榮譽與獎勵
|
編號
|
名稱
|
1
| 臺南大學主辦之「第一屆南區大專資訊專題競賽暨成果觀摩會」行動平台組,參賽作品『SunPhotoSUP』榮獲佳作:指導老師(2014年5月30日) |
2 | 屏東商業技術學院主辦之「第十三屆離島資訊技術與應用研討會」,發表論文『具隱私保護和匿名認證機制之車載網路安全傳輸協定』榮獲最佳論文獎 (2014年5月23~24日) |
3 | 南臺科技大學主辦之「第十六屆校慶學生專題製作競賽」,參賽作品『攝日轉助器』榮獲資訊工程組佳作:指導老師 (2013年12月) |
4
|
經濟部工業局、教育部與中華民國資訊管理學會共同主辦之「第十七屆全國大專院校資訊應用服務創新競賽」產業電子書創新應用組,參賽作品『烏拉拉村的寶刀傳說』榮獲佳作:指導老師 (2012年11月10日)
|
5
|
台灣科技大學主辦之「2011網路安全創意應用競賽」,張宗典、陳麒勝、朱家弘、吳佳祐同學參賽作品『四面楚歌-就是要你爆』,入圍複賽:指導老師 (2011年11月2日)
|
6
|
財團法人資訊工業策進會、行政院國家資通安全會報技術服務中心主辦之「99年度資安金像獎」,陳昕澤、林巧欣、粘凱婷、杜慧卿同學參賽作品『病毒,免驚』,榮獲第四名:指導老師 (2010年12月8日)
|
7
|
財團法人資訊工業策進會、行政院國家資通安全會報技術服務中心主辦之「98年度資安金像獎」,陳昕澤、林巧欣、粘凱婷、廖郁婷同學參賽作品『聽阿嬤的話』,榮獲第二名:指導老師 (2009年12月2日)
|
8
|
財團法人資訊工業策進會、行政院國家資通安全會報技術服務中心主辦之「98年度資安海報徵選」,林巧欣同學參賽作品『密碼大學問』,榮獲特別獎:指導老師 (2009年10月30日)
|
9
|
財團法人資訊工業策進會、行政院國家資通安全會報技術服務中心主辦之「98年度資安海報徵選」,陳昕澤同學參賽作品『防毒加密做得好、資料安全沒煩腦』,榮獲特別獎:指導老師 (2009年10月30日)
|
10
|
南台科技大學主辦之「第十屆校慶學生專題製作競賽」,參賽作品『Cool
PA超級奶爸-社群小秘書』榮獲資訊管理組第四名:指導老師 (2007年12月16日)
|
11
|
南台科技大學主辦之「第九屆校慶學生專題製作競賽」,參賽作品『結合生物特徵之數位影像版權保護系統』榮獲資訊管理組佳作:指導老師 (2006年12月10日)
|
12
|
經濟部工業局與中華民國資訊管理學會共同主辦之「第十一屆全國大專院校資訊服務創新競賽暨資訊管理專題競賽」資訊技術組二,參賽作品『結合生物特徵之數位影像版權保護系統』榮獲全國第二名:指導老師 (2006年12月16日)
|
13
|
南台科技大學第九屆專題製作競賽,參賽作品『結合生物特徵之數位影像版權保護系統』榮獲佳作:指導老師 (2006年12月9日)
|
14
|
國科會93年『自由軟體研發專案』之績優團隊:(2006年8月):可抵抗密碼驗證檔失竊之檔案傳輸系統 (NSC-93-2218-E-218-012)
|
15
|
台南縣就業楷模:(2006年4月)
|
16
|
國科會92年『自由軟體研發專案』之優良計畫主持人(2004年12月):安全檔案傳輸系統之實作 (NSC-92-2218-E-218-023)
|
17
|
教育部大專校院通訊科技專題製作競賽 (2004年5月)入圍複賽:指導老師
|
18
|
國科會甲種研究獎勵 (1997 - 1999)
|
19
|
八十六學年度南台技術學院優良教師(1998)
|
20
|
八十六學年度技職院校多媒體競賽:優等 (1998)
|
21
|
八十五學年度技職院校多媒體競賽:優等 (1997)
|
|
TOP
|
期刊
|
編號
|
名稱
|
1
|
N.Y. Lee, 「多種數位簽章系統之簡介」, Information Security Newsletter (資訊安全通訊), Vol. 3, No. 1, pp. 1-4,
Sep. 1996.
|
2
|
H.M. Sun, B.C. Chen, N.Y. Lee
and T Hwang,
"Threshold proxy signatures with undeniable signers", Communication
of IICM (資訊學會通訊), Vol. 5, No. 1, pp. 9-26,
March 2002. (NSC-88-2213-E-218-001)
|
3
|
N.Y. Lee, and M.K. Sun, 「Threshold restrictive
partially blind signature」, Journal of Computers (電腦學刊), Vol. 14, No. 3, pp. 52-56,
Dec. 2002.
|
4
|
N.Y. Lee, 「有線電視與網際網路環境公平付費機制之研究與設計」, 工程科技通訊, Vol. 74, pp. 16-19, June
2004.
|
5
|
C.C. Chang, T. Hwang and N.Y. Lee, 「行動代理人在電子商務應用之攻擊模式與安全防護技術」, Communications of the
CCISA (資訊安全通訊), Vol. 10, No. 2, pp. 44-51, April 2004.
|
6
|
N.Y. Lee, and T.K. Chang, 「量子密鑰交換協定效能提升之研究」, Journal of Computers (電腦學刊), Vol. 16, No. 3, pp. 19-25, Sep.
