研究發表


(1)SCI期刊論文
  1. Yu-Yi Chen, Yih-Jiun Lee, Kai-Wen Lien, Tzu-Yi Chen, Customized Panorama System for Wayfinding and Walkthrough, Journal of Internet Technology (ISSN: 1607-9264), Vol 20, No 5, pp.1649-1656, Sep. 2019. [SCIE (2018 Impact factor=0.715, COMPUTER SCIENCE, INFORMATION SYSTEMS, Rank=142/155)] 
  2. Der-Chen Huang, Ying-Yi Chu, Yuan-Kwei Tzeng, Yu-Yi Chen, Wei-Ming Chen, Secure Routing for WSN-Based Tactical-Level Intelligent Transportation Systems, Journal of Internet Technology (ISSN: 1607-9264), Vol 20, No 4, pp.1013-1026, July 2019. [SCIE (2018 Impact factor=0.715COMPUTER SCIENCE, INFORMATION SYSTEMS, Rank=142/155)] 
  3. Meng-Lin Tsai and Yu-Yi Chen, A Novel Group Ownership Proof and Transfer Scheme for B2B, B2C and C2C Transactions, International Journal of Ad Hoc and Ubiquitous Computing (ISSN: 1743-8225), Volume 29, Issue 1-2, 2018. [SCIE (2018 Impact factor=0.560, COMPUTER SCIENCE, INFORMATION SYSTEMS, Rank=149/155)] [H-INDEX]
  4. Yu-Yi Chen, Meng-Lin Tsai, Fong-Jia Chang, The Design of Secure Mobile Coupon Mechanism with the Implementation for NFC Smartphones, Computers & Electrical Engineering (ISSN: 0045-7906), Vol 59, pp.204-217, April 2017. [SCIE (2017 Impact factor=1.747, COMPUTER SCIENCE, HARDWARE & ARCHITECTURE, Rank=20/52)] [H-INDEX] 
  5. Yu-Yi Chen, Chuan-Chiang Huang, Jinn-Ke Jan, The Design of AATIS Emergency Access Authorization for Personally Controlled Online Health Records, Journal of Medical and Biological Engineering (ISSN: 1609-0985), Vol. 35, Issue 6, pp 765-774, Dec 2015. [SCIE (2015 Impact factor=1.018, ENGINEERING, BIOMEDICAL, Rank=55/76)] [H-INDEX]
  6. Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, The Design of Conditional Access Mechanism for Ubiquitous Video on Demand Services, Security and Communication Networks (ISSN: 1939-0114), Vol.7, Issue 12, pp.2587–2595, Dec. 2014. [SCIE (2014 Impact factor=0.720, TELECOMMUNICATIONS, Rank=54/77)]
  7. Yu-Yi ChenYao-Jen Wang, Jinn-Ke Jan, A Novel Deployment of Smart Cold Chain System using 2G-RFID-Sys, Journal of Food Engineering (ISSN: 0260-8774), Vol.141, pp.113-121, Nov 2014. [SCIE (2014 Impact factor=2.771, FOOD SCIENCE & TECHNOLOGY, Rank=19/123)] [H-INDEX]
  8. Chin-Ling Chen, Yu-Yi Chen, Cheng-Chi Lee, Cheng-Hsun Wu, Design and Analysis of A Secure and Effective Emergency System for Mountaineering Events, Journal of Supercomputing (ISSN: 0920-8542), Vol.70, Issue 1, pp.54-74, Oct. 2014.  [SCIE (2014 Impact factor:0.858, COMPUTER SCIENCE, THEORY & METHODS, Rank=56/102)] [H-INDEX]
  9. Chin-Ling Chen, Yu-Yi Chen, Jinn-Ke Jan, Chih-Cheng Chen, A Secure Anonymous E-Voting System Based on Discrete Logarithm Problem, Applied Mathematics & Information Sciences (ISSN: 2325-0399) , Vol. 8, No.5, pp.2571-2578, Sep. 2014. [SCIE (2013 Impact factor=1.232, MATHEMATICS, APPLIED, Rank=53/251)] [H-INDEX]
  10. Chin-Ling Chen, Woei-Jiunn Tsaur, Yu-Yi Chen, Yao-Chung Chang, A Secure Mobile DRM System Based on Cloud Architecture, Computer Science and Information Systems (ISSN: 1820-0214), Vol.11, Issue 3, pp.925-941, Aug 2014. [SCIE (2014 Impact factor=0.477, COMPUTER SCIENCE, SOFTWARE ENGINEERING, Rank=87/104)] [H-INDEX]
