´y­z: ´y­z: C:\filter\~ccc\vitae\vitae_banner.jpg

[Activities (Society)] [Activities (Other)] [Technical Reviewer] [Consulting] [Projects] [Theses (Master)] [Awards]


NAME: Chin-Chen Chang

 

PERSONAL

Place of Birth

Taiwan

Citizenship

Taiwan, R.O.C.

Marital Status

Married

 

ADDRESS

Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan, R.O.C.

Phone: +886-4-24517250 ext. 3790

Fax: +886-4-27066495

E-mail: alan3c@gmail.com

 

EDUCATION

Ph.D. in Computer Engineering, National Chiao Tung University, 1982.

M.S. in Computer and Decision Sciences, National Tsing Hua University, 1979.

B. S. in Mathematics, National Tsing Hua University, 1977.

 

SPECIALIZED FIELDS

Cryptography and Network Security, Database Design, Image Processing

 

MEMBERSHIPS IN ACADEMIC AND PROFESSIONAL SOCIETIES

1.          2006/05-Present Member of IEICE Communications Society and Information & Systems Society, Japan

2.          2004/07-Present Member of European Association for Computer Graphics

3.          2001/08-Present Member of Chinese Institute of Electrical Engineering

4.          2001/06-Present Member of SPIE-The International Society for Optical Engineering

5.          2000/04-Present Member of Chinese Language Computer Society

6.          1987/12-Present Member of IEEE Computer Society

7.          1999/07-Present Member of Institute of Information & Computing Machinery of the R.O.C.

8.          1999/03-Present Member of ACM Society

9.          1998/04-Present Member of the IEE Society

10.      1994/05-Present Member of Chinese Cryptography and Information Security Association of the R.O.C.

11.      1993-Present Member of International Association for Cryptologic Research (IACR)

12.      1988-Present Member of Computer Society of the R.O.C.

13.      1984/09-Present Member of Chinese Institute of Engineers of the R.O.C.

14.      1979/06-Present Member of Phi Tau Phi Honorary Society of the R.O.C.


Professional Experiences¡G

1.          Adjunct Chair Professor, National Chung Hsing University (2009/02~Present)

2.          Honorary Chair Professor, Tung Hai University (2006/02~Present)

3.          Honorary Professor, National Chung Cheng University (2005/02~Present)

4.          Joint Appointment Professor, National Chung Cheng University, (2004/08~Present)

5.          Chair Professor, National Chung Cheng University (2003/01~2005/01)

6.          Joint Appointment Professor, National Tsing Hua University (2002/08~Present)

7.          Adjunct Chair Professor, Providence University (2002/08~2005/07)

8.          Director, Advisory Office, Ministry of Education of the R.O.C. (1998/07~2000/06)

9.          Adjunct Chair Professor of Information Management, ChaoYang University of Technology (1997/08~1998/07)

10.      Acting President, National Chung Cheng University (1996/09~1997/10)

11.      Dean of Academic Affairs, National Chung Cheng University (1995/08~1997/10)

12.      Chairman of Common Courses, National Chung Cheng University (1995/08~1997/10)

13.      Chairman of Automation Research Center, National Chung Cheng University (1993/08~1995/07)

14.      Dean of Engineering, National Chung Cheng University (1992/08~1995/07)

15.      Acting Dean of Engineering, National Chung Cheng University (1991/10~1992/07)

16.      Chairman of Automation Research Center, National Chung Cheng University (1990/08~1992/07)

17.      Acting Chairman of Automation Research Center, National Chung Cheng University (1989/10~1990/07)

18.      Acting Chairman of Computer Center, National Chung Cheng University (1989/08~1990/02)

19.      Chairman of Computer Science and Information Engineering, National Chung Cheng University (1989/08~1992/07)

20.      Adjunct Professor in Computer Science, Tung Hai University (1987/08~1989/07)

21.      Adjunct Professor in Statistics, Tung Hai University (1986/08~1987/07)

22.      Professor in Applied Mathematics, National Chung Hsing University (1985/08~1989/07)

23.      Associate Professor in Applied Mathematics, National Chung Hsing University (1983/08~1985/07)

24.      Associate Professor in Computer Engineering, National Chiao Tung University (1982/08~1983/07)

25.      Lecturer in Computer Engineering, National Chiao Tung University( 1980/08~1982/07)

26.      Lecturer in Applied Mathematics, National Chung Hsing University (1980/02~1980/07)

27.      System Consulting Engineer, Institute of Information Industry (1979/06~1980/01)

28.      System Engineer, Hewlett Packard Computer Company (1978/12~1979/05)

 

Incumbency¡G


Chair Professor, Feng Chia University

Honorary and Hopewell Appointed Professor, National Chung Cheng University

Hopewell Appointed Professor, National Tsing Hua University

 

AWARDS


1.      The Excellent Paper Award of International management engineering, software engineering and service science conference, Jan. 2017

1.      Supervised Dissertation Awarded for Outstanding Ph.D. Dissertation of Taiwanese Association for Consumer Electronics, Oct. 2015

2.      The Leadership Award of 2014 IEEE Reliability Society, Jun. 2014

3.      The Best Paper Award of 2014 International Conference on Knowledge Engineering and Applications (ICKEA 2014), Jun. 2014

4.      The Best Paper Award of 2013 National Computer Symposium (NSC 2013), Dec. 2013

5.      The Distinguished Research Award of IET, Sep. 2013

6.      2013 Supervised Honorable Mention for MATLAB/Simulink of TeraSoft, May 2013

7.      The Best Paper Award of the 2012 Seventh Asia Joint Conference on Information Security, Tokyo, Japan, Aug. 2012

8.      AsiaJCIS Lifetime Achivement Award, Aug. 2012

9.      2012 Supervised Honorable Mention for MATLAB Programing of TeraSoft, May 2012

10.      2011 Supervised Dissertation Awarded for Outstanding M.S. Dissertation of Taiwanese Association for Consumer Electronics, 2011

11.      The Best Paper Award of 2011 International Conference on Information Mangement (ICIM 2011), May 2011

12.  The Top Cited Paper Award of Pattern Recognition Letters, Mar. 2011

13.  The 2010 Honorary Medal of Information of Institute of Information & Computing Machinery of the R. O. C., Mar. 2011

14.  Ranked 2nd in the Most Prolific DBLP Authors (http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/prolific/index.html), Aug. 2010

15.  Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 2002 and 2006 [Ref: J. Systems and Software, Vol. 82 , pp. 1370¡V1373, 2009], Jun 2009

16.  Chair Professor in Information Security of the National Chung Hsing University, Feb. 1, 2009

17.  The Best Paper Award of the IEEE International Symposium on Electronic Commerce and Security, Aug. 2008

18.  The Best Paper Award of GESTS International Transactions on Computer Science and Engineering by Global Engineering, Science, and Technology Society (GESTS), Sept. 2006

19.  The Best Paper Award of the 2006 International Conference on Innovative Computing, Information and Control, Beijing, China, Aug. 2006

20.  Research Merit Award of the 2006 International Workshop on Computer Science (IWCS¡¦06) by International Association of Engineers (IAENG), Hong Kong, Jul. 2006

21.  Year 2006 Top 500 World¡¦s Most Influential Scientist Award by the International Academy of Biographies, 2006

22.  The First Class National Science Council Project Grant within Three Years, Aug. 2005-Jul. 2008

23.  The Outstanding Contribution Award of Chinese Cryptology and Information Security Association, Jun. 2005

24.  Honorary Professor of the National Chung Cheng University, Jan. 2005

25.  The Excellent Paper Award of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Kyusyu, Japan, Mar. 2004

26.  Champion of the 2003 Campus Website Competition in the Teachers Group, National Chung Cheng University, Jul. 2003

27.  Research Outstanding Award of the Pan Wen Yuan Foundation, Jun. 2003

28.  Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 1998 and 2002 [Ref: J. Systems and Software, Vol. 68, pp. 77-84, 2003], May 2003

29.  Outstanding Alumni Award of the National Chiao Tung University, Mar. 2003

30.  Merit NSC Research Fellow Award of the National Science Council (NSC) of the Executive Yuan, Jan. 2003

31.       The International Association for Cryptologic Research Gratefully Acknowledges Chin-Chen Chang for His Contribution to the Worldwide Cryptologic Community Through His Role General Chair of AsiaCrypt 2003, Taiwan, 2003

32.  Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 1997 and 2001 [Ref: J. Systems and Software, Vol. 64, pp. 79-86, 2002], May 2002

33.  Outstanding Alumni Award of the College of Electrical Engineering and Computer Science (EECS), National Tsing Hua University, Apr. 2002

34.  Chair Professor of the National Chung Cheng University, Jan. 18, 2002

35.  TECO Technology Award of the TECO Technology Foundation, 2002

36.  Top Fifteen Scholars in Systems and Software Engineering of the Journal of Systems and Software, 2001

37.  Outstanding Electrical Engineering Professor Award of Chinese Institute of Electrical Engineering, 2001

38.  Best Paper Award at the 2001 International Workshop on Cryptography and Network Security, Sept. 2001

39.   IEE Fellow, IEE Society, 2000-Present

40.  IEEE Fellow (Membership# 08601379), IEEE Society, 1999-Present

41.  Outstanding Scholar Award of Foundation for the Advancement of Outstanding Scholarship, 1999-2003

42.  Outstanding Engineering Professor Award of Chinese Institute of Engineers of the R.O.C., 1999

43.  Research Fellow, National Science Council of the R.O.C., 1996-Present

44.  Research Fellow, National Science Council of the R.O.C., 1996-Present

45.  AceR Dragon Award for the Most Ten Outstanding Talents, 1996

46.  Distinguished Paper Award of the Information and Education Bimonthly, 1995

47.  Outstanding Academic Research Award of the National Chung Cheng University, 1994

48.  Research Achievement Award of the Ministry of Transportation and Communication of the R.O.C., 1993

49.  Outstanding Teaching Materials Award of the Ministry of Education of the R.O.C., 1992

50.  Supervised Dissertation Awarded for Outstanding Ph.D. Dissertation of the Xerox Company, 1992

51.  Best Paper Award at the Second International Conference on CISNA Sponsored by British Council, 1991

52.  AceR Dragon Dissertation Award for Outstanding Ph.D. Dissertation Study Supervision, 1990, 1997, 1998

53.  AceR Dragon Thesis Award for Outstanding M.S. Thesis Supervision, 1990, 1991, 1992, 1997

54.  Chung-Shan Academic Publication Award of the Chung-Shan Academic Foundation of the R.O.C., 1987, 1997

55.  Distinguished Research Awards of the National Science Council of the R.O.C., 1986-1987, 1988-1989, 1990-1991, 1992-1994, 1995-1996

56.  Outstanding Talent in Information Science of the R.O.C., 1984

57.  Outstanding Youth Award of the R.O.C., 1984

58.  Best Paper Award of the Society of Electrical Engineering of the R.O.C., 1982

59.  Honorary member of the Phi Tau Phi Scholastic Honor Society of the Republic of China, 1980

 

PROFESSIONAL SOCIETY ACTIVITIES


1.      2017/01-Present Editorial Board Member of Applied Computing and Informatics

1.      2015/06-Present Editorial Board Member of International Journal of Engineering & Allied Sciences

1.      2015/01-Present Editorial Board Member of BPIT International Journal of Technology and Management

1.      2014/01-Present Editorial Board Member of Smart Computing Review

2.      2013/10-Present Editorial Board Member of International Journal of Information Security Science (IJISS)

3.      2013/08-Present Editorial Board Member of International Journal of Cloud-Computing and Super-Computing (IJCS)

4.      2013/07-Present Guest Editor of Recent Advances in Information Technology for Scientific World Journal, U.S.A.