2004.
|
7
|
N.Y. Lee and S.Y. Yang, 「ID-based signature scheme
with subliminal channel from pairings」, Communications of the CCISA (資訊安全通訊), Vol. 11, No. 1, pp. 79-86,
January 2005.
|
8
|
N.Y. Lee, and Pei-Hsiu Ho, 「Efficient Access
Control Scheme with User Authentication for Distributed Systems」, Journal of
Computers (電腦學刊), Vol. 16, No. 5, pp. 22-26, June 2005.
|
9
|
N.Y. Lee, and Zong-Jhih
Lin, 「Efficient
identification mechanism for RFID system」, 工商管理學刊,
vol. 3, no. 1, pp. 1-10, July, 2007. (NSC95-2221-E-218-030 and NSC94-3114-P-006-001-Y)
|
10
|
N.Y. Lee, and 李俊毅, 「私密資訊擷取機制之探討與分析」, 資通安全專論, T97002, pp. 1-20, 2008.
|
11
|
N.Y. Lee, 李姿誼 and 陳芸仙, 「數位版權管理系統之現況與應用」, 資通安全專論, T98010, pp. 1-18, Nov. 24, 2009.
|
12
|
N.Y. Lee and T. Hwang, "A pseudo-key scheme
for dynamic access control in a hierarchy", Journal of Information
Science and Engineering, Vol.10, pp.601-610, 1994.(SCI, EI)
|
13
|
C.M. Li, T.
Hwang and N.Y. Lee, "Conspiracy
attacks on the threshold RSA sigature scheme", Crytologia, Vol.XVIII,
No.4, pp.372-380, 1994. (SCI)
|
14
|
T. Hwang, N.Y. Lee, C.M. Li, M.Y. Ko and
Y.H. Chen, "Two attacks on Neuman-Sutbblebine authentication
protocols", Information Processing Letters, No.53, pp103-107, 1995.
(SCI, EI)
|
15
|
T. Hwang, N.Y. Lee, C.H. Wang and M.Y.
Ko, "On the security of Wu and Yeh`s conference key distribution
system", Computer Communications, Vol.18, No.12, pp.978-981, 1995. (SCI,
EI)
|
16
|
N.Y. Lee and T. Hwang, "The security of He
and Kiesler`s signature schemes", IEE Proc-Comput. Digit Tech., Vol.142,
No.5, pp.370-372, 1995. (SCI, EI)
|
17
|
T. Hwang, N.Y. Lee, C.M. Li and C.C.
Chang, "On the security of Chang and Wu`s broadcasting cryptosystem for
computer networks", Computer Systems Science and Engineering, Vol. 11,
No. 5, pp.311-314, 1996. (EI)
|
18
|
N.Y. Lee and T. Hwang, "Modified Harn
signature scheme based on factoring and discrete logaritms", IEE
Proc.-Comput. Digit. Tech., Vol.143, No.3, pp.196-198, 1996. (SCI, EI)
|
19
|
N.Y. Lee, and T. Hwang, 「On the security of Park
et al's key distribution protocol for digital mobile communications」,
CRYPTOLOGIA, Vol.XXI, No. 4, pp. 327-334, Oct. 1997. (SCI, EI)
|
20
|
N.Y. Lee, and T. Hwang, 「Remarks on
Chang-Buehrer access control scheme in a hierarchy」, An International Journal
Computers & Mathematics with applications, Vol. 34, No. 12, pp. 11-12,
1997. (SCI, EI)
|
21
|
N.Y. Lee, and T. Hwang, 「Comments on
"Dynamic key management schemes for access control in a hierarchy",
Computer Communications (22), pp.87-89, 1999. (SCI, EI)
|
22
|
N.Y. Lee, and T. Hwang, 「On the security of fair
blind signature scheme using oblivious transfer", Computer
Communications (22), pp. 287-290, 1999. (SCI, EI) (NSC-87-2213-E-218-004)
|
23
|
C.H. Wang, T.
Hwang and N.Y. Lee,
「Comments on two group signatures」, Information Processing Letters (69),
pp.95-97, 1999. (SCI, EI)
|
24
|
N.Y. Lee, T. Hwang and C.H. Wang, "The
security of two ID-based multisignature protocols for sequential and
broadcasting architectures", Information Processing Letters (70),
pp.79-81, 1999. (SCI, EI) (NSC-88-2213-E-218-001)
|
25
|
N.Y. Lee, and T. Hwang, 「Group-oriented
undeniable signature schemes with a trusted center」, Computer Communications
(22), pp. 730-734, 1999. (SCI, EI) (NSC-87-2213-E-218-004)
|
26
|
N.Y. Lee, "Security of Shao's signature
schemes based on factoring and discrete logarithms", IEE Proc.-Comput.
