期刊論文(共計108筆) |
序號 | 學年度 | 學期 | 年度 | 月份 | 作者 | 題目 | 通訊作者 | 作者順位 | 期刊名稱 | 卷數 | 頁數 | 關鍵字 |
1 | 089 | 1 | 2001 | 1 | 李維斌, 陳宗和 | 數位影像驗證與數位簽章 | 否 | 第一順位 | 資訊安全通訊 | | | |
2 | 090 | 1 | 2002 | 1 | Wei-Bin Lee,Tzung-Her Chen | A public verifiable copy protection technique for still images | 是 | 第二順位 | The Journal of Systems and Software | | | |
3 | 091 | 1 | 2003 | 1 | Tzung-Her Chen,Wei-Bin Lee | A variance-based public verifiable copyright-protection scheme surviving intentional attacks | 否 | 第一順位 | The Imaging Science Journal | | | |
4 | 091 | 1 | 2003 | 1 | Wei-Bin Lee and Tzung-Her Chen | Constructing a proxy signature scheme based on existing security mechanisms | 是 | 第二順位 | Information & Security. An International Journal
| | | |
5 | 091 | 1 | 2003 | 1 | Gwoboa Horng and Tzung-Her Chen | An anonymous buyer-seller watermarking protocol
| 是 | 第二順位 | International Journal of Computational and Numerical Analysis and Applications | | | |
6 | 091 | 2 | 2003 | 4 | Wei-Bin Lee, Tzung-Her Chen, Chen-Chieh Lee | Improvement of an Encryption Scheme for Binary Images | 是 | 第二順位 | Pakistan Journal of Information & Technology | | | |
7 | 091 | 2 | 2003 | 7 | Tzung-Her Chen, Gwoboa Horng, Sang-Hao Wang | A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model | 否 | 第一順位 | Pakistan Journal of Applied Science
| | | |
8 | 092 | 1 | 2004 | 1 | Tzung-Her Chen, Wei-Bin Lee, and Gwoboa Horng | Secure SAS-like password authentication | 否 | 第一順位 | schemesComputer Standards and Interfaces | | | |
9 | 094 | 1 | 2005 | 10 | Tzung-Her Chen, Wei-Bin Lee, and Gwoboa Horng | Remarks on some signature schemes based on factoring and discrete logarithms | 否 | 第一順位 | Applied Mathematics and Computation , Vol. 169, Issue 1, pp. 1070-1075 | | | |
10 | 093 | 2 | 2005 | 2 | Tzung-Her Chen, Gwoboa Horng, and Wei-Bin Lee | A publicly verifiable copyright-proving scheme surviving malicious attacks | 否 | 第一順位 | IEEE Transactions on Industrial Electronics | 50 | pp.327-334 | |
11 | 093 | 2 | 2005 | 5 | Tzung-Her Chen, Gwoboa Horng, and Dushiau Tsai | An Anonymous buyer-reseller protocol | 否 | 第一順位 | Journal of The Chinese Institute of Engineers, Vol. 28, No. 3, pp. 535-538. | | | |
12 | 094 | 1 | 2006 | 1 | Tzung-Her Chen, and Du-Shiau Tsai | Owner-Customer Right Protection Mechanism using a Watermarking Scheme and a Watermarking Protocol | 否 | 第一順位 | Pattern Recognition, Vol. 39, Issue 8, pp. 1530-1541 | | | |
13 | 094 | 1 | 2006 | 1 | Tzung-Her Chen, Dushiau Tsai, and Gwoboa Horng | Secure User-friendly Remote Authentication Schemes | 否 | 第一順位 | Information & Security. An International Journal, Vol. 18, pp. 111-121 | | | |
14 | 094 | 1 | 2006 | 1 | Gwoboa Horng, Tzung-Her Chen, and Dushiau Tsai | Cheating in Visual Cryptography | 是 | 第二順位 | Designs, Codes and Cryptography, Vol. 38, No. 2, pp. 219-236 | | | |
15 | 094 | 1 | 2006 | 1 | Wei-Bin Lee, Tzung-Her Chen, Jung-Wen Lo and Chen-Yi Chang | An Efficient Group Signature Based on PSS-R | 否 | 第一順位 | WSEAS Transactions on Information Science and Applications, Vol. 3, Issue 10, pp.1804-1809
| | | |
16 | 094 | 1 | 2006 | 1 | Wei-Bin Lee, Tzung-Her Chen and Chen-Chieh Lee | Security of a new encryption algorithm for image cryptosystems | 否 | 第一順位 | The Imaging Science Journal, Vol. 54, Issue 3, pp. 178-187 | | | |
17 | 095 | 1 | 2007 | 1 | Tzung-Her Chen, Gwoboa Horng, and Ke-Chiang Wu | A secure YS-like user authentication scheme | 否 | 第一順位 | INFORMATICA | 18 | 27-36 | |
18 | 095 | 1 | 2007 | 1 | Du-Shiau Tsai, Tzung-Her Chen and Gwoboa Horng | A Cheating Prevention Scheme for Binary Visual Cryptography with Homogeneous Secret Images | 否 | 第二順位 | Pattern Recognition | | | |
19 | 096 | 1 | 2007 | 10 | Hsing-Bai Chen, Tzung-Her Chen, Wei-Bin Lee and Ren-Der Lin | Security analysis of a password-based simple three-party key exchange protocol | 否 | 第二順位 | WSEAS Transactions on Information Science and Applications | | | |
20 | 095 | 2 | 2007 | 2 | Tzung-Her Chen and Gwoboa Horng | A lightweight and anonymous copyright protection protocol | 是 | 第一順位 | Computer Standards and Interfaces | 29 | 229-237 | |
21 | 096 | 1 | 2008 | 1 | Tzung-Her Chen, Gwoboa Horng and Chuan-Sheng Yang | Public Key Authentication for Local Area Networks | 否 | 第一順位 | INFORMATICA | | | |
22 | 097 | 1 | 2008 | 10 | Tzung-Her Chen and Wei-Bin Lee | A New Method for Using Hash Functions to Solve Remote User Authentication | 否 | 第一順位 | Computers & Electrical Engineering | | | |
23 | 096 | 2 | 2008 | 2 | Dushiau Tsai, Tzung-Her Chen and Gwoboa Horng | On Generating Meaningful Shares in Visual Secret Sharing Schemes | 否 | 第二順位 | The Imaging Science Journal | | | |
24 | 096 | 2 | 2008 | 3 | Hsing-Bai Chen, Tzung-Her Chen, Wei-Bin Lee, and Chin-Chen Chang | Security Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks | 否 | 第二順位 | Computer Standards & Interfaces | | | |
25 | 096 | 2 | 2008 | 3 | 陳宗和, 蔡柏侃 | 具有篡改及復原能力之JPEG2000影像驗證方法 | 是 | 第一順位 | 中華民國資訊學會通訊 | 11 | 43-57 | |
26 | 096 | 2 | 2008 | 4 | Tzung-Her Chen, Wei-Bin Lee, and Hsing-Bai Chen | A Round- and Computation-Efficient Three-Party Authenticated Key Exchange Protocol | 否 | 第一順位 | The Journal of Systems and Software | | | |
27 | 096 | 2 | 2008 | 5 | Tzung-Her Chen, Tsung-Hao Hung, Gwoboa Horng, and Chia-Ming Chang | Multiple Watermarking Based on Visual Secret Sharing | 否 | 第一順位 | International Journal of Innovative Computing Information and Control | | | |
28 | 096 | 2 | 2008 | 7 | Tzung-Her Chen, and Chang-Sian Wu | Integrated batch encryption to still images | 是 | 第一順位 | Journal of Chung Cheng Institute of Technology | 37 | 81-88 | |
29 | 096 | 2 | 2008 | 7 | Tzung-Her Chen and Jyun-Ci Huang | A simple and secure AKE protocol with perfect forward secrecy | 否 | 第一順位 | Journal of Computational Information Systems | | | |
30 | 097 | 1 | 2009 | 1 | Chin-Chen Chang, Tzung-Her Chen, and Li-Jen Liu | Preventing cheating in computational visual cryptography | 否 | 第二順位 | Fundamenta Informaticae | | | |
31 | 097 | 1 | 2009 | 1 | Gwoboa Horng, Chien-Lung Wang, and Tzung-Her Chen | An efficient concealed data aggregation scheme for sensor networks based on secret sharing | 否 | 第三順位 | International Journal of Innovative Computing Information and Control | | | |
32 | 097 | 1 | 2009 | 1 | Tzung-Her Chen Wei-Cheng Pan and Kuang-Che Li | Batch image authentication | 是 | 第一順位 | Journal of Computer Science and Application | 5 | 141-154 | |
33 | 098 | 1 | 2009 | 10 | Tzung-Her Chen | An Authentication Protocol with Billing Non-Repudiation to Personal Communication Systems | 否 | 第一順位 | International Journal of Innovative Computing Information and Control | | | |
34 | 098 | 1 | 2009 | 11 | Tzung-Her Chen, Shu-Chen Yeh, Kuan-Chieh Liao | A practical and efficient electronic checkbook | 是 | 第一順位 | Journal of Organizational Computing and Electronic Commerce | 19 | 285-293 | |
35 | 098 | 1 | 2009 | 12 | Tzung-Her Chen, Kai-Hsiang Taso, and Yan-Ting Yang | Friendly color visual secret sharing by Random Grids | 是 | 第一順位 | Fundamenta Informaticae | 96 | 61-70 | |
