國立暨南國際大學資訊管理學系

 

【學經歷】 【期刊論文】 【研討會論文】 【博士論文】  【專利】   【專書及專書論文】 【研究計畫】 

學經歷 (TOP)

學歷:
1.中興大學-應用數學所博士
2.臺灣大學-資訊工程所碩士
3.交通大學-資訊科學系學士

經歷:
1.國立暨南國際大學資管系 教授
2.國立暨南國際大學資管系 副教授
3.朝陽科技大學 副教授
4.南開技術學院 副教授
5.南開技術學院 講師
6.智邦科技 國外業務員
7.交通部電信研究所 聘用助理研究員

榮譽:
1. 最佳論文: Hung-Yu Chien, Jia-Zhen Yen, Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability”, The 5th Joint Workshop on Information Security (JWIS) 2010. [Best paper award]
2. 最佳論文: H. Y. Chien, “ID-Based Key Agreement with Anonymity for Ad Hoc Network”, accepted and to be appear in proceedings of The 2007 IFIP International Conference on Embedded and Ubiquitous Computing, December 17 - 20, 2007 , Taipei, Taiwan, LNCS 4808, pp. 422-431, Springer.
3. Editor, ISRN Communications and Networking, Hindawi Publishing Corporation.

Lead guest editor International Journal of Distributed Sensor Networks Special

Issue on Innovative Applications and Security of Internet of Things (IoT)

International Editor, International Journal of Information Security Science,

ISSN:2147-0030, publisher: GAZI UNIVERSITY, Turkey. 2012~

.Editor, ISRN Scientific World, Hindawi Publishing Corporation. 2014~

4. Visiting scholar, University California, Davis. Hosted by Prof. S. (Shyhtsun) Felix Wu. 2011.08~2012.07
5. 98年度暨大研究績優獎
6.暨南大學 101年高引用率論文獎

7.國科會 100, 101,102,103,104,105 年度獎勵特殊優秀人才
8.第六、八屆中華民國資訊安全學會 理監事2009/08 ~ 2012/05
9.100年度(第49屆)國科會補助科學與技術人員國外短期研究: 2011.08~2012.07.: 社群安全之研究
10.國科會計畫團隊績優獎- 2013.8.29 +2014.9.3
11.2011 the top 10 most cited paper in the computer journal
12. 十八學年度無線射頻辨識與企業資源規劃(RFID & ERP)就業學程計畫, 職訓局
13. 九十八學年度國科會補助台奧雙邊合作研討會[整合 RFID 網路之安全, Security in the Internet of Things]

14. 專題[以物聯網為基礎建構魚菜共生系統暨資料分析共享平台]獲「2016第21屆全國大專校院資訊應用服務創新競賽」 佳作。2016/11

期刊論文(TOP)

