Your browser does not support JavaScript!
:::
:::
許建隆 教授 (企研所合聘)

長庚大學資管系

簡介:

姓名:許建隆

職稱:教授

分機:(03)2118800 轉 5827

信箱:clhsu@mail.cgu.edu.tw

個人網頁:http://www.sedona.bz/members/Chien-Lung

學歷:國立台灣科技大學資訊管理博士

專長領域:智慧家庭、行動商務、電腦與通訊安全、資訊安全、應用密碼學、健康照護、數位版權管理、自動辨識技術、數位鑑識

實驗室:行動商務系統實驗室(Lab. of Ubiquitous Security and Applications)
 


現任:

2011/08~迄今    長庚大學資訊管理學系  教授

2007/09~迄今    長庚大學RFID物流與供應鏈應用學程  召集人

2007/09~迄今    長庚大學資訊與醫療安全學程  召集人

2012/05~迄今    第七屆中華民國資訊安全學會  理事

2012/05~迄今    第七屆中華民國資訊安全學會會員委員會   主任委員

 

經歷:

2013/08 ~ 2016/08    長庚大學資訊管理學系  系主任

2012/08 ~ 2013/07    Department of Electrical Engineering and Computer Science, University of Central Florida, USA   訪問學者

2011/02 ~ 2012/05    第六屆中華民國資訊安全學會教育與推廣委員會   主任委員

2009/08 ~ 2012/05    第六屆中華民國資訊安全學會產學合作委員會   委員

2009/08 ~ 2012/05    第六屆中華民國資訊安全學會   理事

2009/08 ~ 2012/04    長庚大學資訊中心教學服務組   組長

2007/11 ~ 2009/07    第五屆中華民國資訊安全學會   副秘書長

2007/08 ~ 2011/07    長庚大學資訊管理學系   副教授

2004/02 ~ 2007/07    長庚大學資訊管理學系   助理教授

2001/08 ~ 2002/02    華梵大學資訊管理系   兼任講師


教授課程:


資訊安全基礎數學、網路攻防技術與應用、資料結構、行動商務系統專題實作、行動商務、資訊管理、管理數學、社會關懷實作、資訊與醫療安全實驗

 

研究成果:

一、國際學術期刊論文

  1. Hsu, C.L. and Wu, T.C.*, “Authenticated Encryption Scheme with (t, n) Shared Verification,” IEE Proceedings Computers and Digital Techniques, Vol. 145, No. 2, March, 1998, pp. 117-120. <SCI: 0.181 (1998)>
  2. Wu, T.S., He, W.H., and Hsu, C.L.*, “Security of Authenticated Multiple-Key Agreement Protocols,” Electronics Letters, Vol. 35, No. 5, March, 1999, pp. 391-392. <SCI: 1.164 (1999)>
  3. Hsu, C.L., Wu, T.S.*, and Wu, T.C., “New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers,” Journal of Systems and Software, Vol. 58, No. 2, September, 2001, pp. 119-124. <SCI: 0.440 (2001), 44/N/A in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
  4. Wu, T.S.* and Hsu, C.L., “Convertible Authenticated Encryption Scheme,” Journal of Systems and Software, Vol. 62, No. 3, June, 2002, pp. 205-209. <SCI: 0.400 (2002), 49/N/A in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
  5. Hsu, C.L., Wu, T.S.*, and Wu, T.C., “Improvements of Generalization of Threshold Signature and Authenticated Encryption for Group Communications,” Information Processing Letters, Vol. 81, No. 1, January, 2002, pp. 41-45. <SCI: 0.331 (2002), 59/N/A in COMPUTER SCIENCE, INFORMATION SYSTEMS>
  6. Wu, T.S.* and Hsu, C.L., “ID-Based Multisignatures with Distinguished Signing Authorities for Sequential and Broadcasting Architectures,” Applied Mathematics and Computation, Vol. 131, No. 2-3, September, 2002, pp. 349-356. <SCI: 0.436 (2002), 103/N/A in MATHEMATICS, APPLIED>
  7. Hsu, C.L., Wu, T.S.*, and Wu, T.C., “Improvement of Threshold Proxy Signature Scheme,” Applied Mathematics and Computation, Vol. 136, No. 2-3, March, 2003, pp. 315-321. <SCI: 0.426 (2003), 111/153 in MATHEMATICS, APPLIED>
  8. Wu, T.C.* and Hsu, C.L., “Cryptanalysis of Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems,” IEEE Transactions on Vehicular Technology, Vol. 52, No. 2, March, 2003, pp. 462-465. <SCI: 0.861 (2003), 5/21 in TRANSPORTATION SCIENCE & TECHNOLOGY>
  9. Hsu, C.L. and Wu, T.S.*, “Cryptanalyses and Improvements of Two Cryptographic Key Assignment Schemes for Dynamic Access Control in a User Hierarchy,” Computers and Security, Vol. 22, No. 5, July, 2003, pp. 453-456. <SCI: 0.457 (2003), 57/78 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
  10. Wu, T.S.* and Hsu, C.L., “Threshold Signature Scheme Using Self-Certified Public Keys,” Journal of Systems and Software, Vol. 67, No. 2, August, 2003, pp. 89-97. <SCI: 0.528 (2003), 51/78 in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
  11. Hsu, C.L., Wu, T.S.*, Wu, T.C., and Mitchell, C., “Improvement of Modified Authenticated Key Agreement Protocol,” Applied Mathematics and Computation, Vol. 142, No. 2-3, October, 2003, pp. 305-308. <SCI: 0.426 (2003), 111/153 in MATHEMATICS, APPLIED>
  12. Wu, T.S.*, Hsu, C.L., Lin, H.Y., and Huang, P.S., “Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme,” Information Processing Letters, Vol. 88, No. 4, November, 2003, pp. 183-186. <SCI: 0.473 (2003), 55/78 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
  13. Hsu, C.L.*, “Security of Two Remote User Authentication Schemes Using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 4, November, 2003, pp. 1196-1198. <SCI: 0.428 (2003), 32/56 in TELECOMMUNICATIONS>
  14. Wu, T.S.* and Hsu, C.L., “Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks,” Computers and Security, Vol. 23, No. 2, March, 2004, pp. 120-125. <SCI: 0.412 (2004), 59/78 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
  15. Hsu, C.L.*, “Security of Chien et al.'s Remote User Authentication Scheme Using Smart Cards,” Computer Standards and Interfaces, Vol. 26, No. 3, May, 2004, pp. 167-169. <SCI: 0.316 (2004), 32/44 in COMPUTER SCIENCE, HARDWARE & ARCHITECTURE>
  16. Hsu, C.L. and Wu, T.S.*, “Efficient Proxy Signature Schemes Using Self-Certified Public Keys,” Applied Mathematics and Computation, Vol. 152, No. 3, May, 2004, pp. 807-820. <SCI: 0.567 (2004), 82/162 in MATHEMATICS, APPLIED>
  17. Hsu, C.L., Wu, T.S.*, and Wu, T.C., “Group-Oriented Signature Scheme with Distinguished Signing Authorities,” Future Generation Computer Systems, Vol. 20, No. 5, June, 2004, pp. 865-873. <SCI: 0.528 (2004), 51/70 in COMPUTER SCIENCE, THEORY & METHODS>
  18. Wu, T.S.* and Hsu, C.L., “Cryptanalysis of Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers,” Computer Standards and Interfaces, Vol. 26, No. 5, September, 2004, pp. 477-481. <SCI: 0.316 (2004), 32/44 in COMPUTER SCIENCE, HARDWARE & ARCHITECTURE>
  19. Hsu, C.L.*, Wu, T.S., and He, W.H., “New Proxy Multi-Signature Scheme,” Applied Mathematics and Computation, Vol. 162, No. 3, March, 2005, pp. 1201-1206. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
  20. Hsu, C.L., and Wu, T.S.*, “Self-Certified Threshold Proxy Signature Schemes with Message Recovery, Nonrepudiation, and Traceability,” Applied Mathematics and Computation, Vol. 164, No. 1, May, 2005, pp. 201-225. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
  21. Hsu, C.L.*, “Cryptanalysis and Improvement of the Tzeng-Hwang Authenticated Encryption Scheme Based on Elliptic Curve Discrete Logarithm Problem,” Applied Mathematics and Computation, Vol. 167, No. 2, August, 2005, pp. 882-890. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
  22. Hsu, C.L.* and Wu, T.S., “Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers Against the Collusion Attack,” Applied Mathematics and Computation, Vol. 168, No. 1, September, 2005, pp. 305-319. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
  23. Hsu, C.L.*, “A User Friendly Remote Authentication Scheme with Smart Cards Against Impersonation Attacks,” Applied Mathematics and Computation, Vol. 170, No. 1, November, 2005, pp. 135-143. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
  24. Hsu, C.L.*, Tsai, K.Y., and Tsai, P.L., “Cryptanalysis and Improvement of Nonrepudiable Threshold Multi-Proxy Multi-Signature Scheme with Shared Verification,” Information Sciences, Vol. 177, No. 2, January, 2007, pp. 543-549. <SCI: 2.147 (2007), 10/92 (約前11%) in COMPUTER SCIENCE, INFORMATION SYSTEMS>
  25. Wu, T.S., Hsu, C.L.*, and Lin, H.Y., “Generalized Convertible Authenticated Encryption Schemes for Smart Card Applications,” International Mathematical Forum, Vol. 2, No. 8, 2007, pp. 345-363.
  26. Hsu, C.L.*, Liu, H.C., and Chou, M.T., “Remote Mutual Authentication Scheme with Key Agreement Using Smart Cards,” International Mathematical Forum, Vol. 2, No. 28, 2007, pp. 1381-1397.
  27. Hsu, C.L.*, Lin, W.T., and Chou, Y.C., “New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks,” Journal of Computers, Vol. 18, No. 2, July, 2007, pp. 25-32. <EI>
  28. Wu, T.S., Hsu, C.L.*, Tsai, K.Y., Lin, H.Y., and Wu, T.C., “Convertible Multi-Authenticated Encryption Scheme,” Information Sciences, Vol. 178, No. 1, January, 2008, pp. 256-263. <SCI: 3.095 (2008), 8/99 (約前8%) in COMPUTER SCIENCE, INFORMATION SYSTEMS>
  29. Wu, T.C.*, Huang, T.T., Hsu, C.L., and Tsai, K.Y., “Recursive Protocol for Group-Oriented Authentication with Key Distribution,” Journal of Systems and Software, Vol. 81, No. 7, July, 2008, pp. 1227-1239. <SCI: 1.241 (2008), 36/86 in COMPUTER SCIENCE, SOFTWARE ENGINEERING, 34/84 in COMPUTER SCIENCE, THEORY & METHODS>
  30. Hsu, C.L.*, “Cryptanalysis of Elliptic Curve Cryptosystem on Smart Card Access Control with Threshold Scheme,” Computer Systems Science and Engineering, Vol. 23, No. 6, November, 2008, pp. 367-372. <SCI:0.277 (2008), 41/45 in COMPUTER SCIENCE, HARDWARE & ARCHITECTURE>
  31. Wu, T.S., Hsu, C.L.*, and Lin, H.Y., “Self-Certified Multi-Proxy Signature Schemes with Message Recovery,” Journal of Zhejiang University: Science A, Vol. 10, No. 2, February, 2009, pp. 290-300. <SCI: 0.301 (2009), 59/79 in ENGINEERING, MULTIDISCIPLINARY>
  32. Hsu, C.L.,* and Chuang, Y.H., “A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks,” Information Sciences, Vol. 179, No. 4, February, 2009, pp. 422-429. <SCI: 3.291 (2009), 6/116 (約前5%) in COMPUTER SCIENCE, INFORMATION SYSTEMS>
  33. Lu, C.F.*, Wu, T.C., and Hsu, C.L., “Certificateless Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks,” WSEAS Transactions on Communications, Vol. 8, No. 11, November, 2009, pp. 1145-1159. <EI>
  34. Hsu, C.L.*, “A Secure ID-Based User Identification Scheme for Wireless Environments,” ICIC Express Letters, Vol. 4, No. 3, June, 2010, pp. 629-633. <EI>
  35. Tsai, K.Y., Hsu, C.L.*, and Wu, T.C., “Mutual Anonymity Protocol with Integrity Protection for Mobile Peer-to-Peer Networks,” International Journal of Security and Networks, Vol. 5, No. 1, 2010, pp. 45-52. <EI>
  36. Lin, Y.L., Wu, T.C., and Hsu, C.L.*, “Secure and Efficient Time-Bound Key Assignment Scheme for Access Control in Hierarchical Structure,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 2, February, 2010, pp. 439-447. <SCI: 1.667 (2010) 12/60 in AUTOMATION & CONTROL SYSTEMS, 40/108 in COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE>
  37. Wu, T.S., Lin, H.Y.,* (通信作者), and Chang, K.Y., “Efficient Verifier-Based Authenticated Key Agreement Protocol for Three Parties,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 2, February, 2010, pp. 755-762. <SCI: 1.667 (2010) 12/60 in AUTOMATION & CONTROL SYSTEMS>
  38. Lin, Y.L. and Hsu, C.L.*, “Cryptanalysis and Improvement of a Hierarchical Key Management Scheme for Access Control in the Mobile Agent,” ICIC Express Letters, Vol. 4, No. 1, February, 2010, pp. 183-187. <EI>
  39. Mohammad, Z.*, Hsu, C.L., Chen, Y.C., and Lo, C.C., “An Efficient and Secure Three-Pass Authenticated Key Agreement Elliptic Curve Based Protocol,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 3, March, 2011, pp. 1273-1284. <SCI-Expanded, EI>
  40. Hsu, C.L.*, Chang, L.P., and Wu, T.C., “A Supervising Authenticated Encryption Scheme for Multilevel Security,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 3, March, 2011, pp. 1087-1095. <SCI-Expanded, EI>
  41. Hsu, C.L.* and Tsai, K.Y., “New ECC-Based Remote User Authentication Scheme with Key Agreement Using Smart Cards,” Journal of Internet Technology, Vol. 12, No. 4, July, 2011, pp. 601-608. <SCI: 0.508 (2011), 57/79 in TELECOMMUNICATIONS>
  42. Mohammad, Z.*, Chen, Y.C., Hsu, C.L., and Lo, C.C., “Cryptanalysis and Enhancement of Two-Pass Authenticated Key Agreement with Key Confirmation Protocols,” IETE Technical Review, Vol. 27, No. 3, May, 2010, pp. 252-265. <SCI: 0.370 (2010), 60/80 in TELECOMMUNICATIONS>
