描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\english\student\st_banner.jpg
[ Ph. D. (graduate) ] [ Ph. D. (in school)] [ Research Assistant ] [ Exchange Student ] [ Master (graduate) ] [ Master (in school) ]


Ph. D. Students (graduated)


01. Lin, Chu-Hsing

Title: Some Control Mechanisms for Data Security in Computer Systems

Completion Date: June 1991

Tung Hai University

Department of Information Engineering and Computer Science <Professor>

E-Mailchlin@thu.edu.tw

Web
http://islab.csie.thu.edu.tw/common/teacher.php

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd002_ccw.jpg

02. Wu, Tsung-Cheng


Title: The Study of Encryption and Control Techniques for Information System

Completion Date: June 1992

National Taiwan University of Science and Technology

Department of Information Management <Professor>

E-Mailtcwu@cs.ntust.edu.tw

Web
http://security.cs.ntust.edu.tw/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd003_yjc.jpg

03. Shih, Chien-Chin

Title: Some Properties on Vectorial Addition Chains

Completion Date: December 1994

Luminary Buddhist Institute <Teacher>

E-Mailjenjin@mail.educities.edu.tw

Webhttp://residence.educities.edu.tw/jenjin/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd004_zyc.jpg

04. Chen, Chih-Ying

Title: The Study of Properties for Local Queries in Multi-Key File Systems

Completion Date: June 1995

Feng Chia University

Department of Communications Engineering <Professor>

E-Mailchihchenfcu.edu.tw

Webhttp://www.ce.fcu.edu.tw/people/faculty/chihchen/chihchen.html

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd005_hjh.gif

05. Huang, Hsin-Chia

Title: The Design and Server-Aided Secret Computation of Digital Signatures

Completion Date: April 1996

Tam Kang University

Department of Information Engineering and Computer Science <Associate Professor>

E-Mailsjhwang@mail.tku.edu.tw

Webhttp://mail.tku.edu.tw/sjhwang/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd006_cyc.jpg

06. Chen, Chien-Yuan

Title: The Study of Properties and Applications for Public Key Cryptosystem Based on Number Theorem

Completion Date: April 1996

National University of Kaohsiung

Department of Information Engineering and Computer Science <Professor>

E-Mailcychen07@nuk.edu.tw

Webhttp://www.csie.nuk.edu.tw/~cychen/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd007_dcl.jpg

07. Lou, Te-Chuan

Title: Fast Computations for Some Public Key Cryptosystems

Completion Date: March 1997

Chang Gung University

Department of Information Engineering and Computer Science <Professor>

E-Maildclouprof@gmail.com

Webhttp://www.ccit.ndu.edu.tw/html/elec/Component/teacherhome/Der-Chyuan%20Lou/index1.htm

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd008_lwb.jpg

08. Lee, Wei-Bin

Title: Designing Some Digital Signature Schemes and Extending Their Applications to Information Security Systems

Completion Date: May 1997

Taipei City Govermment

Department of Information Technology <Commissioner>

E-Mailwblee@fcu.edu.tw

Webhttp://www.iecs.fcu.edu.tw/wSite/ct?xItem=4e0a8ffc45dec87f&ctNode=34621&mp=370201&submit=個人資料

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd009_rjh.jpg

09. Huang, Jen-Chun

Title
Some Secret Sharing Schemes and Their Applications

Completion Date: April 1998

Tam Kang University

Department of Information Engineering and Computer Science <Professor>

E-Mailjunhwang@ms35.hinet.net

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd010_cfl.jpg

10. Li, Chin-Feng

Title
Some Indexing Design and File Organizations for Spatial Match Retrieval

Completion Date: June 1998

Chao Yang University of Technology

Department of Information Management <Professor>

E-Maillcf@cyut.edu.tw

Webhttp://www.cyut.edu.tw/~lcf/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd011_martin.gif

11. Hu, Yu-Cheng

Title
Some Image Encoding Schemes Based on Vector Quantization

Completion Date: Decmeber 1999

Providence University

Department of Information Management <Professor>

E-Mailychu@pu.edu.tw

Webhttp://www.cci.pu.edu.tw/~ychu/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd012_jjh.gif

12. Chiang, Chi-Han

Title
Effective Algorithms for Compressing Various Data

Completion Date: December 1999

National Formosa University

Department of Information Engineering and Computer Science <Associate Professor>

E-Mailjhjiang@nfu.edu.tw

Webhttp://csie.nfu.edu.tw/mypage/B13005

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd013_wct.jpg

13. Wang, Ching-Te

Title
Designing Some Cryptographic Schemes for Group Communication Systems

Completion Date: December 1999

National Chin Yi University of Technology

Department of Information Management <Professor>

E-Mailctwang@ncut.edu.tw

Webhttp://blog.ncut.edu.tw/meworksv2a/meworks/page.aspx?no=2590

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd014_chan.jpg

14. Chan, Yung-Kuan

Title
Similar Image and Video Retrieval Systems Based on Spatial and Color Attributes