學術期刊論文
1. Jan, J. K., Tseng, Y. M. and Chien, H. Y., “A Threshold Signature Scheme Withstanding the Conspiracy Attack”, Communications of the Institute of Information and Computing Machinery, Taiwan, Vol.2, No.3, Sept. 1999, PP.31-38 (1999)
2. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “An Impersonation Attack on Tan-Zhu’s Remote Login Scheme”, Electronics Letters, United Kingdom, Vol.36, No.14, July 2000, PP.1202-1203 (2000). [SCI]
3. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “Comment on Security of Digital Signature with One-time Pair of Keys”, Electronics Letters, United Kingdom, Vol.36, No.16, 2000, PP.1374-1375 (2000). [SCI]
4. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “A Practical (t,n) Multi-Secret Sharing Scheme”, IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Japan, Vol.E83-A, No.12, Dec. 2000, PP.2762-2765 (2000) . [SCI]
5. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “A Modified Remote Login Authentication Scheme based on Geometric Approach”, The Journal of Systems and Software, U.S.A. Vol.55, Jan. 2001, PP.287-290.
6. Chien, H. Y., Chen, Y. H., Jan, J. K. and Tseng, Y. M. ”Cryptanalysis on dynamic authentication protocol for personal communication system”, Electronics Letters, United Kingdom, Vol.37, No.14, July 2001, PP.895-896.
7. Chien, H. Y., Wu, T. C., Jan, J. K. and Tseng, Y. M. ”Cryptanalysis of Chang-Wu’s Group-oriented Authentication and Key Exchange Protocols”, Information Processing Letters, Amsterdam, Vol.80, No.2, Oct. 2001,PP. 113-117.
8. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “On the Security Methods for Protecting Password Transmission”, International Journal of Informatics, U.S.A. Vol.12, No.3, PP.469-476..
9. Chien, H.Y., and Jan, J.K. “An efficient secure broadcasting in a hierarchical tree”, Journal of Computer, vol. 14, no. 3-4, pp. 6-11 (Dec. 2002).
10. Chien, H.Y., “Cryptanalysis on Lin-Wu’s Convertible Group Signature”, Journal of Computer, , vol. 14, no. 3-4, pp. 12-15 (Dec 2002).
11. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “On the Security of Generalization of Threshold Signature and Authenticated Encryption”, IEICE Trans. On Fundamentals of Electronics, Communications of Computer Sciences, Japan, Vol. 84 , No. 10, PP. 2606~2609 (2001). [SCI]
12. Chien, H. Y., Jan, J. K. and Tseng, Y. M. ”An unified approach to secret sharing schemes with low distribution cost”, Journal of the Chinese Institute of Engineers, Vol. 25, No. 6, pp. 723-733 (2002). [SCI, EI]
13. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “An Efficient and Practical Solution to Remote Authentication: Smart Card”, Computers & Security, Vol. 21, No. 4, pp. 372-375, (2002). [SCI, EI]
14. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Cryptanalysis on Mu-Varadharajan’s e-voting”, Applied Mathematics and Computation, vol. 139, no.2-3, 2003, pp. 525-530. [SCI]
15. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Forgery attacks on multi-signature schemes for authenticating mobile code delegates”, IEEE Transactions on Vehicular Technology, IEEE Transactions on Vehicular Technology, 51(6), pp. 1669-1671. (nov., 2002) [SCI, EI]
16. Tseng, Y.M. , Jan, J.K., and Chien, H.Y. ”Digital signature with message recovery using self-certified public keys and its variants”, Applied Mathematics and Computation, Vol. 136, No.2-3, pp. 203-214 (2002) [SCI]
17. Chien, H. Y. ”New Approach to authorization and authentication in distributed environments”, Communications of the CCISA, Vol. 9 No. 3 (June 2003).
18. Chien, H. Y., and Jan, J. K. “A hybrid authentication protocol for large mobile network”, The Journal of Systems and Software, U.S.A. Vol. 67, no. 2, 2003, pp 123-130. [SCI]
19. Chien, H. Y., Jan, J. K. “Robust and Simple Authentication Protocol”, The Computer Journal, vol. 46, no. 2, pp.193-201, 2003 [SCI, EI]
20. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “Authenticated encryption schemes with messages for message flows”, International Journal of Computers & Electrical Engineering, U.S.A., vol. 29, no. 1, 2003, pp. 101-109, 2003 [SCI, EI]
21. Chien, H. Y. “Convertible authenticated encryption scheme without using conventional one-way function”, Informatica, vol. 14, no. 4, pp.445-454, 2003 [SCI]
22. Chien, H.Y., Jan, J. K. ”New Hierarchical Assignment without Public-Key Cryptography”, Computers & Security, 22(6), 2003, pp. 523-526 [SCI, EI]
23. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Partially blind threshold signature based on RSA”, Informatica, vol.14 , no.2 , pp. 155-166 (2003) [SCI]
24. Chien, H. Y., Jan, J. K. “Improved authenticated multiple-key agreement protocol without using conventional one-way function”, Applied Mathematics and Computation, 147(2), 2004, pp. 491-497 [SCI]
25. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Solving the invalid signer-verified signature problem and comments on Xia-You’s group signature”, Journal of Systems and Software, vol.73 , no.3, pp. 369-373 , 2004
26. Chien, H.Y., “Efficient Time-Bound Hierarchical Key Assignment Scheme”, IEEE Trans. Knowledge and Data Engineering, 16(10), pp. 1301 – 1304, 2004
27. Chien, H.Y., Wang, R.C., and Yang, C.C. “Note on Robust and Simple Authentication Protocol”, The Computer Journal, vol. 48, no. 1, pp. 27~ 29(2005). [SCI, EI]
28. Chien, H.Y., “Comments on ID-based multi-signature with distinguished signing authorities”, Applied Mathematics and Computation, vol. 170, no. 2, 2005, pp 1284-1289.
29. Hung-Yu Chien, Ru-Yu Lin, “An improved tripartite authenticated key agreement protocol based on Weil pairing”, IJASE 2005.
30. Hung-Yu Chien, ‘”Approaches to Web Authentication and Password Compromise Risk”, Communications of the CCISA, Vol. 11, No. 3, July 2005.
31. Hung-Yu Chien, “Improvements on Authentication Protocols with Anonymity Using Error Correction Codes”, Journal of Computer Science and Application, 2005.
32. Chien, H. Y., “Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols”, Cryptology ePrint Archive: Report 2005/013.
33. Chien, H.Y., “Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings”, Cryptology ePrint Archive: Report 2005/013.
34. Hung-Yu Chien, “Extending RSA Cryptosystems to Proxy Multi-Signature Scheme allowing Parallel Individual Signing Operation”, Journal of the Chinese Institute of Engineers, 29/3, pp. 527-532 , 2006. [SCI]
35. Hung-Yu Chien, “ID-based Tripartite Multiple Key Agreement Protocol facilitating Computer Auditing and Transaction Refereeing”, Journal of Information Management 13(4), 2006, pp. 185~204. NCNU [TSSCI]
36. Chien, H. Y., “Forgery attack on digital signature scheme without using one-way hash and message redundancy”, IEEE Communication Letters 10 (5), 2006, pp. 324~325. [SCI]
37. Jinn-Ke Jan, Hung-Yu Chien, Hung-Yi Teng, “An efficient authentication protocol with perfect anonymity for 3G/WLAN interworking”, Journal of Computers, 2006.
38. H.-Y. Chien, R.-Y. Lin, “Improved ID-based security framework for ad hoc network”, doi:10.1016/j.adhoc.2006.07.006. [EI]
39. Hung-Yu Chien, Guest-Editor, Communications of the CCISA, Vol. 12, No. 4, October 2006.
40. Chien, H.Y., Chen, C. H. “Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards”, Computers Standards & Interfaces. Vol 29/2 pp. 254-259, Feb., 2007. [SCI]
41. H.-Y. Chien, W. S. Lin, C. Y. Lin, S. C. Juan, Y. Z. Ku, S. H. Wang “Effective and Efficient Approach to Web Accounts Management and Authentication Minimizing Password Compromise Risk and Possible Loss”, Journal of Internet Technology 8(3), pp. 345-349, 2007. [EI].
42. H. Y. Chien, and C. W. Huang, “Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements”, ACM Operating System Reviews, Volume 41, Issue 4, (July 2007), pp. 83-86. [EI].
43. H. Y. Chien, “Comments on an Efficient ID-based Broadcast Encryption Scheme”, IEEE transactions on Broadcasting, 53 (4), pp. 809-810, Dec. 2007. [SCI]
44. H. Y. Chien, “SASI: A New Ultra-Lightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity”, IEEE Transactions on Dependable and Secure Computing 4(4), pp. 337-340, October, 2007. [SCI]
45. H. Y. Chien, Chen Wei Huang, “A Lightweight RFID Protocol using substring”, accepted and to be appear in proceedings of The 2007 IFIP International Conference on Embedded and Ubiquitous Computing, December 17 - 20, 2007 , Taipei, Taiwan, LNCS 4808, pp. 333-345, Springer.
46. Hung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen, “An efficient authentication protocol with anonymity for 3G/WLAN interworking”, Journal of Internet Technology 9(1), 2008, pp. 15-24. [EI]..
47. Hung-Yu Chien, “Selectively Convertible Authenticated Encryption in The Random Oracle Model”, The Computer Journal, 2008 51: 419-434;
48. Hung-Yu Chien, “Efficient and practical approach to authenticating public terminals”, International Journal of Computers and Applications, 30(3) 2008. [EI]
49. Hung-Yu Chien, Tzu-Hang Hsu and Yuan-Liang Tang, “Fast Pre-authentication with Minimized Overhead and High Security for WLAN Handoff”, Issue 2, Volume 7, WSEAS TRANSACTIONS ON COMPUTERS, February 2008. [EI]
50. Hung-Yu Chien, “Forging a winning bid in Mu-Varadharajan’s E-auction”, Issue 1, Volume 5, WSEAS TRANSACTIONS on BUSINESS and ECONOMICS, January 2008. [EI]
51. Hung-Yu Chien, “Practical anonymous user authentication scheme with security proof”, Computers & Security 27 (2008), pp. 216-223.
52. Hung-Yu Chien · Tzong-Chen Wu, “Improving Varying-Pseudonym-Based RFID Authentication Protocols to Resist Denial-of-Service Attacks“, Journal of the Korea Institute of Information Security and Cryptology (ISSN : 1598-3986) v.18, n.6B, pp.259-269, 2008.
53. Hung-Yu Chien, Ru Yu Lin, “The study of secure e-will system on the Internet”, Journal of Information Science and Engineering, 25卷3期 (2009/05), 877-893.SCI]