  11. Yu-Yi Chen, A Design of IPTV Conditional Access Mechanism based on P2P Network, Peer-to-Peer Networking and Applications (ISSN: 1936-6442), Vol. 7, Issue 1, pp 24-30, March 2014. [SCIE (2014 Impact factor=0.632, TELECOMMUNICATIONS, Rank=61/77)] [H-INDEX]
  12. Yu-Yi Chen and Meng-Lin Tsai, An RFID Solution for Enhancing Inpatient Medication Safety with Real-Time Verifiable Grouping-Proof, International Journal of Medical Informatics (ISSN: 1386-5056), Vol. 83, Issue 1, pp.70-81, January 2014. [SCIE (2014 Impact factor=2.004, COMPUTER SCIENCE, INFORMATION SYSTEMS, Rank=24/138)] [H-INDEX]
  13. Chin-Ling Chen, Wei-Chen Tsai, Yu-Yi Chen*, Woei-Jiunn Tsaur, Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET, Information Technology and Control (ISSN: 1392-124X), Vol.42, No. 4, pp.369-379, Dec. 2013. [SCI Expanded (2013 IF=0.813, Computer Science, Information Systems, Rank=86/135)] [H-INDEX]
  14. Yu-Yi Chen, Yao-Jen Wang, Jinn-Ke Jan, The Design of Speedy Seamless Safe Messaging Mechanism in VANET, International Journal of Computer Mathematics (ISSN: 0020-7160), Vol.90, Issue 12, pp. 2614-2630, July 2013. [SCI Expanded (2013 Impact factor=0.721, Mathematics, Applied, Rank=129/251)]
  15. Yu-Yi Chen, Yao-Jen Wang, Jinn-Ke Jan, A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System, Journal of Medical Systems (ISSN:0148-5598), Vol.37, Issue 3, Article:9940, June 2013. [SCI Expanded (2013 Impact factor=1.372, Medical Informatics, Rank=13/24)]
  16. Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan, A Secure EHR System based on Hybrid Clouds, Journal of Medical Systems (ISSN:0148-5598), Vol.36, Issue 5, pp 3375-3384, October 2012. [SCI Expanded (2012 Impact factor=1.783, Medical Informatics, Rank=11/23)] [H-INDEX
  17. Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, Jinn-Ke Jan, A Design of Tamper Resistant Prescription RFID Access Control System, Journal of Medical Systems (ISSN:0148-5598), Vol.36, Issue 5, pp 2795-2801, October 2012. [SCI Expanded (2012 Impact factor=1.783, Medical Informatics, Rank=11/23)] [H-INDEX]
  18. Yu Yi Chen, Jinn Ke Jan, Meng Lin Tsai, Chun Ching Ku, Der Chen Huang, On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management, KSII Transactions on Internet and Information Systems (ISSN: 1976-7277), Vol.6, No.2, pp.515-528, Feb. 2012. [SCI Expanded (2012 Impact factor=0.560, Telecommunications, Rank=54/78)] [H-INDEX] (NSC 99-2221-E-005-118)
  19. Yu-Yi Chen, Meng-Lin Tsai, Jinn-Ke Jan, The Design of RFID Access Control Protocol using the Strategy of Indefinite-Index and Challenge-Response, Computer Communications (ISSN:0140-3664), Vol.34 Issue 3, pp.250-256, March 2011. [SCI Expanded (2011 Impact factor=1.044, Telecommunications, Rank=35/79)] [H-INDEX
  20. Chin-Ling Chen and Yu-Yi Chen, A Non-repudiated Self-service Store System Based on Portable Trusted Device, Wireless Personal Communications (ISSN: 0929-6212), Vol.49, No.4, pp.475-485, Jun 2009. [SCI Expanded (2009 Impact factor=0.418, Telecommunications, Rank=49/77)] [EI] (NSC 95-2221-E-324-025)
  21. Chin-Ling Chen, