邱錫彥 教授
邱錫彥/Shin-Yan Chiou
教授/Professor
Department of Electrical Engineering
Chang Gung University, Taiwan
電話/TEL:886-3-2118800-3733
信箱/Email:ansel@mail.cgu.edu.tw
研究領域/專長:通訊領域/行動裝置程式開發、資訊安全、密碼學、無線網路、網路安全
Lab:網路安全與行動應用實驗室
|
Biography |
Shin-Yan Chiou (邱錫彥) was born in Changhua, Taiwan, in 1975. He received the B.S.E.E. and Ph.D.E.E degree from National Taiwan Ocean University and National Cheng Kung University, Taiwan, in 1997 and 2004 respectively. From 2005 to 2009, he worked as an Engineer in the Industrial Technology Research Institute (ITRI), Hsinchu, Taiwan, where he engaged in researches in the area of information security and social network. From 2009, he joined the Faculty of Chang Gung University, where he is currently Assistant Professor. At present, he is interested in information security, wireless security and social network. |
Publication List |
1. Journal paper (1) International Journal [1] Shin-Yan Chiou, Zhen-Yuan Liao, "Design and Implementation of Beacon-Based Positioning," Journal of Information Science and Engineering, Aug. 2018. (SCI&EI, IF: 0.327) (Rank: 111/146, COMPUTER SCIENCE, INFORMATION SYSTEMS) (Accepted) [2] Shin-Yan Chiou, "An Efficient RFID Authentication Protocol using Dynamic Identity," International Journal of Network Security, 2018. (EI) (Accepted) [3] Shin-Yan Chiou, Zhen-Yuan Liao, " A real-time, automated and privacy-preserving mobile emergency-medical-service network for informing the closest rescuer to rapidly support mobile-emergency-call victims," IEEE Access, vol. 6, pp. 35787- 35800, Aug. 2018. (SCI&EI, IF: 3.557) (Rank: 24/148, COMPUTER SCIENCE, INFORMATION SYSTEMS) [4] Shin-Yan Chiou, Ching-Hsuan Lin, "An Efficient Three-party Authentication Scheme for Data Exchange in Medical Environment," Security and Communication Networks, vol. 2018, Article ID 9146297, 15 pages, Jan. 2018. (SCI&EI, IF: 1.067) (2016 Rank: 111/146, COMPUTER SCIENCE, INFORMATION SYSTEMS) [5] Shin-Yan Chiou, "Common friends discovery for multiple parties with friendship ownership and replay-attack resistance in mobile social networks," Wireless Networks (WiNet), vol. 24, issue 4, pp. 1055-1069, May 2018. (SCI&EI, IF: 1.981) (Rank: 63/148, COMPUTER SCIENCE, INFORMATION SYSTEMS) [6] Shin-Yan Chiou, Shan-Yen Chang, "An Enhanced Authentication Scheme in Mobile RFID System," Ad Hoc Networks, vol. 71, pp. 1-13, Mar. 2018. (SCI&EI, IF: 3.151) (Rank: 29/148, COMPUTER SCIENCE, INFORMATION SYSTEMS) [7] Shin-Yan Chiou, Tsung-Ju Wang, Jiun-Ming Chen, "Design and Implementation of a Mobile Proxy Voting System Using a Novel Oblivious and Proxy Signature," Security and Communication Networks, vol. 2017, Article ID 3075210, 16 pages, Dec. 2017. (SCI) (SCI&EI, IF: 1.067) (Rank: 111/146, COMPUTER SCIENCE, INFORMATION SYSTEMS) [8] Shin-Yan Chiou, "A