李榮三

特聘教授


學歷

  • 中正大學 資訊工程學系 博士
  • 中正大學 資訊工程學系 學士

專長

  • 無線通訊
    Wireless Communications
  • 資訊安全
    Information Security
  • 電子商務
    E-Commerce
  • 密碼學
    Cryptography
  • 數位影像處理
    Image Processing
  • 區塊鏈技術與應用
    Blockchain technique and its application

校內經歷

  • 校務企劃組 組長
  • 系統維運組 組長
  • 資源管理中心 主任
  • 資訊工程學系 副教授
  • 資訊工程學系 助理教授
  • 資訊工程學系 教授
  • 資訊工程學系 特聘教授
  • 資訊工程學系 系主任
  • 資訊教學中心 主任
  • 資通安全研究中心 主任
  • 資通安全研究中心 副主任
  • 逢甲大學帆宣智慧城市5G實驗室 研究員

校外經歷

論文及參與計畫

  1. Lee, J.S., Fan, Y.Y., Cheng, C.H, Chew, C. J., and Kuo, C.W.*, "ML-based Intrusion Detection System for Precise APT Cyber-clustering," Accepted byComputers & Secuirty, 000, 2024-11. (SCIE)
  2. Fan, Y.Y., Kuo, C.W., Chen, T.H., Chang, C.H., and Lee, J.S.*, "An authorization transfer protocol for confidentiality preserving in public access devices," Accepted byJournal of Internet Technology, 000, 2024-07. (SCIE)
  3. Chew, C. J., Lee, W.B., Chen, T.H., Lin I.C., and Lee, J.S.*, "Log Preservation in Custody Dual Blockchain with Energy Regime and Obfuscation Shuffle," IEEE Transactions on Network Science and Engineering, vol. 11, no. 4, pp. 3495-3511, 2024-07. (SCIE)
  4. Chew, C. J., Lin, Y. C., Chen, Y. C., Fan, Y.Y., and Lee, J.S.*, "Preserving Manipulated and Synthetic Deepfake Detection through Face Texture Naturalness," Journal of Information Security and Applications, vol. 83, pp. 1-10, 2024-06. (SCIE)
  5. Chew, C. J., Lee, W. B., Sung, L. Z., Chen, Y. C., Wang, S.J., Lee, J.S.*, "Lawful Remote Forensics Mechanism with Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5956-5970, 2024-06. (SCIE)
  6. Fan, Y.Y., Chew, C. J., Hong, W. Z., Chen, Y. C., Lee, J.S.*, "Blockchain-based pipeline custody system (BPCS) for preserving critical video evidence," Journal of Internet Technology, vol. 25 no. 3, pp. 447-454, 2024-05. (SCIE)
  7. Yu-Jen Chen, Chien-Lung Hsu, Tzu-Wei Lin, Jung-San Lee*, "Design and Evaluation of Device Authentication and Secure Communication System with PQC for AIoT Environments," Electronics, 10.3390/electronics13081575, 2024-04. (SSCI,SCIE)
  8. Chen, T.H., Chew, C. J., and Lee, J.S.*, "Preserving Privacy and Traceability in Car-sharing Blockchain based on Attribute Cryptosystem," Journal of Internet Technology, vol. 25, no. 2, pp. 175-184, 2024-03. (SCIE)
  9. Chew, C. J., Wang, P.Y., and Lee, J.S.*, "Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination," KSII Transactions on Internet and Information Systems, vol. 17, pp. 2529-2549, 2023-09. (SCIE)
  10. Lee, J.S., Chen, Y. C., Chew, C. J., Hong, W. Z., Fan, Y.Y., Li, B., "Constructing Gene Features for Robust 3D Mesh Zero-watermarking," Journal of Information Security and Applications, vol. 73, 2023-03. (SCIE)
  11. Lee, J.S., Chen, Y. C., Hsieh, Y.H., Chang, S.H., and Huynh, N .T., "Preserving friendly stacking and weighted shadows in selective scalable secret image sharing," Multimedia Tools and Applications, vol. 82, pp. 29283–29305, 2023-02. (SCIE)
  12. Wu, W.C., Chew, C. J., Chen, Y. C., Wu, C.H., Chen, T.H., and Lee, J.S*., "Blockchain-based WDP Solution for Real-time Heterogeneous Computing Resource Allocation," IEEE Transactions on Network and Service Management, vol. 19, no. 4, pp. 3810-3821, 2022-12. (SCIE)
  13. Lee, J.S., Chen, Y. C., Chew, C. J., Chen, C.L., Huynh, T.N., and Kuo, C.W.*, "CoNN-IDS: Intrusion Detection System based on Collaborative Neural Networks and Agile Training," Computers & Security, vol. 122, pp. 1-13, 2022-11. (SCIE)
  14. Lee, J.S., Fan, Y.Y., Lee, H.Y., Yong, G.W., and Chen, Y. C., "Image dehazing technique based on sky weight detection and fusion transmission," Journal of Internet Technology, vol. 23, no. 5, pp. 967-980, 2022-09. (SCIE)
  15. Lee, J.S., Chew, C.J. , Liu, J.Y., Chen, Y.C., and Tsai, K.Y., "Medical Blockchain: Data Sharing and Privacy Preserving of EHR based on Smart Contract," Journal of Information Security and Applications, vol. 65, pp. 1-14, 2022-03. (SCIE)
  16. Chew, C. J., Chen, Y. C, Lee, J.S.*, Chen, C. L., and Tsai, K. Y., "Preserving Indomitable DDoS Vitality through Resurrection Social Hybrid Botnet," Computers & Security, vol. 106, 2021-07. (SCIE)
  17. Cheng, T.F., Chen, Y.C., Song Z.D., Tu, H. N., and Lee, J.S*.,, "Secure Session between an IoT Device and a Cloud Server based on Elliptic Curve Cryptosystem," International Journal of Information and Computer Security, vol. pp. 67-87, 2021-05. (EI)
  18. Lee, J.S., Liu, C., Chen, Y. C., Hong, W. Z., and Li, B., "Robust 3D Mesh Zero-watermarking based on Spherical Coordinate and Skewness Measurement," Multimedia Tools and Applications, vol. 80, pp. 25757–25772, 2021-04. (SCIE)
  19. Lee, J.S., Chew, C. J., Chen, Y. C, and Wei, K. J., "Preserving Liberty and Fairness in Combinatorial Double Auction Games based on Blockchain," IEEE Systems Journal, vol. 14, pp. 1-11, 2020-10. (SCIE)
