Hung-Yu Chien
Contact Address 470 University road, PuLi NanTou Taiwan, R.O.C. | Phone: (886) 492910960 ext. 4635 Fax: (049) 2915205 Email: hychien@ncnu.edu.tw |
Sharing from my students (學生分享) |
|
Research topics | * Cryptography; applied cryptography; Security of Internet of Things, Application of Ontology; Innovative application of RFID, Zigbee and Raspberry Pi, Splunk |
Education | 1984~1988.6: bachelor, Computer Sciences, National Chung Tong University; 1988~1990.6: master, computer science and engineering, national Taiwan university; 1999~2002.6: doctoral, applied mathematics, national Chung Shing university |
Work experiences | 1990.7~1992.5: military service; 1992~1995.3: research assistant, telecommunication laboratory, ministry of transportation; 1995.4~1996.3: sales rep., Accton Corp.; 1996.8~2002.7: lecture, NanKai college; 1997.8~1999.1: director of computer center at Nan-Kei college; 2002.8~2003.7: associate professor, NanKei college; 2003.8~2006.7: associate professor, department of information management, ChaoYang university of technology; 2006.8~2008.7: associate professor, department of information management, national Chi Nan university; 2006, guest editor, Communications of the CCISA, Vol. 12, No. 4, October 2006. 2008.8~ : professor, department of information management, national Chi Nan university; 2008.9~2011.07 : head of department of information management, national Chi Nan university; 2011.08~2012.07: visiting scholar at University of California, Davis, the USA; hosted by Prof. Shyhtsun Felix Wu. Director member of the 6th council of Chinese Cryptography and Information Security Association. 2011~. Editor, ISRN Communications and Networking, Hindawi Publishing Corporation. 2012~. International Editor, International Journal of Information Security Science, ISSN:2147-0030, publisher: GAZI UNIVERSITY, Turkey. |
Honor | 2002, the 3rd place of the best research, College of Science, NCHU. 2004, 2005, honorable mention for research, CYUT. 2007, Best paper, The 2007 IFIP International Conference on Embedded and Ubiquitous Computing, 2009, Research quality award, NCNU. 2010, Best paper, The 5th Joint Workshop on Information Security (JWIS) 2010. 2011, 2012, 2013, research quality award, NSC. 2012, the winner of the most cited paper award, NCNU. 2013, the winner of the quality award of the research project team, NSC. 2015, the winner of the most cited paper award, NCNU. |
Private interests: | Bonsai, wood work, hiking, biking, tennis, fishing, traveling, farming … |
Projects | 1. “the study of smart card-based security applications”, NanKei college(NKC-90-05-02),2001/8 -- 2002/7, $113,000. 2. “the study of partially blind signatures”, National Science Council, NSC91-2626-E-252-002-,2002/8 -- 2003/7, $129,600. 3. “the study of applied cryptography”, NanKei college, BD1301-14-16, 2002/8 -- 2003/7. 4. "The authentication of ATM and public terminals", National Science Council (NSC92-2213-E-252-007 or NSC92-2213-E-324-036), 2003/8 -- 2004/7. $338,100. 5. “Sub-project of 93 year self-assessment- security of wireless campus”, ChaoYang university of technology, A014, 2005/2 -- 2005/7, $580,000. 6. “sub-project of 94, 95 year E-Life - GCA smart campus”, 4636, 4637, 1st year $2,441,000,2nd year $2,325,000. 7. “a study of ID-based cross-domain key agreement and signatures from pairings in multi-TA environments”, NSC 94 - 2213 - E - 324 – 027. 8. “The study of secure Internet Open Trading protocol (IOTP) and B2B applications (NSC94-2213-E-126-008), 940801~960731, 1st year $473,000, 2nd year $483,000. 9. “development of training courses for on-line learning cryptography”, ministry of education, (台顧字第0940105850號), $464,000. 10. “developing a secure and fair trading platform for digital right management “, NSC95-2221-E-005-045-MY2), 950801~970731, 1st year $391,000, 2nd year $511,000. 11. “the study of fair and non-repudiated mobile commerce system”, (NSC 95-2221-E-324-025, 950801~960731, $511,000. 12. “the study of secure tripartite key agreement resistant to insider attacks”, NSC 95-2221-E-260 -050 -MY2. 