Digit. Tech., Vol. 46, No. 2, pp. 119-121, Mar. 1999. (SCI, EI)
(NSC-88-2213-E-218-001) (COMPUTER SCIENCE, HARDWARE & ARCHITECTURE /
Impact Factor 0.533)
|
27
|
Hung-Min Sun,
N.Y. Lee, and T. Hwang,
"Threshold proxy signatures", IEE Proc.-Comput. Digit. Tech., Vol.
146, No. 5, pp. 259-263, Sep. 1999. (SCI, EI)
|
28
|
N.Y. Lee, C.C. Chang, C.L. Lin and T. Hwang, "Privacy
and non-repudiation on Pay-TV systems", IEEE Transactions on Consumer
Electronics, Vol. 46, No. 1, pp. 20-27, Feb. 2000. (SCI, EI) (ENGINEERING,
ELECTRICAL & ELECTRONIC / Impact Factor 0.6)
|
29
|
C.M. Li, T.
Hwang, N.Y. Lee and J.J.
Tsai, 「(t,n) Threshold-multisignature scheme and generalized-multisignature
scheme where suspected forgery implies traceability of adversarial
shareholders」, CRYPTOLOGIA, Vol. XXIV No. 3, pp. 250-268, July 2000. (SCI)
|
30
|
N.Y. Lee, T.
Hwang and C.M. Li, 「(t,n) threshold untraceable signatures」, Journal of
Information Science and Engineering, Vol. 16, pp. 835-846, Nov. 2000. (SCI,
EI) (NSC-88-2213-E-218-001)
|
31
|
N.Y. Lee, "Fairness and privacy on Pay-Per
View system for Web-Based video service", IEEE Transactions on Consumer
Electronics, Vol. 46, No. 4, pp. 980-985, Nov. 2000. (SCI, EI)
(NSC-89-2213-E-218-002) (ENGINEERING, ELECTRICAL & ELECTRONIC / Impact
Factor 0.6)
|
32
|
N.Y. Lee, "Integrating access control with
user authentication using smart cards", IEEE Transactions on Consumer
Electronics, Vol. 46, No. 4, pp. 943-948, Nov. 2000. (SCI, EI) (ENGINEERING,
ELECTRICAL & ELECTRONIC / Impact Factor 0.6)
|
33
|
N.Y. Lee, "Threshold signature scheme with
multiple signing policies", IEE Proc.-Comput. Digit. Tech., Vol. 148,
No. 2, pp. 95-99, March, 2001. (SCI, EI) (NSC-88-2213-E-218-001) (COMPUTER
SCIENCE, HARDWARE & ARCHITECTURE / Impact Factor 0.533)
|
34
|
N.Y. Lee, and T. Hwang, 「New multistage secret
sharing scheme based on factorization problem」, Journal of Information
Science and Engineering, Vol. 17, No. 3, pp. 525-529, May, 2001. (SCI, EI)
|
35
|
N.Y. Lee, "Cryptanalysis and improvement of
two access control schemes with user authentication in a distributed computer
network", IEICE Transactions on Information and Systems, Vol. E85-D, No.
2, pp. 386-391, February 2002. (SCI, EI) (NSC-88-2219-E-218-001) (COMPUTER
SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.242)
|
36
|
N.Y. Lee, "The security of the improvement
on the generalization of threshold signature and authenticated encryption",
IEICE Transactions on Fundamentals, Vol. E85-A, No. 10, pp. 2364-2367,
October 2002. (SCI, EI) (NSC-90-2213-E-218-004) (COMPUTER SCIENCE,
INFORMATION SYSTEMS / Impact Factor 0.33)
|
37
|
N.Y. Lee and D.R. Lin, "Robust digital
signature scheme with subliminal channels", IEICE Transactions on
Fundamentals, Vol. E86-A, No. 1, pp. 187-188, Jan. 2003. (SCI, EI)
(NSC-91-2213-E-218-012) (COMPUTER SCIENCE, INFORMATION SYSTEMS / Impact
Factor 0.33)
|
38
|
N.Y. Lee, and W.L. Tsai, 「Efficient
fault-tolerant scheme based on the RSA system」, IEE Proc.-Comput. Digit.
Tech., Vol. 150, No. 1, pp. 17-20, Jan. 2003. (SCI, EI)
(NSC-91-2213-E-218-012) (COMPUTER SCIENCE, HARDWARE & ARCHITECTURE /
Impact Factor 0.533)
|
39
|
N.Y. Lee and M.K. Sun, " Analysis on
Traceability on Stadler et al.'s Fair Blind Signature", IEICE
Transactions on Fundamentals, Vol. E86-A, No. 11, pp. 2091-2092, Nov. 2003.
(SCI, EI) (NSC-91-2213-E-218-012) (COMPUTER SCIENCE, INFORMATION SYSTEMS /
Impact Factor 0.33)
|
40
|
N.Y. Lee and P.H. Ho, "Digital Signature
with a Threshold Subliminal Channel", IEEE Transactions on Consumer
Electronics, Vol. 49, No. 4, pp. 1240-1242, Nov. 2003. (SCI, EI) (NSC-91-2213-E-218-012)
(ENGINEERING, ELECTRICAL & ELECTRONIC / Impact Factor 0.6)
|
41
|
N.Y. Lee and C.N. Wu, "Comment on
Traceability Analysis on Chaum Blind Signature Scheme", IEICE
Transactions on Fundamentals, Vol. E87-A, No. 2, pp. 511-512, Feb. 2004.
