Logo
東海大學奈米科技研究中心-中心成員--鐘玉芳 教授
 

專長

密碼學、資訊安全、網路安全、電腦網路

計畫

產學合作計畫-以嵌入式軟體框架協助居家照護管理之設計(國家科學委員會)(2010.11-2011.10)
一般化的安全多方計算之研究(國家科學委員會)(2009.08-2010.07)
適用於不同應用環境的公平交換協定之研究(國家科學委員會)(2008.08-2009.07)
適用於實際應用環境的有效率群體導向簽章機制之研究(國家科學委員會)(2007.11-2008.07)
安全多方計算協定的研究與應用(2011.08-2012.07)


期刊

(33). T. L. Chen, Y. F. Chung, and F. Y. S. Lin, A Study on Agent-Based Secure Scheme for Electronic Medical Record System, Journal of Medical Systems, 36, 3, pp1345-1357, 2011.(SCI)
(32). T. L. Chen, Y. F. Chung, and F. Y. S. Lin, A Secure Conference Key Protocol over ECC-based Grey Systems, International Journal of Innovative Computing, Information and Control, 7, 10, pp5717-5730, 2011.(SCI, EI)
(31). C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, Mobile Agent Application and Integration in Electronic Anamnesis System, Journal of Medical Systems, 36, 2, pp1009-1020, 2011.(SCI)
(30). Z. Y. Wu, Y. F. Chung, F. Lai, and T. S. Chen, A Password-Based User Authentication Scheme for the Integrated EPR Information System, Journal of Medical Systems, 36, 2, pp631-638, 2011.(SCI)
(29). Y. F. Chung, T. L. Chen, T. S. Chen, and C. S Chen, A Study on Efficient Group-Oriented Signature Schemes for Realistic Application Environment, International Journal of Innovative Computing, Information and Control, 8, 4, pp2713-2727, 2011.(SCI, EI)
(28). Y. F. Chung, T. L. Chen, C. S. Chen, and T. S. Chen, The Study on General Secure Multi-Party Computation, International Journal of Innovative Computing, Information and Control, 8, 1, pp1-10, 2011.(SCI, EI)
(27). Z. Y. Wu, Y. C. Lee, F. Lai, H. C. Lee, and Y. F. Chung, A Secure Authentication Scheme for Telecare Medicine Information Systems, Journal of Medical Systems, 36, 3, pp1529-1539, 2011.(SCI)
(26). Z. Y. Wu, C. W. Hsueh, C. Y. Tsai, F. Lai, H. C. Lee, and Y. F. Chung, Redactable Signatures for Signed CDA Documents, Journal of Medical Systems, 36, 3, pp1975-1808, 2011.(SCI)
(25). C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, The Enhancement of Security in Healthcare Information Systems, Journal of Medical Systems, 36, 3, pp1673-1688, 2011.(SCI)
(24). C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, The Design of ID-Based Access Control System with Time-Sensitive Key for Mobile Agent's Migration, International Journal of Innovative Computing, Information and Control, 7, 12, pp7077-7090, 2011.(SCI, EI)
(23). Y. F. Chung, Y. T. Chen, T. L. Chen, and T. S. Chen, An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce, Expert Systems with Applications, 38, 12, pp9900-9907, 2011.(SCI, EI)
(22). Z. Y. Wu, Y. F. Chung, F. Lai, T. S. Chen, and H. C. Lee, An Enhanced Password-based User Authentication Scheme for Grid Computing, International Journal of Innovative Computing, Information and Control, 7, 7, pp3751-3760, 2010.(SCI, EI)
(21). C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent, International Journal of Innovative Computing, Information and Control, 7, 3, pp1443-1456, 2010.(SCI, EI)
(20). Z. Y. Wu, Y. F. Chung, F. Lai, T. S. Chen, and H. C. Lee, A Novel Grey Data Generating Technique on Elliptic Curve Cryptosystem, International Journal of Innovative Computing, Information and Control, 7, 1, pp379-394, 2010.(SCI, EI)
(19). T. L. Chen, Y.F. Chung and F. Y. S. Lin, An Efficient Date-Constraint Hierarchical Key Management Scheme for Mobile Agents, Expert Systems with Applications, 37, 12, pp7721-7728, 2010.(SCI, EI)
