Chung-Huang Yang, Ph.D.

Professor, National Kaohsiung Normal University, Taiwan

Distinguished Professor, Xi’an University of Posts and Telecommunications, China

President, Chinese Cryptology and Information Security Association (CCISA), Taiwan

email: chung47@gmail.com    chyang@nknu.edu.tw

Web: http://security.nknu.edu.tw/     http://www.ccisa.org.tw/

Education:

Working Experience:

Current Research Interests:

Professional Memberships:

Professional Activities:

Publications:

Ph.D. Dissertation: On the Key Information Redundancy in Secret-Key Cryptosystems, The Center for Advanced Computer StudiesUniversity of Louisiana at Lafayette, 1990.

Books:

Journal Papers

  1. Magdy A. Bayoumi and Chung-Huang Yang, "Reconfigurable Testable Bit-Serial Multiplier for DSP Applications," IEE Proceedings Computers & Digital Techniques, Vol. 136, Pt. E, No. 6, November 1989, pp. 517-523. (SCI Expanded, EI)
  2. Kencheng Zeng, Chung-Huang Yang, Dah-Yea Wei and T.R.N. Rao, "Pseudorandom Bit Generators in Stream-Cipher Cryptography," IEEE Computer, Vol. 24, No. 2, February 1991, pp. 8-17. (SCI, EI)
  3. Hikaru Morita and Chung-Huang Yang, "A Modular-Multiplication Algorithm using Lookahead Determination," IEICE Trans. Fundamentals, Vol. E76-A, No. 1, January 1993, pp. 70-77.  (SCI Expanded, EI)
  4. Chung-Huang Yang, Hikaru Morita, and Tatsuaki Okamoto, "Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms," IEICE Trans. Communications, Vol. E88-B, No. 3, March 2005, pp. 1244-1248.  (SCI, EI)
  5. T.R.N. Rao and Chung-Huang Yang, "Aryabhata Remainder Theorem: Relevance to Public-Key Crypto-algorithms,"  Circuits, Systems & Signal Processing, Vol. 25, No. 1, 2006, pp. 1-15. (SCI, EI)
  6. Chung-Huang Yang, Tzong-Yih Kuo, TaeNam Ahn, and Chia-Pei Lee, "Design and Implementation of a Secure Instant Messaging Service based on Elliptic-Curve Cryptography," Journal of Computers, Vol. 18, No. 4, January 2008, pp. 31-38. (EI)
  7. Chung-Huang Yang and Yen-Ting Lai, "Design and Implementation of Forensic Systems for Android Devices based on Cloud Computing," Applied Mathematics & Information Sciences, Vol. 6, No. 1S, 2012, pp. 243S-247S. (SCI)
  8. Bo Yang, Yong Yu, and Chung-Huang Yang, "A Secure Scalar Product Protocol Against Malicious Adversaries," Journal of Computer Science and Technology, Vol. 28, No. 1, pp. 152-158, Jan. 2013. (SCIE)

 

