李南逸(Narn-Yih Lee)

職  稱:
教授兼系主任
辦 公 室 :
C201-1
分  機:
3200
電子郵件:
nylee@mail.stust.edu.tw
個人網站:

OfficeHour:


學歷

博士
國立成功大學
資訊工程所
碩士
國立中興大學
應用數學所
學士
東海大學
資訊科學系

專長及研究領域:

資訊安全、網路安全、密碼學、高等密碼學、無線通訊安全、資訊工程

   相關證照

類別

證照名稱

證照分類

取得日期

程式設計

TQC +行動裝置進階應用程式設計認證

程式設計類高階

2012/6/22

勞工安全衛生業務

丙種勞工安全衛生業務主管教育訓練證書

環安衛生丙種

2011/7/12

資通技術類

微軟技術助理 - 安全基礎

微軟公司初階

2011/4/27

資通技術類

微軟技術助理 - 網絡基礎

微軟公司初階

2010/9/2

資通技術類

歐共體理事會安全5

資訊安全初階

2010/9/2

資通技術類

信息安全管理體系(ISMS)審核員/主任審核員培訓課程

資訊安全中階

2010/8/9

 

 

 

TOP


 

 榮譽與獎勵

編號

名稱

1

臺南大學主辦之「第一屆南區大專資訊專題競賽暨成果觀摩會」行動平台組,參賽作品SunPhotoSUP』榮獲佳作:指導老師(2014年5月30日)

2

屏東商業技術學院主辦之「第十三屆離島資訊技術與應用研討會」,發表論文『具隱私保護和匿名認證機制之車載網路安全傳輸協定』榮獲最佳論文獎 (2014523~24)

3南臺科技大學主辦之「第十六屆校慶學生專題製作競賽」,參賽作品『攝日轉助器』榮獲資訊工程組佳作:指導老師 (201312)

4

經濟部工業局、教育部與中華民國資訊管理學會共同主辦之「第十七屆全國大專院校資訊應用服務創新競賽」產業電子書創新應用組,參賽作品『烏拉拉村的寶刀傳說』榮獲佳作:指導老師 (20121110)

5

台灣科技大學主辦之「2011網路安全創意應用競賽」,張宗典、陳麒勝、朱家弘、吳佳祐同學參賽作品『四面楚歌-就是要你爆』,入圍複賽:指導老師 (2011112)

6

財團法人資訊工業策進會、行政院國家資通安全會報技術服務中心主辦之「99年度資安金像獎」,陳昕澤、林巧欣、粘凱婷、杜慧卿同學參賽作品『病毒,免驚』,榮獲第四名:指導老師 (2010128)

7

財團法人資訊工業策進會、行政院國家資通安全會報技術服務中心主辦之「98年度資安金像獎」,陳昕澤、林巧欣、粘凱婷、廖郁婷同學參賽作品『聽阿嬤的話』,榮獲第二名:指導老師 (2009122)

8

財團法人資訊工業策進會、行政院國家資通安全會報技術服務中心主辦之「98年度資安海報徵選」,林巧欣同學參賽作品『密碼大學問』,榮獲特別獎:指導老師 (20091030)

9

財團法人資訊工業策進會、行政院國家資通安全會報技術服務中心主辦之「98年度資安海報徵選」,陳昕澤同學參賽作品『防毒加密做得好、資料安全沒煩腦』,榮獲特別獎:指導老師 (20091030)

10

南台科技大學主辦之「第十屆校慶學生專題製作競賽」,參賽作品『Cool PA超級奶爸-社群小秘書』榮獲資訊管理組第四名:指導老師 (20071216)

11

南台科技大學主辦之「第九屆校慶學生專題製作競賽」,參賽作品『結合生物特徵之數位影像版權保護系統』榮獲資訊管理組佳作:指導老師 (20061210)

12

經濟部工業局與中華民國資訊管理學會共同主辦之「第十一屆全國大專院校資訊服務創新競賽暨資訊管理專題競賽」資訊技術組二,參賽作品『結合生物特徵之數位影像版權保護系統』榮獲全國第二名:指導老師 (20061216)

13

南台科技大學第九屆專題製作競賽,參賽作品『結合生物特徵之數位影像版權保護系統』榮獲佳作:指導老師 (2006129)

14

國科會93年『自由軟體研發專案』之績優團隊:(20068):可抵抗密碼驗證檔失竊之檔案傳輸系統 (NSC-93-2218-E-218-012)

15

台南縣就業楷模:(20064)

16

國科會92年『自由軟體研發專案』之優良計畫主持人(200412)安全檔案傳輸系統之實作 (NSC-92-2218-E-218-023)

17

教育部大專校院通訊科技專題製作競賽 (20045)入圍複賽:指導老師

18

國科會甲種研究獎勵 (1997 - 1999)

 19

八十六學年度南台技術學院優良教師(1998)

 20

八十六學年度技職院校多媒體競賽:優等 (1998) 

21

八十五學年度技職院校多媒體競賽:優等 (1997)


TOP

 期刊

編號

名稱

1

N.Y. Lee, 「多種數位簽章系統之簡介」, Information Security Newsletter (資訊安全通訊), Vol. 3, No. 1, pp. 1-4, Sep. 1996.

2

H.M. Sun, B.C. Chen, N.Y. Lee and T Hwang, "Threshold proxy signatures with undeniable signers", Communication of IICM 資訊學會通訊, Vol. 5, No. 1, pp. 9-26, March 2002. (NSC-88-2213-E-218-001)

3

N.Y. Lee, and M.K. Sun, 「Threshold restrictive partially blind signature」, Journal of Computers (電腦學刊), Vol. 14, No. 3, pp. 52-56, Dec. 2002.

4

N.Y. Lee, 「有線電視與網際網路環境公平付費機制之研究與設計」, 工程科技通訊, Vol. 74, pp. 16-19, June 2004.

5

C.C. Chang, T. Hwang and N.Y. Lee, 「行動代理人在電子商務應用之攻擊模式與安全防護技術」, Communications of the CCISA (資訊安全通訊), Vol. 10, No. 2, pp. 44-51, April 2004.

6

N.Y. Lee, and T.K. Chang, 「量子密鑰交換協定效能提升之研究」, Journal of Computers (電腦學刊), Vol. 16, No. 3, pp. 19-25, Sep. 2004.

7

N.Y. Lee and S.Y. Yang, 「ID-based signature scheme with subliminal channel from pairings」, Communications of the CCISA (資訊安全通訊), Vol. 11, No. 1, pp. 79-86, January 2005.

8

N.Y. Lee, and Pei-Hsiu Ho, 「Efficient Access Control Scheme with User Authentication for Distributed Systems」, Journal of Computers (電腦學刊), Vol. 16, No. 5, pp. 22-26, June 2005.

9

N.Y. Lee, and Zong-Jhih Lin, 「Efficient identification mechanism for RFID system」, 工商管理學刊, vol. 3, no. 1, pp. 1-10, July, 2007. (NSC95-2221-E-218-030 and NSC94-3114-P-006-001-Y)

10

N.Y. Lee, and 李俊毅, 「私密資訊擷取機制之探討與分析」, 資通安全專論, T97002, pp. 1-20, 2008.

11

N.Y. Lee, 李姿誼 and 陳芸仙, 「數位版權管理系統之現況與應用」, 資通安全專論, T98010, pp. 1-18, Nov. 24, 2009.

12

N.Y. Lee and T. Hwang, "A pseudo-key scheme for dynamic access control in a hierarchy", Journal of Information Science and Engineering, Vol.10, pp.601-610, 1994.(SCI, EI)

13

C.M. Li, T. Hwang and N.Y. Lee, "Conspiracy attacks on the threshold RSA sigature scheme", Crytologia, Vol.XVIII, No.4, pp.372-380, 1994. (SCI)

14

T. Hwang, N.Y. Lee, C.M. Li, M.Y. Ko and Y.H. Chen, "Two attacks on Neuman-Sutbblebine authentication protocols", Information Processing Letters, No.53, pp103-107, 1995. (SCI, EI)

15

T. Hwang, N.Y. Lee, C.H. Wang and M.Y. Ko, "On the security of Wu and Yeh`s conference key distribution system", Computer Communications, Vol.18, No.12, pp.978-981, 1995. (SCI, EI)

16

N.Y. Lee and T. Hwang, "The security of He and Kiesler`s signature schemes", IEE Proc-Comput. Digit Tech., Vol.142, No.5, pp.370-372, 1995. (SCI, EI)

17

T. Hwang, N.Y. Lee, C.M. Li and C.C. Chang, "On the security of Chang and Wu`s broadcasting cryptosystem for computer networks", Computer Systems Science and Engineering, Vol. 11, No. 5, pp.311-314, 1996. (EI)

18

N.Y. Lee and T. Hwang, "Modified Harn signature scheme based on factoring and discrete logaritms", IEE Proc.-Comput. Digit. Tech., Vol.143, No.3, pp.196-198, 1996. (SCI, EI)

19

N.Y. Lee, and T. Hwang, 「On the security of Park et al's key distribution protocol for digital mobile communications」, CRYPTOLOGIA, Vol.XXI, No. 4, pp. 327-334, Oct. 1997. (SCI, EI)

20

N.Y. Lee, and T. Hwang, 「Remarks on Chang-Buehrer access control scheme in a hierarchy」, An International Journal Computers & Mathematics with applications, Vol. 34, No. 12, pp. 11-12, 1997. (SCI, EI)

21

N.Y. Lee, and T. Hwang, 「Comments on "Dynamic key management schemes for access control in a hierarchy", Computer Communications (22), pp.87-89, 1999. (SCI, EI)

22

N.Y. Lee, and T. Hwang, 「On the security of fair blind signature scheme using oblivious transfer", Computer Communications (22), pp. 287-290, 1999. (SCI, EI) (NSC-87-2213-E-218-004)

23

C.H. Wang, T. Hwang and N.Y. Lee, 「Comments on two group signatures」, Information Processing Letters (69), pp.95-97, 1999. (SCI, EI)

24

N.Y. Lee, T. Hwang and C.H. Wang, "The security of two ID-based multisignature protocols for sequential and broadcasting architectures", Information Processing Letters (70), pp.79-81, 1999. (SCI, EI) (NSC-88-2213-E-218-001)

25

N.Y. Lee, and T. Hwang, 「Group-oriented undeniable signature schemes with a trusted center」, Computer Communications (22), pp. 730-734, 1999. (SCI, EI) (NSC-87-2213-E-218-004)

26

N.Y. Lee, "Security of Shao's signature schemes based on factoring and discrete logarithms", IEE Proc.-Comput. Digit. Tech., Vol. 46, No. 2, pp. 119-121, Mar. 1999. (SCI, EI) (NSC-88-2213-E-218-001) (COMPUTER SCIENCE, HARDWARE & ARCHITECTURE / Impact Factor 0.533)

27

Hung-Min Sun, N.Y. Lee, and T. Hwang, "Threshold proxy signatures", IEE Proc.-Comput. Digit. Tech., Vol. 146, No. 5, pp. 259-263, Sep. 1999. (SCI, EI)

28

N.Y. Lee, C.C. Chang, C.L. Lin and T. Hwang, "Privacy and non-repudiation on Pay-TV systems", IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 20-27, Feb. 2000. (SCI, EI) (ENGINEERING, ELECTRICAL & ELECTRONIC / Impact Factor 0.6)

29

C.M. Li, T. Hwang, N.Y. Lee and J.J. Tsai, 「(t,n) Threshold-multisignature scheme and generalized-multisignature scheme where suspected forgery implies traceability of adversarial shareholders」, CRYPTOLOGIA, Vol. XXIV No. 3, pp. 250-268, July 2000. (SCI)

30

N.Y. Lee,  T. Hwang and C.M. Li, 「(t,n) threshold untraceable signatures」, Journal of Information Science and Engineering, Vol. 16, pp. 835-846, Nov. 2000. (SCI, EI) (NSC-88-2213-E-218-001)

31

N.Y. Lee, "Fairness and privacy on Pay-Per View system for Web-Based video service", IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 980-985, Nov. 2000. (SCI, EI) (NSC-89-2213-E-218-002) (ENGINEERING, ELECTRICAL & ELECTRONIC / Impact Factor 0.6)

32

N.Y. Lee, "Integrating access control with user authentication using smart cards", IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 943-948, Nov. 2000. (SCI, EI) (ENGINEERING, ELECTRICAL & ELECTRONIC / Impact Factor 0.6)

33

N.Y. Lee, "Threshold signature scheme with multiple signing policies", IEE Proc.-Comput. Digit. Tech., Vol. 148, No. 2, pp. 95-99, March, 2001. (SCI, EI) (NSC-88-2213-E-218-001) (COMPUTER SCIENCE, HARDWARE & ARCHITECTURE / Impact Factor 0.533)

34

N.Y. Lee, and T. Hwang, 「New multistage secret sharing scheme based on factorization problem」, Journal of Information Science and Engineering, Vol. 17, No. 3, pp. 525-529, May, 2001. (SCI, EI)

35

N.Y. Lee, "Cryptanalysis and improvement of two access control schemes with user authentication in a distributed computer network", IEICE Transactions on Information and Systems, Vol. E85-D, No. 2, pp. 386-391, February 2002. (SCI, EI) (NSC-88-2219-E-218-001) (COMPUTER SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.242)

36

N.Y. Lee, "The security of the improvement on the generalization of threshold signature and authenticated encryption", IEICE Transactions on Fundamentals, Vol. E85-A, No. 10, pp. 2364-2367, October 2002. (SCI, EI) (NSC-90-2213-E-218-004) (COMPUTER SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.33)

37

N.Y. Lee and D.R. Lin, "Robust digital signature scheme with subliminal channels", IEICE Transactions on Fundamentals, Vol. E86-A, No. 1, pp. 187-188, Jan. 2003. (SCI, EI) (NSC-91-2213-E-218-012) (COMPUTER SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.33)

38

N.Y. Lee, and W.L. Tsai, 「Efficient fault-tolerant scheme based on the RSA system」, IEE Proc.-Comput. Digit. Tech., Vol. 150, No. 1, pp. 17-20, Jan. 2003. (SCI, EI) (NSC-91-2213-E-218-012) (COMPUTER SCIENCE, HARDWARE & ARCHITECTURE / Impact Factor 0.533)

39

N.Y. Lee and M.K. Sun, " Analysis on Traceability on Stadler et al.'s Fair Blind Signature", IEICE Transactions on Fundamentals, Vol. E86-A, No. 11, pp. 2091-2092, Nov. 2003. (SCI, EI) (NSC-91-2213-E-218-012) (COMPUTER SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.33)

40

N.Y. Lee and P.H. Ho, "Digital Signature with a Threshold Subliminal Channel", IEEE Transactions on Consumer Electronics, Vol. 49, No. 4, pp. 1240-1242, Nov. 2003. (SCI, EI) (NSC-91-2213-E-218-012) (ENGINEERING, ELECTRICAL & ELECTRONIC / Impact Factor 0.6)

41

N.Y. Lee and C.N. Wu, "Comment on Traceability Analysis on Chaum Blind Signature Scheme", IEICE Transactions on Fundamentals, Vol. E87-A, No. 2, pp. 511-512, Feb. 2004. (SCI, EI) (NSC-92-2213-E-218-019) (COMPUTER SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.33)

42

N.Y. Lee and C.N. Wu, " Improved authentication key exchange protocol without using one-way hash function", ACM Operating Systems Review, Vol. 38, No. 2, pp. 85-92, Apr. 2004. (EI) (NSC-92-2213-E-218-019)

43

C.C. Chang, N.Y. Lee and T. Hwang, "A framework for one-round mobile agent transaction", IEICE Transactions on Communication, Vol. E87-B, No. 7, pp. 1883-1889, July 2004. (SCI, EI) (NSC-92-2213-E-218-019) (ENGINEERING, ELECTRICAL & ELECTRONIC / Impact Factor 0.348)

44

N.Y. Lee and M.F. Lee, "Comments on multiparty key exchange scheme", ACM Operating Systems Review, Vol. 38, No. 4, pp. 70-73, Oct. 2004. (EI)

45

N.Y. Lee and M.F. Lee, " Further improvement on the modified authenticated key agreement scheme", Applied Mathematics and Computation, Vol. 157, No. 3, pp. 729-733, Oct. 2004. (SCI, EI) (NSC-92-2213-E-218-019) (MATHEMATICS, APPLIED / Impact Factor 0.688)

46

N.Y. Lee and P.H. Ho, "Convertible undeniable signature with subliminal channels", Applied Mathematics and Computation, Vol. 158, No. 1, pp. 169-175, Oct. 2004. (SCI, EI) (NSC-91-2213-E-218-012) (MATHEMATICS, APPLIED / Impact Factor 0.688)

47

N.Y. Lee and Y.C. Chiu, "Improved remote authentication scheme with smart card", Computer Standards & Interfaces, Vol. 27, No. 2, pp. 177-180, Jan. 2005. (SCI, EI) (NSC-92-2213-E-218-019) (COMPUTER SCIENCE, HARDWARE & ARCHITECTURE  / Impact Factor 0.62)