  20. Hong, W.C. Yang, R. K., Chen, Y. C, Li, B., and Lee, J.S., "Efficient Peer-to-Peer E-Payment based on Asynchronous Dual Blockchain," Journal of Internet Technology, vol.21, no. 5, 1375-1385, 2020-10. (SCIE)
  21. Hong, W.C. Huang, D. Y., Chen, C. L, and Lee, J.S., "Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks," IEEE Access, DOI: 10.1109/ACCESS.2020.3007609, 2020-07. (SCIE)
  22. Lee, J.S., Chen, Y. C, Hong, W.C., Yang, R. K., and Lee, K.Y., "Reputation-oriented electronic micro-loaning based on smart contracts in a solidarity group," Journal of Internet Technology, vol. 21, no. 4 , pp. 1073-1085, 2020-03. (SCIE)
  23. Chou, Y. C, Nien, Y. W, and Chen, Y. C., Li, B., Lee, J.S.*, "Learning Salient Seeds Refer to the Manifold Ranking and Background-Prior Strategy," Multimedia Tools and Applications, vol.79, pp. 5859-5879, 2020-03. (SCIE)
  24. Chen, C.L., Wei, K.J., Chen, Y.C., and Lee, J.S., "Zero-day Intrusion Detection System based on Dual Neural Network and Aggregation Mechanism," Communications of the Chinese Cryptology and Information Security Association, vol. 26, no. 1 , pp. 8-24, 2020-02. (ECONLIT)
  25. Bui, Q.A., Lee, W.B., Lee, J.S.*, Wu, H.L., and Liu, J.U.,, "Biometric-based key management for satisfying patient’s control over health information in the HIPAA regulations," KSII Transactions on Internet and Information Systems, vol. 14, no. 1, pp. 437-453, 2020-01. (SCIE)
  26. Lee, J.S., Chen, Y. C, Kang, Y. H, and Yang, R. K., "Preserving Privacy and Fairness for an Innovative E-Commerce Model: Penny M-lottery," Journal of Internet Technology, vol. 20, no. 5, pp. 1387-1400, 2019-10. (SCIE)
  27. Chen, Y.C., Wei, K.J., Lee, J.S., Tu, H. N., and Lin, J.H.,, "AAVSS: Auxiliary Authorization Mechanism based on Arbitrary-Angle VSS," International Journal of Network Security, vol.21, no. 4, 2019-07. (EI,ECONLIT)
  28. Lee, J.S., Li, C. H., and Lee, H. Y., "Visibility dehazing based on channel-weighted analysis and illumination tuning," Multimedia Tools and Applications, vol. 78, no. 2, pp. 1831-1856, 2019-01. (SCIE)
  29. Chen, Y.C., Lee, J.S., and Su, H.C., "Selective scalable secret image sharing with adaptive pixel-embedding technique," Multimedia Tools and Applications, vol. 77, no. 20, pp. 27107-27121, 2018-10. (SCIE)
  30. Lee, J.S. and Wang, Y.H., "DNT-based Image Illumination Refinement System with Concurrent Copyright Embedding," Journal of Testing and Evaluation, vol. 46, no. 5, pp. 2151-2170, 2018-09. (SCIE)
  31. Lee, J.S., Su, H.C., and Wei, K.J., "Refining irregular image illumination with concurrent ownership embedding," Multimedia Tools and Application, vol. 77, no. 15, pp. pp. 19851-19868, 2018-08. (SCIE)
  32. Lee, J.S., "An Effective Preprocessor of Edge Detection for Distorted Images," Journal of Testing and Evaluation, vol. 45, no. 4, 2017-07. (SCIE)
  33. Lee, J.S., Huang, B.R., and Wei, K.J., "Preserving copyright in renovating large-scale image smudges based on advanced SSD and Edge confidence," Optik - International Journal for Light and Electron Optics, vol. 140, pp. 887-899, 2017-07. (SCIE)
  34. Lee, J.S. Wei, K.J., and Wen, K.R., "Image structure rebuilding technique using fractal dimension on the best match patch searching," Multimedia Tools and Applications, vol. 76, no. 2, pp. 1875-1899, 2017-01. (SCIE)
  35. Wei, K.J., Lee, J.S. and Li, B., "SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks," International Journal of Network Security, vol. 19, no. 1, pp. 60-71, 2017-01. (EI)
  36. Lee, J.S., Li, B., and Huang, B. R., "Oblivious Transfer System for Information Concealing and Recovery in Cloud Computing," Journal of Internet Technology, vol. 18, no. 1, pp. 55-63, 2017-01. (SCIE)
  37. Wei, K.J., Lee, J.S., Tu, H. N., and Lin, F.P., "Design on Two-Factor Authentication Mechanism for Telecare Medical Information systems," International Journal of Digital Content Technology and its Applications, vol. 10, no. 5, pp. 144-154, 2016-12. (EI)
  38. Lee, J.S. Wei, K.J., Chen Y. C. and Sun, Y.H., "Provable secure brand-new Multi-auction Mechanism with Dynamic Identity," KSII Transactions on Internet and Information Systems, vol. 10, no. 12, pp. 5616-5642, 2016-12. (SCIE)
  39. Lee, J.S., Wen, K.R., and Li, B., "Renovating Contaminative Image Archives based on Patch Propagation and Adaptive Confidence Collation," IEEE Transactions on Circuits and Systems for Video Technolo, vol. 26, no. 5, 2016-05. (SCIE,EI)
  40. Lee, J.S.,Wei, K. J.,Chen, S.J.,Wang, Y.H., "Tele-micropayment Scam Prevention based on Visual Secret Sharing Technique," Multimedia Tools and Applications, vol. 75, no. 4, 2016-02. (SCIE)
  41. Lee, J.S. Wei, K.J., and Kao, W.C., "Robust t-out-of-n Internet Lottery Games with Player Anonymity," International Journal of Computers and communications, vol. 10, 2016-01.
