/1/1
14 行政院衛生署國民健康局期中審查 審查委員 2005/1/1
15 行政院主計處電子處理資料中心『九十四年資通安全外部稽核』 領隊暨稽核員 2005/1/1
16 台中榮民總醫院『電子簽章平台建置 審查委員 2005/1/1
17 台灣省台中農田水利會服務建議書審查 審查委員 2005/1/1
18 行政院衛生署國民健康局期中審查 審查委員 2005/1/1
19 行政院主計處電子處理資料中心『九十四年資通安全外部稽核』 領隊暨稽核員 2005/1/1
20 台中榮民總醫院『電子簽章平台建置 審查委員 2005/1/1
21 台灣省台中農田水利會服務建議書審查 審查委員 2005/1/1
22 行政院衛生署國民健康局期中審查 審查委員 2005/1/1
23 國立台灣技術學院升等審查 審查委員 2005/1/1
24 國立台灣技術學院升等審查 審查委員 2005/1/1
25 國立中興大新聘老師著作審查 審查委員 2005/1/1
26 建國科技大學副教授資格審查 審查委員 2005/1/1
27 國立彰化師範大學工學院校外審查 審查委員 2005/1/1
28 東海大學學術審議委員會選任委員選舉 審議委員 2005/1/1
29 行政院主計處電子處理資料中心『九十五年資通安全外部稽核』 領隊暨稽核員 2006/1/1
30 經濟部水利署『資訊安全管理系統規劃暨認證輔導』 評選委員 2006/1/1
31 經濟部水利署-水利相關應用系統服務效能監控系統建置計畫 評選委員 2006/1/1
32 弘光科技大學研究法展委員會研究審查 審查委員 2006/1/1
33 行政院衛生署國民健康局大二次期中審查 審查委員 2006/1/1
34 國立彰化師範大學理學院升等教師著作審查 審查委員 2006/1/1
35 行政院主計處電子處理資料中心『九十五年資通安全外部稽核』 領隊暨稽核員 2006/1/1
36 經濟部水利署『資訊安全管理系統規劃暨認證輔導』 評選委員 2006/1/1
37 經濟部水利署-水利相關應用系統服務效能監控系統建置計畫 評選委員 2006/1/1
38 弘光科技大學研究法展委員會研究審查 審查委員 2006/1/1
39 行政院衛生署國民健康局大二次期中審查 審查委員 2006/1/1
40 國立彰化師範大學理學院升等教師著作審查 審查委員 2006/1/1
41 亞洲大學助理教授資格 審查委員 2007/1/1
42 亞洲大學助理教授資格 審查委員 2007/1/1