Hung-Yu Chien

Contact Address

470 University road, PuLi

NanTou

Taiwan, R.O.C.

Phone: (886) 492910960 ext. 4635

Fax: (049) 2915205

Email: hychien@ncnu.edu.tw

Sharing from my students (學生分享)

  1. NCNU IM B11 Lab 介紹 2015 06 https://youtu.be/3XfnYcfpdwI
  2. NCNU IM魚菜共生 (2min59sec) https://www.youtube.com/watch?v=CLvXDG5VaT4&feature=youtu.be
  3. 三寶機概念影片 (4min13sec) https://www.youtube.com/watch?v=SwlPXfQ2MXo&feature=youtu.be
  4. https://www.youtube.com/watch?v=SwlPXfQ2MXo
  5. 香草治療呼吸道專家系統 https://youtu.be/Ngs9hxR13Ho
  6. 顧晨生學姊分享如何兼顧專題及準備台清交研究所推甄
  7. 陳淯凡學姊分享如何兼顧專題及企研所
  8. 張以慈2017紐芬蘭交換體驗

Research topics

* Cryptography; applied cryptography; Security of Internet of Things, Application of Ontology; Innovative application of RFID, Zigbee and Raspberry Pi, Splunk

Education

1984~1988.6: bachelor, Computer Sciences, National Chung Tong University;

1988~1990.6: master, computer science and engineering, national Taiwan university;

1999~2002.6: doctoral, applied mathematics, national Chung Shing university

Work experiences

1990.7~1992.5: military service;

1992~1995.3: research assistant, telecommunication laboratory, ministry of transportation;

1995.4~1996.3: sales rep., Accton Corp.;

1996.8~2002.7: lecture, NanKai college;

1997.8~1999.1: director of computer center at Nan-Kei college;

2002.8~2003.7: associate professor, NanKei college;

2003.8~2006.7: associate professor, department of information management, ChaoYang university of technology;

2006.8~2008.7: associate professor, department of information management, national Chi Nan university;

2006, guest editor, Communications of the CCISA, Vol. 12, No. 4, October 2006.

2008.8~ : professor, department of information management, national Chi Nan university;

2008.9~2011.07 :  head of department of information management, national Chi Nan university;

2011.08~2012.07: visiting scholar at University of California, Davis, the USA; hosted by Prof. Shyhtsun Felix Wu.

Director member of the 6th council of Chinese Cryptography and Information Security Association.

2011~. Editor, ISRN Communications and Networking, Hindawi Publishing Corporation.

2012~. International Editor, International Journal of Information Security Science, ISSN:2147-0030, publisher: GAZI UNIVERSITY, Turkey.

Honor

2002, the 3rd place of the best research, College of Science, NCHU. 2004, 2005, honorable mention for research, CYUT.

2007, Best paper, The 2007 IFIP International Conference on Embedded and Ubiquitous Computing,

2009, Research quality award, NCNU.

2010, Best paper, The 5th Joint Workshop on Information Security (JWIS) 2010.

2011, 2012, 2013, research quality award, NSC.  

2012, the winner of the most cited paper award, NCNU.

2013, the winner of the quality award of the research project team, NSC.

2015, the winner of the most cited paper award, NCNU.

Private interests:

Bonsai, wood work, hiking, biking, tennis, fishing, traveling, farming …

Projects

1.        “the study of smart card-based security applications”, NanKei college(NKC-90-05-02),2001/8 -- 2002/7, $113,000.

2.        “the study of partially blind signatures”, National Science Council, NSC91-2626-E-252-002-,2002/8 -- 2003/7, $129,600.

3.        “the study of applied cryptography”, NanKei college, BD1301-14-16, 2002/8 -- 2003/7.

4.        "The authentication of ATM and public terminals", National Science Council (NSC92-2213-E-252-007 or NSC92-2213-E-324-036), 2003/8 -- 2004/7. $338,100.

5.        “Sub-project of 93 year self-assessment- security of wireless campus”, ChaoYang university of technology, A014, 2005/2 -- 2005/7, $580,000.

6.        “sub-project of 94, 95 year E-Life -  GCA smart campus”, 4636, 4637, 1st year $2,441,000,2nd year $2,325,000.

7.        “a study of ID-based cross-domain key agreement and signatures from pairings in multi-TA environments”, NSC 94 - 2213 - E - 324 – 027.

8.        “The study of secure Internet Open Trading protocol (IOTP) and B2B applications (NSC94-2213-E-126-008), 940801~960731, 1st year $473,000, 2nd year $483,000.

9.        “development of training courses for on-line learning cryptography”, ministry of education, (台顧字第0940105850號), $464,000.

