Introduction 簡介

2004年07月21日

 

首頁
Research  研究
開授課程
網路資源
指導的學生們
導師班學生
Introduction 簡介
Remembers
意見反應

 

黃心嘉 副教授

淡江大學資訊工程系

北縣淡水鎮英專路151
TEL:886-2-26215656 ext 2748

FAX:886-2-2620-9749
Email: sjhwang@mail.tku.edu.tw
http://mail.tku.edu.tw/sjhwang/

Hwang, Shin-Jia, Associate Professor
Department of Computer Science and Information Engineering,
TamKang University,
Tamsui, Taipei Hsien,251,Taiwan, R.O.C.
TEL: 886-2-26215656 ext 27
48

Fax: 886-2-26209749
E-mail:sjhwang@mail.tku.edu.tw
    http://mail.tku.edu.tw/sjhwang

bullet

Research Interesting: 應用密碼學[Apply Cryptography] & 資訊安全[Computer Security]

bullet

Vita

Hwang, Shin-Jia is the associate professor of Department of Computer Science and Information Engineering, Tamkang University, Tamsui, Taipei, Taiwan.    During the academic years of 1996-2001, he was on the faculty of the Department of Information Management at Chaoyang University of Technology, WuFeng, Taichung Country,  Taiwan.    He received his B.S. degree in information and computer engineering from Chung-Yuan Christian University, Chungli, Taiwan in 1987 and his MS degree in computer science and information engineering from National Chung Cheng University, Chiayi, Taiwan in 1992. He received his Ph.D. degree in computer and information science form National Chaio Tung University, Hsinchu, Taiwan.    His research interests include applied  cryptography, computer security and related issues.

bullet

Education

bullet

國立交通大學資訊科學研究所博士 1992年9月至1996年6月

bullet

國立中正大學資訊工程研究所碩士 1990年2月至1992年1月

bullet

私立中原大學資訊工程學系學士 1983年9月至1987年6月

bullet

Honor
bullet

2004年淡江大學92學年度優良導師

bullet

2003年淡江大學92學年度第一類研究獎勵

bullet

2000年碩士班學生許琪慧之碩士論文獲得第十四屆龍騰論文獎(資訊科技類)入選獎

bullet

2000年朝陽科技大學八十八學年度學術研究與建教合作績優獎

bullet

1999年行政院國家科學委員會八十八年度甲種研究獎勵

bullet

1999年朝陽科技大學八十七學年度論文研究佳作獎

bullet

1998年行政院國家科學委員會八十七年度甲種研究獎勵

bullet

1998年朝陽科技大學八十六學年度學術研究與建教合作績優獎

bullet

1992年於國立中正大學資訊工程所碩士班畢業時獲斐陶斐榮譽獎

bullet

Experiences

bullet

淡江大學資訊工程系副教授 2001年8月~迄今

bullet

朝陽科技大學資訊管理系副教授 1996年8月~2001年7月

bullet

國立交通大學資訊科學所助教 1992年9月~1995年6月

bullet

國立中正大學電算中心程式設計師 1992年2月~1992年7月

bullet

Publication list

International Journal Papers

[1]  Chang, C. C. and Hwang, S. J., "A Secure Broadcasting Scheme Based on Discrete Logarithms," Control and Computers, Vol. 20, No. 2, 1992, pp. 49-53.

[2]  Chang, C. C. and Hwang, S. J., "Using Smart Cards to Authenticate Remote Passwords," An International Journal: Computers & Mathematics with Applications, Vol. 26, No. 7, 1993, pp. 19-27. (SCI)

[3]  Chang, C. C., Hwang, S. J. and Buehrer, D. J., "New Concepts for Multiple Stack Systems: Born and Reborn," The Journal of Systems and Software, Vol. 27, pp. 45-54, 1994. (EI)

[4]  Hwang, S. J., Chang, C. C., and Yang, W. P., " Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation," PreProceeding of Cryptography: Policy and Algorithms Conference, Brisbane Australia, July 3-5, 1995, pp. 471-486, also published on Proceeding of Cryptography: Policy and Algorithms, Springer-Verlag, New York, 1996, pp. 215-227. (EI)

