蔡國裕

副教授

畢業於國立臺灣科技大學資訊管理系博士班,主要研究領域為區塊鏈應用、物聯網應用與安全、行動裝置應用開發、電子商務應用,目前主要研究方向為電子貨幣、智能合約、物聯網之遠端居家照護應用、Android App保護等 。 在校內主要講授社群網路App開發與應用、程式語言、計算機概論等課程,在教學上強調基礎概念之紮根與邏輯的建立,更能應用於實務領域中。近年執行之相關計畫與物聯網及長照應用相關,希冀能經由資通訊技術之發展,協助解決未來長照發展可能面臨之相關議題。


學歷

  • 國立臺灣科技大學 資訊管理系 博士
  • 國立臺灣科技大學 資訊管理系 碩士
  • 中原大學 資訊工程學系 學士

專長

  • 密碼學
    Cryptography
  • 物聯網應用與安全
    IoT Application and Security
  • 行動商務與安全
    m-commerce Application and Security

校內經歷

  • 大數據教學與應用中心 主任
  • 資訊工程學系 副教授
  • 資訊教學中心 主任

校外經歷

  • 文化大學 應用數學系 助理教授
  • 華夏科技大學 資訊管理系 助理教授
  • 國立台灣科技大學 資通安全研究與教學中心 博士後研究人員

論文及參與計畫

  1. Chi Hung Wang, Kuo Yu Tsai, and Yuh Shyan Hwang, "Use improved KINECT to recognize whole-body images to enhance accuracy," Accepted byThe Visual Computer, https://doi.org/10.1007/s00371-022-02461-x, 2022-03. (SCI)
  2. Chi-Hung Wang and Kuo-Yu Tsai, "Optimization of machine learning method combined with brain-computer interface rehabilitation system," Accepted byThe Journal of Physical Therapy Science, Vol. 34 No. 5, 2022-02. (SCI)
  3. Lee, J.S., Chew, C.J. , Liu, J.Y., Chen, Y.C., and Tsai, K.Y., "Medical Blockchain: Data Sharing and Privacy Preserving of EHR based on Smart Contract," Accepted byJournal of Information Security and Applications, 000, 2022-01. (SCI)
  4. Chew, C. J., Chen, Y. C, Lee, J.S.*, Chen, C. L., and Tsai, K. Y., "Preserving Indomitable DDoS Vitality through Resurrection Social Hybrid Botnet," Computers & Security, vol. 106, 2021-07. (SCI)
  5. Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, Kuo-Yu Tsai, Chung-Fu Lu, and Tzu-Wei Lin, "Three-factor UCSSO scheme With fast authentication and privacy protection for telecare medicine information systems," IEEE Access, 8:196553 - 196566, 2020-10. (SCI)
  6. Chi-Hung Wang, Yuh-Shyan Hwang, Hsi-Chun Wang, Yu-Ling Wang, and Kuo-Yu Tsai, "Microstructure overlapping image application with optical decryption," Journal of the Optical Society of America A-OPTICS IMAGE SCIENCE AND VISION, 37(8), 1361-1368, 2020-08. (SCI)
  7. Chi-Hung Wang, Yuh-Shyan Hwang, Yu-Luen Chen, Chih-Chen Chen, and Kuo-Yu Tsai, "Implementation of interactive games to a shoulder rehabilitation and evaluation system," Technology and Health Care, 28(4), 431-437, 2020-07. (SCI)
  8. Jia-Ning Luo, Ming-Hour Yang, and Kuo-Yu Tsai, "A geographic map-based middleware framework to obfuscate smart vehicles’ locations," Multimedia Tools and Applications, 78, 28877–28902, 2019-03. (SCI)
  9. Kuo-Yu Tsai,Ming Hour Yang,Jia Ning Luo, andWei-Tim Liew, "Novel designated ownership transfer with grouping proof," Applied Sciences, 9(4), 724, 2019-02. (SCI)
  10. Kuo-Yu Tsai, "Android App copy protection mechanism with semitrusted loader," Journal of Internet Technology, 19(1), 65-71, 2018-02. (SCI)
  11. Shang-Kuan Chen, Yen-Wu Ti, and Kuo-Yu Tsai, "Nuclear power plant construction scheduling problem with time restrictions: a particle swarm optimization approach," Science and Technology of Nuclear Installations, Vol. 2016, Article ID 2150692, 2016-04. (SCI)