  43. Chang, L.P., Wu, T.C., Hsu, C.L.*, and Lu, C.F., “Two Level Authenticated Group Key Agreement Protocol with Privacy-Preservation for Resource-Limited Mobile Devices,” Journal of Internet Technology, Vol. 11, No. 4, July, 2010, pp. 519-528. <SCI: 0.448 (2010), 56/80 in TELECOMMUNICATIONS>
  44. Lin, Y.L. and Hsu, C.L.*, “Secure Key Management Scheme for Dynamic Hierarchical Access Control Based on ECC,” Journal of Systems and Software, Vol. 84, No. 4, April, 2011, pp. 679-685. <SCI: 0.836 (2011), 42/99 in COMPUTER SCIENCE, THEORY & METHODS>
  45. Hsu, C.L.*, Wu, T.C., and Tsai, K.Y., “Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes,” International Journal of Business and Information, Vol. 5, No. 1, June, 2010, pp. 46-62. <Index of ABI/Inform database>. (This paper is also the Distinguished Paper of International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology, Macau, China, January 2010)
  46. Lu, C.F., Wu, T.C., and Hsu, C.L.*, “A Three-Level Authenticated Conference Key Establishment Protocol for UMTS Networks,” Journal of Zhejiang University-SCIENCE C-Computers & Electronics, Vol. 12, No. 5, May, 2011, pp. 371-378. <SCI: 0.308 (2011), 210/245 in ENGINEERING, ELECTRICAL & ELECTRONIC>
  47. Hsu, C.L., Tseng, Keven. C., and Chuang, Y.H.*, “Predictors of Future Use of Telehomecare Health Services by Middle-Aged People in Taiwan,” Social Behavior and Personality, Vol. 39, No. 9, October, 2011, pp. 1251-1262. <SSCI: 0.307 (2011), 57/59 in PSYCHOLOGY, SOCIAL>
  48. Lin, H.Y.* and Hsu, C.L., “A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme,” International Journal of Foundations of Computer Science, Vol. 22, No. 3, April, 2011, pp. 739-756. <SCI: 0.379 (2011), 86/99 in COMPUTER SCIENCE, THEORY & METHODS>
  49. Lin, H.Y. and Hsu, C.L.*, Huang, S.K., “Improved Convertible Authenticated Encryption Scheme with Provable Security,” Information Processing Letters, Vol. 111, No. 13, July, 2011, pp. 661-666. <SCI: 0.455 (2011), 106/135 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
  50. Tsai, K.Y.*, Wu, T.C., and Hsu, C.L., “New Secret Key Traitor Tracing Scheme with Dispute Settlement from Bilinear Maps,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 3, March, 2011, pp. 1499-1510. <SCI-Expanded, EI>
  51. Lu, C.F., Wu, T.C., Hsu, C.L.*, “Certificateless Authenticated Group Key Agreement Scheme with Privacy-Preservation for Resource-Limited Mobile Devices,” International Journal of Innovative Computing, Information and Control, Vol. 8, No. 1(B), January, 2012, pp. 599-615. <SCI-Expanded, EI
  52. Hsu, C.L., Lin, H.Y.*, “New Identity-Based Key-Insulated Convertible Multi-Authenticated Encryption Scheme,” Journal of Network and Computer Applications, Vol. 34, No. 5, September, 2011, pp. 1724-1731. <SCI: 1.065 (2011), 36/104 in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
  53. Mohammad, Z., Hsu, C.L.*, Chen, Y.C., and Lo, C.C., “Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves,” Journal of Internet Technology, Vol. 14, No. 2, March, 2013, pp.247-250. <SCI: 0.418 (2013), 68/78 in TELECOMMUNICATIONS>
  54. Lin, Y.L. and Hsu, C.L.*, “New Efficient Migration for Mobile Computing in Distributed Networks,” Information-an International Interdisciplinary Journal, Vol. 14, No. 7, July, 2011, pp. 2435-2450. <SCI: 0.250 (2011), 78/90 in ENGINEERING, MULTIDISCIPLINARY>
  55. Tsai, K.Y.*, Wu, T.C., Hsu, C.L., Martin, K., “Provably Secure Multisignature Scheme with Document Decomposition and Signer Anonymity,” ICIC Express Letters, Vol. 5, No. 9(B), September, 2011, pp. 3579-3583. <EI>
  56. Hsu, C.L., Wu, T.S., and Lin, H.Y.*, “Password-Based Authenticated Key Exchange Protocol without Trusted Third Party for Multi-Server Environments,” International Journal of Innovative Computing, Information and Control, Vol. 8, No. 3(A), May, 2012, pp. 1541-1555. <SCI-Expanded, EI>
  57. Chuang, Y.H., Shu, W., Hsu, K.C., Hsu, C.L.*, “Improved Group-Oriented Digital Signature Schemes Based on Elliptic Curve Cryptography,” ICIC Express Letters, Vol. 5, No. 12, December, 2011, pp. 4415-4419. <EI>
  58. Tseng, K.C.*, Hsu, C.L., Han, C.M., and Chuang, Y.H., “Development of a Telehealthcare System for Community-Dwelling Older Adults by Using a Collaborative Quality Function Deployment Tool,” Advanced Science Letters (ASL), Vol. 9, No. 1, April, 2012, pp. 689-694.
  59. Lu, C.F., Hsu, C.L.*, and Lin, H.Y., “Provably Convertible Multi-Authenticated Encryption Scheme for Generalized Group Communications,” Information Sciences, Vol. 199, No. 15, September, 2012, pp. 154-166. <SCI: 3.643 (2012), 6/132 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
  60. Hsu, C.L.*, Lu, C.F., “A Security and Privacy Preserving E-Prescription System Based on Smart Cards,” Journal of Medical Systems, Vol. 36, No. 6, December, 2012, pp. 3637-3647. <SCI: 1.783 (2012), 11/23 in MEDICAL INFORMATICS>
  61. Hsu, C.L., Tseng, K.C.*, and Chuang, Y.H. , “A Secure IRB System for Assisting the Development of Intelligent Medical Devices,” Expert Systems With Applications, Vol. 39, No. 16, November, 2012, pp. 12512-12521. <SCI:1.854 (2012), 13/79 in OPERATIONS RESEARCH & MANAGEMENT SCIENCE>
  62. Hsu, C.L., Lin, H.Y.*, “Pairing-Based Strong Designated Verifier Proxy Signature Scheme with Low Cost,” Security and Communication Networks, Vol. 5, No. 5, May, 2012, pp. 517-522. <SCI: 0.311 (2012), 70/78 in TELECOMMUNICATIONS>
  63. Chuang, Y.H., Shu, W., Hsu, K.C., Hsu, C.L.*, “A Secure Non-interactive Deniable Authentication Protocol Based on Discrete Logarithms,” ICIC Express Letters Part B: Applications, Vol. 3, No. 3, June, 2012, pp. 507-512. <EI>
  64. Tseng, K.C., Hsu, C.L.*, and Chuang, Y.H., “Acceptance of Information Technology and the Internet by People Aged Over Fifty in Taiwan,” Social Behavior and Personality, Vol. 40, No. 4, May, 2012, pp. 613-622. <SSCI: 0.41 (2012), 57/60 in PSYCHOLOGY, SOCIAL> 2014/7/1修正, 其他系統要修正.
  65. Chuang, Y.H.*, Shu, W., Hsu, K.C., and Hsu, C.L., “A Novel Communication Protocol of Wireless Sensor Networks for a Home Healthcare System in Aging Society,” Advanced Science Letters (ASL)(Accepted).
  66. Chuang, Y.H., and Hsu, C.L.*, “A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions,” Journal of Internet Technology, Vol. 15, No. 2, March, 2014, pp. 197-201. <SCI: 0.481 (2012), 61/78 in TELECOMMUNICATIONS>
  67. Hsu, C.L.*, and Chuang, Y.H., A Robust User Authentication Protocol with Anonymity, Deniability, Key Agreement, and Efficiency, Applied Mathematics & Information Sciences, Vol. 7, No. 1, January, 2013, pp. 127-132. <SCI: 1.232 (2013), 53/250 in MATHEMATICS, APPLIED>
  68. Hsu, C.L. and Chuang, Y.H.*, “A Novel Remote User Authentication Scheme from Bilinear Pairings via Internet,” submitted to Wireless Personal Communications. <SCI: 0.979 (2013), 45/78 in TELECOMMUNICATIONS>
  69. Tseng, K.C., Wong, A.M.K., Hsu, C.L.*, Tsai, T.H., Han, C.M., and Lee, M.R., “The iFit: An Integrated Physical Fitness Testing System to Evaluate the Degree of Physical Fitness of the Elderly,” IEEE Transactions on Biomedical Engineering, Vol. 60, No. 1, January, 2013, pp. 184-188. <SCI: 2.233 (2013), 29/77 in ENGINEERING, BIOMEDICAL>
  70. Hsu, C.L., and Lin, H.Y.*, “Convertible Authenticated Encryption Scheme with Hierarchical Access Control, Applied Mathematics & Information Sciences, Vol. 8, No. 3, May, 2014, pp. 1239-1246. <SCI: 1.232 (2013), 53/250 in MATHEMATICS, APPLIED>
  71. Hsu, C.L., and Lin, H.Y.*, “Universal Forgery Attack on a Strong Designated Verifier Signature Scheme,” The International Arab Journal of Information Technology, Vol. 11, No. 5, September, 2014. <SCI: 0.366 (2013), 220/247 in ENGINEERING, ELECTRICAL & ELECTRONIC>
  72. Tsai, T.H., Wong, A.M.K., Hsu, C.L., and Tseng, K.C.*, “Research on a Community-based Platform for Promoting Health and Physical Fitness in the Elderly Community,” PLoS One, Vol. 8, No. 2, February, 2013, pp. 1-9. <SCI: 3.534 (2013), 8/55 in MULTIDISCIPLINARY SCIENCES>
  73. Hsu, C.L., Chuang, Y.H.*, and Hung, M.T.,An Efficient Deniable Authentication Protocol from Pairings to Protect Users’ Privacy,” Chiang Mai Journal of Science (Accepted), 2013. <SCI: 0.418 (2013), 35/55 in MULTIDISCIPLINARY SCIENCES>
  74. Hsu, C.L., and Lin, H.Y.*, “Provably Secure Message Recovery Limited Verifier Signature Scheme with Low Cost, Information-An International Interdisciplinary Journal, Vol. 17, No. 4, April, 2014, pp.1187-1199.
  75. Hsu, C.L.*, Lee, M.R., and Su, C.H., “The Role of Privacy Protection in Healthcare Information Systems Adoption,” Journal of Medical Systems, Vol. 37: 9966, No. 5, October, 2013, pp. 1-12. <SCI: 1.372 (2013), 14/25 in MEDICAL INFORMATICS>
  76. Tseng, K.C., Hsu, C.L.*, and Chuang, Y.H., “Designing an Intelligent Health Monitoring System and Exploring User Acceptance for the Elderly,” Journal of Medical Systems, Vol. 37:9967, No. 6, September, 2013, pp. 1-18. <SCI: 1.372 (2013), 14/25 in MEDICAL INFORMATICS>
  77. Hsu, C.L.* and Lin, Y.L., “Improved Migration for Mobile Computing in Distributed Networks,” Computer Standards & Interfaces, Vol. 36, No. 3, March, 2014, pp.577-584. <SCI: 1.177 (2013), 38/105 in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
  78. Hsu, C.L. and Lin, H.Y.*, “An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network,” KSII Transactions on Internet and Information Systems, Vol. 7, No. 11, November, 2013, pp. 2928-2940. <SCI: 0.345 (2013), 72/78 in TELECOMMUNICATIONS>
  79. Lin, Y.L., Hsu, C.L. and Chuang, Y.H., “A Novel Efficient Key Assignment Scheme for Dynamic Access Control,” Chiang Mai Journal of Science (Accepted), 2014. <SCI: 0.418 (2013), 35/55 in MULTIDISCIPLINARY SCIENCES>
  80. Lu, C.F., Hsu, C.L.*, Lin, H.Y., and Su, C.H., “A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash Function,” International Journal of Future Computer and Communication, Vol. 3, No. 5, October, 2014, pp. 315-318.
  81. Lin, Y.L., Hsu, C.L., and Chuang, Y.H.*, “A Robust Time-Bound Hierarchical Key Assignment Scheme,” International Journal of Future Computer and Communication, Vol. 3, No. 5, October, 2014, pp. 337-340.
  82. Lin, I.C., Lin, C.H., Hsu, C.L.*, Roan, J.S., Yeh, Y.T., and Yeh, J.S., “On nursing staff's usage behavior and intention stability: An empirical study of a nursing information system,” The Journal of Nursing Research (Accepted), 2014. <SSCI/SCI: 0.844 (2013), 68/106 in NURSING>
  83. Lin, C.h., Lin, I.C.*, Roan, J.S., Huang, W.M, and Hsu, C.L., “Explaining physicians' attitude to a new healthcare information technology: adoption and resistance perspectives,” International Journal of Medical Informatics. <SCI: 2.716 (2013), 13/135 in COMPUTER SCIENCE, INFORMATION SYSTEMS> (Under Reviewer)

