期刊論文 1. H.T.
Yeh, B.C. Chen, C.T. Yang, and P.L. Weng, "New Navigation System
Combining QR-Code and Augmented Reality," Journal of Internet
Technology, Vol. 19, No. 2, Mar. 2018, pp. 565-571. 2. C.T.
Yang, H.T. Yeh, B.C. Chen, and G.X. Jian, "Automatic tunable
deployment for real-time strategy games," Engineering Computations,
Vol. 34, No. 2, Apr. 2017, pp. 239-250. 3. C.T.
Yang, B.C. Chen, H.T. Yeh, and G.X. Jian,"A Study on Smart Deployment
for Real-Time Strategy Games," Advances in Intelligent Systems and
Computing, Vol. 535, Jan. 2017, pp. 185-190. 4. B.C.
Chen, C.T. Yang, H.T. Yeh, and C.C. Lin, “Mutual Authentication Protocol for
Role-Based Access Control Using Mobile RFID,“Applied Sciences, Vol. 6, No. 8,
Aug. 2016. 5. H.T.
Yeh, B.C. Chen, B.X. Wang, “ A City Parking Integration System
Combined with Cloud Computing Technologies and Smart Mobile Devices,“ Eurasia
Journal of Mathematics, Science & Technology Education, Vol. 12, No. 5,
May. 2016. 6. B.C.
Chen, H.T. Yeh, and T.S. Yu, “ The Construction of Integrated Online
Ticketing Systems,“ Journal of Internet Technology, Vol. 17, No. 3, May.
2016, pp. 551-558. 7. 陳炳彰、吳權勳, “結合近端通訊系統之線上遊戲帳號驗證機制,” 資訊、科技與社會學報, Vol. 13, No. 1, Dec. 2013, pp. 35-48. 8. H.T.
Yeh, B.C. Chen, and Y.C. Wu, “Mobile User Authentication System in Cloud
Environment,” Security and Communication Networks, Vol.
6, Issue 9, Sep. 2013, pp. 1161-1168. (SCI) 9. B.C.
Chen and H.T. Yeh, “Secure proxy signature schemes from the Weil
pairing,” Journal of Supercomputing, Vol.
65, Issue 2, Aug. 2013, pp. 496-506.(SCI) 10. B.C.
Chen, H.T. Yeh, and W.C. Chen,“The Secure Mechanism of Tracking Location System
on Healthcare,” Advances in Information Sciences and
Service Sciences (EI), Vol. 5, No. 9, May 2013, pp.760-767. 11. H.T.
Yeh, B.C. Chen, and M.C. Tsai, “Network Security Architecture Combined Netflow
with Cooperative Firewall,” Advances in Information Sciences and
Service Sciences (EI), Vol. 5, No. 9, May 2013, pp.819-827. 12. 陳炳彰、余宗憲, “複合式行動票券之系統建置,” 資訊傳播研究, Vol. 3, No. 2, April 2013, pp. 47-60. 13. B.C.
Chen and H.T. Yeh, “A Fair and Secure Key Escrow Scheme under
Diverse Transmission Circumstances with Lawful Investigation,” ICIC Express Letters, Volume
6, No. 10, Oct. 2012, pp. 2637-2647. (EI) 14. B.C.
Chen, “Provably Secure Threshold Signature Scheme Based
on Factoring,” International Journal of Future Computer
and Communication, Volume 1, No. 2, Aug. 2012, pp. 151-154. 15. B.C.
Chen, “Provably Secure Threshold Signature Scheme Based
on Factoring, ” International Journal of Future Computer
and Communication , Volume 1, No. 2, Aug. 2012, pp. 151-154. 16. H.M.
Sun and B.C. Chen, “Secure Key Agreement Protocols for Three-Party
against Guessing Attacks,” Journal of Systems and Software, Vol. 75,
Issue 1-2, 2005, pp. 63-68.(SCI) 17. H.M.
Sun, B.C. Chen, and H.T. Yeh, “On the design of time-stamped signatures,” Journal of Computer and System Sciences,
Vol. 68, 2004, pp. 598-610.(SCI) 18. H.T.
