Professor
LAB:NETWORK SECURITY LAB
Contact information:
1.TEL:03-2118800-3733
Research fields:
nformation security, Cryptography, Wireless network, Network security, Social network
More information here:
Publication List |
1. Journal paper (1) International Journal [1] Wen-Tsai Ko, Shin-Yan Chiou*, Erl-Huei Lu, and Henry Ker-Chang Chang, "Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety," Journal of Medical Systems, Vol. 38, Issue 7, 12 pages, July., 2014. doi:10.1007/s10916-014-0066-5 (SCI, IF: 1.783) (Rank: 36/83, HEALTH CARE SCIENCES & SERVICES) [2] Shin-Yan Chiou and Yi-Cheng Chen, “A Mobile, Dynamic and Privacy-Preserving Matching System for Car and Taxi Pools,” Mathematical Problems in Engineering, Vol. 2014, Article ID. 579031, 10 pages, Mar., 2014. doi:10.1155/2014/579031. (SCI&EI, IF: 1.383) (Rank:23/90,ENGINEERING, MULTIDISCIPLINARY) [3] Shin-Yan Chiou and Chi-Shiu Luo, “An Authenticated Privacy-Preserving Mobile Matchmaking Protocol based on Social Connections with Friendship Ownership,” Mathematical Problems in Engineering, Vol. 2014, Article ID. 637985, 12 pages, Feb, 2014. doi:10.1155/2014/637985 (SCI&EI, IF: 1.383) (Rank: 23/90, ENGINEERING, MULTIDISCIPLINARY) [4] Shin-Yan Chiou and Yao-Hsien Huang, "Mobile common friends discovery with friendship ownership and replay-attack resistance," Wireless Networks (WiNet), Vol. 19, Issue 8, pp. 1839-1850, Nov. 2013. doi:10.1007/s11276-013-0577-x (SCI&EI, IF: 0.736) (Rank: 45/78, TELECOMMUNICATIONS) [5] Shin-Yan Chiou, "A Secure Cloud Storage System with Privacy, Integrity and Authentication," ICIC-ELB: ICIC Express Letters, Part B: Applications, Vol. 5 No. 3, pp. 843-849, June. 2014. (EI) [6] Shin-Yan Chiou, “Authenticated Blind Issuing of Symmetric Key for Mobile Access Control System Without Trusted Parties,” Mathematical Problems in Engineering, vol. 2013, Article ID. 858579, 11 pages, June, 2013. doi:10.1155/2013/858579 (SCI&EI, IF: 1.383) (Rank: 23/90, ENGINEERING, MULTIDISCIPLINARY) [7] Shin-Yan Chiou, “Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions,” BioMed Research International, vol. 2013, Article ID 623815, 12 pages, May, 2013. doi:10.1155/2013/623815 (SCI, IF: 2.880) (Rank: 50/160, BIOTECHNOLOGY & APPLIED MICROBIOLOGY) [8] Shin-Yan Chiou, "An Exploration of the WiMAX Security Sublayer based on IEEE 802.16e-2005," JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 7, No. 9, pp. 57 ~ 65, May, 2013. (EI) [9] Shin-Yan Chiou, "Trusted Online Transaction Methods Achieving Privacy and Fairness," AISS: Advances in Information Sciences and Service Sciences, Vol. 5 No. 5, pp. 370-377, March, 2013. (EI) [10] Shin-Yan