 

二、國內學術期刊論文

       1. 許建隆、吳宗成,“簽章加密法(signcryption)及其應用”,資訊安全通訊,第四卷,第二期,八十七年,頁20-29。

      2. 吳宗成、黃孝慈、許建隆,“具金鑰交換的群體導向鑑別機制之遞迴式協定設計”,電腦學會通訊IICM,第二卷,第三期,八十九年,頁21-30。

      3. 吳宗成、蔡國裕、楊松諺、許建隆,“具自我驗證的網頁標記系統實作”,資訊安全通訊,第八卷,第四期,九十一年,九月,頁46-58。

      4. 林育梨、吳宗成、許建隆,“具權限控管及防止不當洩密之數位鑑識作業程序”,資訊安全通訊,第十三卷,第三期,九十六年,頁49-59。

      5. 許建隆、呂崇富,“安全電子藥籤系統之設計”,資訊安全通訊,第14卷,第4期,九十七年,頁107-128。

      6. 曾俊儒、許建隆、劉卜誠,“智慧型醫材臨床測試專案管理系統之應用”,台灣職能治療研究與實務雜誌,第5卷,第1期,九十八年,頁65-76。

      7. 許建隆、林燕卿、曾俊儒,“具安全與隱私保護之即時互動健康照護平台”,台灣職能治療研究與實務雜誌,第5卷,第2期,九十八年,頁157-171。

 

三、學術會議論文

A. EI等級之學術研討會論文

  1. Lin, Y.L., Wu, T.C., Hsu, C.L. (通信作者), and Chou, Y.C., “Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics,” 2007 Future Generation Communication and Networking, Vol. 2, Jeju-Island, Korea, December 6-8th, 2007, pp.154-158. <EI>
  2. Lin, Y.L., Hsu, C.L. (通信作者), Wu, T.C., Yen, S.L., and Tseng, C.L., “Secure Key Management Scheme for Hierarchical Access Control Based on ECC,” 2009 IEEE International Carnahan Conference on Security Technology, Zürich, Switzerland, October 5-8th, 2009, pp.335-338. <EI>
  3. Hsu, C.L. (通信作者), Chuang, Y.H., He, W.H., Yen, S.L., Tseng, C.L., and Chen, J.W., “Security of Generalized Signature Scheme Based on Discrete Logarithms and Factorization,” 2009 IEEE International Carnahan Conference on Security Technology, Zürich, Switzerland, October 5-8th, 2009, pp.245-247. <EI>
  4. Tseng, K.C. (通信作者) and Hsu, C.L., “IRB System for Assisting the Development of Intelligent Medical Devices,” 2009 IEEE International Conference on Industrial Engineering and Engineering Management, Hong Kong, December, 2009, pp. 1022-1026. <EI>
  5. Hsu, C.L. (通信作者), Lin, Y.L., Wu, T.C., and Su, C.H., “Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations,” 2010 Future Generation Communication and Networking, Vol. 119, Jeju-Island, Korea, December 13-15th, 2010, pp.23-36.<EI>
  6. Tseng, K. C. (通信作者), Hsu, C.L., and Chuang, Y.H., “A Telehealthcare System to Care for Older People Suffering from Metabolic Syndrome,” HCI International 2011, Orlando, Florida, USA, July 9-14th, 2011.
  7. Hsu, C.L. (通信作者), Tseng, K. C., Tseng, C.L., and Chen, C.H., “Design and Development a Social Networks Platform for Older People,” HCI International 2011, Orlando, Florida, USA, July 9-14th, 2011.
  8. Hsu, C.L. (通信作者), and Lee, M.R., “User Acceptance of a Community-Based Healthcare Information System Preserving User Privacy,” HCI International 2013 (Accepted), Las Vegas, Nevada, USA, July 21-16th, 2013.

