Hung-Yu Chien

 

Hung-Yu Chien  Professor

Academic Degrees: Ph.D., National Chung Hsing University
Specialties: RFID, Security and Innovative Applications, Cryptography, Network Security, Internet of Things, Ontology Application (Tourism,Vanilla ...)
E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
 
 
 

Research and Publication

Experience
  • National Chi Nan University, Department of Information Management, Professor
  • National Chi Nan University, Department of Information Management, Asoociate Professor
  • Chaoyang University of Technology, Asoociate Professor
  • Nan Kai University of Technology, Asoociate Professor
  • Nan Kai University of Technology, Lecturer
  • Accton foreign sales
  • Directorate General of Telecommunications Assistant researcher
Honor
  • Best Paper Award: Hung-Yu Chien, Jia-Zhen Yen, Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability”, The 5th Joint Workshop on Information Security (JWIS) 2010. [Best paper award]
  • Best Paper Award: H. Y. Chien, “ID-Based Key Agreement with Anonymity for Ad Hoc Network”, accepted and to be appear in proceedings of The 2007 IFIP International Conference on Embedded and Ubiquitous Computing, December 17 - 20, 2007 , Taipei, Taiwan, LNCS 4808, pp. 422-431, Springer.
  • Editor, ISRN Communications and Networking, Hindawi Publishing Corporation.
  • Visiting scholar, University California, Davis. Hosted by Prof. S. (Shyhtsun) Felix Wu. 2011.08~2012.07
  • 2011 the top 10 most cited paper in the computer journal
Journal Papers
  1. Jan, J. K., Tseng, Y. M. and Chien, H. Y., “A Threshold Signature Scheme Withstanding the Conspiracy Attack”, Communications of the Institute of Information and Computing Machinery, Taiwan, Vol.2, No.3, Sept. 1999, PP.31-38 (1999)
  2. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “An Impersonation Attack on Tan-Zhu’s Remote Login Scheme”, Electronics Letters, United Kingdom, Vol.36, No.14, July 2000, PP.1202-1203 (2000). [SCI]
  3. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “Comment on Security of Digital Signature with One-time Pair of Keys”, Electronics Letters, United Kingdom, Vol.36, No.16, 2000, PP.1374-1375 (2000). [SCI]
  4. Chien, H. Y., Jan, J. K., and Tseng, Y. M. “A Practical (t,n) Multi-Secret Sharing Scheme”, IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Japan, Vol.E83-A, No.12, Dec. 2000, PP.2762-2765 (2000) . [SCI]
  5. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “A Modified Remote Login Authentication Scheme based on Geometric Approach”, The Journal of Systems and Software, U.S.A. Vol.55, Jan. 2001, PP.287-290.
  6. Chien, H. Y., Chen, Y. H., Jan, J. K. and Tseng, Y. M. ”Cryptanalysis on dynamic authentication protocol for personal communication system”, Electronics Letters, United Kingdom, Vol.37, No.14, July 2001, PP.895-896.
  7. Chien, H. Y., Wu, T. C., Jan, J. K. and Tseng, Y. M. ”Cryptanalysis of Chang-Wu’s Group-oriented Authentication and Key Exchange Protocols”, Information Processing Letters, Amsterdam, Vol.80, No.2, Oct. 2001,PP. 113-117.
  8. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “On the Security Methods for Protecting Password Transmission”, International Journal of Informatics, U.S.A. Vol.12, No.3, PP.469-476..
  9. Chien, H.Y., and Jan, J.K. “An efficient secure broadcasting in a hierarchical tree”, Journal of Computer, vol. 14, no. 3-4, pp. 6-11 (Dec. 2002).
  10. Chien, H.Y., “Cryptanalysis on Lin-Wu’s Convertible Group Signature”, Journal of Computer, , vol. 14, no. 3-4, pp. 12-15 (Dec 2002).