(SCI, EI) (NSC-92-2213-E-218-019) (COMPUTER SCIENCE, INFORMATION SYSTEMS /
Impact Factor 0.33)
|
42
|
N.Y. Lee and C.N. Wu, " Improved authentication
key exchange protocol without using one-way hash function", ACM
Operating Systems Review, Vol. 38, No. 2, pp. 85-92, Apr. 2004. (EI)
(NSC-92-2213-E-218-019)
|
43
|
C.C. Chang, N.Y. Lee and
T. Hwang, "A
framework for one-round mobile agent transaction", IEICE Transactions on
Communication, Vol. E87-B, No. 7, pp. 1883-1889, July 2004. (SCI, EI)
(NSC-92-2213-E-218-019) (ENGINEERING, ELECTRICAL & ELECTRONIC / Impact
Factor 0.348)
|
44
|
N.Y. Lee and M.F. Lee, "Comments on
multiparty key exchange scheme", ACM Operating Systems Review, Vol. 38,
No. 4, pp. 70-73, Oct. 2004. (EI)
|
45
|
N.Y. Lee and M.F. Lee, " Further improvement
on the modified authenticated key agreement scheme", Applied Mathematics
and Computation, Vol. 157, No. 3, pp. 729-733, Oct. 2004. (SCI, EI)
(NSC-92-2213-E-218-019) (MATHEMATICS, APPLIED / Impact Factor 0.688)
|
46
|
N.Y. Lee and P.H. Ho, "Convertible
undeniable signature with subliminal channels", Applied Mathematics and
Computation, Vol. 158, No. 1, pp. 169-175, Oct. 2004. (SCI, EI)
(NSC-91-2213-E-218-012) (MATHEMATICS, APPLIED / Impact Factor 0.688)
|
47
|
N.Y. Lee and Y.C. Chiu, "Improved remote
authentication scheme with smart card", Computer Standards &
Interfaces, Vol. 27, No. 2, pp. 177-180, Jan. 2005. (SCI, EI)
(NSC-92-2213-E-218-019) (COMPUTER SCIENCE, HARDWARE & ARCHITECTURE / Impact Factor 0.62)
|
48
|
N.Y. Lee and M.F. Lee, "The security of a
strong proxy signature scheme with proxy signer privacy protection", Applied
Mathematics and Computation, Vol. 161, No. 3, pp. 807-812, Feb. 2005. (SCI,
EI) (MATHEMATICS, APPLIED / Impact Factor 0.688)
|
49
|
N.Y. Lee and M.F. Lee, "Secure and efficient
web metering scheme", IEE Proceedings - Communications, Vol. 152, No. 3,
pp. 262-264, June 2005. (SCI, EI)
(NSC-93-2213- E-218-027) (ENGINEERING, ELECTRICAL &
ELECTRONIC / Impact Factor 0.273)
|
50
|
N.Y. Lee and J.C. Chen, " Improvement of
One-Time Password Authentication Scheme Using Smart Cards", IEICE
Transactions on Communications, Vol. E88-B, No.9, pp.3765-3767, Sep. 2005.
(SCI, EI) (NSC-93-2218-E-218-012) (ENGINEERING, ELECTRICAL & ELECTRONIC /
Impact Factor 0.348)
|
51
|
N.Y. Lee and C.C. Wang, " Verifiable Oblivious
Transfer Protocol", IEICE Transactions on Information and Systems, Vol. E88-D,
No. 12, pp. 2890-2892, Dec. 2005. (SCI, EI) (NSC-93-2213-E-218-027) (COMPUTER
SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.242)
|
52
|
N.Y. Lee and S.Y. Yang, "The Design of
Integrating Subliminal Channel with Access Control", Applied Mathematics
and Computation, Vol. 171, No. 1, pp. 573-580, Dec. 2005. (SCI, EI)
(NSC-92-2213-E-218-019) (MATHEMATICS, APPLIED / Impact Factor 0.688)
|
53
|
C.M. Li, T.
Hwang and N.Y. Lee,
"Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using
ElGamal Cryptosystem", INFORMATICA, Vol.18, No.1, pp.61-66, Jan. 2007.
(SCI) (NSC 95-2221-E-218-030) (COMPUTER SCIENCE, INFORMATION SYSTEMS/ Impact
Factor 0.329)
|
54
|
N.Y. Lee and M.F. Lee, "Web metering scheme
based on the bilinear pairings", IEICE Transactions on Information and
Systems, Vol. E90-D, No. 3, pp. 688-691, March 2007. (SCI, EI) (NSC 95-2221-E-218-030 and NSC94-3114-P-006-001-Y)
(COMPUTER SCIENCE, INFORMATION SYSTEMS / Impact Factor 0.242)
|
55
|
N.Y. Lee,
C.N. Wu and C.C. Wang, "Authenticated multiple key exchange
protocols based on elliptic curves and bilinear pairings", Computers
& Electrical Engineering, Vol. 34, No. 1, pp. 12-20, Jan. 2008. (SCI)
(NSC-95-2221-E-218-030 and NSC94-3114-P-006-001-Y) (COMPUTER SCIENCE,
HARDWARE & ARCHITECTURE / Impact Factor 0.289)
|
56
|
T. Hwang,
C.M. Li and N.Y. Lee,
"Secure Direct Communication using Deterministic BB84 Protocol",
International Journal of Modern Physics C (IJMPC), Vol. 19, No. 4, pp.