n          Conference Papers

  1. Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "On the Linear Consistency Test in Cryptanalysis," Advances in Cryptology - Crypto'89, Springer-Verlag Lecture Notes in Computer Science Vol. 435, 1990, pp. 164-174.  (EI)
  2. Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "Large Primes in Stream Cipher Cryptography," Advances in Cryptology - Auscrypt'90, Springer-Verlag Lecture Notes in Computer Science Vol. 453, 1990, pp. 194-205.  (EI)
  3. Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "An Improved Linear Syndrome Algorithm in Cryptanalysis with Applications," Advances in Cryptology - Crypto'90, Springer-Verlag Lecture Notes in Computer Science Vol. 537, 1991, pp. 34-47.  (EI)
  4. Chung-Huang Yang, So-Lin Yen, Hwang David Liu, Kuei Liu, Bor-Shenn Jeng, Kung-Yao Chang, Min-Shin Chang, Yu-Ling Cheng, Jo-Ling Liang, and Don-Min Shien, Secure Official Document Mail Systems for Office Automation,Proc. IEEE Annual International Carnahan Conference on Security Technology, October, 1997, pp. 161-164. (EI)
  5. Chung-Huang Yang, Shy-Ming Ju, and T.R.N. Rao, "A Smartcard-based Framework for Secure Document Exchange, "  Proc. IEEE Annual International Carnahan Conference on Security Technology, October 1998, pp. 93-96. (EI)
  6. Chung-Huang Yang, "On the Design of Campus-Wide Multi-Purpose Smartcard Systems,"  Proc. IEEE Annual International Carnahan Conference on Security Technology, October, 1999, pp. 465-468. (EI)
  7. Chung-Huang Yang, "A 6805-based Security System for Broadcasting Stock Information,"  Proc. IEEE Annual International Carnahan Conference on Security Technology, October 2000, pp. 238-241. (EI)
  8. Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes," Proc. third International Conference on Information and Communications Security, ICICS 2001, Xian, China, November 2001, Springer-Verlag Lecture Notes in Computer Science Vol. 2229,  pp. 419-428.  (EI)
  9. Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, and Chung-Huang Yang, "Fast implementation of AES cryptographic algorithms in smart cards,"  Proc. IEEE Annual International Carnahan Conference on Security Technology, pp. 573-579, October  2003. (EI)
  10. Hsien-Hau Chen, Yung-Sheng Chen, Hsia-Ling Chiang, and Chung-Huang Yang, "Design and implementation of smartcard-based secure e-mail communication,"  IEEE Annual International Carnahan Conference on Security Technology, Proceedings, pp. 225-231, October 2003. (EI)
  11. Magdy A. Bayoumi, Rajat Roy, and Chung-Huang Yang, "A Fault-Tolerant Testable Multiplier for DSP Applications," Proc. 29th Midwest Symp. on Circuits and Systems, pp. 637-639, Lincoln, Neb., 1986.
  12. Magdy A. Bayoumi and Chung-Huang Yang, "A Fault Tolerant Testable Module for Wafer Scale Integrated Systems," IEEE Proc. CompEuro '87, Hamburg, West Germany, May 1987, pp. 590-593. Hikaru Morita and Chung-Huang Yang, "An Efficient Modular-Multiplication Algorithm for Smart-Card Software Implementation," IEICE Technical Report on Information Security ), ISEC91-58, Kawasaki, Japan, March 18, 1992.

  13. Hikaru Morita and Chung-Huang Yang, "An Optimal Modular-Multiplication Algorithm using Lookahead Determination for Software," The 1992 Symp. on Cryptography and Information Security, Tateshina, Japan, April 2-4, 1992, SCIS92-12C.

  14. Shoji Miyaguchi, Chung-Huang Yang, and Hikaru Morita, "Dynamic Structure Neutralizing Differential Attack," IEICE Technical Report on Information Security, ISEC92-6, July 1992.

  15. Chung-Huang Yang, "Modular Arithmetic Algorithms for Smart Cards," IEICE Technical Report on Information Security , ISEC92-16, August, 1992.

  16. Chung-Huang Yang, "Pseudorandom Bit Generators for Secure Broadcasting Systems," HD-Media'93 , October 1993, pp. S9-32 - 35. 

  17. Chung-Huang Yang, "LFSR-based Cryptographic Checksums for Secure Broadcasting," Information Security Conference, pp. 85-87, May1995.  