5.      2013/06-Present Editorial Board Member of Current Advances in Information Security (CAIS)

6.      2013/01-Present Co-Editor-in-Chief of International Journal of Network Security

7.      2012/12-Academic Editor of British Journal of Mathematics & Computer Science

8.      2012/12-Present Editorial Board Member of Multimedia Technology

9.      2012/12-Present Advisory Board of FTRA Journal of Convergence

10.  2012/05-Present Editorial Board Member of Recent Patents on Telecommunications

11.  2012/05-Present Editorial Board Member of International Journal of Digital Contents and Applications (IJDCA)

12.  2012/01-Present Editorial Board Member of Journal of Information Security and Applications (JISA)

13.  2011/11-Present Editorial Board Member of Journal of Information & Communication Technology

14.  2011/06-Present Editor of Information Security Letter (ISL)

15.  2011/05-Present Associate Editor of Communications in Information Science and Management Engineering (CISME)

16.  2011/03-Present Editorial Board Member of International Journal of Communication and Security

17.  2011/01-Present Editor of Tamsui Oxford Journal of Information and Mathematical Sciences (TOJIMS)

18.  2011/01-Present Editorial Board Member of the Journal of Electronic Science and Technology (JEST)

19.  2010/12-Academic Editor of EURASIP Journal on Information Security

20.  2010/09-Present Editor of International Journal of Engineering and Industries (IJEI)

21.  2010/09-Present Associate Editor of International Journal of Advancements in Computing Technology (IJACT)

22.  2010/09-Present Associate Editor of the Advances in Information Sciences and Service Sciences (AISS)

23.  2010/07-Present Editorial Board Member of the KSII Transactions on Internet and Information Systems (TIIS)

24.  2010/07-Present Editor of International Journal of Intelligent Information Processing (IJIIP)

25.  2010/05-Present Editorial Board Member of the Innovative Computing Information and Control - Express Letters, Part B: Applications (ICIC-ELB)

26.  2010/03-Present Editorial Board Member of the Journal of Computer Research and Development

27.  2009/12-Present Editorial Board Member of the Wireless Engineering and Technology (WET)

28.  2009/10-Present Editorial Board Member of the International Journal of Multimedia Intelligence and Security (IJMIS)

29.  2009/10-Present Editorial Advisory Board Member of the International Journal of Information Technology, Communications and Convergence (IJITCC)

30.  2009/09-Present Associate Editor of the International Journal of Information Sciences and Computer Engineering (IJISCE), Malaysia

31.  2009/08-Present Editorial Advisory Committee Member of Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development and Verification, America

32.  2009/06-Present Guest Editor for the Special Issue¡ÐRecent Advances in Networked Computing for Journal of Networks

33.  2009/01-Present Guest Editor for the Special Issue of Journal of Internet Technology

34.  2009/01-Present Guest Editor of the Journal of Software

35.  2009/01-Present Co-Editor-in-Chief of International Journal of Information Hiding and Multimedia Signal Processing

36.  2009/01-Present Editor of the Journal of Future Generation Information Technology, Korea

37.  2009/01-Present Editorial Advisory Committee Member of Kansei Engineering and Soft Computing: Theory and Practice

38.  2009/01-Present Associate Editor of International Journal on Advances in Internet Technology

39.  2008/08-Present Guest Editor of the Special Issue¡ÐElectronic Commerce and Security for Journal of Communications, Finland

40.  2008/07-Present Advisor of International Journal of Intelligent Information Technology Application, Hong Kong

41.  2008/01-Present Guest Editor of Journal of Supercomputing, Korea

42.  2008/01-Present Co-editor of the Proceedings of International Conference on Intelligent Systems Design and Applications (ISDA08)

43.  2008/01-Present Guest Editor of the Special Issue-Mobile Computing for Journal of Pervasive Computing and Communications (JPCC)

44.  2007/10-Present Editorial Board Member of International Journal of Internet Technology and Secured Transactions, Switzerland

45.  2007/10-Present Editorial Board Member of International Journal of Knowledge Engineering and Soft Data Paradigms (KESDP), Japan

46.  2007/10-Present Editorial Board Member of The Open Information Science Journal

47.  2007/08-Present Guest Editor of Journal of Shanghai University: Applied Science, China

48.  2007/02-Present Program Committee Member of Journal of Automation, Mobile Robotics and Intelligent Systems, Poland

49.  2007/01 Editor of Antarctica Journal of Mathematics, India

50.  2006/06-Present Editorial Advisory Board Member of Recent Patents on Engineering, U.S.A.

51.  2006/01-Present Co-Editor-in-Chief of International Journal of Computer Sciences and Engineering Systems, India

52.  2006/03-2011/09 Editor-in-Chief of Journal of Computers of the R.O.C.

53.  2005/11-Present Associated Editor of Advisory Board of the International Journal of Autonomic and Trusted Computing

54.  2005/11-Present Member of Advisory Board of the International Journal of Innovational Computing and Information Control

55.  2005/01-Present Member of Guest Editorial Board of the International Journal of Pervasive Computing and Communications

56.  2004/06-Present Editorial and Advisory Board Member of International Journal of Information and Computer Security

57.  2003/12-Present Editorial Consultant of Communications of Chinese Cryptography Information Security Association (CCISA)

58.  2002/07-Present Associate Editor of Chaoyang Business and Management Review

59.  1999/11-Present Advisory Board Member of International Journal of Information Security

60.  1994/05-1997/05 Chairman of the Board of Directors, Chinese Cryptography and Information Security Association of the R.O.C.

61.  1994/01-1997/12 Editor of Information Sciences, U.S.A.

62.  1992/02 Editor of Advance Database Research and Development Series (World Scientific Publishing Co., Singapore)-Vol. 1 Database Systems for Next-Generation Application Principles and Practice; Vol. 2 Database Systems for Advanced Application&rsquo91; Vol. 3 Future Database&rsquo92

63.  1990/12-1994/01 Associate Editor and Computer Science Coordinator of Journal of the Chinese Institute of Engineers

64.  1990/12-Present Associate Editor of International Journal of Information and Management Science

65.  1990/09-Present Member of the Board of Directors, Computer Society of the R.O.C.

66.  1989/01-Present Associate Editor of Journal of Computers

67.  1989/01-1990/11 Associate Editor of International Journal of Policy and Information

68.  1987/10-Present Editor-in-Chief of Information and Education Bimonthly

69.  1987/01-1994/01 Associate Editor of Journal of the Chinese Institute of Engineers

70.  1986/04-1993/01 Associate Editor of Journal of Information Science and Engineering

71.  1986/11-1988/12 Associate Editor of Computer Quarterly

72.  1986/04-1988/03 Associate Editor of Journal of Electrical Engineering

 

OTHER ACTIVITIES



1.           ACM Transactions on Database System

2.           BIT

3.           Communications of ACM

4.           Computer Journal

5.           Computer Processing of Chinese and Oriental Languages

6.           Computer Systems Science and Engineering

7.           Cryptologia

8.           Electronics Letters

9.           Fundamenta Informaticae

10.      IEE Proceedings-Part E

11.      IEEE Transactions on Computers

12.      IEEE Transactions on Information Forensics and Security

13.      IEEE Transactions on Information Theory

14.      IEEE Transactions on Image Processing

15.      IEEE Transactions on Knowledge and Data Engineering

16.      IEEE Transactions on Pattern Analysis and Machine Intelligence

17.      Information Systems

18.      Information Processing Letters

19.      Information Sciences

20.      International Journal of Information and Management Sciences

21.      International Journal of Foundations of Computer Science

22.      International Journal of Pattern Recognition and Artificial Intelligence

23.      Journal of Systems and Software

24.      Journal of Visual communication and Image Representation

25.      Pattern Recognition Letters

26.      Signal Processing

27.      Software Practice and Experience

28.      VLSI Journal

 

Fields of review include database design, data structure, information security, data compression, algorithms design and analysis, image compression, and parallel computing.

 

CONSULTING MEMBERSHIPS IN ACADEMIC AND PROFESSIONAL SOCIETIES


1.          2015/1/1-Present Consultative Advisor of National Chung Cheng University, Taiwan

1.          2011/3/4-Present Consultant of International Communication Center, Beijing, China

2.          2007/10/18-Present Consultant of National Kaohsiung University, Taiwan

3.          2007/10/01-Present Consultant of National Chung Cheng University, Taiwan

4.          2007/08/01-Present Consultant of Asia University, Taiwan

5.          2006/09/01-2008/12/31 Honorary Consultant of Taiwan Information Security Center (TWISC), National Chiao Tong University, Taiwan

6.          2006/08-2007/07 Consultant of Chung Chou Institute of Technology, Taiwan

7.          2005/08-2008/07 Top Consultant of Information and Communication Security Research Center, Feng Chia University, Taiwan

8.          2005/01-Present Consultant of National Management Consultant Association, Taiwan

9.          2003/08-Present Honorary Consultant of Chinese Cryptography and Information Security Association of the R.O.C.

10.         2002/08-2004/07 Consultant of Taichung Health management University

11.      1998/12-2001/08 Consultant of Preparatory Office of Mingdao University

12.      1998/07-2000/06 Director of Advisory Office of Ministry of Education, R.O.C.

13.      1994/03-2001/12 Coordinator of the Consultant Group of the County Government Affairs of Chiayi County, R.O.C.

14.      1993/02-1995/12 Consultant of China File and Micrographic Information Management Institute, R.O.C.

15.      1988/07-1989/06 Consultant of Preparatory Office of National Chung Cheng University, R.O.C.

16.      1986/08-1988/07 Consultant of Computer Center of Chin-Yi Institute of Technology, R.O.C

17.      1986/03-1989/07 Consultant of Aerospace Industrial Development Center of Chung-shan Institute of Science and Technology

18.      1985/08-1989/07 Consultant of Computer Center of National Chung Hsin University, R.O.C.

 


PROJECT RECORDS

No.