Completion Date: December 2000

National Chung Hsing University

Department of Information Management <Professor>

E-Mailykchan@nchu.edu.tw

Webhttp://web.nchu.edu.tw/pweb/users/ykchan

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd015_jackhong.jpg

15. Hung, Kuo-Lung

Title
Block Reconstruction Techniques for Image Recovery

Completion Date: January 2002

Chao Yang University of Technology

Department of Information Management <Assistant Professor>

E-Mailklhung@cyut.edu.tw

Webhttp://www.cyut.edu.tw/~klhung/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd016_Tsai.jpg

16. Tsai, Chui-Hsiung

Title
A Study of Image Intellectual Property Rights Protection and Image Camouflage

Completion Date: May 2002

National Chung Hsing University

Department of Information Management <Professor>

E-Mailtsaics@nchu.edu.tw

Webhttp://140.120.210.163/tsaics/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd017_wu.jpg

17. Wu, Hsien-Chu

Title
Copyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery

Completion Date: June 2002

National Taichung University of Science and Technology

College of Information and Distribution Science <Dean>

E-Mailwuhc@nutc.edu.tw

Webhttp://mtlab.csit.ntit.edu.tw/lab

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd018_Luda.jpg

18. Huang, Kuo-Feng

Title
Secure Encryption and Authentication Schemes for Text Data and Digital Images

Completion Date: June 2002

National Taichung Institute of Technology

Department of Multimedia Design <Assistant Professor>

E-Mailkfhwang@ntit.edu.tw

Webhttp://web.ntit.edu.tw/~kfhwang/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd019_pytsai.jpg

19. Tsai, Pi-Yu

Title
The Study of Image Protection Mechanisms for Image Hiding and Image Authentication

Completion Date: January 2004

National United University

Department of Information Engineering and Computer Science <Professor>

E-Mailpytsai@nuu.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd020_iclin.jpg

20. Lin, Yung-Chang

Title: Data Communication and Security in Mobile Computing Environment

Completion Date: March 2004

National Chung Hsing University

Department of Information Management <Professor>

E-Mailiclin@nchu.edu.tw

Webhttp://mis.nchu.edu.tw/iclin/index.htm

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd021_yplai.jpg

21. Lai, Yi-Pong

Title: Fast Exponentiation Computations and Number System Transformations

Completion Date: July 2004

National Defense University, Chung Cheng Insituite of Technology

Department of Computer Science <Professor>

E-Mailyopolai@gmail.com

Webhttp://www.ccit.ndu.edu.tw/html/cs/html/teacherhome/lai/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd022_lzchung.jpg

22. Chuang, Jun-Chou

Title: Steganography and Watermarking in Digital Images

Completion Date: October 2004

Providence University

Department of Computer Science and Communication Engineering <Associate Professor>

E-Maillzchung@pu.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd023_yhyu.jpg

23. Yu, Yuan-Hui

Title: The Study of Digital Image Hiding and Recognition

Completion Date: January 2005

Chien Hsin University of Science and Technology

Department of Computer Science and Information Engineering <Associate Professor>

E-Mailyhyu@mail.stut.edu.tw

Webhttp://www.csie.cyu.edu.tw/yhyu/yhyu.htm

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd024_wen.jpg

24. Tseng, Hsien-Wen

Title: Image Coding Schemes for Data Hiding and Error Resiliency

Completion Date: January 2005

Chao Yang University of Technology

Department of Information Management <Associate Professor>

E-Mailhwtseng@cyut.edu.tw

Webhttp://www.cyut.edu.tw/~hwtseng/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd025_ccwen.jpg

25. Chan, Chao-Wen

Title: The Enhancements of Some Public Key Cryptosystems and Their Applications in Electronic Commerce

Completion Date: January 2005

National Taichung Institute of Technology

Department of Computer Science and Information Technology <Associate Professor>

E-Mailccwen@ntit.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd026_hfhwang.jpg

26. Huang, Hui-Feng

Title: The Design and Applications of Some Digital Signatures

Completion Date: January 2005

National Taichung University of Science and Technology

Department of Computer Science and Information Engineering <Professor>

E-Mailphoenix@ntit.edu.tw

Webhttp://163.17.136.168

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd027_ltc.jpg

27. Lu, Tzu-Chun

Title: The Study of Information Hiding Mechanisms

Completion Date: December 2005

Chao Yang University of Technology

Department of Information Management <Associate Professor>

E-Mailtclu@cyut.edu.tw

Webhttp://www.cyut.edu.tw/~tclu/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd028_yfc.jpg

28. Chang, Ya-Fen

Title: Authentication and Digital Signature Schemes and Their Applications to E-commerce

