許建隆 教授 (管研所主聘教師)
姓名:許建隆
職稱:教授
分機:(03)2118800 轉 5827
信箱:clhsu@mail.cgu.edu.tw
個人網頁:http://www.sedona.cloud/members/Chien-Lung
學歷:國立台灣科技大學資訊管理博士
專長領域:
- 資訊安全領域:資訊安全、密碼學技術與應用、駭客攻防技術與應用、行動商務安全與應用、數位版權管理、自動辨識技術、數位鑑識與資訊法律、5G暨物聨網安全、區塊鏈技術、資訊安全稽核與管理、雲端安全授權
- 智慧醫療/智慧長照領域:穿戴式裝置與物聨網之創新應用、區塊鏈創新應用、智慧照護機器人、PHR連續性照護服務、智慧健康照護決策分析、智慧健康促進系統與可用性評估、智慧醫療/智慧長照創新應用系統開發與評估
- 醫療資訊安全領域:醫療資安管理與稽核、醫療IT/OT安全防護、健康資訊系統之隱私保護、同意書手寫簽署安全性、行動醫療安全、醫療資安之法遵要求與防護
實驗室:行動商務系統實驗室(Lab. of Ubiquitous Security and Applications)
簡介:
許建隆教授目前為長庚大學資訊管理學系教授,同時為長庚大學企業管理研究所教授、長庚大學企業管理研究所教授、長庚大學企業管理研究所教授,他於2013年至2016曾擔任長庚大學資訊管理學系系主任。他分別於1997年、2002年取得國立台灣科技大學資訊管理系取得碩士學位及博士學位,其研究主軸為資訊安全、密碼學、智慧家庭系統、健康照護、行動商務安全與應用、物聯網技術、數位鑑識等領域,並且參與資訊安全與健康照護相關重要計畫。許教授截至目前已發表約86篇學術期刊論文(其中約有70篇SCI/SSCI論文)、5本資訊安全與RFID相關專書、4個中華民國發明專利。許教授之研究成果曾榮獲2006年長庚大學優良教師研究獎、2006年中華民國資訊學會(IICM)碩士論文佳作指導獎、2010年 e-Commerce, e-Administration, e-Society, e-Education, and e-Technology國際研討會之論文佳作、2010年二十屆資訊安全會議最佳論文、JCMIT 2015最佳口頭論文、2015Engineering & Technology, Computer, Basic & Applied Sciences最佳會議論文、2016 International Invention Design Competition金牌、SDPS 2016 Poster Presentation第一名、2018第28屆全國資訊安全會議暨資訊安全技術研討會大會論文佳作、指導學生榮獲駭客年會競賽第二名、第19屆全國大專校院資訊應用服務創新競賽-產學合作組第二名等。此外,許教授亦榮獲科技部「優秀年輕學者研究計畫」(三年期計畫)、科技部提升私校研發能量專案計畫、科技部臺日(JP)國合計畫(三年期計畫)、多次榮獲科技部補助大專校院獎勵特殊優秀人才獎勵金、連續多年榮獲科技部補助大專校院獎勵特殊優秀人才。許教授分別於2008年與2011年被收錄於2008 Marquis Who's Who in the World以及2011 Marquis Who's Who in America。
許教授在國際專業技術方面已取得ISO 27001、ISO 17025、CEH、CHFI等證照,並且為國際EC-Council之CEI國際專業師資。許教授在資訊安全與智慧健康照護領域曾受邀擔任專家委員以及大會演講,例如:國際SDPS 2016大會邀請演講、生技矽谷與智慧醫療技術研討會大會演講者、健康照護資訊雲端整合平台專家委員、國民健康署健康i智慧交流論壇主持人、運動科技應用高峰論壇大會演講、2018 SHE智慧醫療論壇擔任智慧長期照護講師、衛生福利部國民健康署專題演講、2025衛生福利科技政策白皮書論壇專家學者等。
許教授目前亦為中華民國資訊安全學會(CCISA)理事、台灣醫療資訊學會理事、台灣數位鑑識發展協會(ACFD)秘書長、財團法人全國認證基金會資安技術專家暨稽核員、行政院資通安全處資安稽核委員、行政院國家資通安全會報技術服務中心專家委員、長庚大學「資訊與醫療安全應用學程」召集人、長庚大學「大數據資料科學與產業應用學程」召集人、長庚大學「物聯網產業創新應用學程」召集人、長庚大學健康老化中心成員、台灣資通安全研究與教學中心(TWISC)@長庚大學負責人等,同時擔任業界資訊安全與智慧健康照護領域之顧問,協助規劃並推動「資訊安全」與「健康照護」相關學術研究與產學合作工作,曾透過產學合作方式,完成「行動視訊會議系統安全機制」、「Mifare-based門禁系統之安全評估與防護」、「電子封條之安全評估與防護」,以及「二代悠遊卡安全評估」實作研究等。許教授對於人才培育亦不餘力,從2006年開始參與教育部教育部科技及應用人才培育先導型計畫,執行「資訊與醫療安全學程」(獲教育部優良學程)、「RFID物流與供應鏈應用學程」、「RFID物流與供應鏈資源中心」、「電子商務安全教材」(獲教育部優良教材)、「資通安全實習教材」(獲教育部優良教材)、「資通安全實習教材(體驗篇)」、「數位鑑識教材」(獲教育部優良教材)、「車載行動商務」等計畫,並且開辦ISO 27001、ISO 20000、BS10012、CEH、CHFI國際證照課程協助學生取得國際證照。
現任:
服務機構 |
服務部門/系所 |
職稱 |
起訖年月 |
長庚大學 |
資訊管理學系 |
教授 |
2011/08 ~迄今 |
長庚大學 |
企業管理研究所 |
合聘教授 |
2016/08/01~迄今 |
長庚大學 |
資訊檢測暨數位鑑識實驗室 |
負責人 |
2017~迄今 |
長庚大學 |
健康老化中心-科技長照研究群 |
召集人 |
2017~迄今 |
長庚大學 |
物聯網產業創新應用學程 |
召集人 |
2007/09 ~ 迄今 |
長庚大學 |
資訊與醫療安全應用學程 |
召集人 |
2007/09 ~ 迄今 |
長庚大學 |
大數據資料科學與產業應用學程 |
召集人 |
2007/09 ~ 迄今 |
明志科技大學 |
視覺傳傳達設計學系 |
合聘教授 |
2016/08/01~迄今 |
中華民國資訊安全學會 |
理監事 |
理事 |
2012/05~ 迄今 |
社團法人台灣醫學資訊學會 |
理監事 |
理事 |
2015/11/3~迄今 |
中華民國電腦稽核協會 |
理監事 |
監事 |
2020/08~迄今 |
台灣醫學設計學會 |
理監事 |
常務理事 |
2019/9/9~迄今 |
財團法人全國認證基金會 |
光電測試領域(含資安領域) |
資安技術專家暨準稽核員 |
2019~迄今 |
行政院國家資通安全會報技術服務中心 |
資安職能訓練機構 |
遴選暨稽核委員 |
2017/07~迄今 |
行政院國家資通安全會報技術服務中心 |
第二方資通安全稽核輔導作業 |
輔導專家 |
2020/06~迄今 |
行政院資通安全處 |
資安稽核委員 |
資安稽核委員 |
2017/12~迄今 |
教育部 |
資通安全第二方稽核 |
資安稽核委員 |
2020~迄今 |
經濟部 |
資通安全第二方稽核 |
資安稽核委員 |
2020~迄今 |
衛福部 |
資通安全第二方稽核 |
資安稽核委員 |
2020~迄今 |
EC-Council |
Accredited Training Center (ATC)— Chang Gung University |
負責人 |
2013~迄今 |
Cisco |
Cisco Academy |
負責人 |
2016~迄今 |
Cellebrite |
Accredited Training Center |
負責人 |
2017~迄今 |
Apollo Crisis Rescue Association |
CGU Information Security Center CGU Medical Security Center |
負責人 |
2020~迄今 |
資策會 |
資安所(5G前瞻資安研究) |
訪問研究學者 |
2020/07~迄今 |
經歷
服務機構 |
服務部門/系所 |
職稱 |
起訖年月 |
華梵大學 |
資訊管理系 |
兼任講師 |
2001/08 ~ 2002/02 |
中華民國資訊安全學會 |
秘書處 |
副秘書長 |
2007/11 ~ 2009/07 |
長庚大學 |
資訊管理學系 |
助理教授 |
2004/02 ~ 2007/07 |
長庚大學 |
資訊管理學系 |
副教授 |
2007/08 ~ 2011/07 |
長庚大學 |
資訊中心教學服務組 |
組長 |
2009/08 ~ 2012/04 |
中華民國資訊安全學會 |
產學合作委員會 |
理事 兼任委員 |
2009/08 ~ 2012/04 |
中華民國資訊安全學會 |
教育與推廣委員會 |
理事 兼任主任委員 |
2011/02 ~ 2012/04 |
美國中佛羅里達大學(University of Central Florida) |
Department of Electrical Engineering and Computer Science |
訪問研究學者 |
2012/08~2013/07 |
長庚大學 |
資訊管理學系 |
主任 |
2013/08~2016/7/31 |
長庚醫院 |
護理部 |
研究員 |
2019/1/1~2021/12/31 |
長庚醫院 |
行政中心 |
合聘研究員 |
2016/01/01~2018/12/31 |
中華民國資訊安全學會 |
會員委員會 |
主任委員 |
2012/05~ 2018/04 |
中華民國電腦稽核協會 |
理監事 |
理事 |
2018/9/27~2020/08 |
國立台灣科技大學資管系系友會 |
理監事 |
理事長 |
2016/03~2020/08 |
國際證照
CEH, CEI, CHFI, ECIH, ECSA, CCPA, ISO 27001, ISO 17025教授課程
行動商務、行動商務安全與應用、高等資訊安全、資訊安全政策與管理、網路攻防技術與應用、資料結構、資訊安全專題、物聨網概論獎項
- 2006/09,榮獲長庚大學優良教師研究獎。