  11. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “On the Security of Generalization of Threshold Signature and Authenticated Encryption”, IEICE Trans. On Fundamentals of Electronics, Communications of Computer Sciences, Japan, Vol. 84 , No. 10, PP. 2606~2609 (2001). [SCI]
  12. Chien, H. Y., Jan, J. K. and Tseng, Y. M. ”An unified approach to secret sharing schemes with low distribution cost”, Journal of the Chinese Institute of Engineers, Vol. 25, No. 6, pp. 723-733 (2002). [SCI, EI]
  13. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “An Efficient and Practical Solution to Remote Authentication: Smart Card”, Computers & Security, Vol. 21, No. 4, pp. 372-375, (2002). [SCI, EI]
  14. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Cryptanalysis on Mu-Varadharajan’s e-voting”, Applied Mathematics and Computation, vol. 139, no.2-3, 2003, pp. 525-530. [SCI]
  15. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Forgery attacks on multi-signature schemes for authenticating mobile code delegates”, IEEE Transactions on Vehicular Technology, IEEE Transactions on Vehicular Technology, 51(6), pp. 1669-1671. (nov., 2002) [SCI, EI]
  16. Tseng, Y.M. , Jan, J.K., and Chien, H.Y. ”Digital signature with message recovery using self-certified public keys and its variants”, Applied Mathematics and Computation, Vol. 136, No.2-3, pp. 203-214 (2002) [SCI]
  17. Chien, H. Y. ”New Approach to authorization and authentication in distributed environments”, Communications of the CCISA, Vol. 9 No. 3 (June 2003).
  18. Chien, H. Y., and Jan, J. K. “A hybrid authentication protocol for large mobile network”, The Journal of Systems and Software, U.S.A. Vol. 67, no. 2, 2003, pp 123-130. [SCI]
  19. Chien, H. Y., Jan, J. K. “Robust and Simple Authentication Protocol”, The Computer Journal, vol. 46, no. 2, pp.193-201, 2003 [SCI, EI]
  20. Tseng, Y. M., Jan, J. K. and Chien, H. Y. “Authenticated encryption schemes with messages for message flows”, International Journal of Computers & Electrical Engineering, U.S.A., vol. 29, no. 1, 2003, pp. 101-109, 2003 [SCI, EI]
  21. Chien, H. Y. “Convertible authenticated encryption scheme without using conventional one-way function”, Informatica, vol. 14, no. 4, pp.445-454, 2003 [SCI]
  22. Chien, H.Y., Jan, J. K. ”New Hierarchical Assignment without Public-Key Cryptography”, Computers & Security, 22(6), 2003, pp. 523-526 [SCI, EI]
  23. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Partially blind threshold signature based on RSA”, Informatica, vol.14 , no.2 , pp. 155-166 (2003) [SCI]
  24. Chien, H. Y., Jan, J. K. “Improved authenticated multiple-key agreement protocol without using conventional one-way function”, Applied Mathematics and Computation, 147(2), 2004, pp. 491-497 [SCI]
  25. Chien, H. Y., Jan, J. K. and Tseng, Y. M. “Solving the invalid signer-verified signature problem and comments on Xia-You’s group signature”, Journal of Systems and Software, vol.73 , no.3, pp. 369-373 , 2004
  26. Chien, H.Y., “Efficient Time-Bound Hierarchical Key Assignment Scheme”, IEEE Trans. Knowledge and Data Engineering, 16(10), pp. 1301 – 1304, 2004
  27. Chien, H.Y., Wang, R.C., and Yang, C.C. “Note on Robust and Simple Authentication Protocol”, The Computer Journal, vol. 48, no. 1, pp. 27~ 29(2005). [SCI, EI]
  28. Chien, H.Y., “Comments on ID-based multi-signature with distinguished signing authorities”, Applied Mathematics and Computation, vol. 170, no. 2, 2005, pp 1284-1289.
  29. Hung-Yu Chien, Ru-Yu Lin, “An improved tripartite authenticated key agreement protocol based on Weil pairing”, IJASE 2005.
  30. Hung-Yu Chien, ‘”Approaches to Web Authentication and Password Compromise Risk”, Communications of the CCISA, Vol. 11, No. 3, July 2005.
  31. Hung-Yu Chien, “Improvements on Authentication Protocols with Anonymity Using Error Correction Codes”, Journal of Computer Science and Application, 2005.