Completion Date: December 2005

National Taichung University of Science and Technology

Department of Computer Science and Information Engineering <Professor>

E-Mailcyf@cs.ccu.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd029_ccs.jpg

29. Chan, Chi-Hsiang

Title: The Study of Image Steganography and Digital Watermarking

Completion Date: December 2005

Asia University

Department of Computer Science and Applications <Professor>

E-Mailcch@cs.ccu.edu.tw

Webhttp://dns2.asia.edu.tw/~cschan/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd030_lcy.jpg

30. Lin, Chih-Yang

Title: Data Mining and Its Applications to Image Processing

Completion Date: October 2006

Asia University

Department of Computer Science & Information Engineering <Associate Professor>

E-Mailandrewlin@asia.edu.tw

Webhttp://dns2.asia.edu.tw/~andrewlin/homepage/Cintroduction.html

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd031_lyc.jpg

31. Lee, Yu-Chiang

Title: Fast Algorithms for Mining Frequent Itemsets

Completion Date: May 2007

Southern Taiwan University

Department of Information Engineering and Computer Science <Assistant Professor>

E-Maillyc@cs.ccu.edu.tw

Webhttp://faculty.stut.edu.tw/~lyc002/index_stut.htm

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd032_wenn.jpg

32. Wu, Wen-Chuan

Title: The Study of Vector Quantization and Its Applications to Information Hiding

Completion Date: July 2007

Aletheia University

Department of Information Engineering and Computer Science <Assistant Professor>

E-Mailau4387@email.au.edu.tw

Webhttp://wennwu.epage.au.edu.tw

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd033_wmn.jpg

33. Wu, Ming-Ni

Title: Some Information Hiding Schemes for Various Image Types

Completion Date: November 2007

National Taichung University of Science and Technology

Department of Infromation Management <Associate Professor>

E-Mailmnwu@nutc.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd034_ljs.jpg

34. Lee, Jung-San

Title: Security Technologies on Wireless Communications and Applications in Electronic Commerce

Completion Date: March 2008

Feng Chia University

Department of Information Engineering and Computer Science <Associate Professor>

E-Mailljs@cs.ccu.edu.tw

Webhttp://myiecs.iecs.fcu.edu.tw/_visitor/teacher/teacher_pro.php?fdno=T97074

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\phd91\jack.jpg

35. Chou, Yung-Chen

Title: A Study of Digital Image Coding and Retrieving Techniques

Completion Date: December 2008

Asia University

Department of Information Engineering and Computer Science <Associate Professor>

E-Mailyungchen@gmail.com

Webhttp://210.70.84.25/

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\phd93\david.jpg

36. Tai, Wei-Liang

Title: Image Steganography and Reversible Data Embedding Techniques

Completion Date: December 2008

Chinese Culture University

Department of Information & Communications <Assistant Professor>

E-Mailtaiwl@cs.ccu.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\phd91\jenho1.jpg

37. Yang, Jen-Ho

Title: Authentication Protocols for E-Commerce Applications

Completion Date: June 2009

Kainan University

Multimedia and M-Commerce <Associate Professor>

E-Mailjenhoyang@mail.knu.edu.tw

Webhttp://www.ec.knu.edu.tw/ecnew/program/faculty.php?id=38

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd038_page.jpg

38. Lin, Pei-Yu

Title: Removable Digital Watermarking and Image Protection Mechanisms

Completion Date: June 2009

 

Yuan Ze University

Department of Information Communication <Associate Professor>

E-Maillpy91@cs.ccu.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd039_circle.jpg

39. Chen, Yi-Hui

Title: Secret Hiding and Retrieval Techniques for Digital Media

Completion Date: June 2009

Asia University

Department of Information Science and Applications <Associate Professor>

E-Mailchenyh@cs.ccu.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd040_peipei.jpg

40. Hsieh, Yi-Pei

Title: Embedding Secrets in Digital Images and Their Compression Codes

Completion Date: June 2009

Tzu Chi College of Technology

Department of Information Engineering and Informatics <Assistant Professor>

E-Mailiei04@ems.tccn.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd041_duc.jpg

41. Kieu, The Duc

Title: Reversible Information Hiding Techniques for Digital Watermarking and Steganographic Applications

Completion Date: June 2009

The University of the West Indies, Trinidad

Department of Computing and Information Technology <Assistant Professor>

E-Mailktduc0323@gmail.com

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd042_wcc.jpg

42. Wang, Chung-Chuan

Title: The Study of Stegnography and Watermark on Binary Images

Completion Date: January 2010

Chung Chou Institute of Technology <Assistant Professor>

E-Mailccwang@dragon.ccut.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd043_wzh.jpg