- 2006/12,榮獲中華民國資訊學會(IICM)九十五年度碩士論文佳作指導獎。
- 2001/12,教育部校園軟體創作獎勵比賽佳作 (作品:具自我驗證的網頁標記系統)。
- 2008年,被選為第二十五屆 “2008 Marquis Who's Who in the World” (註:Marquis Who's Who 創立於1899年,是目前世界公認排名第一的名人錄;此記錄書籍收藏於世界各大圖書館內)。
- 2008/07/09,指導學生榮獲教育部前瞻晶片系統設計人才培育先導型計畫2008大學校院嵌入式系統設計競賽創意應用組之設計完整獎(學生:洪銘聰、廖峻輝、辜任廷)。
- 2010/01/25,榮獲International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology 榮獲「Distinguished Paper Award」,作者為「Hsu, C.L., Wu, T.C., Y.H., and Tsai, K.Y.」,論文名稱「Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes」。
- 2010/05,榮獲二十屆資訊安全會議NSC「會議最佳論文」,作 者為「Tsai, K.Y., Wu,, T.C., Hsu, C.L., and Martin, K.」,論文「Provably Secure Concurrent Multisignature with Document Decomposition」。
- 2009年,擔任資通安全聯盟「資通安全實習教材」計畫共同主持人,該教材榮獲教育部優良教材。
- 2009年,參與資通安全聯盟「電子商務安全教材」計畫,該教材榮獲教育部優良教材。
- 2010年,榮獲長庚大學推薦「國科會99年度補助大專校院獎勵特殊優秀人才」。
- 2011年,榮獲國科會「優秀年輕學者研究計畫」。
- 2011年,選為第二十八屆選為“2011 Marquis Who's Who in America” (註:Marquis Who's Who 創立於1899年,是目前世界公認排名第一的名人錄;此記錄書籍收藏於世界各大圖書館內)。
- 2011/07/15,收錄於“Great Minds of the 21st Century (Fifth Edition)”
- 2011/08/09,榮獲Fellowship of the American Biographical Institute.
- 2012/03/16,國科會工程技術發展處頒發「具腦機介面與音樂治療功能之音樂播放器之開發應用」獎狀,作者為「曾俊儒、林伯是、許建隆」。
- 2012/04/02,「智慧生活健康促進」課程獲選為100學年度優良課程。
- 2013/12/30,參與教育部資訊及科技教育司網路通訊人才培育先導型計畫,長庚大學資訊及醫療安全學程榮獲「優良學程學校」。
- 2015/05,榮獲2015年國際醫學資訊聯合研討會「最佳口頭論文」,作 者為「Chen, S.W., Liao, M.W., and Hsu, C.L.」,論文「智慧型健康體適能系統設計與使用者接受度研究」。
- 2015/12,榮獲2015年Engineering & Technology, Computer, Basic & Applied Sciences「最佳口頭論文」,作 者為Hsu, C.L , and Liao M.W.,論文為“Design and Evaluation of AR-Based Serious Games with Clinical Knowledge for Promoting Health Fitness”
- 2016/12,榮獲2016年Society for Design and Process Science SDPS 「最佳口頭論文」,作 者為Liao M.W., Hsu, C.L(通信作者), Design and Evaluation of An Intelligent Health Promotion System based on Serious Games with Osteoporosis Clinical Practice Guideline”
- 榮獲2016 International Invention Design Competition (IIDC) 金牌獎2016/12/1-3 香港
- 2018/5/24 榮獲第28屆資訊安全會議最佳論文獎佳作,作者為 許建隆、吳宗亮、林子煒、陳偉鑫,單一簽密者與多重解密者之屬性簽密法
- 2018/12/13指導商管專業學院碩士學位學程在職專班學生涂清介以「聽覺障礙障礙者之行動導覽系統需求研究-以台塑文物館為例」榮獲國立台灣圖書館107年度身心障礙研究優秀論文獎助佳作
- 許建隆教授師生團隊,和長庚醫療財團法人林口長庚紀念醫院護理部合作,協助長庚醫院榮獲2018 SNQ國家品質標章國家生技醫療品質獎—護理照護服務類特色專科組「銀獎」
- 2019/11/20-22 榮獲2019 International Conference on Medical Design (MD2019) 「最佳口頭論文」作 者為Hsu, C.L , Lin TW Chuang TH and Chen YJ ,Design and Implementation of A Post-Quantum Blockchain Protocol for Enhancing Security and Privacy of IoT-based Healthcare Environment
- 2020,教育部資科司,資通安全人才培育計畫,資安實務示範課程計畫-「數位鑑識暨資訊倫理與法律」優良教材。
期刊論文
一、國際學術期刊論文
- Hsu, C.L. and Wu, T.C.*, “Authenticated Encryption Scheme with (t, n) Shared Verification,” IEE Proceedings Computers and Digital Techniques, Vol. 145, No. 2, March, 1998, pp. 117-120. <SCI: 0.181 (1998)>
- Wu, T.S., He, W.H., and Hsu, C.L.*, “Security of Authenticated Multiple-Key Agreement Protocols,” Electronics Letters, Vol. 35, No. 5, March, 1999, pp. 391-392. <SCI: 1.164 (1999)>
- Hsu, C.L., Wu, T.S.*, and Wu, T.C., “New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers,” Journal of Systems and Software, Vol. 58, No. 2, September, 2001, pp. 119-124. <SCI: 0.440 (2001), 44/N/A in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
- Wu, T.S.* and Hsu, C.L., “Convertible Authenticated Encryption Scheme,” Journal of Systems and Software, Vol. 62, No. 3, June, 2002, pp. 205-209. <SCI: 0.400 (2002), 49/N/A in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
- Hsu, C.L., Wu, T.S.*, and Wu, T.C., “Improvements of Generalization of Threshold Signature and Authenticated Encryption for Group Communications,” Information Processing Letters, Vol. 81, No. 1, January, 2002, pp. 41-45. <SCI: 0.331 (2002), 59/N/A in COMPUTER SCIENCE, INFORMATION SYSTEMS>
- Wu, T.S.* and Hsu, C.L., “ID-Based Multisignatures with Distinguished Signing Authorities for Sequential and Broadcasting Architectures,” Applied Mathematics and Computation, Vol. 131, No. 2-3, September, 2002, pp. 349-356. <SCI: 0.436 (2002), 103/N/A in MATHEMATICS, APPLIED>
- Hsu, C.L., Wu, T.S.*, and Wu, T.C., “Improvement of Threshold Proxy Signature Scheme,” Applied Mathematics and Computation, Vol. 136, No. 2-3, March, 2003, pp. 315-321. <SCI: 0.426 (2003), 111/153 in MATHEMATICS, APPLIED>
- Wu, T.C.* and Hsu, C.L., “Cryptanalysis of Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems,” IEEE Transactions on Vehicular Technology, Vol. 52, No. 2, March, 2003, pp. 462-465. <SCI: 0.861 (2003), 5/21 in TRANSPORTATION SCIENCE & TECHNOLOGY>