Project Title

Time Period

Sponsor

Title

Grant Number

1

Minimal Perfect Hashing Scheme Based Upon Number Theory

71.12.20-72.11.19

National Science Council

Principle Investigator

NSC72-0404-E009-013

2

Optimal Multi-attribute Hashing Scheme when Quires are not Ran

72.08.01-73.05.31

National Science Council

Principle Investigator

NSC73-0208-M005-01

3

The Design and Implementation of a Database Management System

72.06.01-73.05.31

Control Data Cooperation, Taiwan

Principle Investigator

 

4

Some Design and Allocation Problems for Concurrent Disk Accessing

73.08.01-74.07.31

National Science Council

Principle Investigator

NSC74-0408-E005-01

5

The Study of an Letter-oriented Minimal Perfect Hashing Scheme

73.11.01-74.10.31

National Science Council

Principle Investigator

NSC74-0408-E005-02

6

An Information Protection Scheme Based upon Number Theory

74.08.01-75.07.31

National Science Council

Principle Investigator

NSC75-0408-E005-01

7

Symbolic Solver for Recurrence Relations

74.08.31-75.07.31

National Science Council

Principle Investigator

NSC75-0408-E005-02

8

The Design and Development of a Chinese Visual Form Oriented Programming System

74.08.01-75.07.31

Control Data Cooperation, Taiwan

Principle Investigator

 

9

The Development of a CAI System for Structured Assembly Language Programming

74.12.01-75.11.30

National Science Council

Co-Investigator

NSC75-0408-E005-03

10

Optimal Cartesian Product Files for Concurrent Disk Accessing

75.04.01-76.03.31

National Science Council

Co-Investigator

NSC75-0408-E035-02

11

The Study of Allocating Multiple Key Hashing File System Among Multiple Disks

75.04.01-76.03.31

National Science Council

Principle Investigator

NSC75-0408-E005-04

12

The Development and Evaluation of a Secure Broadcasting System

75.08.01-76.07.31

National Science Council

Principle Investigator

NSC76-0408-E005-01

13

The Difficulty of Construction Perfect Hashing Functions

75.12.01-76.11.30

National Science Council

Principle Investigator

NSC76-0408-E005-02

14

The Study and Development of Approximate Patten Matching in Large Textual Files

75.12.01-76.11.30

National Science Council

Co-Investigator

NSC76-0408-E035-01

15

The Study of Inductive Question Answering and Data Integrity

75.12.01-76.11.30

National Science Council

Co-Investigator

NSC76-0408-E005-03

16

On the Design and Analysis of Multi-disk File Allocation Method for Concurrent Retrieval

76.01.01-77.03.31

National Science Council

Co-Investigator

NSC76-0408-E035-03

17

The Study of Retrieving Techniques of Phonetic Syllables

76.04.01-77.03.31

National Science Council

Co-Investigator

NSC76-0408-E005-04

18

The Study of a Dynamic Access Control Scheme

76.08.01-77.07.31

National Science Council

Principle Investigator

NSC77-0408-E005-01

19

Some Properties of Multi-attribute File Systems for Orthogonal Range Retrieval

76.12.01-77.11.30

National Science Council

Co-Investigator

NSC77-0408-E035-02

20

Applying Multi-variant Analysis Techniques to Information Storage and Retrieval

76.12.01-77.11.30

National Science Council

Principle Investigator

NSC77-0408-E005-02

21

The Design of an Automatic Terrain Map Generator

76.10.01-77.09.30

Control Data Cooperation, Taiwan

Principle Investigator

 

22

Visual Form Conversion Expert System-Design and Development

77301.01-78.03.31

National Science Council

Co-Investigator

NSC77-0408-E005-03

23

The Studies of Pattern Near-Matching Both in Chinese and in English

77.04.01-78.03.31

National Science Council

Co-Investigator

NSC77-0408-E005-04

24

The Study of Information Security Schemes

77.08.01-78.07.31

National Science Council

Principle Investigator

NSC78-0408-E005-01

25

The Application of Computers to Courses for Home Economics

77.01.01-77.07.20

Department Taiwan Provincial Government of Education

Principle Investigator

 

26

The Application of Computers to Courses Agriculture

77.01.01-77.07.20

Department Taiwan Provincial Government of Education

Principle Investigator

 

27

Planning the City Government Information System for Taichung City Government

77.07.01-78.06.30

Taichung City Government

Principle Investigator

 

28

The Study of Chinese Computing Technology and the Development of Chinese Information System

77.07.01-78.04.30

Chung-Shan Institute of Science and Technology

Principle Investigator

 

29

The Study of Data Compression in Chinese Textual Files

78.02.01-79.01.31

National Science Council

Co-Investigator

NSC78-0408-E005-03

30

Some Cryptosystems Based upon Euclidean Geometry

77.12.01-79.01.31

National Science Council

Principle Investigator

NSC78-0408-E005-02

31

A Compression Method for Chinese and English Data

78.08.01-79.07.31

National Science Council

Principle Investigator

NSC79-0408-E194-01

32

On the Design of Password Authentication Systems

79.02.01-80.01.31

National Science Council

Principle Investigator

NSC79-0408-E194-03

33

Planning the County Government Information System for Taitung County Government

79.11.01-80.06.30

Taitung Country Government

Principle Investigator

 

34

The Studies of Designing Optimal Multi-attribute File Systems by the MMI Method for Orthogonal Range Retrieval

79.02.01-80.01.31

National Science Council

Co-Investigator

 

35

The Research and Development of a Palm Carried Electronic Memory Card

78.12.01-79.05.31

Pusan Technology Cooperation

Principle Investigator

 

36

The Study of Dynamic Key-Lock-Pair Access Control Schemes

79.08.01-80.07.31

National Science Council

Co-Investigato

 

37

Design and Performance Comparison of Some Signature Extraction Schemes for Symbolic Pictures

79.08.01--80.07.31

National Science Council

Principle Investigator

NSC80-0408-E194-02

38

A Study of Advanced Communication Protocol for Its Security and Verification

79.08.01-80.07.31

Directorate General of Telecommunications, Ministry of Transportation and Communications

Principle Investigator

TL-81-3105

39

A Design of Security Architecture on Message Handing System and Directory System

79.08.01-80.07.31

Directorate General of Telecommunications, Ministry of Transportation and Communications

Principle Investigator

TL-81-3201

40

Planning the Computer Cryptological Research

79.08.01-79.12.31

National Science Council

Principle Investigator

NSC80-0408-E194-06

41

On Research and Development of Dictionary Compressing and Searching Technologies

80.02.01-81.01.31

National Science Council

Principle Investigator

NSC80-0408-E194-12

42

A Secure Broadcasted System for Military Secret Data

80.02.01-81.01.31

Chung-Shan Institute of Science and Technology

Principle Investigator

CS80-0210-D194-01

43

The Status and Requirements of Computer System Security

80.03.01-80.06.30

Institute for Information Industry

Principle Investigator

 

44

The Design of a Database for Service Control Points

80.07.01-81.06.30

Chunghwa Telecom Laboratories, Ministry of Transportation and Communications

Principle Investigator

TL-81-1101

45

On Research and Development of a Content-Independent Data Compression Scheme

80.08.01-81.07.31

National Science Council

Principle Investigator

NSC81-0408-E-194-03

46

Parallel Computation-Theories , Systems and Applications

80.08.01-83.07.31

National Science Council

Co-Investigator

 

47

The Study of an Open De-Virus System

80.09.01-81.06.30

Ministry of Education

Principle Investigator

MOECC81-A003

48

New Concepts for Multiple Stack System: Born and Reborn

81.02.01-82.01.31

National Science Council

Principle Investigator

NSC81-0K08-E-194-507

49

Identity-Based Cryptosystem Design and Implementation

81.08.01-82.07.31

National Science Council

Co-Investigator

 

50

The Study of a Storage and Retrieval Scheme for Chinese Multi-Character Words

81.08.01-82.07.31

National Science Council

Principle Investigator

NSC82-0408-E-194-009

51

Digital Signature Based on the Error-Correcting Codes

81.08.01-82.07.31

National Science Council

Co-Investigator

NSC82-0408-E-194-003

52

The Study of Generalized Group-Oriented Secret Sharing

82.02.01-83.01.31

National Science Council

Principle Investigator

NSC82-0408-E-194-027

53

The Study of Compressing in Chinese Computing Environment

82.08.01-83.07.31

National Science Council

Principle Investigator

NSC82-0408-E-194-002

54

An Information Management System for Middle and Long-term Projects of Province Affairs

83.08.01-84.05.31

Research, Development, and Evaluation Commission, Taiwan Provincial Government

Principle Investigator

 

55

The Study of a Secret Voting System on Computer Networks

83.02.01-84.07.31

National Science Council

Principle Investigator

NSC83-0408-E-194-013
NSC84-0408-E-194-006

56

The Development of a New Digital Multisignature System

83.07.01-84.06.30

Chung-Shan Institute of Science and Technology

Principle Investigator

CS84-0210-D-194-001

57

The Study of a Fast Cascade Exponentiation Evaluating Scheme

83.08.01-84.07.31

National Science Council

Principle Investigator

NSC84-2213-E-194-001

58

The Resource Allocations in Multi-processor Systems

83.02.01-84.07.31

National Science Council

Co-Investigator

 

59

Setting High Speed Network and the Application Platform for National Chung Cheng University

83.12.01-84.06.30

Ministry of Education

Co-Investigator

 

60

The Editing of Outlines of Localized Teaching Materials for Contemporary Computer Cryptography

83.12.01-84.05.31

Advisory Office, Ministry of Education

Principle Investigator

¥x(84)ÅU005535

61

The Computation of the Modular Multi-Exponentiation

84.08.01-85.07.31

National Science Council

Principle Investigator

NSC85-2213-E-194-010

62

A Design of Spatial Data Structure and Spatial Data Filters

85.08.01-86.07.31

National Science Council

Principle Investigator

NSC86-2213-E-194-003

63

Toward the Research and Development of Key Technology for RSA-type Public Key Cryptoschemes

85.08.01-88.07.31

National Science Council

Principle Investigator

NSC86-2213-E-194-001

64

A Study on Encryption and Decryption Technologies in Satellite Communications

85.08.01-86.07.31

National Space Program Office

Principle Investigator

NSC86-NSPO(A)-PC-FA06-02

65

The Design of Large Pictorial Database System

86.08.01-87.07.31

National Science Council

Principle Investigator

NSC87-2213-E-194-003

66

The Design of Compression Method for Large Sparse Matrices

86.08.01-87.07.31

National Science Council

Principle Investigator

NSC87-2213-E-194-001

67

The Proposal of Information Security Management for Government Organization

86.03.01-86.06.30

Research, Development, and Evaluation Commission, Taiwan Provincial Government

Principle Investigator

 

68

The Proposal of Information Security Standards

86.09.01-87.05.31

National Bureau of Standards, Ministry of Economic Affairs

Principle Investigator

 

69

Towards Indexing and Normalizing of Iconics for Image Similarity Retrieval

87.08.01-88.07.31

National Science Council

Principle Investigator

NSC88-2213-E-194-005

70

The Study of Secret Sharing Schemes for Secret Image and Cheater Identification Scheme

87.08.01-88.07.31

National Science Council

Principle Investigator

NSC88-2213-E-194-003

71

Planning the Draft Proposal of Information Security Standards

87.08.01-88.05.31

National Bureau of Standards, Ministry of Economic Affairs

Researcher

 

72

On the Study and Development of Technical Rule, Management Mechanism and Validation for Cryptographic Modules in Communication Security

87.08.01-88.05.31

Directorate General of Telecommunications, Ministry of Transportation and Communications

Associate Program Director

 

73

A Mechanism of Treating Emergent Events of Information Security for E-Government

87.09.01-88.02.28

Research, Development and Evaluation Commission, Executive Yuan

Co-Investigator

¡@

74

The Study of Some Image Compression Mechanisms (3/1)

