首頁
實驗室簡介
指導教授
實驗室成員
研究成果
相關連結
網站連結
精采文章
密碼學家
建議使用 IE 瀏覽器
6.0 版本以上
最佳解析度 800 x 600
       
期刊論文
收起來

01. 1. Li, J. H., Chen, T. H., and Lee, W. B., “Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication”, International Journal of Digital Crime and Forensics, Vol. 6, Issue 3, pp. 30-46, Sep. 2014. (EI)


02. Lee, W. B., Lee, C. D. and Ho, Kevin I.-J., “A HIPAA-Compliant Key Management Scheme with Revocation of Authorization,” Computer Methods and Programs in Biomedicine, Vol. 113, Issue 3, pp. 809-814, Mar. 2014. (SCI) (EI)


03. Chen, T. S., Lee, W. B., Chen, J., Kao, Y. H., and Hou, P. W., “Reversible Privacy Preserving Data Mining: A Combination of Difference Expansion and Privacy Preserving,” Journal of Supercomputing, Vol. 66, No.2 , pp. 907-917, Nov. 2013. (SCI) (EI)


04. Kao, Y. H., Chen, T. S., Lee, W. B., Chen, R. C., Huang, C. C., Lin, M. C. and Wang, Y. L., “Key Training Items Search of Manufacturing Assessment Based on TTQS and GA-SVM,” Information Technology Journal, Vol. 12, pp. 756-762, Jan. 2013.(EI)


05. C Qina, C-C Chang, W-B Lee, X P Zhang, A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing, Imaging Science Journal, Vol. 61, No.6, p.p. 509-517, Jul. 2013


06. Tsaur, W. J., Li, J. H., and Lee, W. B., “An efficient and secure multi-server authentication scheme with key agreement,” Journal of Systems and Software, vol. 85, no. 4, pp. 876-882, 2012. (SCI) (EI)


07. Chen, H. B., Lai, Y. H., Chen, K. W., and Lee, W. B., “Enhanced Delegation-based Authentication Protocol for Secure Roaming Service with Synchronization,” Journal of Electronic Science and Technology, Vol. 9, No. 4, pp. 345-351, Dec. 2011. (EI)


08. Lee, W. B., Huang, C. C., and Lin, C. C., “A Photo Certificate - A Framework for Generating Visualized Public Key Certificates,” Journal of Electronic Science and Technology, Vol. 9, No. 4, pp. 339-344, Dec. 2011. (EI)


09. 李維斌、王履梅、蕭尚文、陳星百、朱琇伶,“校園網站品質評鑑方法之研究,” 理工研究國際期刊,Vol.1, No. 1, pp. 31-39, Apr. 2011.


10. Li, J. H., Lee, W. B., Ye, D., Liu, T. J., and Qin, C., “Adaptive Secret Sharing for Color Images,” International Journal of Computational Intelligence Systems, Vol.4, No. 5, pp. 797-805, Sep. 2011. (SCI) (EI) [FRANCE] (2009IF: 0.312)


11. Lee, C. D., Ho, Kevin I. J., and Lee, W. B., “A Novel Key Management Solution for Reinforcing Compliance with HIPAA Privacy/Security Regulations,” IEEE Transactions on Information Technology on Biomedicine, Vol. 15, No. 4, pp. 550-556, Jul. 2011. (SCI) (EI) [US] (2010IF: 1.707)


12. Li, J. H., Qin, C., and Lee, W. B., “On the Security of the Steganographic Method Based upon JPEG and Particle Swarm Optimization Algorithm,” ICIC Express Letters. (EI) (accepted)


13. Ho, Kevin I. J., Liao, C. W., and Lee, W. B.*, “IC-Lock Approach: a Key Management Solution for Outsourced Database,” International Journal of Innovative Computing, Information and Control [INT J INNOV COMPUT I (IJICIC)], Vol. 7, No. 5, May 2011. (SCI) (EI) [JAPAN] (2010IF: 1.664)


14. Chen, H. B., Lee, W. B.*, Ho, Kevin I. J., and Yeh, C. K., “A Secure and Cost-Effective Content Protection Scheme for DRM Systems,” Journal of Computational Information Systems, Vol. 6, No. 5, pp. 1377-1386, 2010. (EI) [USA]