54. Hung-Yu Chien, Tzong-Chen Wu, “Provably Secure Password-Based Three-Party Key Exchange with Optimal Message Steps“, The Computer Journal 2009 (August) 52: 646-655; doi:10.1093/comjnl/bxn070 [1.394, 17 out of 49 Hardware & Architecture, 50 out of 116 Information Systems, 36 out of 9336 out of 93] [SCI, EI].
55. Hung-Yu Chien, Tzu-Hang Hsu, “Secure Fast WLAN Handoff Using Time-Bound Delegated Authentication“, International Journal of Communication Systems. 2(5) (May 2009) 565-584
56. An-Ni Shen, Song Guo, Hung Yu Chien and Minyi Guo, “A scalable key pre-distribution mechanism for large-scale wireless sensor networks“, CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, Concurrency Computat.: Pract. Exper., 21(10), (2009 July), 1373-1387,
57. Hung-Yu Chien, Chi-Sung Laih, “ ECC-Based Lightweight Authentication Protocol with Un-traceability for Low-Cost RFIDs“, Journal of Parallel and Distributed Computing 2009, 69(10), October 2009, pp. 848-853.
58. Hung-Yu Chien and Chen-Wei Huang,“A Lightweight Authentication Protocol for Low-Cost RFID”, Journal of Signal Processing Systems, : Volume 59, Issue 1 (April 2010), Page 95-102. [SCI, EI].
59. Hung-Yu Chien, Chin-Feng Lee, Shih-Bin Liu, Tzong-Chen Wu, “Enhancing Convenience and Situation-Aware Intelligence of Smart Home Services Using Passive RFID and Intelligent Controls”, International Journal of Internet Protocol Technology, 2010 - Vol. 5, No.3 pp. 166 -173. DOI: 10.1504/IJIPT.2010.035387. (EI)
60. Hung-Yu Chien, Tzong-Chen Wu, “Efficient and Scalable Key Agreement Schemes for Mobile RFID Readers and Servers”, International Journal of Innovative Computing, Information and Control (IJICIC), 2010, 6(12), pp. 5463~5472. [SCI]
61. Hung-Yu Chien, Chia-Chuan Yang, Tzong-Chen Wu, Chin-Feng Lee, “Two RFID-based Solutions to Enhance Inpatient Medication Safety”, Journal of Medical Systems, Volume 35, Issue 3 (June 2011), Page 369-375. (SCI). DOI: 10.1007/s10916-009-9373-7Online First™ .
62. J. L. Huang, L. Y. Yeh, H. Y. Chien, “ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-added Services in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, 60(1), 2011, pp. 248-262. (SCI)
63. Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih, “Secure Tripartite STS key Agreement Protocol in Random Oracle Model”, Journal of Information Management 2011, 18(2), pp. 215~235 . (TSSCI).
64. Hung-Yu Chien, “Secure Verifier-based Three-Party Key Exchange in The Random Oracle Model”, Journal of Information Science and Engineering, Vol.27 No. 4, 1487-1501, July 2011. (SCI)
65. Hung-yu Chien, Ming-kuei Yeh, Tzong-chen Wu and Chin-i Lee, “Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups”, Journal of Shanghai Jiaotong University (Science) 16 (5), 604-609, Oct 2011. (EI)
66. Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih, “Server-less RFID Authentication and Search Protocol with Enhanced Security”, International Journal of Communication Systems. 25(3) March 2012,pp.376-385. [SCI]
67. Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih, Chi-Sheng Chen, “On the security of Gen2-based protocols without modifying the standards”, the Journal of The Chinese Institute of Engineers, 35(4) (2012) 391-399. [SCI].
68. Hung-Yu Chien, “Improved Anonymous Multi-Receiver Identity-Based Encryption”, The Computer Journal, 55 (4) (2012): pp. 439-446; doi: 10.1093/comjnl/bxr086. [SCI, EI]
69. Hung-Yu Chien, Chu-Sing Yang, Hung-Pin Hou, “Non-linearity Cannot Help RFID Resist to Full Disclosure Attacks and Terrorist Fraud Attack”, online: 27 JAN 2012, Security and Communication Networks, 2013, Dec 6(12), pp. 1490–1495. (SCI)
70. Chin-I Lee, Tzong-Chen Wu, Hung-Yu Chien and Kuo-Yu Tsai. “Efficient ECC-Based Key Management Scheme for Secure Multicast in Heterogeneous Sensor Networks”. ICIC Express Letters, 6(8), 2040-2050, Aug 2012 (EI)
71. Hung-Yu Chien, Chin-I Lee, Tzong-Chen Wu. “Comments on IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks”, online: 11 OCT 2012, Security and Communication Networks, 2013 Aug 6(8), pp. 993–998. [SCI]
72. Hung-Yu Chien, Tzong-Chen Wu, Ming-Kuei Yeh, “Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks”, Journal of Information Science and Engineering, 29(2), pp. 249-265 (March 2013) [SCI]
73. HungYu Chien, “Combining Rabin Cryptosystem and Error Correction Codes to Facilitate Anonymous Authentication with Un-traceability for Low-End Devices”, Computer Networks, 2013 Oct 57(14), pp. 2705–2717. [SCI]. (2013)
74. Hung-Yu Chien, Shyr-Kuen Chen, Ching-Yang Lin, Jia-Ling Yan, Wei-Chen Liao, Huan-Yi Chu, Kuan-Ju Chen, Bo-Fan Lai and Yi-Ting Chen, “Design and Implementation of Zigbee-Ontology-based Exhibit Guidance and Recommendation System”, International Journal of Distributed Sensor Networks, 2013年11月8日[SCIE]
75. HungYu Chien, “IMPROVED GENERALIZED RING SIGNATURES”, ICIC Express Letters, Part B: Applications, Volume 5, Number 1(tentative), February 2014. [EI]
76. HungYu Chien, “Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card”, accepted by Journal of Shanghai Jiaotong University (Science). [EI]