Yeh, H.M.Sun, C.T. Yang, B.C. Chen, and S.M. Tseng, “Improvement of Password Authenticated Key
Exchange Based on RSA for Imbalanced Wireless networks,” IEICE Transactions on Communications, Vol.
E86-B, No. 11, Nov. 2003, pp. 3278-3282.(SCI) 19. H.M.
Sun, B.C. Chen, and T. Hwang, “Cryptanalysis of group signature scheme using
self-certified public keys, ” Electronics Letters , Volume
35, Issue 22, 28 Oct. 1999, pp. 1938-1939.(SCI)
研討會論文 <國際研討會> 1. B.C.
Chen, C.T. Yang, H.T. Yeh, and C.C. Lin, "The Design of RBAC Mutual
Authentication Protocol Using Mobile RFID," 2016 The International
Conference on Applied System and Innovation, Okinawa, Japan, June 2016. 2. B.C.
Chen, C.T. Yang, H.T. Yeh, and Y.D. Lin, "The Custom-Oriented Fair Electronic
Payment System," 2015 The fouth International Conference on
Innovation, Communication and Engineering, 中國湖南, Oct. 2015. 3. C.T.
Yang, H.T. Yeh, B.C. Chen, and G.X. Jian, "Automatic Tunable Deployment for Real-Time
Strategy Games," 2015 The fouth International Conference on
Innovation, Communication and Engineering, 中國湖南, Oct. 2015. 4. H.T.
Yeh, B.C. Chen, C.T. Yang, and P.L. Weng, "The Cloud Guide System Combined QR-Code
with Augmented Reality," 2015 The fouth International Conference on
Innovation, Communication and Engineering, 中國湖南, Oct. 2015. 5. B.C.
Chen, H.T. Yeh, and C.C. Wang," The RFID Authentication Mechanism and
Ownership Transfer Protocols for Supply Chain," 2015 The International Conference on
Applied System and Innovation, Osaka, Japan, May 2015. 6. H.T.
Yeh, B.C. Chen, and B.X. Wang," A City Parking Integration System with
Smart Mobile Devices," 2015 The International Conference on
Applied System and Innovation, Osaka, Japan, May 2015. 7. B.C.
Chen, H.T. Yeh, and T.H. Yu," Incorporating the Use of QR Codes with
Integrated Online Ticketing Systems," 2014 The 3rd International Conference on
Innovation, Communication and Engineering, 中國貴陽, May 2015. 8. H.T.
Yeh, B.C. Chen, and M.C. Cheng," User Authentication of Smart Mobile
Devices and Cloud Storage Service," 2014 The 3rd International Conference on
Innovation, Communication and Engineering, 中國貴陽, May 2015. 9. 陳炳彰、吳權勳,"NFC手機在互動式多媒體機器之應用", 資訊傳播暨創意創作國際學術研討會,台灣台南,2012年11月。 10. 陳炳彰、余宗憲,"結合QR Code 的複合式行動票券應用", 資訊傳播暨創意創作國際學術研討會,台灣台南,2012年11月。 11. B.C.
Chen," Provably Secure Threshold Proxy Signature Scheme
Based on Factoring," 2012 International Conference on Advancements
in Information Technology, Hong Kong, June 2012. 12. B.C.
Chen," A Fair and Secure Key Escrow Scheme under
Diverse Transmission Circumstances with Lawful Investigation," 2012 International Conference on Security
Science and Technology, Hong Kong, March 2012. 13. 陳炳彰、高順民,"探究具有Google Android平台的智慧型手持裝置與部落格結合之行動離線式軟體系統架構", 2010聯合國際研討會,台灣台北,2010年11月。 14. 陳炳彰、王澤強,"Mobile RFID 供應鏈所有權安全轉移",2010多媒體傳播科技應用國際研討會,台灣台南,2010年10月。 15. B.C.
