亞洲大學 光電與通訊學系
系所優勢 系所優勢   教學特色 教學特色   未來出路 未來出路   中文版 中文版   ENGLISH ENGLISH   網站地圖 網站地圖  
亞洲大學 光電與通訊學系
亞洲大學 光電與通訊學系
   
 
  資訊捷徑  
 

亞洲大學首頁連結
教育部97年度校園安全應用RFID協助學生安全建置計畫
 
     
  專任師資  
 
李正吉 助理教授
李正吉 助理教授 個人網頁連結   個人網頁連結2
研究室位置:資訊大樓地下一樓HB59R
研究室分機:20059
E-mail:
學歷

學位

校名

科系

博士

中興大學

資訊科學所

博士

交通大學

資訊科學所

碩士

朝陽科技大學

資訊管理學系研究所

學士

朝陽科技大學

資訊管理學系

 
經歷

服務機關

服務部門

職稱

嶺東技術學院

資管系

兼任講師

交通大學

圖書館

數位圖書館之應用助教

交通大學

資訊科學系

人工智慧課程助教

 

發表論文

(A) 期刊論文
[1] Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, “A Server-Assissted Authentication Protocol for Detecting Error Vectors”, ACM Operating Systems Review, Vol. 38, No. 2, PP. 93-96, 2004. (EI)

[2] Min-Shiang Hwang, Cheng-Chi Lee, and Ji-Zhe Lee, “A New Anonymous Channel Protocol in Wireless Communications”, accepted (Aug. 13, 2003) and to appear in International Journal of Electronics and Communications. (SCI)

[3] Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, “Untraceable Blind Signature Schemes Based on the Discrete Logarithm Problem”, Fundamenta Informaticae, Vol. 55, No. 3-4, PP. 307-320, May-June 2003. (SCI)

[4] Cheng-Chi Lee, Chao-Chen Yang, and Min-Shiang Hwang, "A New Privacy and Authentication Protocol for End-to-End Mobile Users," accepted (June 27, 2003) and to appear in International Journal of Communication Systems. (SCI)

[5] Cheng-Chi Lee, Ting-Yi Chang, and Min-Shiang Hwang, “A Simple Broadcasting Cryptosystem in Computer Networks Using Exclusive-OR”, accepted (May 12, 2003) and to appear in International Journal of Computer Applications in Technology. (EI)

[ 6] Min-Shiang Hwang, Cheng-Chi Lee, and Yan-Chi Lai, “An Untraceable Blind Signature Scheme”, IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E86-A, No. 7, pp. 1902-1906, July 2003. (SCI)

[7] Min-Shiang Hwang, Chih-Wei Lin, and Cheng-Chi Lee, “Improved Yen-Joye's Authenticated Multiple-key Agreement Protocol”, IEE ELECTRONICS LETTERS, Vol. 38, No. 23, PP. 1429-1431, Nov. 2002. (SCI)

[8] Min-Shiang Hwang, Cheng-Chi Lee, and Yan-Chi Lai, “Traceability on Stadler et al.'s Fair Blind Signature Scheme”, IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E86-A, No.2, pp. 513-514, 2003. (SCI)

[9] Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, “Extension of Authentication Protocol for GSM”, IEE Proceedings - Communications, Vol. 150, No. 2, PP. 91-95, April 2003. (SCI)

[10] Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, “A Flexible Remote User Authentication Scheme Using Smart Cards”, ACM Operating Systems Review, Vol. 36, No. 3, PP. 46-52, 2002. (EI)

[11] Cheng-Chi Lee, Min-Shiang Hwang, and Li-Hua Li, “A New Key Authentication Scheme Based on Discrete Logarithm”, Applied Mathematics and Computation, vol. 139, no. 2, pp. 343-349, July 2003. (SCI)

[12] Min-Shiang Hwang, Cheng-Chi Lee, and Yuan-Liang Tang, " A Simple Remote User Authentication Scheme ", Mathematical and Computer Modelling, Vol. 36, Issue. 1-2, PP. 103-107, 2002. (SCI)

[13] Eric Jui-Lin Lu, Cheng-Chi Lee, Min-Shiang Hwang, "Cryptanalysis of Some Authenticated Key Agreement Protocols", International Journal of Computational and Numerical Analysis and Applications, Vol. 3, No. 2, PP. 151-157, 2003.

[14] Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang, 94/5, “A New Blind Signature Based on the Discrete Logarithm Problem for Untraceability”, Applied Mathematics and Computation, Vol. 164, Issues 3, PP. 837-841. (SCI)

[15] Cheng-Chi Lee, Ting-Yi Chang, and Min-Shiang Hwang, 94/7, “A Simple Broadcasting Cryptosystem in Computer Networks Using Exclusive-OR”, International Journal of Computer Applications in Technology, Vol. 24, No. 3, PP. 180-183. (EI)

[16] Min-Shiang Hwang, Cheng-Chi Lee, Ji-Zhe Lee, Chao-Chen Yang, 94/7, “A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography”, Telecommunication Systems, Vol. 29, No. 3, PP. 165-180. (SCI)

[17] Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang, 95/1, "Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures", Applied Mathematics and Computation, Vol. 172, Issue 2, PP. 1195-1200. (SCI)

[18] I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, 95/6, “A Password Authentication Scheme Over Insecure Networks”, Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740. (SCI)

[19] Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, 95/10, “Security Enhancement on A New Authentication Scheme with Anonymity for Wireless Environments”, IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683-1687. (SCI)

[20] Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao, 95/11/25, “A New Authentication Protocol Based on Pointer Forwarding for Mobile Communications”, accepted in WIRELESS COMMUNICATIONS & MOBILE COMPUTING. (SCI)

[21] Min-Shiang Hwang, Cheng-Chi Lee, 94/7, “Research Issues and Challenges for Multiple Digital Signatures”, International Journal of Network Security, vol. 1, no. 1, pp. 1-7.