Chiou, "Mobile Common Friends Recognition with Privacy and Authenticity," ICIC-ELB: ICIC Express Letters, Part B: Applications, Vol. 4 No. 1, pp. 197-203, Feb. 2013. (EI) [11] Shin-Yan Chiou and Yi-Xuan He,“Remarks on new Digital Signature Algorithm based on Factorization and Discrete Logarithm problem,” International Journal of Computer Trends and Technology (IJCTT), Vol. 4, Issue 9, pp. 3322 - 3324, Sep, 2013. [12] Wen-Tsai Ko, Shin-Yan Chiou, Erl-Huei Lu and Henry Ker-Chang, "A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID," AM: Applied Mathematics, Vol. 3 No. 4, pp. 336-341, April 2012. [13] S.Y. Chiou and C.S. Laih, “On the Implementation of (2, n) Audio Cryptography Schemes without Computing Devices,” International Journal of Electrical Engineering, Vol.11, No.1, pp. 53-58, Feb., 2004. (EI) [14] C.S. Laih and S.Y. Chiou, “Cryptanalysis of An Optimized Protocol for Mobile Network Authentication and Security,” Information Processing Letters, Vol. 85, Issue 6, pp. 339 - 341, March 2003. (EI, SCI) [15] S.Y. Chiou and C.S. Laih, “A Tempo-Based t-out-of-n Audio Cryptography Scheme,” IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E86-A, No.8, pp.2091-2098, Aug. 2003. (EI, SCI) [16] S.Y. Chiou and C.S. Laih, “An Efficient Algorithm for Computing the LUC Chain,” IEE Proceedings-Computers and Digital Techniques, Vol.147, No.4, pp.263-265, July 2000. (EI, SCI)
(2) Domestic Journal [1] 邱錫彥、石俊彬, “一種兼顧隱私與公平的網路交易系統”,電腦與通訊(ICL Technical Journal), Vol. 127, March, 2009. [2] 邱錫彥、陳彥學, “可整合密碼技術之生物特徵處理方法”,電腦與通訊(ICL Technical Journal), Vol. 123, pp. 124-129, March, 2008. [3] 邱錫彥、陳彥學、王瑞堂、劉家蓁, “IEEE 802.16e-2005 WiMAX安全子層初探”,電腦與通訊(ICL Technical Journal), Vol. 119, pp. 104-111, March, 2007. 2. Conference Papers: (1) International Conference [1] Shin-Yan Chiou, “A Secure Cloud Peer-to-Peer Storage System achieving Data Secrecy and Load Balance,” 2014 International Conference on Information, Business and Education Technology (ICIBET 2014), pp. 29 – 33, Beijing , China, Feb. 27-28, 2014. [2] Shin-Yan Chiou, Jiun-Ming Chen, “An Electronic Voting Protocol Based on t–out–of–n Oblivious Signature Scheme,” International Conference on Business and Information 2013 (BAI 2013), pp. D263 – D274, Bali, Indonesia, July 7-9, 2013. [3] Shin-Yan Chiou, "An Exploration of the WiMAX Security Sublayer based on IEEE 802.16e-2005,” International Conference on Business and Information 2013 (BAI 2013), pp. D48 – D57, Bali, Indonesia, July 7-9, 2013. [4] Wen-Tsai Ko, Erl-Huei Lu, Shin-Yan Chiou and Henry Ker-Chang Chang, “A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application,” RFIDsec 2012 Asia Workshop, Taipei, Taiwan, Nov., 