Jump to the main content block

Department of Information Management

English

Recent

Loading...

Wen-Gong Shieh (謝文恭)

Name & Title

Wen-Gong Shieh (謝文恭)

Professor

謝文恭

商學院資訊管理學系教授

 

Experience

中國文化大學商學院資訊管理學系    教授

Publications

Periodical Papers

107  The weaknesses and light improvement of Choi et al.'s anonymous multi-server authenticated key agreement scheme using smart cards and biometric,ICIC Express LettersVol.12 No.2175-182 2018/02/01 ( )

106  An Improved User Biometric-based Multi-server Authenticated Key Agreement Scheme Using Smart Cards,ICIC Express LettersVol.11 No.121749-1756 2017/12/01 ( )

106  A new scheme of remote user authentication using smart cards,ICIC Express LettersVol.11 No.159-64 2017/01/01 ( EI )

105  The weaknesses of Karuppiah et al.'s remote user mutual authentication scheme using smart card,ICIC Express LettersVol.10 No.122817-2822 2016/12/01 ( EI )

104  Improvement of chen et al.’s fingerprint biometric remote authentication scheme,ICIC Express LettersVol.9 No.61571-1575 2015/06/01 ( EI )

103  On the security of yoon and yoo's biometrics remote user authentication scheme,WSEAS Transactions on Information Science and ApplicationsVol.11, 201494-103 2014/07/01 ( EI )

102  Cryptanalysis of yeh et al.'s security-enhanced remote user authentication scheme with smart cards,Journal of Applied Science and EngineeringVol. 16 No. 3319-328 2013/09/01 ( EI )

102  A security and efficiency improvement of Chung et al.'s remote authentication scheme for resource-limited environments,Journal of Convergence Information TechnologyVol.8 No.2795-803 2013/01/31 ( EI )

102  Attacks to Li et al.’s Billing Service User Authentication Scheme,Applied Mechanics and MaterialsVol. 268 No. PART 11762-1767 2013/01/01 ( EI )

101  FURTHER CRYPTANALYSIS OF HUANG-WEI’S EFFICIENT REMOTE USER AUTHENTICATION SCHEME WITH SMART CARDS,ICIC Express LettersVol.6 No.82051-2056 2012/08/01 ( EI )

100  Cryptanalysis and improvement of Wen et al.S provably secure authentication key exchange protocols for low power computing devices,ICIC Express LettersVol.5 No.114027-4032 2011/11/01 ( EI )

99    Security analysis and improvement of the remote user authentication scheme without using smart cards,ICIC Express LettersVol.4 No.6B6/2431-2436 2010/12/01 ( EI )

99    An improvement on Li and Hwang's biometrics-based remote user authentication scheme ,ICIC Express LettersVol.4 No.5B5/2021-2025 2010/10/01 ( EI )

98    An improvement to Kim-Chung's authentication scheme,ICIC Express LettersVol.3 No.41215-1219 2009/12/01 ( EI )

97    A Cost Effective Mutual Authentication Scheme with Key Agreement using Smart Cards,International Journal of Information and Management SciencesVol.19 No.4571-587 2008/12/01 ( EI )

97    可保隱私供應鏈RFID協定之改良,多國籍企業管理評論第2卷第185-93 2008/03/03 ( )

96    An Improvement of Liaw-Lin-Wu's Efficient and Complete Remote Mutual Authentication with Smart Cards,WSEAS Transactions on Information Science and ApplicationsVol.4 No.61200-1205 2007/06/01 ( EI )

96    An Efficient Authentication Scheme with Revocation Capability,WSEAS Transactions on Information Science and ApplicationsVol.4 No.61263-1268 2007/06/01 ( EI )

96    A Security and Efficiency Improvement to Chen and Yeh's Nonce-based Authentication Scheme,WSEAS Transactions on Information Science and ApplicationsVol.4 No.4713-718 2007/04/01 ( EI )

96    An Improvement on Lee et al.'s Nonce-based Authentication Scheme,WSEAS Transactions on Information Science and ApplicationsVol.4 No.4832-835 2007/04/01 ( EI )

95    A Mutual Authentication Scheme Protecting User’s Anonymity Using Smart Card,WSEAS Transactions on Information Science and ApplicationsVol. 3, No. 66 / 1072-1077 2006/06/01 ( EI )

95    The Weakness of Efficient Nonce–Based Remote User Authentication Scheme Using Smart Cards,WSEAS Transactions on Information Science and ApplicationsVol. 3, No. 34 / 584-587 2006/03/01 ( EI )

95    Efficient remote mutual authentication and key agreement,Computers and SecurityVol. 25, No. 16 / 72-77 2006/02/01 ( SCI )

95    Security of efficient password authenticated key agreement using smart cards,WSEAS Transactions on Information Science and Applications Vol. 3, No. 15 / 187-191 2006/01/01 ( EI )

94    Security of Lee et al.'s Remote Authentication Model of Information Appliances,WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONSIssue 4, Vol. 2343-348 2005/04/01 ( EI )

Conference Papers

106  The weaknesses and light improvement of Choi et al.'s anonymous multi-server authenticated key agreement scheme using smart cards and biometric,12th International Conference on Innovative Computing, Information and Control (ICICIC2017) 2017/08/28 ( )

105  空間資訊網路上輕量級自我更新策略認證機制之安全漏洞探討,KC2016 第十二屆知識社群國際研討會551-563 2016/05/27 ( EI )

105  Islam 等人行動裝置之認證機制的安全漏洞探討,KC2016 第十二屆知識社群國際研討會173-183 2016/05/27 ( EI )

104  Lin HY 行動動態式身份識別認證機制之安全漏洞探討,2015 第十一屆知識社群國際研討會577-585 2015/05/30 ( )

104  Islam 遠端認證機制之安全漏洞分析,2015 第十一屆知識社群國際研討會621-627 2015/05/30 ( )

102  具時效性的無線感測網路相互認證金鑰 協定之安全缺漏,2013 資訊安全技術創新應用研討會1 -5 2013/12/20 ( )

102  以多項式為基礎的智慧卡認證協議之安全缺漏,2013 資訊安全技術創新應用研討會35-38 2013/12/20 ( )

101  Weaknesses of Hsieh-Leu Remote User Authentication Scheme Using Smart Card,2012 資訊安全技術創新應用研討會169-173 2012/12/28 ( )

101  Attacks to Ramasamy et al.s Password Authentication Scheme,2012第十一屆北商學術論壇-資訊管理與實務研討會108-111 2012/11/23 ( )

101  符合EPC第二代第一類RFID安全協定之探討與改良,KC2012第八屆知識社群國際研討會480-487 2012/06/08 ( )

100  Vaidya 等人家庭網路智慧卡安全機制之安全漏洞,2011 資訊安全技術創新應用研討會88-92 2011/12/23 ( EI )

100  Khan等人遠端認證機制之安全漏洞,2011 第七屆知識社群研討會 1-6 2011/05/28 ( )

99    RFID 所有權轉移認證系統之安全漏洞,2010 資訊安全技術創新應用研討會4/108-111 2010/12/24 ( )

99    Chen 等人遠端認證機制之缺漏與改善建議,2010 資訊安全技術創新應用研討會5/236-240 2010/12/24 ( )

99    Yen等人RFID安全協定之漏洞與改良,第十一屆產業資訊管理學術暨新興科技實務研討會(IMNT2010)7/1-7 2010/11/13 ( )

99    Cryptanalysis on Sun-Yeh's password-based authentication and key distribution protocols with perfect,2nd International Conference on Computational Collective Intelligence - Technologies and Applications, ICCCI 2010 (Lecture Notes in Computer Science )Vol. 6422 LNAI, No. PART 29/95-103 2010/11/10 ( EI )

99    Weaknesses of Wen et al.’s Provably Secure Authenticated Key Exchange Protocols for Low Power Compu,Seventh International Symposium on Management Engineering 2010 (ISME2010) 7/102-108 2010/08/26 ( )

99    具前推私密性之簡訊安全通訊協定,2010 第六屆知識社群研討會9/1-9 2010/05/29 ( )

98    使用雜湊函數遠端身分鑑別協定之安全漏洞與改良,2009資訊管理學術與實務研討會880-885 2009/05/26 ( )

97    Secure Remote Control Model for Information Appliances,2008 IEEE International Conference on Intelligence and Security Informatics222-224 2008/06/20 ( )

97    Efficient and Complete Remote Authentication Scheme with Smart Cards,2008 IEEE International Conference on Intelligence and Security Informatics122-127 2008/06/19 ( )

97    A New Parallel Session Attack to Khan-Zhang’s Authentication Scheme,Third International Conference on Innovative Computing, Information and Control1-4 2008/06/18 ( )

97    使用隨機亂數RFID隱私保護機制之安全漏洞與改良,2008知識社群與系統發展研討會1-5 2008/05/23 ( )

97    無線區域網路SEWTP協定之安全漏洞與改良,2008 知識社群與系統發展研討會1-7 2008/05/23 ( )

96    行動通訊UMTS X-AKA 協定安全漏洞與改良方案,2007資訊技術與產業應用研討會149-153 2007/06/08 ( )

96    Wang等人遠端認證機制之安全漏洞與改良,2007知識社群與資訊安全研討會303-308 2007/05/16 ( )

96    利用智慧卡與生物特徵改良雙向遠端使用者認證機制,2007知識社群與資訊安全研討會497-505 2007/05/16 ( )

95    Secure Mobile Communication for MNE,第八屆多國籍企業國際學術研討會7 / 786-792 2006/03/15 ( )

94    動態密碼(OTP)應用於自動櫃員機(ATM)之研究,2005 學習型知識社群與電子商務實務研討會6 2005/05/25 ( )

94    軟體對抗病毒自我防衛技術之建置工具,2005 學習型知識社群與電子商務實務研討會7 2005/05/25 ( )

94    惡意程式對抗新構想-安裝後多型軟體版本機制,2005 學習型知識社群與電子商務實務研討會 2005/05/25 ( )

93    軟體對抗病毒自我防衛技術之實作,第十屆資訊管理暨實務研討會482-496 2004/12/18 ( )

92    家庭網路簡易雙向認證監控機制,2003創新資訊科技政策與數位社會國際學術研討會101-117 2003/11/14 ( )

92    Intelligent Automatic Malicious Code Signatures Extraction,37th Annual 2003 International Carnahan Conference on Security Technology600-603 2003/10/16 ( EI )

92    A Robust Method for Software Self-defense,37th Annual 2003 International Carnahan Conference on Security Technology595-599 2003/10/16 ( EI )

 

 

 

Click Num  
Forward to friend
Please input CAPTCHA