36 | 097 | 2 | 2009 | 2 | Ren-Der Lin, Tzung-Her Chen, Chien-Chen Huang, Wei-Bin Lee, Wen-Shyen E. Chen | A secure image authentication scheme with tampering proof and remedy based on Hamming code | 否 | 第二順位 | International Journal of Innovative Computing Information and Control | | | |
37 | 097 | 2 | 2009 | 2 | Tzung-Her Chen, Wei-Bin Lee, and Hsing-Bai Chen | A self-verification authentication mechanism for mobile satellite communication systems | 是 | 第一順位 | Computers and Electrical Engineering | 35 | 41-48 | |
38 | 097 | 2 | 2009 | 3 | Tzung-Her Chen, Chin-Chen Chang, Chang-Sian Wu, and Der-Chyuan Lou | On the security of a copyright protection scheme based on visual cryptography | 否 | 第一順位 | Computer Standards & Interfaces | | | |
39 | 097 | 2 | 2009 | 4 | Hsing-Bai Chen, Tzung-Her Chen, Chau-Kai Chang, and Wei-Bin Lee | A Novel E-Coupon System with Security and Efficiency in Mobile Commerce | 否 | 第二順位 | Journal of Computational Information Systems | | | |
40 | 097 | 2 | 2009 | 4 | Tzung-Her Chen, Chih-Hung Wang, Tsung-Hao Hung, and Jyun-Ci Huang | Remarks on a dynamic key management scheme for user hierarchical access control | 否 | 第一順位 | Journal of Computational Information Systems | | | |
41 | 097 | 2 | 2009 | 4 | Wei-Bin Lee, Jia-Hong Li, Shih-Cheng Chen and Tzung-Her Chen | An authenticated secure image hiding scheme | 是 | 其他 | The Imaging Science Journal | 57 | 109-117 | |
42 | 098 | 1 | 2009 | 9 | Du-Shiau Tsai, Gwoboa Horng, Tzung-Her Chen, and Yao-Te Huang | A novel secret image sharing scheme for true color images with size constraint | 是 | 第三順位 | Information Sciences | 179 | 3247-3254 | |
43 | 098 | 1 | 2009 | 9 | Tzung-Her Chen and Kai-Hsiang Taso | Visual secret sharing by random grids revisited | 是 | 第一順位 | Pattern Recognition | 42 | 2203-2217 | |
44 | 098 | 1 | 2010 | 1 | Tzung-Her Chen, De-Yu Zeng, and Kai-Hsiang Tsao | Visual mult-secret sharing by circular random grids 使用圓形之隨機網格加密多重視覺機密影像 | 是 | 第一順位 | Communication of CCISA 資訊安全通訊 | 16 | 37-49 | |
45 | 098 | 1 | 2010 | 1 | Tzung-Her Chen and Yan-Ting Wu | A new protocol of wide use for e-mail with perfect forward secrecy | 是 | 第一順位 | Journal of Zhejiang University-SCIENCE C | 11 | 74-78 | |
46 | 098 | 1 | 2010 | 1 | 陳宗和, 潘偉誠 | 基於JPEG壓縮及霍夫曼編碼之批次影像加密技術 | 是 | 第一順位 | Journal of Computer Science and Application | 6 | 95-106 | |
47 | 098 | 1 | 2010 | 1 | Tzung-Her Chen and Chang-Sian Wu | Compression-unimpaired batch image encryption combining Vector Quantization and index compression | 否 | 第一順位 | Information Sciences | | | |
48 | 098 | 2 | 2010 | 3 | Tzung-Her Chen and Chun-Wei Chiu | A New Hierarchical Digital Image Authentication Method for Tamper Detection and Recovery against Microdotting Attacks | 否 | 第一順位 | Journal of Computational Information Systems | | | |
49 | 098 | 2 | 2010 | 4 | Tzung-Her Chen and Jyun-Ci Huang | A novel user-participating authentication scheme | 否 | 第一順位 | Journal of Systems and Software | | | |
50 | 098 | 2 | 2010 | 5 | Tzung-Her Chen and Yan-Ting Wu | A New Protocol of Wide Use for E-Mail with Perfect Forward Secrecy | 否 | 第一順位 | Journal of Zhejiang University-SCIENCE C | | | |
51 | 098 | 2 | 2010 | 5 | Chih-Hung Wang, Tzung-Her Chen, Chun-Wei Chiu, Shih-Yi Wei | Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment | 否 | 第二順位 | Journal of Computational Information Systems | | | |
52 | 098 | 2 | 2010 | 6 | Tzung-Her Chen | Remarks on some watermarking schemes based on DWT | 否 | 第一順位 | Journal of Computational Information Systems | | | |
53 | 098 | 2 | 2010 | 6 | Tzung-Her Chen, Tsung-Hao Hung and Yan-Ting Wu | Lightweight key management of DRM systems | 否 | 第一順位 | International Journal of Innovative Computing Information and Control | | | |
54 | 099 | 1 | 2010 | 9 | Hao-Li Wang, Tzung-Her Chen, Long-Sheng Li, Yan-Ting Wu, Jhong Chen | An Authenticated Key Exchange Protocol for Mobile Stations from Two Distinct Home Networks | 否 | 第二順位 | International Journal of Innovative Computing Information and Control | | | |
55 | 099 | 1 | 2011 | 1 | Tzung-Her Chen and Chang-Sian Wu | Efficient multi-secret image sharing based on boolean operations | 否 | 第一順位 | Signal Processing | | | |
56 | 099 | 1 | 2011 | 1 | Tzung-Her Chen, Kai-Hsiang Tsao, and Shu-Jye Chang | Generating friendly and colorful shares in color visual cryptography | 是 | 第一順位 | Communications of the CCISA | 17 | 37-47 | |
57 | 099 | 1 | 2011 | 1 | Tzung-Her Chen, Kai-Hsiang Tsao | User-friendly random grid-based visual secret sharing | 是 | 第一順位 | IEEE Transactions on Circuits and Systems for Video Technology | 21 | 1693-1703 | |
58 | 099 | 1 | 2011 | 1 | Tzung-Her Chen and Ci-Lin Li | An enhanced threshold authenticated encryption scheme with convertibility | 是 | 第一順位 | Innovative Computing Information and Control | 7 | 6177-6185 | |
59 | 099 | 1 | 2011 | 1 | Tzung-Her Chen and Kai-Hsiang Tsao | Threshold Visual Secret Sharing by Random Grids | 是 | 第一順位 | Journal of Systems and Software | 84 | 1197-1208 | |
60 | 100 | 1 | 2011 | 10 | Bing-Jian Wang, Tzung-Her Chen, *Fuh-Gwo Jeng | Security Improvement against Malicious Server’s attack for A dPEKS Scheme | 否 | 第二順位 | International Journal of Information and Education Technology | 1 | 350-353 | |
61 | 100 | 1 | 2012 | 1 | 邱俊瑋、李琪霖、陳宗和 | 具有低運算與壓縮率的H.264_AVC可知覺視訊加密之研究 | 是 | 第三順位 | Communications of the CCISA | 18 | 1-22 | |
62 | 101 | 1 | 2012 | 10 | Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Lin and Tzung-Her Chen | On the security of time-bound hierarchical key management scheme for secure broadcasting | 是 | 其他 | ICIC Express Letters | 6 | 2541-2544 | |
63 | 100 | 2 | 2012 | 2 | Tzung-Her Chen, Kai-Hsiang Tsao, and Yao-Sheng Lee | Yet Another Multiple-image encryption by rotating random grids | 是 | 第一順位 | Signal Processing | 92 | 2229-2237 | |
64 | 100 | 2 | 2012 | 3 | Tzung-Her Chen, Bing-Jian Wang, Tai-Yuan Tu, Chih-Hung Wang | A security-enhanced key agreement protocol based on chaotic maps | 是 | 第一順位 | Security and Communication Networks | 6 | 108-114 | |
65 | 100 | 2 | 2012 | 3 | Yao-Sheng Lee and Tzung-Her Chen | Insight into collusion attacks in random-gird-based visual secret sharing | 是 | 第二順位 | Signal Processing | 92 | 727-736 | |
66 | 100 | 2 | 2012 | 4 | Tzung-Her Chen and Kuang-Che Li | Multi-Image encryption by circular Random Grids | 是 | 第一順位 | Information Sciences | 189 | 255-265 | |
67 | 100 | 2 | 2012 | 4 | Tai-Yuan Tu, Chih-Hung Wang, Tzung-Her Chen | A High-Capacity Data Hiding Scheme by Vector Quantization Index with Search-Order Coding | 否 | 第三順位 | Advanced Science Letters | 9 | 822-827 | |
68 | 101 | 1 | 2012 | 8 | Tzung-Her Chen and Yao-Sheng Lee | A new random-grid-based visual secret sharing by edge enhancement | 是 | 第一順位 | Computational Information Systems | 8 | 1507-1513 | |
69 | 101 | 1 | 2012 | 9 | Chih-Yang Lin, Panyaporn Prangjarote, Li-Wei Kang, Wei-Lun Huang, *Tzung-Her Chen, | Joint Fingerprinting and Decryption with Noise-resistant for Vector Quantization Images | 是 | 其他 | Signal Processing | 92 | 2159–2171 | |
70 | 101 | 1 | 2013 | 1 | Chih-Hung Lin, Tzung-Her Chen* and Chun-Wei Chiu | Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern | 是 | 第二順位 | Displays | 34 | 59-68 | |
71 | 102 | 1 | 2013 | 12 | Tzung-Her Chen, Bing-Jian Wang, Yao-Sheng Lee | A random grid-based cyclic access structure VSS scheme for multiple secret images | 是 | 第一順位 | Displays | 34 | 380-387 | |