  32. Chien, H. Y., “Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols”, Cryptology ePrint Archive: Report 2005/013.
  33. Chien, H.Y., “Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings”, Cryptology ePrint Archive: Report 2005/013.
  34. Hung-Yu Chien, “Extending RSA Cryptosystems to Proxy Multi-Signature Scheme allowing Parallel Individual Signing Operation”, Journal of the Chinese Institute of Engineers, 29/3, pp. 527-532 , 2006. [SCI]
  35. Hung-Yu Chien, “ID-based Tripartite Multiple Key Agreement Protocol facilitating Computer Auditing and Transaction Refereeing”, Journal of Information Management 13(4), 2006, pp. 185~204. NCNU [TSSCI]
  36. Chien, H. Y., “Forgery attack on digital signature scheme without using one-way hash and message redundancy”, IEEE Communication Letters 10 (5), 2006, pp. 324~325. [SCI]
  37. Jinn-Ke Jan, Hung-Yu Chien, Hung-Yi Teng, “An efficient authentication protocol with perfect anonymity for 3G/WLAN interworking”, Journal of Computers, 2006.
  38. H.-Y. Chien, R.-Y. Lin, “Improved ID-based security framework for ad hoc network”, doi:10.1016/j.adhoc.2006.07.006. [EI]
  39. Hung-Yu Chien, Guest-Editor, Communications of the CCISA, Vol. 12, No. 4, October 2006.
  40. Chien, H.Y., Chen, C. H. “Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards”, Computers Standards & Interfaces. Vol 29/2 pp. 254-259, Feb., 2007. [SCI]
  41. H.-Y. Chien, W. S. Lin, C. Y. Lin, S. C. Juan, Y. Z. Ku, S. H. Wang “Effective and Efficient Approach to Web Accounts Management and Authentication Minimizing Password Compromise Risk and Possible Loss”, Journal of Internet Technology 8(3), pp. 345-349, 2007. [EI].
  42. H. Y. Chien, and C. W. Huang, “Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements”, ACM Operating System Reviews, Volume 41, Issue 4, (July 2007), pp. 83-86. [EI].
  43. H. Y. Chien, “Comments on an Efficient ID-based Broadcast Encryption Scheme”, IEEE transactions on Broadcasting, 53 (4), pp. 809-810, Dec. 2007. [SCI]
  44. H. Y. Chien, “SASI: A New Ultra-Lightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity”, IEEE Transactions on Dependable and Secure Computing 4(4), pp. 337-340, October, 2007. [SCI]
  45. H. Y. Chien, Chen Wei Huang, “A Lightweight RFID Protocol using substring”, accepted and to be appear in proceedings of The 2007 IFIP International Conference on Embedded and Ubiquitous Computing, December 17 - 20, 2007 , Taipei, Taiwan, LNCS 4808, pp. 333-345, Springer.
  46. Hung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen, “An efficient authentication protocol with anonymity for 3G/WLAN interworking”, Journal of Internet Technology 9(1), 2008, pp. 15-24. [EI]..
  47. Hung-Yu Chien, “Selectively Convertible Authenticated Encryption in The Random Oracle Model”, The Computer Journal, 2008 51: 419-434;
  48. Hung-Yu Chien, “Efficient and practical approach to authenticating public terminals”, International Journal of Computers and Applications, 30(3) 2008. [EI]
  49. Hung-Yu Chien, Tzu-Hang Hsu and Yuan-Liang Tang, “Fast Pre-authentication with Minimized Overhead and High Security for WLAN Handoff”, Issue 2, Volume 7, WSEAS TRANSACTIONS ON COMPUTERS, February 2008. [EI]
  50. Hung-Yu Chien, “Forging a winning bid in Mu-Varadharajan’s E-auction”, Issue 1, Volume 5, WSEAS TRANSACTIONS on BUSINESS and ECONOMICS, January 2008. [EI]
  51. Hung-Yu Chien, “Practical anonymous user authentication scheme with security proof”, Computers & Security 27 (2008), pp. 216-223.