  12. Kuo-Yu Tsai, "Robust distributed reprogramming protocol of wireless sensor networks for healthcare systems," International Journal of Distributed Sensor Networks, Volume 2015, Article ID 139874, 2015-11. (SCI)
  13. Kuo-Hui Yeh, Kuo-Yu Tsai , and Chuan-Yen Fan, "An efficient certificateless signature scheme without bilinear pairings," Multimedia Tools and Applications, 74, 6519–6530, 2015-06. (SCI)
  14. Kuo-Yang Wu, Kuo-Yu Tsai, Tzong-Chen Wu, and Kouichi Sakurai, "Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks," Journal of Information Science and Engineering, 31(2), 727-742, 2015-03. (SCI)
  15. Chih-Ho Chou, Kuo-Yu Tsai, and Tzong-Chen Wu, "Robust remote mutual authentication scheme with key agreement," Journal of Internet Technology, 16(7), 1271-1282, 2015-02. (SCI)
  16. Kuo-Hui Yeh, Nai-Wei Lo, Kuo-Yu Tsai, Yingjiu Li, and Enrico Winata, "A novel RFID tag identification protocol: adaptive n-resolution and k-collision arbitration," Wireless Personal Communications, 77, 1775–1800, 2014-02. (SCI)
  17. Kuo-Hui Yeh, Kuo-Yu Tsai, and Jia-Li Hou, "Analysis and design of smart card based authentication protocol," Journal of Zhejiang University-SCIENCE C, 14(12), 909-917, 2013-11. (SCI)
  18. Chih-Ho Chou, Kuo-Yu Tsai, and Chung-Fu Lu, "Two ID-based authenticated schemes with key agreement for mobile environments," The Journal of Supercomputing, 66, 973–988, 2013-06. (SCI)
  19. Chih-ho Chou, Kuo-yu Tsai, Tzong-chen Wu, and Kuo-hui Yeh, "Efficient and secure three-party authenticated key exchange protocol for mobile environments," Journal of Zhejiang University SCIENCE C, 14, 347–355, 2013-05. (SCI)
  20. Yi-Chung Yen, Tzong-Chen Wu, Nai-Wei Lo, and Kuo-Yu Tsai, "A fair-exchange e-payment protocol for digital products with customer unlinkability," KSII Transactions on Internet and Information Systems, 6(11), 2956- 2979, 2012-12. (SCI)
  21. Chin-I Lee, Tzong-Chen Wu, Hung-Yu Chien, and Kuo-Yu Tsai, "Efficient ECC-based key management scheme for secure multicast in heterogeneous sensor networks," ICIC Express Letters, 6(8), 2045-2050, 2012-08. (EI)
  22. Kuo-Yu Tsai, Tzong-Chen Wu, Chien-Lung Hsu, and Keith Martin, "Provably secure multisignature scheme with document decomposition and signatory anonymity," ICIC Express Letters, 5(9-B), 3579-3583, 2011-09. (EI)
  23. Chien-Lung Hsu, and Kuo-Yu Tsai, "New ECC-based remote user authentication scheme with key agreement using smart cards," Journal of Internet Technology, 12(4), 601 -608, 2011-07. (SCI)
  24. Kuo-Yu Tsai, Tzong-Chen Wu, and Chien-Lung Hsu, "New secret key traitor tracing scheme with dispute settlement from bilinear maps," International Journal of Innovative Computing, Information and Control, 7(3), 1499-1510, 2011-03. (No)