Secure Distributed Cloud Storage System Achieving Data Secrecy and Load Balance," International Journal of Security and Its Applications, vol. 11, no. 10, pp. 1-14, October 2017. (EI) [9] Shin-Yan Chiou and Chia-Chun Lin, "A Monitor System for Software Version Request in Offline Environments," International Journal of Security and Its Applications, vol. 11, no. 9, pp. 23-40, September 2017. (EI). [10] Shin-Yan Chiou*, Wen-Tsai Ko, and Erl-Huei Lu, "A Secure ECC-based Mobile RFID Mutual Authentication Protocol and its Application," International Journal of Network Security, Vol. 20, No. 2, pp. 396-402, Mar., 2018. (EI) [11] Shin-Yan Chiou, and Jiun-Ming Chen, “Design and Implementation of a Multiple-Choice E-voting Scheme on Mobile System using Novel t-out-of-n Oblivious Signature,” Journal of Information Science and Engineering, vol. 34, no. 1, pp. 135-154, 2018. (SCI&EI, IF: 0.468) (Rank: 141/146, COMPUTER SCIENCE, INFORMATION SYSTEMS) [12] Shin-Yan Chiou, "A Trustworthy Online Recommendation System based on Social Connections in a Privacy-Preserving Manner," Multimedia Tools and Applications, vol. 76, No. 7, pp. 9319-9336, April, 2017. (SCI&EI, IF: 1.530) (Rank: 87/146, COMPUTER SCIENCE, INFORMATION SYSTEMS) [13] Shin-Yan Chiou, "Novel Digital Signature Schemes based on Factoring and Discrete Logarithms," IJSIA: International Journal of Security and Its Applications, vol. 10, No. 3, pp. 295-310, March., 2016. (EI) [14] Shin-Yan Chiou*, Zhaoqin Ying, and Junqiang Liu, "Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment," Journal of Medical Systems, vol. 40, Issue 4, pp. 1-15, Feb., 2016. doi: 10.1007/s10916-016-0453-1 (SCI, 2016 IF: 2.456) (Rank: 9/23, MEDICAL INFORMATICS) [15] Wen-Tsai Ko, Shin-Yan Chiou*, Erl-Huei Lu, and Henry Ker-Chang Chang, "Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety," Journal of Medical Systems, vol. 38, issue 9, 12 pages, July., 2014. doi:10.1007/s10916-014-0066-5 (SCI, IF: 2.213) (Rank: 31/88, HEALTH CARE SCIENCES & SERVICES) [16] Shin-Yan Chiou, "A Secure Cloud Storage System with Privacy, Integrity and Authentication," ICIC-ELB: ICIC Express Letters, Part B: Applications, vol. 5 no. 3, pp. 843-849, June. 2014. (EI) [17] Shin-Yan Chiou and Yi-Cheng Chen, “A Mobile, Dynamic and Privacy-Preserving Matching System for Car and Taxi Pools,” Mathematical Problems in Engineering, vol. 2014, Article ID. 579031, 10 pages, Mar., 2014. (SCI&EI, IF: 1.383) (Rank: 23/90, ENGINEERING, MULTIDISCIPLINARY) (http://dx.doi.org/10.1155/2014/579031) [18] Shin-Yan Chiou and Chi-Shiu Luo, “An Authenticated Privacy-Preserving Mobile Matchmaking Protocol based on Social Connections with Friendship Ownership,” Mathematical Problems in Engineering, vol. 2014, Article ID. 637985, 12 pages, Feb, 2014. doi:10.1155/2014/637985 (SCI&EI, IF: 1.383) (Rank: 23/90, ENGINEERING, MULTIDISCIPLINARY) [19] Shin-Yan Chiou and Yao-Hsien Huang, "Mobile common friends discovery with friendship ownership and replay-attack resistance," Wireless Networks (WiNet), vol. 19, issue 8, pp. 1839-1850, Nov. 2013. doi:10.1007/s11276-013-0577-x (SCI&EI, IF: 0.736) (Rank: 45/78, TELECOMMUNICATIONS) [20] Shin-Yan Chiou and Yi-Xuan He, “Remarks on new Digital Signature Algorithm based on Factorization and Discrete Logarithm problem,” International Journal of Computer Trends and Technology (IJCTT), vol. 4, issue 9, pp. 3322 - 3324, Sep, 2013. [21] Shin-Yan Chiou, “Authenticated Blind Issuing of Symmetric Key for Mobile Access Control System Without Trusted Parties,” Mathematical Problems in Engineering, vol. 2013, Article ID. 858579, 11 pages, June, 2013. doi:10.1155/2013/858579 (SCI&EI, IF: 1.383) (Rank: 23/90, ENGINEERING, MULTIDISCIPLINARY) [22] Shin-Yan Chiou, “Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions,” BioMed Research International, vol. 2013, Article ID 623815, 12 pages, May, 2013. doi:10.1155/2013/623815 (SCI, IF: 2.880) (Rank: 50/160, BIOTECHNOLOGY & APPLIED MICROBIOLOGY) [23] Shin-Yan Chiou, "An Exploration of the WiMAX Security Sublayer based on IEEE 802.16e-2005," JDCTA: International Journal of Digital Content Technology and its Applications, vol. 7, no. 9, pp. 57 ~ 65, May, 2013. (EI) [24] Shin-Yan Chiou, "Trusted Online Transaction Methods Achieving Privacy and Fairness," AISS: Advances in Information Sciences and Service Sciences, vol. 5, no. 5, pp. 370-377, March, 2013. (EI) [25] Shin-Yan Chiou, "Mobile Common Friends Recognition with Privacy and Authenticity," ICIC-ELB: ICIC Express Letters, Part B: Applications, vol. 4, no. 1, pp. 197-203, Feb. 2013. (EI) [26] Wen-Tsai Ko, Shin-Yan Chiou, Erl-Huei Lu and Henry Ker-Chang, "A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID," AM: Applied Mathematics, vol. 3, no. 4, pp. 336-341, April 2012. [27] Shin-Yan Chiou and C.S. Laih, “On the Implementation of (2, n) Audio Cryptography Schemes without Computing Devices,” International Journal of Electrical Engineering, vol.11, no.1, pp. 53-58, Feb., 2004. (EI) [28] Shin-Yan Chiou and C.S. Laih, “A Tempo-Based t-out-of-n Audio Cryptography Scheme,” IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, vol. E86-A, no. 8, pp.2091-2098, Aug. 2003. (SCI&EI) [29] C.S. Laih and Shin-Yan Chiou*, “Cryptanalysis of An Optimized Protocol for Mobile Network Authentication and Security,” Information Processing Letters, vol. 85, issue 6, pp. 339 - 341, March 2003. DOI: 10.1016/S0020-0190(02)00431-3. (SCI&EI) [30] Shin-Yan Chiou and C.S. Laih, “An Efficient Algorithm for Computing the LUC Chain,” IEE Proceedings-Computers and Digital Techniques, vol.147, no.4, pp.263-265, July 2000. DOI: 10.5755/j01.itc.41.2.846. (SCI&EI)