10.         “developing a secure and fair trading platform for digital right management “, NSC95-2221-E-005-045-MY2), 950801~970731, 1st year $391,000, 2nd year $511,000.

11.         “the study of fair and non-repudiated mobile commerce system”, (NSC 95-2221-E-324-025, 950801~960731, $511,000.

12.        “the study of secure tripartite key agreement resistant to insider attacks”, NSC 95-2221-E-260 -050 -MY2.

13.         “incubation of security research in NCNU”, T9710000058, T9710000057, $800,000.

14.        “Selectively Convertible Authenticated Encryption in The Random Oracle Model and Its applications to E-tender systems”, NSC 97 - 2221 - E - 260 - 008 - MY2.

15.        九十八學年度無線射頻辨識與企業資源規劃(RFID & ERP)就業學程計畫, 職訓局

16.        九十八學年度國科會補助台奧雙邊合作研討會[整合 RFID 網路之安全, Security in the Internet of Things]

17.        共同主持人:簡宏宇, 九十八學年度國科會補助[教育單位網站應用程式弱點監測平台計畫]

18.        參與 技轉單位:成功大學資通安全研究與教學單位, 接受技轉單位:優仕達資訊股份有限公司, [如何設計及評估安全防偽系統之技術移轉].

19.         國立暨南國際大學98年度學術交流出國計畫[日本會津大學暑期參訪計畫], 尹邦嚴、簡宏宇、 阮夙姿.

20.        協同計畫主持人, 國科會整合型計畫 [具隱私協商與風險管理之聯合服務架構計畫], 98.10~99.7

21.        計畫主持人, [文化創意產業營運模式研究與交易市集建置計畫]

22. Integrated project “the study of federated services for NFC-based platform”- sub-project “the study of un-traceable light-weight authentication”2010.8~2013.7, NSC project.

23. “The study of social informatics and security”, visiting scholar of UCD (University of California at Davis), the US. 2011.08~2012.07, NSC project.

24. “The study and implementation of un-traceable RFID authentication and ownership transfer in distributed environments”, 2013.08~2015.10.

Publications

() International Journals 

1. Jan, J. K., Tseng, Y. M. and Chien, H. Y., “ A Threshold Signature Scheme Withstanding the Conspiracy Attack”, Communications of the Institute of Information and Computing Machinery, Taiwan, Vol.2, No.3, Sept. 1999, PP.31-38 (1999)