72 | 101 | 2 | 2013 | 3 | Yao-Sheng Lee, Bing-Jian Wang and Tzung-Her Chen* | Quality-improved threshold visual secret sharing scheme by random grids | 是 | 第一順位 | IET Image Processing | 7 | 137-143 | |
73 | 101 | 2 | 2013 | 3 | T.-H. Chen, Y.-S. Lee, W.-L. Huang, Justie Su-Tzu Juan, Y.-Y. Chen, and M.-J. Li | Quality-Adaptive Visual Secret Sharing by Random Grids | 是 | 第一順位 | Journal of Systems and Software | 86 | 1267–1274 | |
74 | 101 | 2 | 2013 | 6 | Chih-Hung Lin, Tzung-Her Chen* and Chang-Sian Wu | A Batch image encryption scheme based on chaining random grids | 是 | 第二順位 | Scientia Iranica | 20 | 670-681 | |
75 | 103 | 1 | 2014 | 10 | Chih-Hung Lin, Yan-Ting Wu; Kai-Hsiang Tsao; Kai-Siang Lin, Tzung-Her Chen | Multi-factor Cheating Prevention in Visual Secret Sharing by Hybrid Codebooks | 是 | 其他 | Journal of Visual Communication and Image Representation | 25 | 1543–1557 | |
76 | 103 | 1 | 2014 | 11 | Ci-Lin Li, Chih-Yang Lin and Tzung-Her Chen | Efficient compression-jointed quality controllable scrambling method for H.264/SVC | 是 | 第三順位 | International Journal of Network Security | 16 | 541-548 | |
77 | 103 | 1 | 2014 | 12 | Kai-Siang Lin, Chih-Hung Lin, Tzung-Her Chen | Distortionless visual multi-secret sharing based on random grid | 是 | 第三順位 | Information Sciences | 288 | 330–346 | |
78 | 103 | 1 | 2014 | 12 | Tzung-Her Chen, Sheng-Shiang Chang | Image encryption on HDR images for OpenEXR format | 是 | 第一順位 | International Journal of Science and Engineering | 4 | 19-23 | |
79 | 103 | 1 | 2014 | 8 | Fuh-Gwo Jeng, Kai-Siang Lin, Chih-Hung Lin, and Tzung-Her Chen | Visual multi-secret sharing with friendliness | 是 | 其他 | Journal of Shanghai Jiaotong University (Science) | 19 | 445-465 | |
80 | 103 | 1 | 2014 | 9 | Jia-Hong Li, Tzung-Her Chen, and Wei-Bin Lee | Tattooing Attack - A New Type of Watermarking Attacks on Image Authentication | 否 | 第二順位 | International Journal of Digital Crime and Forensics | 6 | 36-40 | |
81 | 104 | 1 | 2015 | 10 | Kai-Hsiang Tsao, Shyong Jian Shyu, Chih-Hung Lin, Yao Sheng Lee and Tzung-Her Chen | Visual Multiple-Secret Sharing for Flexible General Access Structure by Random Grids | 是 | 其他 | Display | 39 | pp. 80-92 | |
82 | 104 | 1 | 2015 | 11 | Chih-Hung Lin, Yao-Sheng Lee and Tzung-Her Chen | Friendly progressive random-grid-based visual secret sharing with adaptive contrast | 是 | 第三順位 | Journal of Visual Communication and Image Representation | 34 | 45-51 | |
83 | 103 | 2 | 2015 | 3 | Fuh-Gwo Jeng, Wei-Lun Huang, Tzung-Her Chen | Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes | 是 | 第三順位 | Signal Processing: Image Communication | 34 | pp. 45-51 | |
84 | 104 | 2 | 2016 | 5 | Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, *Tzung-Her Chen | On the security of privacy-preserving keyword searching for cloud storage services | 是 | 其他 | International Journal of Network Security | 18 | 597-600 | |
85 | 104 | 2 | 2016 | 5 | Tzung-Her Chen , Yao-Sheng Lee and Chih-Hung Lin | On the difficulty of aligning VSS random grids | 是 | 第一順位 | Signal Processing: Image Communication | 44 | 101-107 | |
86 | 104 | 2 | 2016 | 7 | Fuh-Gwo Jeng, Jyun-Ci Huang and Tzung-Her Chen | An improved anonymous buyer-reseller watermarking protocol | 是 | 其他 | International Journal of Network Security | 18 | 728-735 | |
87 | 104 | 2 | 2016 | 7 | Fuh-Gwo Jeng, Yan-Ting Wu, Tzung-Her Chen | A Multi-Watermarking Protocol for Health Information Management | 是 | 第三順位 | Multimedia Tools and Applications | 75 | 8123-8135 | |
88 | 106 | 1 | 2017 | 10 | 李琪霖、黃偉倫、郭育麟、王炳兼、陳宗和, | 漫談H.264/AVC的選擇加密法 | 是 | 其他 | Communications of the CCISA | 23 | 73-92 | |
89 | 106 | 1 | 2017 | 11 | I-Chun Weng and Tzung-Her Chen | A Novel Weighted Visual Cryptography Scheme with High Visual Quality | 是 | 第二順位 | International Journal of Network Security | 19 | 922-928 | |
90 | 105 | 2 | 2017 | 6 | Jyun-Ci Huang, Fuh-Gwo Jeng and Tzung-Her Chen | A new buyer-seller watermarking protocol without multiple watermarks insertion | 是 | 第三順位 | Multimedia Tools and Applications | 76 | 9667-9679 | |
91 | 106 | 2 | 2018 | 4 | Tzung-Her Chen, Kai-Siang Lin, Chih-Hung Lin | On the Design of Two-decoding-option Image Secret Sharing Scheme | 是 | 第一順位 | Multimedia Tools and Applications | 77 | 7865-7881 | |
92 | 106 | 2 | 2018 | 5 | Tzung-Her Chen and Tzu-Ching Chang | On the security of a BTC-based-compression image authentication scheme | 是 | 第一順位 | Multimedia Tools and Applications | 77 | 12979-12989 | |
93 | 106 | 2 | 2018 | 5 | Fuh-Gwo Jeng, Bing-Jian Wang, Tzung-Her Chen | Security of a UUP Web Search Protocol with Privacy Preserving," Journal of Chung Cheng Institute of Technology (EI) | 是 | 第三順位 | Journal of Chung Cheng Institute of Technology | 47 | 107-114 | |
94 | 107 | 1 | 2018 | 9 | Hsing-Bai Chen, Wei-Bin Lee, and Tzung-Her Chen | A Novel DRM Scheme for Accommodating Expectations of Personal Use | 是 | 第三順位 | Multimedia Tools and Applications | 77 | 23099-23114 | |
95 | 107 | 1 | 2019 | 1 | Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, and Tzung-Her Chen | Secure and efficient protection for HTTP cookie with self-verification | 是 | 其他 | International Journal of Communication Systems | 32 | e3857 | |
96 | 107 | 2 | 2019 | 4 | Bing-Jian Wang, Tzer-Shyong Chen, Fuh-Gwo Jeng, Tzung-Her Chen | On The Security of Threshold Random Grid-based Visual Secret Sharing | 是 | 其他 | Multimedia Tools and Applications | 78 | 10157-10180 | |
97 | 107 | 2 | 2019 | 5 | Tai-Yuan Tu, Chih-Hung Wang, Tzung-Her Chen | Secure Progressive Visual Secret Sharing | 是 | 第三順位 | Journal of Chung Cheng Institute of Technology | 48 | 10157-10180 | |
98 | 108 | 2 | 2020 | 5 | Tzung-Her Chen, Xi-Wen Wu | Multiple Secret Image Sharing with General Access Structure | 是 | 第一順位 | Multimedia Tools and Applications | 79 | 13247–13265 | Booleanoperation.Generalaccessstructure.Multiplesecretimagesharing.Visual secret sharing |
99 | 109 | 1 | 2021 | 1 | Tzung-Her Chen, Tzu-Ching Chang, and Ting-Le Zhu | Security-enhanced Cloud-based Image Secret Sharing and Authentication Using POB Number System | 是 | 第一順位 | Multimedia Tools and Applications | 80 | 1901-1924 | |
100 | 109 | 2 | 2021 | 2 | Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung Wang | Blockchain-as-a-CA: A provably secure signcryption scheme revisited by leveraging blockchains | 否 | 第一順位 | Security and Communication Networks | 2021 | 6637402 | |
101 | 109 | 2 | 2021 | 5 | Tzung-Her Chen and Jing-Ya Yan | Commutative Encryption and Authentication for OpenEXR High Dynamic Range Images | 是 | 第一順位 | Multimedia Tools and Applications | 80 | 1901-1924 | |
102 | 109 | 2 | 2021 | 5 | Tzung-Her Chen, Wei-Bin Lee, Hsing-Bai Chen and Chien-Lung Wang | Revisited - the Subliminal Channel in Blockchain and its application to IoT security | 否 | 第一順位 | Symmetry | 13 | 855 | |
103 | 109 | 2 | 2021 | 6 | Chien-Ding Lee and Tzung-Her Chen | New Secure and Practical E-mail Protocol with Perfect Forward Secrecy | 是 | 第二順位 | Symmetry | 13 | 1144 | |