  18. Chung-Huang Yang, "Campus Smart Cards with Public-Key Infrastructure," TANET'99, Oct. 1999.
  19. Chung-Huang Yang, "On the Design of High-Speed Pseudorandom bit Generators for Secure Broadcasting System, " Proc. Japan-Korea Joint Workshop on Information Security and Cryptology 2000 (JW-ISC 2000), January 25-26, 2000, Okinawa, Japan, pp. 9-15.
  20. Chung-Huang Yang, "On the Design of Dual-Interface Campus Smart Cards," Proc. 2000 Symposium on Cryptography and Information Security (SCIS 2000), January 26-28, 2000, Okinawa, Japan, Section D32.
  21. Chung-Huang Yang, "Design and implementation of cryptographic systems using 68HC05 microcontrollers," Proc. 2000 Asia Pacific Conference on Multimedia Technology and Applications (APCMTA'2000), December 2000, pp. 429-432.
  22. Chung-Huang Yang, "Performance Evaluation of AES/DES/Camellia On the 6805 and H8/300 CPUs," Proc. 2001 Symposium on Cryptography and Information Security (SCIS2001), Oiso, Japan, January 2001,  pp. 727-730.
  23. Xiu-Gi Zeng and Chung-Huang Yang, "Design and Implementation of CA/PKI on the Windows Environment," Proc. 2002 Symposium on Cryptography and Information Security (SCIS2002), January 2002,  Shirahama, Wakayama, Japan, pp. 377-379.
  24. Chung-Huang Yang, Hikaru Morita, and Tatsuaki Okamoto, "On the Performance of ESIGN and RSA on IC Cards," Proc. 2003 Symposium on Cryptography and Information Security (SCIS 2003), Hamamatsu, Shizuoka, Japan, pp. 251-255, 2003.
  25. Chung-Huang Yang and Chin-Feng Tsai, "Cross-Platform Implementation of ANSI X9.62 ECDSA,"  ACME2003 Conference, pp. 519-524, Seattle, Washington, USA, August 2003.
  26. Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, and Chung-Huang Yang, "Fast implementation of AES cryptographic algorithms in smart cards,"   IEEE Annual International Carnahan Conference on Security Technology, Proceedings, pp. 573-579, October  2003. (EI)
  27. Hsien-Hau Chen, Yung-Sheng Chen, Hsia-Ling Chiang, and Chung-Huang Yang, "Design and implementation of smartcard-based secure e-mail communication,"  IEEE Annual International Carnahan Conference on Security Technology, Proceedings, pp. 225-231, October 2003. (EI)
  28. Chung-Huang Yang, Long-Jian Lin, and Kouichi Sakurai,  "An Integration of PKI and IC Cards for IPsec," Proc. 2004 Symposium on Cryptography and Information Security, pp. 1375-1377, Sendai, Japan, Jan. 2004.
  29. Chung-Huang Yang, Chih-Ching Yeh, and Li-Ling Hsu, "On the Design and Implementation of a Secure Time-Stamping Service," Proc. 2004 Symposium on Cryptography and Information Security, pp. 603-605, Sendai, Japan, Jan. 2004.
  30. Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, and Chung-Huang Yang, "High Speed Software Driven AES Algorithm on IC Smartcards," Proc. 2004 Symposium on Cryptography and Information Security, pp. 459-464, Sendai, Japan, Jan. 2004.
  31. Chung-Huang Yang and Mu-Long Weng, "An Integration of PKI and IC cards for IPv6 Security," 1st French-Taiwanese Conference in Information Technologies, Palaiseau, France, April 2004.
  32. Chung-Huang Yang, Chih-Ching Yeh, and Fang-Dar Chu, "Design and Implementation of a RFC3161-Compliant Time-Stamping Service," The Third International Workshop for Applied PKI (IWAP2004), Fukuoka, Japan, October 2004.
  33. T.R.N. Rao and Chung-Huang Yang, "Aryabhata Remainder Theorem: Relevance to Public-Key Crypto-algorithms," Proc. 2005 Symposium on Cryptography and Information Security, Kobe, Japan, January 2005, pp. 1111-1116.
  34. T.R.N. Rao and Chung-Huang Yang, "Modular Arithmetic: From Ancient India to Public-Key Cryptography," 2nd French-Taiwanese Conference in Information Technologies,March 2005.   
  35. Chung-Huang Yang, "On the Design of Clock-Controlled Pseudorandom Bit Generators,"  Information Security Conference, June 2005.
  36. Chung-Huang Yang, "Design and Implementation of a Windows-based ECDSA System," Association for Chinese Management Educators (ACME) 2005 Conference, San Diego, USA, July 28-30 2005.
  37. Chung-Huang Yang and Wen-Long Hsu, "Combination of Cryptographic Hash and On-Line Time-Stamping System for Securing Digital Evidence of File Systems," 2005 International Forensic Science Symposium, November 2005.
  38. Binhui Chou, Chung-Huang Yang, and Kouichi Sakurai, "Design and Implementation of an ECM-based Integer Factorization Tool with GMP-ECM on Windows Platforms," 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.

  39. Wei-Tsung Chang and Chung-Huang Yang, “A User-Friendly Implementation of PSEC-KEM and ECDSA on the windows Environment,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.

  40. Sheng-Hsiung Su and Chung-Huang Yang, “Design and Implementation of a live CD for Time-Stamping Service,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.

  41. Pei-Chi Cheng, Chung-Huang Yang, and Kouichi Sakurai, “Design and Implementation of a Live-CA CD/DVD on an Open Source Environment,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.

  42. Pao-Kuan Wang and Chung-Huang Yang, “Design and Implementation of a Live CD/DVD for Vulnerability Scanning,”  2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.

  43. Ming-Kuen Lee and Chung-Huang Yang, “Design and Implementation for Integrated Service Authentication System on the basis of Secure LDAP Server,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.