[5]  Hwang, S. J., Chang, C. C., and Yang, W. P., "Authentication Encryption Schemes with Message Linkage," Information Processing Letters, Vol.58, August, 1996, pp. 189-194. (SCI, EI)

[6]  Hwang, S. J., Chang, C. C., and Yang, W. P., "An Efficient Dynamic Threshold Scheme," IEICE Transactions on Information and Systems, Vol.E79-D, No. 7, July 1996, pp.936-942. (SCI, EI)

[7]  Hwang, S. J., Chang, C. C., and Yang, W. P., "Two Efficient Server-aided RSA Secret Computation Protocols Against Active Attacks," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E79-A, No. 9, September 1996, pp. 1504-1511. (SCI, EI)

[8]  Chang, C. C., and Hwang, S. J., ”A Simple Approach for Generating RSA Keys,” Information Processing Letters, Vol. 63, 1997, pp. 19-21. (SCI, EI)

[9]  Hwang, S. J., Chen, C. Y. and Chang, C. C., "An Encryption/ Multisignature Scheme with Specified Receiving Groups," Computer Systems: Science and Engineering, Vol. 2, 1998, pp. 109-112. (EI)

[10]Hwang, S. J., "Simple Improvements of Harn,s Digital Signature for Diffie-Hellman Public keys", Electronics Letters, Vol. 35, No. 22, 1999, pp.1942-1943. (SCI,EI)

[11]Hwang, S. J. and Chang, C. C., "A New Efficient Server-Aided RSA Secret Computation Protocol Against Active Attacks,” Proceedings of the Ninth National Conference on Information Security, Taichung, Taiwan, R.O.C., 1999, pp. 46-49, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No.3, March 2000, pp. 567-570. (NSC87-2213-E-324-002) (SCI, EI)

[12]Hwang, S. J., and Chen, Chiu-Chin, “A New Multi-Proxy Multi-Signature Scheme,” 2001 National Computer Symposium: Information Security, Taipei, Taiwan, R.O.C., Dec. 20-21, 2001, pp. F019-F026.  Also appear in Applied Mathematics and Computation. (SCI, EI)

[13]Hwang, S. J., and Chen, Chiu-Chin, “Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers,” 2002 Information Security Conference, Taichung, Taiwan, R.O.C., May 16-17, 2002, pp. 243-246. Also in Fundamental Informaticae, Vol. 53, No. 3, Nov. 2002, pp. 131-134.

[14] Hwang, Shin-Jia, and Li, En-Ti (李恩提), “Cryptanalysis of Shieh-Lin-Yang-Sun signature scheme,” IEEE Communications Letters, VOL. 7, Issue 4, April 2003 pp. 195-196. (SCI)

[15] Hwang, Shin-Jia, and Chen, Chiu-Chin (陳秋錦), “A New Multi-Proxy Multi-Signature Scheme,” 2001 National Computer Symposium: Information Security, Taipei, Taiwan, R.O.C., Dec. 20-21, 2001, pp. F019-F026, also in Applied Mathematics and Computation, Vol 147, Issue 1, 5 Jan. 2004, pp. 57-67. (SCI, EI)

[16] Hwang, Shin-Jia, Hwang, Min-Shiang (黃明祥), and Tzeng, Shiang-Feng (曾祥峰), “A New Digital Multisignature Scheme with Distinguished Signing Authorities,” Journal of Information Science and Engineering, Vol. 19, No. 5, Sep. 2003, pp. 881-887. (SCI)

[17]Hwang, Shin-Jia, and Lee, Yun-Hwa (李韻華), “Repairing ElGamal-like multi-signature schemes using self-certified public keys,” 2002 International Computer Symposium (ICS 2002): International Conference on Cryptography and Information Security, Hualien, Taiwan, R.O.C., Dec. 18-21, 2002, D6-5.  Also in Applied Mathematics and Computation, 2004. (SCI, EI)

[18]Hwang, Shin-Jia, “Improvement of Tseng et al’s authenticated encryption scheme,” to appear in Applied Mathematics and Computation, 2004. (SCI, EI)

[19]Hwang, Shin-Jia and Chan, Ching-Chung (詹景中), “Imrpovement of Li et al’s Generalization of Proxy Signature Schemes,” to appear in Computers and Security, 2004 (EI). Partial result “Cryanalysis of Li et al’s Generalization of Proxy Signature Schemes” also in 2003 National Computer Symposium, Taichung , Taiwan, R.O.C., Dec. 18-19, 2003, pp. 1321-1324.