(2) Domestic Journal [1] 邱錫彥、石俊彬, “一種兼顧隱私與公平的網路交易系統”,電腦與通訊(ICL Technical Journal), Vol. 127, March, 2009. [2] 邱錫彥、陳彥學, “可整合密碼技術之生物特徵處理方法”,電腦與通訊(ICL Technical Journal), Vol. 123, pp. 124-129, March, 2008. [3] 邱錫彥、陳彥學、王瑞堂、劉家蓁, “IEEE 802.16e-2005 WiMAX安全子層初探”,電腦與通訊(ICL Technical Journal), Vol. 119, pp. 104-111, March, 2007. 2. Conference Papers: (1) International Conference [1] Shin-Yan Chiou, Ching-Hsuan Lin, “An Efficient Authentication Scheme in Telecare Medicine Information Systems,” International Conference on Business and Information 2016 (BAI 2016), pp.131 – 140, Nagoya, Japan, July 3-5, 2016. [2] Zhaoqin Ying, Shin-Yan Chiou, Junqiang Liu, “An Efficient Privacy Authentication Scheme based on Cloud Models for Medical Environment,” The 18th International Conference on Network-Based Information Systems (NBiS2015), pp. 628 – 633, Taipei, Taiwan, Sep. 2-4, 2015. [3] Shin-Yan Chiou, Tsung-Ju Wang, Jiun-Ming Chen, “1-out-of-n Proxy Oblivious Signature Schemes and its e-voting Application,” 2015 International Conference on Electronics Systems and Information Technology (ICESIT-15), pp. 10 – 14, Dubai, UAE, Mar. 14-15, 2015. [4] Shin-Yan Chiou, “A Secure Cloud Peer-to-Peer Storage System achieving Data Secrecy and Load Balance,” 2014 International Conference on Information, Business and Education Technology (ICIBET 2014), pp. 29 – 33, Beijing , China, Feb. 27-28, 2014. [5] Shin-Yan Chiou, Jiun-Ming Chen, “An Electronic Voting Protocol Based on t–out–of–n Oblivious Signature Scheme,” International Conference on Business and Information 2013 (BAI 2013), pp. D263 – D274, Bali, Indonesia, July 7-9, 2013. [6] Shin-Yan Chiou, "An Exploration of the WiMAX Security Sublayer based on IEEE 802.16e-2005,” International Conference on Business and Information 2013 (BAI 2013), pp. D48 – D57, Bali, Indonesia, July 7-9, 2013. [7] Wen-Tsai Ko, Erl-Huei Lu, Shin-Yan Chiou and Henry Ker-Chang Chang, “A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application,” RFIDsec 2012 Asia Workshop, Taipei, Taiwan, Nov., 2012. (Cryptology and Information Security Series, vol. 8, pp. 63-71, 2012. DOI 10.3233/978-1-61499-143-4-63.) [8] Shin-Yan Chiou, “A Secure Cloud Saving System With Privacy, Integrity and Authenticity,” International Conference on Business and Information 2012 (BAI 2012), Sapporo, Japan, July 7-9, 2012. [9] Wen-Tsai Ko, Shin-Yan Chiou, Erl-Huei Lu and Henry Ker-Chang, "An Improvement of Privacy-Preserving ECC-Based Grouping Proof for RFID," Proceeding of the 14th Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC2011) (ISBN: 978-1-4244-9790-4), pp. 1062-1064, Harbin, China, July 26-30, 2011. (IEEE) (EI) [10] C.N. Yang, C.C. Wu, C.Y. Chiu, Shin-Yan Chiou, and W.C. Liao, "Micropayment Schemes with Ability