625-635, April 2008. (SCI, COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS, 0.841)
|
57
|
N.Y. Lee, and Zong-Jhih Lin, 「Reliable Delegation Scheme
for RFID Systems」, International Journal of Electronic Commerce Studies (IJECS),
Vol. 1, No. 1, pp. 51-60, 2010. (NSC96-2628-E-218-002-MY2)
|
58
|
N.Y. Lee, and Chi-Hsuan Lin, 「Reusable Oblivious Transfer
Protocol」, International Journal of Computer Science and Engineering Systems
(IJCSES), Vol. , No. , pp. -, 2013. (NSC 102-2221-E-218 -022)
|
|
TOP
|
國際會議
|
編號
|
名稱
|
1
|
C.M. Li, T.
Hwang and N.Y. Lee,
"Remark on the threshold RSA signature scheme", Advances in
Cryptology-Crypto`93, pp.413-419, 1993.
|
2
|
T. Hwang, N.Y. Lee, M.Y. Ko, C.M. Li and
Y.H. Chen, "On the security of Blundo-Santis
Herzberg-Kutten-Vaccaro-Yung perfectly-secure key distribution for dynamic
coferences", Advances in Cryptology-Crupto`93, Rump Session, 1993.
|
3
|
C.M. Li, T. Hwang
and N.Y. Lee,
"Threshold-multisignature schemes where suspected forgery implies
traceability of adversarial sharteholders", Advances in
Cryptology-Eurocrypto`94, pp.194-204, 1994.
|
4
|
T. Hwang and N.Y. Lee, 「Yet another
efficient access control for user hierarchy」, IEEE International Carnahan Conference
on Security Technology, pp. 496-501, 1995.
|
5
|
N.Y. Lee, T. Hwang and C.H. Wang, 「On Zhang's
nonrepudiable proxy signature schemes」, Third Australasian Conference on
Information Security and Privacy (ACISP'98), pp. 415-422, July 1998.
|
6
|
M. Joye, N.Y. Lee and T. Hwang, "On
the security of the Lee-Chang group signature scheme and its derivatives",
Proc. of ISW'99, Information Security Workshop,
Springer-Verlag, LNCS 1729, Kuala Lumpur, Malaysia, pp.47-51, November 6-7
1999.
|
7
|
M. Joye, S.
Kim and N.Y. Lee, "Cryptanalysis
of two group signature schemes", Proc. of
ISW'99, Information Security Workshop, Springer-Verlag, LNCS 1729, Kuala
Lumpur, Malaysia, pp.271-275, November 6-7 1999.
|
8
|
N.Y. Lee, and Ching-Chun Wang, 「Yet Another Wavelet Watermarking
Scheme for Copyright Protection」, IEEE
Joint Conference on E-Commerce Technology (CEC'07), pp. 421-424, July 23-26, 2007.
(NSC95-2221-E-218-030 and NSC94-3114-P-006-001-Y)
|
9
|
N.Y. Lee, and Chun-Chang
Pan, 「Ordinal
Authentication Protocols for RFID Tags」, 2008 International Conference on
Business and Information (BAI2008), pp. 231, Seoul,
Korea, July 7-9,
2008. (NSC96-2628-E-218-002-MY2 and NSC 96-2219-E-006-009)
|
10
|
Tarng-Yao Yang, Yi-Hsing Chang, and N.Y. Lee, 「Fatherhood Web Community Based
on Web 2.0 - Creative Cool-Pa Community」, 2008 International Conference on
Business and Information (BAI2008), pp. 713, Seoul,
Korea, July 7-9,
2008. (NSC96-2628-E-218-002-MY2)
|
11
|
N.Y. Lee, P.H. Ho, and Dai-Rui
Lin, "Undeniable signature with a reusable subliminal channel", The
3rd Joint Workshop on Information Security JWIS2008, pp. 547-553,
Seoul, Korea, July 10-11 2008. (NSC96-2628-E-218-002-MY2 and NSC 96-2219-E-006-009)
|
12
|
N.Y. Lee, and Zong-Jhih Lin, 「Reliable Delegation Scheme for RFID Systems」, 2009 International
Conference on Business and Information (BAI2009), pp. 1602, Kuala Lumpur, Malaysia, July 6-8, 2009. (NSC96-2628-E-218-002-MY2)
|
13
|
N.Y. Lee, and Y.H. Chen, "Digital Rights
Management System with Partial Use Property for Home", The 4th Joint
Workshop on Information Security JWIS2009, pp. 53, Kaohsiung Taiwan, August
6-7 2009. (NSC96-2628-E-218-002-MY2)
|
14
|
N.Y. Lee, and Tzu-Yi Lee,
"User Friendly Digital Rights Management System Based on Smart Cards",
The Fifth International Conference on Intelligent Information Hiding and
Multimedia Signal Processing (IIHMSP-2009), pp. 869-872, Kyoto, Japan, Sep.