  44. Shankara K Narayandas, Chung-Huang Yang, and T.R.N. Rao, "Building a Universal Secure E-Mail System, " 2006 SWDSI Annual Conference, March 2006, pp. 250-260.
  45. Chung-Huang Yang, TaeNam Ahn, and Chia-Han Chang, "On the Design and Implementation of a Time-Stamping Service with Linking Schemes, " The 1st Joint Workshop on Information Security, September, 2006, Seoul, Korea, pp. 501-509.
  46. Chiu-Niang Chen and Chung-Huang Yang"Design and Implementation of Cybercrime Investigation Systems Based on Open Source"2006 Conference on Open Source Technologies and Applications,Nov. 2006.
  47. Shih-Jen Chen, Chung-Huang Yang, and Shao-Wei Lan, "A Distributed Network Security Assessment Tool with Vulnerability Scan and Penetration Test," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
  48. Shih-Yi Tu and Chung-Huang Yang, "A User-Friendly Implementation of EPOC on the Windows Environment," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
  49. Chun-Chih Peng and Chung-Huang Yang, "Design and Implementation for Integer Factorization and Primality Testing Tools with Elliptic Curve on Windows Platforms," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
  50. Chih-Kun Tai and Chung-Huang Yang, "Design and Implementation of a Windows-based WLAN Integrated Analysis System," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
  51. Chung-Huang Yang, Chih-Hung Lin, Li-Chou Juan, Jain-Shing Wu, Tai-Yun Huang, "Design and Development of an NIDS Evasion Test Tool with GUI," The 2nd Joint Workshop on Information Security (JWIS 2007), Tokyo, Japan on August 6-7, 2007. 
  52. Chun-Fung Lin, Chung-Huang Yang, and Kouichi Sakurai, "Research and Implementation of ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device," 2008 Symposium on Cryptography and Information Security, Miyazaki, January 2008.   
  53. Jung-Ying Lai, Chun-Fung Lin, and Chung-Huang Yang, "Design and Implementation of an Electronic Voting System with Contactless IC Cards," The 19th International Conference on Information Management 2008 (ICIM 2008), May 16 -17, 2008, Nantou, Taiwan.
  54. Chao-Hsi Yeh and Chung-Huang Yang, "Design and Implementation of Honeypot System Based on Open-Source Software, " IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2008), June 2008. (EI)

  55. Ya-Ping Fu, Kwo-Jean Farn, and Chung-Huang Yang, "CORAS for the Research of ISAC," Proc. IEEE 2008 International Conference on Convergence & Hybrid Information Technology (IEEE ICHIT 2008), August 2008, Daejeon, Korea, pp. 250-256.

  56. Jung-Ying Lai, Jain-Shing Wu, Shih-Jen Chen, Chia-Huan Wu, and, Chung-Huang Yang, "Designing a Taxonomy of Web Attacks," Proc. IEEE 2008 International Conference on Convergence & Hybrid Information Technology (IEEE ICHIT 2008), August 2008, Daejeon, Korea, pp. 278-282.

  57. Hui-Ting Hsieh, Chung-Huang Yang, and TaeNam Ahn, "Implementation of SEA Algorithm on the Windows Platforms, " Proc. IEEE 2008 International Conference on Convergence & Hybrid Information Technology (IEEE ICHIT 2008), August 2008,  Daejeon, Korea, pp. 363-370.

  58. Hsiu Wang, Tung-Kuan Liu, Chung-Huang Yang, "Multiple Teacher Transfer Optimization using Genetic Algorithms – Case Study on Kindergarten Teacher Transfer," The 2008 International Computer Symposium (ICS 2008), November 13-15, 2008, Tamkang University, Damsui, Taipei County, Taiwan.

  59. Kwo-Jean Farn, Yen-Fang Wang, Shu-Kuo Lin, Chung-Huang Yang, Chien-Cheng Huang, "A Study on Industrial Control System Risk Assessment," The 2008 International Computer Symposium (ICS 2008), November 13-15, 2008, Tamkang University, Damsui, Taipei County, Taiwan.