43. Wang, Zhi-Hui

Title: The Research on Reversible Data Embedding Techniques

Completion Date: April 2010

Dalian University of Technology <Associate Professor>

E-Mailwangzhihui1017@gmail.com

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd044_ccc.jpg

44. Chen, Chang-Chu

Title: Efficient Image Encoding and Information Embedding Techniques

Completion Date: June 2010

Central Taiwan University of Science and Technology

Management Information Systems <Associate Professor>

E-Mailccz@cs.ccu.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd045_thc.jpg

45. Tsai, Hao-Chuan

Title: Authentication and Key Agreement Schemes for Network Applications

Completion Date: December 2010

Tzu Chi College of Technology

Department of Information Engineering and Informatics <Assistant Professor>

E-Mailss241@ems.tccn.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd046_lcy_1.jpg

46. Lee, Chia-Yin

Title: Secure Communication Schemes in Network Environments

Completion Date: December 2010

Lionic Corporation

Senior Engineer

E-Mailcylee@url.com.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd047_wu.jpg

47. Wu, Chia-Chi

Title: Security Mechanisms for Electronic Business Applications

Completion Date: January 2011

Staff of J6, MND, Taiwan (R.O.C.)

E-Maildavidwu120@gmail.com

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd048_white.jpg

48. Pai, Pei-Yan

Title: The study of segmentation and hiding techniques for medical images

Completion Date: April 2011

Genesys Logic <Senior Engineer>

E-Maild938338@oz.nthu.edu.tw

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd049_ckn.jpg

49. Chen, Kuo-Nan

Title: Hiding Secret Information in Image Compression Code and Image Protection Techniques

Completion Date: December 2011

ASUS <Senior Engineer>

E-Mailkuonan.chen@gmail.com

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd050_coby1.jpg

50. Chang, Shih-Chang

Title: The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce

Completion Date: June 2013

Silicon Motion

Project Leder Engineer

E-Mailchang.coby@gmail.com

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd051_ctf.jpg

51. Cheng, Ting-Fang

Title: Secure Authentication Protocols and Their Applications

Completion Date: June 2013

TAIWAN-CA INC. (TWCA)

Senior Engineer

E-Mailnthu.tiffany@gmail.com

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd052_wxt.jpg

52. Wang, Xing-Tian

Title: Research on Data Embedding Methods Based on Grayscale Image

Completion Date: June 2015

Unemployed

E-Mailwxt6582295@163.com

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd053_nts.jpg

53. Nguyen, Thai-Son

Title: Reversible Information Hiding Techniques and Their Applications in Image Protection

Completion Date: June 2015

Lecturer of Department of Information Technology, TraVinh University

E-Mailthaison@tvu.edu.vn

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd054_hnt.jpg

54. Huynh, Ngoc-Tu

Title: Verifiable Lossless Multi-Image Sharing Schemes for Secret Image Embedding

Completion Date: June 2015

Lecturer of College of Information Technology, Da Nang University

E-Mailngoctu84vn@gmail.com

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd055_hyh.jpg

55. Huang, Ying-Hsuan

Title: (k, n)-Image Reversible Data Hiding

Completion Date: July 2015

National Chung-Shan Institute of Science & Technology, Research and Development Substitute Services

E-Mailying.hsuan0909@gmail.com

WebN/A

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\graduatePHD\phd056_Duong.jpg

56. Le Hai Duong

Title: Smart Card Based Authenticated Key Agreement Schemes

Completion Date: August 2015

Lecturer of School of Computer Science & Engineering, International University - Vietnam National University HCMC

E-Mailduonghaile@gmail.com

WebN/A

Ph. D. Students (in school)


描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\phd100\wsl.jpg

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\phd100\NGUYENNGOCTU.jpg

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\phd100\cx.jpg

Wu, Hsiao-Ling

Nguyen Ngoc Tu

Chen, Xi

Zhuang, Xu

Li, Song

Liu, Li

Huang, Peng-Cheng

Xie, Xiao-Zhu

Ho, Chao-Yi

Wang, Rong

Lin, Chiang-Yi

Tsui, Chen

Research Assistant

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\assistant\cpl.jpg

Chen, Pei-Lun

 

Exchange Student

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\International\Joe.JPG

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\International\Lijing.jpg

描述: 描述: 描述: 描述: 描述: D:\BOSS\CCC - WWW\~ccc\student\images\International\wdw.jpg

Jochen Penne

(Dresden University of Technology, Germany)

Jing Li

(Renmin University of China)

Dawei Wang

(Renmin University of China)

Master Students (graduated)


No.

Name

Thesis Title

Completion Date

1.

Shen, Jau-Ji

Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk System

5/1984

2.

Su, D. H.

Some Properties of Multi-Attribute File System Based upon Multiple Key Hashing Functions for Partial Match Queries

5/1984

3.

Lian, L. S.

Toward the Strict Optimality Study on Concurrent Disk Accessing

5/1984

4.