104 | 110 | 2 | 2022 | 6 | Chien-Ding Lee, Zhen-Hong Liao and Tzung-Her Chen | Medical Cooperative Authenticated Key Agreement Schemes with Involvement of Personal Care Assistant in Telemedicine | 是 | 第三順位 | Computer Methods and Programs in Biomedicine | 221 | 106809 | |
105 | 111 | 2 | 2023 | 2 | 江毓晴、陳元娣、呂明憲、汪侑翰、陳宗和 | 智能合約的安全防護與檢測平台實作 | 是 | 第一順位 | Communications of the CCISA | 29 | 35-52 | |
106 | 112 | 1 | 2023 | 8 | Tzung-Her Chen, Jing-Ya Yan | Enhanced Steganography for High Dynamic Range Images with Improved Security and Capacity | 是 | 第一順位 | Applied Sciences | 13 | 8865 | |
107 | 112 | 1 | 2023 | 8 | Chien-Ding Lee, Jhih-Hong Li, and Tzung-Her Chen | A Blockchain-Enabled Authentication and Conserved Data Aggregation Scheme for Secure Smart Grids | 是 | 第三順位 | IEEE Access | 11 | 85202-8521 | |
108 | 112 | 2 | 2024 | 3 | Xi-Wen Wu, Tzung-Her Chen | Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares | 是 | 第二順位 | Multimedia Tools and Applications | 83 | 28913–28926 | |
會議論文(共計89筆) |
序號 | 學年度 | 學期 | 年度 | 月份 | 作者 | 題目 | 通訊作者 | 作者順位 | 發表性質 | 會議論文集或研討會名稱 | 地點 |
1 | 089 | 1 | 2000 | 10 | 李維斌, 陳宗和 | 數位影像著作權保護~一個無失真高強韌度的浮水印技術 | 否 | | | 2000年暨第五屆全國電腦與通訊研討會 | 大葉大學 |
2 | 089 | 1 | 2000 | 12 | Wei-Bin Lee and Tzung-Her Chen | A Robust Copyright Protection Scheme for Still Images | 否 | | | 2000 International Computer Symposium Workshop | 花蓮 |
3 | 091 | 1 | 2002 | 11 | 洪國寶, 陳俊華, 曾斌誠, 陳宗和 | 一個植基於類神經網路之具強韌性的無失真著作權保護技術 | 否 | | | 第七屆人工智慧與應用研討會 | 朝陽科技大學 |
4 | 090 | 2 | 2002 | 5 | Gwoboa Horng, Tzung-her Chen and San-Hao Wang | A Robust Wavelet-Based Watermarking Using Quantization and Human Visual System | 否 | | | 12th National Conference on Information Security | Taichung |
5 | 092 | 1 | 2003 | 11 | Tzung-Her Chen, Gwoboa Horng, and Chao-Liang Liu | Security enhancement for a one-time password authentication scheme using smart cards | 否 | | | 2003 Workshop on Consumer Electronics | National Cheng-Kung University |
6 | 091 | 2 | 2003 | 6 | Tzung-Her Chen, Gwoboa Horng, and Dushiau Tsai | Improvements of a buyer-reseller watermarking protocol | 否 | | | 2003 Symposium on Application and Development of Information Technologies | 屏東商業技術學院 |
7 | 092 | 1 | 2003 | 9 | 洪國寶, 黃耀德, 蔡篤校, 陳宗和 | 植基於類神經網路之全彩秘密影像分享技術 | 否 | | | 2003數位生活與網際網路科技研討會 | 成功大學 |
8 | 092 | 2 | 2004 | 3 | Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee, and Kuang-Long Lin | Further enhancement for OPSA | 否 | | | 2004電子商務與數位生活研討會 | 台北 |
9 | 092 | 2 | 2004 | 5 | 洪國寶,劉兆樑,陳宗和,張若芬 | 一個遠端認證方法之改進以及軍事上之應用 | 否 | | | 陸軍軍官學校八十週年校慶綜合學術研討會 | 陸軍軍官學校 |
10 | 092 | 2 | 2004 | 5 | 洪國寶, 陳宗和, 張家銘, 李碩庭 | 重點區域不失真的醫學影像驗證技術 | 否 | | | 第五屆管理學域學術研討會 | 朝陽科技大學 |
11 | 092 | 2 | 2004 | 6 | 陳宗和,洪國寶,楊子慶 | 一個基於YS-like通行碼驗證方法的安全性分析 | 否 | | | 2004 數位生活與網際網路研討會
| 成功大學 |
12 | 092 | 2 | 2004 | 6 | Wei-Bin Lee, Shih-Cheng Chen and Tzung-Her Chen
| A Secure Image Hiding Scheme with Authentication | 否 | | | 2004 International Conference of Information Management | 育達商業技術學院 |
13 | 092 | 2 | 2004 | 6 | Tzung-Her Chen, and Gwoboa Horng | An Asymmetric and Anonymous Protocol for Copyright Protection
| 否 | | | 14th Information Security Conference | 台灣科技大學 |
14 | 094 | 1 | 2005 | 10 | Dahua Xie, Tzung-Her Chen and C.-C. Jay Kuo | Distortion-Aware Multimedia Authentication Using an Enhanced Hash Function | 否 | | | International Workshop on Multimedia Signal Processing 2005 (IEEE MMSP) | Shanghai, China |
15 | 095 | 1 | 2006 | 11 | Tzung-Her Chen and Chang-Sian Wu | A Batch Image Encryption Scheme | 否 | | | 2006 Workshop on Consumer Electronics and Signal Processing, Nov. 16-17, 2006 | 中華大學 |
16 | 095 | 1 | 2006 | 12 | 蔡柏侃、洪宗豪、陳宗和 | 數位權限管理之基於單向雜湊函數鏈的金鑰傳遞方法 | 否 | | | 2006數位教學暨資訊實務研討會, 南台科技大學, Dec. 8 | 南台科技大學 |
17 | 094 | 2 | 2006 | 2 | Tzung-Her Chen and Tsung-Hao Hung | Security Enhancement of an Authentication Protocol for Personal Communication Systems | 否 | | | 2006電子商務與數位生活研討會 | 台北大學 |
18 | 094 | 2 | 2006 | 6 | Du-Shiau Tsai, Tzung-Her Chen, Gwoboa Horng | A New Cheating Prevention Scheme for Visual Cryptography | 否 | | | 16th Information Security Conference, June 8-9, 2006 | 逢甲大學 |
19 | 094 | 2 | 2006 | 6 | Tzung-Her Chen, Tsung-Hao Hung | An Authentication Protocol for UMTS with Non-repudiation | 否 | | | 16th Information Security Conference, June 8-9, 2006 | 逢甲大學 |
20 | 096 | 1 | 2007 | 10 | 陳宗和, 曾靖皓 | 以動態向量為基礎的MPEG-4視訊加密 | 是 | 第一順位 | 書面發表 | Computer Graphics Workshop 2007, Oct. 18-19, 2007 | |
21 | 096 | 1 | 2007 | 11 | 陳宗和, 黃焌華 | 基於拜爾排列樣式的彩色影像隱藏技術 | 是 | 第一順位 | 書面發表 | 2007年民生電子暨信號處理研討會, Nov. 2, 2007 | |
22 | 096 | 1 | 2007 | 11 | 陳宗和, 曾靖皓 | 具有效性及高安全性之圖形密碼機制 | 是 | 第一順位 | 書面發表 | 2007年民生電子暨信號處理研討會, Nov. 2, 2007 | |
23 | 096 | 1 | 2007 | 11 | Tzung-Her Chen, Chang-Sian Wu, and Wei-Bin Lee | A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding | 是 | 第一順位 | 書面發表 | (IIHMSP-2008) | |
24 | 096 | 1 | 2007 | 12 | Gwoboa Horng, Chien-Lung Wang, Tzung-Her Chen | An Efficient Concealed Data Aggregation Scheme for Wireless Sensor Networks | 是 | 第三順位 | 書面發表 | Information Security and Cryptology Conference (ISCTurkey 2007), Dec. 13-14, 2007 | |
25 | 095 | 2 | 2007 | 3 | Tzung-Her Chen and Tsung-Hao Hung | A Secure Key Management Scheme in Digital Rights Management System for Mobile Users | 是 | 第一順位 | 書面發表 | 2007電子商務與數位生活研討會, Mar. 17, 2007 | |
26 | 095 | 2 | 2007 | 3 | 陳宗和,蔡柏侃 | 應用於行動裝置的快速驗證協定 | 是 | 第一順位 | 書面發表 | 第五屆現代通訊科技應用學術研討會, Mar. 16, 2007 | |
27 | 095 | 2 | 2007 | 5 | Tzung-Her Chen and Jyun-Ci Huang | Remarks on a password-based authentication and key distribution protocol with perfect forward secrecy | 是 | 第一順位 | 書面發表 | 2007知識社群與資訊安全研討會, May 16, 2007 | |
28 | 095 | 2 | 2007 | 5 | Ren-Der Lin, Tzung-Her Chen and Chien-Chen Huang | Security of an image authentication scheme based on Hamming code | 是 | 第二順位 | 書面發表 | 2007傳播技術與數位內容學術研討會, May 22, 2007 | |
29 | 095 | 2 | 2007 | 5 | Tzung-Her Chen and Po-Kan Tsai | A JPEG2000 Image Encryption Scheme With Changed Context Label | 是 | 第一順位 | 書面發表 | 2007資訊管理學術與實務研討會, May 29, 2007 | |
30 | 095 | 2 | 2007 | 6 | Tzung-Her Chen and Chang-Sian Wu | A batch image encryption scheme based on random grid | 是 | 第一順位 | 書面發表 | 第十一屆資訊管理學術暨警政資訊實務研討會, June 1, 2007 | |
31 | 095 | 2 | 2007 | 6 | 陳宗和,蔡柏侃 | 可適用於多人環境之行動裝置的快速驗證協定 | 是 | 第一順位 | 書面發表 | Proceedings of 17th Information Security Conference, June 8, 2007. | |
32 | 095 | 2 | 2007 | 6 | 李維斌,葉書辰,陳宗和 | 植基於單向赫序鏈之電子旅行支票系統 | 是 | 第三順位 | 書面發表 | 2007年資訊技術與產業應用研討會, June 8, 2007 | |
33 | 095 | 2 | 2007 | 6 | Kuan-Chieh Liao, Tzung-Her Chen, Chao-Kai Chang, and Wei-Bin Lee | Remarks on a Practical Password-Based Two-Server Authentication and Key Exchange System | 是 | 第二順位 | 書面發表 | 2007 Conference of Digital Technology and Innovation Management, June 2, 2007 | |
34 | 095 | 2 | 2007 | 7 | Tzung-Her Chen and Tsung-Hao Hung | An adaptive and transient authentication protocol for mobile device | 是 | 第一順位 | 書面發表 | The 11th World Multiconference on Systemics, Cybernetics and Informatics (WMSCI 2007) | |
35 | 095 | 2 | 2007 | 7 | Chiung-Chou Tsai, Kuan-Chieh Liao, Tzung-Her Chen, and Wei-Bin Lee | Security enhancement of a novel proxy key generation protocol | 是 | 第三順位 | 書面發表 | (STPSA’07) | |
36 | 096 | 1 | 2007 | 8 | Tzung-Her Chen and Chang-Sian Wu | BATCH IMAGE ENCRYPTION WITH VECTOR QUANTIZATION AND INDEX COMPRESSION | 是 | 第一順位 | 書面發表 | 20th Computer Vision, Graphics, and Image Processing, August 19-21, 2007 | |
