|
|
資通訊安全實驗室 |
|||||
著作: 期刊論文
研討會論文 1. 周綉樺、張竣翔、蕭博駿、楊竣翔、林汶潔、劉彥呈、林作俊、吳錫聰(2021年12月)。基於區塊鏈之捐款流向追蹤系統。TANET 2021台灣際網路研討會,東海大學,台中市,台灣,December 10-12, 2021。 2. 吳錫聰,李棟村(2021年5月)。異質學習背景畢業生於大學專業課程混班授課之學習成效分析-國立宜蘭大學「電子學」為例。2021全球華人教育資訊與評估研討會(GCEIA2021),國立台中教育大學,台中市,台灣,May 22, 2021。 3. 吳錫聰,陳施和(2021年4月)。樹苺派實現物聯網安全通訊與元件鑑別。第14屆資訊教育與科技應用研討會(IETAC2021),修平科技大學,台中市,台灣,April 16, 2021。 4. 吳錫聰,吳國華(2021年4月)。以物聯網平台為基礎之身分驗證。第14屆資訊教育與科技應用研討會(IETAC2021),修平科技大學,台中市,台灣,April 16, 2021。 5. 吳錫聰,林作俊(2021年4月)。專題導向學習法與合作學習融入「密碼學」之行動研究。 第14屆資訊教育與科技應用研討會(IETAC2021),修平科技大學,台中市,台灣,April 16, 2021。 6. 吳錫聰(2021年3月)。以即時回饋系統提高學習專注力與上課效能-以大學電子學課程為例。第十六屆台灣數位學習發展研討會(TWELF2021),國立宜蘭大學,宜蘭市,台灣,March 25-26, 2021。 7. 吳錫聰、李棟村(2021年3月)。專題導向學習與合作學習於「嵌入式系統實驗」之行動研究。第十六屆台灣數位學習發展研討會(TWELF2021),國立宜蘭大學,宜蘭市,台灣,March 25-26, 2021。 8. 吳錫聰, 陳施和(2020年10月)。複合混沌為基礎之物聯網安全資料流。 TANET 2020台灣際網路研討會,
ISBN:978-986-5432-33-9, National Taiwan University, Taipei,
Taiwan, October 28-30, 2020. 9. Cho-Chin Lin, Wei-Ping Goh, Shyi-Tsong
Wu, “A Framework of Page Synchronization for Adaptable Virtual Machine Live
Migration,” The 17th IEEE International Conference on Dependable, Autonomic and
Secure Computing (DASC 2019), Fukuoka, Japan, August 5-8 2019. 10. Cho-Chin Lin, Zong-De Jian, Dong-Ye Xie, Wei-Ping Goh, Shyi-Tsong Wu, “Bounded-downtime Computation for Virtual Machine Live Migration Based on
Memory Alternation Cross Reference,” 2017 International Conference on Platform
Technology and Service, Busan, Korea, 13-15 February 2017. 11. Cho-Chin Lin, Yuan-Han Kuo, Dong-Ye Xie, Wei-Ping Goh and Shyi-Tsong Wu, “A Practical Model for
Analyzing Push-based Virtual Machine Live Migration,” 7th International
Conference on Cloud Computing and Big Data (CCBD
2016), Macau, China, November 16-18,
2016. 12. Shyi-Tsong
Wu*, Sheng-Kai Hsieh, Cho-Chin Lin, Tung-Tsun Lee, “A Keystream Generator Based on Coupled
Map Lattices with Counter,” Mobile
Computing 2016, Nan-Tou, Taiwan, August 23-24, 2016. 13. Shyi-Tsong
Wu*, Sheng-Kai Hsieh, Cho-Chin Lin, Tung-Tsun Lee, “A Stream Cipher based on Improved Coupled Map Lattices,” Computer
Vision Graphics, and Image Processing 2016 (CVGIP 2016), Keelung, Taiwan, August 15-17, 2016. 14. Shyi-Tsong
Wu*, Cho-Chin Lin, Tung-Tsun Lee, Sheng-Kai Hsieh, “Switching
Chaos Based Keystream Generator,” 2016
Conference on Innovation and Technology in Electronics, Signal and Communication,
Kaohsiung,
Taiwan, May 27, 2016. 15. Shyi-Tsong
Wu, Zhi-Yao Lo and Cho-Chin Lin, “An image encryption based on switching
chaos,” 2015 The Fifth National Conference on Web Intelligence and Applications
(NCWIA2015), Yi-Lan, Taiwan, July
5-6, 2015. 16. Cho-Chin Lin, Zong-De Jian