88.08.01-91.07.31

National Science Council

Principle Investigator

NSC89-2213-E-194-020

75

Spatial Similarity Retrieval in Video Database

88.08.01-89.07.31

National Science Council

Principle Investigator

NSC89-2213-E-194-003

76

Speeding up the Computations of Lucas Function and Elliptic Curve Cryptosystems

88.08.01-89.07.31

National Science Council

Principle Investigator

NSC89-2213-E-194-002

77

A Study on Color Image Cryptosystems

89.08.01-90.07.31

National Science Council

Principle Investigator

NSC89-2218-E-194-007

78

The Study of Some Image Compression Mechanisms (3/2)

89.08.01-90.07.31

National Science Council

Principle Investigator

NSC89-2218-E-194-012

79

A Video Retrieval Technique Based on Piecewise Matching Method

89.08.01-90.07.31

National Science Council

Principle Investigator

NSC89-2218-E-194-008

80

A study of Similar Color Image Retrieval Using RCM-Wavelet-Based Features

90.08.01-91.07.31

National Science Council

Principle Investigator

NSC90-2213-E-194-026

81

A Study of Image Compression Schemes with Error Correction Capability

90.08.01-91.07.31

National Science Council

Principle Investigator

NSC90-2213-E-194-041 ¡@

82

The Study of Some Image Compression Mechanisms (3/3)

90.08.01-91.07.31

National Science Council

Principle Investigator

NSC90-2213-E-194-013

83

A Study on Information Hiding Techniques for Various Types of Digital Images (1/3)

91.08.01-92.07.31

National Science Council

Principle Investigator

NSC91-2213-E-194-016

84

A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (1/3)

91.08.01-92.07.31

National Science Council

Principle Investigator

NSC91-2213-E-194-017

85

A Study on Information Hiding Techniques for Various Types of Digital Images (2/3)

92.08.01-93.07.31

National Science Council

Principle Investigator

NSC92-2213-E-194-005

86

A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (2/3)

92.08.01-93.07.31

National Science Council

Principle Investigator

NSC92-2213-E-194-004

87

A Study on Information Hiding Techniques for Various Types of Digital Images (3/3)

93.08.01-94.07.31

National Science Council

Principle Investigator

NSC93-2213-E-194-004

88

A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (3/3)

93.08.01-94.07.31

National Science Council

Principle Investigator

NSC93-2213-E-194-003

89

Information Hiding Techniques for Various Data Compression mechanisms(1/3)

94.08.01-95.07.31

National Science Council

Principle Investigator

NSC94-2213-E-194-038

90

The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (1/3)

94.08.01-95.07.31

National Science Council

Principle Investigator

NSC94-2213-E-194-039

91

Information Hiding Techniques for Various Data Compression mechanisms(2/3)

95.08.01-96.07.31

National Science Council

Principle Investigator

NSC95-2221-E-035-140

92

The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (2/3)

95.08.01-96.07.31

National Science Council

Principle Investigator

NSC95-2221-E-035-141

93

The Intellectual Property Rights University Campus Visit Project

96.04.01-96.09.30

Ministry of Education

Co-Investigator

 

94

Information Hiding Techniques for Various Data Compression mechanisms(3/3)

96.08.01-97.07.31

National Science Council

Principle Investigator

 

95

The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (3/3)

96.08.01-97.07.31

National Science Council

Principle Investigator

 

96

The Study of Secure Electronic Transaction Mechanisms in Internet (1/3)

97.08.01-98.07.31

National Science Council

Principle Investigator

NSC 97-2221-E-035-039-MY3

97

Reversible and Removable Data Embedding Techniques for Digital Images (1/3)

97.08.01-98.07.31

National Science Council

Principle Investigator

NSC 97-2221-E-035-084-MY3

98

The Study of Secure Electronic Transaction Mechanisms in Internet (2/3)

98.08.01-99.07.31

National Science Council

Principle Investigator

NSC 97-2221-E-035-039-MY3

99

Reversible and Removable Data Embedding Techniques for Digital Images (2/3)

98.08.01-99.07.31

National Science Council

Principle Investigator

NSC 97-2221-E-035-084-MY3

100

The Study of Secure Electronic Transaction Mechanisms in Internet (3/3)

99.08.01-100.07.31

National Science Council

Principle Investigator

NSC 97-2221-E-035-039-MY3

101

Reversible and Removable Data Embedding Techniques for Digital Images (3/3)

99.08.01-100.07.31

National Science Council

Principle Investigator

NSC 97-2221-E-035-084-MY3

102

The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (1/3)

100.08.01-101.07.31

National Science Council

Principle Investigator

NSC 100-2221-E-035-049-MY3

103

The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (1/3)

100.08.01-101.07.31

National Science Council

Principle Investigator

NSC 100-2221-E-035-093-MY3

104

The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (2/3)

101.08.01-102.07.31

National Science Council

Principle Investigator

NSC 100-2221-E-035-049-MY3

105

The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (2/3)

101.08.01-102.07.31

National Science Council

Principle Investigator

NSC 100-2221-E-035-093-MY3

106

The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (3/3)

102.08.01-103.07.31

National Science Council

Principle Investigator

NSC 100-2221-E-035-049-MY3

107

The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (3/3)

102.08.01-103.07.31

National Science Council

Principle Investigator

NSC 100-2221-E-035-093-MY3

108

Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (1/3)

103.08.01-104.07.31

Ministry of Science and Technology

Principle Investigator

MOST 103-2221-E-035 -046 -MY3

109

The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (1/2)

103.08.01-104.07.31

Ministry of Science and Technology

Principle Investigator

MOST 103-2221-E-035 -102 -MY2

110

Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (2/3)

104.08.01-105.07.31

Ministry of Science and Technology

Principle Investigator

MOST 103-2221-E-035 -046 -MY3

111

The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (2/2)

104.08.01-105.07.31

Ministry of Science and Technology

Principle Investigator

MOST 103-2221-E-035 -102 -MY2


MASTER THESES SUPERVISION

No.

Name

Thesis Title

Completion Date

1

Su, D. H.

Some Properties of Multi-Attribute File System Based upon Multiple Key Hashing Functions for Partial Match Queries

5/1984

2

Lian, L. S.

Toward the Strict Optimality Study on Concurrent Disk Accessing

5/1984

3

Shen, Jau-Ji

Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk System

5/1984

4

Liang, J.

Performance Analysis of the k-nearest Neighbor Search Technique Based upon Multiple Key Hashing Functions

5/1984

5

Yuan, S. T.

A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems

5/1985

6

Tsai, W. H.

A Branch and Bound Algorithm for Allocating Multi-attribute File Systems

5/1985

7

Shieh, J. C.

On the Design of Letter Oriented Minimal Perfect Hashing Functions

5/1985

8

Hung, M. F.

An Access Control Mechanism for Information Protection System

5/1986

9

Chen, C. P.

A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem

5/1986

10

Chen, H. Y.

Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems

5/1986

11

Hsiao, M. D.

The Study of File Allocation Strategies for Concurrent Retrieval

5/1986

12

Lee, Y. P.

A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing

5/1986

13

Lin, C. H.

A Strategy of Information Secure Broadcasting

5/1986

14

Cheng, W. Y.

The Study of a User-Hierarchy Mechanism for Computer System Resources

5/1987

15

Chang, C. H.

A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem

5/1987

16

Chen, C. H.

The Study of Data Missing and Data Integrity

5/1987

17

Wu, H.C.

The Design of a Minimal Perfect Hashing Function for Mandarin Symbols System

5/1987

18

Wang, C. T.

The Development of a Computer Assisted Instruction System for Structure Assembly Languages

5/1987

19

Mong, I. H.

A New Data Compression Scheme Based upon Lempel-Ziv Universal Algorithm

5/1988

20

Chang, S. S.

Optimal Properties of Binary Cartesian Product File System

5/1988

21

Chen, C. H.

Organizing Distributed Data Based for Parallel Searching

5/1988

22

Hsiao, J. Y.

Strings Near-Matching Techniques for Large Textual Files

5/1988

23

Leu, D. F.

Multi-key Sorting as a File Organization Scheme When Queries Are Not Equally Likely

5/1988

24

Chou, A. Y. H.

The Study of File Systems Suitable for Queries

5/1989

25

Chow, L. C.

The Study of Visual Form Transformation System

5/1989

26

Wu, T. C.

The Studies of Computer Authentication and Secure Broadcasting Based upon Euclidean Geometry

5/1989

27

Liao, H. T.

A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control

5/1989

28

Wu, L. H.

An Arithmetic Coding Oriented Single Key Access Control Scheme

5/1989

29

Wu, C. H.

The Study of Security Technologies for Broadcasted Network Systems

5/1989

30

Lin, J. C.

A Fast Spatial Match Accessing Scheme for Symbolic Pictures

5/1990

31

Dai, J. Y.

Sharing a Circular Storage for Multiple Stacks

5/1990

32

Chen, D. C.

A Modified Arithmetic Coding Scheme Suitable for Binary Search

5/1990

33

Hwang, S. M.

A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid

5/1990

34

Lin, J. F.

A Chinese Syllables Compression Scheme Based Upon Perfect Hashing

5/1990

35

Wang, S. J.

A Dynamic Key-Lock-Pair Access Control Scheme

5/1991

36

Hwang, R. J.

Controlling Access in Hierarchical Structures Using Cryptographic Keys

11/1991

37

Hwang, S. J.

Sharing a Dynamic Secret

11/1991

38

Lee, H.C.

A Solution to Generalized Group Oriented Cryptography

5/1992

39

Chen, C. Y.

A Dynamic Access Control Scheme Based Upon Ziegler's Row Displacement Method

5/1992

40

Chen, Y. W.

A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis

5/1992

41

Kowng, H. C.

A Digital Signature Scheme Based Upon Theory of Quadratic Residues

5/1992

42

Lee, W. B.

On the Design and Implementation of an Analyzer and a Vaccination for Computer Viruses

5/1993

43

Liou, F. Y.

A Digital Multisignature Scheme Based upon Modified E1Gamal's Public Key Cryptosystem And Its Digital Signature Scheme

5/1993

44

Wang, C. H.

A Modified Lempel-Ziv-Welch Encoding Scheme Based on the Frequencies of Characters

5/1993

45

Liao, W. Y.

A Remote password authentication scheme based upon ElGamal's signature scheme

5/1993

46

Lin, T. H.

A Secure Group-Oriented Secret Sharing Scheme

5/1993

47

Lee, C. F.

A Greedy Relaxed Generalised Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems

5/1994

48

Tsu, S. M.

An Improvement on a Probabilistic Encryption Scheme and Its Applications

5/1994

49

Jiang, J. H.

A Spatial Filter for Similarity Retrieval

5/1994

50

Wu, W. B.

A Secure Voting System on a Public Network

5/1994

51

Horng, W. J.

A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm

5/1994

52

Lin, D. C.

Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters

5/1995

53

Li, W. T.

A Fast Search Algorithm for Vector Quantization Based Upon Principal Component Analysis Technique

5/1995

54

Leu, JJyh-Jong

The Performance Analysis of Bloom and Random Filters

5/1995

55

Kuo, C. L.