37 | 096 | 1 | 2007 | 8 | Tzung-Her Chen and Jyun-Ci Huang | User-Participation-based Authentication for Remote Users | 是 | 第一順位 | 書面發表 | The 2007 International Conference on e-Commerce, Harbour Plaza, August 15-17, 2007 | |
38 | 096 | 1 | 2007 | 8 | Tzung-Her Chen and Chang-Sian Wu | Multiple Secrets Sharing Based on Boolean Operations | 是 | 第一順位 | 書面發表 | The 2007 International Conference on e-Commerce, Harbour Plaza, August 15-17, 2007 | |
39 | 096 | 1 | 2007 | 8 | Chao-Kai Chang, Hsing-Bai Chen, Tzung-Her Chen*, Wei-Bin Lee | E-Gift Certificate Book with Different Face Values | 是 | 第三順位 | 書面發表 | The 2007 International Conference on e-Commerce, Harbour Plaza, August 15-17, 2007 | |
40 | 097 | 1 | 2008 | 10 | Tzung-Her Chen, Kai-Hsiang Tsao, and Chang-Sian Wu | Multi-secrets visual secret sharing | 是 | 第一順位 | 書面發表 | Proceedings of The 14th Asia-Pacific Conference on Communications, October 14-16 | |
41 | 097 | 1 | 2008 | 11 | Tzung-Her Chen, Kuang-Che Li and Kai-Hsiang Tsao | Visual multi-image sharing by circular random grids | 是 | 第一順位 | 書面發表 | 第十屆「網際空間:資安、犯罪與法律社會」學術暨實務研討會, Nov. 21, 2008 | |
42 | 097 | 1 | 2008 | 11 | Tzung-Her Chen, Yao-Sheng Lee, and Kai-Hsiang Tsao | Visual secret sharing by random grids with pixel reduction | 是 | 第一順位 | 書面發表 | 第十屆「網際空間:資安、犯罪與法律社會」學術暨實務研討會, Nov. 21, 2008 | |
43 | 097 | 1 | 2008 | 11 | Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei | Multiple-image encryption by rotating random grids | 是 | 第一順位 | 書面發表 | (ISDA 2008) | |
44 | 096 | 2 | 2008 | 5 | Tzung-Her Chen and Kai-Hsiang Tsao | Image encryption by (n,n) Random Grids | 是 | 第一順位 | 書面發表 | Proceedings of 18th Information Security Conference, May 29-30, 2008 | |
45 | 096 | 2 | 2008 | 5 | 陳宗和, 魏國珍, 曹凱翔 | 使用隨機網格加密多重秘密影像 | 是 | 第一順位 | 書面發表 | Proceedings of 18th Information Security Conference, May 29-30, 2008 | |
46 | 097 | 1 | 2008 | 8 | Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, and Tzung-Her Chen | Assigning Keys in a Hierarchy | 是 | 其他 | 書面發表 | (IIHMSP-2008) | |
47 | 098 | 1 | 2009 | 9 | Tzung-Her Chen and Yao-Sheng Lee | Yet another friendly progressive visual secret sharing scheme | 是 | 第一順位 | 書面發表 | IIHMSP-2009 | |
48 | 098 | 1 | 2009 | 9 | Tzung-Her Chen, Yan-Ting Wu, and Yue-Rong Lin | Medical video encryption based on H.264/AVC with near-lossless compression | 是 | 第一順位 | 書面發表 | IIHMSP-2009 | |
49 | 098 | 1 | 2009 | 9 | Tzung-Her Chen and Yao-Sheng Lee | Yet another friendly progressive visual secret sharing scheme | 是 | 第一順位 | 書面發表 | (IIHMSP-2009) | |
50 | 098 | 1 | 2009 | 9 | Tzung-Her Chen, Yan-Ting Wu, and Yue-Rong Lin | Medical Video Encryption Based on H.264/AVC with Near-Lossless Compression | 是 | 第一順位 | 書面發表 | (IIHMSP-2009) | |
51 | 099 | 1 | 2010 | 10 | Tzung-Her Chen, Wei-Lun Huang, and Chih-Yang Lin | Chaos-based Image Integrity Authentication Code | 是 | 第一順位 | 書面發表 | (IIHMSP-2010) | |
52 | 099 | 1 | 2010 | 10 | Tzung-Her Chen, Wei-Lun Huang, and Chih-Yang Lin | Chaos-based image integrity authentication code | 是 | 第一順位 | 書面發表 | IIHMSP-2010 | |
53 | 099 | 1 | 2010 | 11 | Chih-Yang Lin, Wei-Lun Huang, Tzung-Her Chen | Noise-resistant joint fingerprinting and decryption based on vector quantization | 是 | 第三順位 | 書面發表 | CWECS 2010 | |
54 | 099 | 1 | 2010 | 11 | Tzung-Her Chen, Yao-Sheng Lee and Ci-Lin Li | High-capacity multi-secret sharing by random grid | 是 | 第一順位 | 書面發表 | CWECS 2010 | |
55 | 099 | 1 | 2010 | 11 | Chih-Yang Lin, Wei-Lun Huang, Tzung-Her Chen | Noise-resistant Joint Fingerprinting and Decryption Based on Vector Quantization | 是 | 第三順位 | 書面發表 | (CWECS 2010) | |
56 | 099 | 1 | 2010 | 11 | Tzung-Her Chen, Yao-Sheng Lee and Ci-Lin Li | High-capacity multi-secret sharing by random grid | 是 | 第一順位 | 書面發表 | (CWECS 2010) | |
57 | 100 | 1 | 2011 | 10 | Yu-Lin Kuo, Bing-Jian Wang, Fuh-Gwo Jeng and Tzung-Her Chen | A designated-tester public key encryption scheme with conjunctive-subset keyword search | 是 | 其他 | 書面發表 | (MSE 2011) | |
58 | 100 | 1 | 2011 | 10 | Yu-Lin Kuo, Bing-Jian Wang, Fuh-Gwo Jeng and Tzung-Her Chen | A designated-tester public key encryption scheme with conjunctive-subset keyword search | 否 | 其他 | 書面發表 | MSE 2011 | |
59 | 100 | 1 | 2011 | 9 | Bing-Jian Wang, Tzung-Her Chen, Fuh-Gwo Jeng | Security improvement against malicious servers in dPEKS scheme | 是 | 第二順位 | 書面發表 | ICNEE 2011 | |
60 | 100 | 1 | 2011 | 9 | Bing-Jian Wang, Tzung-Her Chen, Fuh-Gwo Jeng | Security Improvement against Malicious Servers in dPEKS Scheme | 是 | 第二順位 | 書面發表 | (ICNEE 2011) | |
61 | 102 | 1 | 2013 | 10 | Jing-Ya Yan, Tzung-Her Chen and Chih-Hung Lin | Encryption In High Dynamic Range Images for RGBE Format | 是 | 第二順位 | 口頭發表 | The Ninth International Conference on Intelligent Info Hiding and Multimedia Signal Processing | Beijing China |
62 | 102 | 1 | 2013 | 10 | Jing-Ya Yan, Tzung-Her Chen and Chih-Hung Lin | Encryption in high dynamic range images for RGBE format | 是 | 第二順位 | 口頭發表 | IIHMSP-2013 | |
63 | 101 | 2 | 2013 | 4 | Chih-Hung Lin, Shu-Yuan Lin and Tzung-Her Chen | Dynamic range optimization by flexible local contrast enhancement using luminance map | 是 | 第三順位 | 口頭發表 | Proceedings of Fifth International Conference on Digital Image Processing (ICDIP 2013) | Beijing, China |
64 | 101 | 2 | 2013 | 4 | Chih-Hung Lin, Shu-Yuan Lin and Tzung-Her Chen | Dynamic range optimization by flexible local contrast enhancement using luminance map | 是 | 第三順位 | 書面發表 | Fifth International Conference on Digital Image Processing (ICDIP 2013) | |
65 | 101 | 2 | 2013 | 6 | Shu-Yuan Lin, Tzung-Her Chen, and Chih-Hung Lin | Hybrid depth-estimation method for 2D-to-3D conversion | 是 | 第二順位 | 書面發表 | DTIM2013 | |
66 | 102 | 1 | 2013 | 8 | Kai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin, and Sheng-Shiang Chang | A tailor-made encryption scheme for high-dynamic range images | 是 | 第二順位 | 書面發表 | ICGEC 2013 | |
67 | 102 | 1 | 2013 | 8 | Sheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen, and Kai-Siang Lin | Robust watermarking for multiple images and users based on visual cryptography | 是 | 第三順位 | 口頭發表 | ICGEC 2013 | |
68 | 102 | 1 | 2013 | 8 | Sheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen,and K. S. Lin | Robust watermarking for multiple images and users based on visual cryptography | 是 | 第三順位 | 口頭發表 | Proceedings of the Seventh International Conference on Genetic and Evolutionary Computing (ICGEC 201 | Prague, Czech |
69 | 102 | 1 | 2013 | 8 | Kai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin, Sheng-Shiang Chang | A Tailor-made high dynamic range image encryption | 是 | 第二順位 | 口頭發表 | Proceedings of the Seventh International Conference on Genetic and Evolutionary Computing (ICGEC 201 | Prague, Czech |
70 | 102 | 1 | 2013 | 9 | Kai-Siang Lin, Fuh-Gwo Jeng, Chih-Hung Lin, and Tzung-Her Chen | A friendly visual multi-secret sharing scheme | 是 | 其他 | 口頭發表 | The Second Cross-Straits Conference on Information Security (CSCIS 2013) | Kaohsiung |
71 | 102 | 1 | 2013 | 9 | Kai-Siang Lin, Fuh-Gwo Jeng, Chih-Hung Lin, and Tzung-Her Chen | A friendly visual multi-secret sharing scheme | 是 | 其他 | 口頭發表 | The Second Cross-Straits Conference on Information Security (CSCIS 2013) | |
72 | 102 | 2 | 2014 | 5 | Wei-Bin Lee, Tzung-Her Chen, Wei-Rung Sun, Kevin Ho | A S/Key-like One-Time Password Authentication Scheme Us ing Smart Cards for Smart Meter | 是 | 第二順位 | 口頭發表 | Proceedings of The 28th IEEE International Conference on Advanced Info Networking & Applications | Victoria, Canada |
73 | 102 | 2 | 2014 | 7 | Zhen-Hong Liao, Fuh-Gwo Jeng, Tzung-Her Chen | An authenticated Concealed Data Aggregation Scheme Based on Secret Sharing for Smart Grid | 是 | 第三順位 | 口頭發表 | The 5th International Conference on Systematic Innovation (ICSI) | San Jose, California, USA. |
74 | 102 | 2 | 2014 | 7 | Jing-Ya Yan, Fuh-Gwo Jeng, Tzung-Her Chen | An Image Authentication Scheme for High Dynamic Range Images | 是 | 第三順位 | 口頭發表 | The 5th International Conference on Systematic Innovation (ICSI) | San Jose, California, USA. |
75 | 103 | 1 | 2014 | 8 | Tzung-Her Chen, Sheng-Shiang Chang | Image encryption on HDR images for OpenEXR format | 是 | 第一順位 | 口頭發表 | 第十九屆行動計算研討會 The 2014 Mobile Computing Workshop (MC 2014) | Tainan |
76 | 103 | 2 | 2015 | 5 | Zhen-Hong Liao, Tzung-Her Chen | A Billing Scheme in Smart Grid with Non-Repudiation | 是 | 第二順位 | 口頭發表 | 第二十五屆全國資訊安全會議 | 高雄 |
77 | 103 | 2 | 2015 | 6 | Jing-Ya Yan、Tzung-Her Chen | An electronic ticket scheme based on designated verifier proxy signature | 是 | 第二順位 | 口頭發表 | DLT2015數位生活科技研討會 | |
78 | 103 | 2 | 2015 | 7 | I-Chun Weng, Tzung-Her Chen | On the Contrast of Random Grid-based Visual Secret Sharing for General Access Structure with Cheat-Preventing Ability | 是 | 第二順位 | 口頭發表 | International Conference on Engineering and Applied Sciences (ICEAS) | Sapporo, Japan |
79 | 104 | 2 | 2016 | 5 | Yi-Hui Chen, I-Chun Weng and Tzung-Her Chen | Visual cryptography for flexible general access structure | 是 | 第三順位 | 口頭發表 | 第二十六屆全國資訊安全會議 | |
80 | 104 | 2 | 2016 | 7 | Hang-Yu Lin and Tzung-Her Chen | Efficient clouding data sharing with signature aggregation | 是 | 第二順位 | 口頭發表 | 7th International Conference on Systematic Innovation (ICSI 2016) | Lisbon, Portugal |
81 | 104 | 2 | 2016 | 7 | Tzu-Ching Chang and Tzung-Her Chen | An image authentication scheme based on Sudoku | 是 | 第二順位 | 口頭發表 | 7th International Conference on Systematic Innovation (ICSI 2016) | Lisbon, Portugal |
82 | 105 | 2 | 2017 | 4 | Xi-Wen Wu and Tzung-Her Chen | A Boolean-Operation-Based Multi-Secret Visual Secret Sharing Scheme by General Access Structure | 是 | 第二順位 | 口頭發表 | 2017 International Conference on e-Commerce and e-Technology | Kyoto, Japan |
83 | 107 | 1 | 2018 | 12 | Tai-Yuan Tu, Tzung-Her Chen, Ji-min Yang, Chih-Hung Wang | A Weighted Threshold Visual Cryptography | 否 | 第二順位 | 口頭發表 | 2018 International Computer Symposium | 雲林 |
84 | 106 | 2 | 2018 | 5 | Ting-Le Zhu, Chih-Hung Wang, Tzung-Her Chen | Privacy-enhanced fair protocol for data trading based on Bitcoin transactions | 是 | 第三順位 | 口頭發表 | 第二十八屆全國資訊安全會議 | |
85 | 106 | 2 | 2018 | 5 | Tzung-Her Chen, Ting-Le Zhu, Chih-Hung Wang | Privacy-preserving-enhanced designated-verifier proof of assets for cryptocurrency exchange | 是 | 第一順位 | 口頭發表 | 2018 3rd International Conference on Electronic Engineering and Computer Science | 杭州 |
86 | 107 | 2 | 2019 | 3 | Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung Wang | Blockchain-based Key Management for Healthcare Information System | 是 | 第一順位 | 壁報發表 | The 2nd International Conference on Information Science and System (ICISS 2019) | Tokyo, Japan |
87 | 107 | 2 | 2019 | 5 | Tzung-Her Chen, Wen-Rui Fu, Yung-ChuanTseng | A study on trading of renewable energy certificate based on HyperledgerFabric and Composer | 是 | 第一順位 | 口頭發表 | 第二十九屆全國資訊安全會議 | |
88 | 109 | 1 | 2020 | 9 | 駱彥儒 林少玄 陳宗和 | 以Hyperledger Fabric建構一個適用於智慧微電網之可信任再生能源交易平台 | 是 | 第三順位 | 口頭發表 | 第三十屆全國資訊安全會議 | |
89 | 109 | 1 | 2021 | 1 | Ting-Le Zhu and Tzung-Her Chen | A Study of Blockchain-based two-party Key Management for Healthcare Information System | 是 | 第二順位 | 壁報發表 | The 2021 IEEE Conference on Dependable and Secure Computing (IEEE DSC) | Fukushima, Japan |
學術活動(共計160筆) |
序號 | 學年度 | 學期 | 年度 | 月份 | 活動分類 | 活動名稱 | 活動地點/期刊學報/比賽名稱 |
1 | 101 | 1 | 2013 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2013) | IEEE Communications Letters |
2 | 101 | 1 | 2013 | 01 | 學術期刊論文審查 | 學術期刊論文審查 (Jan. 2013) | Signal Processing |
3 | 101 | 1 | 2013 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2013) | IEEE Transactions on Information Forensics and Security |
4 | 101 | 1 | 2013 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2013) | Journal of Information Science and Engineering |
5 | 101 | 1 | 2013 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2013) | IET Image Processing |
6 | 101 | 1 | 2013 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2013) | Journal of System and Software |
7 | 101 | 2 | 2013 | 02 | 學術期刊論文審查 | 學術期刊論文審查(Feb. 2013) | Signal Processing |
8 | 101 | 2 | 2013 | 02 | 學術期刊論文審查 | 學術期刊論文審查(Feb. 2013) | KSII Transactions on Internet and Information Systems |
9 | 101 | 2 | 2013 | 02 | 學術期刊論文審查 | 學術期刊論文審查(Feb. 2013) | IEEE Transactions on Image Processing |
10 | 101 | 2 | 2013 | 03 | 學術期刊論文審查 | 學術期刊論文審查 (Mar. 2013) | Journal of Visual Communication and Image Representation |
11 | 101 | 2 | 2013 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2013) | IEEE Transactions on Circuits and Systems for Video Technology |
12 | 101 | 2 | 2013 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2013) | International Journal of Computer Mathematics |
13 | 101 | 2 | 2013 | 03 | 學術期刊論文審查 | 學術期刊論文審查 (Mar. 2013) | Digital Signal Processing |
14 | 101 | 2 | 2013 | 04 | 學術期刊論文審查 | 學術期刊論文審查(Apr. 2013) | EURASIP Journal on Advances in Signal Processing |
15 | 101 | 2 | 2013 | 04 | 學術期刊論文審查 | 學術期刊論文審查(Apr. 2013) | Journal of Visual Communication and Image Representation |
16 | 101 | 2 | 2013 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2013) | IEEE Transactions on Circuits and Systems for Video Technology |
17 | 101 | 2 | 2013 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2013) | Signal Processing |
18 | 101 | 2 | 2013 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2013) | IET Image Processing |
19 | 101 | 2 | 2013 | 05 | 學術期刊論文審查 | 學術期刊論文審查 (May 2013) | Signal Processing |
20 | 101 | 2 | 2013 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2013) | KSII Transactions on Internet and Information Systems |
21 | 101 | 2 | 2013 | 07 | 學術期刊論文審查 | 學術期刊論文審查 (July, 2013) | Journal of Visual Communication and Image Representation |
22 | 101 | 2 | 2013 | 07 | 學術期刊論文審查 | 學術期刊論文審查 (July, 2013) | Journal of Information Science and Engineering |
23 | 102 | 1 | 2013 | 08 | 執行編輯、編輯委員、指導委員 | 擔任editor | The Scientific World Journal |
24 | 102 | 1 | 2013 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2013) | The Scientific World Journal |
25 | 102 | 1 | 2013 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2013) | Digital Signal Processing |
26 | 102 | 1 | 2013 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2013) | The Scientific World Journal |
27 | 102 | 1 | 2013 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2013) | Journal of Visual Communication and Image Representation |
28 | 102 | 1 | 2013 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep, 2013) | Journal of Information Science and Engineering |
29 | 102 | 1 | 2013 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2013) | Journal of Systems and Software |
30 | 102 | 1 | 2013 | 10 | 學術期刊論文審查 | 學術期刊論文審查 (Oct. 2013) | KSII Transactions on Internet and Information Systems |
31 | 102 | 1 | 2013 | 10 | 學術期刊論文審查 | 學術期刊論文審查(Oct. 2013) | IEEE Transactions on Image Processing |
32 | 102 | 1 | 2013 | 10 | 學術期刊論文審查 | 學術期刊論文審查(Oct. 2013) | Journal of Systems and Software |
33 | 102 | 1 | 2013 | 11 | 學術期刊論文審查 | 學術期刊論文審查(Nov. 2013) | IEEE Transactions on Parallel and Distributed Systems |
34 | 102 | 1 | 2013 | 12 | 出席國內研討會 | 2013全國計算機會議 | 亞洲大學,台中 |
35 | 102 | 1 | 2013 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2013) | KSII Transactions on Internet and Information Systems |
36 | 102 | 1 | 2013 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2013) | Signal Processing |
37 | 102 | 1 | 2013 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2013) | The Journal of Supercomputing |
38 | 102 | 1 | 2013 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2013) | Journal of Visual Communication and Image Representation |
39 | 101 | 2 | 2013 | 5 | 出席國內研討會 | 2013全國資訊安全會議 | 南台科技大學, 台南 |
40 | 102 | 1 | 2014 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2014) | China Communications |
41 | 102 | 1 | 2014 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2014) | Wireless Personal Communications |
42 | 102 | 1 | 2014 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2014) | KSII Transactions on Internet and Information Systems |
43 | 102 | 1 | 2014 | 01 | 學術期刊論文審查 | 學術期刊論文審查 (Jan. 2014) | Security and Communication Networks |
44 | 102 | 1 | 2014 | 01 | 主編、副主編 | 學術期刊論文審查(Jan. 2014) | Journal of Visual Communication and Image Representation |
45 | 102 | 2 | 2014 | 02 | 學術期刊論文審查 | 學術期刊論文審查(Feb. 2014) | Signal Processing |
46 | 102 | 2 | 2014 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2014) | Journal of Supercomputing |
47 | 102 | 2 | 2014 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2014) | IEEE Transactions on Information Forensics AND Security |
48 | 102 | 2 | 2014 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2014) | IEEE Transactions on Circuits and Systems for Video Technology |
49 | 102 | 2 | 2014 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2014) | Security and Communication Networks |
50 | 102 | 2 | 2014 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2014) | IEEE Transactions on Cybernetics |
51 | 102 | 2 | 2014 | 04 | 學術期刊論文審查 | 學術期刊論文審查(Apr. 2014) | Security and Communication Networks |
52 | 102 | 2 | 2014 | 05 | 學術期刊論文審查 | 學術期刊論文審查 (May 2014) | Signal Processing: Image Communication |
53 | 102 | 2 | 2014 | 06 | 學術期刊論文審查 | 學術期刊論文審查(Jun. 2014) | Security and Communication Networks |
54 | 102 | 2 | 2014 | 07 | 學術期刊論文審查 | 學術期刊論文審查(Jul. 2014) | Journal of Visual Communication and Image Representation |
55 | 103 | 1 | 2014 | 08 | 學術期刊論文審查 | 學術期刊論文審查(Aug. 2014) | Signal Processing: Image Communication |
56 | 103 | 1 | 2014 | 08 | 學術期刊論文審查 | 學術期刊論文審查(Aug. 2014) | Wireless Personal Communications |
57 | 103 | 1 | 2014 | 08 | 學術期刊論文審查 | 學術期刊論文審查(Aug. 2014) | IET Information Security |
58 | 103 | 1 | 2014 | 08 | 執行編輯、編輯委員、指導委員 | 擔任editor | The Scientific World Journal |
59 | 103 | 1 | 2014 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2014) | Journal of Information Science and Engineering |
60 | 103 | 1 | 2014 | 10 | 學術期刊論文審查 | 學術期刊論文審查(Oct. 2014) | Security and Communication Networks |
61 | 103 | 1 | 2014 | 11 | 學術期刊論文審查 | 學術期刊論文審查 (Nov. 2014) | IEEE Transactions on Industrial Electronics |
62 | 103 | 1 | 2014 | 11 | 學術期刊論文審查 | 學術期刊論文審查(Nov. 2014) | International Journal of Communication Systems |
63 | 103 | 1 | 2014 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2014) | Security and Communication Networks |
64 | 103 | 1 | 2014 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2014 | IEEE Transactions on Circuits and Systems for Video Technology |
65 | 103 | 1 | 2014 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2014) | Journal of Visual Communication and Image Representation |
66 | 103 | 1 | 2014 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2014) | JZUS-C (Computers and Electronics) |
67 | 102 | 2 | 2014 | 5 | 出席國內研討會 | 2014全國資訊安全會議 | 政治大學,台北 |
68 | 103 | 1 | 2014 | 8 | 出席國際研討會 | The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2014) | Kitakyushu, Japan |
69 | 103 | 1 | 2015 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2015) | Information Sciences |
70 | 103 | 1 | 2015 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan., 2015) | Journal of Information Science and Engineering |
71 | 103 | 2 | 2015 | 02 | 學術期刊論文審查 | 學術期刊論文審查(Feb. 2015) | IEEE Signal Processing Letters |
72 | 103 | 2 | 2015 | 03 | 學術期刊論文審查 | 學術期刊論文審查(May 2015) | International Journal of Computer Mathematics |
73 | 103 | 2 | 2015 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2015) | Security and Communication Networks |
74 | 103 | 2 | 2015 | 06 | 學術期刊論文審查 | 學術期刊論文審查 (Jun. 2015) | Security and Communication Networks |
75 | 103 | 2 | 2015 | 06 | 學術期刊論文審查 | 學術期刊論文審查(Jun. 2015) | IEEE Transactions on Information Forensics and Security |
76 | 103 | 2 | 2015 | 06 | 學術期刊論文審查 | 學術期刊論文審查(Jun. 2015) | China Communications |
77 | 103 | 2 | 2015 | 07 | 學術期刊論文審查 | 學術期刊論文審查(July 2015) | IEEE Transactions on Information Forensics and Security |
78 | 104 | 1 | 2015 | 08 | 主編、副主編 | 學術期刊論文審查(Aug. 2015) | IEEE MultiMedia |
79 | 104 | 1 | 2015 | 08 | 學術期刊論文審查 | 學術期刊論文審查(Aug. 2015) | Journal of Information Science and Engineering |
80 | 104 | 1 | 2015 | 08 | 執行編輯、編輯委員、指導委員 | 擔任editor | Cryptography |
81 | 104 | 1 | 2015 | 08 | 執行編輯、編輯委員、指導委員 | 擔任editor | International Journal of Computer and Software Engineering |
82 | 104 | 1 | 2015 | 08 | 執行編輯、編輯委員、指導委員 | 擔任editor | The Scientific World Journal |
83 | 104 | 1 | 2015 | 09 | 主編、副主編 | 學術期刊論文審查(Sep. 2015) | International Journal of Communication Systems |
84 | 104 | 1 | 2015 | 09 | 學術期刊論文審查 | 學術期刊論文審查 (Sep. 2015) | Security and Communication Networks |
85 | 103 | 1 | 2015 | 1 | 出席國際研討會 | 2015 International Conference on Platform Technology and Service | Jeju, Korea |
86 | 104 | 1 | 2015 | 10 | 學術期刊論文審查 | 學術期刊論文審查(First, Oct. 2015) | Security and Communication Networks |
87 | 104 | 1 | 2015 | 10 | 學術期刊論文審查 | 學術期刊論文審查(Second, Oct. 2015) | Security and Communication Networks |
88 | 104 | 1 | 2015 | 11 | 學術期刊論文審查 | 學術期刊論文審查(Nov. 2015) | International Journal of Communication Systems |
89 | 104 | 1 | 2015 | 11 | 學術期刊論文審查 | 學術期刊論文審查(Nov. 2015) | Wireless Personal Communications |
90 | 103 | 2 | 2015 | 5 | 出席國內研討會 | 2015全國資訊安全會議 | 高雄第一科技大學, 高雄 |
91 | 104 | 1 | 2015 | 9 | 出席國際研討會 | The 11th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2015) | Adelaide, Australia |
92 | 104 | 1 | 2016 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2016) | KSII Transactions on Internet and Information Systems |
93 | 104 | 2 | 2016 | 02 | 學術期刊論文審查 | 學術期刊論文審查 (Feb. 2016) | KSII Transactions on Internet and Information Systems |