 

B. 一般學術研討會論文

  1. Wu, T.C., Hsu, C.L., and Wu, T.S., “Authentication-Based Group-Oriented Conference Key Distribution System,” 1997分散式系統技術及應用研討會, Taiwan, May, 1997, pp. 666-672.
  2. 吳宗成、何煒華、吳宗杉、許建隆適用於網際網路EDI之密碼學探討1998網際網路應用論壇產業標準之競爭、整合與應用,台灣,1998,頁15-30
  3. 吳宗成、許建隆、鍾振華,適用於電子商務應用之具自我驗證金鑰交換與會議金鑰分配協定1999網際網路應用論壇電子商務產業標準之競爭、整合與應用 1999,頁57-70
  4. Hsu, C.L., Wu, T.C., and He, W.H., “Attacks on the Signature Scheme Based on Discrete Logarithm without Using One-Way Hash Function,” Proceedings of the Ninth National Conference on Information Security, 1999, pp. 173-175.
  5. Hsu, C.L., Wu, T.S., and Wu, T.C., “Comments on Efficient Group Signature Scheme Based on Discrete Logarithm,” Proceedings of the Tenth National Conference on Information Security, 2000, pp. 1-3.
  6. Hsu, C.L. and Wu, T.C., “Group-Oriented Signature by Discretionary Signatories with Document Division,” Proceedings of the Tenth National Conference on Information Security, 2000, pp. 13-21.
  7. Hsu, C.L. and Wu, T.C., “Insider Forgery Attacks on Wang-Lin-Chang Threshold Signature Schemes with Traceable Signers,” Proceedings of the 2000 International Computer Symposium Workshop on Cryptography and Information Security, 2000, pp. 43-45.
  8. Wu, T.C., Hsu, C.L., and Lin, C.Y., “On the Security of Burmester et al.’s Structured ElGamal-Type Multisignature Scheme,” Proceedings of the Eleventh National Conference on Information Security, 2001, pp. 349-352.
  9. Hsu, C.L., Wu, T.S., and Wu, T.C., “Improvement of ElGamal-Like Digital Signature and Multisignature Schemes Using Self-Certified Public Keys,” Proceedings of the Eleventh National Conference on Information Security, 2001, pp. 61-65.
  10. Wu, T.C., Lin, Y.L., and Hsu, C.L., “A Cryptographic Key Assignment Scheme for Access Control in Dynamic Organizations,” Proceedings of the Twelfth National Conference on Information Security, 2002, pp. 49-58.
  11. Wu, T.S., Hsu, C.L., Kao, S.H., and Hwang, Y.F., “Cryptanalysis and Improvement of Nyberg and Rueppel’s Identity-Based Public Key Systems,” Proceedings of the Twelfth National Conference on Information Security, 2002, pp. 159-161.
  12. Wu, T.C., Hsu, C.L., and Tsai, K.Y., “Anonymous Proxy Authenticated Encryption Scheme for Group-Oriented Applications,” Proceedings of the Thirteenth National Conference on Information Security, 2003, pp. 74-82.
  13. Wu, T.S., Hsu, C.L., Lin, H.Y., and Kao, S.H., “Cryptanalysis on Wu-Chang Cryptographic Key Assignment Scheme for Hierarchical Access Control,” Proceedings of the Thirteenth National Conference on Information Security, 2003, pp. 63-65.
  14. Hsu, C.L., Wu, T.S., and Li, M.J., “Universal Forgery Attack on the Xia-You Group Signature Scheme with Strong Separability,” 第五屆2003年「網際空間:資訊、法律與社會」學術研究暨實務研討會, Taiwan, 2003, pp. 88-92.
  15. Hsu, C.L., Wu, T.S., Li, M.J., and Shiu, M.J., “Forgery Attack on Improved Group Signature Scheme,” Proceedings of National Computer Symposium 2003, Taiwan, 2003.
  16. Wu, T.C., Hsu, C.L., and Tsai, K.Y., “Authenticated Encryption Schemes with Proxy Verification for e-Business Environments,” Proceedings of the Fourteenth National Conference on Information Security, Taiwan, 2004, pp. 201-210.
  17. Hsu, C.L. and Liu H.C., “Robust User Friendly Remote Mutual Authentication Scheme with Smart Cards,” Cyberspace 2004網際空間:資安、犯罪與法律社會學術研究暨實務研討會, Taiwan, 2004, pp. 196-203.
  18. Hsu, C.L., Wu, T.S., and Lin, H.Y., “Efficient Convertible Authenticated Encryption Schemes for Smart Card Applications in Network Environments,” 9th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2005), Orlando, Florida, USA, 2005, pp. 13-18.
  19. Chen, W.H. and Hsu, C.L., “Secure Group Communication Schemes for Sensor Networks,” International Conference on Systems and Signals (ICSS 2005), Taiwan, 2005.
  20. Wu, T.C., Chang, L.P., and Hsu, C.L., “A Supervising Authenticated Encryption Scheme for Group Oriented Applications,” Proceedings of the Fifteenth National Conference on Information Security, Taiwan, 2005.
  21. Hsu, C.L., Liu, H.C., and Chou, M.T., “Remote Mutual Authentication with Key Agreement Based on Smart Cards,” Conference on Digital Contents Management and Applications 2005 (CDMA 2005), Taiwan, 2005, pp. 583-593.
  22. Hsu, C.L. and Chuang, Y.H., “A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks,” Conference on Digital Contents Management and Applications 2005 (CDMA 2005), Taiwan, 2005, pp. 530-539.
  23. Hsu, C.L. and Tsai, P.L., “Cryptanalysis of Threshold-Proxy Threshold-Signature Schemes,” Medical Informatics Symposium in Taiwan 2005 (MIST 2005), Taiwan, 2005.
  24. Hsu, C.L., Chuang, Y.H., and Ma, K.C., “Authentication Protocol with Patient Privacy for Medical Information System,” Medical Informatics Symposium in Taiwan 2005 (MIST 2005), Taiwan, 2005, pp. 49-53.
  25. Hsu, C.L. and Tsai, P.L., “Cryptanalysis of Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Function,” Cyberspace 2005: CyberSecurity, CyberCrime, and CyberLaw, 2005, pp. 312-316.
  26. Hsu, C.L. and Chuang, Y.H., “Existential Forgery Attack on Digital Signature Scheme without Using One-Way Hash Functions and Message Redundancy Schemes,” 資訊管理學術曁警政資訊實務研討會-二十一世紀資訊科技與犯罪偵防, Taiwan, 2006, pp. 1-5.
  27. 馬國銓,許建隆具隨選、分級訂閱與洩密者追蹤服務之廣播加密法第十七屆全國資訊安全會議,台灣,2007,頁251-259
  28. Hsu, C.L., Tsai, P.L., and Chu, C.W., “Self-Certified Proxy Signcryption Schemes from Pairings,” 第十七屆全國資訊安全會議, Taiwan, 2007, pp. 105-114.
  29. Hsu, C.L. and Chen, C.H., “A Security and Privacy Preserving e-Prescription System Based on Smart Cards,” The Second International Conference on Operations and Supply Chain Management (ICOSCM 2008), Taiwan, 2008, pp. 73-80.
  30. Hsu, C.L., Chuang, Y.H., and Tsai, K.Y., “Novel Non-Interactive Deniable Authentication Protocol,” The 3rd Joint Workshop on Information Security (JWIS 2008), Seoul, Korea, 2008, pp. 1-9.
  31. Chang, L.P., Wu, T.C., and Hsu, C.L., “Efficient Date-Attachment Scheme for Secure Electronic Cash Payment System,” The 3rd Joint Workshop on Information Security (JWIS 2008), Seoul, Korea, 2008, pp. 1-8.
  32. 盧法昌,吳秋玲,曾俊儒,許建隆,劉卜誠,專案管理系統輔助醫材檢測流程案例之應用與分析2008中華民國設計學會第13屆設計學術研究成果研討會,台灣,2008
  33. 許建隆,周彥均,兼具安全與效率之特定驗證者簽章方法第十八屆資訊安全會議(CISC 2008)2008,頁136-151
  34. Hsu, C.L., Tsai, P.L., and Chou, Y.C., “Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Function,” 2008 International Computer Symposium, Taiwan, April, 2008.
  35. Hsu, C.L., Chuang, Y.H., and Tsai, K.Y., “Secure and Efficient Non-Interactive Deniable Authentication Protocol from Pairings,” 2009 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology, Singapore, 2009, pp. 552-560.
  36. Hsu, C.L., Chung, C.G., and Lee, M.R., “Development and Promotion of Interdisciplinary Education for Emerging Technologies – the Case of CGU RFID Program,” 2009 ASME Asia-Pacific Engineering Education Congress, Taiwan, April, 2009.
  37. Hsu, C.L., Wu, T.C., Y.H., and Tsai, K.Y., “Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes,” 2010 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology, Macau, China, 2010, pp. 46-62.
  38. Hsu, C.L., Chuang, Y.H., Tseng, K.C., and Liu, P.C., “Secure Communication Protocol with User Privacy for a Home Healthcare System,” The 4th International Symposium on Medical Information and Communication Technology, Taiwan, 2010.
  39. Hsu, C.L., Lin, Y.L., and Wu, T.S., “Improved Time-Bound Hierarchical Key Assignment Scheme,” 2011 e-CASE & e-Tech International Conference, Tokyo, Japan, 2011, pp. 3259-3267.
  40. Tsai, K.Y., Wu, T.C., Hsu, C.L., and Martin, K., “Provably Secure Concurrent Multisignature with Document Decomposition,” 第二十屆全國資訊安全會議 (榮獲會議最佳論文)
  41. 許建隆、陳建仁、林子煒、詹宜勳,適用於多重伺服器環境之可鑑別金鑰交換協定 2010聯合國際研討會 Cyber 2010,台北,2010
  42. Hsu, C.L., Chan, Y.S., and Lin, T.W., “Security Analysis of an eSeal used in Taiwan Customs Officials,” 2011 IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS), Tainan, 2011, pp. 668-675.
  43. Lu, C.F., Lin, Y.L., and Hsu, C.L., “Password-based Authenticated Multi-Party key Exchange Scheme with Privacy Preservation,” 2012 e-CASE & e-Tech International Conference, Hong Kong, 2012, pp. 845-853.
  44. Lu, C.F., Hsu, C.L., Yen, Y.C., Tsai, K.Y., and Wu, T.S., “Password-Authenticated Key Exchange with Privacy Preservation for Mobile Environment,” 2012 e-CASE & e-Tech International Conference, Hong Kong, 2012, pp. 1545-1550.
  45. Hsu, C.L., and Lai, K.W., “An Online RFID Protocol with Secure Ownership Transfer,” WebTech 2012, Bali, Indonesia, 2012, pp. 92-97.
  46. Hsu, C.L., Lin, T.W., and Lin, Y.L., “Authenticated Group Key Agreement Protocol Based on Chebyshev Chaotic Map,” e-CASE & e-Tech 2013, Kitakyushu, Japan, 2013, pp. 195-205.
  47. Hsu, C.L., and Lin, T.W., “Password Authenticated Key Exchange Protocol for Multi-Server Mobile Networks Based on Chebyshev Chaotic Map,” The Ninth International Workshop Mobile Peer-to-Peer Computing (MP2P'13), San Diego, USA, 2013, pp. 90-95.