Fast Codeword Search Techniques for Vector Quantization

6/1996

56

Chou, J. S.

An Image Coding Scheme Using Prediction of Euclidean Distance Computation on a Smaller Codebook

6/1996

57

Sung, C. H.

Locally Adaptive Schemes for Data Compression Using Multilist Structure

6/1997

58

Chen, L. L.

Some Searching Techniques for Block Motion Estimation for Video Compression

6/1997

59

Jau, J. J.

Image Compression and Transmission Using Vector Quantization and S-tree

6/1998

60

Hwang, P. C.

Accessing Shared Secrets in a Hierarchy

6/1998

61

Shine, F. C.

Some Techniques of Image Compression and Transmission Using Vector Quantization and Bit-plane

6/1998

62

Chen, Kuo-Lun

Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t,n) Threshold Scheme

6/1999

63

Kuo, Y. T.

Fast Algorithm for Some Meta-Operations in Cryptographic Systems

6/1999

64

Chung, P. F.

Two Copyright Protection Scheme for Digital Images

6/2000

65

Xiao, G. X.

Two Prediction Methods for Image Compression and Progressive Image Transmission

6/2000

66

Lin, Y.

Image Compression and Copyright Protection Using Edge Detection Methods

6/2000

67

Hsia, H.C.

Two Hiding Techniques for Data Security and Image Copyright Protection

6/2000

68

Chuang, J. C.

The Study of Image Tampering Detection

6/2000

69

Hsieh, C. P.

The Study of Denoising Technique for Digital Images

6/2001

70

Lu, P. W.

The Application of Vector Quantization Techniques to Digital Image Tamper Proofing

6/2001

71

Jiang,J. L.

The Design of Some Filter for Image Denoising

6/2001

72

Yeh, J. C.

The Study of Copyright Protection Schemes for Digital Images

6/2001

73

Chan, C. S.

Some Data Hiding Techniques for Digital Images

6/2001

74

Yu, T. X.

The Study of Digital Image Ciphering and Hiding Mechanisms

6/2002

75

Pan,Y. P.

The Study of Multisecret Sharing Schemes and Their Applications to Access Control in a User Hierarchy

6/2002

76

Chung, C. Y.

Some Protocols for Passing Messages Securely and Protecting Rightful Ownership

6/2002

77

Chen, G. I.

TheStudy of Lossless Image Compression an Image Magnification

6/2002

78

Su, Y. Y.

Two Color Image Quantization Schemes for Non-true-color Display

6/2002

79

Lee, C. F.

Code Transformation Between Various Image Splitting Tree Representations and Chinese Calligraphy Transmission Progressively Based on Quadtrees

6/2003

80

Wu, W. J.

Data Hiding and Content Retrieval in Digital Image Database

6/2003

81

Chen, G. M.

Lossless Vector Quantization Indices Compression and Information Hiding Schemes Based on Search-Order Coding

6/2003

82

Liao, C. T.

Some Image Compression and Data Protection Techniques Using Support Vector Machines

6/2003

83

Chou, H. C.

Some Studies on Digital Image Steganographic and Watermarking Techniques

7/2003

84

Hu, Y. H.

Retrieving Digital Images from Frequency Domain Transformed Databases

6/2004

85

Tai, W. L.

Hiding a Digital Image into Two Cover Images

6/2004

86

Liu, Y. L.

The Techniques of Digital Image Transmission and Authentication

6/2004

87

Lin, P. Y.

Two Data Hiding Schemes for Grayscale Images and Image Compression Codes

6/2004

88

Tseng, C. S.

Various Secret Embedding Schemes for Binary and Gray Level Techniques

6/2005

89

Wang, Y. Z.

Some Image Steganography Schemes with High Embedding Capacity

6/2005

90

Yeh, J. B.

Hiding Secrets in Data Compression Codes

6/2005

91

Kao, C. L.

On Authentication Protocols for Communication Networks

6/2005

92

Kuo, J. Y.

Some Password Authentication Schemes Using Smart Cards for Single and Multiple Server Architectures

6/2005

93

Lin, K. C.

Some Efficient Techniques for Secure Peer-to-Peer Networking

6/2005

94

Chang, P. Y.

Group Signature and Key Agreement Schemes Based on Diffie-Hellman Key Exchange Protocol

6/2006

95

Shue, Y. W.

Some Key Management Protocols for Insecure Networks

6/2006

96

Cheng, Y. F.

Some Information Security Applications using Symmetric and Asymmetric Crypto Schemes

6/2006

97

Fan, Y. H.

The Design and Analysis of Information Hiding and Secret Image Sharing Schemes

6/2006

98

Chang, S. C.

A Mutual Authentication Scheme and Its Application to Electronics Traveler Checks

6/2007

99

Cheng, T. F.

An IC-Card-Based Remote Login Mechanism and a Proxy Raffle System in Computer Networks

6/2007

100

Lin, C. H.

Some Visual Cryptoschemes for Secret Images

6/2007

101

Chiu, Y. C.

Some Authentication Schemes and Their Applications to Internet and Wireless Environments

6/2007

102

Chang, K. J.

Authentication Mechanisms and a Payment Protocol for Wireless Environment

6/2007

103

Li, K. M.

A Predictive SMVQ Scheme and Data Embedding for Digital Images

6/2007

104

Lin, S. Y.

Key Establishment and Agreement Protocols and Their Application to Internet and Wireless Environments

6/2007

105

Yah, C. M.

Reversible Data Hiding Schemes for Large Payload and Low Distortion

6/2008

106

Yang, S. R.

Scalable Key Assignment Protocols in Internet

6/2008

107

Wang, G. H.

The Study of High Quality Stego-image for Large Payload

6/2008

108

Huang, W. H.

Two Efficient Demosaicking Algorithms for Color Filter Array

6/2008

109

Chuang, L. Y.

The Optimal Solution and Improvement of Exploiting Modification Direction Embedding Method

6/2008

110

Wang, Y. R.

The Study of Data Hiding Based on Modification Direction Embedding Method

6/2008

111

Liu, L. J.

The Detection of Visual Secret Shadow Cheating and Digital Image Tampering

6/2008

112

Le, T. H. N.

Secret Sharing Using Multiple Shadow Images

2/2009

113

Lai, Y. W.

Message Broadcasting and Electronic Voting Schemes Based on Elliptic Curve Cryptosystem

6/2009

114

Wu, Y. C.

Authenticated Communication Systems for E-mail Protocal and Vehicular Ad Hoc Networks

6/2009

115

Chen, C. H.

Illumination-Balance Techniques for Text-photo Images

6/2009

116

Chen, Y. C.

Segmentation and Classification Techniques for Retinal Images

6/2009

117

Wang, H. C.

Embedding Secret Information in a Condenced Image and Multiple Image Files

6/2009

118

Liao, C. C.

The Study of Visually Sharing Secret Images

6/2009

119

Li, Q.

A Study on Reversible Watermarking

4/2010

120

Lin, H. C.

Some Secret Embedding Schemes for Different Entities

6/2010

121

Huang, Y. C.

Mobile Conference Mechanism for Wireless Communication Users

6/2010

122

Hsieh, M. H.

Preserving User-Participation in Insecure Networks Based on Visual Secret Sharing and Authentication Watermarking

6/2010

123

Huynh, N. T.

Visual Cryptography for Users Verification

6/2010

124

Liu, T. C.

The Study of Digital Images Embedding Techniques and Visual Secret Sharing Schemes

6/2010

125

Tsai, M. C.

Digital Copyright Protection and Image Authentication Using Watermarking Strategy

6/2010

126

Wu, C. Y.

Reversible Data Hiding Schemes Using Repeatedly Embedding Strategy with High Capacity

6/2010

127

Yin, Z. X.

Hiding Information in Digital Images

6/2010

128

Tseng, W. T.

Authentication Protocols for Heterogeneous Communication Network Environment

6/2011

129

Chen, P. Y.

Reversible High-payload Information Hiding Scheme for Digital Cover Images and VQ Index Tables

6/2011

130

Chen, Y. W.

User Authentication and Key Agreement Protocols for Wireless Network Environment

6/2011

131

Liu, C. M.

Non-Reversible and Reversible Data Hiding Based on Module Operation

6/2011

132

Tsou, P. L.

Perceptual Robust Image Hashing Scheme Based on Halftone Mechanism and Non-Uniform Sampling

6/2011

133

Nguyen Thai Son

Reversible Data Hiding Techniques for VQ-compressed Domain

6/2011

134

Vo Phuoc Hung

Sharing Secret Messages Using Meaningful Digital Shadow images

6/2011

135

Marcos Pizzolatti

The study of some reversible secret sharing schemes

12/2011

136

Cui, S. Y.

Image Data Hiding Based on Voronoi Diagram

12/2011

137

Yue, S.

Image Data Hiding Scheme Based on Graph Coloring

12/2011

138

Lin, T. Y.

Information Hiding Techniques for Script Files and Image Files

06/2012

139

Chiu, Y. P.

The study of Distortion and Distortion free Visual Secret Sharing Scheme

06/2012

140

Liao, L. T.

Two Steganographic Schemes for Embedding Large Secret Information

06/2012

141

Wang, S. T.

Novel Reversible Data Hiding Schemes for Secret Images and Traditional Chinese Text Files

06/2012

142

Lin, C. C.

Information Hiding and Visual Secret Sharing Based on Exploiting Modification Direction

06/2012

143

Chang, C. H.

Some Smart Card Oriented Authentication Protocols for Mobile Communication

06/2012

144

Tsai, H. Y.

Pixel Unexpanded Visual Cryptography Techniques Based on Meaningful Shadows

06/2012

145

Sun, C. Y.

Secure and Efficient Authentication Schemes for Wireless Communications

06/2013

146

Chen, Y. C.

Reversible Data Embedding Schemes for VQ-Compressed Images

06/2013

147

Chen, W. Y.

Authentication Protocols for Some E-commerce Applications

06/2013

148

Hsu, T. J.

Some Data Hiding Techniques and Their Applications

06/2013

149

Jia, X. D.

Research on Privacy-preserving Identity Authentication Protocols in Vehicular Ad Hoc Networks

06/2014

150

Yang, H. R.

Study on Data Hiding Algorithms Based on Compression Codes

06/2014

151

Lin, M. C.

Embedding Secret Information in VQ Index Tables

06/2014

152

Chung, T. F.

Authentication and Data Hiding Schemes for Digital Images

06/2014

153

Chou, Y. C.

A Study of Group Authentication and Data Protection

06/2014

154

Hsueh, W. Y.

Multi-Server Remote User Authentication Mechanisms Using Smart Card

06/2014

155

Li, F.

Reversible Image Hiding Algorithms based on Wavelet Transformation

12/2014

156

Yang, X. Q.

Semi-fragile Watermarking Algorithms for Tamper Detection and Image Authentication

06/2015

157

Shih, T. H.

The Study of Reversible Authentication Techniques for Digital Images

06/2015

158

Hsueh, H. S.

Data Hiding Schemes for Still Images and Videos

06/2015

159

Chang, W. C.

Reversible Data Hiding for Encrypted and Compressed Digital Image

06/2015

160

Bai, J. l.