[20]Sung, Hung-Min (孫宏民), Hsieh, Bin-Tsan (謝濱燦), and Hwang, Shin-Jia, “Secure Email Protocols Providing Perfect Forward Secrecy (具完美安全性之電子郵件通訊協定)”, 2000 Information Security Conference, Taiwan, R.O.C., 2000, pp.112-118.  Also in IEEE Communication Letters (SCI, EI).

Local Journal Papers

[1]  Chang, C. C., Diay, J. Y., Buehrer, D. J. and Hwang, S. J., "Sharing a Circular Storage for Multiple Stacks," Journal of the Chinese Institute of Engineers, Vol. 15, No. 2, 1992, pp. 115- 121. (EI)

[2]  Hwang, S. J., Chang, C. C., and Yang, W. P., "An Encryption/Signature Scheme with Low Message Expansion," Journal of the Chinese Institute of Engineers, Vol. 18, No. 4, 1995, pp. 591-595. (EI)

[3]  Hwang, S. J. and Shi, Chi-Hwai, "A Simple Multi-Proxy Signature Scheme," Communications of the CCISA, Vol. 8, No. 1, Dec. 2001, pp. 88-92.

[4]  Hwang, Shin-Jia, and Chen, Chiu-Chin (陳秋錦), “A New Proxy Multi-Signature Scheme,” The 2001 International Workshop on Cryptology and Network Security, Taipei, Taiwan, R.O.C., Sep. 26-28, 2001, pp. 199-204.  Also in Communication of IICM(中華民國資訊學會期刊), Vol. 6, No. 1, Mar. 2003, pp. 11-18.

 

International Conference Papers

[1]  Chang, C. C. and Hwang, S. J., "Cryptographic Authentication of Passwords," Proceedings 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan, R.O.C., Oct. 1-3, 1991, pp. 126-130. (EI)

 [2] Chang, C. C., Hwang, S. J. and Buehrer, D. J., "On the Design Databases for Concurrent Spatial Match Retrieval," Proceedings of International Conference on Information and Systems, AMSE 1991, Hangzhou, China, Oct. 1991, Vol. 2, pp. 1034- 1038.

 [3] Chang, C. C. and Hwang, S. J., "Sharing a Dynamic Secret," IEEE International Phoenix Conference on Computers and Communications, Wyndham Paradise Valley Resort Scottsdale, Arizona, USA, April 1-3, 1992.

 [4] 張真誠、黃仁俊及黃心嘉,英漢字典壓縮研究,” ICCIP’92, pp. 142-151

 [5] Hwang, S. J., Chang, C. C., and Yang, W. P., "A New Verification Mechanism on the Server-Aided Secret Computation Protocols for the Modular Exponentiation," 1994 International Computer Symposium, Hsinchu, Taiwan, R.O.C., Dec. 1994, pp. 445-450.

 [6] Hwang, S. J., Chang, C. C., and Yang, W. P., “The Key Distribution Protocol for Mobile Communication Systems with Untrusted Centers,” 1996 International Computer Symposium (ICS’96): International Conference on Cryptography and Information Security, Kaohsiung, Taiwan, R.O.C., Dec. 19-21, 1996, pp. 67-74.