  52. Hung-Yu Chien · Tzong-Chen Wu, “Improving Varying-Pseudonym-Based RFID Authentication Protocols to Resist Denial-of-Service Attacks“, Journal of the Korea Institute of Information Security and Cryptology (ISSN : 1598-3986) v.18, n.6B, pp.259-269, 2008.
  53. Hung-Yu Chien, Ru Yu Lin, “The study of secure e-will system on the Internet”, Journal of Information Science and Engineering, 25卷3期 (2009/05), 877-893.SCI]
  54. Hung-Yu Chien, Tzong-Chen Wu, “Provably Secure Password-Based Three-Party Key Exchange with Optimal Message Steps“, The Computer Journal 2009 (August) 52: 646-655; doi:10.1093/comjnl/bxn070 [1.394, 17 out of 49 Hardware & Architecture, 50 out of 116 Information Systems, 36 out of 9336 out of 93] [SCI, EI].
  55. Hung-Yu Chien, Tzu-Hang Hsu, “Secure Fast WLAN Handoff Using Time-Bound Delegated Authentication“, International Journal of Communication Systems. 2(5) (May 2009) 565-584
  56. An-Ni Shen, Song Guo, Hung Yu Chien and Minyi Guo, “A scalable key pre-distribution mechanism for large-scale wireless sensor networks“, CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, Concurrency Computat.: Pract. Exper., 21(10), (2009 July), 1373-1387,
  57. Hung-Yu Chien, Chi-Sung Laih, “ ECC-Based Lightweight Authentication Protocol with Un-traceability for Low-Cost RFIDs“, Journal of Parallel and Distributed Computing 2009, 69(10), October 2009, pp. 848-853.
  58. Hung-Yu Chien and Chen-Wei Huang,“A Lightweight Authentication Protocol for Low-Cost RFID”, Journal of Signal Processing Systems, : Volume 59, Issue 1 (April 2010), Page 95-102. [SCI, EI].
  59. Hung-Yu Chien, Chin-Feng Lee, Shih-Bin Liu, Tzong-Chen Wu, “Enhancing Convenience and Situation-Aware Intelligence of Smart Home Services Using Passive RFID and Intelligent Controls”, International Journal of Internet Protocol Technology, 2010 - Vol. 5, No.3 pp. 166 -173. DOI: 10.1504/IJIPT.2010.035387. (EI)
  60. Hung-Yu Chien, Tzong-Chen Wu, “Efficient and Scalable Key Agreement Schemes for Mobile RFID Readers and Servers”, International Journal of Innovative Computing, Information and Control (IJICIC), 2010, 6(12), pp. 5463~5472. [SCI]
  61. Hung-Yu Chien, Chia-Chuan Yang, Tzong-Chen Wu, Chin-Feng Lee, “Two RFID-based Solutions to Enhance Inpatient Medication Safety”, Journal of Medical Systems, Volume 35, Issue 3 (June 2011), Page 369-375. (SCI). DOI: 10.1007/s10916-009-9373-7Online First™ .
  62. J. L. Huang, L. Y. Yeh, H. Y. Chien, “ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-added Services in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, 60(1), 2011, pp. 248-262. (SCI)
  63. Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih, “Secure Tripartite STS key Agreement Protocol in Random Oracle Model”, Journal of Information Management 2011, 18(2), pp. 215~235 . (TSSCI).
  64. Hung-Yu Chien, “Secure Verifier-based Three-Party Key Exchange in The Random Oracle Model”, Journal of Information Science and Engineering, Vol.27 No. 4, 1487-1501, July 2011. (SCI)
  65. Hung-yu Chien, Ming-kuei Yeh, Tzong-chen Wu and Chin-i Lee, “Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups”, Journal of Shanghai Jiaotong University (Science) 16 (5), 604-609, Oct 2011. (EI)
  66. Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih, “Server-less RFID Authentication and Search Protocol with Enhanced Security”, International Journal of Communication Systems. 25(3) March 2012,pp.376-385. [SCI]
  67. Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih, Chi-Sheng Chen, “On the security of Gen2-based protocols without modifying the standards”, the Journal of The Chinese Institute of Engineers, 35(4) (2012) 391-399. [SCI].