48

N.Y. Lee and M.F. Lee, "The security of a strong proxy signature scheme with proxy signer privacy protection", Applied Mathematics and Computation, Vol. 161, No. 3, pp. 807-812, Feb. 2005. (SCI, EI) (MATHEMATICS, APPLIED / Impact Factor 0.688)

49

N.Y. Lee and M.F. Lee, "Secure and efficient web metering scheme", IEE Proceedings - Communications, Vol. 152, No. 3, pp. 262-264, June 2005. (SCI, EI)  (NSC-93-2213- E-218-027) (ENGINEERING, ELECTRICAL & ELECTRONIC   / Impact Factor 0.273)

50

N.Y. Lee and J.C. Chen, " Improvement of One-Time Password Authentication Scheme Using Smart Cards", IEICE Transactions on Communications, Vol. E88-B, No.9, pp.3765-3767, Sep. 2005. (SCI, EI) (NSC-93-2218-E-218-012) (ENGINEERING, ELECTRICAL & ELECTRONIC / Impact Factor 0.348)

51

N.Y. Lee and C.C. Wang, " Verifiable Oblivious Transfer Protocol", IEICE Transactions on Information and Systems, Vol. E88-D, No. 12, pp. 2890-2892, Dec. 2005. (SCI, EI) (NSC-93-2213-E-218-027) (COMPUTER SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.242)

52

N.Y. Lee and S.Y. Yang, "The Design of Integrating Subliminal Channel with Access Control", Applied Mathematics and Computation, Vol. 171, No. 1, pp. 573-580, Dec. 2005. (SCI, EI) (NSC-92-2213-E-218-019) (MATHEMATICS, APPLIED / Impact Factor 0.688)

53

C.M. Li, T. Hwang and N.Y. Lee, "Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem", INFORMATICA, Vol.18, No.1, pp.61-66, Jan. 2007. (SCI) (NSC 95-2221-E-218-030) (COMPUTER SCIENCE, INFORMATION SYSTEMS/ Impact Factor 0.329)

54

N.Y. Lee and M.F. Lee, "Web metering scheme based on the bilinear pairings", IEICE Transactions on Information and Systems, Vol. E90-D, No. 3, pp. 688-691, March 2007. (SCI, EI)  (NSC 95-2221-E-218-030 and NSC94-3114-P-006-001-Y) (COMPUTER SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.242)

55

N.Y. Lee, C.N. Wu and C.C. Wang, "Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings", Computers & Electrical Engineering, Vol. 34, No. 1, pp. 12-20, Jan. 2008. (SCI) (NSC-95-2221-E-218-030 and NSC94-3114-P-006-001-Y) (COMPUTER SCIENCE, HARDWARE & ARCHITECTURE / Impact Factor 0.289)

56

T. Hwang, C.M. Li and N.Y. Lee, "Secure Direct Communication using Deterministic BB84 Protocol", International Journal of Modern Physics C (IJMPC), Vol. 19, No. 4, pp. 625-635, April 2008. (SCI, COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS, 0.841)

57

N.Y. Lee, and Zong-Jhih Lin, 「Reliable Delegation Scheme for RFID Systems」, International Journal of Electronic Commerce Studies (IJECS), Vol. 1, No. 1, pp. 51-60, 2010. (NSC96-2628-E-218-002-MY2)

58

N.Y. Lee, and Chi-Hsuan Lin, 「Reusable Oblivious Transfer Protocol」, International Journal of Computer Science and Engineering Systems (IJCSES), Vol. , No. , pp. -, 2013. (NSC 102-2221-E-218 -022)


TOP

 國際會議

編號

名稱

1

C.M. Li, T. Hwang and N.Y. Lee, "Remark on the threshold RSA signature scheme", Advances in Cryptology-Crypto`93, pp.413-419, 1993.

2

T. Hwang, N.Y. Lee, M.Y. Ko, C.M. Li and Y.H. Chen, "On the security of Blundo-Santis Herzberg-Kutten-Vaccaro-Yung perfectly-secure key distribution for dynamic coferences", Advances in Cryptology-Crupto`93, Rump Session, 1993.

3

C.M. Li, T. Hwang and N.Y. Lee, "Threshold-multisignature schemes where suspected forgery implies traceability of adversarial sharteholders", Advances in Cryptology-Eurocrypto`94, pp.194-204, 1994.

4

T. Hwang and N.Y. Lee, 「Yet another efficient access control for user hierarchy」, IEEE International Carnahan Conference on Security Technology, pp. 496-501, 1995.

5

N.Y. Lee, T. Hwang and C.H. Wang, 「On Zhang's nonrepudiable proxy signature schemes」, Third Australasian Conference on Information Security and Privacy (ACISP'98), pp. 415-422, July 1998.

6

M. Joye, N.Y. Lee and T. Hwang, "On the security of the Lee-Chang group signature scheme and its derivatives", Proc. of ISW'99, Information Security Workshop, Springer-Verlag, LNCS 1729, Kuala Lumpur, Malaysia, pp.47-51, November 6-7 1999.

7

M. Joye, S. Kim and N.Y. Lee, "Cryptanalysis of two group signature schemes", Proc. of ISW'99, Information Security Workshop, Springer-Verlag, LNCS 1729, Kuala Lumpur, Malaysia, pp.271-275, November 6-7 1999.