15. Lee, W. B., Li, J. H., Chen, S. C., and Chen, T. H., “An Authenticated Secure Image Hiding Scheme,” The Imaging Science Journal, Vol. 57, No. 2, Apr. 2009, pp. 109-117. (SCI) [ENGLAND]


16. Lin, R. D., Chen, T. H., Huang, C. C., Lee, W. B., and Chen, W. S., “A Secure Image Authentication Scheme with Tampering Proof and Remedy Based on Hamming Code,” International Journal of Innovative Computing, Information and Control [INT J INNOV COMPUT I (IJICIC)], Vol. 5, No. 9, Sep. 2009, pp. 2603-2617. (SCI) (EI) [JAPAN]


17. Chen, T. H., Yeh, S. C., Liao, K. C., and Lee, W. B., “Practical and Efficient Electronic Checkbook,” Journal of Organizational Computing and Electronic Commerce, Vol. 19, No. 4, Oct. 2009, pp. 285-293. (SCI) [US]


18. Chen, H. B., Chen, T. H., Chang, C. K., and Lee, W. B., “A New E-Coupon System with Security and Efficiency in Mobile Commerce,” Journal of Computational Information Systems, Vol. 5, No. 4, pp. 1059-1065, 2009. (EI)


19. Chen, T. H., Lee, W. B., and Chen, H. B., “A Self-Verification Authentication Mechanism for Mobile Satellite Communication Systems,” Computers & Electrical Engineering, Vol. 35, No. 1, Jan. 2009, pp. 41-48. (SCI) (EI) [ENGLAND]


20. Liao, C. W. and Lee, W. B., “Key Management for Encrypted Storage on a Grid,” Journal of the Chinese Institute of Engineers, Vol. 31, No. 7, Nov. 2008, pp. 1141-1150. (SCI) (EI) [TAIWAN]


21. Wu, C. C., Lee, W. B., and Tsaur, W. J., “A Secure Authentication Scheme with Anonymity for Wireless Communications,” IEEE Communications Letters, Vol. 12, No. 10, Oct. 2008, pp. 722-723. (SCI) (EI) [US]


22. 蘇勝君、李維斌、陳超、王朔中,“利用範本建構語法模版生成仿自然語言隱藏文本,” 電子與信息學報,Vol. 30, No. 8, Aug. 2008, pp. 1936-1939. (EI)


23. Chen, H. B. and Lee, W. B., “Efficient and Portable Digital Rights Management for Preserving User Privacy Using Smart Cards,” Journal of Computers, the special issue "E-Commerce Security and Applications", Vol. 19, No. 1, Apr. 2008, pp. 3-12.


24. Chen, T. H., Lee, W. B., and Chen, H. B., “A Round- and Computation-Efficient Three-Party Authenticated Key Exchange Protocol,” Journal of Systems and Software, Vol. 81, No. 9, Sep. 2008, pp. 1581-1590. (SCI) (EI) [US]()


25. Chen, H. B., Chen, T. H., Lee, W. B., and Chang, C. C., “Security Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks,” Computer Standards & Interfaces, Vol. 30, No. 1-2, Jan. 2008, pp. 95-99. (SCI) (EI) [NETHERLANDS]


26. Lee, W. B. and Lee, C. D., “A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations,” IEEE Transactions on Information Technology in Biomedicine, Vol. 12, No. 1, Jan. 2008, pp. 34-41. (SCI) (EI) [US] (2008IF: 1.939)


27. Chen, T. H. and Lee, W. B., “A New Method for Using Hash Functions to Solve Remote User Authentication,” Computers & Electrical Engineering, Vol. 34, No. 1, Jan. 2008, pp. 53-62. (SCI) (EI) [ENGLAND]


28. Lee, W. B. and Yeh, C. K., “A Self-Concealing Mechanism for Authentication on Portable Communication Systems,” International Journal of Network Security, Vol. 6, No. 3, May 2008, pp. 285-290.


29. Chen, H. B., Chen, T. H., Lee, W. B., and Lin, R. D., “Security Analysis of a Password-Based Simple Three-Party Key Exchange Protocol,” WSEAS Transactions on Information Science and Applications, Vol. 4, No. 10, Oct. 2007, pp. 1371-1377. (EI)


30. Lee, W. B., Wu, W. J., and Chang C. Y., “A Portable DRM Scheme Using Smart Cards,” Journal of Organizational Computing and Electronic Commerce, Vol. 17, No. 3, pp. 247-258, 2007. (SCI) [US]


31. Lee, W. B., Wu, C. C., and Tsaur, W. J, “A Novel Deniable Authentication Protocol Using Generalized ElGamal Signature Scheme,” Information Sciences, Vol. 177, No. 6, Mar. 2007, pp. 1376-1381. (SCI)(EI)


32. Yeh, C. K. and Lee, W. B., “A Dual-Purpose Signature for Authentication on UMTS,” Journal of the Chinese Institute of Engineers, Vol. 30, No. 2, Mar. 2007, pp. 343-347. (SCI) (EI)


33. Lee, W. B., Chen, T. H., Lo, J. W., and Chang, C. Y., “An Efficient Group Signature Based on PSS-R,” WSEAS Transactions on Information Science and Applications, Vol. 3, No. 10, Oct. 2006, pp. 1804-1809. (EI)


34. Liao, K. C., Lee, W. B., and Liao, C. W., “Security of Fragile Watermarking Scheme for Image Authentication,” Imaging Science Journal, Vol. 54, No.3, Sep. 2006, pp. 129-133. (SCI)


35. Lee, W. B., Chen, T. H., and Lee, C. C., “Security of a New Algorithm for Image Cryptosystems,” Imaging Science Journal, Vol. 54, No. 3, Sep. 2006, pp. 178-187. (SCI)


36. Lee, W. B. and Liao, K. C., “Improved Self-Certified Group-Oriented Cryptosystem without a Combiner,” Journal of Systems and Software, Vol. 79, No. 4, Apr. 2006, pp 502-506. (SCI)(EI)


37. Tsaur, W. J., Wu, C. C., and Lee, W. B., “An Enhanced User Authentication Scheme for Multi-Server Internet Services,” Applied Mathematics and Computation, Vol. 170, No. 1, Nov. 2005, pp. 258-266. (SCI)(EI)


38. Chen, T. H., Lee, W. B., and Horng, G., “Remarks on Some Signature Schemes Based on Factoring and Discrete Logarithms,” Applied Mathematics and Computation, Vol. 169, No. 2, Oct. 2005, pp. 1070-1075. (SCI)(EI)


39. Chen, T. H., Horng, G., and Lee, W. B., “A Publicly Verifiable Copyright-Proving Scheme Resistant to Malicious Attacks,” IEEE Transactions on Industrial Electronics, Vol. 52, No. 1, Feb. 2005, pp. 327-334. (SCI)(EI)


40. Lee, W. B. and Yeh, C. K., “A New Delegation-Based Authentication Protocol for Use in Portable Communication Systems,” IEEE Transactions on Wireless Communications, Vol. 4, No.1, Jan. 2005, pp. 57-64. (SCI)(EI)


41. Lee, W. B. and Liao, K. C., “Constructing Identity-Based Cryptosystems for Discrete Logarithm Based Cryptosystems,” Journal of Network and Computer Applications, Vol. 27, No. 4, Nov. 2004, pp. 191-199. (SCI)(EI)


42. Chen, T. H., Lee, W. B., and Horng, G., “Secure SAS-Like Password Authentication Schemes,” Computer Standards and Interfaces, Vol. 27, No. 1, Nov. 2004, pp. 25-31. (SCI) (EI)


43. Tsaur, W. J., Wu, C.C., and Lee, W. B., “A Smart Card-Based Remote Scheme for Password Authentication in Multi-Server Internet Services,” Computer Standards and Interfaces, Vol. 27, No. 1, Nov. 2004, pp. 39-51. (SCI)(EI)


44. Chen, T. H. and Lee, W. B., “A Variance-Based Public Verifiable Copyright-Protection Scheme Surviving Intentional Attacks,” Imaging Science Journal, Vol. 51, No. 1, 2003, pp. 1-12. (SCI)


45. Lee, W. B. and Chen, T. H., “Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms,” Information & Security, Vol. 12, No. 2, 2003, pp. 250-258.


46. Lee, W. B. and Liao, K. C., “Security Enhancement for Some Modified Authenticated Key Agreement Protocols,” Journal of Computers, Vol. 14, No. 34, Dec. 2002, pp. 41-51.