  1. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “An Impersonation Attack on Tan-Zhu’s Remote Login Scheme”, Electronics Letters, United Kingdom, Vol.36, No.14, July 2000, PP.1202-1203 (2000). [SCI]
  2. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “Comment on Security of Digital Signature with One-time Pair of Keys”, Electronics Letters, United Kingdom, Vol.36, No.16, 2000, PP.1374-1375 (2000). [SCI]
  3. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “A Practical (t,n) Multi-Secret Sharing Scheme”, IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Japan, Vol.E83-A, No.12, Dec. 2000, PP.2762-2765 (2000) . [SCI]
  4. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “A Modified Remote Login Authentication Scheme based on Geometric Approach”, The Journal of Systems and Software, U.S.A. Vol.55, Jan. 2001, PP.287-290. (2001) [SCI]
  5. Chien, H. Y., Chen, Y. H., Jan, J. K. and Tseng, Y. M. ”Cryptanalysis on dynamic authentication protocol for personal communication system”, Electronics Letters, United Kingdom, Vol.37, No.14, July 2001, PP.895-896. (2001) [SCI]
  6. Chien, H. Y., Wu, T. C., Jan, J. K. and Tseng, Y. M. ”Cryptanalysis of Chang-Wu’s Group-oriented Authentication and Key Exchange Protocols”, Information Processing Letters, Amsterdam, Vol.80, No.2, Oct. 2001,PP. 113-117. (2001) [SCI]
  7. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “On the Security Methods for Protecting Password Transmission”, International Journal of Informatics, U.S.A. Vol.12, No.3, PP.469-476. (2001) [SCI] .
  8. Chien, H.Y., and Jan, J.K. “An efficient secure broadcasting in a hierarchical tree”, Journal of Computer, vol. 14, no. 3-4, pp. 6-11 (Dec. 2002).
  9. Chien, H.Y., “Cryptanalysis on Lin-Wu’s Convertible Group Signature”, Journal of Computer, , vol. 14, no. 3-4, pp. 12-15 (Dec 2002).
  10. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “On the Security of Generalization of Threshold Signature and Authenticated Encryption”, IEICE Trans. On Fundamentals of Electronics, Communications of Computer Sciences, Japan, Vol. 84 , No. 10, PP. 2606~2609  (2001). [SCI]
  11. Chien, H. Y., Jan, J. K. and Tseng, Y. M. ”An unified approach to secret sharing schemes with low distribution cost”, Journal of the Chinese Institute of Engineers, Vol. 25, No. 6, pp. 723-733 (2002). [SCI, EI]
  12. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “An Efficient and Practical Solution to Remote Authentication: Smart Card”, Computers & Security, Vol. 21, No. 4, pp. 372-375, (2002). [SCI, EI] 
  13. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Cryptanalysis on Mu-Varadharajan’s e-voting”, Applied Mathematics and Computation, vol. 139, no.2-3, 2003, pp. 525-530. [SCI]
  14. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Forgery attacks on multi-signature schemes for authenticating mobile code delegates”, IEEE Transactions on Vehicular Technology, IEEE Transactions on Vehicular Technology, 51(6), pp. 1669-1671. (nov., 2002) [SCI, EI]
  15. Tseng, Y.M. , Jan, J.K., and Chien, H.Y. ”Digital signature with message recovery using self-certified public keys and its variants”, Applied Mathematics and Computation, Vol. 136, No.2-3, pp. 203-214 (2002) [SCI]
  16. Chien, H. Y. ”New Approach to authorization and authentication in distributed environments”, Communications of the CCISA, Vol. 9  No. 3 (June 2003).
  17. Chien, H. Y., and Jan, J. K. “A hybrid authentication protocol for large mobile network”, The Journal of Systems and Software, U.S.A. Vol. 67, no. 2, 2003, pp 123-130. [SCI]
  18. Chien, H. Y., Jan, J. K. “Robust and Simple Authentication Protocol”, The Computer Journal, vol. 46, no. 2, pp.193-201, 2003 [SCI, EI]
  19. Tseng, Y. M., Jan, J. K. and Chien, H. Y.  “Authenticated encryption schemes with messages for message flows”, International Journal of Computers & Electrical Engineering, U.S.A., vol. 29, no. 1, 2003, pp. 101-109, 2003 [SCI, EI]
  20. Chien, H. Y. “Convertible authenticated encryption scheme without using conventional one-way function”, Informatica, vol. 14, no. 4, pp.445-454, 2003 [SCI] NSC91-2626-E-252-002.
  21. Chien, H.Y., Jan, J. K. ”New Hierarchical Assignment without Public-Key Cryptography”, Computers & Security, 22(6), 2003, pp. 523-526  [SCI, EI]
  22. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Partially blind threshold signature based on RSA”, Informatica, vol.14 , no.2 , pp. 155-166 (2003) [SCI]
  23. Chien, H. Y., Jan, J. K. “Improved authenticated multiple-key agreement protocol without using conventional one-way function”, Applied Mathematics and Computation, 147(2), 2004, pp. 491-497 [SCI]
  24. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Solving the invalid signer-verified signature problem and comments on Xia-You’s group signature”, Journal of Systems and Software, vol.73 , no.3, pp. 369-373 , 2004 [SCI]
  25. Chien, H.Y., “Efficient Time-Bound Hierarchical Key Assignment Scheme”, IEEE Trans. Knowledge and Data Engineering, 16(10), pp. 1301 – 1304, 2004 [SCI]
  26. Chien, H.Y., Wang, R.C., and Yang, C.C. “Note on Robust and Simple Authentication Protocol”, The Computer Journal, vol. 48, no. 1, pp. 27~ 29(2005). [SCI, EI]
  27. Chien, H.Y., “Comments on ID-based multi-signature with distinguished signing authorities”, Applied Mathematics and Computation, vol. 170, no. 2, 2005, pp 1284-1289. [SCI]
  28. Hung-Yu Chien, Ru-Yu Lin, “An improved tripartite authenticated key agreement protocol based on Weil pairing”, IJASE 2005.
  29. Hung-Yu Chien, ‘”Approaches to Web Authentication and Password Compromise Risk”, Communications of the CCISA, Vol. 11, No. 3, July 2005.