to Return Changes," Proceeding of the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS2009) (ISBN: 978-1-60558-660-1), pp. 354-361, Kuala Lumpur, Malaysia, Dec. 14-16, 2009. (BEST PAPER) (NSC 98-2219-E-006-001) [11] Shin-Yan Chiou, S.Y. Chang and H.M. Sun, "Common Friends Discovery with Privacy and Authenticity," Fifth International Conference on Information Assurance and Security (IAS2009), vol. 1, pp.337-340, Xi'an, China, August 18-20, 2009. (IEEE conference) [12] Shin-Yan Chiou, S.Y. Chang, Ghita Mezzour, Adrian Perrig and H.M. Sun, “A Trustable Reputation Scheme Based on Private Relationships,” The 2009 International Conference on Advances in Social Networks Analysis and Mining (SNONAM2009), pp. 19-24, Athens, Greece, July, 2009. (IEEE conference) [13] Shin-Yan Chiou and J.B. Shi, “Web Transaction Methods Achieving Privacy and Fairness,” International Conference on Business and Information 2009 (BAI 2009), Kuala Lumpur, Malaysia, July, 2009. [14] Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin, Shin-Yan Chiou, "Efficient Authentication Schemes for Handover in Mobile WiMAX," isda, vol. 3, pp.235-240, 2008 Eighth International Conference on Intelligent Systems Design and Applications, Nov. 26-28, 2008 (IEEE conference) [15] Shin-Yan Chiou, “Symmetric key generation using particular user keys,” International Conference on Business and Information 2008 (BAI 2008), Seoul, Korea, July, 2008. [16] Shin-Yan Chiou, “A Secure File Storage System,” International Conference on Business and Information 2007 (BAI 2007), Tokyo, Japan, July, 2007. [17] Shin-Yan Chiou and C.S. Laih, “Cryptanalysis of the RSA-based Fail-Stop Signature Schemes from IWSEC ‘99,” The Second International Workshop for Asian Public Key Infrastructures (IWAP), pp. 104-107, Oct. 2002. [18] Shin-Yan Chiou and C.S. Laih, “An Easy Method to Implement Audio Cryptography Schemes without Computing Devices”, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security (Presented at the Rump Session), Australia, Dec. 2001. (2) Domestic Conference [1] 邱錫彥、張智說, “如何對加密檔名做部分名稱搜尋:應用於P2P雲端系統之加密檔名搜尋機制,” 第二十八屆資訊安全會議(Cryptology and Information Security Conference 2018 (CISC 2018)), 台灣科技大學, 台灣台北, May 24-25, 2018. [2] 廖振淵、邱錫彥, “具隱私性及認證性之行動緊急求救系統,” 第二十七屆資訊安全會議(Cryptology and Information Security Conference 2017 (CISC 2017)), 義守科技大學, 台灣高雄, May 25-26, 2017. (榮獲「第27屆資訊安全會議」最佳學生論文獎之佳作) [3] 廖振淵、邱錫彥, “利用Beacon達到行動微定位之方法與實作,” 第二十七屆資訊安全會議(Cryptology and Information Security Conference 2017 (CISC 2017)), 義守科技大學, 台灣高雄, May 25-26, 2017. [4] 邱錫彥、張善彥, “使用在行動RFID系統並具私密性及高效能之安全認證協定,” 第二十五屆資訊安全會議(Cryptology and Information Security Conference 2015 (CISC 2015)), 國立高雄第一科技大學, 台灣高雄, May 28-29, 2015. [5] 邱錫彥、林敬軒, “應用於電子病歷資料交換系統之具高效率且不需使用伺服器公鑰的金鑰交換與三方交互認證協定,” 第二十五屆資訊安全會議(Cryptology and Information Security