Chen," THE CONSTRUCTION OF A TRACKING LOCATION SYSTEM
AND ITS SECURE MECHANISM USING RFID," International Conference on Business And
Information 2010, Kitakyushu, Japan, July 2010. 16. 陳炳彰,張耀升,"運用監控工具與入侵偵測於即時通訊以防治蠕蟲之設計",2009資訊科技國際研討會,台灣台中,2009年4月。 17. 陳炳彰、陳椀君,"RFID運用於醫護人員追蹤定位與安全機制之研究",2009兩岸三地 RFID科技暨產業應用研討會,台灣台北,2009年1月。 18. B.C.
Chen and H.M. Sun," A New Provably Secure Proxy Signature Scheme
Based on Factoring," The 3rd Joint Workshop on Information Security,
Souel, Korea, July 2008, pp. 473-483. 19. 陳炳彰、陳椀君,"RFID導入於醫護人員追踨定位之運用",第十九屆國際資訊管理學術研討會,台灣南投,2008年5月。 20. H.M.
Sun, C.T. Yang, B.C. Chen, and H.T. Yeh," Enhanced Mutual Authentication Scheme for the
Virtual Home Environment in 3G Mobile Network," Proceedings of the 14th National
Conference on Information Security, Taiwan, May 2004. 21. H.M.
Sun, B.C. Chen, and C.H. Chen," A Fair and Secure Key Escrow Scheme," Proceedings of the 13th National
Conference on Information Security, Taiwan, May 2003. 22. H.M.
Sun, B.C. Chen, H.T. Yeh, and S.H. Liu," On the Design of Time-Stamped Signatures," Proceedings of the 12th National
Conference on Information Security, Taiwan, May 2002, pp.77-87. 23. B.C.
Chen, H.M. Sun, and T. Hwang," An Improved Group Signature Scheme Using Proxy
Provers," Proceedings of the 11th National
Conference on Information Security, Taiwan, May 2001, pp.55-65. 24. B.C.
Chen, H.M. Sun, and T. Hwang," Four-Party Encrypted Key Exchange," Proceedings of the 2000 ICS: Workshop on
Cryptography and Information Security, Taiwan, pp. 16-19. <國內研討會> 1. 陳炳彰、吳權勳,"結合近端通訊系統之電信小額付款認證機制",第二十三屆全國資訊安全會議,台灣台南,2013年5月。 2. 陳炳彰、王澤強,"運用Mobile RFID 之供應鏈安全認證及權限轉移機制",2010資訊科技應用及管理研討會,台灣高雄,2010年6月。 3. 陳炳彰、林德順,"植基於LVS 叢集技術結合即時通訊API 之APMS 系統",ICDC 2009數位內容學術研討會,台灣桃園,2009年12月。 4. 陳炳彰,林青照,"Mobile RFID結合RBAC雙向認證之圖書館館藏作業流程",2009資訊服務與應用創新學術研討會,台灣台北,2009年12月。 5. 陳炳彰,王士偉,"具可回復的數位版權管理系統",2009 資訊安全技術創新應用研討會,台灣台北,2009年12月。 6. 陳炳彰、林鈺棟,"改良應用在智慧卡上前向安全的使用者認證機制",EITS2009數位教學暨資訊實務研討會,台灣台南,2009年1月。 7. 陳炳彰、林德順,"以即時通訊API建構主動式發佈訊息系統之研究",ICDC 2008數位內容學術研討會,台灣桃園,2008年12月。 8. 陳炳彰、陳椀君,"結合RFID 與無線行動設備改善傳統門診流程之機制",2008數位科技與創新管理研討會,台灣台北,2008年6月,1197-1206頁。 9. 陳炳彰,張耀升,"具有可追蹤攻擊者的網路式入侵偵測系統",2008數位科技與創新管理研討會,台灣台北,2008年6月,1648-1655頁。 10. 陳炳彰、林鈺棟,"一個以隨機亂數為基礎之伺服器無驗證表驗證機制",2008數位科技與創新管理研討會,台灣台北,2008年6月,1683-1691頁。 |