  25. Jia-Lun Tsai, Tzong-Chen Wu, and Kuo-Yu Tsai, "Self-certified multi-authenticated encryption scheme," Journal of Internet Technology, 11(7), 917-922, 2010-12. (SCI)
  26. Jia‐Lun Tsai, Tzong‐Chen Wu, and Kuo‐Yu Tsai, "New dynamic ID authentication scheme using smart cards," International Journal of Communication Systems, 23(12,) 1149-1462, 2010-12. (SCI)
  27. Jia-lun Tsai, Tzong-chen Wu, and Kuo-yu Tsai, "A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks," Journal of Zhejiang University SCIENCE C, 11, 290–295, 2010-03. (SCI)
  28. Kuoyu Tsai , Chien-Lung Hsu, and Tzong-Chen Wu, "Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks," International Journal of Security and Networks, 5(1), 45 - 52, 2010-01. (EI)
  29. Tzong-Chen Wu , Thsia-Tzu Huang, Chien-Lung Hsu, and Kuo-Yu Tsai, "Recursive protocol for group-oriented authentication with key distribution," Journal of Systems and Software, 81(7), 1227-1239, 2008-07. (SCI)
  30. Tzong-Sun Wu, Chien-Lung Hsu , Kuo-Yu Tsai , Han-Yu Lin, and Tzong-Chen Wu, "Convertible multi-authenticated encryption scheme," Information Sciences, 178(1), 256-263, 2008-01. (SCI)
  31. Chien-Lung Hsu, Kuo-Yu Tsai, and Pei-Ling Tsai, "Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification," Information Sciences, 177(2), 543-549, 2007-01. (SCI)
  1. 紀帛伸、蔡國裕、李榮三,"適用於IoT環境中具隱私保護之輕量化RFID協定之改進 ," 第三十屆全國資訊安全會議, NA, 2020-09. 中山大學 .
  2. 黃映榕、蔡國裕、 賀盛志,"適用於物聯網之輕量化雙因子身分鑑別與金鑰交換方法與實作 ," 第三十屆全國資訊安全會議, NA, 2020-09. 中山大學 .
  3. 吳承翰、吳威震、蔡國 裕、洪緯哲、李榮三,"基於區塊鏈與智能合約實現具隱密性之雙重隨意組合拍賣平台 ," 第三十屆全國資訊安全會議, NA, 2020-09. 中山大學` .
  4. Kuo-Yu Tsai, Ching-Wei Lai, Chen-Hua Fu, Chi-Hung Wang, and Yuh-Shyan Hwang,"Practical authentication scheme preserving privacy protection for the Internet of things ," The 3rd International Conference on Security with Intelligent Computing and Big-data Services, 1-9, 2019-12. ChihLee University of Technology .
  5. Jung-San Lee, Chit-Jie Chew, Ying-Chin Chen, Chih-Lung Chen, and Kuo-Yu Tsai,"Preserving tenacious DDoS vitality via resurrection social hybrid botnet ," The 3rd International Conference on Security with Intelligent Computing and Big-data Services, 1-7, 2019-12. ChihLee University of Technology .
  6. Wei-Tim Liew, Kuo-Yu Tsai, Jia-Ning Luo, and Ming-Hour Yang,"Novel designated ownership transfer with grouping proof ," The 2017 IEEE Conference on Dependable and Secure Computing, 433 - 440, 2017-08. Shangri-La's Far Eastern Plaza Hotel .
  7. Chao‐Hsu Chen, Chien-Lung Hsu, and Kuo-Yu Tsai,"Survey on open source frameworks for big data analytics ," The Third International Conference on Electronics and Software Science, 74-84, 2017-07. Takamatsu Sunport Hall Building .
  8. Kuo-Yu Tsai,"Android App copy protection mechanism with semi-trusted loader ," 17th International Conference on Advanced Communication Technology (ICACT), 464-467, 2015-07. Phoenix Park .
  9. 魏儀淳、吳宗成、蔡國裕,"基於自我驗證公鑰系統之App所有權移轉驗證機制 ," 第二十五屆資訊安全會議, 51-59, 2015-05. 國立高雄第一科技大學 .