  30. Hung-Yu Chien, “Improvements on Authentication Protocols with Anonymity Using Error Correction Codes”, Journal of Computer Science and Application, 2005.
  31. Hung-Yu Chien, “Extending RSA Cryptosystems to Proxy Multi-Signature Scheme allowing Parallel Individual Signing Operation”, Journal of the Chinese Institute of Engineers, 29/3, pp. 527-532 , 2006. [SCI]
  32. Hung-Yu Chien, “ID-based Tripartite Multiple Key Agreement Protocol facilitating Computer Auditing and Transaction Refereeing”, Journal of Information Management 13(4), 2006, pp. 185~204.  NCNU [TSSCI]
  33. Chien, H. Y., “Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols”, Cryptology ePrint Archive: Report 2005/013.
  34. Chien, H.Y., “Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings”, Cryptology ePrint Archive: Report 2005/013.
  35. Chien, H. Y., “Forgery attack on digital signature scheme without using one-way hash and message redundancy”, IEEE Communication Letters 10 (5), 2006, pp. 324~325. [SCI]
  36. Jinn-Ke Jan, Hung-Yu Chien, Hung-Yi Teng, “An efficient authentication protocol with perfect anonymity for 3G/WLAN interworking”, Journal of Computers, 2006.
  37. H.-Y. Chien, R.-Y. Lin, “Improved ID-based security framework for ad hoc network”, doi:10.1016/j.adhoc.2006.07.006. [EI] Ad Hoc Networks 6(1), Jan 2008, pp. 47-60.  
  38. Hung-Yu Chien, Guest-Editor, Communications of the CCISA, Vol. 12, No. 4, October 2006.  
  39. Chien, H.Y., Chen, C. H. “Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards”, Computers Standards & Interfaces. Vol 29/2 pp. 254-259, Feb., 2007. [SCI] NSC 94 - 2213 - E - 324 - 027
  40. H.-Y. Chien, W. S. Lin, C. Y. Lin, S. C. Juan, Y. Z. Ku, S. H. Wang “Effective and Efficient Approach to Web Accounts Management and Authentication Minimizing Password Compromise Risk and Possible Loss”, Journal of Internet Technology 8(3), pp. 345-349, 2007. [EI].
  41. H. Y. Chien, and C. W. Huang, “Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements”, ACM Operating System Reviews, Volume 41, Issue 4, (July 2007), pp. 83-86. [EI].
  42. H. Y. Chien, “Comments on an Efficient ID-based Broadcast Encryption Scheme”, IEEE transactions on Broadcasting, 53 (4), pp. 809-810, Dec. 2007. [SCI] 
  43. H. Y. Chien, “SASI: A New Ultra-Lightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity”, IEEE Transactions on Dependable and Secure Computing 4(4), pp. 337-340, October, 2007. [SCI] 
  44. H. Y. Chien, Chen Wei Huang, “A Lightweight RFID Protocol using substring”, accepted and to be appear in proceedings of The 2007 IFIP International Conference on Embedded and Ubiquitous Computing, December 17 - 20, 2007 , Taipei, Taiwan, LNCS 4808, pp. 333-345, Springer. NSC 95-2221-E-260 -050 -MY2. [SCI, EI]
  45. Hung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen, “An efficient authentication protocol with anonymity for 3G/WLAN interworking”, Journal of Internet Technology 9(1), 2008, pp. 15-24. [EI].
  46. Hung-Yu Chien, “Selectively Convertible Authenticated Encryption in The Random Oracle Model”, The Computer Journal, 2008 51: 419-434; doi:10.1093/comjnl/bxm090 , Jan 17, 2008. doi:10.1093/comjnl/bxm090. [SCI, EI].
  47. Hung-Yu Chien, “Efficient and practical approach to authenticating public terminals”, International Journal of Computers and Applications, 30(3) 2008. [EI]
  48. Hung-Yu Chien, Tzu-Hang Hsu and Yuan-Liang Tang, “Fast Pre-authentication with Minimized Overhead and High Security for WLAN Handoff”, Issue 2, Volume 7, WSEAS TRANSACTIONS ON COMPUTERS, February 2008. [EI]
  49. Hung-Yu Chien, “Forging a winning bid in Mu-Varadharajan’s E-auction”, Issue 1, Volume 5, WSEAS TRANSACTIONS on BUSINESS and ECONOMICS, January 2008. [EI]
  50. Hung-Yu Chien, Ru Yu Lin, “The study of secure e-will system on the Internet”, Journal of Information Science and Engineering, 2008. [SCI] 
  51. Hung-Yu Chien and Chen-Wei Huang,“A Lightweight Authentication Protocol for Low-Cost RFID”, Journal of Signal Processing Systems. [EI].
  52. Hung-Yu Chien, Tzu-Hang Hsu, “Secure Fast WLAN Handoff Using Time-Bound Delegated Authentication“, International Journal of Communication Systems. [SCI].
  53. Hung-Yu Chien, “Practical anonymous user authentication scheme with security proof”, Computers & Security 27 (2008), pp. 216-223. [SCI, EI]
  54. Hung-Yu Chien, Tzong-Chen Wu, “Provably Secure Password-Based Three-Party Key Exchange with Optimal Message Steps“, T The Computer Journal Advance Access published on December 24, 2008, The Computer Journal 2009 52: 646-655; doi:10.1093/comjnl/bxn070. [SCI, EI].
  55. Hung-Yu Chien, Tzong-Chen Wu, “ Improving Varying-Pseudonym-Based RFID Authentication Protocols to Resist Denial-of-Service Attacks“, Journal of the Korea Institute of Information Security and Cryptology (ISSN : 1598-3986) v.18, n.6B, pp.259-269, 2008.
  56. An-Ni Shen, Song Guo, Hung Yu Chien and Minyi Guo, “ A scalable key pre-distribution mechanism for large-scale wireless sensor networks“, CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, Concurrency Computat.: Pract. Exper. (2009), DOI: 10.1002/cpe.1429.
  57. Hung-Yu Chien, Chi-Sung Laih, “ ECC-Based Lightweight Authentication Protocol with Un-traceability for Low-Cost RFIDs“, Journal of Parallel and Distributed Computing 2009, 69(10), October 2009, pp. 848-853.
  58. Hung-Yu Chien, Chia-Chuan Yang, Tzong-Chen Wu, Chin-Feng Lee, “Two RFID-based Solutions to Enhance Inpatient Medication Safety”, Journal of Medical Systems.
  59. Hung-Yu Chien, Tzong-Chen Wu, “Efficient and Scalable Key Agreement Schemes for Mobile RFID Readers and Servers”, International Journal of Innovative Computing, Information and Control (IJICIC).
  60. Hung-Yu Chien, “Secure Verifier-based Three-Party Key Exchange in The Random Oracle Model”, Journal of Information Science and Engineering, accept.
  61. Hung-Yu Chien, Chin-Feng Lee, Shih-Bin Liu, Tzong-Chen Wu, “Enhancing Convenience and Situation-Aware Intelligence of Smart Home Services Using Passive RFID and Intelligent Controls”, International Journal of Internet Protocol Technology (EI).
  62. Hung-Yu Chien, Tzong-Chen Wu, “Efficient and Scalable Key Agreement Schemes for Mobile RFID Readers and Servers”, International Journal of Innovative Computing, Information and Control (IJICIC), 2010, 6(12), pp. 5463~5472.
  63. Hung-Yu Chien, Chia-Chuan Yang, Tzong-Chen Wu, Chin-Feng Lee, “Two RFID-based Solutions to Enhance Inpatient Medication Safety”, Journal of Medical Systems, Volume 35, Issue 3 (June 2011), Page 369-375.
  64. J. L. Huang, L. Y. Yeh, H. Y. Chien, “ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-added Services in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, 60(1), 2011, pp. 248-262.
  65. Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih, “Secure Tripartite STS key Agreement Protocol in Random Oracle Model”, Journal of Information Management 2011, 18(2), pp. 215~235 . (TSSCI).
  66. Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih, “Server-less RFID Authentication and Search Protocol with Enhanced Security”, International Journal of Communication Systems. 25(3) March 2012,pp.376-385.
  67. Hung-Yu Chien, “Secure Verifier-based Three-Party Key Exchange in The Random Oracle Model”, Journal of Information Science and Engineering, Vol.27 No. 4, 1487-1501, July 2011.
  68. Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih, Chi-Sheng Chen, “On the security of Gen2-based protocols without modifying the standards”, the Journal of The Chinese Institute of Engineers, 35(4) (2012) 391-399. [SCI].
  69. Hung-Yu Chien, “Improved Anonymous Multi-Receiver Identity-Based Encryption”, 10.1093/comjnl/BXR086, The Computer Journal, 55 (4) (2012): pp. 439-446.
  70. Hung-yu Chien, Ming-kuei Yeh, Tzong-chen Wu and Chin-i Lee, “Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups”, Journal of Shanghai Jiaotong University (Science)  16 (5), 604-609, Oct 2011.
  71. Hung-Yu Chien, Tzong-Chen Wu, Ming-Kuei Yeh, “Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks”, Journal of Information Science and Engineering, (SCI) accept.
  72. Hung-Yu Chien, Chu-Sing Yang, Hung-Pin Hou, “Non-linearity Cannot Help RFID Resist to Full Disclosure Attacks and Terrorist Fraud Attack”, Article first published online: 27 JAN 2012. DOI: 10.1002/sec.410, Security and Communication Networks.
  73. Chin-I Lee, Tzong-Chen Wu, Hung-Yu Chien and Kuo-Yu Tsai. “Efficient ECC-Based Key Management Scheme for Secure Multicast in Heterogeneous Sensor Networks”.  ICIC Express Letters, 6(8), 2040-2050, Aug 2012 (EI)
  74. Hung-Yu Chien, Chin-I Lee, Tzong-Chen Wu. “Comments on IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks”, accepted Security and Communication Networks, Article first published online: 11 OCT 2012. DOI: 10.1002/sec.649.
  75. HungYu Chien, “Combining Rabin Cryptosystem and Error Correction Codes to Facilitate Anonymous Authentication with Un-traceability for Low-End Devices”, Computer Networks, (unedited version) available online: 26-AUG-2013, [SCI].
  76. HungYu Chien, “IMPROVED GENERALIZED RING SIGNATURES”, ICIC Express Letters, Part B: Applications, Volume 5, Number 1(tentative), February 2014. [EI]
  77. HungYu Chien, “Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card”, accepted by Journal of Shanghai Jiaotong University (Science). [EI]
  78. Hung-Yu Chien, Shyr-Kuen Chen, Ching-Yang Lin, Jia-Ling Yan, Wei-Chen Liao, Huan-Yi Chu, Kuan-Ju Chen, Bo-Fan Lai and Yi-Ting Chen, “Design and Implementation of Zigbee-Ontology-based Exhibit Guidance and Recommendation System”, accepted by International Journal of Distributed Sensor Networks. [SCIE]
  79. HungYu Chien, “IMPROVED GENERALIZED RING SIGNATURES”, ICIC Express Letters, Part B: Applications, Vol. 5, Issue 1, February 2014. [EI]
  80. HungYu Chien, “Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card”, Journal of Shanghai Jiaotong University (Science), August 2014, 19(4), pp 436-439. [EI]
  81. Book: Hung-Yu Chien, "Innovative Applications and Security of Internet of Things," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 717898, 1 pages, 2014. doi:10.1155/2014/717898. ISSN: 1550-1329; ISBN: 2370000145932[SCIE]
  82. Hung-Yu Chien, Tzong-Chen Wu, Chien-Lung Hsu “RFID Authentication with Un-traceability and Forward Secrecy in the Partial-Distributed-Server Model”, IEICE trans. on Information and Systems, Vol.E98-D   No.4, 2015/4/1, pp.750-759. [SCI- COMPUTER SCIENCE, INFORMATION SYSTEMS (91/99)][ Artificial Intelligence (122/154)][ Electrical and Electronic Engineering (407/635)]
  83. Hung-Yu Chien, "Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy," Mobile Information Systems, vol. 2015, Article ID 354586, 7 pages, 2015. doi:10.1155/2015/354586. [SCIE:EI, IF=0.949] http://www.hindawi.com/journals/misy/2015/354586/.
  84. Hung-Yu Chien, “A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients”, The computer Journal, 20151003 accepted, DOI 10.1093/comjnl/bxv094. [SCI][IF:0.787][44/102 2013, 61/102 2014]
  85.  Chin-I Lee and Hung-Yu Chien, "An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System," International Journal of Distributed Sensor Networks, vol. 2015, Article ID 642425, 7 pages, 2015. doi:10.1155/2015/642425.accept 20151215 [SCI].