  60. Ting-Kao Liu and Chung-Huang Yang, "Design and Implementation of Campus Gate Control System Based on RFID," The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-08), December 9-10, 2008, Jiaosi, Yilan, Taiwan. (EI)
  61. Chiung-Wan Chan and Chung-Huang Yang, "Design and Implementation of Open Source Web Application Security Tool" Joint Workshop on Information Security (JWIS) 2009, National Sun Yat-sen University, August 2009.
  62. Chung-Huang Yang, Shih-Yi Tu, and Pei-Hua Yen, Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting, the IEEE Fifth International Conference on Information Assurance and Security (IAS-2009), Xi'an, China, August, 2009. (EI)
  63. Pei-Sheng Huang, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of A Distributed Early Warning System Combined with Intrusion Detection System and Honeypot" International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), August 2009, Daejeon, Korea.  (EI)

  64. Pei-Hua Yen, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of a Live-analysis Digital Forensic System," International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), August 2009, Daejeon, Korea. (EI)

  65. Jiun-Kai Ke, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of Using W3af to Achieve Automated Penetration Testing By Live DVD / Live USB," International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), August 2009, Daejeon, Korea. (EI)

  66. Chung-Huang Yang and Kuang-Li Ting, Fast Deployment of Botnet Detection with Traffic Monitoring, The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, September 2009. (EI)
  67. Yu-Ting Lo and Chung-Huang Yang, "Design and Implementation of a Secure Video of Instant Messaging Based on SIMPP," 2009 National Computer Symposium (NCS 2009), National Taipei University, Taiwan, Nov. 27-28, 2009.
  68. Hui-Ting Hsieh and Chung-Huang Yang, "Implementation of Schoof’s Algorithm on the Windows Platforms," The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, August 2010.

  69. Xin-Fang Li, Chung-Huang Yang, Shih-Jen Chen, and Jain-Shing Wu, "Design and Implementation of Forensic System in Android Smart Phone," The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, August 2010.

  70. Chih-Hung Lin, Chung-Huang Yang, Shih-Jen Chen, and Jain-Shing Wu, "An Implementation of a Malware Collection and Data Sharing System Based on Honeypot," The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, August 2010.

  71. Kuang-Li Ting, Chung-Huang Yang, and Tae-Nam Ahn, "Fast Deployment of Botnet Detection based on Traffic Monitoring," International Conference on Convergence and Hybrid Information Technology (ICHIT 2010), August 2010, Daejeon, Korea. (EI)

  72. Xin-Fang Li, Chung-Huang Yang, Shih-Jen Chen, and Jain-Shing Wu, and Tae-Nam Ahn "Forensic System Design and Implementation Based on Open Source Software in Android Smart Phone," International Conference on Convergence and Hybrid Information Technology (ICHIT 2010), August 2010, Daejeon, Korea. (EI)

  73. Sheng-Wen Chen, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of Internal Acquisition Tool in Symbian Smart Phone," International Conference on Convergence and Hybrid Information Technology (ICHIT 2010), August 2010, Daejeon, Korea. (EI)

  74. Chih-Hung Lin and Chung-Huang Yang, "Implementation of Network Forensics Based on Honeypot," 2010 International Security Technology & Management Conference, September, 2010, Taipei.
  75. Chung-Huang Yang and Pei-Hua Yen, "Fast Deployment of Computer Forensics with USBs," The First International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2010), Fukuoka, Japan, November 2010.
  76. Hong-Ming Wang and Chung-Huang Yang, "Design and Implementation of a Network Forensics System for Linux," The 2010 International Computer Symposium (ICS2010), December 2010, Tainan. (EI)
  77. Sheng-Wen Chen, Chung-Huang Yang, and Chien-Tsung Liu, "Design and Implementation of Live SD Acquisition Tool in Android Smart Phone," the Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2011), August 29-30, 2011, Kinmen, Taiwan. (EI)
  78. Yenting Lai, Chunghuang Yang, Chihhung Lin, and TaeNam Ahn, "Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing, " International Conference on Convergence and Hybrid Information Technology (ICHIT 2011), September 2011, Daejeon, Korea. (EI)
  79. Jing-Siang Yang and Chung-Huang Yang, "Design and Implementation of Forensic Software for Android Smart Phones," 2011 Cross-Strait Conference on Information Science and Technology and iCube (CSCIST 2011 and iCube 2011), December 2011, Taipei, Taiwan.
  80. Ren-Jie Chen and Chung-Huang Yang, "Research on Android Anti-Forensic Tools, " The 17th Conference on Information Management and Practice (IMP 2011), December, 2011, Tainan, Taiwan.
  81. Chung-Huang Yang and Bo Yang, "Design and Implementation of Digital Forensic Systems," The 29th Symposium on Cryptography and Information Security (SCIS2012), Kanazawa, Japan, January 2012.
  82. Yi-Hsiung Ting and Chung-Huang Yang, "Design and Implementation of a Cloud Digital Forensic Laboratory," The 30th Symposium on Cryptography and Information Security (SCIS2013), Kyoto, Japan, January 2013.
  83. Chung-Nan Chen, Raylin Tso and Chung- Huang Yang, "Design and Implementation of Digital Forensic Software for iPhone," The 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), July 2013, Seoul, Korea.
  84. Chung-Huang Yang and Chang-Min Chen, “Configuration Management of iOS Devices based on SCAP,” The 31th Symposium on Cryptography and Information Security (SCIS2014), Kagoshima, Japan, Jan. 2014.

