資通訊安全實驗室

簡介

專題

著作

設備

研究計畫

 

著作:

期刊論文

  1. 吳錫聰, “以混沌系統為基礎之物聯網安全資料流,” 科技與工程教育學刊, 第五十卷第一/二期, pp.49-62, ISSN: 10257578, DOI: 10.6232/JTEE, 2020.
  2. Shyi-Tsong Wu, Jung-Hui Chiu and Bin-Chang Chieu, “Anonymous Authentication for Wireless Access in Internet from Pairings,” Journal of Internet Technology, vol.10, no.1, pp. 59-64, January 2009. (SCIE, NSC 97-2219-E-001-001, NSC 97-2219-E-011-006)
  3. Shyi-Tsong Wu, Tung-Tsun Lee, “A Variation of Pairing Based Remote user Authentication Schemes with Smart Cards,” Journal of Scientific and Technological Studies, no.42, vol.2, pp.57-68, 2008.
  4. Hsin-Jen Wang, Shiow-Jyu Lin, Yean-Nong Yang, Shyi-Tsong Wu, “Security Analysis of Two Remote User Authentication Schemes Using Bilinear Pairings,” Bulletin of College of Engineering, National Ilan University, no. 4, pp. 39-52, February. 2008.
  5.  Shyi-Tsong Wu, Jung-Hui Chiu and Bin-Chang Chieu, “ID-based Remote Authentication on Open Distributed System with Smart Cards from Elliptic Curve Cryptography,” International Journal of Electrical Engineering, vol.14, no.6, pp.401-407, December 2007. (EI, NSC 95-2815-C-197-006-E)
  6.   Shyi-Tsong Wu, Jung-Hui Chiu and Bin-Chang Chieu, “Identity-based Key Agreement for Peer Group communication from Pairings,IEICE Trans. Fundamentals, vol. E88-A, no.10, pp.2762-2768, October 2005. (SCI, EI, 93-2815-C-197-005-E)
  7.   Shyi-Tsong Wu and Bin-Chang Chieu, “A Note on a User Friendly Remote Authentication Scheme with Smart Cards, IEICE Trans. Fundamentals, vol. E87-A, no.8, pp.2180-2181, August 2004. (SCI, EI)
  8.   Shyi-Tsong Wu, Bin-Chang Chieu and Jung-Hui Chiu, “A Remote Authentication Scheme with Elliptic Curve Cryptography on Smart Cards,” Journal of Ilan University, 1, pp.45-49, 2003.
  9. Shyi-Tsong Wu, “Elliptic Curve Cryptosystem on Smart Card Access with Threshold Scheme,” IEICE Trans. Fundamentals, vol. E86-A, no.10, pp.2569-2576, October 2003. (SCI, EI)
  10.  Shyi-Tsong Wu and Bin-Chang Chieu, A User Friendly Remote Authentication Scheme with Smart Cards,” Computers & Security, vol.22, no.6, pp.547-550, 2003. (SCI)
  11.  Shyi-Tsong Wu and Bin-Chang Chieu, “Threshold Scheme with Smart Card and Elliptic Curve Cryptosystem,” Journal of Ilan Institute of Technology, 9, pp.1-10, 2002.
  12. Hwai-Tsu Hu and Shyi-Tsong Wu, “A glottal-excited linear prediction (GELP) Model for low-bit-rate speech coding,” Proc. Natl. Sci. Counc. ROC(A)., 24(2), pp.134-142, 2000. (EI)

 

研討會論文

1.    周綉樺、張竣翔、蕭博駿、楊竣翔、林汶潔、劉彥呈、林作俊、吳錫聰202112月)基於區塊鏈之捐款流向追蹤系統。TANET 2021台灣際網路研討會,東海大學,台中市,台灣,December 10-12, 2021

2.    吳錫聰,李棟村(20215月)。異質學習背景畢業生於大學專業課程混班授課之學習成效分析-國立宜蘭大學「電子學」為例。2021全球華人教育資訊與評估研討會(GCEIA2021),國立台中教育大學,台中市,台灣,May 22, 2021

3.    吳錫聰,陳施和20214月)。樹苺派實現物聯網安全通訊與元件鑑別。14屆資訊教育與科技應用研討會(IETAC2021)修平科技大學,台中市,台灣,April 16, 2021

4.    吳錫聰,吳國華20214月)。以物聯網平台為基礎之身分驗證。14屆資訊教育與科技應用研討會(IETAC2021)修平科技大學,台中市,台灣,April 16, 2021

5.    吳錫聰,林作俊20214月)。專題導向學習法與合作學習融入「密碼學」之行動研究。 14屆資訊教育與科技應用研討會(IETAC2021),修平科技大學,台中市,台灣,April 16, 2021

6.    吳錫聰20213月)。以即時回饋系統提高學習專注力與上課效能-以大學電子學課程為例。第十六屆台灣數位學習發展研討會(TWELF2021),國立宜蘭大學,宜蘭市,台灣March 25-26, 2021

7.    吳錫聰、李棟村(20213月)。專題導向學習與合作學習於「嵌入式系統實驗」之行動研究。第十六屆台灣數位學習發展研討會(TWELF2021),國立宜蘭大學,宜蘭市,台灣March 25-26, 2021

8.    吳錫聰, 陳施和202010月)。複合混沌為基礎之物聯網安全資料流。 TANET 2020台灣際網路研討會, ISBN:978-986-5432-33-9, National Taiwan University, Taipei, Taiwan, October 28-30, 2020.

9.    Cho-Chin Lin, Wei-Ping Goh, Shyi-Tsong Wu, “A Framework of Page Synchronization for Adaptable Virtual Machine Live Migration,” The 17th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2019), Fukuoka, Japan, August 5-8 2019.

10.  Cho-Chin Lin, Zong-De Jian, Dong-Ye Xie, Wei-Ping Goh, Shyi-Tsong Wu, “Bounded-downtime Computation for Virtual Machine Live Migration Based on Memory Alternation Cross Reference,” 2017 International Conference on Platform Technology and Service, Busan, Korea, 13-15 February 2017.

11.  Cho-Chin Lin, Yuan-Han Kuo, Dong-Ye Xie, Wei-Ping Goh and Shyi-Tsong Wu, “A Practical Model for Analyzing Push-based Virtual Machine Live Migration,” 7th International Conference on Cloud Computing and Big Data (CCBD 2016), Macau, China, November 16-18, 2016.

12.  Shyi-Tsong Wu*, Sheng-Kai Hsieh, Cho-Chin Lin, Tung-Tsun Lee, “A Keystream Generator Based on Coupled Map Lattices with Counter,” Mobile Computing 2016, Nan-Tou, Taiwan, August 23-24, 2016.

13.  Shyi-Tsong Wu*, Sheng-Kai Hsieh, Cho-Chin Lin, Tung-Tsun Lee, A Stream Cipher based on Improved Coupled Map Lattices,” Computer Vision Graphics, and Image Processing 2016 (CVGIP 2016), Keelung, Taiwan, August 15-17, 2016.

14.  Shyi-Tsong Wu*, Cho-Chin Lin, Tung-Tsun Lee, Sheng-Kai Hsieh, “Switching Chaos Based Keystream Generator,” 2016 Conference on Innovation and Technology in Electronics, Signal and Communication, Kaohsiung, Taiwan, May 27, 2016.

15.  Shyi-Tsong Wu, Zhi-Yao Lo and Cho-Chin Lin, “An image encryption based on switching chaos,” 2015 The Fifth National Conference on Web Intelligence and Applications (NCWIA2015), Yi-Lan, Taiwan, July 5-6, 2015.

16.  Cho-Chin Lin, Zong-De Jian and Shyi-Tsong Wu, Live Migration Performance Modeling for Virtual Machines with Resizable Memory,” Springer International Publishing Switzerland 2015, Computer and Information Science, Studies in Computational Intelligence, vol. 566, pp.87-100, ISBN 978-3-319-10509-3, 2014.