Conference 2015 (CISC 2015)), 國立高雄第一科技大學, 台灣高雄, May 28-29, 2015. [6] 邱錫彥、王宗儒、陳俊名, “1-out-of-n Proxy Oblivious Signature Schemes and its e-voting Application,” 第二十四屆資訊安全會議(Cryptology and Information Security Conference 2014 (CISC 2014)), 國立政治大學, 台灣台北, May, 2014. (榮獲「第24屆資訊安全會議」論文佳作) [7] 邱錫彥、何懿軒、王宗儒, “基於RSA密碼系統之高效率n選t代理模糊簽章協定應用於公平線上博弈系統,” 第二十四屆資訊安全會議(Cryptology and Information Security Conference 2014 (CISC 2014)), 國立政治大學, 台灣台北, May, 2014. [8] 邱錫彥、林嘉駿, “達到版本控管之版權管理系統,” 2013安全管理與工程技術國際研討會, 吳鳳科技大學, 台灣嘉義, Nov., 2013. [9] 邱錫彥、陳奕誠, “達到隱私性的行動共乘配對系統,” 第11屆台塑關係企業應用技術研討會, 長庚大學, 台灣桃園, June, 2013. [10] 邱錫彥、賀榆辰, “具完整性、隱密性及部分檔名搜尋功能的安全P2P雲端檔案儲存系統,” 第二十三屆資訊安全會議(Cryptology and Information Security Conference 2013 (CISC 2013)), 南台科技大學, 台灣台南, May, 2013. (榮獲「第23屆資訊安全會議」最佳論文獎之佳作) [11] 邱錫彥、陳俊名, “基於模糊簽章之可多選電子投票系統,” 2012 全國電信研討會 (2012 National Symposium on Telecommunications (NST 2012)), 彰化師範大學, 台灣彰化, (Chuanghua), Nov. 16-17, 2012. [12] 邱錫彥、羅啟修, “利用社交網路達到行動任務匹配之系統與實作,” 第二十二屆資訊安全會議(Cryptology and Information Security Conference 2012 (CISC 2012)), 中興大學, 台灣台中(Taichung), May 30-31, 2012. [13] 邱錫彥、黃耀賢, “達到隱私性與認證性的行動社交網路交集探索系統與實作,” 第二十一屆資訊安全會議(Cryptology and Information Security Conference 2011 (CISC 2011)), 虎尾科技大學, 台灣雲林, pp.322 - 327, May, 2011. [14] 邱錫彥、黃乙軒、黃繼元, “金鑰交換系統在Windows Mobile手機平台之實作,” 第九屆現代通訊科技應用學術研討會(CCA 2011), 北台灣科學技術學院, 台灣台北, pp. 1-6, March, 2011. [15] 邱錫彥、陳彥學(Y.H. Chen), “基於PKI技術之生物辨識方法”,第十八屆資訊安全會議(Cryptology and Information Security Conference 2008 (CISC 2008)),東華大學,台灣花蓮,May, 2008. [16] 邱錫彥, “平衡式的個人檔案安全儲存系統(A Secure and Balanced Personal File Storage System)”,2006年資訊管理暨電子商務經營管理研討會(Conference on 2006 Information Management and Electronic Commerce Business Management), 成功大學,台灣台南,pp. 42-42, Dec., 2006. [17] 邱錫彥、宋振華、林之寅(S.Y. Chiou, C.H. Song and C.Y. Lin.),”具隱密性及完整性的個人檔案網狀儲存系統(Personal Grid Storage System with Secrecy and Integrity)”, 2006電子商務與數位生活研討會(EC2006), 台北大學, 台灣台北, pp. 12-14, Feb., 2006. [18] 賴溪松、邱錫彥, “Cryptanalysis of An Optimized Protocol for Mobile Network Authentication and Security,” 第十二屆全國資訊安全會議論文集(Proceedings of the Twelfth National Conference on Information Security), pp. 253-256, May, 2002. [19] 邱錫彥、賴溪松, “A Tempo-Based t-out-of-n Audio Cryptography Scheme,” 第十一屆全國資訊安全會議論文集(Proceedings of the Eleventh National Conference on Information Security), pp. 149-159, May, 2001. (Best Paper Award.) [20] 邱錫彥、賴溪松, “An Efficient Algorithm for computing Luc Chain,” 第十一屆全國資訊安全會議論文集(Proceedings of the Tenth National Conference on Information Security), pp. 34-39, May, 2000. 3. Patents: (1)中華民國專利 [1]陳宇佐,石登瑞,邱錫彥,2007,“無線網路認證系統及其方法”,中華民國發明第I403145號(專利權期間:2013年7月21日 ~ 2027年8月15日)(獲證日:2013.07.21.) [2]黃維中,邱錫彥,2008,“無線網路連線管理系統與其方法”,中華民國發明第I399942號(專利權期間:2013年6月21日 ~ 2028年2月19日)(獲證日:2013.6.21.) [3]邱錫彥,張仕穎,玫柔佳婷(Ghita Mezzour),培瑞安卓(Adrian Perrig),孫宏民,2009,“網路評價系統及其控制方法”,中華民國發明第I396428號(申請號第98123045號)。