SCIS92
with Dr. Shoji Miyaguchi, Dr. Kenji Koyama,
Dr. Atsushi Fujioka, Dr. Hikaru Morita, and Dr. Tatsuaki Okamoto

 

Dr. Shoji Miyaguchi, NTT Yokosuka R&D Center

 


Dr. TaeNam Ahn

 


Dr. Tatsuaki Okamoto 

 


ICCST'97

ICCST'98

Asiacrypt'98

ICCST'99

Asiacrypt'99
with Prof. Guozhen Xiao

JW-ISC'2000
with Prof. SangJae Moon
and Prof. Kil-Hyun Nam

QIC Seminar

Asiacrypt'2000

Prof. Kohichi Sakaniwa
Tokyo Inst. Tech.(2001.8.15)


ICICS'01
with Prof. Sihan Qing
and Dr. Welland Chu


with Prof. Kouichi Sakurai
(2002.3.14)

IIMA2002
with Prof. Pete Chong

SCIS2003
with Dr. Hikaru Morita

ACME 2003

ACME 2003

with Prof. Ker-Chang Chang

RSA 2004
with Prof. Kazuo Ohta and Dr. Tatsuaki Okamoto

RSA 2004
with Dr. Burton S. Kaliski, Jr.

RSA 2004
with Prof. Qibin Zhai

1st French-Taiwanese Conference in Information Technologies

1st French-Taiwanese Conference in Information Technologies

1st French-Taiwanese Conference in Information Technologies

Progress on Cryptography: 25 years of cryptography in China

Shanghai [2004.05.15]

 

Progress on Cryptography: 25 years of cryptography in China

Shanghai [2004.05.15]

 

ChinaCrypt'2004

Wuxi [2004.05.18]

 

Univ. of Louisiana at Lafayette [2004.07.13]

 

Univ. of Louisiana at Lafayette [2004.08.15]

 

Crypto Lab

Univ. of Louisiana at Lafayette [2004.08.20]

Univ. of Louisiana at Lafayette

Lafayette, Louisiana [2004.08.22]

IWAP2004

Fukuoka, Japan [2004.10.05]

 

SCIS 2005

Kobe, Japan [2005.01.27]

 

Kaohsiung [2005.06.11]

Fukuoka, Japan [2006.01.14]

 

ISIT Workshop

Fukuoka, Japan [2006.01.16.]

 

JWIS 2006 [2006.09.21.]

 

JWIS 2006 [2006.09.22.]

 

JWIS 2006 [2006.09.22.]

SCIS2007

Fukuoka, Japan [2007.01.22] 

 

SCIS2007 [2007.01.23]

 

SCIS2007 [2007.01.26]

Kaohsiung [2007.03.07]

 

JWIS2007

[2007.08.06]

 Tokyo [2007.08.07]

 

Tokyo, Japan [2007.08.08]

 

Yokohama, Japan [2007.08.09]

Tokyo, Japan [2007.08.10]

ISC2007

[2007.10.11]

Santiago, Chile [2007.10.12]

Sungkyunkwan University

[2007.10.22]

 

Soonchunhyang University

[2007.10.23]

Soonchunhyang University

[2007.10.23]

 

Hannam University

[2007.10.24] 

 

Seoul, Korea [2007.10.26]

Seoul, Korea [2007.10.27]

Fukuoka, Japan [2008.1.28] 

Taipei [2008.2.14]

Fukuoka, Japan [2008.2.24]

Fukuoka, Japan

[2008.2.25]

ISIT

Fukuoka, Japan [2008.2.25]

11th Anti-Spam Meeting

Tokyo [2008.3.24]

Kaohsiung [2008.5.23]

 Kaohsiung [2008.5.27]

Hualien [2008.5.30]