12-14, 2009. (NSC96-2628-E-218-002-MY2)
|
15
|
N.Y. Lee, and Wei-Lun Huang, 「Multiple group key
distribution protocol based on elliptic curve cryptography」, 2010 International
Conference on Business and Information (BAI2010), pp. 53, Kitakyushu, Japan, July 5-7, 2010. (NSC 98-2221-E-218-033)
|
16
|
Chin-Feng Lee,
Shin-Rue Huang, Hung-Yu Chien, and N.Y.
Lee, 「Two-Party and Three-Party Remote User Authentication Schemes Using
Biometric Data Only For Emergency」, 2nd International Symposium on Aware Computing (ISAC2010), pp. RS3-1,
Tainan, Taiwan, Nov. 1-4, 2010.
|
17
|
N.Y. Lee, and Hung-Jen Chiang, 「The research of
botnet detection and prevention」, 2010 International Computer Symposium (ICS2010), pp. 119-124, Tainan, Taiwan, Dec. 16–18, 2010. (NSC 99-2221-E-218-046)
|
18
|
N.Y. Lee, and Wei-Lun Huang, 「Dynamic multiple
group key distribution protocol based on elliptic curve cryptography」, 2011 International
Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology
(e-CASE & e-Tech 2011), pp. 3329-3338, Tokyo, Japan, Jan. 18-20, 2011. (NSC 99-2221-E-218-046)
|
19
|
N.Y. Lee, and Jung-Chic Chen, 「COMMENT ON IMPROVED
DENIABLE AUTHENTICATION PROTOCOL」, 2011 International Symposium on Nano Science and Technology, pp.
318-319, Tainan, Taiwan, Nov. 18–19, 2011. (NSC 100-2221-E-218 -019)
|
20
|
N.Y. Lee, and Yun-Kuan Chang, 「Hybrid Provable
Data Possession at Untrusted Stores In Cloud Computing」, The 17th IEEE
International Conference on Parallel and Distributed Systems (IEEE ICPADS
2011), pp. 638-645, Tainan, Taiwan, Dec. 7–9, 2011. (NSC
100-2221-E-218 -019)
|
21
|
N.Y. Lee, and
Chun-Chang Pan, 「MUTUAL AUTHENTICATION PROTOCOL FOR
LOW COST RFID TAGS」, 2012 International Conference on Business and Information (BAI2012),
pp. E402, Sapporo, Japan, July 3-5, 2012. (NSC 100-2221-E-218 -019)
|
22
|
N.Y. Lee, Zih-Ling Chen
and Fu-Kun Chen, 「Cloud Server Aided Computation for ElGamal Elliptic Curve
Cryptosystem」, 2013
37th IEEE Annual Computer Software and Applications Conference (IEEE
COMPSAC 2013), pp. 11-15, Kyoto, Japan, July 22–26, 2013. (NSC 101-2221-E-218-041)
|
|
TOP
|
國內會議
|
編號
|
名稱
|
1
|
N.Y. Lee, T. Hwang and C.M. Li, "Remark on
Yen adn Laih`s digital signature scheme", Proceedings of the Fourth
National Conference on Information Security,pp.139-141, 1994.
|
2
|
N.Y. Lee, T. Hwang and C.H. Wang,「Comment on
「Cryptanalysis of the blind signatures based on the discrete logarithm
problem」, Accepted by第四屆國防管理學術暨實務研討會, 1996.
|
3
|
T. Hwang, N.Y. Lee, and C.C. Chang,「On
the security of Chang et al. 『s cryptographic key assignment scheme for
access control in a hierarchy」, 1996 International Computer Symposium
(ICS'96), pp. 75-81, Dec. 1996.
|
4
|
N.Y. Lee, and T. Hwang,「Group-oriented undeniable
signature schemes without a trusted center」, 1998 International Computer
Symposium (ICS'98), pp. 165-170, Tainan, Taiwan, R.O.C., December 17-19,
1998.
|
5
|
H.M. Sun, N.Y. Lee and T. Hwang, "Nonrepudiable
threshold proxy signatures", Proceedings of the Ninth National
Conference on Information Security, pp.254-261, May 14-15, 1999.
|
6
|
N.Y. Lee, and T. Hwang,「New digital signature
scheme with (t,n) shared verification」, 第十五屆全國技術及職業教育研討會, pp. 77-80, Apr. 2000.
|
7
|
N.Y. Lee, and W.L. Tsai,「An improved cryptographic
key assignment scheme for access control in a partially ordered hierarchy」, 第十七屆全國技術及職業教育研討會, pp.
751-758, Apr. 2002. (NSC-90-2213-E-218-004)
|
8
|
N.Y. Lee, and D.R. Lin,「無限數位資料流之數位簽章機制於視訊付費頻道上之應用」,
Proceedings of the Twelfth National Information Security Conference, pp. 235-242,
May 16-17, 2002.
|
9
|
N.Y. Lee, and W.L. Tsai,「具動態容錯能力之會議金匙協議協定」, 2002年資訊管理國際研討會, pp. 189-201, June 28, 2002.
|
10
|
N.Y. Lee, and P.H. Ho,「Yet Another Generalization
of Threshold Signature and Authenticated Encryption for Secure Group
Communications」, Proceedings of the Thirteen National Information Security
Conference, pp. 31-38, Aug. 28-29, 2003. (NSC-92-2213-E-218-019)
|
11
|
N.Y. Lee, and M.F. Lee,「Efficient password
authentication scheme without using a public key cryptosystem」, National
Computer Symposium 2003 (NCS2003), pp. 1220-1224, 2003.