2012. pp. 63 – 71, Cryptology and Information Security Series, DOI 10.3233/978-1-61499-143-4-63. [5] Shin-Yan Chiou, “A Secure Cloud Saving System With Privacy, Integrity and Authenticity,” International Conference on Business and Information 2012 (BAI 2012), Sapporo, Japan, July 7-9, 2012. [6] Wen-Tsai Ko, Shin-Yan Chiou, Erl-Huei Lu and Henry Ker-Chang, "An Improvement of Privacy-Preserving ECC-Based Grouping Proof for RFID," Proceeding of the 14th Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC2011) (ISBN: 978-1-4244-9790-4), pp. 1062-1064, Harbin, China, July 26-30, 2011. (IEEE) (EI) [7] C.N. Yang, C.C. Wu, C.Y. Chiu, Shin-Yan Chiou, and W.C. Liao, "Micropayment Schemes with Ability to Return Changes," Proceeding of the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS2009) (ISBN: 978-1-60558-660-1), pp. 354-361, Kuala Lumpur, Malaysia, Dec. 14-16, 2009. (BEST PAPER) (NSC 98-2219-E-006-001) [8] S.Y. Chiou, S.Y. Chang and H.M. Sun, “Common Friends Divcovery with Privacy and Authentication,” Proceedings of IEEE Conference on IAS2009 (Fifth International Conference on Information Assurance and Security), pp. 337-340, Xi'an, China, 2009. [9] S.Y. Chiou, S.Y. Chang, Ghita Mezzour, Adrian Perrig and H.M. Sun, “A Trustable Reputation Scheme Based on Private Relationships,” Proceedings of IEEE Conference on SNONAM2009 (The 2009 International Conference on Advances in Social Networks Analysis and Mining), pp. 19-24, Athens, Greece, 2009. [10] S.Y. Chiou and J.B. Shi, “Web Transaction Methods Achieving Privacy and Fairness,” International Conference on Business and Information 2009 (BAI 2009), Kuala Lumpur, Malaysia, July, 2009. [11] H.M. Sun, S.Y. Chang, Y.H. Lin and S.Y. Chiou, “Efficient Authentication Schemes for Handover in Mobile WiMAX,” Proceedings of IEEE Conference on ISDA 2008 (Eighth International Conference on Intelligent Systems Design and Applications), pp. 235 – 240, Dec., 2008. [12] S.Y. Chiou, “Symmetric key generation using particular user keys,” International Conference on Business and Information 2008 (BAI 2008), Seoul, July, Korea, 2008. [13] S.Y. Chiou, “A Secure File Storage System,” International Conference on Business and Information 2007 (BAI 2007), Tokyo, Japan, July, 2007. [14] S.Y. Chiou and C.S. Laih, “Cryptanalysis of the RSA-based Fail-Stop Signature Schemes from IWSEC ‘99,” The Second International Workshop for Asian Public Key Infrastructures, pp. 104-107, 2002. [15] S.Y. Chiou and C.S. Laih, “An Easy Method to Implement Audio Cryptography Schemes without Computing Devices”, Presented at the Rump Session, ASIA-CRYPT'01, Australia, 2001. (2) Domestic