94 | 104 | 2 | 2016 | 02 | 學術期刊論文審查 | 學術期刊論文審查(Feb. 2016) | IEEE Signal Processing Letters |
95 | 104 | 2 | 2016 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2016) | Measurement |
96 | 104 | 2 | 2016 | 04 | 學術期刊論文審查 | 學術期刊論文審查(Apr. 2016) | Mathematical Problems in Engineering |
97 | 104 | 2 | 2016 | 05 | 學術期刊論文審查 | 學術期刊論文審查 (May 2016) | Wireless Personal Communications |
98 | 104 | 2 | 2016 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2016) | Mathematical Problems in Engineering |
99 | 104 | 2 | 2016 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May, 2016) | Journal of Visual Communication and Image Representation |
100 | 104 | 2 | 2016 | 06 | 學術期刊論文審查 | 學術期刊論文審查(June 2016) | Journal of Intelligent Systems |
101 | 104 | 2 | 2016 | 06 | 學術期刊論文審查 | 學術期刊論文審查(June 2016) | Electronics Letters |
102 | 104 | 2 | 2016 | 06 | 學術期刊論文審查 | 學術期刊論文審查(June 2016) | Advances in Mathematics of Communications |
103 | 104 | 2 | 2016 | 06 | 學術期刊論文審查 | 學術期刊論文審查(June 2016) | Signal Processing: Image Communication |
104 | 104 | 2 | 2016 | 07 | 學術期刊論文審查 | 學術期刊論文審查 (July, 2016) | Journal of Visual Languages and Computing |
105 | 105 | 1 | 2016 | 08 | 學術期刊論文審查 | 學術期刊論文審查(Aug. 2016) | Informatica |
106 | 105 | 1 | 2016 | 08 | 學術期刊論文審查 | 學術期刊論文審查(Aug. 2016) | Journal of Real-Time Image Processing |
107 | 105 | 1 | 2016 | 08 | 學術期刊論文審查 | 學術期刊論文審查(Aug. 2016) | Electronics Letters |
108 | 105 | 1 | 2016 | 08 | 學術期刊論文審查 | 學術期刊論文審查(Aug. 2016) | Journal of Information Science and Engineering |
109 | 105 | 1 | 2016 | 08 | 執行編輯、編輯委員、指導委員 | 擔任editor | The Scientific World Journal |
110 | 105 | 1 | 2016 | 08 | 執行編輯、編輯委員、指導委員 | 擔任editor | Cryptography |
111 | 105 | 1 | 2016 | 08 | 執行編輯、編輯委員、指導委員 | 擔任editor | International Journal of Computer and Software Engineering |
112 | 105 | 1 | 2016 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2016) | Security and Communication Networks |
113 | 105 | 1 | 2016 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2016) | Signal Processing: Image Communication |
114 | 105 | 1 | 2016 | 09 | 學術期刊論文審查 | 學術期刊論文審查 (Sep. 2016) | Journal of Visual Communication and Image Representation |
115 | 105 | 1 | 2016 | 10 | 學術期刊論文審查 | 學術期刊論文審查(Oct. 2016) | IET Image Processing |
116 | 105 | 1 | 2016 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2016) | IET Information Security |
117 | 105 | 1 | 2016 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2016) | Digital Signal Processing |
118 | 104 | 2 | 2016 | 5 | 出席國內研討會 | 2016全國資訊安全會議 | 亞洲大學, 台中 |
119 | 104 | 2 | 2016 | 6 | 出席國內研討會 | 2016數位生活科技 | 屏東大學, 屏東 |
120 | 105 | 1 | 2016 | 8 | 出席國際研討會 | The 11th Asia Joint Conference on Information Security (AsiaJCIS 2016) | Fukuoka, Japan Kushu University, Nishijin Plaza |
121 | 105 | 1 | 2017 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2017) | IET Image Processing |
122 | 105 | 2 | 2017 | 02 | 學術期刊論文審查 | 學術期刊論文審查(Feb. 2017) | IEEE Signal Processing Letters |
123 | 105 | 2 | 2017 | 02 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2017) | Information Sciences |
124 | 105 | 2 | 2017 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2017) | ACM Transactions on Multimedia Computing, Communications and Applications |
125 | 105 | 2 | 2017 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2017) | IEEE Transactions on Industrial Informatics |
126 | 105 | 2 | 2017 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2017) | IEEE Transactions on Image Processing |
127 | 105 | 2 | 2017 | 04 | 學術期刊論文審查 | 學術期刊論文審查(Apr. 2017) | Neural Computing and Applications |
128 | 105 | 2 | 2017 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2017) | Digital Signal Processing |
129 | 105 | 2 | 2017 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2017) | Multidimensional Systems and Signal Processing |
130 | 105 | 2 | 2017 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2017) | Signal Processing: Image Communication |
131 | 105 | 2 | 2017 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2017) | KSII Transactions on Internet and Information Systems |
132 | 105 | 2 | 2017 | 05 | 學術期刊論文審查 | 學術期刊論文審查(May 2017) | IEEE Transactions on Industrial Informatics |
133 | 105 | 2 | 2017 | 06 | 學術期刊論文審查 | 學術期刊論文審查(Jun. 2017) | IEEE Transactions on Information Forensics and Security |
134 | 105 | 2 | 2017 | 06 | 學術期刊論文審查 | 學術期刊論文審查(Jun. 2017) | KSII Transactions on Internet and Information Systems |
135 | 105 | 2 | 2017 | 06 | 學術期刊論文審查 | 學術期刊論文審查(Jun. 2017) | International Journal of Bifurcation and Chaos |
136 | 105 | 2 | 2017 | 06 | 學術期刊論文審查 | 學術期刊論文審查(Jun. 2017) | IEEE Access |
137 | 105 | 2 | 2017 | 07 | 學術期刊論文審查 | 學術期刊論文審查(Jul. 2017) | Signal Processing: Image Communication |
138 | 106 | 1 | 2017 | 08 | 學術期刊論文審查 | 學術期刊論文審查(Aug. 2017) | IET Image Processing |
139 | 106 | 1 | 2017 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2017) | Mobile Information Systems |
140 | 106 | 1 | 2017 | 09 | 學術期刊論文審查 | 學術期刊論文審查(Sep. 2017) | Digital Signal Processing |
141 | 106 | 1 | 2017 | 10 | 學術期刊論文審查 | 學術期刊論文審查(Oct. 2017) | Signal Processing: Image Communication |
142 | 106 | 1 | 2017 | 10 | 學術期刊論文審查 | 學術期刊論文審查(Oct. 2017) | KSII Transactions on Internet and Information Systems |
143 | 106 | 1 | 2017 | 10 | 學術期刊論文審查 | 學術期刊論文審查(Oct. 2017) | Journal of Visual Communication and Image Representation |
144 | 106 | 1 | 2017 | 11 | 學術期刊論文審查 | 學術期刊論文審查(Nov. 2017) | IEEE Transactions on Circuits and Systems for Video Technology |
145 | 106 | 1 | 2017 | 11 | 學術期刊論文審查 | 學術期刊論文審查(Nov. 2017) | IET Image Processing |
146 | 106 | 1 | 2017 | 11 | 學術期刊論文審查 | 學術期刊論文審查(Nov. 2017) | Information Technology and Control |
147 | 106 | 1 | 2017 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2017) | IEEE Transactions on Circuits and Systems for Video Technology |
148 | 106 | 1 | 2017 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2017) | Information Sciences |
149 | 106 | 1 | 2017 | 12 | 學術期刊論文審查 | 學術期刊論文審查(Dec. 2017) | IET Information Security |
150 | 105 | 2 | 2017 | 5 | 出席國內研討會 | 2017全國資訊安全會議 | 義守大學, 高雄 |
151 | 105 | 2 | 2017 | 6 | 出席國內研討會 | 2017 數位生活科技 | 嘉義大學, 嘉義 |
152 | 106 | 1 | 2017 | 8 | 出席國際研討會 | The 12th Asia Joint Conference on Information Security (AsiaJCIS 2017) | Seoul, Korea |
153 | 106 | 1 | 2018 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2018) | Signal Processing |
154 | 106 | 1 | 2018 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2018) | Journal of Visual Communication and Image Representation |
155 | 106 | 1 | 2018 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2018) | Signal Processing: Image Communication |
156 | 106 | 1 | 2018 | 01 | 學術期刊論文審查 | 學術期刊論文審查(Jan. 2018) | IEEE Access |
157 | 106 | 2 | 2018 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2018) | Security and Communication Networks |
158 | 106 | 2 | 2018 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2018) | IEEE Transactions on Image Processing |
159 | 106 | 2 | 2018 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2018) | IEEE Transactions on Circuits and Systems for Video Technology |
160 | 106 | 2 | 2018 | 03 | 學術期刊論文審查 | 學術期刊論文審查(Mar. 2018) | IET Image Processing |