8

N.Y. Lee, and Ching-Chun Wang, 「Yet Another Wavelet Watermarking Scheme for Copyright Protection」, IEEE Joint Conference on E-Commerce Technology (CEC'07), pp. 421-424, July 23-26, 2007. (NSC95-2221-E-218-030 and NSC94-3114-P-006-001-Y)

9

N.Y. Lee, and Chun-Chang Pan, 「Ordinal Authentication Protocols for RFID Tags」, 2008 International Conference on Business and Information (BAI2008), pp. 231, Seoul, Korea, July 7-9, 2008. (NSC96-2628-E-218-002-MY2 and NSC 96-2219-E-006-009)

10

Tarng-Yao Yang, Yi-Hsing Chang, and N.Y. Lee, 「Fatherhood Web Community Based on Web 2.0 - Creative Cool-Pa Community」, 2008 International Conference on Business and Information (BAI2008), pp. 713, Seoul, Korea, July 7-9, 2008. (NSC96-2628-E-218-002-MY2)

11

N.Y. Lee, P.H. Ho, and Dai-Rui Lin, "Undeniable signature with a reusable subliminal channel", The 3rd Joint Workshop on Information Security JWIS2008, pp. 547-553, Seoul, Korea, July 10-11 2008. (NSC96-2628-E-218-002-MY2 and NSC 96-2219-E-006-009)

12

N.Y. Lee, and Zong-Jhih Lin, 「Reliable Delegation Scheme for RFID Systems」, 2009 International Conference on Business and Information (BAI2009), pp. 1602, Kuala Lumpur, Malaysia, July 6-8, 2009. (NSC96-2628-E-218-002-MY2)

13

N.Y. Lee, and Y.H. Chen, "Digital Rights Management System with Partial Use Property for Home", The 4th Joint Workshop on Information Security JWIS2009, pp. 53, Kaohsiung Taiwan, August 6-7 2009. (NSC96-2628-E-218-002-MY2)

14

N.Y. Lee, and Tzu-Yi Lee, "User Friendly Digital Rights Management System Based on Smart Cards", The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2009), pp. 869-872, Kyoto, Japan, Sep. 12-14, 2009. (NSC96-2628-E-218-002-MY2)

15

N.Y. Lee, and Wei-Lun Huang, 「Multiple group key distribution protocol based on elliptic curve cryptography」, 2010 International Conference on Business and Information (BAI2010), pp. 53, Kitakyushu, Japan, July 5-7, 2010. (NSC 98-2221-E-218-033)

16

Chin-Feng Lee, Shin-Rue Huang, Hung-Yu Chien, and N.Y. Lee, 「Two-Party and Three-Party Remote User Authentication Schemes Using Biometric Data Only For Emergency」, 2nd International Symposium on Aware Computing (ISAC2010), pp. RS3-1, Tainan, Taiwan, Nov. 1-4, 2010.

17

N.Y. Lee, and Hung-Jen Chiang, 「The research of botnet detection and prevention」, 2010 International Computer Symposium (ICS2010), pp. 119-124, Tainan, Taiwan, Dec. 16–18, 2010. (NSC 99-2221-E-218-046)

18

N.Y. Lee, and Wei-Lun Huang, 「Dynamic multiple group key distribution protocol based on elliptic curve cryptography」, 2011 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology (e-CASE & e-Tech 2011), pp. 3329-3338, Tokyo, Japan, Jan. 18-20, 2011. (NSC 99-2221-E-218-046)

19

N.Y. Lee, and Jung-Chic Chen, 「COMMENT ON IMPROVED DENIABLE AUTHENTICATION PROTOCOL」, 2011 International Symposium on Nano Science and Technology, pp. 318-319, Tainan, Taiwan, Nov. 18–19, 2011. (NSC 100-2221-E-218 -019)

20

N.Y. Lee, and Yun-Kuan Chang, 「Hybrid Provable Data Possession at Untrusted Stores In Cloud Computing」, The 17th IEEE International Conference on Parallel and Distributed Systems (IEEE ICPADS 2011), pp. 638-645, Tainan, Taiwan, Dec. 7–9, 2011. (NSC 100-2221-E-218 -019)

21

N.Y. Lee, and Chun-Chang Pan, 「MUTUAL AUTHENTICATION PROTOCOL FOR LOW COST RFID TAGS」, 2012 International Conference on Business and Information (BAI2012), pp. E402, Sapporo, Japan, July 3-5, 2012. (NSC 100-2221-E-218 -019)

22

N.Y. Lee, Zih-Ling Chen and Fu-Kun Chen, 「Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem」, 2013 37th IEEE Annual Computer Software and Applications Conference (IEEE COMPSAC 2013), pp. 11-15, Kyoto, Japan, July 22–26, 2013. (NSC 101-2221-E-218-041)

 

TOP

 國內會議

編號

名稱

1

N.Y. Lee, T. Hwang and C.M. Li, "Remark on Yen adn Laih`s digital signature scheme", Proceedings of the Fourth National Conference on Information Securitypp.139-141, 1994.

2

N.Y. Lee, T. Hwang and C.H. Wang,「Comment on 「Cryptanalysis of the blind signatures based on the discrete logarithm problem」, Accepted by第四屆國防管理學術暨實務研討會, 1996.

3

T. Hwang, N.Y. Lee, and C.C. Chang,「On the security of Chang et al. 『s cryptographic key assignment scheme for access control in a hierarchy」, 1996 International Computer Symposium (ICS'96), pp. 75-81, Dec. 1996.

4

N.Y. Lee, and T. Hwang,「Group-oriented undeniable signature schemes without a trusted center」, 1998 International Computer Symposium (ICS'98), pp. 165-170, Tainan, Taiwan, R.O.C., December 17-19, 1998.

5

H.M. Sun, N.Y. Lee and T. Hwang, "Nonrepudiable threshold proxy signatures", Proceedings of the Ninth National Conference on Information Security, pp.254-261, May 14-15, 1999.

6

N.Y. Lee, and T. Hwang,「New digital signature scheme with (t,n) shared verification」, 第十五屆全國技術及職業教育研討會, pp. 77-80, Apr. 2000.