(18). Y. F. Chung, Y. L. Yu, and T. C. Hsiao, A Study on Fuzzy Decision and Preferred Enterprise Strategy, Journal of Innovative Computing, Information and Control, Vol. 5, No.11, pp3809-3826, 2009.(SCI, EI)
(17). Y. F. Chung, T. S. Chen, and M. W. Lai, Efficient Migration Access Control for Mobile Agents, Computer Standards and Interfaces, Vol. 31, No.6, pp1061-1068, 2009.(SCI)
(16). Y. F. Chung, and K. H. Huang, Chameleon Signature with Conditional Open Verification, Journal of Innovative Computing, Information and Control, Vol. 5, No.9, pp325302-325310, 2009.(SCI)
(15). Y.F. Chung, T.S. Chen and H.F. Chen, Cross Platform Layer for Public Key Infrastructure Interoperability, Journal of Innovative Computing, Information and Control, Vol. 5, No.6, pp1699-1709, 2008.(SCI)
(14). R.L. Shen, Y.F. Chung and T.S. Chen, A Novel Application of Grey System Theory to Information Security, Computer Standards and Interfaces, Vol. 31, No.2, pp277-281, 2008.(SCI)
(13). K.H. Huang, Y.F. Chung, C.H. Liu, F.P. Lai and T S. Chen, A Conference Key Agreement Protocol with Fault-tolerant Capability, Computer Standards and Interfaces, Vol. 31, No.2, pp401-405, 2008.(SCI)
(12). Y.F. Chung, K.H. Huang and T.S. Chen, Threshold Authenticated Encryption Scheme Using Labor-division Signature, Computer Standards and Interfaces, Vol. 31, No.2, pp300-304, 2008.(SCI)
(11). K.H. Huang, Y.F. Chung, C.H. Liu, F.P. Lai and T.S. Chen, Efficient Migration for Mobile Computing in Distributed Networks, Computer Standards and Interfaces, Vol. 31, No.1, pp40-47, 2008.(SCI)
(10). Y.F. Chung, Z.Y. Wu and T.S. Chen, Ring Signature Scheme for ECC-based Anonymous Signcryption, Computer Standards and Interfaces, Vol. 31, No.4, pp669-674, 2008.(SCI)
(9). Y.L. Yu, Y.F. Chung and T.S. Chen, Electronic Signatures for Long-term Storage Purpose in Electronic Anamnesis, Journal of Innovative Computing, Information and Control, Vol. 4, No.11, 2008.(SCI)
(8). Y.F. Chung, T.S. Chen and C.H. Liu, Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent, Journal of Innovative Computing, Information and Control, Vol. 4, No.9, pp2375-2389, 2008.(SCI)
(7). Y. F. Chung, Z. Y. Wu, and T. S. Chen, Unconditionally Secure Cryptosystems Based on Quantum Cryptography, Information Sciences, Vol. 178, No.8, pp2044-2058, 2007.(SCI, EI, SSCI)
(6). Chung Y. F., Y. L. Yu and Y. T. Chen, A Study on Efficient Group-oriented Signature Schemes for Realistic Application Environment, Communications of IICM, Vol. 11(1), pp31-42, 2007.(Others)
(5). Chung Y. F. and H. C. Yu, The Study on General Secure Multi-party Computation, Communications of IICM, Vol. 11(1), pp97-110, 2007.(Others)
(4). Chung Y. F., H. H. Lee, F. P. Lai, and T. S. Chen, Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem, Information Sciences, Vol. 178(1), pp230-243, 2007.(SCI, EI, SSCI)
(3). Chung Y. F., K. H. Huang, H. H. Lee, F. P. Lai, and T. S. Chen, Bidder-anonymous English Auction Scheme with Privacy and Public Verifiability, Journal of Systems and Software, Vol. 81(1), pp133-119, 2007.(SCI, EI)
(2). Chung Y. F., K. H. Huang, F. P. Lai and T. S. Chen, ID-based Digital Signature Scheme on the Elliptic Curve Cryptosystem, Computer Standards and Interfaces, Vol. 29(6), pp601-604, 2007.(SCI, EI)
(1). Chung Y. F., Z. Y. Wu, F. P. Lai and T. S. Chen, A Novel ID-based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery, Lecture Notes in Computer Science, Vol. 4456, pp502-512, 2007.(EI)