(NSC-92-2213-E-218-019)
|
12
|
N.Y. Lee, and S.Y. Yang,「二種整合潛隱通道與使用者階層之機制」, 第九屆資訊管理暨實務研討會, pp. 207, 2003. (NSC-92-2213-E-218-019)
|
13
|
N.Y. Lee, and H.Y.
Hwang,「Threshold Chameleon Signature Schemes」, ECDL2005 電子商務與數位生活研討會, pp. 1617-1629, 2005. (NSC- 93-2213-E-218-027)
|
14
|
N.Y. Lee, and 王建智,「可驗證之N選1模糊傳送協定」, 第六屆網際網路應用與發展學術研討會, pp. A131-A136, May
2005. (NSC93-2218-E-218-012)
|
15
|
N.Y. Lee, and 陳榮志,「Cryptanalysis of the conference key distribution systems
employing a symmetric balanced incomplete block design」, 第六屆網際網路應用與發展學術研討會, pp. A203-A207, May 2005. (NSC93-2213-E-218-027)
|
16
|
N.Y. Lee, and 陳榮志,「可滿足完美正向安全之具驗證功能多把金鑰交換協定」, 2005年第九屆資訊管理學術暨警政資訊實務研討會, pp. 64-68, May 2005. (NSC93-2213-E-218-027)
|
17
|
N.Y. Lee, and 張庭魁,「預設基底之量子密鑰交換協定」, 樹德科技大學 2005 資通技術管理與應用會議, pp. 29, June 2005. (NSC93-2218-E-218-012)
|
18
|
N.Y. Lee, and 康銘輝,「智慧型可變密碼系統」, 二○○五開放源碼研討會, pp.52, Nov. 12, 2005. (NSC93-2218-E-218-012)
|
19
|
N.Y. Lee, and 潘俊彰,「Improved grouping proof for RFID tags」, 2005年第六屆產業資訊管理學術暨新興科技實務研討會, pp. NTM-016-PW, Nov. 26, 2005. (NSC93-2218-E-218-012)
|
20
|
N.Y. Lee, and Chian-Fu
Lee,「Strong Integration of User Authentication and Access Control Mechanism
without Public Key Cryptography」, IMI2005 Information Management
Implementation 2005 Conference, pp. 148, Dec. 10, 2005.
|
21
|
N.Y. Lee, and 林季玄,「具使用者確認之忘卻式傳輸協定」, ICIM2006第十七屆國際資訊管理學術研討會, pp. 1376-1383, May 27, 2006. (NSC 94-2218-E-218-007)
|
22
|
Chien-Chih Wang, and N.Y. Lee,「Verifiable
one out of n Oblivious Transfer」, ICS2006, pp.19-24, June 10, 2006. (NSC 94-2218-E-218-007)
|
23
|
N.Y. Lee, and Yu-Chung
Chiu,「Cryptanalysis of Secure User Authentication Scheme Using Hash Functions」,
(SAICT2006) 2006資通技術管理與應用會議, pp. 74, June 26, 2006. (NSC 94-2218-E-218-007)
|
24
|
N.Y. Lee, and 陳榮志,「Comments
on one-time password authentication scheme for mobile communications」, 2006開放原始碼技術與應用研討會, pp. 23, Nov. 10, 2006. (NSC94-2218-E-218-007 and NSC94-3114-P-006-001-Y)
|
25
|
N.Y. Lee, and 廖日辰,「n選1條件式模糊傳送協定」, 2007 ISC 智慧型系統工程應用研討會, pp. 52,
March 20, 2007. (NSC95-2221-E-218-030)
|
26
|
N.Y. Lee, and 王靖鈞,「無需原始數位影像之小波轉換浮水印技術」, 2007資訊科技國際研討會(AIT 2007), pp. 40,
April 28, 2007. (NSC95-2221-E-218-030 and NSC94-3114-P-006-001-Y)
|
27
|
N.Y. Lee, and Zong-jhih
Lin,「Efficient
identification mechanism for RFID system」, 2007台灣商管理論與實務研討會暨第八屆網際網路應用與發展學術研討會,
pp. 19, May 8, 2007.