  42. Lee, J.S. and Chen, Y. R., "Selective Scalable Secret Image Sharing with Verification," Multimedia Tools and Applications, vol. 74, no. 21, 2015-11. (SCIE)
  43. Wei, K. J., Lee, J.S., and Chen, S.J., "Enhancing the Security of Credit Card Transaction based on Visual DSC," KSII Transactions on Internet and Information Systems, vol. 9, no. 3, 2015-03. (SCIE)
  44. Lee, J.S., Chang, C.C., Huynh, N. T., and Tsai, H. Y., "Preserving User-Friendly Shadow and High-Contrast Quality for multiple Visual Secret Sharing Technique," Digital Signal Processing, vol. 40, 2015-03. (SCIE)
  45. Lee, J.S., Chang, C.C. and Tsai, H. Y., "A User-Friendly and Authenticatable Secret Image Sharing Scheme," Journal of Internet Technology, vol.15, no. 3, 2014-05. (SCIE)
  46. Lee, J.S., Wong, H.S., Chen, Y. R., and Wang, Y. H., "Stable Watermarking Technique based on XNOR operation and Scale Relationship," Multimedia Tools and Applications, vol. 69, no. 3, 2014-04. (SCIE)
  47. Lee, J.S. and Li, Bo, "Self-recognized Watermarking Technique that Resists Large-Scale Cropping," IEEE Multimedia, vol. 21, no. 1, 2014-03. (SCIE,EI)
  48. Lee, J.S., "RII: Renovating Irregular Illumination of Digital Image Archives," Journal of Visual Communication & Image Representation, vol. 27, no. 7, 2013-10. (SCIE,EI)
  49. Yang, C.C., Wei, K.J, Li, B. and Lee, J.S., "HORME: Hierarchical-Object-Relational Medical management for Electronic record," Security and Communication Networks, vol. 6, no. 10, 2013-10. (SCIE,EI)
  50. Lee, J.S., Kao, W.C. and Li, B., "ART-Based Non-Iterative Electronic Lottery Mechanism with Robustness," IET Information Security, pp. 1-9, 2013-08. (SCIE)
  51. Lee, J.S., Chang, C.C., and Wei, K.J., "Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy," International Journal of Network Security, vol. 16, no. 2, 2013-08. (EI)
  52. Lee, J.S. and Tseng, W.T., "A Wide-adapted Bantam Protocol for Roaming across Wireless Areas," Wireless Networks, vol. 19, 2013-08. (SCIE)
  53. Lee, J.S. and Huang Y.C., "Fast Authentication Mechanism with Provable Correctness for Cluster-based VANETs," Security and Communication Networks, pp. 1016-1030, 2013-06. (SCIE)
  54. Lee, J.S. and Hsieh, M.H., "Preserving User-Participation for Insecure Network Communications with CAPTCHA and Visual Secret Sharing Technique," IET Networks, vol. 2, no. 2, 2013-06.
  55. Lee, J.S. and Li, B., "Note on "Authentication protocol using an identifier in an ad hoc network environment," Mathematical and Computer Modelling, vol. 57, no. 5-6, 2013-03. (SCIE,EI)
  56. Lin, P.Y., Chen, Y.H., Chang, C.C., Lee, J.S., "Contrast-Adaptive Removable Visible Watermarking (CARVW) for Digital Internet Media," Image and Vision Computing, vol. 31, pp.311-321, 2013-02. (SCIE,EI)
  57. Lee, J.S. and Lin, K.S., "An Innovative Electronic Group-buying System for Mobile Commerce," Electronic Commerce Research and Applications, vol. 12, no. 1, 2013-02. (SCIE)
  58. Lee, J.S. and Lin, K.S., "A Robust E-commerce Service: Light-weight Secure Mail-order Mechanism," Electronic Commerce Research and Applications, vol. 11, pp.388-396, 2012-08. (SCIE,EI)
  59. J.S. Lee and M.H. Hsieh, "An Interactive Mobile SMS Confirmation Method using Secret Sharing Technique," Computers & Security, vol. 30, no. 8, 2011-11. (SCIE,EI)
  60. Wong, H.S., Chen, Y.R., and Lee, J.S., "An Improved CRT-based Watermarking Scheme with Voting Strategy," Journal of Computers, vol. 22, no. 3, 2011-10. (EI)
  61. Lin, P.Y., Lee, J.S. and Chang, C.C., "Protecting the Content Integrity of Digital Imagery with Fidelity Preservation," ACM Transactions on Multimedia Computing Communications and, vol. 7, no. 3, 2011-08. (SCIE,EI)
  62. Li, B. and Lee, J.S., "A Cryptographic Alternative for Preserving PHI in Compliance with HIPAA Privacy/Security Regulations," Journal of Computers, vol. 21, no. 3, PP. 27~36, 2010-10. (EI)
  63. Chang, C.C., Li, B. and Lee, J.S., "Secret Sharing Using Visual Cryptography," Journal of Electronic Science and Technology, vol. 8, no. 4, PP. 289~299, 2010-08. (EI)