Some Techniques for Information Hiding in Images(Chengdu University of Electronic Science and Technology)

05/2016

161

Xia, B. B.

Reversible Data Hiding Based on Vector Quantization(Taiyuan University of Science and Technology)

06/2016

162

Jin, Q.

Research on Optimized Block Truncation Coding and Data Hiding Algorithm Based on Compressed Images(Taiyuan University of Science and Technology)

06/2016

163 Hsu, C. I. Research on Effective Color Image Retrieval Technology Based on Block Truncation Coding 06/2016
164 Wang, C. M. Research on Reversible Data Hiding Technology of ABTC-EQ Compression Codes and AMBTC Decompression Images 06/2016
165 Wang, Y. K. Embedded Information in the Absence of Distortion Data Compression Code, Compressed Images and Encrypted Image of the Study 06/2016
166 Chien, T. I. Based on Image Sharpening and Image Compression and Encryption 06/2016
167 Lo, Y. Y. Research on Key Agreement Authentication Method and Telemedicine Information System Authentication Method Based on Passing Code 06/2016
168 Wu, C. H. Certificateless Authentication Method on Wireless Body Area Network 06/2016
169 Chang, K. L. QR Code Landscaping Algorithm and Security Mechanism Research (Hangzhou Dianzi University) 12/2016
170 Peng, H. H. Research on Credit Card Authentication Algorithm Based on Secret Sharing and Image Watermarking (Hangzhou Dianzi University) 12/2016
171 Kao, H Research on the Application of Digital Watermarking in Privacy in Cloud Environment (Northwestern Polytechnical University) 04/2017
172 Kuo, P Research on Multi-Feature Data Routing Strategy in Deduplication (Northwestern Polytechnical University) 04/2017
173 Kuo, I Research on Information Hiding Technology for Cloud Computing Security Application (Northwestern Polytechnical University) 04/2017
174 Hsu, W. L. Research on Key Technology of Information Hiding Based on Image Space Domain (Anhui University) 04/2017
175 Mao, K. Research on Image Information Hiding Technology Based on Hamming Code (Anhui University) 04/2017

 


Ph. D. DISSERTATION SUPERVISION

No.

Name

Thesis Title

Completion Date

1

Lin, C. H.

Some Control Mechanisms for Data Security in Computer Systems

06/1991

2

Wu, T. C.

The Study of Encryption and Control Techniques for Information System

06/1992

3

Chen, Y. J.

Some Properties on Vectorial Addition Chains

12/1994

4

Chen, C. Y.

The Study of Properties for  Local Queries in Multi-Key File Systems

06/1995

5

Hwang, S. J.

The Design and Server-Aided Secret Computation of Digital Signatures

04/1996

6

Chen, C. Y.

The Study of Properties and Applications for Public Key Cryptosystem Based on Number Theorem

04/1996

7

Lou, D. C.

Fast Computations for Some Public Key Cryptosystems

05/1997

8

Lee, W. B.

Designing Some Digital Signature Schemes and Extending Their Applications to Information Security Systems

03/1997

9

Hwang, R. J.

Some Secret Sharing Schemes and Their Applications

04/1998

10

Lee, C. F.

Some Indexing Design and File Organizations for Spatial Match Retrieval

06/1998

11

Hu, Y. C.

Some Image Encoding Schemes Based on Vector Quantization

12/1999

12

Jiang, J. H.

Effective Algorithms for Compressing Various Data

12/1999

13

Wang, C. T.

Designing Some Cryptographic Schemes for Group Communication Systems

12/1999

14

Chan, Y. K.

Similar Image and Video Retrieval Systems Based on Spatial and Color Attributes

12/2000

15

Hung, K. L.

Block Reconstruction Techniques for Image Recovery

11/2001

16

Tsai, C. S.

A Study of Image Intellectual Property Rights Protection and Image Camouflage

05/2002

17

Wu, H. C.

Copyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery

06/2002

18

Hwang, K. F.

Secure Encryption and Authentication Schemes for Text Data and Digital Images

06/2002

19

Tsai, P. Y.

The Study of Image Protection Mechanisms for Image Hiding and Image Authentication

01/2004

20

Lin, I. C.

Data Communication and Security in Mobile Computing Environment

03/2004

21

Lai, Y. P.

Fast Exponentiation Computations and Number System Transformations

07/2004

22

Chuang, J. C.

Steganography and Watermarking in Digital Images

10/2004

23

Yu, Y. H.

The Study of Digital Image Hiding and Recognition

01/2005

24

Tseng, H. W.

Image Coding Schemes for Data Hiding and Error Resiliency

01/2005

25

Chan, C. W.

The Enhancements of Some Public Key Cryptosystems and Their Applications in Electronic Commerce

01/2005

26

Huang, H. F.

The Design and Applications of Some Digital Signatures

01/2005

27

Lu, T. C.

The Study of Information Hiding Mechanisms

12/2005

28

Chang, Y. F.

Authentication and Digital Signature Schemes and Their Applications to E-commerce

12/2005

29

Chan, C. S.

The Study of Image Steganography and Digital Watermarking

12/2005

30

Lin, C. Y.

Data Mining and Its Applications to Image Processing

10/2006

31

Lee, Y. C.

Fast Algorithms for Mining Frequent Itemsets

05/2007

32

Wu, W. C.

The Study of Vector Quantization and Its Applications to Information Hiding

07/2007

33

Wu, M. N.

Some Information Hiding Schemes for Various Image Types

11/2007

34

Lee, J. S.

Security Technologies on Wireless Communications and Applications in Electronic Commerce

03/2008

35

Chou, Y. C.

A Study of Digital Image Coding and Retrieving Techniques

12/2008

36

Tai, W. L.

Image Steganography and Reversible Data Embedding Techniques

12/2008

37

Yang, J. H.

Authentication Protocols for E-Commerce Applications

06/2009

38

Lin, P. Y.

Removable Digital Watermarking and Image Protection Mechanisms

06/2009

39

Chen, Y. H.

Secret Hiding and Retrieval Techniques for Digital Media

06/2009

40

Hsieh, Y. P.

Embedding Secrets in Digital Images and Their Compression Codes

06/2009

41

Kieu, T. D.

Reversible Information Hiding Techniques for Digital Watermarking and Steganographic Applications

06/2009

42

Wang, C. C.

The Study of Stegnography and Watermark on Binary Images

01/2010

43

Wang, Z. H.

The Research on Reversible Data Embedding Techniques

04/2010

44

Chen, C. C.

Efficient Image Encoding and Information Embedding Techniques

06/2010

45

Tsai, H. C.

Authentication and Key Agreement Schemes for Network Applications

12/2010

46

Lee, C. Y.

Secure Communication Schemes in Network Environments

12/2010

47

Wu, C. C.

Security Mechanisms for Electronic Business Applications

01/2011

48

Pai, P. Y.

The Study of Segmentation and Hiding Techniques for Medical Images

04/2011

49

Chen, K. N.

Hiding Secret Information in Image Compression Code and Image Protection Techniques

12/2011

50

Chang, S. C.

The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce

06/2013

51

Cheng, T. F.

Secure Authentication Protocols and Their Applications

06/2013

52

Wang, X. T.

Research on Data Embedding Methods Based on Grayscale Image

06/2015

53

Nguyen, T. S.

Reversible Information Hiding Techniques and Their Applications in Image Protection

06/2015

54

Huynh, N. T.

Verifiable Lossless Multi-Image Sharing Schemes for Secret Image Embedding

06/2015

55

Huang, Y. H.

(k, n)-Image Reversible Data Hiding

07/2015

56

Le, H. D.

Smart Card Based Authenticated Key Agreement Schemes

07/2015

PATENTS

No.

Title

Patent No.

Country

Date

1

Cryptosystem for Encrypting Digital Image or Voice File

6023511

U.S.A.

2000.2.8

2

An Encryption Device for Digital Image and Voice Files

103202

R.O.C.

1999.5.11

3

A Method for Sharing Color Confidential Images

129581

R.O.C.

2001.3.1

4

A Robust Digital Watermark Method for Multimedia

140692

R.O.C.

2001.8.21

5

A Secure Protocol for End-to-End Mobile Users with Double Authentication

140313

R.O.C.

2001.7.31

6

Feature-Oriented Digital Watermark for Multimedia

140057

R.O.C.

2001.8.1

7

A Speech Hiding Method Based upon Sub-band Coding

141279

R.O.C.

2001.9.1

8

A Digital Watermark Method Based on Neural Networks

145485

R.O.C.

2001.10.21

9

A Robust Method of Gray-Scale Watermark Embedding and Retrieval

178825

R.O.C.

2003.11.11

10

A Progressive Image Transmission Method Based on Guessing Neighbors

199178

R.O.C.

2004.7.22

11

A Irregular Sampling Coding Method Suitable for Image Authentication and Recoverable Tamper Proofing

I248037

R.O.C.

2006.1.21

12

A Meaningful Image Sharing Technique Based on Color Visual Secret Sharing

I434245

R.O.C.

2014.2.21

13

A (2,2) Circular Sharing Techniques for Two Color Secret Images

I410908

R.O.C.

2013.10.01

14

A Digital Watermarking Technique Based on Random Halftoning

Under examining

R.O.C.

 

15

A High-Payload Data Hiding Technique Based on Side-Match Vector Quantization with Adaptive Alternatives

Under examining

R.O.C.

 

16

An Efficient Image Authentication Method Based on Hamming Code

Under examining

R.O.C.

 

17

A Switching Machine for Digital Watermarks

M319592

R.O.C.

2007.9.21

18

A Montgomery Multiplier in Finite Fields

I340915

R.O.C.

2011.4.21

19

An Efficient Medical Image Segmentation Algorithm Based on Game-Theoretic Framework

ZL 2013 1 0452311.7

China

2015.12.23

20

Progressive Secret Image Sharing Scheme Based on Sudoku

2013104863316

China

2016.2.16

LECTURE

No.