 

() International conferences

1. Huang, J. H. and Chien, H. Y. "Optimal Connection of Interconnected Token Rings”, Proc. Telecommunication Symposium, Taiwan, pp.339-344 (1990).

3. Hung-Yu Chien et al., “An Implementation of CMIP/CMISE Conformance Test System”, International Workshop on Protocol Test System, (1994. 11).

4. Chien, H. Y. “Decision-making support for equipment management using homepage and database,” in proceedings of 1998 Asia Pacific Decision Institute Conference, Taipei, (1998.6).

5. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “A New Generalized Group-Oriented Cryptosystem Based on the Systematic Block Codes”, Proceedings of the 2000 International Computer Symposium Workshop on Cryptology and Information Security, National Chung Cheng University, Chiayi, Taiwan, , pp. 26-32 (Dec. 2000).

9. Chien, H.Y., Jan, J. K., and Tseng, Y. M. “Undeniable billing of anonymous channel services in wireless communication”, Proceedings of the Second International Conference on Parallel and Distributed Computing, Applications, Technologies (PDCAT 2001), (July 9-11, 2001).

10. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “RSA-Based Partially Blind Signature with Low Computation”, Proceedings of the 2001 International Conference on Parallel And Distributed Systems, KyongJu City, Korea, June 2001, pp. 385-389 (2001).

11. Chien, H. Y., “Forgery Attack on Xia-You’s Group Signature”, International Computer Symposium, Dec. 18~21, 2002, Hualien, Taiwan (2002).

12. Chien, H. Y., and Jan, J. K. “An integrated user authentication and access control scheme without public key cryptography”, IEEE International Carnahan Conference 2003 on Security Technology (2003)

13. Hung-Yu Chien and Che-Hao Chen “A remote authentication scheme preserving user anonymity”, The IEEE First International Workshop on Information Networking and Applications, March (INA’2005)(ISBN 0-7695-2249-1), pp. 245-248. NSC92-2213-E-324-036.

14. Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang, “New Approach to Web Account Management”, IMB2005,March 25-26, 2005. (ISBN: 9579129339) NSC92-2213-E-324-036

15. Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang ,“E-passport preventing forgery and fraud”, IMB2005,March 25-26, 2005. (ISBN: 9579129339) NSC92-2213-E-324-036

16. Chien, H. Y., “On the revocation of proxy signatures”, IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027

17. Chien, H. Y., and Lin, R. Y., “Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing”, The IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006), June 5-7, 2006 Taichung, Taiwan. NSC 94 - 2213 - E - 324 - 027

18. Chien, H. Y., “Secure Access Control Schemes for RFID Systems with Anonymity”, 2006 International Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT'06), Japan. NSC 94 - 2213 - E - 324 – 027.

19. Chien, H. Y., Lin, R. Y. “ID-Based E-Will System using Bilinear Pairings”, IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027

20. Chien, H. Y., Teng, H. Y. Teng, Chen Y. C., ” Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks”,  IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 – 027.

21. Hung-Yu Chien, “Secure E-Tender Protocol with Adaptive Privacy Protection and Adaptive Public Verifiability”, International Conference on Business and Information, July 11-13, 2007, Tokyo, Japan. NSC 95-2221-E-260 -050 -MY2.

22. Hung-Yu Chien, Yuan-Liang Tang, Ying-Lun Chen, “A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme”, in proc. of the 2007 IAENG International Conference on Communication Systems and Applications, Hong Kong, 21-23 March, 2007 NSC 95-2221-E-260 -050 -MY2.

23. Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu, “Secure Fast Pre-authentication Based on IEEE 802.11i”, in proc. of the 2007 IAENG International Conference on Communication Systems and Applications, Hong Kong, 21-23 March, 2007.  NSC 95-2221-E-260 -050 -MY2.

24. Hung-Yu Chien, “Novel verifiable multi-secret sharing scheme using bilinear pairing”, 2007 International Conference on Advanced Information Technologies (AIT2007), Taichung, Taiwan. NSC 95-2221-E-260 -050 -MY2.

25. H. Y. Chien, “New efficient user authentication scheme with user anonymity facilitating e-commerce applications”, IEEE Joint Conference on E-Commerce Technology (CEC'07) and Enterprise Computing, E-Commerce and E-Services (EEE '07), Japan, July 2007. NSC 95-2221-E-260 -050 -MY2.

26. Hung Yu Chien, Rung-Ching Chen, Annie Shen, “Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space”, The IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA2008), March 25 -28, 2008, Okinawa, Japan.  (EI)

27. H. Y. Chien, “ID-Based Key Agreement with Anonymity for Ad Hoc Network”, accepted and to be appear in proceedings of The 2007 IFIP International Conference on Embedded and Ubiquitous Computing, December 17 - 20, 2007 , Taipei, Taiwan, LNCS 4808, pp. 422-431, Springer. NSC 95-2221-E-260 -050 -MY2. [SCI, EI] [Best paper Award]

28. Hung-Yu Chien, Tzong-Chen Wu, “Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model“, Proc. IEEE ISI 2008 pre-conference workshop, Pacific Asia Workshop on Intelligence and Security Informatics, June 17-20 2008, Taiwan, LNCS 5075, pp. 69–76, 2008, Springer, Berlin.. (LNCS, EI)

29. Hung-Yu Chien, “Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance”, proc. of 2008 IEEE Asia-Pacific Services Computing Conference, IEEE APSCC 2008, December 9-12, 2008, Yilan, Taiwan. (EI).

30. Hung-Yu Chien, “Highly Efficient ID-based Ring Signature from Pairings”, proc. of 2008 IEEE Asia-Pacific Services Computing Conference, IEEE APSCC 2008, December 9-12, 2008, Yilan, Taiwan. (EI).

31. An-Ni Shen, Song Guo, Hung-Yu Chien, “ An Efficient and Scalable Key Distribution Mechanism for Hierarchical Wireless Sensor Networks“, IEEE International Workshop on Modeling, Analysis and Simulation of Sensor Networks (MASSN), Sydney, Australia, December, 2008.

32. Hung-Yu Chien, Shih-Bin Liu, “Tree-Based RFID Yoking Proof“, nswctc, vol. 1, pp.550-553, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009.

33. Hung-Yu Chien, Chieh-Shian Tu, Tzong-Chen Wu, “RFID-based, Anonymous Authentication scheme”, Ufirst-09 (International Symposium on UbiCom Frontiers - Innovative Research, Systems and Technologies in conjuction with The Sixth International Conference on Ubiquitous Intelligence and Computing (UIC09), July 13-14 , 2009, Brisbane, Australia

34. Tzong-Chen Wu, Hung-Yu Chien, “Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol“, The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP09) Sep. 12 - 14, 2009, Kyoto, Japan.