47. Lee, W.B. and Chen, T. H., “A Public Verifiable Copy Protection Technique for Still Images,” Journal of Systems and Software, Vol. 62, No. 3, Jun. 2002, pp. 195-204. (SCI)(EI)


48. Lee, W. B. and Chang, C. C., “User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks,” Computer Systems Science and Engineering, Vol. 15, No. 4, Jul. 2000, pp. 113-116. (SCI)(EI)


49. Lee, W. B. and Chang, C. C., “(t, n) Threshold Digital Signature with Traceability Property,” Journal of Information Science and Engineering, Vol. 15, No. 5, Sep. 1999, pp. 669-678. (SCI)(EI)


50. Chang, C. C. and Hwang, P. C., and Lee, W. B., “Conference Key Distribution Scheme for Portable Communication System,” Computer Communications, Vol. 22, No. 12, Jul. 1999, pp. 1160-1164. (SCI)(EI)


51. Hwang, R. J., Lee, W. B., and Chang, C. C., “A Concept of Designing Cheater Identification Methods for Secret Sharing,” Journal of Systems and Software, Vol. 46, Apr. 1999, pp. 7-11. (SCI)


52. Lee, W. B. and Chang, C. C., “Authenticity of Public Keys in Asymmetric Cryptosystems,” Computer Communications, Vol. 21, No. 2, 1998, pp. 195-198. (SCI)(EI)


53. Lee, W. B. and Chang, C. C., “Using RSA with Low Exponent in a Public Network,” Computer Communications, Vol. 21, 1998, pp. 284-286. (SCI)(EI)


54. Lee, W. B. and Chang, C. C., “A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problems,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, 1998, pp. 1733-1738. (SCI)(EI)


55. Lee, W. B. and Chang, C. C., “Efficient Group Signature Scheme Based on Discrete Logarithm,” IEE Proceedings- Computers and Digital Techniques, Vol. 145, No. 1, Jan. 1998, pp. 15-18. (SCI)(EI)


56. Lee, W. B. and Chang, C. C., “Three ID-Based Information Security Functions,” Computer Communications, Vol. 20, No. 14, Dec. 1997, pp. 1301-1307. (SCI)(EI)


57. Lee, W. B. and Chang, C. C., “Authenticated Encryption Schemes with Linkage between Message Blocks,” Information Processing Letters, Vol. 63, No. 5, Sep. 1997, pp. 247-250. (SCI)(EI)


58. Lee, W. B. and Chang, C. C., “On Key Changeable ID-Based Digital Signature Scheme,” Journal of Information Science and Engineering, Vol. 12, No. 3, Sep. 1996, pp. 381-386. (SCI)(EI)


59. Lee, W. B. and Chang, C. C., “Integrating Authentication in Public Key Distribution System,” Information Processing Letters, Vol. 57, No. 1, Jan. 1996, pp. 49-52. (SCI)(EI)


60. Lee, W. B. and Chang, C. C., “Cryptanalysis of an Improved Remote Password Authentication with Smart Card,” International Journal of Information Management and Engineering, Vol. 2, No. 1, 1996, pp. 1-5.


61. Lee, W. B. and Chang, C. C., “Comment on Digital Signature with (t, n) Shared Verification Based on Discrete Logarithms,” IEE Electronics Letters, Vol. 31, No. 3, 1995, pp. 176-177. (SCI)(EI)


62. Lee, W. B. and Chang, C. C., “Authenticated Encryption Scheme without Using a One Way Function,” IEE Electronics Letters, Vol. 31, No. 19, Sep. 1995, pp. 1656-1657. (SCI)(EI)


63. Lee, W. B., Chang, C. C., and Jan, J. K., “Cryptanalysis of a Cryptosystem Based upon Continued Fraction,” International Journal of Information and Management Sciences, Vol. 6, No.3, Sep. 1995, pp. 1-11. (EI)


64. Chang, C. C., Lee, W. B., Liao, W. Y., and Jiang, C. H., “An Identity-Based Cryptosystem Suitable for Smart Cards,” Journal of Computers, Vol. 5, No. 2, 1993, pp. 7-21.


逢甲資訊安全實驗室 (FCU Information Security Lab.) 版權所有
聯絡電話:04-24517250 轉 3716