Subject

Date

Location

1

A Design of an Efficient Hashing Function

1982.01.07

Institute of Computer and Decision Sciences, National Tsing Hua University

2

Compiler Construction Techniques

1982.03.11

National Chung Hsing University, Department of Applied Math

3

Design of an Optimal Multi-key File System

1982.06.19

Institute for Information Industry

4

Data Recovery Automation

1982.12.11

National Chung Hsing University, Department of Applied Math

5

A Design of a Multi-key File System

1982.12.18

Feng Chia University, Department of Applied Math

6

Recent Developments of of Perfect Hash Functions

1983.04.29

National Taiwan University, Department of Computer Science and Information Engineering

7

Application of Database Management Systems

1983.11.26

Tax Administratration of Taichung Government

8

Recent Developments of Multi-key Hashing File Systems

1984.02.29

National Taiwan University, Department of Electrical Engineering

9

Constructing an Optimal Information Retrieval Method

1984.05.11

Feng Chia University, Department of Information Engineering

10

Experiences in Designing a Database Management System

1984.09.22

Institude for Information Industry

11

Designing a Minimal Perfect Hash Function

1984.10.08

Institute of Computer and Decision Sciences, National Tsing Hua University

12

Recent Development of Text Retrieval

1984.10.19

National Taiwan University, Department of Computer Science and Information Engineering

13

Data Structure and Information Security - from the Perspective of Sun-Tzu Theorem

1984.11.28

Department of Electrical Data Processing, National Taichung Institude of Commerce

14

Experiences in Designing an Interactive Database Management System

1984.12.21

Providence College of Arts and Sciences for Women, Department of Information Science

15

Recent Developments of Key-Lock Pair Access Control Mechanism

1985.03.15

National Taiwan University, Department of Computer Science and Information Engineering

16

Methodology of Computer Software Engineering

1985.03.27

Providence College of Arts and Sciences for Women, Department of Information Science

17

Information Management Techniques

1985.04.18

Taichung First Senior High School

18

Constructing a Symbolic Database and Information Security System

1985.04.20

National Cheng Kung University, Department of Electrical Engineering

19

On Design of a Symbolic Database - from the Perspective of Theory of Numbers

1985.05.02

National Chiao Tung University, Department of Computer Science and Information Engineering, and Department of Computer Information and Science

20

Computer Security Technology

1985.06.07

Feng Chia University, Department of Information Engineering

21

How to Design a Symbolic Database

1985.08.02

CDC Computer Company: Workshop on Maintenance and Application of the User System

22

How to Manage Enterprise Databases

1985.09.10

YMCA-IMC Workshop on Computer Research and Study

23

On Developments of Theory and Techniques

1985.10.14

Feng Chia University, Department of Civil Engineering

24

Computer and Information Management

1985.10.20/10.26

Tunghai University, International Bussiness Administration

25

Information Protection Systems

1986.01.23

Academia Sinica, Institute of Information Science

26

Information Security Systems

1986.01.24

Aeronautics Developement Center

27

Recent Developments of Data Structures and Information Security

1986.03.06

Chung-Shan Institute of Science and Technology

28

Recent Developments of Searching Techniques

1986.03.13

Providence College of Arts and Sciences for Women, Department of Information Science

29

A Chinese Form-oriented Visual Programming System

1986.03.18

National Chung Hsing University

30

Recent Developments of Data Structure Techniques

1986.03.24

National Taiwan Institute of Technology, Department of Electronic Technology

31

How to Construct a Symbolic Database

1986.03.25

Institute of Computer and Decision Sciences, National Tsing Hua University

32

An Efficient Data Searching Technique

1986.03.31

Chung Yuan Christian University, Department of Information and Computer Engineering

33

Computer Communications Security System

1986.04.17

National Chiao Tung University, Department of Computer Science and Information Engineering

34

Computers and Data Processing

1986.05.04

Tunghai University, International Bussiness Administration

35

Public-Key Cryptography

1986.06.12

Taiwan Province Government, Electrical Data Processing Center

36

Advanced GPSS/S

1986.06.16-06.17

Workshop on Software Packages and Application Systems, sponsored by Ministry of Education

37

Searching Techniques for Static Data

1986.08.20

Aeronautics Developement Center

38

Computers and Data Processing

1986.09.13

Tunghai University, International Bussiness Administration

39

Visual Programming

1986.09.20

Institude for Information Industry

40

Computers and Passwords

1986.10.05

Taiwan Provincial Taichung Libarary

41

Visual Programming

1986.10.06

National Chung Hsing University, Computer and Information Network Center

42

Office Automation

1986.10.18

Tunghai University, International Bussiness Administration

43

Visual Programming

1986.10.21

Department of Electrical Data Processing, National Taichung Institude of Technology

44

Information Security

1986.10.29

National Chung Hsing University, Computer and Information Network Center

45

Data Encryption Techniques

1986.11.14

World Technology Consultant Industry

46

Information Access Control Techniques

1986.11.14

World Technology Consultant Industry

47

Secure Secret Broadcasting

1986.11.15

World Technology Consultant Industry

48

Recent Developments of Data Structures and Searching Techniques

1986.11.19

National Central University, Department of Computer Science and Information Engineering

49

Information Access Control Techniques

1986.12.03

National Tsing Hua University, Department of Industrial Engineering

50

Computers and Communications

1986.12.12

National Taiwan Normal University, Department of Industrial Education

51

Computers and Communications

1986.12.13

Taichung County, Ching-Shui Junior High School

52

The Past, Present, and Future of Information Technology

1986.12.22

National Chin-Yi Institute of Technology

53

Implementation and Application of a Test Items Bank for Information Courses

1986.12.23

Taichung Home Economical and Commercial Senior Vocational School

54

Information Era

1987.01.15

Victory High School

55

Recent Developments of Data Structures and Searching Techniques

1987.02.24

National/ Panasonic Taiwan

56

Sun-Tzu as a Computer Scientist

1987.03.15

Taiwan Provincial Taichung Libarary

57

Advanced GPSS/S

1987.03.17-03.18

Workshop on Software Packages and Application Systems, sponsored by Ministry of Education

58

Computers and Information

1987.03.21

Chia-Yi YMCA

59

Computers and Information

1987.03.22

Tunghai University, International Bussiness Administration

60

The Developments of Information Retrieval Techniques

1987.03.24

Tatung Institute of Technology, Department of Computer Science and Engineering

61

A Design of Secure Computer Passwords

1987.03.26

National Cheng Kung University, Department of Engineering Science

62

Database Design - From the Perspective of Data Analysis

1987.04.14

Computer Society of the Republic of China

63

Data Retrieval and Information Security

1987.04.20

National Chung Hsing University, Computer and Information Network Center

64

Information Science - from the Perspective of Data Analysis

1987.04.21

National Chung Hsing University, Computer and Information Network Center

65

Information Science - from the Perspective of Data Analysis

1987.04.23

Aeronautics Developement Center

66

Information Science - from the Perspective of Dicrete Mathematics

1987.04.28

Tunghai University, Department of Computer Science Information Engineering

67

Key to the Treasury of Life

1987.05.11

Taichung Second Senior High School

68

Advanced GPSS/S

1987.05.26-05.27

Workshop on Software Packages and Application Systems, sponsored by Ministry of Education

69

Information Era

1987.06.23/07.07

Ming Dao High School

70

Visual Programming - FORMOSA

1987.07.09

World Technology Consultant Industry

71

A Database Management System - System-Bee

1987.07.10

World Technology Consultant Industry

72

Information Security

1987.07.23

Aeronautics Developement Center

73

Workshop on Data Structures and Data Analyses

1987.08.24-08.26

World Technology Consultant Industry

74

Workshop on Information Systems and Information Auditing

1987.08.27-08.28

Harvard Management Services

75

Workshop on Information Engineering Technology

1987.09.21-09.23

Chin-Peng Management Consulting Company

76

Information Access Control Techniques

1987.10.28

National Tsing Hua University, Department of Industrial Engineering

77

Designing an Information Query System

1987.11.02

Institute of Computer and Decision Sciences, National Tsing Hua University

78

Design Principles of an Information Query System

1987.11.04

Tunghai University, Department of Computer Science Information Engineering

79

System Simulation

1987.11.10

Institute of Harbor and Marine Technology

80

Clustering Analysis and Its Applications

1987.11.26

Department of Computer Engineering, National Chiao Tung University

81

Workshop on Compilers

1987.11.30-12.02

World Technology Consultant Industry

82

Clustering Analysis and Its Applications

1987.12.08

Department of Computer Science and Information Engineering, National Cheng Kung University

83

A Step to Information Society - Using Computers

1987.12.12

Feng-Yuan Junior High School, Feng Yuan

84

A Step to Information Society - Using Computers

1987.12.15

Chang-Ann Junior High School, Chang-Hua

85

Data Compression

1987.12.16

Computer and Information Network Center, National Chung Hsing University

86

Design of Distributed Databases

1988.03.14

Department of Computer Science and Engineering, Tatung Institute of Technology

87

Visual Programming

1988.03.28

Department of Industrial Engineering and Enterprise Information, Tunghai University

88

On Developments of Theory and Techniques

1988.04.11

Tunghai University, Department of Computer Science Information Engineering

89

Visual Programming

1988.04.13

Aeronautic Development Center

90

Electronic Data Compression

1988.04.14

Department of Electrical Data Processing, National Taichung Institude of Commerce

91

Database Management Systems and Office Automation

1988.04.18

Yung-Jing Industrial Vocational Senior School

92

Database Management System and Office Automation

1988.04.20

Taichung Home Economical and Commercial Senior Vocational School

93

Information Era

1988.08.15

Taichung Home Economical and Commercial Senior Vocational School

94

Information Era

19888.08.18

Taichung Agricultural Vocational Senior High School

95

Database Management Systems

1988.10.05

Aeronautic Development Center

96

Chinese String Searching

1988.10.12

Department of Computer Science and Information Engineering/Electrical Engineering, National Central University

97

Approximate String Searching

1988.11.01

Department of Computer Science and Information Engineering, National Chiao Tung University

98

A User Identification Scheme on Computer Networks

1988.11.10

Academia Sinica

99

Workshop on Information System Technology

1988.11.24-11.26

World Technology Consultant Industry

100

Recent Developments of Information Security Technology

1988.12.01

Department of Computer Science and Information Engineering, National Chiao Tung University

101

Towards Information Society - Universal Information Education

1988.12.08

Taichung First Senior High School

102

Towards Information Society - Universal Information Education

1988.12.10

Taichung Girls' Senior High School

103

Introduction to Computer Passwords

1989.03.15

Department of Electrical Data Processing, National Taichung Institude of Commerce

104

Public-Key Encryption

1989.04.24

Aeronautics Developement Center

105

An Experience in Designing a Database Management System

1989.04.26

Computer Society of the Republic of China

106

Data Analysis Technology and Its Applications

1989.04.28

Department of Computer Science and Information Engineering, National Taiwan University

107

Data Analysis Technology and Its Applications

1989.05.10

Department of Industrial Education, National Taiwan Normal University

108

Information and Computers

1989.06.07

National Chung Hsing University

109

On Developments of Theory and Techniques

1989.06.09

Department of Computer Science and Information Engineering, National Chiao Tung University

110

Information Security

1989.06.14

National Chung Hsing University

111

Workshop on Data Engineering Technology

1989.08.28-08.30

Center of Public and Business Administration Education, National Chengchi University

112

Data Compression

1989.10.05

Department of Engineering Science, National Cheng Kung University

113

Computer Crime and Computer Viruses

1989.10.15

Taiwan Provincial Taichung Library

114

Computer Crime and Countermeasures

1989.11.01

Tunghai University, Department of Computer Science Information Engineering

115

Clustering Analysis and Its Applications

1989.12.08

Institute of Information Science, Academia Sinica

116

Information Security

1989.12.11

Department of Mathematics and Science Education, National Chiayi Teachers College

117

Information and Computers

1990.02.06

Taichung Agricultural Vocational Senior High School

118

Introduction to Computer Password Design

1990.03.01

Department of Computer Science and Information Engineering, National Chiao Tung University

119

Computer Cryptology

1990.03.02

Department of Information Engineering, Feng Chia University

120

Data Encryption

1990.03.08

Department of Electrical Engineering, Tatung Institute of Technology

121

Information Security

1990.03.09

Department of Electronical Data Processing, Ming Chuan College

122

Data Encryption

1990.03.28

Application Mathematics Department, Chinese Culture University

123

Design of a Chinese String Searching Machine

1990.03.30

Department of Electrical Data Processing, National Taichung Institude of Commerce