17.  Shyi-Tsong Wu, Chun-Chen Liu*, Cho-Chin Lin, “The Keystream Generator Based on Hybrid Chaos,” The 10-th Workshop on Wireless, Ad Hoc and Sensor Networks (WASN 2014), Tainan, Taiwan, August 26-27, 2014.

18.  Shyi-Tsong Wu, Jia-Cheng Fan*, and Tung-Tsun Lee, “An Image Encryption Algorithm Based on Scrambling Dual Chaotic Systems,” 2010 Electronic Technology Symposium (ETS2012), Kaohsiung, Taiwan, June 1, 2012.

19.  Shyi-Tsong Wu, Chi-Lin Ko, Hsin-Jen Wang, “Noise Immunity Improved Three-Phase Single-Rail Logic,” 010 Electronic Technology Symposium (ETS2012), Kaohsiung, Taiwan, June 1, 2012.

20.  Shyi-Tsong Wu, Yu-Jing Du, Yean-Nong Yang, “FCSR Based Hybrid Keystream Generator,” in Proceedings of the 2010 National Symposium on Telecommunications (NST2010), Chang Gung University, Tao-Yuan, Taiwan, December 3-4, 2010.

21.  Shyi-Tsong Wu, Yu-Jing Du, Chun-Wei Chiu, Yean-Nong Yang, “Investigation of FCSR-based Dawson’s Summation Generator for Stream Ciphers,” 2010 Electronic Technology Symposium (ETS2010), Kaohsiung, Taiwan, June 18, 2010.

22.  Shyi-Tsong Wu, Chih-Yu Shen, Sung-Shiou Shen, Hsin-Jen Wang, “Improved Three-phase Dual-rail Pre-charge Logic for DPA Attack,” 2010 Electronic Technology Symposium (ETS2010), Kaohsiung, Taiwan, June 18, 2010.

23.  Shyi-Tsong Wu, Xing-Wang Shen, Yong-Jie Chang, Chun-Wei Chiu, Chih-Yu Shen, Yu-Jing Du, “The Implementation of Elliptic Curve Cryptosystem Using MIRACL,” 2009 International United Conferences, Fu Jen Catholic University, Taipei County, Taiwan, November 13-14, 2009.

24.  Shyi-Tsong Wu, Chun-Wei Chiu, Xing-Wang Shen, Yong-Jie Chang, Chih-Yu Shen, Yu-Jing Du, “橢圓曲線密碼系統實現技術-使用MIRACL, Information Education and Technological Applications Conference 2009 (IETAC 2009)第三屆資訊教育與科技應用研討會, Overseas Chinese University, Tainan, Taichung, November 6, 2009. (NSC 95-2815-C-197-006-E)

25.  Kuo-Hsin Wu, Shyi-Tsong Wu, Hsien-Hsing Chou, Chih-Yu Shen, “A Key-Based Multi-Mode Clock-Controlled Stream Cipher,” The 19th Cryptology and Information Security Conference (CISC 2009) 第十九屆資訊安全會議論文集,  National Taiwan University and Technology, Taipei, Taiwan, June 3-5, 2009. (NSC 98-2219-E-011-001)

26.  Shyi-Tsong Wu, Chih-Yu Shen, Kuo-Hsin Wu and Wei-Ting Chen, “三方身分鑑別金鑰協議協定,” The 10th Cyberspace2008: Cybersecurity, Cybercrime and Cyberlaw, The 9th Conference on Information Management and New Technologies, Fu Jen Catholic University, Taipei County, Taiwan, November 21, 2008.

27.  Shyi-Tsong WuKuo-Hsin WuMin-Shan Cai, “User Authentication Scheme for Wireless Sensor Network using Asymmetric Cryptosystem,” The 18th Cryptology and Information Security Conference (CISC 2008) 第十八屆全國資訊安全會議論文集,  National Dong Hwa University, Hualien, Taiwan, May 29-30, 2008.