Liang, J.

Performance Analysis of the k-nearest Neighbor Search Technique Based upon Multiple Key Hashing Functions

5/1984

5.

Yuan, S. T.

A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems

5/1985

6.

Tsai, W. H.

A Branch and Bound Algorithm for Allocating Multi-attribute File Systems

5/1985

7.

Shieh, J. C.

On the Design of Letter Oriented Minimal Perfect Hashing Functions

5/1985

8.

Hung, M. F.

An Access Control Mechanism for Information Protection System

5/1986

9.

Chen, C. P.

A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem

5/1986

10.

Chen, H. Y.

Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems

5/1986

11.

Hsiao, M. D.

The Study of File Allocation Strategies for Concurrent Retrieval

5/1986

12.

Lee, Y. P.

A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing

5/1986

13.

Lin, C. H.

A Strategy of Information Secure Broadcasting

5/1986

14.

Cheng, W. Y.

The Study of a User-Hierarchy Mechanism for Computer System Resources

5/1987

15

Chang, C. H.

A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem

5/1987

16

Chen, C. H.

The Study of Data Missing and Data Integrity

5/1987

17

Wu, H.C.

The Design of a Minimal Perfect Hashing Function for Mandarin Symbols System

5/1987

18

Wang, C. T.

The Development of a Computer Assisted Instruction System for Structure Assembly Languages

5/1987

19

Mong, I. H.

A New Data Compression Scheme Based upon Lempel-Ziv Universal Algorithm

5/1988

20

Chang, S. S.

Optimal Properties of Binary Cartesian Product File System

5/1988

21

Chen, C. H.

Organizing Distributed Data Based for Parallel Searching

5/1988

22

Hsiao, J. Y.

Strings Near-Matching Techniques for Large Textual Files

5/1988

23

Leu, D. F.

Multi-key Sorting as a File Organization Scheme When Queries Are Not Equally Likely

5/1988

24

Chou, A. Y. H.

The Study of File Systems Suitable for Queries

5/1989

25

Chow, L. C.

The Study of Visual Form Transformation System

5/1989

26

Wu, T. C.

The Studies of Computer Authentication and Secure Broadcasting Based upon Euclidean Geometry

5/1989

27

Liao, H. T.

A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control

5/1989

28

Wu, L. H.

An Arithmetic Coding Oriented Single Key Access Control Scheme

5/1989

29

Wu, C. H.

The Study of Security Technologies for Broadcasted Network Systems

5/1989

30

Lin, J. C.

A Fast Spatial Match Accessing Scheme for Symbolic Pictures

5/1990

31

Dai, J. Y.

Sharing a Circular Storage for Multiple Stacks

5/1990

32

Chen, D. C.

A Modified Arithmetic Coding Scheme Suitable for Binary Search

5/1990

33

Hwang, S. M.

A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid

5/1990

34

Lin, J. F.

A Chinese Syllables Compression Scheme Based Upon Perfect Hashing

5/1990

35

Wang, S. J.

A Dynamic Key-Lock-Pair Access Control Scheme

5/1991

36

Hwang, R. J.

Controlling Access in Hierarchical Structures Using Cryptographic Keys

11/1991

37

Hwang, S. J.

Sharing a Dynamic Secret

11/1991

38

Lee, H.C.

A Solution to Generalized Group Oriented Cryptography

5/1992

39

Chen, C. Y.

A Dynamic Access Control Scheme Based Upon Ziegler's Row Displacement Method

5/1992

40

Chen, Y. W.

A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis

5/1992

41

Kowng, H. C.

A Digital Signature Scheme Based Upon Theory of Quadratic Residues

5/1992

42

Lee, W. B.

On the Design and Implementation of an Analyzer and a Vaccination for Computer Viruses

5/1993

43

Liou, F. Y.

A Digital Multisignature Scheme Based upon Modified E1Gamal's Public Key Cryptosystem And Its Digital Signature Scheme

5/1993

44

Wang, C. H.

A Modified Lempel-Ziv-Welch Encoding Scheme Based on the Frequencies of Characters

5/1993

45

Liao, W. Y.

A Remote password authentication scheme based upon ElGamal's signature scheme

5/1993

46

Lin, T. H.

A Secure Group-Oriented Secret Sharing Scheme

5/1993

47

Lee, C. F.

A Greedy Relaxed Generalised Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems

5/1994

48

Tsu, S. M.

An Improvement on a Probabilistic Encryption Scheme and Its Applications

5/1994

49

Jiang, J. H.

A Spatial Filter for Similarity Retrieval

5/1994

50

Wu, W. B.

A Secure Voting System on a Public Network

5/1994

51

Horng, W. J.

A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm

5/1994

52

Lin, D. C.

Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters

5/1995

53

Li, W. T.