13. “incubation of security research in NCNU”, T9710000058, T9710000057, $800,000. 14. “Selectively Convertible Authenticated Encryption in The Random Oracle Model and Its applications to E-tender systems”, NSC 97 - 2221 - E - 260 - 008 - MY2. 15. 九十八學年度無線射頻辨識與企業資源規劃(RFID & ERP)就業學程計畫, 職訓局 16. 九十八學年度國科會補助台奧雙邊合作研討會[整合 RFID 網路之安全, Security in the Internet of Things] 17. 共同主持人:簡宏宇, 九十八學年度國科會補助[教育單位網站應用程式弱點監測平台計畫] 18. 參與 技轉單位:成功大學資通安全研究與教學單位, 接受技轉單位:優仕達資訊股份有限公司, [如何設計及評估安全防偽系統之技術移轉]. 19. 國立暨南國際大學98年度學術交流出國計畫[日本會津大學暑期參訪計畫], 尹邦嚴、簡宏宇、 阮夙姿. 20. 協同計畫主持人, 國科會整合型計畫 [具隱私協商與風險管理之聯合服務架構計畫], 98.10~99.7 21. 計畫主持人, [文化創意產業營運模式研究與交易市集建置計畫] 22. Integrated project “the study of federated services for NFC-based platform”- sub-project “the study of un-traceable light-weight authentication”2010.8~2013.7, NSC project. 23. “The study of social informatics and security”, visiting scholar of UCD (University of California at Davis), the US. 2011.08~2012.07, NSC project. 24. “The study and implementation of un-traceable RFID authentication and ownership transfer in distributed environments”, 2013.08~2015.10. |
Publications | (一) International Journals 1. Jan, J. K., Tseng, Y. M. and Chien, H. Y., “ A Threshold Signature Scheme Withstanding the Conspiracy Attack”, Communications of the Institute of Information and Computing Machinery, Taiwan, Vol.2, No.3, Sept. 1999, PP.31-38 (1999)
(二) International conferences 1. Huang, J. H. and Chien, H. Y. "Optimal Connection of Interconnected Token Rings”, Proc. Telecommunication Symposium, Taiwan, pp.339-344 (1990). 3. Hung-Yu Chien et al., “An Implementation of CMIP/CMISE Conformance Test System”, International Workshop on Protocol Test System, (1994. 11). 4. Chien, H. Y. “Decision-making support for equipment management using homepage and database,” in proceedings of 1998 Asia Pacific Decision Institute Conference, Taipei, (1998.6). 5. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “A New Generalized Group-Oriented Cryptosystem Based on the Systematic Block Codes”, Proceedings of the 2000 International Computer Symposium Workshop on Cryptology and Information Security, National Chung Cheng University, Chiayi, Taiwan, , pp. 26-32 (Dec. 2000). 9. Chien, H.Y., Jan, J. K., and Tseng, Y. M. “Undeniable billing of anonymous channel services in wireless communication”, Proceedings of the Second International Conference on Parallel and Distributed Computing, Applications, Technologies (PDCAT 2001), (July 9-11, 2001). 10. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “RSA-Based Partially Blind Signature with Low Computation”, Proceedings of the 2001 International Conference on Parallel And Distributed Systems, KyongJu City, Korea, June 2001, pp. 385-389 (2001). 11. Chien, H. Y., “Forgery Attack on Xia-You’s Group Signature”, International Computer Symposium, Dec. 18~21, 2002, Hualien, Taiwan (2002). 12. Chien, H. Y., and Jan, J. K. “An integrated user authentication and access control scheme without public key cryptography”, IEEE International Carnahan Conference 2003 on Security Technology (2003) 13. Hung-Yu Chien and Che-Hao Chen “A remote authentication scheme preserving user anonymity”, The IEEE First International Workshop on Information Networking and Applications, March (INA’2005)(ISBN 0-7695-2249-1), pp. 245-248. NSC92-2213-E-324-036. 14. Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang, “New Approach to Web Account Management”, IMB2005,March 25-26, 2005. (ISBN: 9579129339) NSC92-2213-E-324-036 15. Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang ,“E-passport preventing forgery and fraud”, IMB2005,March 25-26, 2005. (ISBN: 9579129339) NSC92-2213-E-324-036 16. Chien, H. Y., “On the revocation of proxy signatures”, IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027 17. Chien, H. Y., and Lin, R. Y., “Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing”, The IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006), June 5-7, 2006 Taichung, Taiwan. NSC 94 - 2213 - E - 324 - 027 18. Chien, H. Y., “Secure Access Control Schemes for RFID Systems with Anonymity”, 2006 International Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT'06), Japan. NSC 94 - 2213 - E - 324 – 027. 