28.  Shyi-Tsong Wu, Tung-Tsun Lee and Kuo-Hsin Wu, “Cryptanalysis and Repair of Remote User Authentication Schemes from Bilinear Pairings,” Cyberspace2007: Cybersecurity, Cybercrime and Cyberlaw, National Taiwan University, Taipei, Taiwan, November 30, 2007.

29.  Shyi-Tsong Wu, Jung-Hui Chiu and Bin-Chang Chieu, “ID-based Remote Authentication with Smart Cards on Open Distributed System from Elliptic Curve Cryptography,” 2005 IEEE International Conference on Electro-Information Technology (eit2005), Nebraska, USA, May 22-25, 2005.

30.  Shyi-Tsong Wu, Jung-Hui Chiu and Bin-Chang Chieu, “Scalable Secure Multicasting with Distributed Key Management from Pairings,” 2005 IEEE International Conference on Electro-Information Technology (eit2005), Nebraska, USA, May 22-25, 2005.

31.  Shyi-Tsong Wu, Jung-Hui Chiu and Bin-Chang Chieu, “Anonymous Protocol in Wireless Communications from Pairings,” The 11th Mobile Computing Workshop, Chang Gung University, Tao-Yuan, Taiwan, pp.381-389, March 31, 2005.

32.  Shyi-Tsong Wu, Jung-Hui Chiu and Bin-Chang Chieu, “Pairings Based Key Agreement for Peer Group Communication,” 2003 International Conference on Informatics, Cybernetics and Systems, Kaohsiung, Taiwan, December 15-16, 2003

33.  Shyi-Tsong Wu, Bin-Chang Chieu and Jung-Hui Chiu, “A Smart Card Based User Friendly Remote Authentication Scheme,” 2003 Workshop on Consumer Electronics, Tainan, Taiwan, November 27-28, 2003

34.  Shyi-Tsong Wu, Bin-Chang Chieu and Jung-Hui Chiu, “An Efficient Secure Multicasting Based on Elliptic Curve Cryptography,” 2003 Symposium on Digital Life and Internet Technologies, Tainan, Taiwan, September 18-19, 2003

35.  Shyi-Tsong Wu and Bin-Chang Chieu, “Remote Authentication Scheme with Elliptic Curve Cryptography on Smart Cards,” Proceedings of the 2002 Workshop on Consumer Electronics (WCE2002), Hsinchu, Taiwan, Dec. 16, 2002, pp.210-214

36.  Shyi-Tsong Wu and Bin-Chang Chieu, “Elliptic Curve Cryptography on Remote Authentication Scheme with Smart Cards,” Proceedings of the 2002 National Symposium on Telecommunications (NST2002), Nantou, Taiwan, Vol. 1, Dec. 6-7, 2002, pp. 454-458

37.  Shyi-Tsong Wu and Bin-Chang Chieu, “Authenticated Encryption with Elliptic Curve Cryptography and (t, n) Shared Verification,” 國立宜蘭技術學院追求卓越研討會, I-Lan, Taiwan, Oct. 18, 2002, pp.61-64

38.  Shyi-Tsong Wu and Bin-Chang Chieu, “A User Friendly Implementation of Smart Card Access with Threshold Scheme,” Proceedings of the 19th Workshop on Combinatorial Mathematics and Computation Theory, Kaohsiung, Taiwan, March 29-30, 2002, pp.146-151

39.  Wang,Luke K., and Shyi-Tsong Wu, “A Genetic Algorithm Approach to Optimal Robot Configuration Selections,” 第八屆全國自動化研討會, July 11-12, 1995, pp.977-984

專書、技術報告

1.    Shyi-Tsong Wu, “Group Security with Elliptic Curve Cryptography,” VDM Verlag Dr. Müller, ISBN: 978-3-8364-9961-3, Germany, 2008.