77.  Hung-Yu Chien, Tzong-Chen Wu, Chien-Lung Hsu “RFID Authentication with Un-traceability and Forward Secrecy in the Partial-Distributed-Server Model”, 2014.Nov accepted by IEICE trans. on Information and Systems. [SCI- COMPUTER SCIENCE, INFORMATION SYSTEMS (91/99)]

78. Hung-Yu Chien, "Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy," Mobile Information Systems, vol. 2015, Article ID 354586, 7 pages, 20

79. Hung-Yu Chien, “A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients”, The computer Journal, 2016 59: 592-601. Nov. 2, 2015, DOI 10.1093/comjnl/bxv094. [SCI][IF:0.787][44/102 2013, 61/102 2014, 53/106 2015] http://comjnl.oxfordjournals.org/content/ early/2015/11/02/comjnl.bxv094

80. Chin-I Lee and Hung-Yu Chien, "An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System," International Journal of Distributed Sensor Networks, vol. 2015, Article ID 642425, 7 pages, 2015/12/6. doi:10.1155/2015/642425. [SCI]. Rank: 52/82.

81. Hung-Yu Chien, “Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking”, Wireless personal communications, September 2016, ISSN: 0929-6212 (Print, , 紙本證明) 1572-834X (Online) DOI: 10.1007/s11277-016-3756-0, https://www.springerprofessional.de/en/elliptic-curve-cryptography-based-rfid-authentication-resisting-/10783570. IF: 2015/0.701, ranking: 63/82.

82. Hung-Yu Chien, “Efficient Authentication Scheme with Tag-Identity Protection for EPC Class 2 Generation 2 Version 2 Standards”,     International Journal of Distributed Sensor Networks, accepted 2017/2/9.