四、其他著作

1.   許建隆,“數位簽章”,中央研究院計算中心通訊,第十六卷,第九期,八十九年,頁68-72。

2.   許建隆,“網路駭客DDos攻擊”,中央研究院計算中心通訊,第十六卷,第二十期,八十九年,頁158-161。

3.   許建隆,“藍芽科技”,中央研究院計算中心通訊,第十八卷,第二十三期,九十一年,頁182-184。

4.   許建隆,“PDA行動通訊安全”,中央研究院計算中心通訊,第十九卷,第一期,九十二年。

5.   許建隆,“藍芽與無線區域網路IEEE 802.11安全性之比較”,中央研究院計算中心通訊,第十九卷,第五期,九十二年。

6.   許建隆,“助人最樂,淑世為榮-資管課輔隊之社會關懷實作報導”,長庚大學第53期校訊,九十五年

         7.   許建隆,吳文傑,“『親親我的寶貝親子愛心園遊會』~本校資管系社會關懷課程活動概況”,長庚大學第57期校訊,九十五年。

         8.   許建隆、何煒華,“亞洲資訊安全能量調查報告”,TWISC,九十五年。

         9.   許建隆,“中國資訊安全能量調查報告”,TWISC,九十七年。

         10. 張淑滿,施大偉,林俊逸、許建隆,“社會關懷十週年紀念冊”,長庚大學資訊管理系,九十九年。

         11. 許建隆、莊閎名,“適用於雲端運算環境之聯合匿名身分管理機制”,第11屆台塑關係企業應用技術研討會,一○二年。

 

五、學位論文

1. 許建隆,“依檔分割任意委派簽署者之群體簽章技術”,國立台灣科技大學資訊管理系碩士論文,八十六年五月。

2. 許建隆,“適用於群體導向應用之鑑別加密法”,國立台灣科技大學資訊管理系博士論文,九十一年一月。

 

六、專書

1. 許建隆、楊松諺,“密碼學實務”,碁峰資訊股份有限公司,九十四年。(ISBN 986-421-617-1)

2. 許建隆,“SSL與TLS實務應用-架構全球網路的安全機制”,碁峰資訊股份有限公司,九十四年。(ISBN 986-421-607-4)

         3. 陳昱仁、廖耕億、許建隆林仲志,“RFID概論”,華泰文化事業股份有限公司(ISBN 957-609-768-3),九十八年。

         4. 馬成珉、林金祥、白恭瑞、廖耕億、許建隆、陳世民、林裕勛,“RFID資訊系統開發設計”,華泰文化事業股份有限公司,一○○年(ISBN 978-957-609-835-2)。

         5. 陳昱仁,廖耕億,許建隆,林仲志,“RFID概論二版”,華泰文化事業股份有限公司(ISBN 978-957-609-891-8),一○一年。

 

七、專利

        1. 魏石麟、楊松諺、吳宗成、蔡國裕、許建隆,“集中式自我驗證標記方法”,(中華民國專利證書發明第I 255627),2006年。

        2. 許建隆、吳宗成、林燕卿,“安全視訊會議系統及方法”,中華民國發明專利第I 387292號,2013/2/21

        3. 曾俊儒許建隆“人體試驗申請資訊系統”,中華民國發明專利申請第97149620,2008/12/19。(2013/7/25已核准,專利證書申請中)

        4. 曾俊儒許建隆“智慧型醫材研發專案管理系統”,中華民國發明專利申請第97149616,2008/12/19。

        5. 曾俊儒、黃美涓、林仲志、李仁貴、蔡彩璇、許建隆“體適能檢測設備及測量退化指標之方法”, 中華民國發明專利申請第100107271,2011/3/4。(已核准專利,專利證書申請中)。

 

八、參與研究計畫

計畫名稱

計畫編號

執行時間

職稱

委託機構

計畫總金額

備註

Email來源真實性確認之安全密碼協定研究

GARPD3C0011

2013/2/1~2013/12/31

主持人

國立中央大學前瞻科技研究中心

403,470

執行中

具安全與隱私保護的SaaS社區健康促進與照護平台建置與使用者接受度之研究(3/3)

(NSC 100-2628-H-182-001-MY3)

(國科會優秀年輕學者計畫)

NARPD3A0033

NSC 100-2628-H-182-001-MY3

2013/08/01~2014/07/31

計畫主持人

國科會

543,000

未執行

資通安全學程計畫:資訊與醫療安全學程-管理與應用(102年度)

EARPD3C0011

2013/02/01~2014/01/31

共同主持人

教育部

1,443,452

執行中

邁向頂尖大學計畫:健康老化-人口老化與社會經濟研究團隊(102年度)