Conference [1]邱錫彥、王宗儒、陳俊名, “1-out-of-n Proxy Oblivious Signature Schemes and its e-voting Application,” 第二十四屆資訊安全會議(Cryptology and Information Security Conference 2014 (CISC 2014)), 國立政治大學, 台灣台北, May, 2014. (榮獲「第24屆資訊安全會議」論文佳作) [2]邱錫彥、何懿軒、王宗儒, “基於RSA密碼系統之高效率n選t代理模糊簽章協定應用於公平線上博弈系統,” 第二十四屆資訊安全會議(Cryptology and Information Security Conference 2014 (CISC 2014)), 國立政治大學, 台灣台北, May, 2014. [3]邱錫彥、林嘉駿, “達到版本控管之版權管理系統,” 2013安全管理與工程技術國際研討會, 吳鳳科技大學, 台灣嘉義, Nov., 2013. [4]邱錫彥、陳奕誠, “達到隱私性的行動共乘配對系統,” 第11屆台塑關係企業應用技術研討會, 長庚大學, 台灣桃園, June, 2013. [5]邱錫彥、賀榆辰, “具完整性、隱密性及部分檔名搜尋功能的安全P2P雲端檔案儲存系統,” 第二十三屆資訊安全會議(Cryptology and Information Security Conference 2013 (CISC 2013)), 南台科技大學, 台灣台南, May, 2013. (榮獲「第23屆資訊安全會議」最佳論文獎之佳作) [6]邱錫彥、陳俊名, “基於模糊簽章之可多選電子投票系統,” 2012 全國電信研討會 (2012 National Symposium on Telecommunications (NST 2012)), 彰化師範大學, 台灣彰化, (Chuanghua), Nov. 16-17, 2012. [7]邱錫彥、羅啟修,“利用社交網路達到行動任務匹配之系統與實作,” 第二十二屆資訊安全會議(Cryptology and Information Security Conference 2012 (CISC 2012)), 中興大學, 台灣台中(Taichung), May 30-31, 2012. [8]邱錫彥、黃耀賢,“達到隱私性與認證性的行動社交網路交集探索系統與實作,” 第二十一屆資訊安全會議(Cryptology and Information Security Conference 2011 (CISC 2011)), 虎尾科技大學, 台灣雲林, pp.322 - 327, May, 2011. [9] 邱錫彥、黃乙軒、黃繼元, “金鑰交換系統在Windows Mobile手機平台之實作,” 第九屆現代通訊科技應用學術研討會(CCA 2011), 北台灣科學技術學院, 台灣台北, pp. 1-6, March, 2011. [10]邱錫彥、陳彥學,“基於PKI技術之生物辨識方法”,第十八屆資訊安全會議(Cryptology and Information Security Conference 2008, CISC 2008), pp. 377-389, May, 2008. [11]邱錫彥, “平衡式的個人檔案安全儲存系統”,2006年資訊管理暨電子商務經營管理研討會(Conference on 2006 Information Management and Electronic Commerce Business Management), pp. 42-42, Dec., 2006. [12]邱錫彥、宋振華、林之寅, “具隱密性及完整性的個人檔案網狀儲存系統”,2006電子商務與數位生活研討會(EC2006), Feb., 2006. [13]賴溪松、邱錫彥, “Cryptanalysis of An Optimized Protocol for Mobile Network Authentication and Security,”第十二屆全國資訊安全會議(Proceedings of the Twelfth National Conference on Information Security), pp. 253-256, 2002. [14]邱錫彥、賴溪松, “A Tempo-Based t-out-of-n Audio Cryptography Scheme,”第十一屆全國資訊安全會議(Proceedings of the Eleventh National Conference on Information Security), pp. 149-159, 2001. (Best Paper Award.) [15]邱錫彥、賴溪松, “An Efficient Algorithm for computing Luc Chain,” 第十屆全國資訊安全會議(Proceedings of the Tenth National Conference on Information Security), pp. 34-39, 2000.
3. Patents: (1)中華民國專利 [1]陳宇佐,石登瑞,邱錫彥,2007,“無線網路認證系統及其方法”,中華民國發明第I403145號(專利權期間:2013年7月21日 ~ 2027年8月15日)(獲證日:2013.07.21.) [2]黃維中,邱錫彥,2008,“無線網路連線管理系統與其方法”,中華民國發明第I399942號(專利權期間:2013年6月21日 ~ 2028年2月19日)(獲證日:2013.6.21.) [3]邱錫彥,張仕穎,玫柔佳婷(Ghita Mezzour),培瑞安卓(Adrian Perrig),孫宏民,2009,“網路評價系統及其控制方法”,中華民國發明第I396428號(申請號第98123045號)。