  68. Hung-Yu Chien, “Improved Anonymous Multi-Receiver Identity-Based Encryption”, The Computer Journal, 55 (4) (2012): pp. 439-446; doi: 10.1093/comjnl/bxr086. [SCI, EI]
  69. Hung-Yu Chien, Chu-Sing Yang, Hung-Pin Hou, “Non-linearity Cannot Help RFID Resist to Full Disclosure Attacks and Terrorist Fraud Attack”, online: 27 JAN 2012, Security and Communication Networks, 2013, Dec 6(12), pp. 1490–1495. (SCI)
  70. Chin-I Lee, Tzong-Chen Wu, Hung-Yu Chien and Kuo-Yu Tsai. “Efficient ECC-Based Key Management Scheme for Secure Multicast in Heterogeneous Sensor Networks”. ICIC Express Letters, 6(8), 2040-2050, Aug 2012 (EI)
  71. Hung-Yu Chien, Chin-I Lee, Tzong-Chen Wu. “Comments on IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks”, online: 11 OCT 2012, Security and Communication Networks, 2013 Aug 6(8), pp. 993–998. [SCI]
  72. Hung-Yu Chien, Tzong-Chen Wu, Ming-Kuei Yeh, “Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks”, Journal of Information Science and Engineering, 29(2), pp. 249-265 (March 2013) [SCI]
  73. HungYu Chien, “Combining Rabin Cryptosystem and Error Correction Codes to Facilitate Anonymous Authentication with Un-traceability for Low-End Devices”, Computer Networks, 2013 Oct 57(14), pp. 2705–2717. [SCI]. (2013)
  74. Hung-Yu Chien, Shyr-Kuen Chen, Ching-Yang Lin, Jia-Ling Yan, Wei-Chen Liao, Huan-Yi Chu, Kuan-Ju Chen, Bo-Fan Lai and Yi-Ting Chen, “Design and Implementation of Zigbee-Ontology-based Exhibit Guidance and Recommendation System”, International Journal of Distributed Sensor Networks, 2013年11月8日[SCIE]
  75. HungYu Chien, “IMPROVED GENERALIZED RING SIGNATURES”, ICIC Express Letters, Part B: Applications, Volume 5, Number 1(tentative), February 2014. [EI]
  76. HungYu Chien, “Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card”, accepted by Journal of Shanghai Jiaotong University (Science). [EI]
Conference Papers
  1. Huang, J. H. and Chien, H. Y. "Optimal Connection of Interconnected Token Rings", Proc. Telecommunication Symposium, Taiwan, pp.339-344 (1990).
  2. 簡宏宇等電信研究所資訊室同仁, 「An Implementation of CMIP/CMISE Conformance Test System」, International Workshop on Protocol Test System, (1994. 11).
  3. Chien, H. Y. "Decision-making support for equipment management using homepage and database," in proceedings of 1998 Asia Pacific Decision Institute Conference, Taipei, (1998.6).
  4. Chien, H. Y., Wu, T. C., Jan, J. K., and Tseng, Y. M. "Improvements of Chang-Wu group-oriented authentication and key exchange protocol", C-210~C-214, 1999 National Computer Symposium (1999).
  5. Chien, H. Y., Jan, J. K., and Tseng, Y. M. "On the Generalized Threshold-Based Secret Sharing Schemes", Proceedings of the 10th National Security Conference, National Dung Hwa University, Hualien, Taiwan, May 2000, pp. 285-290 (2000). Cited Number: 2
  6. Tseng, Y. M., Jan, J. K. and Chien, H. Y. "Authenticated Encryption Schemes with Message Linkages for Message Flows", Proceedings of the 10th National Security Conference, National Dung Hwa University, Hualien, Taiwan, May 2000, pp.401-407 (2000).
  7. Chien, H. Y., Jan, J. K., and Tseng, Y. M. "A New Generalized Group-Oriented Cryptosystem Based on the Systematic Block Codes", Proceedings of the 2000 International Computer Symposium Workshop on Cryptology and Information Security, National Chung Cheng University, Chiayi, Taiwan, , pp. 26-32 (Dec. 2000).
  8. Chien, H.Y., Jan, J. K., and Tseng, Y. M. "Undeniable billing of anonymous channel services in wireless communication", Proceedings of the Second International Conference on Parallel and Distributed Computing, Applications, Technologies (PDCAT 2001), (July 9-11, 2001).
  9. Chien, H. Y., Jan, J. K., and Tseng, Y. M. "RSA-Based Partially Blind Signature with Low Computation", Proceedings of the 2001 International Conference on Parallel And Distributed Systems, KyongJu City, Korea, June 2001, pp. 385-389 (2001). Cited Number: 7
  10. Chien, H. Y., "Forgery Attack on Xia-You's Group Signature", International Computer Symposium, Dec. 18~21, 2002, Hualien, Taiwan (2002).
  11. Chien, H. Y., and Jan, J. K. "Improvements of integrated user authentication and access control scheme", Proceedings of the 13th International Security Conference, (2003).
  12. 詹進科、簡宏宇、陳哲鋒、陳育毅, 「嵌入圖檔的資訊隱藏方法與實作」, Proceedings of the 13th International Security Conference
  13. Chien, H. Y., and Jan, J. K. "An integrated user authentication and access control scheme without public key cryptography", IEEE International Carnahan Conference 2003 on Security Technology (2003)
  14. Chien, H.Y.: "An improved ECC-based proxy-protected signature scheme", Proceedings of the 14th International Security Conference, (2004). NSC91-2626-E-252-002
  15. Chien, H.Y. "Improved ID-based Tripartite Multiple Key Agreement Protocol from Pairings", Proceedings of the 14th International Security Conference, (2004). NSC91-2626-E-252-002
  16. Hung-Yu Chien, Ru-Yu Lin, "Security analysis of the pairing-based, authenticated encryption scheme with self-certified public key",2004IMP, 2004 12/18 NSC91-2626-E-252-002
  17. Hung-Yu Chien and Che-Hao Chen "A remote authentication scheme preserving user anonymity", The IEEE First International Workshop on Information Networking and Applications, March (INA'2005)(ISBN 0-7695-2249-1), pp. 245-248. NSC92-2213-E-324-036, Cited Number:1
  18. Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang, "New Approach to Web Account Management", IMB2005,March 25-26, 2005. (ISBN: 9579129339) NSC92-2213-E-324-036
  19. Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang ,"E-passport preventing forgery and fraud", IMB2005,March 25-26, 2005. (ISBN: 9579129339) NSC92-2213-E-324-036
  20. Hung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen, "Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks with Multiple Partially Trusted Providers", Proceedings of the 15th Information Security Conference. NSC92-2213-E-324-036
  21. Hung-Yu Chien and Ru-Yu Lin, "Cryptanalysis on Xie's Id-based key agreement", Proceedings of the 15th Information Security Conference NSC92-2213-E-324-036
  22. Hung-Yu Chien, Yien Tsang Wu, Yung-Chi Tn, Chia-Ming Liu, Wen Hung Lai, Wan-Jou Fan, "Design and implementation of highly efficient authentication protocol and E-restaurant system", Proceedings of the 15th Information Security Conference). NSC92-2213-E-324-036
  23. Chien, H. Y., "On the revocation of proxy signatures", IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027
  24. Chien, H. Y., and Lin, R. Y., "Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing", The IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006), June 5-7, 2006 Taichung, Taiwan. NSC 94 - 2213 - E - 324 - 027
  25. Chien, H. Y., "Secure Access Control Schemes for RFID Systems with Anonymity", 2006 International Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT'06), Japan. NSC 94 - 2213 - E - 324 - 027.