7

N.Y. Lee, and W.L. Tsai,「An improved cryptographic key assignment scheme for access control in a partially ordered hierarchy」, 第十七屆全國技術及職業教育研討會, pp. 751-758, Apr. 2002. (NSC-90-2213-E-218-004)

8

N.Y. Lee, and D.R. Lin,「無限數位資料流之數位簽章機制於視訊付費頻道上之應用」, Proceedings of the Twelfth National Information Security Conference, pp. 235-242, May 16-17, 2002.

9

N.Y. Lee, and W.L. Tsai,「具動態容錯能力之會議金匙協議協定」, 2002年資訊管理國際研討會, pp. 189-201, June 28, 2002.

10

N.Y. Lee, and P.H. Ho,「Yet Another Generalization of Threshold Signature and Authenticated Encryption for Secure Group Communications」, Proceedings of the Thirteen National Information Security Conference, pp. 31-38, Aug. 28-29, 2003. (NSC-92-2213-E-218-019)

11

N.Y. Lee, and M.F. Lee,「Efficient password authentication scheme without using a public key cryptosystem」, National Computer Symposium 2003 (NCS2003), pp. 1220-1224, 2003. (NSC-92-2213-E-218-019)

12

N.Y. Lee, and S.Y. Yang,「二種整合潛隱通道與使用者階層之機制」, 第九屆資訊管理暨實務研討會, pp. 207, 2003. (NSC-92-2213-E-218-019)

13

N.Y. Lee, and H.Y. Hwang,「Threshold Chameleon Signature Schemes」, ECDL2005 電子商務與數位生活研討會, pp. 1617-1629, 2005. (NSC- 93-2213-E-218-027)

14

N.Y. Lee, and 王建智,「可驗證之N1模糊傳送協定」, 第六屆網際網路應用與發展學術研討會, pp. A131-A136, May 2005. (NSC93-2218-E-218-012)

15

N.Y. Lee, and 陳榮志,「Cryptanalysis of the conference key distribution systems employing a symmetric balanced incomplete block design」, 第六屆網際網路應用與發展學術研討會, pp. A203-A207, May 2005. (NSC93-2213-E-218-027)

16

N.Y. Lee, and 陳榮志,「可滿足完美正向安全之具驗證功能多把金鑰交換協定」, 2005年第九屆資訊管理學術暨警政資訊實務研討會, pp. 64-68, May 2005. (NSC93-2213-E-218-027)

17

N.Y. Lee, and 張庭魁,「預設基底之量子密鑰交換協定」, 樹德科技大學 2005 資通技術管理與應用會議, pp. 29, June 2005. (NSC93-2218-E-218-012)

18

N.Y. Lee, and 康銘輝,「智慧型可變密碼系統」, 二○○五開放源碼研討會, pp.52, Nov. 12, 2005. (NSC93-2218-E-218-012)

19

N.Y. Lee, and 潘俊彰,「Improved grouping proof for RFID tags」, 2005年第六屆產業資訊管理學術暨新興科技實務研討會, pp. NTM-016-PW, Nov. 26, 2005. (NSC93-2218-E-218-012)

20

N.Y. Lee, and Chian-Fu Lee,「Strong Integration of User Authentication and Access Control Mechanism without Public Key Cryptography」, IMI2005 Information Management Implementation 2005 Conference, pp. 148, Dec. 10, 2005.

21

N.Y. Lee, and 林季玄,「具使用者確認之忘卻式傳輸協定」, ICIM2006第十七屆國際資訊管理學術研討會, pp. 1376-1383, May 27, 2006. (NSC 94-2218-E-218-007)

22

Chien-Chih Wang, and N.Y. Lee,「Verifiable one out of n Oblivious Transfer」, ICS2006, pp.19-24, June 10, 2006. (NSC 94-2218-E-218-007)

23

N.Y. Lee, and Yu-Chung Chiu,「Cryptanalysis of Secure User Authentication Scheme Using Hash Functions」, (SAICT2006) 2006資通技術管理與應用會議, pp. 74, June 26, 2006. (NSC 94-2218-E-218-007)

24

N.Y. Lee, and 陳榮志,「Comments on one-time password authentication scheme for mobile communications」, 2006開放原始碼技術與應用研討會, pp. 23, Nov. 10, 2006. (NSC94-2218-E-218-007 and NSC94-3114-P-006-001-Y)

25

N.Y. Lee, and 廖日辰,「n1條件式模糊傳送協定」, 2007 ISC 智慧型系統工程應用研討會, pp. 52, March 20, 2007. (NSC95-2221-E-218-030)

26

N.Y. Lee, and 王靖鈞,「無需原始數位影像之小波轉換浮水印技術」, 2007資訊科技國際研討會(AIT 2007), pp. 40, April 28, 2007. (NSC95-2221-E-218-030 and NSC94-3114-P-006-001-Y)

27

N.Y. Lee, and Zong-jhih Lin,「Efficient identification mechanism for RFID system」, 2007台灣商管理論與實務研討會暨第八屆網際網路應用與發展學術研討會, pp. 19, May 8, 2007. (NSC95-2221-E-218-030 and NSC94-3114-P-006-001-Y)

28

N.Y. Lee, and 李俊毅,「基於橢圓曲線密碼技術之n1模糊傳送協定」, 2008第三屆國際健康資訊管理研討會UHIMA2008, pp. 472, March 7, 2008. (NSC96-2628-E-218-002-MY2 and NSC 96-2219-E-006-009)

29

N.Y. Lee, and 李育賢,「Off-line authentication protocol for RFID tags」, 2008第三屆數位教學暨資訊實務研討會 EITS2008, pp. 34, March 26, 2008. (NSC96-2628-E-218-002-MY2 and NSC 96-2219-E-006-009)

30

N.Y. Lee, and 黃琮富,「基於橢圓曲線密碼技術之無線隨意網路門檻式金鑰管理機制」, 2008知識經濟與管理研討會, pp. 61, April 18, 2008. (NSC96-2628-E-218-002-MY2 and NSC 96-2219-E-006-009)