124

Data Encryption

1990.04.12

Taichung Home Economical and Commercial Senior Vocational School

125

Information Security

1990.04.12

Taichung Home Economical and Commercial Senior Vocational School

126

Data Compression

1990.04.14

Taichung Home Economical and Commercial Senior Vocational School

127

Computer Security

1990.04.18

College of Medicine, National Cheng Kung University

128

Computer Crime and Computer Viruses

1990.05.17

Taichung Museum of Art

129

Information Management and Applications

1990.06.04

Chia-Yi City Government

130

Information Management and Applications

1990.06.22

Chia-Yi City Government

131

Management Computerization

1990.07.11

National Yunlin Institute of Industry

132

Information Access and Control

1990.09.27

Department of Applied Mathematics, National Chung Hsing University

133

Strategies for Chinese Compression

1990.10.18

Department of Computer Science and Information Engineering, National Chiao Tung University

134

Computer Crime and Countermeasures

1990.10.18

Department of Computer Science and Information Engineering, National Chiao Tung University

135

Computer Crime and Countermeasures

1990.10.30

National Chung Cheng University

136

Compression-Based Perfect Hashing Strategies

1990.11.26

Department of Computer Science, National Tsing Hua University

137

Countermesures against Computer Crime and Computer Viruses

1990.11.27

Taiwan Cooperative Bank

138

Data Engineering Technology

1990.11.28

National Defense Management College

139

The Design of Computer Password

1990.12.12

Department of Electrical Engineering, National Yunlin Institute of Industry

140

Applications of Clustering Technology in Information Science

1990.12.20

Department of Electrical Engineering, National Cheng Kung University

141

Information Security

1991.01.22

YMCA, Chia-Yi

142

Design of a Minimal Perfect Hashing Function

1991.02.11

Department of Computer Science and Engineering, The Chinese University of Hong Kong

143

Office Automation

1991.03.06

Computer Center, National Chung Cheng University

144

Computer Crime and Prevention

1991.04.20

Exhibition Center of Computer Science, National Science Council

145

Computers and Passwords

1991.06.14

Department of Electronic Engineering, National Taipei Institute of Technology

146

On File Systems

1991.09.21

Department of Computer Science and Information Engineering, National Cheng Kung University

147

Applications of Cryptography in Computer Security

1991.11.09

Department of Computer Science and Information Engineering, National Cheng Kung University

148

The Road to Success

1991.11.27

Tunghai University, Department of Computer Science Information Engineering

149

Design of Image Databases

1991.12.04

Department of Electrical Data Processing, National Taichung Institude of Commerce

150

Dynamic Secret Sharing

1992.01.10

Department of Applied Mathematics, National Sun Yat-sen University

151

Introduction to Computer Passwords

1992.02.21

Sieh-Chih  Industrial and Commercial Senior Vocational School

152

Key to Emerging

1992.03.11

Taiwan Provincial Wen-Hua Senior High School

153

Information Security

1992.04.14

Provincial Chang-Hua Senior School of Commerence

154

The Past, Present, and Future of Science and Technology Education

1992.04.16

National Chung Cheng University

155

Methodology

1992.05.14

Tunghai University, Department of Computer Science Information Engineering

156

Information Security

1992.05.18

Ta Tung Technological College of Commerce

157

Group Secret Strategies

1992.06.15

Computer Science and Engineering Research Center, National Sun Yat-sen University

158

Group Secret Techniques

1992.10.02

Department of Electrical Data Processing, National Taichung Institude of Commerce

159

Secret Sharing

1992.10.06

Department of Information and Computer Education, National Taiwan Normal University

160

Generalized Group Secret Cryptography

1992.10.07

National Security Bureau

161

Methodology

1992.10.22

Department of Information Management, Ming Chuan College

162

Methodology

1992.10.28

Department of Computer and Information Science, National Chiao Tung University

163

The Design of Computer Password

1992.11.18

Department of Computer Science and Engineering, National Sun Yat-sen University

164

Evolution and Applications of Mathematics

1992.11.23

Department of Mathematics, National Tsing Hua University

165

Data Compression

1992.11.24

Provincial Chang-Hua Senior School of Commerence

166

Developments of Contemporary Cryptology

1992.12.01

Taichung Home Economical and Commercial Senior Vocational School

167

Career Planning of Computer People

1992.12.07

Department of Computer Science and Information Engineering, National Chung Cheng University

168

A Secured Computer Center Management

1993.01.07

Taichung Home Economical and Commercial Senior Vocational School

169

A Secured Computer Center Management

1993.01.14

Taichung Home Economical and Commercial Senior Vocational School

170

A Secured Computer Center Management

1993.02.04

Taichung Home Economical and Commercial Senior Vocational School

171

A Secured Computer Center Management

1993.02.11

Taichung Home Economical and Commercial Senior Vocational School

172

Key to Emerging

1993.03.04

Department of Information Management, National Taiwan Institute of Technology

173

Chinese Retrieval and Searching

1993.03.24

Provincial Chang-Hua Senior School of Commerence

174

An Image Similar Retrieval Method Based on Modulo Arithmetics

1993.04.23

Workshop on Computer Applications Sponsored by National Chung Hsing University

175

Information Security

1993.05.04

Department of Information Science and Management, Providence University

176

Key to Emerging

1993.05.24

Chia-Yi Home Vocational School

177

Information Security

1993.06.02

Department of Budget, Accounting and Statistics, Taiwan Provincial Government, R.O.C.

178

A Master Key for an M3 Cryptoscheme

1993.06.08

Department of Electrical Engineering, National Defense University, Chung Cheng Institute of Technology

179

Introduction to Computer Passwords

1993.06.10

Taichung Home Economical and Commercial Senior Vocational School

180

Military Information Security

1993.09.07

National Defense Management College

181

Information Searching Techniques

1993.10.29

National Chung Cheng University

182

Evolution of Computer Cryptography

1993.11.18

Department of Computer Science and Information Engineering, National Chiao Tung University

183

Project Planning Information System Design

1993.11.23

Research, Development, and Evaluation Commission, Taiwan Provincial Government

184

Career Planning

1993.11.25

College of Engineering, National Chung Cheng University (for the students of Department of Business Education, National Changhua University of Education)

185

Information Security

1993.12.01

Provincial Training Center of Taiwan Provincial Government

186

Developments of Computer Cryptography

1993.12.08

National Defense University, Chung Cheng Institute of Technology

187

Information Security

1993.12.27

Provincial Training Center of Taiwan Provincial Government

188

Applications of Instruction Network and Information Security

1994.01.07

Szu-Yu Junior High School

189

Evaluation of Computer-Aided Instruction (CAI)

1994.01.17

Fooyin College of Nursing

190

Evolution of Contemporary Cryptography

1994.02.22

Chung-Shan Institute of Science and Technology

191

Project Planning Information System Design

1994.03.10

Research, Development, and Evaluation Commission, Taiwan Province

192

Group Secret Technology

1994.03.18

Department of Computer Science. and Information Engineering, National Taiwan University

193

Artificial Intelligence

1994.03.25

Tsau Ton Commercial and Technical Vocational School

194

Artificial Intelligence

1994.04.02

Center of Automated Engineering, Da-Yeh University

195

The Design of Computer Password

1994.04.13

Wu Feng Institute of Technology

196

Key to Emerging

1994.04.14

Rotary Club of Taichung East District

197

The Design of Computer Password

1994.04.30

National Central University

198

Introduction to Cryptanalysis

1994.05.06

Department of Applied Mathematics, Feng Chia University

199

Introduction to Cryptanalysis

1994.05.20

Department of Industrial Education, National Taiwan Normal University

200

Chinese Database Management Systems

1994.05.25

Training Center for High School Teachers

201

Efficient Information Retrieval

1994.08.03

Graduate Institute of Computer Science, National Chung Hsing University

202

Introduction to Cryptanalysis

1994.11.03

Department of Computer Science and Information Engineering, National Chiao Tung University

203

Information Security

1994.12.14

Department of Information Management, Chaoyang Institute of Technology

204

Information Security

1994.12.17

Computer and Information Network Center, National Chung Hsing University

205

Developments of Contemporary Cryptography

1995.03.03

Department of Computer Science and Engineering, National Sun Yat-Sen University

206

A Step to Information Society - Using Computers

1995.04.24

National Chung Cheng University

207

Image Compression Technology

1995.04.27

Department of Information Science and Management, Providence University

208

Technology and Our Life

1995.07.27

National Chiayi Senior Hight School

209

Information Security and Management

1995.08.06

Taiwan Regional Development Institute

210

Information Security

1995.11.03

Provincial Training Center of Taiwan Provincial Government

211

The Present and Prospect of Information Security

1995.11.09

Department of Applied Mathematics, National Chung Hsing University

212

Developments of Computer Cryptography

1995.12.20

Department of Computer Science and Information Engineering, National Dong Hwa University

213

Developments of Computer Cryptography

1995.12.28

Department of Computer and Information Science, National Chiao Tung University

214

Information Security

1996.04.19

Refining & Manufacturing Research Center of Chinese Petroleum Corp

215

Contemporary Cryptography

1996.05.03

Department of Computer Science and Information Engineering, National Cheng Kung University

216

Information Security

1996.06.06

National Changhua University of Education

217

Information Security

1996.08.14

Department of Computer Science and Engineering, National Sun Yat-Sen University

218

How to Share a Common Secret Document

1996.12.03

Department of Information Engineering, Feng Chia University

219

Efficient Join Operation of Time-domain Databases

1996.12.19

Department of Computer Science and Information Engineering, National Chiao Tung University

220

The Road to Success

1997.03.26

Department of Information Management, Chaoyang University of Technology

221

Efficient Join Operation of Time-domain Databases

1997.04.16

Department of Computer Science, National Tsing Hua University

222

Evolution of Information Security Technology

1997.05.07

National Defense University, Chung Cheng Institute of Technology

223

Information Security

1997.06.05

Department of Mathematics, Chung Yuan Christian University

224

Evolution of Information Security Technology

1997.07.11

National Defense Management College

225

The Present and Prospect of Information Education of Universities in Taiwan

1997.11.04

Beijing University of Posts and Telecommunications, People¡¦s Republic of China

226

Hot Issues of International Information Security Research - Theory, Techniques, and Market Trend

1997.11.04

Beijing University of Posts and Telecommunications, People¡¦s Republic of China

227

Secret Sharing

1997.11.05

Beijing University of Posts and Telecommunications, People¡¦s Republic of China

228

Fast Computation of Modulo Exponents

1997.11.05

Beijing University of Posts and Telecommunications, People¡¦s Republic of China

229

Digital Signatures

1997.11.06

Beijing University of Posts and Telecommunications, People¡¦s Republic of China

230

Image Hiding Technology

1997.11.06

Beijing University of Posts and Telecommunications, People¡¦s Republic of China

231

Applications of Chinese Remainder Theorem

1997.11.07

Beijing University of Posts and Telecommunications, People¡¦s Republic of China

232

Essential Qualities of a Successful Scientist

1997.11.07

Beijing University of Posts and Telecommunications, People¡¦s Republic of China