- Hsu, C.L. and Wu, T.S.*, “Cryptanalyses and Improvements of Two Cryptographic Key Assignment Schemes for Dynamic Access Control in a User Hierarchy,” Computers and Security, Vol. 22, No. 5, July, 2003, pp. 453-456. <SCI: 0.457 (2003), 57/78 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
- Wu, T.S.* and Hsu, C.L., “Threshold Signature Scheme Using Self-Certified Public Keys,” Journal of Systems and Software, Vol. 67, No. 2, August, 2003, pp. 89-97. <SCI: 0.528 (2003), 51/78 in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
- Hsu, C.L., Wu, T.S.*, Wu, T.C., and Mitchell, C., “Improvement of Modified Authenticated Key Agreement Protocol,” Applied Mathematics and Computation, Vol. 142, No. 2-3, October, 2003, pp. 305-308. <SCI: 0.426 (2003), 111/153 in MATHEMATICS, APPLIED>
- Wu, T.S.*, Hsu, C.L., Lin, H.Y., and Huang, P.S., “Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme,” Information Processing Letters, Vol. 88, No. 4, November, 2003, pp. 183-186. <SCI: 0.473 (2003), 55/78 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
- Hsu, C.L.*, “Security of Two Remote User Authentication Schemes Using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 4, November, 2003, pp. 1196-1198. <SCI: 0.428 (2003), 32/56 in TELECOMMUNICATIONS>
- Wu, T.S.* and Hsu, C.L., “Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks,” Computers and Security, Vol. 23, No. 2, March, 2004, pp. 120-125. <SCI: 0.412 (2004), 59/78 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
- Hsu, C.L.*, “Security of Chien et al.'s Remote User Authentication Scheme Using Smart Cards,” Computer Standards and Interfaces, Vol. 26, No. 3, May, 2004, pp. 167-169. <SCI: 0.316 (2004), 32/44 in COMPUTER SCIENCE, HARDWARE & ARCHITECTURE>
- Hsu, C.L. and Wu, T.S.*, “Efficient Proxy Signature Schemes Using Self-Certified Public Keys,” Applied Mathematics and Computation, Vol. 152, No. 3, May, 2004, pp. 807-820. <SCI: 0.567 (2004), 82/162 in MATHEMATICS, APPLIED>
- Hsu, C.L., Wu, T.S.*, and Wu, T.C., “Group-Oriented Signature Scheme with Distinguished Signing Authorities,” Future Generation Computer Systems, Vol. 20, No. 5, June, 2004, pp. 865-873. <SCI: 0.528 (2004), 51/70 in COMPUTER SCIENCE, THEORY & METHODS>
- Wu, T.S.* and Hsu, C.L., “Cryptanalysis of Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers,” Computer Standards and Interfaces, Vol. 26, No. 5, September, 2004, pp. 477-481. <SCI: 0.316 (2004), 32/44 in COMPUTER SCIENCE, HARDWARE & ARCHITECTURE>
- Hsu, C.L.*, Wu, T.S., and He, W.H., “New Proxy Multi-Signature Scheme,” Applied Mathematics and Computation, Vol. 162, No. 3, March, 2005, pp. 1201-1206. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
- Hsu, C.L., and Wu, T.S.*, “Self-Certified Threshold Proxy Signature Schemes with Message Recovery, Nonrepudiation, and Traceability,” Applied Mathematics and Computation, Vol. 164, No. 1, May, 2005, pp. 201-225. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
- Hsu, C.L.*, “Cryptanalysis and Improvement of the Tzeng-Hwang Authenticated Encryption Scheme Based on Elliptic Curve Discrete Logarithm Problem,” Applied Mathematics and Computation, Vol. 167, No. 2, August, 2005, pp. 882-890. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
- Hsu, C.L.* and Wu, T.S., “Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers Against the Collusion Attack,” Applied Mathematics and Computation, Vol. 168, No. 1, September, 2005, pp. 305-319. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
- Hsu, C.L.*, “A User Friendly Remote Authentication Scheme with Smart Cards Against Impersonation Attacks,” Applied Mathematics and Computation, Vol. 170, No. 1, November, 2005, pp. 135-143. <SCI: 0.688 (2005), 66/151 in MATHEMATICS, APPLIED>
- Hsu, C.L.*, Tsai, K.Y., and Tsai, P.L., “Cryptanalysis and Improvement of Nonrepudiable Threshold Multi-Proxy Multi-Signature Scheme with Shared Verification,” Information Sciences, Vol. 177, No. 2, January, 2007, pp. 543-549. <SCI: 2.147 (2007), 10/92 (約前11%) in COMPUTER SCIENCE, INFORMATION SYSTEMS>
- Wu, T.S., Hsu, C.L.*, and Lin, H.Y., “Generalized Convertible Authenticated Encryption Schemes for Smart Card Applications,” International Mathematical Forum, Vol. 2, No. 8, 2007, pp. 345-363.
- Hsu, C.L.*, Liu, H.C., and Chou, M.T., “Remote Mutual Authentication Scheme with Key Agreement Using Smart Cards,” International Mathematical Forum, Vol. 2, No. 28, 2007, pp. 1381-1397.
- Hsu, C.L.*, Lin, W.T., and Chou, Y.C., “New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks,” Journal of Computers, Vol. 18, No. 2, July, 2007, pp. 25-32. <EI>
- Wu, T.S., Hsu, C.L.*, Tsai, K.Y., Lin, H.Y., and Wu, T.C., “Convertible Multi-Authenticated Encryption Scheme,” Information Sciences, Vol. 178, No. 1, January, 2008, pp. 256-263. <SCI: 3.095 (2008), 8/99 (約前8%) in COMPUTER SCIENCE, INFORMATION SYSTEMS>
- Wu, T.C.*, Huang, T.T., Hsu, C.L., and Tsai, K.Y., “Recursive Protocol for Group-Oriented Authentication with Key Distribution,” Journal of Systems and Software, Vol. 81, No. 7, July, 2008, pp. 1227-1239. <SCI: 1.241 (2008), 36/86 in COMPUTER SCIENCE, SOFTWARE ENGINEERING, 34/84 in COMPUTER SCIENCE, THEORY & METHODS>
- Hsu, C.L.*, “Cryptanalysis of Elliptic Curve Cryptosystem on Smart Card Access Control with Threshold Scheme,” Computer Systems Science and Engineering, Vol. 23, No. 6, November, 2008, pp. 367-372. <SCI:0.277 (2008), 41/45 in COMPUTER SCIENCE, HARDWARE & ARCHITECTURE>
- Wu, T.S., Hsu, C.L.*, and Lin, H.Y., “Self-Certified Multi-Proxy Signature Schemes with Message Recovery,” Journal of Zhejiang University: Science A, Vol. 10, No. 2, February, 2009, pp. 290-300. <SCI: 0.301 (2009), 59/79 in ENGINEERING, MULTIDISCIPLINARY>
- Hsu, C.L.,* and Chuang, Y.H., “A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks,” Information Sciences, Vol. 179, No. 4, February, 2009, pp. 422-429. <SCI: 3.291 (2009), 6/116 (約前5%) in COMPUTER SCIENCE, INFORMATION SYSTEMS>
- Lu, C.F.*, Wu, T.C., and Hsu, C.L., “Certificateless Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks,” WSEAS Transactions on Communications, Vol. 8, No. 11, November, 2009, pp. 1145-1159. <EI>
- Hsu, C.L.*, “A Secure ID-Based User Identification Scheme for Wireless Environments,” ICIC Express Letters, Vol. 4, No. 3, June, 2010, pp. 629-633. <EI>
- Tsai, K.Y., Hsu, C.L.*, and Wu, T.C., “Mutual Anonymity Protocol with Integrity Protection for Mobile Peer-to-Peer Networks,” International Journal of Security and Networks, Vol. 5, No. 1, 2010, pp. 45-52. <EI>
- Lin, Y.L., Wu, T.C., and Hsu, C.L.*, “Secure and Efficient Time-Bound Key Assignment Scheme for Access Control in Hierarchical Structure,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 2, February, 2010, pp. 439-447. <SCI: 1.667 (2010) 12/60 in AUTOMATION & CONTROL SYSTEMS, 40/108 in COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE>
- Wu, T.S., Lin, H.Y.,* (通信作者), and Chang, K.Y., “Efficient Verifier-Based Authenticated Key Agreement Protocol for Three Parties,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 2, February, 2010, pp. 755-762. <SCI: 1.667 (2010) 12/60 in AUTOMATION & CONTROL SYSTEMS>
- Lin, Y.L. and Hsu, C.L.*, “Cryptanalysis and Improvement of a Hierarchical Key Management Scheme for Access Control in the Mobile Agent,” ICIC Express Letters, Vol. 4, No. 1, February, 2010, pp. 183-187. <EI>
- Mohammad, Z.*, Hsu, C.L., Chen, Y.C., and Lo, C.C., “An Efficient and Secure Three-Pass Authenticated Key Agreement Elliptic Curve Based Protocol,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 3, March, 2011, pp. 1273-1284. <SCI-Expanded, EI>
- Hsu, C.L.*, Chang, L.P., and Wu, T.C., “A Supervising Authenticated Encryption Scheme for Multilevel Security,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 3, March, 2011, pp. 1087-1095. <SCI-Expanded, EI>
- Hsu, C.L.* and Tsai, K.Y., “New ECC-Based Remote User Authentication Scheme with Key Agreement Using Smart Cards,” Journal of Internet Technology, Vol. 12, No. 4, July, 2011, pp. 601-608. <SCI: 0.508 (2011), 57/79 in TELECOMMUNICATIONS>
- Mohammad, Z.*, Chen, Y.C., Hsu, C.L., and Lo, C.C., “Cryptanalysis and Enhancement of Two-Pass Authenticated Key Agreement with Key Confirmation Protocols,” IETE Technical Review, Vol. 27, No. 3, May, 2010, pp. 252-265. <SCI: 0.370 (2010), 60/80 in TELECOMMUNICATIONS>
- Chang, L.P., Wu, T.C., Hsu, C.L.*, and Lu, C.F., “Two Level Authenticated Group Key Agreement Protocol with Privacy-Preservation for Resource-Limited Mobile Devices,” Journal of Internet Technology, Vol. 11, No. 4, July, 2010, pp. 519-528. <SCI: 0.448 (2010), 56/80 in TELECOMMUNICATIONS>
- Lin, Y.L. and Hsu, C.L.*, “Secure Key Management Scheme for Dynamic Hierarchical Access Control Based on ECC,” Journal of Systems and Software, Vol. 84, No. 4, April, 2011, pp. 679-685. <SCI: 0.836 (2011), 42/99 in COMPUTER SCIENCE, THEORY & METHODS>
- Hsu, C.L.*, Wu, T.C., and Tsai, K.Y., “Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes,” International Journal of Business and Information, Vol. 5, No. 1, June, 2010, pp. 46-62. <Index of ABI/Inform database>. (This paper is also the Distinguished Paper of International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology, Macau, China, January 2010)
- Lu, C.F., Wu, T.C., and Hsu, C.L.*, “A Three-Level Authenticated Conference Key Establishment Protocol for UMTS Networks,” Journal of Zhejiang University-SCIENCE C-Computers & Electronics, Vol. 12, No. 5, May, 2011, pp. 371-378. <SCI: 0.308 (2011), 210/245 in ENGINEERING, ELECTRICAL & ELECTRONIC>
- Hsu, C.L., Tseng, Keven. C., and Chuang, Y.H.*, “Predictors of Future Use of Telehomecare Health Services by Middle-Aged People in Taiwan,” Social Behavior and Personality, Vol. 39, No. 9, October, 2011, pp. 1251-1262. <SSCI: 0.307 (2011), 57/59 in PSYCHOLOGY, SOCIAL>
- Lin, H.Y.* and Hsu, C.L., “A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme,” International Journal of Foundations of Computer Science, Vol. 22, No. 3, April, 2011, pp. 739-756. <SCI: 0.379 (2011), 86/99 in COMPUTER SCIENCE, THEORY & METHODS>
- Lin, H.Y. and Hsu, C.L.*, Huang, S.K., “Improved Convertible Authenticated Encryption Scheme with Provable Security,” Information Processing Letters, Vol. 111, No. 13, July, 2011, pp. 661-666. <SCI: 0.455 (2011), 106/135 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
- Tsai, K.Y.*, Wu, T.C., and Hsu, C.L., “New Secret Key Traitor Tracing Scheme with Dispute Settlement from Bilinear Maps,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 3, March, 2011, pp. 1499-1510. <SCI-Expanded, EI>
- Lu, C.F., Wu, T.C., Hsu, C.L.*, “Certificateless Authenticated Group Key Agreement Scheme with Privacy-Preservation for Resource-Limited Mobile Devices,” International Journal of Innovative Computing, Information and Control, Vol. 8, No. 1(B), January, 2012, pp. 599-615. <SCI-Expanded, EI>
- Hsu, C.L., Lin, H.Y.*, “New Identity-Based Key-Insulated Convertible Multi-Authenticated Encryption Scheme,” Journal of Network and Computer Applications, Vol. 34, No. 5, September, 2011, pp. 1724-1731. <SCI: 1.065 (2011), 36/104 in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
- Mohammad, Z., Hsu, C.L.*, Chen, Y.C., and Lo, C.C., “Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves,” Journal of Internet Technology, Vol. 14, No. 2, March, 2013, pp.247-250. <SCI: 0.418 (2013), 68/78 in TELECOMMUNICATIONS>
- Lin, Y.L. and Hsu, C.L.*, “New Efficient Migration for Mobile Computing in Distributed Networks,” Information-an International Interdisciplinary Journal, Vol. 14, No. 7, July, 2011, pp. 2435-2450. <SCI: 0.250 (2011), 78/90 in ENGINEERING, MULTIDISCIPLINARY>
- Tsai, K.Y.*, Wu, T.C., Hsu, C.L., Martin, K., “Provably Secure Multisignature Scheme with Document Decomposition and Signer Anonymity,” ICIC Express Letters, Vol. 5, No. 9(B), September, 2011, pp. 3579-3583. <EI>
- Hsu, C.L., Wu, T.S., and Lin, H.Y.*, “Password-Based Authenticated Key Exchange Protocol without Trusted Third Party for Multi-Server Environments,” International Journal of Innovative Computing, Information and Control, Vol. 8, No. 3(A), May, 2012, pp. 1541-1555. <SCI-Expanded, EI>
- Chuang, Y.H., Shu, W., Hsu, K.C., Hsu, C.L.*, “Improved Group-Oriented Digital Signature Schemes Based on Elliptic Curve Cryptography,” ICIC Express Letters, Vol. 5, No. 12, December, 2011, pp. 4415-4419. <EI>
- Tseng, K.C.*, Hsu, C.L., Han, C.M., and Chuang, Y.H., “Development of a Telehealthcare System for Community-Dwelling Older Adults by Using a Collaborative Quality Function Deployment Tool,” Advanced Science Letters (ASL), Vol. 9, No. 1, April, 2012, pp. 689-694.
- Lu, C.F., Hsu, C.L.*, and Lin, H.Y., “Provably Convertible Multi-Authenticated Encryption Scheme for Generalized Group Communications,” Information Sciences, Vol. 199, No. 15, September, 2012, pp. 154-166. <SCI: 3.643 (2012), 6/132 in COMPUTER SCIENCE, INFORMATION SYSTEMS>
- Hsu, C.L.*, Lu, C.F., “A Security and Privacy Preserving E-Prescription System Based on Smart Cards,” Journal of Medical Systems, Vol. 36, No. 6, December, 2012, pp. 3637-3647. <SCI: 1.783 (2012), 11/23 in MEDICAL INFORMATICS>
- Hsu, C.L., Tseng, K.C.*, and Chuang, Y.H. , “A Secure IRB System for Assisting the Development of Intelligent Medical Devices,” Expert Systems With Applications, Vol. 39, No. 16, November, 2012, pp. 12512-12521. <SCI:1.854 (2012), 13/79 in OPERATIONS RESEARCH & MANAGEMENT SCIENCE>
- Hsu, C.L., Lin, H.Y.*, “Pairing-Based Strong Designated Verifier Proxy Signature Scheme with Low Cost,” Security and Communication Networks, Vol. 5, No. 5, May, 2012, pp. 517-522. <SCI: 0.311 (2012), 70/78 in TELECOMMUNICATIONS>
- Chuang, Y.H., Shu, W., Hsu, K.C., Hsu, C.L.*, “A Secure Non-interactive Deniable Authentication Protocol Based on Discrete Logarithms,” ICIC Express Letters Part B: Applications, Vol. 3, No. 3, June, 2012, pp. 507-512. <EI>
- Tseng, K.C., Hsu, C.L.*, and Chuang, Y.H., “Acceptance of Information Technology and the Internet by People Aged Over Fifty in Taiwan,” Social Behavior and Personality, Vol. 40, No. 4, May, 2012, pp. 613-622. <SSCI: 0.41 (2012), 57/60 in PSYCHOLOGY, SOCIAL> 2014/7/1修正, 其他系統要修正.
- Chuang, Y.H.*, Shu, W., Hsu, K.C., and Hsu, C.L., “A Novel Communication Protocol of Wireless Sensor Networks for a Home Healthcare System in Aging Society,” Advanced Science Letters (ASL)(Accepted).
- Chuang, Y.H., and Hsu, C.L.*, “A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions,” Journal of Internet Technology, Vol. 15, No. 2, March, 2014, pp. 197-201. <SCI: 0.481 (2012), 61/78 in TELECOMMUNICATIONS>
- Hsu, C.L.*, and Chuang, Y.H., “A Robust User Authentication Protocol with Anonymity, Deniability, Key Agreement, and Efficiency, ” Applied Mathematics & Information Sciences, Vol. 7, No. 1, January, 2013, pp. 127-132. <SCI: 1.232 (2013), 53/250 in MATHEMATICS, APPLIED>
- Hsu, C.L. and Chuang, Y.H.*, “A Novel Remote User Authentication Scheme from Bilinear Pairings via Internet,” submitted to Wireless Personal Communications. <SCI: 0.979 (2013), 45/78 in TELECOMMUNICATIONS>
- Tseng, K.C., Wong, A.M.K., Hsu, C.L.*, Tsai, T.H., Han, C.M., and Lee, M.R., “The iFit: An Integrated Physical Fitness Testing System to Evaluate the Degree of Physical Fitness of the Elderly,” IEEE Transactions on Biomedical Engineering, Vol. 60, No. 1, January, 2013, pp. 184-188. <SCI: 2.233 (2013), 29/77 in ENGINEERING, BIOMEDICAL>
- Hsu, C.L., and Lin, H.Y.*, “Convertible Authenticated Encryption Scheme with Hierarchical Access Control,” Applied Mathematics & Information Sciences, Vol. 8, No. 3, May, 2014, pp. 1239-1246. <SCI: 1.232 (2013), 53/250 in MATHEMATICS, APPLIED>
- Hsu, C.L., and Lin, H.Y.*, “Universal Forgery Attack on a Strong Designated Verifier Signature Scheme,” The International Arab Journal of Information Technology, Vol. 11, No. 5, September, 2014. <SCI: 0.366 (2013), 220/247 in ENGINEERING, ELECTRICAL & ELECTRONIC>
- Tsai, T.H., Wong, A.M.K., Hsu, C.L., and Tseng, K.C.*, “Research on a Community-based Platform for Promoting Health and Physical Fitness in the Elderly Community,” PLoS One, Vol. 8, No. 2, February, 2013, pp. 1-9. <SCI: 3.534 (2013), 8/55 in MULTIDISCIPLINARY SCIENCES>
- Hsu, C.L., Chuang, Y.H.*, and Hung, M.T., “An Efficient Deniable Authentication Protocol from Pairings to Protect Users’ Privacy,” Chiang Mai Journal of Science (Accepted), 2013. <SCI: 0.418 (2013), 35/55 in MULTIDISCIPLINARY SCIENCES>
- Hsu, C.L., and Lin, H.Y.*, “Provably Secure Message Recovery Limited Verifier Signature Scheme with Low Cost,” Information-An International Interdisciplinary Journal, Vol. 17, No. 4, April, 2014, pp.1187-1199.
- Hsu, C.L.*, Lee, M.R., and Su, C.H., “The Role of Privacy Protection in Healthcare Information Systems Adoption,” Journal of Medical Systems, Vol. 37: 9966, No. 5, October, 2013, pp. 1-12. <SCI: 1.372 (2013), 14/25 in MEDICAL INFORMATICS>
- Tseng, K.C., Hsu, C.L.*, and Chuang, Y.H., “Designing an Intelligent Health Monitoring System and Exploring User Acceptance for the Elderly,” Journal of Medical Systems, Vol. 37:9967, No. 6, September, 2013, pp. 1-18. <SCI: 1.372 (2013), 14/25 in MEDICAL INFORMATICS>
- Hsu, C.L.* and Lin, Y.L., “Improved Migration for Mobile Computing in Distributed Networks,” Computer Standards & Interfaces, Vol. 36, No. 3, March, 2014, pp.577-584. <SCI: 1.177 (2013), 38/105 in COMPUTER SCIENCE, SOFTWARE ENGINEERING>
- Hsu, C.L. and Lin, H.Y.*, “An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network,” KSII Transactions on Internet and Information Systems, Vol. 7, No. 11, November, 2013, pp. 2928-2940. <SCI: 0.345 (2013), 72/78 in TELECOMMUNICATIONS>
- Lin, Y.L., Hsu, C.L. and Chuang, Y.H., “A Novel Efficient Key Assignment Scheme for Dynamic Access Control,” Chiang Mai Journal of Science (Accepted), 2014. <SCI: 0.418 (2013), 35/55 in MULTIDISCIPLINARY SCIENCES>
- Lu, C.F., Hsu, C.L.*, Lin, H.Y., and Su, C.H., “A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash Function,” International Journal of Future Computer and Communication, Vol. 3, No. 5, October, 2014, pp. 315-318.
- Lin, Y.L., Hsu, C.L., and Chuang, Y.H.*, “A Robust Time-Bound Hierarchical Key Assignment Scheme,” International Journal of Future Computer and Communication, Vol. 3, No. 5, October, 2014, pp. 337-340.
- Lin, I.C., Lin, C.H., Hsu, C.L.*, Roan, J.S., Yeh, Y.T., and Yeh, J.S., “On nursing staff's usage behavior and intention stability: An empirical study of a nursing information system,” The Journal of Nursing Research (Accepted), 2014. <SSCI/SCI: 0.844 (2013), 68/106 in NURSING>
- Lin, C.h., Lin, I.C.*, Roan, J.S., Huang, W.M, and Hsu, C.L., “Explaining physicians' attitude to a new healthcare information technology: adoption and resistance perspectives,” International Journal of Medical Informatics. <SCI: 2.716 (2013), 13/135 in COMPUTER SCIENCE, INFORMATION SYSTEMS> (Under Reviewer)
二、國內學術期刊論文
1. 許建隆、吳宗成,“簽章加密法(signcryption)及其應用”,資訊安全通訊,第四卷,第二期,八十七年,頁20-29。
2. 吳宗成、黃孝慈、許建隆,“具金鑰交換的群體導向鑑別機制之遞迴式協定設計”,電腦學會通訊IICM,第二卷,第三期,八十九年,頁21-30。
3. 吳宗成、蔡國裕、楊松諺、許建隆,“具自我驗證的網頁標記系統實作”,資訊安全通訊,第八卷,第四期,九十一年,九月,頁46-58。
4. 林育梨、吳宗成、許建隆,“具權限控管及防止不當洩密之數位鑑識作業程序”,資訊安全通訊,第十三卷,第三期,九十六年,頁49-59。
5. 許建隆、呂崇富,“安全電子藥籤系統之設計”,資訊安全通訊,第14卷,第4期,九十七年,頁107-128。
6. 曾俊儒、許建隆、劉卜誠,“智慧型醫材臨床測試專案管理系統之應用”,台灣職能治療研究與實務雜誌,第5卷,第1期,九十八年,頁65-76。
7. 許建隆、林燕卿、曾俊儒,“具安全與隱私保護之即時互動健康照護平台”,台灣職能治療研究與實務雜誌,第5卷,第2期,九十八年,頁157-171。
三、學術會議論文
A. EI等級之學術研討會論文
- Lin, Y.L., Wu, T.C., Hsu, C.L. (通信作者), and Chou, Y.C., “Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics,” 2007 Future Generation Communication and Networking, Vol. 2, Jeju-Island, Korea, December 6-8th, 2007, pp.154-158. <EI>
- Lin, Y.L., Hsu, C.L. (通信作者), Wu, T.C., Yen, S.L., and Tseng, C.L., “Secure Key Management Scheme for Hierarchical Access Control Based on ECC,” 2009 IEEE International Carnahan Conference on Security Technology, Zürich, Switzerland, October 5-8th, 2009, pp.335-338. <EI>
- Hsu, C.L. (通信作者), Chuang, Y.H., He, W.H., Yen, S.L., Tseng, C.L., and Chen, J.W., “Security of Generalized Signature Scheme Based on Discrete Logarithms and Factorization,” 2009 IEEE International Carnahan Conference on Security Technology, Zürich, Switzerland, October 5-8th, 2009, pp.245-247. <EI>
- Tseng, K.C. (通信作者) and Hsu, C.L., “IRB System for Assisting the Development of Intelligent Medical Devices,” 2009 IEEE International Conference on Industrial Engineering and Engineering Management, Hong Kong, December, 2009, pp. 1022-1026. <EI>
- Hsu, C.L. (通信作者), Lin, Y.L., Wu, T.C., and Su, C.H., “Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations,” 2010 Future Generation Communication and Networking, Vol. 119, Jeju-Island, Korea, December 13-15th, 2010, pp.23-36.<EI>
- Tseng, K. C. (通信作者), Hsu, C.L., and Chuang, Y.H., “A Telehealthcare System to Care for Older People Suffering from Metabolic Syndrome,” HCI International 2011, Orlando, Florida, USA, July 9-14th, 2011.
- Hsu, C.L. (通信作者), Tseng, K. C., Tseng, C.L., and Chen, C.H., “Design and Development a Social Networks Platform for Older People,” HCI International 2011, Orlando, Florida, USA, July 9-14th, 2011.
- Hsu, C.L. (通信作者), and Lee, M.R., “User Acceptance of a Community-Based Healthcare Information System Preserving User Privacy,” HCI International 2013 (Accepted), Las Vegas, Nevada, USA, July 21-16th, 2013.
B. 一般學術研討會論文
- Wu, T.C., Hsu, C.L., and Wu, T.S., “Authentication-Based Group-Oriented Conference Key Distribution System,” 1997分散式系統技術及應用研討會, Taiwan, May, 1997, pp. 666-672.
- 吳宗成、何煒華、吳宗杉、許建隆,“適用於網際網路EDI之密碼學探討”,1998網際網路應用論壇—產業標準之競爭、整合與應用,台灣,1998,頁15-30。
- 吳宗成、許建隆、鍾振華,“適用於電子商務應用之具自我驗證金鑰交換與會議金鑰分配協定”,1999網際網路應用論壇—電子商務產業標準之競爭、整合與應用, 1999,頁57-70。
- Hsu, C.L., Wu, T.C., and He, W.H., “Attacks on the Signature Scheme Based on Discrete Logarithm without Using One-Way Hash Function,” Proceedings of the Ninth National Conference on Information Security, 1999, pp. 173-175.
- Hsu, C.L., Wu, T.S., and Wu, T.C., “Comments on Efficient Group Signature Scheme Based on Discrete Logarithm,” Proceedings of the Tenth National Conference on Information Security, 2000, pp. 1-3.
- Hsu, C.L. and Wu, T.C., “Group-Oriented Signature by Discretionary Signatories with Document Division,” Proceedings of the Tenth National Conference on Information Security, 2000, pp. 13-21.
- Hsu, C.L. and Wu, T.C., “Insider Forgery Attacks on Wang-Lin-Chang Threshold Signature Schemes with Traceable Signers,” Proceedings of the 2000 International Computer Symposium Workshop on Cryptography and Information Security, 2000, pp. 43-45.
- Wu, T.C., Hsu, C.L., and Lin, C.Y., “On the Security of Burmester et al.’s Structured ElGamal-Type Multisignature Scheme,” Proceedings of the Eleventh National Conference on Information Security, 2001, pp. 349-352.
- Hsu, C.L., Wu, T.S., and Wu, T.C., “Improvement of ElGamal-Like Digital Signature and Multisignature Schemes Using Self-Certified Public Keys,” Proceedings of the Eleventh National Conference on Information Security, 2001, pp. 61-65.
- Wu, T.C., Lin, Y.L., and Hsu, C.L., “A Cryptographic Key Assignment Scheme for Access Control in Dynamic Organizations,” Proceedings of the Twelfth National Conference on Information Security, 2002, pp. 49-58.
- Wu, T.S., Hsu, C.L., Kao, S.H., and Hwang, Y.F., “Cryptanalysis and Improvement of Nyberg and Rueppel’s Identity-Based Public Key Systems,” Proceedings of the Twelfth National Conference on Information Security, 2002, pp. 159-161.
- Wu, T.C., Hsu, C.L., and Tsai, K.Y., “Anonymous Proxy Authenticated Encryption Scheme for Group-Oriented Applications,” Proceedings of the Thirteenth National Conference on Information Security, 2003, pp. 74-82.
- Wu, T.S., Hsu, C.L., Lin, H.Y., and Kao, S.H., “Cryptanalysis on Wu-Chang Cryptographic Key Assignment Scheme for Hierarchical Access Control,” Proceedings of the Thirteenth National Conference on Information Security, 2003, pp. 63-65.
- Hsu, C.L., Wu, T.S., and Li, M.J., “Universal Forgery Attack on the Xia-You Group Signature Scheme with Strong Separability,” 第五屆2003年「網際空間:資訊、法律與社會」學術研究暨實務研討會, Taiwan, 2003, pp. 88-92.
- Hsu, C.L., Wu, T.S., Li, M.J., and Shiu, M.J., “Forgery Attack on Improved Group Signature Scheme,” Proceedings of National Computer Symposium 2003, Taiwan, 2003.
- Wu, T.C., Hsu, C.L., and Tsai, K.Y., “Authenticated Encryption Schemes with Proxy Verification for e-Business Environments,” Proceedings of the Fourteenth National Conference on Information Security, Taiwan, 2004, pp. 201-210.
- Hsu, C.L. and Liu H.C., “Robust User Friendly Remote Mutual Authentication Scheme with Smart Cards,” Cyberspace 2004網際空間:資安、犯罪與法律社會學術研究暨實務研討會, Taiwan, 2004, pp. 196-203.
- Hsu, C.L., Wu, T.S., and Lin, H.Y., “Efficient Convertible Authenticated Encryption Schemes for Smart Card Applications in Network Environments,” 9th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2005), Orlando, Florida, USA, 2005, pp. 13-18.
- Chen, W.H. and Hsu, C.L., “Secure Group Communication Schemes for Sensor Networks,” International Conference on Systems and Signals (ICSS 2005), Taiwan, 2005.
- Wu, T.C., Chang, L.P., and Hsu, C.L., “A Supervising Authenticated Encryption Scheme for Group Oriented Applications,” Proceedings of the Fifteenth National Conference on Information Security, Taiwan, 2005.
- Hsu, C.L., Liu, H.C., and Chou, M.T., “Remote Mutual Authentication with Key Agreement Based on Smart Cards,” Conference on Digital Contents Management and Applications 2005 (CDMA 2005), Taiwan, 2005, pp. 583-593.
- Hsu, C.L. and Chuang, Y.H., “A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks,” Conference on Digital Contents Management and Applications 2005 (CDMA 2005), Taiwan, 2005, pp. 530-539.
- Hsu, C.L. and Tsai, P.L., “Cryptanalysis of Threshold-Proxy Threshold-Signature Schemes,” Medical Informatics Symposium in Taiwan 2005 (MIST 2005), Taiwan, 2005.
- Hsu, C.L., Chuang, Y.H., and Ma, K.C., “Authentication Protocol with Patient Privacy for Medical Information System,” Medical Informatics Symposium in Taiwan 2005 (MIST 2005), Taiwan, 2005, pp. 49-53.
- Hsu, C.L. and Tsai, P.L., “Cryptanalysis of Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Function,” Cyberspace 2005: CyberSecurity, CyberCrime, and CyberLaw, 2005, pp. 312-316.
- Hsu, C.L. and Chuang, Y.H., “Existential Forgery Attack on Digital Signature Scheme without Using One-Way Hash Functions and Message Redundancy Schemes,” 資訊管理學術曁警政資訊實務研討會-二十一世紀資訊科技與犯罪偵防, Taiwan, 2006, pp. 1-5.
- 馬國銓,許建隆,“具隨選、分級訂閱與洩密者追蹤服務之廣播加密法”,第十七屆全國資訊安全會議,台灣,2007,頁251-259。
- Hsu, C.L., Tsai, P.L., and Chu, C.W., “Self-Certified Proxy Signcryption Schemes from Pairings,” 第十七屆全國資訊安全會議, Taiwan, 2007, pp. 105-114.