and Shyi-Tsong Wu, “Live Migration Performance Modeling for Virtual
Machines with Resizable Memory,” Springer International Publishing Switzerland 2015, Computer and Information Science, Studies in
Computational Intelligence, vol. 566, pp.87-100, ISBN 978-3-319-10509-3, 2014. 17. Shyi-Tsong Wu, Chun-Chen Liu*, Cho-Chin
Lin, “The Keystream Generator Based on Hybrid Chaos,” The 10-th Workshop on Wireless, Ad Hoc and Sensor Networks (WASN 2014), 18. Shyi-Tsong Wu, Jia-Cheng Fan*,
and Tung-Tsun Lee, “An Image Encryption Algorithm Based on Scrambling Dual Chaotic Systems,” 2010 Electronic Technology Symposium (ETS2012), 19. Shyi-Tsong Wu, Chi-Lin Ko, Hsin-Jen Wang, “Noise Immunity Improved Three-Phase
Single-Rail Logic,” 010 Electronic
Technology Symposium (ETS2012), 20. Shyi-Tsong Wu, Yu-Jing Du, Yean-Nong Yang, “FCSR Based Hybrid Keystream Generator,”
in Proceedings of the 2010 National Symposium on Telecommunications
(NST2010), Chang Gung University, Tao-Yuan, Taiwan, December 3-4, 2010. 21. Shyi-Tsong
Wu, Yu-Jing Du, Chun-Wei Chiu, Yean-Nong
Yang, “Investigation of FCSR-based
22. Shyi-Tsong Wu, Chih-Yu Shen, Sung-Shiou Shen, Hsin-Jen Wang, “Improved
Three-phase Dual-rail Pre-charge Logic for DPA Attack,” 2010 Electronic Technology
Symposium (ETS2010), 23. Shyi-Tsong Wu, Xing-Wang Shen, Yong-Jie Chang, Chun-Wei Chiu, Chih-Yu Shen, Yu-Jing Du, “The
Implementation of Elliptic Curve Cryptosystem Using MIRACL,” 2009 International United Conferences,
Fu Jen Catholic University, Taipei County, Taiwan, November 13-14, 2009. 24. Shyi-Tsong Wu, Chun-Wei Chiu, Xing-Wang
Shen, Yong-Jie Chang, Chih-Yu Shen, Yu-Jing Du, “橢圓曲線密碼系統實現技術-使用MIRACL,”
Information Education and Technological
Applications Conference 2009 (IETAC
2009)第三屆資訊教育與科技應用研討會,
Overseas Chinese University, Tainan, Taichung, November 6, 2009. (NSC
95-2815-C-197-006-E) 25. Kuo-Hsin Wu, Shyi-Tsong Wu, Hsien-Hsing Chou,
Chih-Yu Shen, “A Key-Based Multi-Mode Clock-Controlled Stream Cipher,” The 19th
Cryptology and Information Security Conference (CISC 2009) 第十九屆資訊安全會議論文集,
National Taiwan University and Technology, Taipei, Taiwan, June 3-5,
2009. (NSC 98-2219-E-011-001) 26. Shyi-Tsong Wu, Chih-Yu Shen, Kuo-Hsin Wu and Wei-Ting Chen, “三方身分鑑別金鑰協議協定,” The 10th Cyberspace2008: Cybersecurity, Cybercrime and Cyberlaw,
The 9th Conference on Information Management and New Technologies, Fu Jen
Catholic University, Taipei County, Taiwan, November 21, 2008. 27. Shyi-Tsong
Wu、Kuo-Hsin Wu、Min-Shan Cai, “User Authentication Scheme for Wireless Sensor
Network using Asymmetric Cryptosystem,” The 18th Cryptology and
Information Security Conference (CISC 2008) 第十八屆全國資訊安全會議論文集, National Dong Hwa University, Hualien,