83. Hung-Yu Chien, “Group Authentication with Multiple Trials and Multiple Authentications”, Security and Communication Networks, vol. 2017, Article ID 3109624, 7 pages, 2017. doi:10.1155/2017/3109624. [SCI]

研討會論文(TOP)

研討會論文
1. 簡宏宇, 「電算中心多媒體學習環境架構」, 86年多媒體教學環境規劃與遠距教學研討會, (1987.10).
2. Huang, J. H. and Chien, H. Y. "Optimal Connection of Interconnected Token Rings", Proc. Telecommunication Symposium, Taiwan, pp.339-344 (1990).
3. 簡宏宇等電信研究所資訊室同仁, 「An Implementation of CMIP/CMISE Conformance Test System」, International Workshop on Protocol Test System, (1994. 11).
4. Chien, H. Y. "Decision-making support for equipment management using homepage and database," in proceedings of 1998 Asia Pacific Decision Institute Conference, Taipei, (1998.6).
5. Chien, H. Y., Wu, T. C., Jan, J. K., and Tseng, Y. M. "Improvements of Chang-Wu group-oriented authentication and key exchange protocol", C-210~C-214, 1999 National Computer Symposium (1999).
6. Chien, H. Y., Jan, J. K., and Tseng, Y. M. "On the Generalized Threshold-Based Secret Sharing Schemes", Proceedings of the 10th National Security Conference, National Dung Hwa University, Hualien, Taiwan, May 2000, pp. 285-290 (2000). Cited Number: 2
7. Tseng, Y. M., Jan, J. K. and Chien, H. Y. "Authenticated Encryption Schemes with Message Linkages for Message Flows", Proceedings of the 10th National Security Conference, National Dung Hwa University, Hualien, Taiwan, May 2000, pp.401-407 (2000).
8. Chien, H. Y., Jan, J. K., and Tseng, Y. M. "A New Generalized Group-Oriented Cryptosystem Based on the Systematic Block Codes", Proceedings of the 2000 International Computer Symposium Workshop on Cryptology and Information Security, National Chung Cheng University, Chiayi, Taiwan, , pp. 26-32 (Dec. 2000).
9. Chien, H.Y., Jan, J. K., and Tseng, Y. M. "Undeniable billing of anonymous channel services in wireless communication", Proceedings of the Second International Conference on Parallel and Distributed Computing, Applications, Technologies (PDCAT 2001), (July 9-11, 2001).
10. Chien, H. Y., Jan, J. K., and Tseng, Y. M. "RSA-Based Partially Blind Signature with Low Computation", Proceedings of the 2001 International Conference on Parallel And Distributed Systems, KyongJu City, Korea, June 2001, pp. 385-389 (2001). Cited Number: 7
11. Chien, H. Y., "Forgery Attack on Xia-You's Group Signature", International Computer Symposium, Dec. 18~21, 2002, Hualien, Taiwan (2002).
12. Chien, H. Y., and Jan, J. K. "Improvements of integrated user authentication and access control scheme", Proceedings of the 13th International Security Conference, (2003).
13. 詹進科、簡宏宇、陳哲鋒、陳育毅, 「嵌入圖檔的資訊隱藏方法與實作」, Proceedings of the 13th International Security Conference
14. Chien, H. Y., and Jan, J. K. "An integrated user authentication and access control scheme without public key cryptography", IEEE International Carnahan Conference 2003 on Security Technology (2003)
15. 詹進科 , 簡宏宇 , 游菀瑄, : '線上彩券系統設計與建置', Proceedings of the 14th International Security Conference, (2004). NSC91-2626-E-252-002
16. 簡宏宇、陳哲豪 : '針對Zhou-Fan-Li所提機制之攻擊與改良', Proceedings of the 14th International Security Conference, (2004). NSC91-2626-E-252-002
17. Chien, H.Y.: "An improved ECC-based proxy-protected signature scheme", Proceedings of the 14th International Security Conference, (2004). NSC91-2626-E-252-002
18. Chien, H.Y. "Improved ID-based Tripartite Multiple Key Agreement Protocol from Pairings", Proceedings of the 14th International Security Conference, (2004). NSC91-2626-E-252-002
19. Hung-Yu Chien, Ru-Yu Lin, "Security analysis of the pairing-based, authenticated encryption scheme with self-certified public key", 第十屆全國資訊管理暨實務研討會, 2004 12/18 NSC91-2626-E-252-002
20. Hung-Yu Chien and Che-Hao Chen "A remote authentication scheme preserving user anonymity", The IEEE First International Workshop on Information Networking and Applications, March (INA'2005)(ISBN 0-7695-2249-1), pp. 245-248. NSC92-2213-E-324-036, Cited Number:1
21. Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang, "New Approach to Web Account Management", IMB2005,March 25-26, 2005. (ISBN: 9579129339) NSC92-2213-E-324-036
22. Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang ,"E-passport preventing forgery and fraud", IMB2005,March 25-26, 2005. (ISBN: 9579129339) NSC92-2213-E-324-036
23. Hung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen, "Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks with Multiple Partially Trusted Providers", Proceedings of the 15th Information Security Conference. NSC92-2213-E-324-036
24. Hung-Yu Chien and Ru-Yu Lin, "Cryptanalysis on Xie's Id-based key agreement", Proceedings of the 15th Information Security Conference NSC92-2213-E-324-036
25. 簡宏宇,鄒森輝,白朱閔,巫愛雯,陳佳惠,樊誌濟, "利用赫序函數及橢圓曲線密碼系統建置線上彩券系統", Proceedings of the 15th Information Security Conference NSC92-2213-E-324-036
26. Hung-Yu Chien, Yien Tsang Wu, Yung-Chi Tn, Chia-Ming Liu, Wen Hung Lai, Wan-Jou Fan, "Design and implementation of highly efficient authentication protocol and E-restaurant system", Proceedings of the 15th Information Security Conference). NSC92-2213-E-324-036
27. Chien, H. Y., "On the revocation of proxy signatures", IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027
28. Chien, H. Y., and Lin, R. Y., "Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing", The IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006), June 5-7, 2006 Taichung, Taiwan. NSC 94 - 2213 - E - 324 - 027
29. Chien, H. Y., "Secure Access Control Schemes for RFID Systems with Anonymity", 2006 International Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT'06), Japan. NSC 94 - 2213 - E - 324 - 027.
30. Chien, H. Y., Lin, R. Y. "ID-Based E-Will System using Bilinear Pairings", IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027
31. Chien, H. Y., Teng, H. Y. Teng, Chen Y. C., " Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks", IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027
32. Hung-Yu Chien, "Cryptanalysis on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings", Proceedings of the 16th Information Security Conference, 2006. NSC 94 - 2213 - E - 324 - 027
33. 林茹玉, 簡宏宇, "使用雙線性配對函數與身份為基礎之公開金鑰密碼系統建置線上密封式遺囑系統", Proceedings of the 16th Information Security Conference, 2006. NSC 94 - 2213 - E - 324 - 027
34. 簡宏宇, 陳哲豪, "適用於EPC Class 1 Generation 2 RFID 標籤之安全認證機制", Proceedings of the 16th Information Security Conference, 2006. NSC 94 - 2213 - E - 324 - 027
35. Hung-Yu Chien, Hung-Yi Teng, "An efficient user identification and key distribution scheme preserving user anonymity", Proceedings of the 16th Information Security Conference, 2006. NSC 94 - 2213 - E - 324 - 027