[22] Cheng-Ying Yang, Cheng-Chi Lee, and Shu-Yin Hsiao,94/9, “Man-in-the-Middle Attack on the Authentication of the User From the Remote Autonomous Object”, International Journal of Network Security, vol. 1, no. 2, pp. 81-83.

[23] Cheng-Chi Lee, 94/11, “Two Attacks on the Wu-Hsu User Identification Scheme”, International Journal of Network Security, vol. 1, no. 3, pp. 147-148.

[24] Chwei-Shyong Tsai, Cheng-Chi Lee, and Min-Shiang Hwang, 95/9, “Password Authentication Schemes: Current Status and Key Issues”, International Journal of Network Security, vol. 3, no. 2, pp. 101-115.

[25] Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin, “An Efficient Multi-Round Anonymous Auction Protocol”, accepted (Feb. 27, 2007) in Journal of Discrete Mathematical Sciences & Cryptography

(B) 研討會論文
[1] Cheng-Chi Lee, and Li-Hua Li, Min-Shiang Hwang, 93/8/16-18, “Digital Signature for Diffie-Hellman Public Keys Using Time Stamp", The 8th IASTED International Conference on INTERNET & MULTIMEDIA SYSTEMS & APPLICATIONS, IMSA 2004, Kauai, Hawaii, USA.

[2] I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, 94/8/22-26, “Security Enhancement for a Dynamic ID-based Remote User Authentication Scheme”, IEEE CS Press, International Conference on Next Generation Web Services Practices (NWeSP'05), Seoul, Korea.

[3] Ming-feng Wu, Shiow-Yuan Huang, Cheng-Chi Lee, Chi-Tung Chen, 95/4/1, “The System of Dilution and Alarm over Carbon Monoxide Indoor”, 2006 International Conference of Digital Technology and Innovation Management, HUAFAN University, Taipei, Taiwan R.O.C.

[4] 黃秀園, 梁棨棠, 李正吉 , 94/6/19 , “無線個人區域網路應用在個人化多重生理訊號感測系統之研究與分析” , 2005臺灣健康管理學會會員大會暨學術研討會 , 元培科學技術學院。

[5] 吳明峰,黃秀園, 李正吉 , 94/11/26-27 , “遠距睡眠醫療評估技術” , 台灣健康促進暨衛生教育學會第十屆第三次會員大會暨學術研討會 , 國立台灣師範大學。

[6] 黃秀園, 李正吉, 黃國祐 , 95/3/31 , “隨意型無線網路之安全技術” , 第十二屆行動計算研討會 , 逢甲大學。

[7] 黃秀園, 李正吉, 陳宜齋 , 95/3/31 , “Li-Singhal藍芽散網金鑰交換協定之破密” , 第十二屆行動計算研討會 , 逢甲大學。

[8] 黃秀園, 李正吉, 楊竣吉 , 95/3/31 , “網路電話之安全性分析” , 第十二屆行動計算研討會 , 逢甲大學。

[9] 黃明祥, 李正吉, 谷威涵 , 95/3/31 , “灰階影像資料隱藏之研究” , 第十二屆行動計算研討會 , 逢甲大學。

[10] 李正吉, 黃國祐, 黃秀園 , 96/3/23 , “兩個遠端認證與金鑰協定機制之缺點” , 銘傳大學2007國際學術研討會-資訊工程組 , 銘傳大學。

[11] 李正吉, 黃國祐, 谷威涵 , 96/3/23 , “一個安全及有效率之無線通訊匿名系統認證協定之破密” , 銘傳大學2007國際學術研討會-電腦與通訊工程組 , 銘傳大學。

[12] 李正吉, 楊竣吉, 黃秀園 , 96/4/20 , “A New Authentication Scheme for Session Initiation Protocol” , 第十三屆行動計算研討會 , 大葉大學。

(C) 專書論文
[1] 黃明祥, 劉知育, 李正吉 , 93/9 , “檔案資訊系統安全防護策略” , 檔案季刊 , 第三卷,第三期,pp. 21-30 , 中興。

[2] 李正吉,林詠章,黃明祥 , "電子檔案之安全技術" , 檔案季刊 , 第一卷,第二期,pp. 48-57 , 2002。並收錄於2004年出版之檔案資訊資源管理第二十六章中 , 中興。

 
 
         
 
Copyright© 2008 All Rights Reserved.
 
請使用解析度 1024 x 768 來觀看此網站,41354 台中縣霧峰鄉柳豐路 500 號 健康大樓六樓 H601 室,TEL: (04)2332-3456 Ext.6181
亞洲大學 光電與通訊學系
 
 
亞洲大學 光電與通訊學系