(專利權期間:2013年5月11日~ 2029年7月7日)(獲證日:2013.05.11.) [4]邱錫彥,陳彥學,2011,“生物辨識方法與裝置以及其生物特徵資料之加密方法”,中華民國發明第I350486號(專利權期間:2011年10月11日 ~ 2027年11月25日)(獲證日:2011.10.11.) [5]曾耀德,邱錫彥,2011,“電腦化之版本控管裝置與方法”,中華民國發明第I340332號(專利權期間:2011年4月11日 ~ 2027年2月1日)(獲證日:2011.04.11.) [6]邱錫彥,孫宏民,張仕穎,林岳勳,2008,“交遞驗證方法與系統”中華民國發明專利第I390931號。(獲證日:2013.03.21.) [7]邱錫彥,石俊彬,2008,“網路交易系統及其控制方法”,中華民國發明專利申請號第97150743號。(申請中) (2) 美國專利 [8] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun,2009,“METHOD FOR SENDING AND RECEIVING AN EVALUATION OF REPUTATION IN A SOCIAL NETWORK”,美國發明專利第8,312,276號 (獲證日:2012.11.13.) [9] Shin-Yan Chiou, Yen-Hsueh Chen, 2007, “BIOMETRIC METHOD AND APPARATUS AND BIOMETRIC DATA ENCRYPTION METHOD THEREOF”,美國發明專利第8,312,290號(獲證日:2012.11.13.) [10] Yu-Tso Chen; Teng-Jui Shih; Shin-Yan Chiou, 2007, “AUTHENTICATION SYSTEM AND METHOD THEREOF FOR WIRELESS NETWORKS”,美國發明專利第8,188,857號(獲證日:2012.5.29.) [11] Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin, 2008, “METHOD AND SYSTEM FOR HANDOVER AUTHENTICATION”, 美國發明專利第8,131,296號(獲證日:2012.3.6.) [12] Yaudeh Tseng, Shin-Yan Chiou, 2010, “COMPUTERIZED APPARATUS AND METHOD FOR VERSION CONTROL AND MANAGEMENT”,美國發明專利第7,805,601號(獲證日:2010.9.28.) [13] Wei-Chung Hwang, Shin-Yan Chiou,2008,“WIRELESS NETWORK CONNECTION MANAGEMENT SYSTEM AND METHOD THEREOF”,美國發明專利申請號第12/111,158號。(申請中) [14] Shin-Yan Chiou, Jun-Bin Shi, 2008, “NETWORK TRANSACTION SYSTEM AND METHOD THEREOF”,美國發明專利申請號第12/429,278號。(申請中) [15] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun, 2009, “NETWORK REPUTATION SYSTEM AND ITS CONTROLLING METHOD THEREOF”,美國發明專利申請號第61/150,324號。(申請中) [16] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun, 2009, “NETWORK REPUTATION SYSTEM AND ITS CONTROLLING METHOD THEREOF”,美國發明專利申請號第13/619,934號。(申請中) (3)中國大陸專利 [17]邱錫彥,孫宏民,張仕穎,林岳勳,2008,“交遞驗證方法與系統”,中國大陸發明專利第ZL200810190366.4號。(公開號:CN101656957)(專利權期限2008.12.~2028.12.)(授權日:2012.11.28) [18]邱錫彥,陳彥學,2007,“生物辨識方法與裝置以及其生物特徵資料的加密方法”,中國大陸發明專利申請號第200710199631.0號。(公開號:CN101459514)(授權日:2013.1.30) [19]陳宇佐,石登瑞,邱錫彥,2007,“無線網路認證系統及其方法”,中國大陸發明專利申請號第200710147295.5號。(公開號:CN101383816)(授權日:2015.9.2) [20]邱錫彥,石俊彬,2008,“網路交易系統及其控制方法”,中國大陸發明專利申請號第200810190270.8號。(申請日:2008.12.30.)(公開號:CN101770622A)(審中)
4. Books\Technical Reports: [1] 邱錫彥,異質無線網路安全技術結案報告,經濟部「異質無線網路安全技術」結案報告,73522Q1100,中華民國97年12月30日。 [2]邱錫彥,無縫連結技術之技術分析、規格需求書,經濟部「異質無線網路安全技術」技術報告,73522Q1100,中華民國97年7月3日。 [3]邱錫彥、陳彥學,內建電子憑證儲存於行動裝置上之研究,台灣網路認證公司「行動裝置電子憑證及安控元件技術授權」技術報告,6652WW1700,中華民國96年10月4日。 [4]邱錫彥、陳彥學,外接電子憑證儲存於行動裝置上之研究,台灣網路認證公司「行動裝置電子憑證及安控元件技術授權」技術報告,6652WW1700,中華民國96年10月4日。 [5]張心玲、邱錫彥、黃暐婷、吳宛玶,我國PKI互通管理及推動計畫擴充計畫執行成果報告書,經濟部「我國PKI互通管理及推動計畫擴充計畫」技術報告,5452HW1200,中華民國95年12月20日。 [6]邱錫彥、黃盈源, Web Service安全防護測試報告,機關團體「第四分項小型工服款」技術報告,5F52RW2200,中華民國95年8月4日。 [7]邱錫彥、陳彥學,M-Payment應用服務規範,工業局「行動台灣應用推動計畫」技術報告,4452BW1122,中華民國95年7月17日。 |