 [7] Hwang, S. J. and Chang, C.-C., “Dynamic Secret Sharing Scheme with Cheater Detection,” Lecture Notes in Computer Science Proceeding of the 1996 1st Australasian Conference on Information Security and Privacy (ACISP’96), Jun 24-26 1996 v1172 1996 Wollongong,,, Aust, p. 48 CODEN: LNCSD9

 [8] Hwang, S. J. and Shi, Chi-Hwai,: “A Proxy Signature Scheme without Using One-way Hash Functions,” 2000 International Computer Symposium (ICS’2000): International Conference on Cryptography and Information Security, Chiayi, Taiwan, R.O.C., Dec., 2000, pp.60-64

 [9] Hwang, S. J., Shi, Chi-Hwai and Huang, Yu-Hui (黃鈺惠),“An Attack on Sun et al.’s Group Signature Scheme,” 2000 International Computer Symposium (ICS’2000): International Conference on Cryptography and Information Security, Chiayi, Taiwan, R.O.C., Dec., 2000, pp.39-42.

[10]Chang, C. C., Hwang, S. J., and Wu, W. B., “Improvements on Generalized Threshold Cryptosystems,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 265-268.

Local Conference Papers

[1]  Chang, Chin-Chen, Danie J. and Hwang S. J., “A Simple Secret key Distribution System”, 1995 Information Security Conference,

[2]  Chang, Chin-Chen, Hwang, S. J. and Hwang Ren-Jun, “A Digitized Signature Linkage Scheme”, 1996 Information Security Conference,

[3]  Hwang, S. J., Chang, C. C., and Yang, W. P., "A Time-Stamped Password Authentication System,” 1997 Information Security Conference, Taipei, Taiwan, R.O.C. , 1997, pp. 165-169.

[4]  Hwang, S. J., Chang, C. C., and Yang, W. P., "An Improved Authenticated Encryption Schemes,” 1997 Information Security Conference, Taipei, Taiwan, R.O.C., 1997, pp. 209-212. (NSC86-2621-E-324-002-T)

[5]  Hwang, S. J. and Shi, Chi-Hwai (許琪慧), "Specifiable Proxy Signature Schemes," 1999 National Computer Symposium, Taipei, Taiwan, R.O.C., Dec. 20-21, 1999, pp. C190-C197.

[6]   Hwang, S. J. and Shi, Chi-Hwai, "The Security Analysis of Two Authenticated Key Agreement Schemes," 2000 Information Security Conference,  Taiwan, R.O.C., 2000, pp.440-441.

[7]   Hwang, S. J. and Shi, Chi-Hwai, “A New ID-Based Public Key Cryptosystem,” 2001 Information Security Conference, Taiwan, R.O.C., 2001, pp.253-258.

[8]   Hwang, Shin-Jia and Li, En-Ti, “A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems,” 2004 Information Security Conference, Taipei, Taiwan, R.O.C., Jun. 10-11, 2004, pp. 345- 352.

Technical Report

[1] Hwang, S. J. and Shi, Chi-Hwai, "Specifiable Proxy Signature Schemes," Department of Information Management, CYUT, Technical Report CYUT-IM-TR-1999-002, Nov. 1999.

[2] Hwang, S. J. and Shi, Chi-Hwai, "The Security Analysis of Two Authenticated Key Agreement Schemes," Department of Information Management, CYUT, Technical Report CYUT-IM-TR-2000-013, 2000.

[3] Hwang, S. J. and Shi, Chi-Hwai, "A Simple Multi-Proxy Signature Scheme," Department of Information Management, CYUT, Technical Report CYUT-IM-TR-2000-014, 2000.

[4] Hwang, S. J., Shi, Chi-Hwai and Huang, Yu-Hui, "An Attack on Sun et al’s Group Signature Scheme," Department of Information Management, CYUT, Technical Report CYUT-IM-TR-2000-017, 2000.

[5] 黃心嘉與曾祥峰, "可在多家商店消費之小額付款系統(A New Micropayment System for Multiple Stores)," Department of Information Management, CYUT, Technical Report CYUT-IM-TR-2000-022, 2000.

 

首頁 | Research  研究 | 開授課程 | 網路資源 | 指導的學生們 | 導師班學生 | Introduction 簡介 | Remembers | 意見反應

上次更新此站台的日期: 2004年07月21日