A Fast Search Algorithm for Vector Quantization Based Upon Principal Component Analysis Technique

5/1995

54

Leu, JJyh-Jong

The Performance Analysis of Bloom and Random Filters

5/1995

55

Kuo, C. L.

Fast Codeword Search Techniques for Vector Quantization

6/1996

56

Chou, J. S.

An Image Coding Scheme Using Prediction of Euclidean Distance Computation on a Smaller Codebook

6/1996

57

Sung, C. H.

Locally Adaptive Schemes for Data Compression Using Multilist Structure

6/1997

58

Chen, L. L.

Some Searching Techniques for Block Motion Estimation for Video Compression

6/1997

59

Jau, J. J.

Image Compression and Transmission Using Vector Quantization and S-tree

6/1998

60

Hwang, P. C.

Accessing Shared Secrets in a Hierarchy

6/1998

61

Shine, F. C.

Some Techniques of Image Compression and Transmission Using Vector Quantization and Bit-plane

6/1998

62

Chen, Kuo-Lun

Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t,n) Threshold Scheme

6/1999

63

Kuo, Y. T.

Fast Algorithm for Some Meta-Operations in Cryptographic Systems

6/1999

64

Chung, P. F.

Two Copyright Protection Scheme for Digital Images

6/2000

65

Xiao, G. X.

Two Prediction Methods for Image Compression and Progressive Image Transmission

6/2000

66

Lin, Y.

Image Compression and Copyright Protection Using Edge Detection Methods

6/2000

67

Hsia, H.C.

Two Hiding Techniques for Data Security and Image Copyright Protection

6/2000

68

Chuang, J. C.

The Study of Image Tampering Detection

6/2000

69

Hsieh, C. P.

The Study of Denoising Technique for Digital Images

6/2001

70

Lu, P. W.

The Application of Vector Quantization Techniques to Digital Image Tamper Proofing

6/2001

71

Jiang,J. L.

The Design of Some Filter for Image Denoising

6/2001

72

Yeh, J. C.

The Study of Copyright Protection Schemes for Digital Images

6/2001

73

Chan, C. S.

Some Data Hiding Techniques for Digital Images

6/2001

74

Yu, T. X.

The Study of Digital Image Ciphering and Hiding Mechanisms

6/2002

75

Pan,Y. P.

The Study of Multisecret Sharing Schemes and Their Applications to Access Control in a User Hierarchy

6/2002

76

Chung, C. Y.

Some Protocols for Passing Messages Securely and Protecting Rightful Ownership

6/2002

77

Chen, G. I.

TheStudy of Lossless Image Compression an Image Magnification

6/2002

78

Su, Y. Y.

Two Color Image Quantization Schemes for Non-true-color Display

6/2002

79

Lee, C. F.

Code Transformation Between Various Image Splitting Tree Representations and Chinese Calligraphy Transmission Progressively Based on Quadtrees

6/2003

80

Wu, Wen-Juan

Data Hiding and Content Retrieval in Digital Image Database

6/2003

81

Chen, G. M.

Lossless Vector Quantization Indices Compression and Information Hiding Schemes Based on Search-Order Coding

6/2003

82

Liao, C. T.

Some Image Compression and Data Protection Techniques Using Support Vector Machines

6/2003

83

Chou, H. C.

Some Studies on Digital Image Steganographic and Watermarking Techniques

7/2003

84

Hu, Y. H.

Retrieving Digital Images from Frequency Domain Transformed Databases

6/2004

85

Tai, Wei-Liang

Hiding a Digital Image into Two Cover Images

6/2004

86

Liu, Y. L.

The Techniques of Digital Image Transmission and Authentication

6/2004

87

Lin, P. Y.

Two Data Hiding Schemes for Grayscale Images and Image Compression Codes

6/2004

88

Tseng, C. S.

Various Secret Embedding Schemes for Binary and Gray Level Techniques

6/2005

89

Wang, Y. Z.

Some Image Steganography Schemes with High Embedding Capacity

6/2005

90

Yeh, J. B.

Hiding Secrets in Data Compression Codes

6/2005

91

Kao, C. L.

On Authentication Protocols for Communication Networks

6/2005

92

Kuo, J. Y.

Some Password Authentication Schemes Using Smart Cards for Single and Multiple Server Architectures

6/2005

93

Lin, K. C.

Some Efficient Techniques for Secure Peer-to-Peer Networking

6/2005

94

Chang, P. Y.

Group Signature and Key Agreement Schemes Based on Diffie-Hellman Key Exchange Protocol

6/2006

95

Shue, Y. W.

Some Key Management Protocols for Insecure Networks

6/2006

96

Cheng, Y. F.

Some Information Security Applications using Symmetric and Asymmetric Crypto Schemes

6/2006

97

Fan, Y. H.

The Design and Analysis of Information Hiding and Secret Image Sharing Schemes

6/2006

98

Chang, S. C.