  64. Lee, J.S., Lin, P.Y. and Chang, C.C., "Lightweight Secure Roaming Mechanism between GPRS/UMTS and Wireless LANs," Wireless Personal Communications, vol. 53, no. 4, PP. 569~580, 2010-08. (SCIE,EI)
  65. Chang, C. C., Lee, J. S. and Le, T. H. N., "Hybrid Wet Paper Coding Mechanism for Steganography Employing n-Indicator and Fuzzy Edge Detector," Digital Signal Processing, Vol.20, No. 4, PP. 1286~1307, 2010-07. (SCIE,EI)
  66. Lee, J.S., Chan, C.S. and Chang, C.C., "Non-Iterative Privacy Preservation for Online Lotteries," IET Information Security, vol. 3, no. 4, 2009-12. (SCIE,EI)
  67. Chang, C.C., Chang, S.C. and Lee, J.S., "An On-line Electronic Check System with Mutual Authentication," Computers & Electrical Engineering, vol. 35, no. 5, PP. 757~763, 2009-09. (SCIE,EI)
  68. Lin, P.Y., Lee, J.S. and Chang, C.C., "Dual Digital Watermarking for Internet Media Based on Hybrid Strategies," IEEE Transactions on Circuits and Systems for Video Technolo, vol. 19, no. 8, PP. 1169~1177, 2009-08. (SCIE,EI)
  69. Lee, J.S. and Chang, C.C., "A Secure Multicast Framework in Large and High-Mobility Network Groups," IEICE Transactions on Communications, vol. E92-B, no. 7, PP. 2365~2373, 2009-07. (SCIE,EI)
  70. Lee, J.S., Chen, C.H. and Chang, C.C., "A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images," IEEE Transactions on Circuits and Systems for Video Technolo, vol. 19, no. 6, PP. 900~905, 2009-06. (SCIE,EI)
  71. Lin, P.Y., Lee, J.S. and Chang, C.C., "Distortion-Free Secret Image Sharing Mechanism Using Modulus Operator," Pattern Recognition, vol. 42, PP. 886~895, 2009-05. (SCIE,EI,TSSCI)
  72. Lee, J.S. and Chang, C.C., "Design of Electronic t-out-of-n Lotteries on the Internet," Computer Standards & Interfaces, vol. 31, PP. 395~400, 2009-02. (SCIE,EI)
  73. Chang, C.C. and Lee, J.S., "Robust t-out-of-n Oblivious Transfer Mechanism Based on CRT," Journal of Network and Computer Applications, vol. 32, PP. 226~235, 2008-11. (SCIE,EI)
  74. Chang, C.C., Lee, J.S. and Kuo, J.Y., "Time-bound Based Password Authentication Scheme for Multi-server Architecture," Int.Journal of Innovative Computing,Information and Control, vol. 4, no. 11, PP. 2987~2996, 2008-11. (SCIE,EI)
  75. Lee, J.S., Chang, Y.F. and Chang, C.C., "Secure Authentication Protocols for Mobile Commerce Transactions," Int. Journal of Innovative Computing,Information and Control, vo. 4, no. 9, PP. 2305~2314, 2008-09. (SCIE,EI)
  76. Lee, J.S., Chang, Y.F. and Chang, C.C, "A Novel Authentication Protocol for Multi-server Architecture without Smart Cards," Int. Journal of Innovative Computing,Information and Control, vol. 4, no. 6,, PP. 1357~1364, 2008-06. (SCIE,EI)
  77. Lee, J.S. and Chang, C.C., "Preserving Data Integrity with Variant Diffie-Hellman Protocol for Mobile Ad Hoc Networks," Security and Communication Networks, vol. 1, PP. 277~286, 2008-06. (SCIE)
  78. Lee, J.S. and Chang, C.C., "Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities," Journal of Network and Computer Applications, vol. 30, PP. 1377~1396, 2007-08. (SCIE,EI)
  79. Cheng, T.F., Lee, J.S. and Chang, C.C., "Security Enhancement of an IC-Card-Based Remote Login Mechanism," Computer Networks, vol. 51, no. 9, PP. 2280~2287, 2007-06. (SCIE,EI)
  80. Lee, J.S., Chang, C.C. and Chang, P.Y., "Anonymous Authentication Scheme for Wireless Communications," International Journal of Mobile Communications, vol. 5, no. 5, PP. 590~901, 2007-06. (SSCI,EI)
  81. Chang, Y.F., Lee, J.S. and Chang, C.C., "A Secure and Efficient Authentication Scheme for Mobile Users," International Journal of Mobile Communications, vol. 4, no. 5, PP. 581~594, 2006-08. (SSCI,EI)
  82. Lee, J.S. and Chang, C.C., "Choosing t-out-of-n Secrets by Oblivious Transfer," Information & Security, vol. 18, PP. 67~84, 2006-07.
  83. Chang, C.C. and Lee, J.S., "An Anonymous Voting Mechanism Based on the Key Exchange Protocol," Computers and Security, vol. 25, PP. 307~314, 2006-02. (SCIE,EI)
  84. Chang, C.C., Lee, J.S. and Chang, Y.F., "Efficient Authentication Protocols of GSM," Computer Communications, vol. 28, no. 8, PP. 921~928, 2005-01. (SCIE,EI)
  1. 沈彥均、范勻怡、李榮三,"模擬真實攻防演練以驗證臺灣高等教育場域之資安防護能力 ," 第三十四屆全國資訊安全會議, 000, 2024-08. 國立臺北科技大學 .