19. Chien, H. Y., Lin, R. Y. “ID-Based E-Will System using Bilinear Pairings”, IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027 20. Chien, H. Y., Teng, H. Y. Teng, Chen Y. C., ” Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks”, IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 – 027. 21. Hung-Yu Chien, “Secure E-Tender Protocol with Adaptive Privacy Protection and Adaptive Public Verifiability”, International Conference on Business and Information, July 11-13, 2007, Tokyo, Japan. NSC 95-2221-E-260 -050 -MY2. 22. Hung-Yu Chien, Yuan-Liang Tang, Ying-Lun Chen, “A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme”, in proc. of the 2007 IAENG International Conference on Communication Systems and Applications, Hong Kong, 21-23 March, 2007 NSC 95-2221-E-260 -050 -MY2. 23. Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu, “Secure Fast Pre-authentication Based on IEEE 802.11i”, in proc. of the 2007 IAENG International Conference on Communication Systems and Applications, Hong Kong, 21-23 March, 2007. NSC 95-2221-E-260 -050 -MY2. 24. Hung-Yu Chien, “Novel verifiable multi-secret sharing scheme using bilinear pairing”, 2007 International Conference on Advanced Information Technologies (AIT2007), Taichung, Taiwan. NSC 95-2221-E-260 -050 -MY2. 25. H. Y. Chien, “New efficient user authentication scheme with user anonymity facilitating e-commerce applications”, IEEE Joint Conference on E-Commerce Technology (CEC'07) and Enterprise Computing, E-Commerce and E-Services (EEE '07), Japan, July 2007. NSC 95-2221-E-260 -050 -MY2. 26. Hung Yu Chien, Rung-Ching Chen, Annie Shen, “Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space”, The IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA2008), March 25 -28, 2008, Okinawa, Japan. (EI) 27. H. Y. Chien, “ID-Based Key Agreement with Anonymity for Ad Hoc Network”, accepted and to be appear in proceedings of The 2007 IFIP International Conference on Embedded and Ubiquitous Computing, December 17 - 20, 2007 , Taipei, Taiwan, LNCS 4808, pp. 422-431, Springer. NSC 95-2221-E-260 -050 -MY2. [SCI, EI] [Best paper Award] 28. Hung-Yu Chien, Tzong-Chen Wu, “Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model“, Proc. IEEE ISI 2008 pre-conference workshop, Pacific Asia Workshop on Intelligence and Security Informatics, June 17-20 2008, Taiwan, LNCS 5075, pp. 69–76, 2008, Springer, Berlin.. (LNCS, EI) 29. Hung-Yu Chien, “Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance”, proc. of 2008 IEEE Asia-Pacific Services Computing Conference, IEEE APSCC 2008, December 9-12, 2008, Yilan, Taiwan. (EI). 30. Hung-Yu Chien, “Highly Efficient ID-based Ring Signature from Pairings”, proc. of 2008 IEEE Asia-Pacific Services Computing Conference, IEEE APSCC 2008, December 9-12, 2008, Yilan, Taiwan. (EI). 31. An-Ni Shen, Song Guo, Hung-Yu Chien, “ An Efficient and Scalable Key Distribution Mechanism for Hierarchical Wireless Sensor Networks“, IEEE International Workshop on Modeling, Analysis and Simulation of Sensor Networks (MASSN), Sydney, Australia, December, 2008. 32. Hung-Yu Chien, Shih-Bin Liu, “Tree-Based RFID Yoking Proof“, nswctc, vol. 1, pp.550-553, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009. 33. Hung-Yu Chien, Chieh-Shian Tu, Tzong-Chen Wu, “RFID-based, Anonymous Authentication scheme”, Ufirst-09 (International Symposium on UbiCom Frontiers - Innovative Research, Systems and Technologies in conjuction with The Sixth International Conference on Ubiquitous Intelligence and Computing (UIC09), July 13-14 , 2009, Brisbane, Australia 34. Tzong-Chen Wu, Hung-Yu Chien, “Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol“, The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP09) Sep. 12 - 14, 2009, Kyoto, Japan. 