EMRPD1C0301

2013/01/01~2013/12/31

共同主持人

長庚大學

執行中

整合型健康促進照護平台建置與應用子計劃三:具隱私保護的個人健康管理平台之研究與建置

CMRPD390033

2012/09/01~2013/08/31

計畫主持人

長庚醫院

665,483

執行中

【延攬客座科技人才】博士後研究-林器弘

(NSC 101-2811-H-182-001)

NZRPD3B0571

NSC 101-2811-H-182-001

2012/08/01~2013/07/31

計畫主持人

國科會

827,994

執行中

多元族群女性健康知能三合一教育計畫與VIP數位平台建置(第Ⅱ階段)

(NSC 101-2511-S-255-007-)

NSC 101-2511-S-255-007-

2012/08/01~2013/07/31

共同主持人

國科會

670,000

執行中

具安全與隱私保護的SaaS社區健康促進與照護平台建置與使用者接受度之研究(2/3)

(NSC 100-2628-H-182-001-MY3)

(國科會優秀年輕學者計畫)

NARPD3A0032

NSC 100-2628-H-182-001-MY3

2012/08/01~2013/07/31

計畫主持人

國科會

505000

執行中

基於雲端運算架構之居家照護的具隱私保護鑑別協定與存取控制機制研究(分項總、二)

UARPD3B0061

2012/08/01~2013/07/31

計畫主持人

長庚大學

227,766

執行中

邁向頂尖大學計畫:健康老化-人口老化與社會經濟研究團隊(101年度)

EMRPD1B0351

2012/04/01~2012/12/31

共同主持人

長庚大學

 

已結案

資通安全學程計畫:資訊與醫療安全學程-管理與應用(101年度)

EARPD3B0011

2012/02/01~2013/01/31

共同主持人

教育部

1,712,034

已結案

整合型健康促進照護平台建置與應用子計劃三:具隱私保護的個人健康管理平台之研究與建置

CMRPD390032

2011/09/01~2012/08/31

計畫主持人

長庚醫院

606,560

已結案

具安全與隱私保護的SaaS社區健康促進與照護平台建置與使用者接受度之研究(1/3)

(NSC 100-2628-H-182-001-MY3)

(國科會優秀年輕學者計畫)

NARPD3A0031

NSC 100-2628-H-182-001-MY3

2011/08/01~2012/07/31

計畫主持人

國科會

706,000

已結案

延攬客座科技人才博士後研究-李明仁

(NSC 100-2811-H-182-001)

NZRPD3A0501

NSC 100-2811-H-182-001

2011/08/01~2012/07/31

計畫主持人

國科會

827,994

已結案

社群型健康體適能促進平台建置與導入

(NSC 100-2410-H-182-023-MY2)

NSC 100-2410-H-182-023-MY2

2011/08/01~2013/07/31

共同主持人

國科會

1,041,000

執行中

基於雲端運算架構之居家照護的具隱私保護鑑別協定與存取控制機制研究(分項總、四)

UARPD3A0141

2011/07/01~2012/06/30

計畫主持人

長庚大學

529,146

已結案

具腦機介面與音樂治療功能之音樂播放器之開發應用

(NSC 100-2218-E-182-003-)

NSC 100-2218-E-182-003-

2011/06/01~2012/03/31

共同主持人

國科會

586,000

已結案

數位證據備份之安全控管與驗證機制系統後續實務委託研究計畫

GARPD3A0011

2011/04/01~2011/12/15

計畫主持人

法務部調查局

670,000

已結案

資通安全學程計畫:資訊與醫療安全學程(100年度)

EARPD3A0011

2011/02/01~2012/01/31

共同主持人

教育部

1,062,500

已結案

高齡者體適能健康檢測平台開發

(NSC 100-2321-B-182A-003-)

NSC 100-2321-B-182A-003-

2011/01/01~2011/12/31

共同主持人

國科會

2,500,000

已結案

「行動商務」獎勵教學與課程發展計畫

2010/09~

2011/02

計畫主持人

長庚大學

50,000

已結案

具安全與隱私保護的使用者導向健康照護系統之設計與使用者接受度之探討(2/2)

(NSC 98-2410-H-182-007-MY2)

NARPD380062

NSC 98-2410-H-182-007-MY2

2010/08/01~2011/07/31

計畫主持人

國科會

489,000

已結案

安全即時通訊之智慧型家庭互動系統概念設計

2010/07/01~2011/06/30

共同主持人

長庚大學

439,000

已結案

具安全與隱私保護的智慧型健康照護環境之研究與建置

UARPD390111

2010/07/01~2011/06/30

計畫主持人

長庚大學

539,250

已結案

整合型健康促進照護平台建置與應用子計劃三:具隱私保護的個人健康管理平台之研究與建置

CMRPD390031

2010/07/01~2011/06/30

計畫主持人

長庚醫院

756,580

已結案

99年度「數位證據備份之安全控管與驗證機制系統」

GARPD390041

2010/05/08~2010/12/18

計畫主持人

法務部調查局

680,000

已結案

RFID科技及應用人才培育先導型計畫:RFID物流與供應鏈資源中心99年度計畫

2010/04/01~2011/03/31

共同主持人

教育部

4,700,000

已結案

資通安全學程計畫:資訊與醫療安全學程(99年度)

EARPD390011

2010/02/01~2011/01/31

共同主持人

教育部

950,000

已結案

資通訊重點領域課程推廣計畫:行動商務(99年度)

EARPD390021

2010/02/01~2011/01/31

計畫主持人

教育部

387,500

已結案

CPU悠遊卡之安全性評估

2010/01/21~2010/06/30

共同主持人

悠遊卡公司

640,000

已結案

國家圖書館98年全國博碩士論文知識加值系統專案

2010/01/01~2010/12/31

資訊安全顧問

飛資得資訊股份有限公司

 

已結案

電子票證營運持續管理計畫

2010/01/01~2010/12/31

研究員

悠遊卡公司

700,000

已結案

「網路攻防技術與應用」獎勵教學與課程發展計畫

2009/09~

2010/02

計畫主持人

長庚大學

50,000

已結案

資通安全學程計畫:資訊與醫療安全學程(98年度)

EARPD370012

2009/09/01~2010/01/31

共同主持人

教育部

1,014,530

已結案

具安全與隱私保護的使用者導向健康照護系統之設計與使用者接受度之探討(1/2)(NSC 98-2410-H-182-007-MY2)

NARPD380061

NSC 98-2410-H-182-007-MY2

2009/08/01~2010/07/31

計畫主持人

國科會

545,000

已結案

建構高齡者成功老化之智慧型居家健康促進平台--以潛在或患有代謝症候群患者為例(I)

(NSC 98-2410-H-182-019)

NSC 98-2410-H-182-019

2009/08/01~2010/07/31

共同主持人

國科會

435,000

已結案

RFID供應鏈管理系統之雙向鑑別與所有權轉移機制研究(子計畫三)

UARPD380241

2009/07/01~2010/06/30

計畫主持人

長庚大學

332,310

已結案

結合即時通訊與RFID技術之嬰幼兒照護平台(學生:柯孟君)

NZRPD380331

2009/07/01~2010/02/28

指導教授

國科會

47,000

已結案

RFID科技及應用人才培育先導型計畫:RFID物流與供應鏈資源中心98年度計畫

EERPD280061

2009/04/01~2010/03/31

共同主持人

教育部

4,998,594

已結案

98-99年RFID科技及應用學程計畫:RFID物流與供應鏈應用學程

EERPD280031

2009/02/01~2011/01/31

計畫聯絡人

教育部

1,555,150

已結案

智慧型高齡者照護用臨床醫材研發:高齡者照護用醫材產業融整與協同研發專案管理(第3年)(分項五,2)

GARPD350083

2008/12/01~2009/11/30

計畫主持人

經濟部

1,057,000

已結案

「資訊安全基礎數學」發展創新課程計畫

2008/09~

2009/02

計畫主持人

長庚大學

50,000

已結案

資通安全學程計畫:資訊與醫療安全學程(97年度)