A Mutual Authentication Scheme and Its Application to Electronics Traveler Checks

6/2007

99

Cheng, T. F.

An IC-Card-Based Remote Login Mechanism and a Proxy Raffle System in Computer Networks

6/2007

100

Lin, C. H.

Some Visual Cryptoschemes for Secret Images

6/2007

101

Chiu, Y. C.

Some Authentication Schemes and Their Applications to Internet and Wireless Environments

6/2007

102

Chang, K. J.

Authentication Mechanisms and a Payment Protocol for Wireless Environment

6/2007

103

Li, K. M.

A Predictive SMVQ Scheme and Data Embedding for Digital Images

6/2007

104

Lin, S. Y.

Key Establishment and Agreement Protocols and Their Application to Internet and Wireless Environments

6/2007

105

Yah, C. M.

Reversible Data Hiding Schemes for Large Payload and Low Distortion

6/2008

106

Yang, S. R.

Scalable Key Assignment Protocols in Internet

6/2008

107

Wang, G. H.

The Study of High Quality Stego-image for Large Payload

6/2008

108

Huang, W. H.

Two Efficient Demosaicking Algorithms for Color Filter Array

6/2008

109

Chuang, Lin-Yi

The Optimal Solution and Improvement of Exploiting Modification Direction Embedding Method

6/2008

110

Wang, Yi-Ran

The Study of Data Hiding Based on Modification Direction Embedding Method

6/2008

111

Liu, L. J.

The Detection of Visual Secret Shadow Cheating and Digital Image Tampering

6/2008

112

Le, T. H. N.

Secret Sharing Using Multiple Shadow Images

2/2009

113

Lai, Y. W.

Message Broadcasting and Electronic Voting Schemes Based on Elliptic Curve Cryptosystem

6/2009

114

Wu, Y. C.

Authenticated Communication Systems for E-mail Protocal and Vehicular Ad Hoc Networks

6/2009

115

Chen, C. H.

Illumination-Balance Techniques for Text-photo Images

6/2009

116

Chen, Y. C.

Segmentation and Classification Techniques for Retinal Images

6/2009

117

Wang, H. C.

Embedding Secret Information in a Condenced Image and Multiple Image Files

6/2009

118

Liao, C. C.

The Study of Visually Sharing Secret Images

6/2009

119

Li, Q.

A Study on Reversible Watermarking

4/2010

120

Lin, H. C.

Some Secret Embedding Schemes for Different Entities

6/2010

121

Huang, Y. C.

Mobile Conference Mechanism for Wireless Communication Users

6/2010

122

Hsieh, M. H.

Preserving User-Participation in Insecure Networks Based on Visual Secret Sharing and Authentication Watermarking

6/2010

123

Huynh, N. T.

Visual Cryptography for Users Verification

6/2010

124

Liu, T. C.

The Study of Digital Images Embedding Techniques and Visual Secret Sharing Schemes

6/2010

125

Tsai, M. C.

Digital Copyright Protection and Image Authentication Using Watermarking Strategy

6/2010

126

Wu, C. Y.

Reversible Data Hiding Schemes Using Repeatedly Embedding Strategy with High Capacity

6/2010

127

Yin, Z. X.

Hiding Information in Digital Images

6/2010

128

Tseng, W. T.

Authentication Protocols for Heterogeneous Communication Network Environment

6/2011

129

Chen, P. Y.

Reversible High-payload Information Hiding Scheme for Digital Cover Images and VQ Index Tables

6/2011

130

Chen, Y. W.

User Authentication and Key Agreement Protocols for Wireless Network Environment

6/2011

131

Liu, C. M.

Non-Reversible and Reversible Data Hiding Based on Module Operation

6/2011

132

Tsou, P. L.

Perceptual Robust Image Hashing Scheme Based on Halftone Mechanism and Non-Uniform Sampling

6/2011

133

Nguyen Thai Son

Reversible Data Hiding Techniques for VQ-compressed Domain

6/2011

134

Vo Phuoc Hung

Sharing Secret Messages Using Meaningful Digital Shadow images

6/2011

135

Marcos Pizzolatti

The study of some reversible secret sharing schemes

12/2011

136

Cui, S. Y.

Image Data Hiding Based on Voronoi Diagram

12/2011

137

Yue, S.

Image Data Hiding Scheme Based on Graph Coloring

12/2011

138

Lin, T. Y.

Information Hiding Techniques for Script Files and Image Files

06/2012

139

Chiu, Y. P.

The study of Distortion and Distortion free Visual Secret Sharing Scheme

06/2012

140

Liao, L. T.

Two Steganographic Schemes for Embedding Large Secret Information

06/2012

141

Wang, S. T.

Novel Reversible Data Hiding Schemes for Secret Images and Traditional Chinese Text Files

06/2012

142

Lin, C. C.

Information Hiding and Visual Secret Sharing Based on Exploiting Modification Direction

06/2012

143

Chang, C. H.

Some Smart Card Oriented Authentication Protocols for Mobile Communication

06/2012

144

Tsai, H. Y.

Pixel Unexpanded Visual Cryptography Techniques Based on Meaningful Shadows

06/2012

145

Sun, C. Y.

Secure and Efficient Authentication Schemes for Wireless Communications

06/2013

146

Chen, Y. C.

Reversible Data Embedding Schemes for VQ-Compressed Images

06/2013

147

Chen, W. Y.

Authentication Protocols for Some E-commerce Applications

06/2013

148

Hsu, T. J.

Some Data Hiding Techniques and Their Applications

06/2013

149

Jia, X. D.

Research on Privacy-preserving Identity Authentication Protocols in Vehicular Ad Hoc Networks

06/2014

150

Yang, H. R.

Study on Data Hiding Algorithms Based on Compression Codes

06/2014

151

Lin, M. C.

Embedding Secret Information in VQ Index Tables

06/2014

152

Chung, T. F.

Authentication and Data Hiding Schemes for Digital Images

06/2014

153

Chou, Y. C.

A Study of Group Authentication and Data Protection

06/2014

154

Hsueh, W. Y.

Multi-Server Remote User Authentication Mechanisms Using Smart Card

06/2014

155

Li, F.

Reversible Image Hiding Algorithms based on Wavelet Transformation

12/2014

156

Yang, X. Q.

Semi-fragile Watermarking Algorithms for Tamper Detection and Image Authentication

06/2015

157

Shih, T. H.

The Study of Reversible Authentication Techniques for Digital Images

06/2015

158

Hsueh, H. S.

Data Hiding Schemes for Still Images and Videos

06/2015

159

Chang, W. C.

Reversible Data Hiding for Encrypted and Compressed Digital Image

06/2015

160

Bai, J. l.

Some Techniques for Information Hiding in Images(Chengdu University of Electronic Science and Technology)

05/2016

161

Xia, B. B.

Reversible data hiding based on vector quantization(Taiyuan University of Science and Technology)

06/2016

162

Jin, Q.

Research on optimized block truncation coding and data hiding algorithm based on compressed images(Taiyuan University of Science and Technology)

06/2016

163 Hsu, C. I. Research on Effective Color Image Retrieval Technology Based on Block Truncation Coding 06/2016
164 Wang, C. M. Research on Reversible Data Hiding Technology of ABTC-EQ Compression Codes and AMBTC Decompression Images 06/2016
165 Wang, Y. K. Embedded Information in the Absence of Distortion Data Compression Code, Compressed Images and Encrypted Image of the Study 06/2016
166 Chien, T. I. Based on Image Sharpening and Image Compression and Encryption 06/2016
167 Lo, Y. Y. Research on Key Agreement Authentication Method and Telemedicine Information System Authentication Method Based on Passing Code 06/2016
168 Wu, C. H. Certificateless Authentication Method on Wireless Body Area Network 06/2016
169 Chang, K. L. QR Code Landscaping Algorithm and Security Mechanism Research (Hangzhou Dianzi University) 12/2016
170 Peng, H. H. Research on Credit Card Authentication Algorithm Based on Secret Sharing and Image Watermarking (Hangzhou Dianzi University) 12/2016
171 Kao, H Research on the Application of Digital Watermarking in Privacy in Cloud Environment (Northwestern Polytechnical University) 04/2017
172 Kuo, P Research on Multi-Feature Data Routing Strategy in Deduplication (Northwestern Polytechnical University) 04/2017
173 Kuo, I Research on Information Hiding Technology for Cloud Computing Security Application (Northwestern Polytechnical University) 04/2017
174 Hsu, W. L. Research on Key Technology of Information Hiding Based on Image Space Domain (Anhui University) 04/2017
175 Mao, K. Research on Image Information Hiding Technology Based on Hamming Code (Anhui University) 04/2017
176 Wu, Y. H. Research of Reversible Data Hiding Algorithm Based on Image (Hangzhou Dianzi University) 07/2017
177 Di, Y. F. Research on Removable and High Robust Watermarking Scheme Based on Transform Domain (Dalian University of Technology) 07/2017

Master Students (in school)


Lin, Jia-Long

Zeng, Qun-Feng

Ho, Ssu-Liang

Hsu, Po-Yi

Zhu, Zhao-Hua

Lin, Zhao

Sun, Mei-Hui

Wang, Jia-Qing

Tan, Jie-Fan

Tang, Ran

Tian, Peng-Syu

Jhuang, Ru-Han

Shih, Chia-Shuo

Lee, Guan-Long

Sun, Mian

He, Min

Yu, Ji-Er

Wang, Zih-Meng