  2. Chang, C.W., Lee, J.S., and Chou, Y.C.,"Enhancing Data Embedding Capacity in Encrypted Images via Adaptive MSB Prediction ," 2024 6th International Conference on Image, Video and Signal Processing (IVSP 2024), pp.1-9, 2024-03. Meiji University .
  3. Chen, Y.C., Yang, H.Y., Chew, C.J., and Lee, J.S.,"Preserving the higher coverage guided of an ICS-oriented fuzzy testing technique ," International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, 1-14, 2023-12. Chihlee University of Technology .
  4. Chen, T.H., Chew, C. J., Chen, Y. C., and Lee, J.S.,,"Preserving Collusion-free and Traceability in Car-sharing System based on Blockchain ," International Computer Symposium (ICS 2022), pp. 1-12, 2022-12. National Taipei University of Business .
  5. Y.C. Lin, J.S. Lee, C.J. Chew, W.C. Lin, Y.C. Chen,"A deepfake detection system through face fingerprint naturalness model ," Cryptology and Information Security Conference(CISC 2022), pp. 1-8,, 2022-06. National Chin-Yi University of Technology .
  6. 應瑞傑、蔡國裕、李榮三、周澤捷,"Mobile Roadside Units Clustering Protocol based on Reputation Inventory ," Cryptology and Information Security Conference 2022, 1-6, 2022-06. 勤益科技大學 .
  7. 吳承翰、吳威震、蔡國 裕、洪緯哲、李榮三,"基於區塊鏈與智能合約實現具隱密性之雙重隨意組合拍賣平台 ," 第三十屆全國資訊安全會議, NA, 2020-09. 中山大學` .
  8. 紀帛伸、蔡國裕、李榮三,"適用於IoT環境中具隱私保護之輕量化RFID協定之改進 ," 第三十屆全國資訊安全會議, NA, 2020-09. 中山大學 .
  9. Jung-San Lee, Chit-Jie Chew, Ying-Chin Chen, Chih-Lung Chen, and Kuo-Yu Tsai,"Preserving tenacious DDoS vitality via resurrection social hybrid botnet ," The 3rd International Conference on Security with Intelligent Computing and Big-data Services, 1-7, 2019-12. ChihLee University of Technology .
  10. Chit-Jie Chew, Ying-Chin Chen, Jung-San Lee,"Indomitable Vitality DDoS with Resurrectional Mechanism in Hybrid Social Network ," (CISC 2019) Cryptology and Information Security Conference 2019, 000, 2019-05. Providence University .
  11. 王銘宏,李坤印,李維,周可恆,李榮三,"運用非監督式學習於工業物聯網之異常設備偵測 ," 第二十九屆全國資訊安全會議, 1-6, 2019-05. 靜宜大學 .
  12. Lee, J.S., Li, C. H., and Lee, H. Y.,"Dehazing technique based on channel-weighted analysis and illumination tuning ," The 310th International Conference on Science, Technology, Engineering and Management (ICSTEM 2018 ), pp. 18-23, 2018-02. Hotel ibis Schiphol Amsterdam Airport .
  13. Chen. Y.C., Wei, K.J., Yang, R.K., Lee, J.S*. and Lee K.Y.,"Table-free visual secret sharing technique with arbitrary-angle stacking ," International Conference on Science and Innovative Engineering, pp. 11-13, 2018-01. Tokyo, Japan .
  14. Lee, J.S., Huang, B.R., Su, H.C., and Chen, Y.C.,"Renovating large-scale smudges from digital image based on edge confidence ," The 3rd International Conference on Issues in Applied Business, Management, Social Sciences Research, vol. 1, no. 3, 2016-12. Cryptal City Hotel, Greece .
  15. Chen, Y.C., Wei, K. R, Lee, K.Y, and Lee, J.S.,"A Value-added Service tacked on LTE : Mobile Check ," International Symposium on Electrical, Electronic Engineering and Digital Technology, pp. 150-162, 2016-12. Sunshine City, Toshima, Tokyo, Japan .
  16. Wang, Y.H. and Lee, J.S.,"A Hybrid Illumination Refinement Technique based on Double Niblack Thresholds ," International Conference on Communication and Information Systems, 2015-07. 羅馬 .
  17. Lee, J.S., Wei, K.J., and Li, B.,"On the security of two ECC-based authentication mechanisms for confirming authorization ," Progress on Cryptography- 20 years of Cryptography in Taiwan, Vol., 2014-11. 逢甲大學 .
  18. Lee, J.S., Lin, F.P., Wen, K.R., Wang, Y.H, and Wei, K.J.,"Two-Factor Authentication Using Smartphone and Quick Response Code ," 2014 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology, pp. 1609-1625, 2014-04. Nagoya University, Japan .
  19. Lee, J.S., Wong, H.S., and Wang, Y. H.,"Variation-free Watermarking Technique based on Scale Relationship ," The Third International Conference on Signal & Image Processing (SIP 2014), pp. 225-239, 2014-01. Zurich, Swiss .
  20. Li, B. and Lee, J.S.,"A wally watermarking scheme with blind extraction based on structured encoding system ," The 2011 2nd World Congress on Computer Science and Information Engineering, 2011-06. Changchun, China .
  21. Lin, F.P., Li, Bo and Lee, J.S.,"A neoteric progressive scheme for visual secret sharing ," The First National Conference on Web Intelligence and Applications, 2011-04. National University of Kaohsiung .
  22. Li, B., Chang, C. C. and Lee, J. S.,"Providing Anonymous Channels and Mutual Authentication for Mobile Communications ," Proceedings of the Fourth International Conference on Genetic and Evolutionary Computing (ICGEC 2010), pp. 618-621, 2010-12. Shenzhen, China .
  23. Lee, J.S., Li, B. and Chou, Y.C,"A Brand-new Mobile Value-added Service: M-Check ," Proceedings of International Conference on Networked Computing, Advanced Information Management and Digital Content and Multimedia Technologies (NCM2009), pp. 2050-2055, 2009-08. Seoul, Korea .