  10. 周詠晴、吳宗成、蔡國裕,"基於ID-Based聚合簽章之持有權移轉驗證機制 ," 第二十五屆資訊安全會議, 74-81, 2015-05. 國立高雄第一科技大學 .
  11. 吳曼甄、蔡國裕、吳宗成,"適用於Android App之動態金鑰管理機制 ," 第二十五屆資訊安全會議, 205-214, 2015-05. 國立高雄第一科技大學 .
  12. 徐振寧、吳宗成、蔡國裕,"基於時區授權存取控制之App移轉性驗證 ," 第二十五屆資訊安全會議, 215-218, 2015-05. 國立高雄第一科技大學 .
  13. Kuo-Yu Tsai, Yu-Hsuan Chiu, and Tzong-Chen Wu,"Android App copy protection mechanism based on dynamic loading ," The 18th IEEE International Symposium on Consumer Electronics (ISCE), 500=502, 2014-06. Jeju .
  14. Kuo-Hui Yeh, Kuo-Yu Tsai, and Hao-Xiang Liao,"A scalable single sign-on scheme for distributed networks ," 第二十四屆資訊安全會議, 224-228, 2014-05. 國立政治大學 .
  15. 邱毓軒、蔡國裕、吳宗成,"基於動態載入之Android App防複製攻擊機制 ," 第二十四屆全國資訊安全會議, NA, 2014-05. 國立政治大學 .
  16. 余浩宇、吳宗成、蔡國裕,"基於用戶端難題之漫遊鑑別機制 ," 第二十四屆全國資訊安全會議, 413-418, 2014-05. 國立政治大學 .
  17. 葉崇志、吳宗成、蔡國裕,"基於動態主機配置協定之網路存取控管系統 ," 第二十四屆資訊安全會議, 473-478, 2014-05. 國立政治大學 .
  18. 何文浩、吳宗成、蔡國裕,"具轉移次數限制之App應用服務可轉移性驗證機制 ," 第二十四屆資訊安全會議, 457-461, 2014-05. 國立政治大學 .
  19. Kuo-Hui Yeh, Kuo-Yu Tsai, Ren-Zong Kuo, and Tzong-Chen Wu,"Robust certificateless signature scheme without bilinear pairings ," 2013 International Conference on IT Convergence and Security (ICITCS), NA, 2013-12. Macao .
  20. Kuo-Yu Tsai, Hao-Yu Yu, and Chung-Fu Lu,"Improvement of distributed reprogramming protocol for wireless sensor networks ," 2013 National Computer Symposium, NA, 2013-12. 亞洲大學 .
  21. Kuo-Hui Yeh, Kuo-Yu Tsai, and Chuan-Yen Fan,"Cryptanalysis of a certificateless signature scheme without bilinear pairings ," Taiwan Academic Network Conference 2013, NA, 2013-10. 國立中興大學 .
  22. Kuo-Hui Yeh,Kuo-Yu Tsai, and Hung-Lun Chang,"Anonymous authentication scheme for large-scale mobile networks ," The FTRA 9th International Symposium on Wireless sensor network Technologies and Applications for Smart Space, NA, 2013-09. Gwangju .
  23. Kuo-Hui Yeh, Kuo-Yu Tsai, Chung-Fu Lu, and Nai-Wei Lo,"Scalable and anonymous authentication scheme ," 第二十三屆全國資訊安全會議, 12-16, 2013-05. 南臺科技大學 .
  1. (中興)人工智慧時代的硬體安全:威脅與防護(2/2)/2022-05~2023-04 /MOST111-2218-E-005-006-MBK /主持人
  2. 具智能合約之長照2.0核銷系統之研究與設計/2020-08~2021-07 /MOST109-2221-E-035-061- /主持人
  3. 基於多重視覺秘密分享之友善OTP驗證系統/2020-07~2021-02 /109-2813-C-035-030-E /主持人
  4. 適用於長照2.0核銷系統之具文件割之多重簽章設計與實作/2019-08~2020-07 /MOST108-2221-E-035-077- /主持人
  1. 5G網路軟體安全開發流程文獻研究委託案 /2022-02~2022-04 /共同主持人
  2. 109 年度新型態資安實務示範課程發展計畫「進階資安課程—工業物聯網資安威脅檢測與防護」 /2020-03~2021-02 /共同主持人
  1. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Microstructure overlapping image application with optical decryption
  2. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Implementation of interactive games to a shoulder rehabilitation and evaluation system
  3. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Three-factor UCSSO scheme With fast authentication and privacy protection for telecare medicine information systems
最後更新時間:2022-10-6, 9:03 a.m. 下次更新時間:2022-10-7, 9 a.m.