35. Chin-Feng Lee, Yu-Chang Chen, Hung-Yu Chien , Chi-Sung Laih “Anonymous RFID Yoking Protocol Using Error Correction Codes”, The 2010 Workshop on RFID Security (RFIDsec'10 Asia), Singapore, February 22-23, 2010. 36. Hung-Yu Chien*, and Ying-Lun Chen, “A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security,” 5th International Conference on Grid and Pervasive Computing GPC2010, Hualien, Taiwan, February 23, 2010. 37. Hung-Yu Chien, Jia-Zhen Yen, Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability”, The 5th Joint Workshop on Information Security (JWIS) 2010. [Best paper award] 38. Lee C.F., Huang S. R., Chien H. Y., Lee N. Y. Two-Party and Three-Party Remote User Authentication Schemes Using Biometric Data Only For Emergency. The 2nd International Symposium on Aware Computing 2010, Tainan, Taiwan. 39. Book Title: An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability; Author: Hung-Yu Chien Editor: Yingjiu Li, Jianying Zhou, ISBN: 978-1-60750-484-9, IOS publisher, Published: July 2010 40. Yan-Chen Liu, Hung-Yu Chien, Yu-Chang Chen, Chu-Sing Yang, N-W Lo, “Integrated EPC Information Service Authentication using OpenID in Cross Domains”, RFIDSec Asia 2011, April 2011. 41. Hung-Yu Chien, Ming-Kuei Yeh, Tzong-Chen Wu, Chin-I Lee, “Comments on Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups”, The 2011 International Conference on Information Security & The First Cross-Straits Conference on Information Security (CSCIS 2011), HanZhou, China, April 13-15. 42. Hung-Yu Chien, Chin-I Lee, Shyr-Kuen Chen, Hung-Pin Hou, “New RFID Authentication Protocol with DOS-Attack Resistance”, IEEE ICPADS 2011 Sep 7~9, Tainan, Taiwan. 43. Hung-Yu Chien, Jia-Zhen Yen and Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability” in "Current Trends and Challenges in RFID",Edited by Cornel Turcu, ISBN 978-953-307-356-9, Published: July 20, 2011 under CC BY-NC-SA 3.0 44. Hung-Yu Chien, “Cryptanalysis on RFID Authentications Using Minimum Disclosure Approach”, The 8th Asia Joint Conference on Information Security (AsiaJCIS2013) Seoul, Korea, July 25 - 26, 2013. 45. Hung-Yu Chien, “Cryptanalysis on Generalized Ring Signatures”, Eighth International Conference on Innovative Computing, Information and Control (ICICIC2013), to be held in Kumamoto, Japan, September 14-17, 2013. 46. HungYu Chien, “Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Devices”, The Second Cross-Straits Conference on Information Security (CSCIS 2013), Kaohsiung, Taiwan, Sep. 11~13 2013. 47. Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, Hung-Yu Chien, “Efficient Anonymous Multi-receiver ID-based Encryption with Constant Decryption Cost”, ISEEE 2014, April 26~28, Japan. 48. Hung-Yu Chien, “New Gen2v2-based Mutual Authentication Schemes”, The 8th International Conference on Software Security and Reliability (SERE2014), San Francisco, US, June 30~ July 2, 2014, IEEE. 49. Teng-Yu Huang, Hung-Yu Chien, “Gen2v2-Security-and-Privacy- Features-Leveraged Application Designs”, AsiaJCIS2014, Sep 3~5, WuHan, China. 50. Hung-Yu Chien, Meng-Yuan Chiang, Yi-Ting Hsin, Chun-Pei Hung, “Efficiently tracking TANET suspicious packets and identifying the devices using Splunk”, International Computer Symposium (ICS2014), Dec 14-17, Taichung, Taiwan. 51. Hung-Yu Chien, “De-synchronization Attack on Quadratic Residues-based RFID Ownership Transfer”, Kaohsiung, Taiwan, AsiaJCIS 2015. 52. H.-Y. Chien, M.-Y. Chiang, Y.-T. Hsin, C.-P. Hung “Another Effective Approach to Detect SQL Injection and Business Intelligence Using Splunk”, International Conference on Engineering and Applied Sciences (ICEAS), July 20-22, 2015, Japan.
(3) bookchapter 1. Hung-Yu Chien, “The Study of RFID Authentication Protocols and Security of Some Popular RFID Tags” in the book "Development and Implementation of RFID Technology", Dr. Vedran Kordic (Editor), I-Tech Education and Publishing Kirchengasse 43/3, A-1070 Vienna, Austria, EU. (4) Lead guest editor International Journal of Distributed Sensor Networks Special Issue on Innovative Applications and Security of Internet of Things (IoT) |