  24. Lee, J.S. and Le, T.H.N.,"Hybrid (2, n) Visual Secret Sharing Scheme for Color Images ," Proceedings of the 2009 IEEE-RIVF International Conference on Computing and Telecommunication Technologies, pp. 320-327, 2009-07. Danang, Vietnam .
  25. Chang, C.C. and Lee, J.S.,"Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol ," The Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), pp. 467-471, 2008-11. Kaohsiung City, Taiwan .
  26. Li, J., Lee, J.S. and Chang, C.C.,"Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques ," The Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp. 1545-1548, 2008-08. Harbin, China .
  1. 專業書籍/王旭正、李榮三、魏國瑞/資訊生活安全、行動智慧應用與網駭實務/ 博碩 出版/ 中華民國 /2020-09-01/616/ /
  2. 專業書籍/王旭正、李榮三、許富皓/資訊安全與智慧、行動網路安全應用實務/ 博碩 出版/ 中華民國 /2015-08-01/624/ /
  3. 專業書籍/王旭正、楊中皇、李榮三/電腦、網路與行動服務安全實務/ 博碩文化/ 中華民國 /2012-09-01/550/ /
  4. 專業書籍/Jung-San Lee/Security Technology on Wireless Communications and Electronic Commerce/ VDM Verlag/ 德國 /2009-12-01/148/ /
  1. (博士增核)基於行為分析與後量子密碼區塊鏈之動態零信任驗證框架(2/3)/2024-08~2025-01 /NSTC112-2221-E-035-050-MY3 /主持人
  2. 基於行為分析與後量子密碼區塊鏈之動態零信任驗證框架(2/3)/2024-08~2025-07 /NSTC112-2221-E-035-050-MY3 /主持人
  3. (博士增核)基於行為分析與後量子密碼區塊鏈之動態零信任驗證框架(1/3)/2023-10~2024-07 /NSTC112-2221-E-035-050-MY3 /主持人
  4. 基於行為分析與後量子密碼區塊鏈之動態零信任驗證框架(1/3)/2023-08~2024-07 /NSTC112-2221-E-035-050-MY3 /主持人
  5. 應用於生醫模型之3D零浮水印演算法/2023-07~2024-02 /112-2813-C-035-078-E /主持人
  6. 植基於深度學習之未知網路攻擊暨惡意程式行為偵察技術/2022-08~2023-07 /NSTC111-2221-E-035-053- /主持人
  7. 基於行動裝置之輕量化3D浮水印演算法/2022-07~2023-02 /111-2813-C-035-043-E /主持人
  8. 具隱密性與回溯性之數位資料監管區塊鏈暨運算資源即時分配平台/2021-08~2022-07 /MOST110-2221-E-035-018- /主持人
  9. 應用區塊鏈以建構具公平性及自由度之雙向隨意組合拍賣平台與高效能電子交付機制(2/2)/2020-08~2021-07 /MOST108-2221-E-035-031-MY2 /主持人
  10. 基於區塊鏈之監控影像竄改判定系統/2020-07~2021-02 /109-2813-C-035-028-E /主持人
  11. 應用區塊鏈以建構具公平性及自由度之雙向隨意組合拍賣平台與高效能電子交付機制(1/2)/2019-08~2020-07 /MOST108-2221-E-035-031-MY2 /主持人
  12. 導入人工智慧及自適應色軌權重分析之影像除霧霾技術/2019-07~2020-02 /108-2813-C-035-003-E /主持人
  13. Active defense strategy in hybrid social network botnet based on reputation accumulation/2018-07~2019-02 /107CFD0600157 /主持人
  14. 具備除霧霾與結構修復能力之內容導向典藏檢索系統/2017-08~2018-07 /MOST106-2221-E-035-093- /主持人
  15. 可自選功能之App生成平台/2017-07~2018-02 /106-2813-C-035-079-E /主持人
  16. 適用於大範圍及結構毀損影像修復之典藏保護技術/2016-08~2017-07 /MOST105-2221-E-035-084- /主持人
  17. 抵抗側錄惡意程式之視覺密碼OTP/2016-07~2017-02 /105-2815-C-035-097-E /主持人
  18. 基於視覺密碼之電子商務安全防禦系統設計與實作/2015-08~2016-07 /MOST104-2221-E-035-036- /主持人
  19. 數位典藏修繕系統之建置/2014-08~2015-07 /MOST103-2221-E-035-055- /主持人
  20. 數位多媒體曝光補償及授權機制/2013-08~2014-07 /NSC 102-2221-E-035-058- /主持人
  21. Android光影平衡器/2012-07~2013-02 /NSC101-2815-C-035-031-E /主持人
  22. 數位典藏暨版權保護技術/2011-08~2012-07 /NSC100-2221-E-035-067- /主持人
  23. 數位多媒體典藏與保護技術(3/3)/2010-08~2011-07 /NSC98-2218-E-035-001-MY3 /主持人
  24. 數位多媒體典藏與保護技術(2/3)/2009-08~2010-07 /NSC98-2218-E-035-001-MY3 /主持人
  25. 數位多媒體典藏與保護技術(1/3)/2009-01~2009-07 /NSC98-2218-E-035-001-MY3 /主持人
  1. 網路安全實務與社會人才培訓計畫 /2025-01~2025-07 /主持人
  2. 113年網路安全實務與社會人才培訓計畫 /2024-07~2025-01 /主持人
  3. 資安服務 /2024-01~2024-12 /主持人
  4. 建置互動式教學以實現資訊安全理論之教學實踐計畫 /2023-04~2027-04 /主持人
  5. 資安服務 /2023-01~2023-12 /主持人
  6. 111年度學術網路資訊分享與分析暨縣市網資訊安全維運計畫 /2022-01~2022-12 /共同主持人
  7. 資安服務 /2022-01~2022-12 /主持人
  8. 「資安服務」專案 /2021-01~2021-12 /主持人
  9. 學術網路資訊分享與分析暨縣市網資訊安全維運計畫 /2021-01~2021-12 /共同主持人
  10. 資安服務專案 /2020-01~2020-12 /主持人
  11. 學術網路資訊分享與分析暨縣市網資訊安全維運計畫 /2019-01~2019-12 /共同主持人
  12. 資安服務專案 /2019-01~2019-12 /主持人
  13. 資安服務專案 /2018-01~2018-12 /共同主持人
  14. A-ISAC暨Mini-SOC服務與維運計畫 /2018-01~2018-12 /協同主持人
  15. A-ISAC暨 Mini-SOC服務與維運計畫 /2018-01~2018-12 /協同主持人
  16. A-ISAC暨Mini-SOC維運與服務計畫 /2017-01~2017-12 /協同主持人
  17. 資安服務專案 /2017-01~2017-12 /共同主持人
  18. A-ISAC暨Mini-SOC維運與服務計畫 /2016-01~2016-12 /協同主持人
  19. A-ISAC暨Mini-SOC維運與服務-性能提升暨可用性強化計畫 /2015-08~2016-02 /協同主持人
  20. A-ISAC暨MiniSOC-維運與服務計畫 /2015-01~2015-12 /協同主持人
  21. 資安服務專案 /2014-10~2015-10 /共同主持人
  1. 112/2024 GiCS第4屆尋找資安女婕思競賽優勝 /國科會與教育部/ 2024-04-27/資訊四丁 胡庭語 資訊四甲 鄭筑云 彰化師大 廖怡晴
  2. 112/2024 GiCS第4屆尋找資安女婕思競賽優勝 /國科會與教育部/ 2024-04-27/資訊二乙 曾念紫 資訊二丙 林于綺 資訊二丙 陳芷歆
  3. 112/2024 GiCS第4屆尋找資安女婕思競賽第一名 /國科會與教育部/ 2024-04-27/資訊三乙 喻唯甄 資訊三乙 劉新惠 資訊三丁 劉秋彤
  4. 111/2023 GiCS第3屆尋找資安女婕思競賽佳作 /國科會與教育部/ 2023-05-06/( ̆•Ω• ̆ ) 資訊三丁 胡庭語 資訊三甲 陳彥勻 資訊三甲 鄭筑云
  5. 111/2023 GiCS第3屆尋找資安女婕思競賽優勝 /國科會與教育部/ 2023-05-06/騎太陽餅來按讚 資訊四丁 何艾蓮 資訊四丁 羅可晴 資訊二乙 喻唯甄
  6. 111/2023 GiCS第3屆尋找資安女婕思競賽第一名 /國科會與教育部/ 2023-05-06/現場所有同學 資訊二丁 劉秋彤 資訊二乙 劉新惠 資訊四丁 王詩瑜
  7. 111/最佳學生論文 /International Computer Symposium 2022/ 2022-12-15/
  8. 111/資安技能金盾獎競賽 大專校院組嶄露頭角獎 /行政院技術服務中心/ 2022-11-11/陳為安、蔡仲林、宋振宇
  9. 111/111年度國科會補助大專校院研究獎勵 /研究發展處/ 2022-10-15/
  10. 111/第52屆全國技能競賽網路安全類第三名 /勞動部/ 2022-08-07/陳為安、洪群哲