Seoul, Korea [2008.7.8]

JWIS 2008

Seoul, Korea [2008.7.11]

Seoul, Korea [2008.7.11]

DMZ, Korea [2008.7.12]

 Kaohsiung [2008.7.17]

Taiwan-Japan Workshop

Taipei [2008.7.18]

Taipei [2008.7.19]

Taipei [2008.7.19]

Kaohsiung [2008.7.23]

ICHIT 2008 Daejeon [2008.8.29]

Kaohsiung [2008.9.16] 

 ISC2008 Taipei [2008.9.17]

 

Japan-Taiwan Joint Seminar

Fukuoka, Japan [2008.10.14]

 

Marinoa City, Japan [2008.10.17]

Kaohsiung [2008.12.17]

Digital Forensics Team

Taipei [2009.01.13]

SCIS2009

Kyoto [2009.01.20]

III/NMI

Taipei [2009.02.23]

Taipei Municipal Lan-Zhou Junior High School

Taipei [2009.03.09]

 

Computer Forensics Symposium

Tainan [2009.04.07] 

Kaohsiung  [2009.5.29]

 

Taichung [2009.7.2]

 

Kaohsiung  [2009.8.4]

Taipei [2009.8.5]

Kaohsiung   [2009.8.7]

Kaohsiung   [2009.8.8]

Xi'an [2009.8.15]

Xi'an [2009.8.15]

Xi'an [2009.8.21]

ICHIT 2009 Daejeon [2009.8.27]

IIH-MSP 2009

Kyoto [2009.09.14] 

IIH-MSP 2009

Kyoto [2009.09.15]

 

Information Security Consortium Seminar Kaohsiung [2009.10.14]

Penang, Malaysia [2009.10.22]

Data Center Summit @ Intel

Penang, Malaysia [2009.10.22]

 

 

Malaysia  [2009.10.24]

Langkawi, Malaysia [2009.10.24]

Langkawi, Malaysia [2009.10.24]

Kaohsiung [2009.11.26]

 

Tokyo, Japan [2009.12.08]

 

Tokyo, Japan [2009.12.09]

Tokyo, Japan [2009.12.10]

 

Information Security Consortium Seminar Kaohsiung [2010.03.10]

 

Kaohsiung [2010.06.24]

Kaohsiung [2010.06.24]

Kaohsiung [2010.07.08]

Kaohsiung [2010.07.26]

 

Guangzhou, China [2010.08.02]

Guangzhou, China [2010.08.04]

JWIS2010 [2010.08.05]

JWIS2010 [2010.08.05]

Sun Yat-sen University, China [2010.08.06]

Xidian University [2010.08.09]

 

Xi'an [2010.08.11]

National Kaohsiung First University of Science and Technology [2010.09.16]

 

Nantou [2010.10.17]

 

Tai-Chung [2010.10.17]

 

Hakata, Japan [2010.11.06]

High School Classmates

Taipei [2010.12.25]

 

Tunghai University  [2010.12.27]

Taipei [2011.1.6]

Central Police University  [2011.4.6]

 

CSCIS 2011

Hangzhou, China [2011.4.13]

CSCIS 2011

Hangzhou [2011.4.15]

Central Police University [2011.5.19]

Beijing [2011.07.13]

Shanghai Jiao Tong University

Shanghai [2011.7.16]

Shanghai [2011.07.17]

CTCIS 2011

Guiyang [2011.08.21]

Guiyang [2011.08.21]

Guiyang [2011.08.21]

Huangguoshu Waterfall  [2011.08.22]

Huangguoshu Waterfall [2011.08.22]

Huangguoshu Waterfall  [2011.08.22]

Huangguoshu Waterfall  [2011.08.22]

Kaohsiung [2011.10.06]

ICCCT2011

Seoul [2011.10.20]

Seoul [2011.10.21]

ICCCT2011

Seoul [2011.10.22]

RAISE Forum Meeting

KOFST, Seoul [2011.11.25]

Suraon, Seoul [2011.11.25]

Guangzhou [2011.12.10]

Guangzhou [2011.12.11]

Foshan, Guangdong  [2011.12.12]

 Kanazawa [2012.2.3]

 Fuzhou [2012.3.10]

Taipei [2012.5.14]

Kaohsiung [2012.5.18]

 

Taichung  [2012.6.26]

Taipei  [2012.7.12]

Hotel Azur Takeshiba, Tokyo [2012.7.23]