31

N.Y. Lee, 廖日辰, and 呂昆璣, "使用加法同態加密技術之n1條件式模糊傳送協定", 2008年台灣網際網路研討會, pp. 122, Oct. 20-22, 2008. (NSC 96-2628-E-218-002-MY2 and NSC 97-2219-E-006-003)

32

N.Y. Lee, 呂昆璣, and 廖日辰, "使用乘法同態加密技術之n1條件式模糊傳送協定", 2009第四屆數位教學暨資訊實務研討會 EITS2009, pp. 39, April 1, 2009. (NSC 96-2628-E-218-002-MY2)

33

N.Y. Lee, and 陳芸仙, "適用於家庭網路之數位版權管理系統", 2009第三屆數位教學暨資訊實務研討會 EITS2009, pp. 51, April 1, 2009. (NSC 96-2628-E-218-002-MY2)

34

N.Y. Lee, and 黃資真, "具完美對比之(2,n)視覺秘密分享機制", 2009資訊科技國際研討會 AIT2009, pp. 223, April 24-25, 2009. (NSC 96-2628-E-218-002-MY2)

35

N.Y. Lee, and李姿誼, "Digital Rights Management System with Efficient Key Management", 2009 資訊管理暨商務科技研討會(IMCT2009), pp. 15, May 8, 2009. (NSC 96-2628-E-218-002-MY2)

36

N.Y. Lee, 廖日辰, and 呂昆璣, "使用加法同態加密技術之n1條件式模糊群播協定",第十九屆全國資訊安全會議(CISC 2009), pp. C103, June 3-5, 2009. (NSC 96-2628-E-218-002-MY2)

37

N.Y. Lee, Hung-Jen Chiang, "Malware detection method based on reverse engineering", 2010第五屆數位教學暨資訊實務研討會 EITS2010, pp. 2, March 31, 2010. (NSC 98-2221-E-218-033)

38

N.Y. Lee, and 賴浚廷, "植基於模糊簽章技術之公平線上抽獎遊戲", 2010年民生電子研討會 WCE2010, pp. 638-644, Nov. 5, 2010. (NSC 99-2221-E-218-046)

39

N.Y. Lee, 張云冠, "雲端環境中適用於不受信任伺服器之混合式資料儲存證明機制", 2011第六屆數位教學暨資訊實務研討會 EITS2011, pp. 12, March 30, 2011. (NSC 99-2221-E-218-046)

40

N.Y. Lee, 賴浚廷, and 陳麒勝, "高效率nt模糊簽章協定",第二十一屆全國資訊安全會議(CISC 2011), pp. 84-89, May 26-27, 2011. (NSC100-2219-E-006-001 and NSC99 – 2221-E-218-046)

41

N.Y. Lee, and 蔡孟廷, "基於ElGamal 密碼系統之多重副本資料儲存證明機制", 2011 National Computer Symposium 全國計算機會議 (NCS 2011), pp. 214-224, Dec. 2-3, 2011. (NSC100 – 2221-E-218-019)

42

N.Y. Lee, 陳麒勝, "植基於雙線性配對之nt模糊簽章協定", 2012第七屆數位教學暨資訊實務研討會 EITS2012, pp. 29, March 28, 2012. (NSC100 – 2221-E-218-019)

43

N.Y. Lee, 洪宏傑, "主機型P2P殭屍網路偵測系統之設計與實現", 2012第七屆數位教學暨資訊實務研討會 EITS2012, pp. 26, March 28, 2012. (NSC100 – 2221-E-218-019)

44

N.Y. Lee, 吳佳祐, "整合字元頻率特徵比對及類神經網路之雲端入侵偵測 系統", 2013第八屆數位教學暨資訊實務研討會 EITS2013, pp. 96, March 27, 2013. (NSC101-2221-E-218-041)

45

朱家弘, N.Y. Lee, "結合行動網路與GPS實作之旅遊追蹤與管理系統", 6屆電子工程技術研討會, pp. 391-394, May 24, 2013. (NSC 101-2221-E-218-041)

46

N.Y. Lee, 陳姿伶, and 溫翔安, "雲端伺服器輔助雙線性配對加密系統之設計",第二十三屆全國資訊安全會議(CISC 2013), pp. 360-366, May 23-24, 2013. (NSC 101-2221-E-218-041)

47

張宗典 and N.Y. Lee, "植基於ElGamal密碼系統之可驗證門檻式雲端儲存系統",第二十三屆全國資訊安全會議(CISC 2013), pp. 368-374, May 23-24, 2013. (NSC 101-2221-E-218-041)

48

N.Y. Lee, and 陳姿伶, "雲端伺服器輔助Paillier簽章系統之設計", (NCS 2013), pp. 1788, Dec. 13-14, 2013. (NSC 102-2221-E-218 -022)

49

N.Y. Lee, and 許立新, "具隱私保護和匿名認證機制之車載網路安全傳輸協定",第十三屆離島資訊技術與應用研討會 (ITAOI 2014), pp. 31-40, May 23-24, 2014. (NSC 102-2221-E-218 -022)

 

TOP

 

 計劃

編號

計劃名稱

起迄日期

擔任工作

補助單位

1

103年度資訊軟體人才培育推廣計畫

2014/2-
2015/3

 

教育部

2

雲端伺服器輔助安全計算技術之研究

2013/8-
2014/7

 

國科會

3

可攜式防遺忘裝置及其防遺忘管理系統

2013/3-
2013/6

 

產學合作計畫

4

102年度資通安全學程計畫

2013/3-
2014/2

 

教育部

5

102年度資訊軟體人才培育推廣計畫

2013/2-
2014/3

 

教育部

6

雲端運算中多重副本資料儲存證明協定之研究

2012/8- 
2013/7

 