EARPD370011

2008/09/01~2009/08/31

共同主持人

教育部

845,500

已結案

具隨選與分級訂閱服務的安全數位版權管理系統之研究與實現

(NSC 97-2221-E-182-032)

NARPD370171

NSC 97-2221-E-182-032

2008/08/01~2009/07/31

計畫主持人

國科會

506,000

已結案

RFID物流與供應鏈資源中心「資訊管理」教材發展計畫

2008/04~

2009/03/31

計畫主持人

教育部

 

已結案

資通安全實習課程教材發展計畫

2008/04/01~2010/03/31

協同主持人

教育部

 

已結案

電子商務安全課程教材發展計畫

2008/04/01~2010/03/31

編撰成員

教育部

 

已結案

資通安全國家標準之研訂與推廣

2008/03~

2008/11

顧問

經濟部標準檢驗局

 

已結案

“Eco-City:健康樂活城” 智慧行動生活科技區域整合中心(1/3)

(NSC97-2218-E-009-026)

NSC97-2218-E-009-026

2008/02/01~2009/04/30

共同主持人

國科會

45,136,000

已結案

經濟部學界科專計畫:高齡者照護用醫材產業融整推動辦公室與協同研發專案管理(分項五, 9)(第二年)

GARPD360082

2007/12/01~2008/11/30

計畫主持人

經濟部

1,360,307

已結案

「社會關懷實作」發展創新課程計畫

2007/09~

2008/02

計畫主持人

長庚大學

50,000

已結案

RFID物流與供應鏈應用學程

2007/09~

2009/01

聯絡人

教育部

1,199,200

已結案

資通安全學程推廣計畫:資訊與醫療安全學程(96年度)

EARPD360021

EARPD360021

2007/09/01~2008/08/31

共同主持人

教育部

820,000

已結案

適用於Ad-hoc應用環境中跨部門與階層式群體之動態多重秘密分享與廣播加密機制的研究

NARPD360091

NSC 96-2221-E-182-017

2007/08/01~2008/07/31

計畫主持人

國科會

271,000

已結案

辦理「資安資訊分享與分析」(ISAC)研討會實施計畫

2007/08~

2007/12

研究員

資訊工業策進會

29,499

已結案

RFID物流與供應鏈資源中心

2007/04/01~2008/03/31

教材編撰成員

教育部

 

已結案

資通安全國家標準之研訂與推廣

2007/03/15~2007/11/01

共同主持人

經濟部標準檢驗局

1,620,000

已結案

經濟部學界科專計畫:高齡者照護用醫材產業融整推動辦公室與協同研發專案管理(分項五, 14)

GARPD350081

2006/12/01~2007/11/30

計畫主持人

經濟部

1,231,190

已結案

植基於橢圓曲線離散對數之授權導向密碼系統的設計與應用

(NSC 94-2213-E-182-019)

NARPD340161

NSC 94-2213-E-182-019

2005/08/01~2006/07/31

計畫主持人

國科會

473,000

已結案

資通安全人才培育計畫

(NSC 94-3114-P-001-001-Y, NSC 94-3114-P-011-001)

NSC 94-3114-P-001-001-Y, NSC 94-3114-P-011-001

2005/04~

2008/03

兼任研究員

國科會

 

已結案

資通安全國家標準之研訂與推廣

2005/02/01~2005/11/30

研究員

經濟部標準檢驗局

1,800,000

已結案

 

九、主/協辦研討會或國際認證課程

  1. 協辦資通安全研究與教學中心(TWISC)主辦「HSM (Hardware Security Module)實務研討會」,日期:2007年3月16日,地點:台灣科技大學。
  2. 協辦資通安全研究與教學中心(TWISC)與中華民國資訊安全學會(CCISA)主辦「安全隱私與信賴最新技術與趨勢研討會」,97年5月28,地點:台灣科技大學。
  3. 協辦「2008聯合國際研討會」,日期:97年11月21日,地點:輔仁大學。
  4. 協辦「2009聯合國際研討會」,日期:98年11月14日,地點:輔仁大學。
  5. 主辦「RFID學程課程種子師資教師研習營」,98年2月17日(二)  8:40 – 16:00,地點:長庚大學管理學院七樓會議室。
  6. 主辦「自動識別與RFID」實驗教材說明會,98年2月18日(三)  9:40 – 13:00,地點:長庚大學管理學院七樓會議室。
  7. 主辦「產學合作實驗教材研討會」,98年2月18日(三)  12:40 – 16:00,地點:長庚大學管理學院七樓會議室。
  8. 主辦「RFID學程課程種子師資教師研習營」,98年2月17日(二)  8:40 – 16:00,地點:長庚大學管理學院七樓會議室。
  9. 主辦「自動識別與RFID」實驗教材說明會,98年2月18日(三)  9:40 – 13:00,地點:長庚大學管理學院七樓會議室。
  10. 主辦「產學合作實驗教材研討會」,98年2月18日(三)  12:40 – 16:00,地點:長庚大學管理學院七樓會議室。
  11. 主辦「國際標準ISO27001 ISMS主導稽核員認證課程」,日期:98年6月22日 – 98年6月26日(有16人考取該國際證照),地點:長庚大學。
  12. 主辦「國際標準ISO27001 ISMS主導稽核員認證課程」,日期:98年7月4日 – 98年7月8日 (約有18人考取該國際證照),地點:長庚大學。
  13. 主辦「國際標準ISO27001 ISMS主導稽核員認證課程」,日期:98年7月6日 – 98年7月10日(有19人考取該國際證照),地點:長庚大學。
  14. 主辦「RFID產學合作實驗教材種子教師研習營」日期:99年01年22,地點:長庚大學。
  15. 主辦「國際標準ISO27001 ISMS主導稽核員認證課程」,日期:99年1月18日 –99年1月22日(有19人考取該國際證照),地點:長庚大學。
  16. 主辦「國際標準ISO27001 ISMS主導稽核員認證課程」,日期:99年1月22、24、30、31日 (有19人考取該國際證照),地點:長庚大學。
  17. 主辦「國際標準ISO20000主導稽核員證照課程」,日期:99年6月29日 – 99年7月3日 (有14人考取該國際證照),地點:長庚大學。
  18. 協辦「2010聯合國際研討會」,日期:99年11月19日,地點:銘傳大學。
  19. 協辦「數位鑑識教材教學暨數位鑑識工具使用觀摩研習營」,日期:99年09年09,地點:中國科技大學。
  20. 主辦「ISO 27001 ISMS主導稽核員」國際證照班,日期:100年1月17日 – 100年1月21日 (有18人考取該國際證照)。
  21. 協辦「科技犯罪偵查與數位鑑識實務研討會」,日期:100年03年24,地點:台灣警察專科學校。
  22. 主辦「ISO 27001 ISMS主導稽核員」國際證照班,日期:100年7月16、17、18日 – 100年7月23、24日 (有19人考取該國際證照)。
  23. 協辦資通安全研究與教學中心(TWISC)與中華民國資訊安全學會(CCISA)主辦「Web應用程式安全與攻防實務」研討會,日期:101年1月9日-101年1月10日,地點:致理技術學院圖書館602教室。
  24. 主辦「ISO 27001 ISMS主導稽核員」國際證照班,日期:101年8月13日– 101年8月17日 (有18人考取該國際證照)。
  25. 主辦「BS 10012 PIMS主導稽核員」國際證照班,日期:101年9月8、9日 – 101年9月15、16、17日 (有13人考取該國際證照)。
  26. 主辦「BS 10012 PIMS主導稽核員」國際證照班,日期:102年1月21日 – 102年1月25日 (有18人考取該國際證照)。
  27. 主辦「ISO 27001 ISMS主導稽核員」國際證照班,日期:102年6月29、30日– 102年7月6、7、8日。

瀏覽數  
  • 友善列印
  • 新增到收藏夾
  • 分享
將此文章推薦給親友
請輸入此驗證碼
Voice Play
更換驗證碼