  11. 111/第52屆全國技能競賽網路安全類第二名 /勞動部/ 2022-08-07/宋振宇、蔡仲林
  12. 110/110年度科技部補助大專校院研究獎勵 /產學合作處/ 2021-10-15/
  13. 107/IEET教學傑出獎 /IEET/ 2019-05-24/2019IEET教學傑出獎
  14. 107/最佳學生論文 /Chinese Cryptology and Information Security Association/ 2019-05-24/
  15. 105/105學年度優良導師 /學生事務處/ 2017-11-15/
  1. 113/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2024-11-15/Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination
  2. 113/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2024-11-15/Preserving friendly stacking and weighted shadows in selective scalable secret image sharing
  3. 113/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2024-11-15/Constructing Gene Features for Robust 3D Mesh Zero-watermarking
  4. 113/113學年度教學績優獎 /逢甲大學/ 2024-11-10/
  5. 112/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2023-11-15/CoNN-IDS: Intrusion Detection System based on Collaborative Neural Networks and Agile Training
  6. 112/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2023-11-15/Blockchain-based WDP Solution for Real-time Heterogeneous Computing Resource Allocation
  7. 112/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2023-11-15/Medical Blockchain: Data Sharing and Privacy Preserving of EHR based on Smart Contract
  8. 112/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2023-11-15/Image dehazing technique based on sky weight detection and fusion transmission
  9. 111/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2022-11-15/Secure Session between an IoT Device and a Cloud Server based on Elliptic Curve Cryptosystem
  10. 111/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2022-11-15/Robust 3D Mesh Zero-watermarking based on Spherical Coordinate and Skewness Measurement
  11. 111/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2022-11-15/Preserving Indomitable DDoS Vitality through Resurrection Social Hybrid Botnet
  12. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Reputation-oriented electronic micro-loaning based on smart contracts in a solidarity group
  13. 110/逢甲大學優良教材獎勵優等獎 /逢甲大學/ 2021-11-15/資訊生活安全、行動智慧應用與網駭實務
  14. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Efficient Peer-to-Peer E-Payment based on Asynchronous Dual Blockchain
  15. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Learning Salient Seeds Refer to the Manifold Ranking and Background-Prior Strategy
  16. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Preserving Liberty and Fairness in Combinatorial Double Auction Games based on Blockchain
  17. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Biometric-based key management for satisfying patient’s control over health information in the HIPAA regulations
  18. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks
  19. 109/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2020-11-15/Preserving Privacy and Fairness for an Innovative E-Commerce Model: Penny M-lottery
  20. 109/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2020-11-15/Visibility dehazing based on channel-weighted analysis and illumination tuning
  21. 109/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2020-11-15/AAVSS: Auxiliary Authorization Mechanism based on Arbitrary-Angle VSS
  22. 109/109年度科技部補助大專校院研究獎勵 /逢甲大學/ 2020-10-15/
  23. 108/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2019-11-15/DNT-based Image Illumination Refinement System with Concurrent Copyright Embedding
  24. 108/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2019-11-15/Selective scalable secret image sharing with adaptive pixel-embedding technique
  25. 108/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2019-11-15/Refining irregular image illumination with concurrent ownership embedding
  26. 107/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2018-11-15/Preserving copyright in renovating large-scale image smudges based on advanced SSD and Edge confidence
  27. 107/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2018-11-15/Image structure rebuilding technique using fractal dimension on the best match patch searching
  28. 107/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2018-11-15/Oblivious Transfer System for Information Concealing and Recovery in Cloud Computing
  29. 107/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2018-11-15/SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks
  30. 107/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2018-11-15/An Effective Preprocessor of Edge Detection for Distorted Images
  31. 107/107年度科技部補助大專校院研究獎勵 /逢甲大學/ 2018-08-01/
  32. 106/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2017-11-15/Tele-micropayment Scam Prevention based on Visual Secret Sharing Technique