國科會 

7

101年度資訊軟體人才培育推廣計畫

2012/2- 
2013/3

 

教育部

8

適用於雲端計算之資料儲存證明技術

2011/8- 
2012/7

 

國科會 

9

P2P殭屍網路之偵測與防禦

2010/8- 
2011/7

 

國科會 

10

99年度資通安全學程計畫

2010/3- 
2011/2

 

教育部

11

權重式模糊傳送協定之研究與設計

2009/8- 
2010/7

 

國科會 

12

衛星資料加解密技術之研究

2009/4- 
2010/3


國家太空中心 

13

97-98年度資通安全學程計畫

2008/9- 
2009/8

 

教育部 

14

97年度台南縣北區數位機會中心輔導計畫

2008/6- 
2009/5

 

教育部 

15

資通訊課程推廣計畫:網路安全

2007/12-
2009/1

 

教育部 

16

條件式模糊群播協定之研究

2007/8- 
2009/7

 

國科會 

17

模糊傳送協定之研究與應用

2006/8- 
2007/7

 

國科會 

18

智慧型可變密碼之安全檔案傳輸系統之研究

2005/8- 
2006/7

 

國科會 

19

提升教學品質計畫南台科技大學資訊管理系

2005/7- 
2005/12

 

教育部 

20

具加解密功能之USB 記憶裝置實現與技術轉移

2005/3- 
2005/11

 

國安局

21

可抵抗密碼驗證檔失竊之檔案傳輸系統:獲選國科會『自由軟體研發專案』績優團隊

2004/10-
2005/9

 

國科會

22

高效能網站計量機制之分析與設計

2004/8- 
2005/7

 

國科會

23

擁抱三實邁向卓越:南台科技大學資訊管提升教學品質計畫:子計畫二:紮實學生基礎學科能力

2004/7- 
2004/12

 

教育部

24

TI DSP晶片暨AES加解密之實現與技術轉移

2004/3- 
2004/11

 

國安局

25

安全檔案傳輸系統之實作

2003/12-
2004/10

 

國科會

26

適用於群體通訊且具共享驗證能力之門檻式簽章與訊息恢復機制

2003/8- 
2004/7

 

國科會

27

具門檻式潛隱通道之數位簽章系統

2002/10 - 
2003/7

 

國科會

28

機制有線電視與網際網路環境公平付費機制之研究與設計

2001/8- 
2002/7


國科會

29

彈置遙測資料保密技術之研究(2/3

2002/1- 
2003/12


中山科學研究院產學合作計畫

30

具有多重秘密分享策略之門檻式簽章系統

1999/8- 
2000/7


國科會

31

代理簽章策略之研究

1998/8- 
1999/7


國科會

32

寬頻網際網路安全認證技術與網路密談系統 - 子計畫二:寬頻網際網路密談,傳檔系統之設計與實作

1998/8- 
1999/7


國科會

33

群體導向公平盲目簽章系統

1997/8- 
1998/7


國科會

 

 

 

 

TOP

 

 指導學生專題

系級

專題老師

專題名稱

專題學生

101

李南逸

網路安全應用

王仁昱高億泰
王瑞閔

101

李南逸

資訊安全應用

謝忠諺戴妤亙
劉昱昕

 

 

 

 

 指導研究生專題

學年度

指導教授

論文名稱

研究生

100

李南逸

植基於雙線性配對之Ñ選噸模糊簽章協定

陳麒勝

100

李南逸

主機型P2P殭屍網路偵測系統之設計與實現

洪宏傑

99

李南逸

雲端運算之混合式資料儲存證明機制

張雲冠

99

李南逸

模糊簽章協定之研究與設計

賴浚廷

98

李南逸

植基於橢圓曲線密碼系統之多重群組金鑰分配協定

黃韋綸

98

李南逸

IRC殭屍網路偵測與防禦之研究

姜宏仁

97

李南逸

Ñ 選噸權重型模糊傳送協定之設計

呂昆璣

97

李南逸

具完美對比之視覺秘密分享機制

黃資真

97

李南逸

適用於家庭網路之數位版權管理系統

陳芸仙

97

李南逸

實用型數位版權管理系統之設計

李姿誼

96

李南逸

基於橢圓曲線密碼技術之模糊傳送協定

李俊毅

96

李南逸

離線式RFID標籤認證協定之研究

李育賢

96

李南逸

基於橢圓曲線密碼技術之無線隨意網路門檻式金鑰管理和簽章機制

黃琮富

95

李南逸

Ñ 1條件式模群播協定

廖日辰

95

李南逸

具授凸時間限制之RFID認證協定

林宗志

95

李南逸

無線射頻識別系統之群體標籤認證協定

潘俊彰

95

李南逸

植基於小波轉換之強韌型數位浮水印技術

王靖鈞

94

李南逸

整合指紋辨識與智慧卡之檔案鎖系統

李幹輔

94

李南逸

可重覆使用之模糊傳送協定

林季玄

94

李南逸

智慧型安全檔案傳輸系統

康銘輝

93

李南逸

量子密鑰分配及量子模糊傳送協定之研究

張庭魁

93

李南逸

植基於對稱式平衝不完全區塊設計之密碼系統

陳榮志

93

李南逸

應用智慧卡之使用者確認機制之研究

邱玉忠

93

李南逸

變色龍簽章之研究及其應用

黃懷逸

93

李南逸

可驗證模糊傳送之研究

王建智

92

李南逸

具鑑定性多把金匙交換協定之研究

吳建男

92

李南逸

安全網路計量機制之研究

李名峰

91

李南逸

具潛隱通道之數位簽章系統之研究

何佩修

91

李南逸

門檻式部分盲簽章系統之研究

孫明功

90

李南逸

應用於付費電視系統之資料流簽章技術

林岱銳

90

李南逸

具容錯能力之動態會議金匙協議協定

蔡維良

 

 

 

TOP