 

專長

密碼學、資訊安全、網路安全、電腦網路

計畫

產學合作計畫-以嵌入式軟體框架協助居家照護管理之設計(國家科學委員會)(2010.11-2011.10)
一般化的安全多方計算之研究(國家科學委員會)(2009.08-2010.07)
適用於不同應用環境的公平交換協定之研究(國家科學委員會)(2008.08-2009.07)
適用於實際應用環境的有效率群體導向簽章機制之研究(國家科學委員會)(2007.11-2008.07)
安全多方計算協定的研究與應用(2011.08-2012.07)


期刊

(33). T. L. Chen, Y. F. Chung, and F. Y. S. Lin, A Study on Agent-Based Secure Scheme for Electronic Medical Record System, Journal of Medical Systems, 36, 3, pp1345-1357, 2011.(SCI)
(32). T. L. Chen, Y. F. Chung, and F. Y. S. Lin, A Secure Conference Key Protocol over ECC-based Grey Systems, International Journal of Innovative Computing, Information and Control, 7, 10, pp5717-5730, 2011.(SCI, EI)
(31). C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, Mobile Agent Application and Integration in Electronic Anamnesis System, Journal of Medical Systems, 36, 2, pp1009-1020, 2011.(SCI)
(30). Z. Y. Wu, Y. F. Chung, F. Lai, and T. S. Chen, A Password-Based User Authentication Scheme for the Integrated EPR Information System, Journal of Medical Systems, 36, 2, pp631-638, 2011.(SCI)
(29). Y. F. Chung, T. L. Chen, T. S. Chen, and C. S Chen, A Study on Efficient Group-Oriented Signature Schemes for Realistic Application Environment, International Journal of Innovative Computing, Information and Control, 8, 4, pp2713-2727, 2011.(SCI, EI)
(28). Y. F. Chung, T. L. Chen, C. S. Chen, and T. S. Chen, The Study on General Secure Multi-Party Computation, International Journal of Innovative Computing, Information and Control, 8, 1, pp1-10, 2011.(SCI, EI)
(27). Z. Y. Wu, Y. C. Lee, F. Lai, H. C. Lee, and Y. F. Chung, A Secure Authentication Scheme for Telecare Medicine Information Systems, Journal of Medical Systems, 36, 3, pp1529-1539, 2011.(SCI)
(26). Z. Y. Wu, C. W. Hsueh, C. Y. Tsai, F. Lai, H. C. Lee, and Y. F. Chung, Redactable Signatures for Signed CDA Documents, Journal of Medical Systems, 36, 3, pp1975-1808, 2011.(SCI)
(25). C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, The Enhancement of Security in Healthcare Information Systems, Journal of Medical Systems, 36, 3, pp1673-1688, 2011.(SCI)
(24). C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, The Design of ID-Based Access Control System with Time-Sensitive Key for Mobile Agent's Migration, International Journal of Innovative Computing, Information and Control, 7, 12, pp7077-7090, 2011.(SCI, EI)
(23). Y. F. Chung, Y. T. Chen, T. L. Chen, and T. S. Chen, An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce, Expert Systems with Applications, 38, 12, pp9900-9907, 2011.(SCI, EI)
(22). Z. Y. Wu, Y. F. Chung, F. Lai, T. S. Chen, and H. C. Lee, An Enhanced Password-based User Authentication Scheme for Grid Computing, International Journal of Innovative Computing, Information and Control, 7, 7, pp3751-3760, 2010.(SCI, EI)
(21). C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent, International Journal of Innovative Computing, Information and Control, 7, 3, pp1443-1456, 2010.(SCI, EI)
(20). Z. Y. Wu, Y. F. Chung, F. Lai, T. S. Chen, and H. C. Lee, A Novel Grey Data Generating Technique on Elliptic Curve Cryptosystem, International Journal of Innovative Computing, Information and Control, 7, 1, pp379-394, 2010.(SCI, EI)
(19). T. L. Chen, Y.F. Chung and F. Y. S. Lin, An Efficient Date-Constraint Hierarchical Key Management Scheme for Mobile Agents, Expert Systems with Applications, 37, 12, pp7721-7728, 2010.(SCI, EI)
(18). Y. F. Chung, Y. L. Yu, and T. C. Hsiao, A Study on Fuzzy Decision and Preferred Enterprise Strategy, Journal of Innovative Computing, Information and Control, Vol. 5, No.11, pp3809-3826, 2009.(SCI, EI)
(17). Y. F. Chung, T. S. Chen, and M. W. Lai, Efficient Migration Access Control for Mobile Agents, Computer Standards and Interfaces, Vol. 31, No.6, pp1061-1068, 2009.(SCI)
(16). Y. F. Chung, and K. H. Huang, Chameleon Signature with Conditional Open Verification, Journal of Innovative Computing, Information and Control, Vol. 5, No.9, pp325302-325310, 2009.(SCI)
(15). Y.F. Chung, T.S. Chen and H.F. Chen, Cross Platform Layer for Public Key Infrastructure Interoperability, Journal of Innovative Computing, Information and Control, Vol. 5, No.6, pp1699-1709, 2008.(SCI)
(14). R.L. Shen, Y.F. Chung and T.S. Chen, A Novel Application of Grey System Theory to Information Security, Computer Standards and Interfaces, Vol. 31, No.2, pp277-281, 2008.(SCI)
(13). K.H. Huang, Y.F. Chung, C.H. Liu, F.P. Lai and T S. Chen, A Conference Key Agreement Protocol with Fault-tolerant Capability, Computer Standards and Interfaces, Vol. 31, No.2, pp401-405, 2008.(SCI)
(12). Y.F. Chung, K.H. Huang and T.S. Chen, Threshold Authenticated Encryption Scheme Using Labor-division Signature, Computer Standards and Interfaces, Vol. 31, No.2, pp300-304, 2008.(SCI)
(11). K.H. Huang, Y.F. Chung, C.H. Liu, F.P. Lai and T.S. Chen, Efficient Migration for Mobile Computing in Distributed Networks, Computer Standards and Interfaces, Vol. 31, No.1, pp40-47, 2008.(SCI)
(10). Y.F. Chung, Z.Y. Wu and T.S. Chen, Ring Signature Scheme for ECC-based Anonymous Signcryption, Computer Standards and Interfaces, Vol. 31, No.4, pp669-674, 2008.(SCI)
(9). Y.L. Yu, Y.F. Chung and T.S. Chen, Electronic Signatures for Long-term Storage Purpose in Electronic Anamnesis, Journal of Innovative Computing, Information and Control, Vol. 4, No.11, 2008.(SCI)
(8). Y.F. Chung, T.S. Chen and C.H. Liu, Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent, Journal of Innovative Computing, Information and Control, Vol. 4, No.9, pp2375-2389, 2008.(SCI)
(7). Y. F. Chung, Z. Y. Wu, and T. S. Chen, Unconditionally Secure Cryptosystems Based on Quantum Cryptography, Information Sciences, Vol. 178, No.8, pp2044-2058, 2007.(SCI, EI, SSCI)
(6). Chung Y. F., Y. L. Yu and Y. T. Chen, A Study on Efficient Group-oriented Signature Schemes for Realistic Application Environment, Communications of IICM, Vol. 11(1), pp31-42, 2007.(Others)
(5). Chung Y. F. and H. C. Yu, The Study on General Secure Multi-party Computation, Communications of IICM, Vol. 11(1), pp97-110, 2007.(Others)
(4). Chung Y. F., H. H. Lee, F. P. Lai, and T. S. Chen, Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem, Information Sciences, Vol. 178(1), pp230-243, 2007.(SCI, EI, SSCI)
(3). Chung Y. F., K. H. Huang, H. H. Lee, F. P. Lai, and T. S. Chen, Bidder-anonymous English Auction Scheme with Privacy and Public Verifiability, Journal of Systems and Software, Vol. 81(1), pp133-119, 2007.(SCI, EI)
(2). Chung Y. F., K. H. Huang, F. P. Lai and T. S. Chen, ID-based Digital Signature Scheme on the Elliptic Curve Cryptosystem, Computer Standards and Interfaces, Vol. 29(6), pp601-604, 2007.(SCI, EI)
(1). Chung Y. F., Z. Y. Wu, F. P. Lai and T. S. Chen, A Novel ID-based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery, Lecture Notes in Computer Science, Vol. 4456, pp502-512, 2007.(EI)