(NSC95-2221-E-218-030 and NSC94-3114-P-006-001-Y)
|
28
|
N.Y. Lee, and 李俊毅,「基於橢圓曲線密碼技術之n選1模糊傳送協定」, 2008第三屆國際健康資訊管理研討會UHIMA2008, pp. 472, March 7, 2008. (NSC96-2628-E-218-002-MY2 and NSC 96-2219-E-006-009)
|
29
|
N.Y. Lee, and 李育賢,「Off-line
authentication protocol for RFID tags」,
2008第三屆數位教學暨資訊實務研討會 EITS2008, pp. 34, March 26, 2008. (NSC96-2628-E-218-002-MY2 and NSC
96-2219-E-006-009)
|
30
|
N.Y. Lee, and 黃琮富,「基於橢圓曲線密碼技術之無線隨意網路門檻式金鑰管理機制」, 2008知識經濟與管理研討會, pp. 61, April 18, 2008. (NSC96-2628-E-218-002-MY2 and NSC 96-2219-E-006-009)
|
31
|
N.Y. Lee, 廖日辰, and 呂昆璣, "使用加法同態加密技術之n選1條件式模糊傳送協定",
2008年台灣網際網路研討會, pp. 122, Oct. 20-22, 2008. (NSC
96-2628-E-218-002-MY2 and NSC 97-2219-E-006-003)
|
32
|
N.Y. Lee, 呂昆璣, and 廖日辰, "使用乘法同態加密技術之n選1條件式模糊傳送協定",
2009第四屆數位教學暨資訊實務研討會 EITS2009, pp. 39, April 1, 2009. (NSC
96-2628-E-218-002-MY2)
|
33
|
N.Y. Lee, and
陳芸仙, "適用於家庭網路之數位版權管理系統", 2009第三屆數位教學暨資訊實務研討會 EITS2009, pp. 51, April 1, 2009. (NSC
96-2628-E-218-002-MY2)
|
34
|
N.Y. Lee, and
黃資真, "具完美對比之(2,n)視覺秘密分享機制", 2009資訊科技國際研討會 AIT2009, pp. 223, April 24-25, 2009. (NSC 96-2628-E-218-002-MY2)
|
35
|
N.Y. Lee, and李姿誼, "Digital Rights
Management System with Efficient Key Management", 2009 資訊管理暨商務科技研討會(IMCT2009), pp. 15, May 8, 2009. (NSC 96-2628-E-218-002-MY2)
|
36
|
N.Y. Lee, 廖日辰, and 呂昆璣, "使用加法同態加密技術之n選1條件式模糊群播協定",第十九屆全國資訊安全會議(CISC 2009), pp. C103, June 3-5, 2009. (NSC 96-2628-E-218-002-MY2)
|
37
|
N.Y. Lee, Hung-Jen
Chiang, "Malware detection method based on reverse engineering", 2010第五屆數位教學暨資訊實務研討會 EITS2010,
pp. 2, March 31, 2010. (NSC 98-2221-E-218-033)
|
38
|
N.Y. Lee, and 賴浚廷, "植基於模糊簽章技術之公平線上抽獎遊戲", 2010年民生電子研討會 WCE2010, pp. 638-644, Nov. 5, 2010. (NSC 99-2221-E-218-046)
|
39
|
N.Y. Lee, 張云冠, "雲端環境中適用於不受信任伺服器之混合式資料儲存證明機制", 2011第六屆數位教學暨資訊實務研討會 EITS2011, pp. 12, March 30, 2011.
(NSC 99-2221-E-218-046)
|
40
|
N.Y. Lee, 賴浚廷, and 陳麒勝, "高效率n選t模糊簽章協定",第二十一屆全國資訊安全會議(CISC 2011), pp. 84-89, May 26-27, 2011. (NSC100-2219-E-006-001
and NSC99 – 2221-E-218-046)
|
41
|
N.Y. Lee, and
蔡孟廷, "基於ElGamal 密碼系統之多重副本資料儲存證明機制", 2011
National Computer Symposium 全國計算機會議 (NCS 2011), pp.
214-224, Dec. 2-3, 2011. (NSC100 – 2221-E-218-019)
|
42
|
N.Y. Lee, 陳麒勝, "植基於雙線性配對之n選t模糊簽章協定",
2012第七屆數位教學暨資訊實務研討會 EITS2012, pp. 29, March 28, 2012.
(NSC100 – 2221-E-218-019)
|
43
|
N.Y. Lee, 洪宏傑, "主機型P2P殭屍網路偵測系統之設計與實現", 2012第七屆數位教學暨資訊實務研討會 EITS2012, pp. 26, March 28, 2012. (NSC100 – 2221-E-218-019)
|
44
|
N.Y. Lee, 吳佳祐, "整合字元頻率特徵比對及類神經網路之雲端入侵偵測
系統", 2013第八屆數位教學暨資訊實務研討會 EITS2013, pp. 96, March 27, 2013.
(NSC101-2221-E-218-041)
|
45
|
朱家弘, N.Y. Lee, "結合行動網路與GPS實作之旅遊追蹤與管理系統", 第6屆電子工程技術研討會, pp. 391-394, May 24, 2013. (NSC
101-2221-E-218-041)
|
46
|
N.Y. Lee, 陳姿伶, and 溫翔安, "雲端伺服器輔助雙線性配對加密系統之設計",第二十三屆全國資訊安全會議(CISC 2013), pp.
360-366, May 23-24, 2013. (NSC 101-2221-E-218-041)
|
47
|
張宗典 and N.Y. Lee, "植基於ElGamal密碼系統之可驗證門檻式雲端儲存系統",第二十三屆全國資訊安全會議(CISC 2013), pp.
368-374, May 23-24, 2013. (NSC 101-2221-E-218-041)
|
48
|
N.Y. Lee, and
陳姿伶, "雲端伺服器輔助Paillier簽章系統之設計", (NCS 2013), pp. 1788, Dec. 13-14, 2013. (NSC 102-2221-E-218
-022)
|
49
|
N.Y. Lee, and
許立新, "具隱私保護和匿名認證機制之車載網路安全傳輸協定",第十三屆離島資訊技術與應用研討會 (ITAOI 2014), pp. 31-40, May 23-24, 2014. (NSC 102-2221-E-218
-022)
|
|
TOP
|