35. Chin-Feng Lee, Yu-Chang Chen, Hung-Yu Chien , Chi-Sung Laih “Anonymous RFID Yoking Protocol Using Error Correction Codes”, The 2010 Workshop on RFID Security (RFIDsec'10 Asia), Singapore, February 22-23, 2010.

36. Hung-Yu Chien*, and Ying-Lun Chen, “A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security,” 5th International Conference on Grid and Pervasive Computing GPC2010, Hualien, Taiwan, February 23, 2010.  

37. Hung-Yu Chien, Jia-Zhen Yen, Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability”, The 5th Joint Workshop on Information Security (JWIS) 2010. [Best paper award]

38. Lee C.F., Huang S. R., Chien H. Y., Lee N. Y. Two-Party and Three-Party Remote User Authentication Schemes Using Biometric Data Only For Emergency. The 2nd International Symposium on Aware Computing 2010, Tainan, Taiwan.

39. Book Title:  An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability; Author: Hung-Yu Chien

Editor: Yingjiu Li, Jianying Zhou, ISBN: 978-1-60750-484-9, IOS publisher, Published: July  2010

40. Yan-Chen Liu, Hung-Yu Chien, Yu-Chang Chen, Chu-Sing Yang, N-W Lo, “Integrated EPC Information Service Authentication using OpenID in Cross Domains”, RFIDSec Asia 2011, April 2011.

41. Hung-Yu Chien, Ming-Kuei Yeh, Tzong-Chen Wu, Chin-I Lee, “Comments on Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups”, The 2011 International Conference on Information Security & The First Cross-Straits Conference on Information Security (CSCIS 2011), HanZhou, China, April 13-15.

42. Hung-Yu Chien, Chin-I Lee, Shyr-Kuen Chen, Hung-Pin Hou, “New RFID Authentication Protocol with DOS-Attack Resistance”, IEEE ICPADS 2011 Sep 7~9, Tainan, Taiwan.

43. Hung-Yu Chien, Jia-Zhen Yen and Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability” in "Current Trends and Challenges in RFID",Edited by Cornel Turcu, ISBN 978-953-307-356-9, Published: July 20, 2011 under CC BY-NC-SA 3.0

44. Hung-Yu Chien, “Cryptanalysis on RFID Authentications Using Minimum Disclosure Approach”, The 8th Asia Joint Conference on Information Security (AsiaJCIS2013) Seoul, Korea, July 25 - 26, 2013.

45. Hung-Yu Chien, “Cryptanalysis on Generalized Ring Signatures”, Eighth International Conference on Innovative Computing, Information and Control (ICICIC2013), to be held in Kumamoto, Japan, September 14-17, 2013.

46. HungYu Chien, “Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Devices”, The Second Cross-Straits Conference on Information Security (CSCIS 2013), Kaohsiung, Taiwan, Sep. 11~13 2013.

47. Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, Hung-Yu Chien, “Efficient Anonymous Multi-receiver ID-based Encryption with Constant Decryption Cost”, ISEEE 2014, April 26~28, Japan.

48. Hung-Yu Chien, “New Gen2v2-based Mutual Authentication Schemes”, The 8th International Conference on Software Security and Reliability (SERE2014), San Francisco, US, June 30~ July 2, 2014, IEEE.

49. Teng-Yu Huang, Hung-Yu Chien, “Gen2v2-Security-and-Privacy- Features-Leveraged Application Designs”, AsiaJCIS2014, Sep 3~5, WuHan, China.

50. Hung-Yu Chien, Meng-Yuan Chiang, Yi-Ting Hsin, Chun-Pei Hung, “Efficiently tracking TANET suspicious packets and identifying the devices using Splunk”, International Computer Symposium (ICS2014), Dec 14-17, Taichung, Taiwan.

51. Hung-Yu Chien, “De-synchronization Attack on Quadratic Residues-based RFID Ownership Transfer”, Kaohsiung, Taiwan, AsiaJCIS 2015.

52. H.-Y. Chien, M.-Y. Chiang, Y.-T. Hsin, C.-P. Hung “Another Effective Approach to Detect SQL Injection and Business Intelligence Using Splunk”, International Conference on Engineering and Applied Sciences (ICEAS), July 20-22, 2015, Japan.

     

(3) bookchapter

1. Hung-Yu Chien, “The Study of RFID Authentication Protocols and Security of Some Popular RFID Tags” in the book "Development and Implementation of RFID Technology", Dr. Vedran Kordic (Editor), I-Tech Education and Publishing Kirchengasse 43/3, A-1070 Vienna, Austria, EU.

(4) Lead guest editor International Journal of Distributed Sensor Networks Special Issue on Innovative Applications and Security of Internet of Things (IoT)