36. Chien, H.Y., Chen, Y. L., "A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme", 2006第十二屆資訊管理暨實務研討會(CSIM IMP2006). NSC 94 - 2213 - E - 324 - 027
37. Chien, H.Y., Hsu, T.H., " 植基於IEEE 802.11i 的安全快速預先認證機制", 2006 第十二屆資訊管理暨實務研討會(CSIM IMP2006). NSC 94 - 2213 - E - 324 - 027
38. Hung-Yu Chien, "Secure E-Tender Protocol with Adaptive Privacy Protection and Adaptive Public Verifiability", International Conference on Business and Information, July 11-13, 2007, Tokyo, Japan. NSC 95-2221-E-260 -050 -MY2
39. Hung-Yu Chien, Yuan-Liang Tang, Ying-Lun Chen, "A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme", in proc. of the 2007 IAENG International Conference on Communication Systems and Applications, Hong Kong, 21-23 March, 2007 NSC 95-2221-E-260 -050 -MY2
40. Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu, "Secure Fast Pre-authentication Based on IEEE 802.11i", in proc. of the 2007 IAENG International Conference on Communication Systems and Applications, Hong Kong, 21-23 March, 2007. NSC 95-2221-E-260 -050 -MY2
41. Hung-Yu Chien, "Novel verifiable multi-secret sharing scheme using bilinear pairing", 2007 International Conference on Advanced Information Technologies (AIT2007), Taichung, Taiwan. NSC 95-2221-E-260 -050 -MY2.
42. H. Y. Chien, "New efficient user authentication scheme with user anonymity facilitating e-commerce applications", IEEE Joint Conference on E-Commerce Technology (CEC'07) and Enterprise Computing, E-Commerce and E-Services (EEE '07), Japan, July 2007. NSC 95-2221-E-260 -050 -MY2.
43. H. Y. Chien, C. W. Huang, "Cryptanalysis of LMAP, M2AP and LI-Wang's improvements", The 17th Information Security Conference, ChaiYi, Taiwan, May 2007. NSC 95-2221-E-260 -050 -MY2.
44. 簡宏宇,陳榮靜,沈安妮, "高效率、高安全性、低儲存成本的感測節點金鑰分配", 第十屆電子商務學術研討會, 2007年10月10日, 國立台北大學, 臺北,台灣. 收錄於 「電子商務研究」學報。 NSC 95-2221-E-260 -050 -MY2.
45. Hung Yu Chien, Rung-Ching Chen, Annie Shen, "Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space", The IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA2008), March 25 -28, 2008, Okinawa, Japan. (EI)
46. 簡宏宇 劉世斌, "以動態樹狀結構為基礎之高效律 RFID 認證", 全國第一屆RFID科技論文研討會, Jan. 31~ Feb. 1, Taipei, Taiwan.
47. Hung-Yu Chien, Tzong-Chen Wu, "Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model", Proc. IEEE ISI 2008 pre-conference workshop, Pacific Asia Workshop on Intelligence and Security Informatics, June 17-20 2008, Taiwan, LNCS 5075, pp. 69-76, 2008, Springer, Berlin.. (LNCS, EI)
48. "Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance", proc. of 2008 IEEE Asia-Pacific Services Computing Conference, IEEE APSCC 2008, December 9-12, 2008, Yilan, Taiwan. (EI).
49. Hung-Yu Chien, "Highly Efficient ID-based Ring Signature from Pairings", proc. of 2008 IEEE Asia-Pacific Services Computing Conference, IEEE APSCC 2008, December 9-12, 2008, Yilan, Taiwan. (EI).
50. An-Ni Shen, Song Guo, Hung-Yu Chien, “ An Efficient and Scalable Key Distribution Mechanism for Hierarchical Wireless Sensor Networks“, IEEE International Workshop on Modeling, Analysis and Simulation of Sensor Networks (MASSN), Sydney, Australia, December, 2008.
51. Hung-Yu Chien, Shih-Bin Liu, “Tree-Based RFID Yoking Proof“, nswctc, vol. 1, pp.550-553, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009.
52. Hung-Yu Chien, Chieh-Shian Tu, Tzong-Chen Wu, “RFID-based, Anonymous Authentication scheme”, Ufirst-09 (International Symposium on UbiCom Frontiers - Innovative Research, Systems and Technologies in conjuction with The Sixth International Conference on Ubiquitous Intelligence and Computing (UIC09), July 13-14 , 2009, Brisbane, Australia
53. Tzong-Chen Wu, Hung-Yu Chien, “Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol“, The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP09) Sep. 12 - 14, 2009, Kyoto, Japan
54. Chin-Feng Lee, Yu-Chang Chen, Hung-Yu Chien , Chi-Sung Laih “Anonymous RFID Yoking Protocol Using Error Correction Codes”, The 2010 Workshop on RFID Security (RFIDsec'10 Asia), Singapore, February 22-23, 2010.
55. Hung-Yu Chien*, and Ying-Lun Chen, , Chien-Feng Lo, Yuh-Ming Huang, “A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security,” 5th International Conference on Grid and Pervasive Computing GPC2010, Hualien, Taiwan, May 10-13, 2010.
56. Hung-Yu Chien, Jia-Zhen Yen, Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability”, The 5th Joint Workshop on Information Security (JWIS) 2010. [Best paper award]
57. Lee C.F., Huang S. R., Chien H. Y., Lee N. Y. Two-Party and Three-Party Remote User Authentication Schemes Using Biometric Data Only For Emergency. The 2nd International Symposium on Aware Computing 2010, Tainan, Taiwan
58. Title:  An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability
Author: Hung-Yu Chien
Editor: Yingjiu Li, Jianying Zhou
ISBN: 978-1-60750-484-9
Price: 95.00€
No. of pages: 172
Publisher: IOS出版社
Published: 2010
59. Yan-Chen Liu, Hung-Yu Chien, Yu-Chang Chen, Chu-Sing Yang, “Integrated EPC Information Service Authentication using OpenID in Cross Domains”, RFIDSec Asia 2011, April 2011.
60. Hung-Yu Chien, Ming-Kuei Yeh, Tzong-Chen Wu, Chin-I Lee, “Comments on Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups”, The 2011 International Conference on Information Security & The First Cross-Straits Conference on Information Security (CSCIS 2011), HanZhou, China, April 13-15.
61. Hung-Yu Chien, Chin-I Lee, Shyr-Kuen Chen, Hung-Pin Hou, “New RFID Authentication Protocol with DOS-Attack Resistance”, IEEE ICPADS 2011 Sep 7~9, Tainan, Taiwan.
62. Hung-Yu Chien, Jia-Zhen Yen and Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability” in "Current Trends and Challenges in RFID",Edited by Cornel Turcu, ISBN 978-953-307-356-9, Published: July 20, 2011 under CC BY-NC-SA 3.0
63. Hung-Yu Chien, “Cryptanalysis on RFID Authentications Using Minimum Disclosure Approach”, The 8th Asia Joint Conference on Information Security (AsiaJCIS2013) Seoul, Korea, July 25 - 26, 2013.
64. Hung-Yu Chien, “Cryptanalysis on Generalized Ring Signatures”, Eighth International Conference on Innovative Computing, Information and Control (ICICIC2013), to be held in Kumamoto, Japan, September 14-17, 2013.
65. HungYu Chien, “Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Devices”, The Second Cross-Straits Conference on Information Security (CSCIS 2013), Kaohsiung, Taiwan, Sep. 11~13 2013.
66. Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, Hung-Yu Chien, “Efficient Anonymous Multi-receiver ID-based Encryption with Constant Decryption Cost”, ISEEE 2014, April 26~28, Japan.
67. Teng-Yu Huang, Hung-Yu Chien, “Gen2v2-Security-and-Privacy- Features-Leveraged Application Designs”, AsiaJCIS2014, Sep 3~5, WuHan, China.