(專利權期間:2013年5月11日 ~ 2029年7月7日)(獲證日:2013.05.11.) [4]邱錫彥,陳彥學,2011,“生物辨識方法與裝置以及其生物特徵資料之加密方法”,中華民國發明第I350486號(專利權期間:2011年10月11日 ~ 2027年11月25日)(獲證日:2011.10.11.) [5]曾耀德,邱錫彥,2011,“電腦化之版本控管裝置與方法”,中華民國發明第I340332號(專利權期間:2011年4月11日 ~ 2027年2月1日)(獲證日:2011.04.11.) [6]邱錫彥,孫宏民,張仕穎,林岳勳,2008,“交遞驗證方法與系統”中華民國發明專利申請號第97148719號。(申請中) [7]邱錫彥,石俊彬,2008,“網路交易系統及其控制方法”,中華民國發明專利申請號第97150743號。(申請中) (2) 美國專利 [8] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun,2009,“METHOD FOR SENDING AND RECEIVING AN EVALUATION OF REPUTATION IN A SOCIAL NETWORK”, 美國發明專利第8,312,276號 (獲證日:2012.11.13.) [9] Shin-Yan Chiou, Yen-Hsueh Chen, 2007, “BIOMETRIC METHOD AND APPARATUS AND BIOMETRIC DATA ENCRYPTION METHOD THEREOF”,美國發明專利第8,312,290號(獲證日:2012.11.13.) [10] Yu-Tso Chen; Teng-Jui Shih; Shin-Yan Chiou, 2007, “AUTHENTICATION SYSTEM AND METHOD THEREOF FOR WIRELESS NETWORKS”,美國發明專利第8,188,857號(獲證日:2012.5.29.) [11] Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin, 2008, “METHOD AND SYSTEM FOR HANDOVER AUTHENTICATION”, 美國發明專利第8,131,296號(獲證日:2012.3.6.) [12] Yaudeh Tseng, Shin-Yan Chiou, 2010, “COMPUTERIZED APPARATUS AND METHOD FOR VERSION CONTROL AND MANAGEMENT”,美國發明專利第7,805,601號(獲證日:2010.9.28.) [13] Wei-Chung Hwang, Shin-Yan Chiou,2008,“WIRELESS NETWORK CONNECTION MANAGEMENT SYSTEM AND METHOD THEREOF”,美國發明專利申請號第12/111,158號。(申請中) [14] Shin-Yan Chiou, Jun-Bin Shi, 2008, “NETWORK TRANSACTION SYSTEM AND METHOD THEREOF”,美國發明專利申請號第12/429,278號。(申請中) [15] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun, 2009, “NETWORK REPUTATION SYSTEM AND ITS CONTROLLING METHOD THEREOF”,美國發明專利申請號第61/150,324號。(申請中) [16] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun, 2009, “NETWORK REPUTATION SYSTEM AND ITS CONTROLLING METHOD THEREOF”,美國發明專利申請號第13/619,934號。(申請中) (3)中國大陸專利 [17]邱錫彥,孫宏民,張仕穎,林岳勳,2008,“交遞驗證方法與系統”,中國大陸發明專利第ZL200810190366.4號。(公開號:CN101656957)(專利權期限2008.12.~2028.12.)(授權日:2012.11.28) [18]邱錫彥,陳彥學,2007,“生物辨識方法與裝置以及其生物特徵資料的加密方法”,中國大陸發明專利申請號第200710199631.0號。(公開號:CN101459514)(授權日:2013.1.30) [19]陳宇佐,石登瑞,邱錫彥,2007,“無線網路認證系統及其方法”,中國大陸發明專利申請號第200710147295.5號。(申請日:2007.09.10.)(公開號:CN101383816)(審中) [20]邱錫彥,石俊彬,2008,“網路交易系統及其控制方法”,中國大陸發明專利申請號第200810190270.8號。(申請日:2008.12.30.)(公開號:CN101770622A)(審中)
4. Books\Technical Reports: [1] 邱錫彥,異質無線網路安全技術結案報告,經濟部「異質無線網路安全技術」結案報告,73522Q1100,中華民國97年12月30日。 [2]邱錫彥,無縫連結技術之技術分析、規格需求書,經濟部「異質無線網路安全技術」技術報告,73522Q1100,中華民國97年7月3日。 [3]邱錫彥、陳彥學,內建電子憑證儲存於行動裝置上之研究,台灣網路認證公司「行動裝置電子憑證及安控元件技術授權」技術報告,6652WW1700,中華民國96年10月4日。 [4]邱錫彥、陳彥學,外接電子憑證儲存於行動裝置上之研究,台灣網路認證公司「行動裝置電子憑證及安控元件技術授權」技術報告,6652WW1700,中華民國96年10月4日。 [5]張心玲、邱錫彥、黃暐婷、吳宛玶,我國PKI互通管理及推動計畫擴充計畫執行成果報告書,經濟部「我國PKI互通管理及推動計畫擴充計畫」技術報告,5452HW1200,中華民國95年12月20日。 [6]邱錫彥、黃盈源, Web Service安全防護測試報告,機關團體「第四分項小型工服款」技術報告,5F52RW2200,中華民國95年8月4日。 邱錫彥、陳彥學,M-Payment應用服務規範,工業局「行動台灣應用推動計畫」技術報告,4452BW1122,中華民國95年7月17日。 |