  26. Chien, H. Y., Lin, R. Y. "ID-Based E-Will System using Bilinear Pairings", IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027
  27. Chien, H. Y., Teng, H. Y. Teng, Chen Y. C., " Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks", IWCS2006, HongKong, June 20~22, 2006. NSC 94 - 2213 - E - 324 - 027
  28. Hung-Yu Chien, "Cryptanalysis on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings", Proceedings of the 16th Information Security Conference, 2006. NSC 94 - 2213 - E - 324 - 027
  29. Hung-Yu Chien, Hung-Yi Teng, "An efficient user identification and key distribution scheme preserving user anonymity", Proceedings of the 16th Information Security Conference, 2006. NSC 94 - 2213 - E - 324 - 027
  30. Chien, H.Y., Chen, Y. L., "A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme", CSIM IMP2006. NSC 94 - 2213 - E - 324 - 027
  31. Hung-Yu Chien, "Secure E-Tender Protocol with Adaptive Privacy Protection and Adaptive Public Verifiability", International Conference on Business and Information, July 11-13, 2007, Tokyo, Japan. NSC 95-2221-E-260 -050 -MY2
  32. Hung-Yu Chien, Yuan-Liang Tang, Ying-Lun Chen, "A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme", in proc. of the 2007 IAENG International Conference on Communication Systems and Applications, Hong Kong, 21-23 March, 2007 NSC 95-2221-E-260 -050 -MY2
  33. Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu, "Secure Fast Pre-authentication Based on IEEE 802.11i", in proc. of the 2007 IAENG International Conference on Communication Systems and Applications, Hong Kong, 21-23 March, 2007. NSC 95-2221-E-260 -050 -MY2
  34. Hung-Yu Chien, "Novel verifiable multi-secret sharing scheme using bilinear pairing", 2007 International Conference on Advanced Information Technologies (AIT2007), Taichung, Taiwan. NSC 95-2221-E-260 -050 -MY2.
  35. H. Y. Chien, "New efficient user authentication scheme with user anonymity facilitating e-commerce applications", IEEE Joint Conference on E-Commerce Technology (CEC'07) and Enterprise Computing, E-Commerce and E-Services (EEE '07), Japan, July 2007. NSC 95-2221-E-260 -050 -MY2.
  36. H. Y. Chien, C. W. Huang, "Cryptanalysis of LMAP, M2AP and LI-Wang's improvements", The 17th Information Security Conference, ChaiYi, Taiwan, May 2007. NSC 95-2221-E-260 -050 -MY2.
  37. Hung Yu Chien, Rung-Ching Chen, Annie Shen, "Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space", The IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA2008), March 25 -28, 2008, Okinawa, Japan. (EI)
  38. Hung-Yu Chien, Tzong-Chen Wu, "Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model", Proc. IEEE ISI 2008 pre-conference workshop, Pacific Asia Workshop on Intelligence and Security Informatics, June 17-20 2008, Taiwan, LNCS 5075, pp. 69-76, 2008, Springer, Berlin.. (LNCS, EI)
  39. "Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance", proc. of 2008 IEEE Asia-Pacific Services Computing Conference, IEEE APSCC 2008, December 9-12, 2008, Yilan, Taiwan. (EI).
  40. Hung-Yu Chien, "Highly Efficient ID-based Ring Signature from Pairings", proc. of 2008 IEEE Asia-Pacific Services Computing Conference, IEEE APSCC 2008, December 9-12, 2008, Yilan, Taiwan. (EI).
  41. An-Ni Shen, Song Guo, Hung-Yu Chien, “ An Efficient and Scalable Key Distribution Mechanism for Hierarchical Wireless Sensor Networks“, IEEE International Workshop on Modeling, Analysis and Simulation of Sensor Networks (MASSN), Sydney, Australia, December, 2008.
  42. Hung-Yu Chien, Shih-Bin Liu, “Tree-Based RFID Yoking Proof“, nswctc, vol. 1, pp.550-553, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009.
  43. Hung-Yu Chien, Chieh-Shian Tu, Tzong-Chen Wu, “RFID-based, Anonymous Authentication scheme”, Ufirst-09 (International Symposium on UbiCom Frontiers - Innovative Research, Systems and Technologies in conjuction with The Sixth International Conference on Ubiquitous Intelligence and Computing (UIC09), July 13-14 , 2009, Brisbane, Australia
  44. Tzong-Chen Wu, Hung-Yu Chien, “Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol“, The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP09) Sep. 12 - 14, 2009, Kyoto, Japan
  45. Chin-Feng Lee, Yu-Chang Chen, Hung-Yu Chien , Chi-Sung Laih “Anonymous RFID Yoking Protocol Using Error Correction Codes”, The 2010 Workshop on RFID Security (RFIDsec'10 Asia), Singapore, February 22-23, 2010.
  46. Hung-Yu Chien*, and Ying-Lun Chen, , Chien-Feng Lo, Yuh-Ming Huang, “A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security,” 5th International Conference on Grid and Pervasive Computing GPC2010, Hualien, Taiwan, May 10-13, 2010.
  47. Hung-Yu Chien, Jia-Zhen Yen, Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability”, The 5th Joint Workshop on Information Security (JWIS) 2010. [Best paper award]
  48. Lee C.F., Huang S. R., Chien H. Y., Lee N. Y. Two-Party and Three-Party Remote User Authentication Schemes Using Biometric Data Only For Emergency. The 2nd International Symposium on Aware Computing 2010, Tainan, Taiwan
  49. Title:  An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability, Author: Hung-Yu Chien, Editor: Yingjiu Li, Jianying Zhou, ISBN: 978-1-60750-484-9, Price: 95.00€, No. of pages: 172, Publisher: IOS出版社, Published: 2010
  50. Yan-Chen Liu, Hung-Yu Chien, Yu-Chang Chen, Chu-Sing Yang, “Integrated EPC Information Service Authentication using OpenID in Cross Domains”, RFIDSec Asia 2011, April 2011.
  51. Hung-Yu Chien, Ming-Kuei Yeh, Tzong-Chen Wu, Chin-I Lee, “Comments on Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups”, The 2011 International Conference on Information Security & The First Cross-Straits Conference on Information Security (CSCIS 2011), HanZhou, China, April 13-15.
  52. Hung-Yu Chien, Chin-I Lee, Shyr-Kuen Chen, Hung-Pin Hou, “New RFID Authentication Protocol with DOS-Attack Resistance”, IEEE ICPADS 2011 Sep 7~9, Tainan, Taiwan.
  53. Hung-Yu Chien, Jia-Zhen Yen and Tzong-Chen Wu, “An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability” in "Current Trends and Challenges in RFID",Edited by Cornel Turcu, ISBN 978-953-307-356-9, Published: July 20, 2011 under CC BY-NC-SA 3.0
  54. Hung-Yu Chien, “Cryptanalysis on RFID Authentications Using Minimum Disclosure Approach”, The 8th Asia Joint Conference on Information Security (AsiaJCIS2013) Seoul, Korea, July 25 - 26, 2013.
  55. Hung-Yu Chien, “Cryptanalysis on Generalized Ring Signatures”, Eighth International Conference on Innovative Computing, Information and Control (ICICIC2013), to be held in Kumamoto, Japan, September 14-17, 2013.
  56. HungYu Chien, “Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Devices”, The Second Cross-Straits Conference on Information Security (CSCIS 2013), Kaohsiung, Taiwan, Sep. 11~13 2013.
  57. Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, Hung-Yu Chien, “Efficient Anonymous Multi-receiver ID-based Encryption with Constant Decryption Cost”, ISEEE 2014, April 26~28, Japan.
  58. Teng-Yu Huang, Hung-Yu Chien, “Gen2v2-Security-and-Privacy- Features-Leveraged Application Designs”, AsiaJCIS2014, Sep 3~5, WuHan, China.

Other Publication

  1. Hung-Yu Chien, "The Study of RFID Authentication Protocols and Security of Some Popular RFID Tags" in the book "Development and Implementation of RFID Technology", Dr. Vedran Kordic (Editor), I-Tech Education and Publishing Kirchengasse 43/3, A-1070 Vienna, Austria, EU.
  2. Book: Hung-Yu Chien, "Innovative Applications and Security of Internet of Things," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 717898, 1 pages, 2014. doi:10.1155/2014/717898.ISSN: 1550-1329; ISBN: 2370000145932[SCIE]
 
National Chi Nan University - Information Management
Room 439, No. 470, University Rd., Puli, Nantou, Taiwan 54561 R.O.C.
886-49-2910960 #4541 or #4543