68. Hung-Yu Chien, Meng-Yuan Chiang, Yi-Ting Hsin, Chun-Pei Hung, “Efficiently tracking TANET suspicious packets and identifying the devices using Splunk”, International Computer Symposium (ICS2014), Dec 14-17, Taichung, Taiwan.

69. Hung-Yu Chien, “De-synchronization Attack on Quadratic Residues-based RFID Ownership Transfer”, AsiaJCIS 2015.

70.H.-Y. Chien, M.-Y. Chiang, Y.-T. Hsin, C.-P. Hung “Another Effective Approach to Detect SQL Injection and Business Intelligence Using Splunk”, International Conference on Engineering and Applied Sciences (ICEAS), July 20-22, Japan.

71. Hung-Yu Chien*, Ying-Chun Cho, Jia-Yu Yeh, Ya-Ting Coa, Pei-Chin Tsai, ,Yun-Yu Chen, “An Ontology-based Herb Expert System for Digestion System Wellness”, International Conference on Advanced Information Technologies, Wufun, Taiwan, April 23, 2016.

72. Hung-Yu Chien*, Mao-Chiung Wang, "Computer Assisted English Recognition and Pronunciation Evaluation", International Conference on e-CASE & e-Tech 2017, Kyoto, Japan, April 4-6, 2017

博士論文 (TOP)

博士論文
The Study of Authentication Schemes for various Communication Environment (各種網路環境下認證機制之研究)

專利 (TOP)

專利
1. 中華民國專利; 認證方法、認證系統及電子標籤; (102)智專二(三)04273字第1022048938001;

專書及專書論文(TOP)

專書
1.Hung-Yu Chien, "The Study of RFID Authentication Protocols and Security of Some Popular RFID Tags" in the book "Development and Implementation of RFID Technology", Dr. Vedran Kordic (Editor), I-Tech Education and Publishing Kirchengasse 43/3, A-1070 Vienna, Austria, EU.
2. Book: Hung-Yu Chien, "Innovative Applications and Security of Internet of Things," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 717898, 1 pages, 2014.
doi:10.1155/2014/717898.
ISSN: 1550-1329; ISBN: 2370000145932[SCIE]
 

研究計畫 (TOP)

主持計畫
1. 「植基於智慧卡 (smart card) 的安全機制研究」,南開工商專校提供(NKC-90-05-02),2001/8 -- 2002/7。113,000
2. 「具低計算量的部份盲簽章的研究」,國科會提供(91-2626-E-252-002-),2002/8 -- 2003/7。$129,600
3. 「密碼學及資訊安全研究群」,南開技術學院提供(BD1301-14-16),2002/8 -- 2003/7。 4. "The authentication of ATM and public terminals," supported by National Science Council (NSC92-2213-E-252-007 or NSC92-2213-E-324-036), 2003/8 -- 2004/7. $338,100
4. 「93自我評鑑改善-校園無線區域網路之安全存取」,電算中心提供(A014),2005/2 -- 2005/7。$580,000.
5. 94, 95年度技專院校發展學校重點特色暨推動技專院校整合專案計劃 -E-Life子計劃二 : GCA智慧校園 4636, 4637, 1st year $2,441,000,2nd year $2,325,000
6. [在多重憑證中心環境下植基於雙線性配對之身分基礎式,跨領域認證金鑰及簽章之研究] NSC 94 - 2213 - E - 324 - 027
7. "協同計劃主持人"網際商貿開放協定 (IOTP) 之安全研究與B2B商務應用 (NSC94-2213-E-126-008), 940801~960731, 1st year $473,000, 2nd year $483,000.
8. "協同計劃主持人"教育部創意智庫計畫(只有公文字號「台顧字第0940105850號」), 創意學習線上課程 ? 駭客任務三部曲 --- 資訊安全、密碼學應用、資訊倫理, $464,000
9. "共同主持人" 建立更安全公平的跨平台數位產權管理機制」(95-2221-E-005-045-MY2), 950801~970731, 1st year $391,000, 2nd year 511,000
10. "協同計畫主持人" 一種公平且不可否認的行動商務系統之研究(The Study of A Fair and Non-repudiated Mobile Commerce System), (NSC 95-2221-E-324-025, 950801~960731, $511,000.
11. "可抵擋內部攻擊者之可證明式三方認證?鑰協定設計及證明", NSC 95-2221-E-260 -050 -MY2.
12. "提升暨大資訊安全研究量能計畫", 資本門代號 T9710000058, 經常門代號 T9710000057, 800,000.
13. NSC 97 - 2221 - E - 260 - 008 - MY2, " 可證明式,可選擇性轉換鑑別加密及安全投標系統等應用", 新台幣(大寫) 壹 佰 零 壹 萬 肆 仟 元整, 14. 十八學年度無線射頻辨識與企業資源規劃(RFID & ERP)就業學程計畫, 職訓局
15. 九十八學年度國科會補助台奧雙邊合作研討會[整合 RFID 網路之安全, Security in the Internet of Things]
16. (協同研究人員):簡宏宇, 九十八學年度國科會補助[教育單位網站應用程式弱點監測平台計畫] 99.1.1~99.12.31; 99.1.1~100.12.31(協同研究人員)
17. 參與 [教育單位網站應用程式弱點監測平台計畫] 100.1.1~101.4.30
18. 參與 技轉單位:成功大學資通安全研究與教學單位, 接受技轉單位:優仕達資訊股份有限公司, [如何設計及評估安全防偽系統之技術移轉].
19. 國立暨南國際大學98年度學術交流出國計畫[日本會津大學暑期參訪計畫], 尹邦嚴、簡宏宇、 阮夙姿.
20. 共同主持人, 國科會整合型計畫 [具隱私協商與風險管理之聯合服務架構計畫], 98.10.1~99.7
21. 計畫主持人, [文化創意產業營運模式研究與交易市集建置計畫]
22. 整合型計畫之子計畫主持人 [適用於NFC應用環境之聯合安全服務平台-子計畫一:不可追蹤之輕量級認證機制之研究] 99.08~102.07. 101-2218-E-260-001-
23. 社群資訊及安全之研: 100年度(第49屆)補助科學與技術人員國外短期研究: 2011.08~2012.07.
24. 在分散式伺服器模型下不可追蹤之無線射頻認證及所有權移轉之研究及實作102-2221-E-260-011-: 2013/08/01~2014/07/31
25.  在分散式伺服器模型下無線射頻認證所有權移轉之研究及實作-2 2014/08~2015/07  國科會