  33. 106/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2017-11-15/Provable secure brand-new Multi-auction Mechanism with Dynamic Identity
  34. 106/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2017-11-15/Renovating Contaminative Image Archives based on Patch Propagation and Adaptive Confidence Collation
  35. 105/105學年度教學優良教師 /逢甲大學/ 2016-11-15/
  36. 105/逢甲大學優良教材獎勵優等獎 /逢甲大學/ 2016-11-15/資訊安全與智慧、行動網路安全應用實務
  37. 105/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2016-11-15/Enhancing the Security of Credit Card Transaction based on Visual DSC
  38. 105/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2016-11-15/Preserving User-Friendly Shadow and High-Contrast Quality for multiple Visual Secret Sharing Technique
  39. 105/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2016-11-15/Selective Scalable Secret Image Sharing with Verification
  40. 104/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2015-11-15/Self-recognized Watermarking Technique that Resists Large-Scale Cropping
  41. 104/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2015-11-15/A User-Friendly and Authenticatable Secret Image Sharing Scheme
  42. 104/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2015-11-15/Stable Watermarking Technique based on XNOR operation and Scale Relationship
  43. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/Note on "Authentication protocol using an identifier in an ad hoc network environment
  44. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/An Innovative Electronic Group-buying System for Mobile Commerce
  45. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/RII: Renovating Irregular Illumination of Digital Image Archives
  46. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/A Wide-adapted Bantam Protocol for Roaming across Wireless Areas
  47. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/ART-Based Non-Iterative Electronic Lottery Mechanism with Robustness
  48. 103/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2014-11-15/HORME: Hierarchical-Object-Relational Medical management for Electronic record
  49. 103/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2014-11-15/Fast Authentication Mechanism with Provable Correctness for Cluster-based VANETs
  50. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/Contrast-Adaptive Removable Visible Watermarking (CARVW) for Digital Internet Media
  51. 102/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2013-11-15/A Robust E-commerce Service: Light-weight Secure Mail-order Mechanism
  52. 102/逢甲大學優良教材獎勵傑出獎 /逢甲大學/ 2013-11-15/電腦、網路與行動服務安全實務
  53. 101/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2012-11-15/Protecting the Content Integrity of Digital Imagery with Fidelity Preservation
  54. 101/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2012-11-15/An Interactive Mobile SMS Confirmation Method using Secret Sharing Technique
  55. 101/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2012-11-15/An Improved CRT-based Watermarking Scheme with Voting Strategy
  56. 100/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2011-11-15/A Cryptographic Alternative for Preserving PHI in Compliance with HIPAA Privacy/Security Regulations
  57. 100/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2011-11-15/Hybrid Wet Paper Coding Mechanism for Steganography Employing n-Indicator and Fuzzy Edge Detector
  58. 99/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2010-11-15/Dual Digital Watermarking for Internet Media Based on Hybrid Strategies
  59. 99/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2010-11-15/Distortion-Free Secret Image Sharing Mechanism Using Modulus Operator
  60. 98/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2009-11-15/Secure Authentication Protocols for Mobile Commerce Transactions
  1. 視覺密碼的最新發展/教育部顧問室資通安全聯盟中心/2009-06
  2. 資訊安全技術之發展與應用/中區三校聯合資安研討會/2008-06
  3. 資訊安全技術之發展與應用/逢甲大學資訊工程學系/2008-04
  1. Lee, J.S. and Chang, C.C./Recent Developments on Multimedia Security Technologies/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心 /國家實驗研究院 /2008-10-01
  2. Chang, C.C., Lee, J.S. and Lee, W.B/Secure Mechanisms for Electronic Commerce/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心 /國家實驗研究院 /2006-12-01
  3. Lee, J.S., Chang, Y.F. and Chang, C.C./Authentication Protocols for Wireless Communications/Communication of the Chinese Cryptology and Information Security Association /2005-12-01/ vol. 12, pp. 24-38
  1. 博碩 出版/資訊生活安全、行動智慧應用與網駭實務/王旭正、李榮三、魏國瑞/教科書
最後更新時間:2024-12-22, 9:02 a.m. 下次更新時間:2024-12-23, 9 a.m.