Taiwan, May 29-30, 2008. 28. Shyi-Tsong Wu, Tung-Tsun Lee and Kuo-Hsin Wu,
“Cryptanalysis and Repair of Remote User Authentication Schemes from Bilinear
Pairings,” Cyberspace2007: Cybersecurity, Cybercrime and Cyberlaw, 29. Shyi-Tsong Wu, Jung-Hui Chiu and Bin-Chang
Chieu, “ID-based Remote Authentication with Smart Cards on Open Distributed
System from Elliptic Curve Cryptography,” 2005 IEEE International Conference
on Electro-Information Technology (eit2005), Nebraska, USA, May 22-25,
2005. 30. Shyi-Tsong Wu,
Jung-Hui Chiu and Bin-Chang Chieu, “Scalable Secure Multicasting with
Distributed Key Management from Pairings,” 2005 IEEE International
Conference on Electro-Information Technology (eit2005), 31. Shyi-Tsong Wu, Jung-Hui Chiu and Bin-Chang
Chieu, “Anonymous Protocol in Wireless Communications from Pairings,” The 11th Mobile Computing Workshop, Chang Gung
University, Tao-Yuan, Taiwan, pp.381-389, March 31, 2005. 32. Shyi-Tsong Wu,
Jung-Hui Chiu and Bin-Chang Chieu, “Pairings Based Key Agreement for Peer Group
Communication,” 2003 International Conference on Informatics, Cybernetics and
Systems, 33. Shyi-Tsong Wu,
Bin-Chang Chieu and Jung-Hui Chiu, “A Smart Card Based User Friendly
Remote Authentication Scheme,” 2003 Workshop on Consumer Electronics, 34. Shyi-Tsong Wu,
Bin-Chang Chieu and Jung-Hui Chiu, “An Efficient Secure Multicasting
Based on Elliptic Curve Cryptography,” 2003 Symposium on Digital Life and
Internet Technologies, 35. Shyi-Tsong Wu and
Bin-Chang Chieu, “Remote Authentication Scheme with Elliptic Curve Cryptography
on Smart Cards,” Proceedings of the 2002 Workshop on Consumer Electronics
(WCE2002), Hsinchu, Taiwan, Dec. 16, 2002, pp.210-214 36. Shyi-Tsong Wu and
Bin-Chang Chieu, “Elliptic Curve Cryptography on Remote Authentication Scheme
with Smart Cards,” Proceedings of the 2002 National Symposium on
Telecommunications (NST2002), Nantou, Taiwan, Vol. 1, Dec. 6-7, 2002, pp.
454-458 37. Shyi-Tsong Wu and
Bin-Chang Chieu, “Authenticated Encryption with Elliptic Curve Cryptography and
(t, n) Shared Verification,” 國立宜蘭技術學院追求卓越研討會, I-Lan,
Taiwan, Oct. 18, 2002, pp.61-64 38. Shyi-Tsong Wu and
Bin-Chang Chieu, “A User Friendly Implementation of Smart Card Access with
Threshold Scheme,” Proceedings of the 19th Workshop on Combinatorial
Mathematics and Computation Theory, Kaohsiung, Taiwan, March 29-30, 2002,
pp.146-151 39. Wang,Luke K., and Shyi-Tsong Wu, “A Genetic Algorithm
Approach to Optimal Robot Configuration Selections,” 第八屆全國自動化研討會, July 11-12, 1995, pp.977-984 專書、技術報告 1. Shyi-Tsong Wu, “Group Security with Elliptic Curve Cryptography,” VDM Verlag Dr. Müller, ISBN: 978-3-8364-9961-3, Germany, 2008. |