- Hsu, C.L. and Chen, C.H., “A Security and Privacy Preserving e-Prescription System Based on Smart Cards,” The Second International Conference on Operations and Supply Chain Management (ICOSCM 2008), Taiwan, 2008, pp. 73-80.
- Hsu, C.L., Chuang, Y.H., and Tsai, K.Y., “Novel Non-Interactive Deniable Authentication Protocol,” The 3rd Joint Workshop on Information Security (JWIS 2008), Seoul, Korea, 2008, pp. 1-9.
- Chang, L.P., Wu, T.C., and Hsu, C.L., “Efficient Date-Attachment Scheme for Secure Electronic Cash Payment System,” The 3rd Joint Workshop on Information Security (JWIS 2008), Seoul, Korea, 2008, pp. 1-8.
- 盧法昌,吳秋玲,曾俊儒,許建隆,劉卜誠,“專案管理系統輔助醫材檢測流程案例之應用與分析”,2008中華民國設計學會第13屆設計學術研究成果研討會,台灣,2008。
- 許建隆,周彥均,“兼具安全與效率之特定驗證者簽章方法”,第十八屆資訊安全會議(CISC 2008),2008,頁136-151。
- Hsu, C.L., Tsai, P.L., and Chou, Y.C., “Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Function,” 2008 International Computer Symposium, Taiwan, April, 2008.
- Hsu, C.L., Chuang, Y.H., and Tsai, K.Y., “Secure and Efficient Non-Interactive Deniable Authentication Protocol from Pairings,” 2009 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology, Singapore, 2009, pp. 552-560.
- Hsu, C.L., Chung, C.G., and Lee, M.R., “Development and Promotion of Interdisciplinary Education for Emerging Technologies – the Case of CGU RFID Program,” 2009 ASME Asia-Pacific Engineering Education Congress, Taiwan, April, 2009.
- Hsu, C.L., Wu, T.C., Y.H., and Tsai, K.Y., “Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes,” 2010 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology, Macau, China, 2010, pp. 46-62.
- Hsu, C.L., Chuang, Y.H., Tseng, K.C., and Liu, P.C., “Secure Communication Protocol with User Privacy for a Home Healthcare System,” The 4th International Symposium on Medical Information and Communication Technology, Taiwan, 2010.
- Hsu, C.L., Lin, Y.L., and Wu, T.S., “Improved Time-Bound Hierarchical Key Assignment Scheme,” 2011 e-CASE & e-Tech International Conference, Tokyo, Japan, 2011, pp. 3259-3267.
- Tsai, K.Y., Wu, T.C., Hsu, C.L., and Martin, K., “Provably Secure Concurrent Multisignature with Document Decomposition,” 第二十屆全國資訊安全會議 (榮獲會議最佳論文)
- 許建隆、陳建仁、林子煒、詹宜勳,“適用於多重伺服器環境之可鑑別金鑰交換協定”, 2010聯合國際研討會 Cyber 2010,台北,2010。
- Hsu, C.L., Chan, Y.S., and Lin, T.W., “Security Analysis of an eSeal used in Taiwan Customs Officials,” 2011 IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS), Tainan, 2011, pp. 668-675.
- Lu, C.F., Lin, Y.L., and Hsu, C.L., “Password-based Authenticated Multi-Party key Exchange Scheme with Privacy Preservation,” 2012 e-CASE & e-Tech International Conference, Hong Kong, 2012, pp. 845-853.
- Lu, C.F., Hsu, C.L., Yen, Y.C., Tsai, K.Y., and Wu, T.S., “Password-Authenticated Key Exchange with Privacy Preservation for Mobile Environment,” 2012 e-CASE & e-Tech International Conference, Hong Kong, 2012, pp. 1545-1550.
- Hsu, C.L., and Lai, K.W., “An Online RFID Protocol with Secure Ownership Transfer,” WebTech 2012, Bali, Indonesia, 2012, pp. 92-97.
- Hsu, C.L., Lin, T.W., and Lin, Y.L., “Authenticated Group Key Agreement Protocol Based on Chebyshev Chaotic Map,” e-CASE & e-Tech 2013, Kitakyushu, Japan, 2013, pp. 195-205.
- Hsu, C.L., and Lin, T.W., “Password Authenticated Key Exchange Protocol for Multi-Server Mobile Networks Based on Chebyshev Chaotic Map,” The Ninth International Workshop Mobile Peer-to-Peer Computing (MP2P'13), San Diego, USA, 2013, pp. 90-95.
四、其他著作
- 許建隆,“數位簽章”,中央研究院計算中心通訊,第十六卷,第九期,八十九年,頁68-72。
- 許建隆,“網路駭客DDos攻擊”,中央研究院計算中心通訊,第十六卷,第二十期,八十九年,頁158-161。
- 許建隆,“藍芽科技”,中央研究院計算中心通訊,第十八卷,第二十三期,九十一年,頁182-184。
- 許建隆,“PDA行動通訊安全”,中央研究院計算中心通訊,第十九卷,第一期,九十二年。
- 許建隆,“藍芽與無線區域網路IEEE 802.11安全性之比較”,中央研究院計算中心通訊,第十九卷,第五期,九十二年。
- 許建隆,“助人最樂,淑世為榮-資管課輔隊之社會關懷實作報導”,長庚大學第53期校訊,九十五年
- 許建隆,吳文傑,“『親親我的寶貝親子愛心園遊會』~本校資管系社會關懷課程活動概況”,長庚大學第57期校訊,九十五年。
- 許建隆、何煒華,“亞洲資訊安全能量調查報告”,TWISC,九十五年。
- 許建隆,“中國資訊安全能量調查報告”,TWISC,九十七年。
- 張淑滿,施大偉,林俊逸、許建隆,“社會關懷十週年紀念冊”,長庚大學資訊管理系,九十九年。
- 許建隆、莊閎名,“適用於雲端運算環境之聯合匿名身分管理機制”,第11屆台塑關係企業應用技術研討會,一○二年。
五、學位論文
- 1. 許建隆,“依檔分割任意委派簽署者之群體簽章技術”,國立台灣科技大學資訊管理系碩士論文,八十六年五月。2. 許建隆,“適用於群體導向應用之鑑別加密法”,國立台灣科技大學資訊管理系博士論文,九十一年一月。
六、專書
- 許建隆、楊松諺,“密碼學實務”,碁峰資訊股份有限公司,九十四年。(ISBN 986-421-617-1)
- 許建隆,“SSL與TLS實務應用-架構全球網路的安全機制”,碁峰資訊股份有限公司,九十四年。(ISBN 986-421-607-4)
- 陳昱仁、廖耕億、許建隆、林仲志,“RFID概論”,華泰文化事業股份有限公司(ISBN 957-609-768-3),九十八年。
- 馬成珉、林金祥、白恭瑞、廖耕億、許建隆、陳世民、林裕勛,“RFID資訊系統開發設計”,華泰文化事業股份有限公司,一○○年(ISBN 978-957-609-835-2)。
- 陳昱仁,廖耕億,許建隆,林仲志,“RFID概論二版”,華泰文化事業股份有限公司(ISBN 978-957-609-891-8),一○一年。