Sunshine City Prince Hotel, Tokyo [2012.7.25] 

Jungli City [2012.7.30]

 

Shaanxi  [2012.8.12]  


Shaanxi [2012.8.14]

Xidian University [2012.8.15]

Qinghai University For Nationalities [2012.8.18]

Qinghai Normal University [2012.8.19]

Shaanxi Normal University [2012.8.19]


Hefei [2012.8.21]

Kenting, Taiwan [2012.11.23]

Asiacrypt 2012, Beijing [2012.12.03]

Asiacrypt 2012, Beijing [2012.12.04]

Beijing [2012.12.04]

CCISA, Kaohsiung [2012.12.06]

Kaohsiung [2012.12.24]

Tainan [2012.12.25]

CCISA, Kaohsiung [2013.01.11]

 

 

 

 

 

 

 

 

CCISA, Kaohsiung [2013.02.20]

Kaohsiung [2013.02.20]

CCISA, Kaohsiung [2013.03.12]

 

Kaohsiung [2013.03.12]

Kaohsiung [2013.5.20]

 

Sun Moon Lake [2013.5.21]

 

CISC 2013

Tainan [2013.5.23]

 

CCISA, Kaohsiung [2013.5.26]

 

The 1st International Conference on Cryptography and Cloud Computing Security

Guangzhou [2013.6.22]

AsiaJCIS 2013

Seoul [2013.7.25]

 

 

Seoul [2013.7.26]

CASC 2013

Lanzhou [2013.7.28]

Lanzhou Univ. of Technology [2013.7.28]

Jiayu Pass [2013.7.29]

Xi'an [2013.7.31]

 

Xi'an [2013.7.31]

 

Yan'an [2013.8.2]

CSCIS 2013

Kaohsiung  [2013.9.11]

CSCIS 2013

Kaohsiung  [2013.9.11]

CSCIS 2013

Kaohsiung  [2013.9.11]

CSCIS 2013

Kaohsiung  [2013.9.11]

CSCIS 2013

Kaohsiung  [2013.9.11]

CSCIS 2013

Kaohsiung  [2013.9.11]

CSCIS 2013

Kaohsiung  [2013.9.11]

CCISA, Kaohsiung [2013.10.12]

Chinacrypt 2013

Fuzhou [2013.10.26]

Chinacrypt 2013

Fuzhou  [2013.10.26]

Chinacrypt 2013

Fuzhou [2013.10.26]

Chinacrypt 2013

Fuzhou  [2013.10.26]

 

Chinacrypt 2013

Fuzhou [2013.10.26]

Chinacrypt 2013

Fuzhou [2013.10.26]

Chinacrypt 2013

Fuzhou [2013.10.27]

Taipei [2013.11.09]

 Kaohsiung [2013.12.27]

Tainan [2014.01.08] 

SCIS 2014

Kagoshima [2014.01.21] 

Haikou [2014.03.13] 

Haikou [2014.03.13]

Haikou [2014.03.13] 

Qionghai [2014.03.14] 

Wuhan [2014.03.21] 

Wuhan [2014.03.21] 

Wuhan [2014.03.21] 

Wuhan [2014.03.23]  

Wuhan [2014.03.24]  

Wuhan [2014.03.26]

 Xi'an [2014.04.13]

 Xi'an [2014.04.14]

 Xi'an [2014.04.14]

 Xi'an [2014.04.15]

 Xi'an [2014.04.15]

 Xi'an [2014.04.16]

 Xi'an [2014.04.16]

 Dengfeng [2014.04.17]

 Dengfeng [2014.04.18]

 Dengfeng  [2014.04.19]

 Xi'an [2014.04.19]

 Taipei [2014.05.28]

 Taipei [2014.05.29]

 Taipei [2014.05.31]

 Kaohsiung [2014.06.04]

 Kaohsiung [2014.06.05]

  Taipei [2014.06.06]

  Lanzhou [2014.06.12]

  Guangzhou [2014.06.19]

  Guangzhou [2014.06.21]

 Xi'an [2014.08.30]

 Xi'an [2014.08.31]

 Xi'an [2014.08.31]

 Xi'an [2014.09.01]

 Xi'an [2014.09.02]

 Xi'an [2014.09.03]

 AsiaJCIS 2014, Wuhan [2014.09.04]

 Wuhan [2014.09.06]

 Xi'an [2014.09.17]

 Xi'an [2014.09.19]

 Xi'an [2014.09.20]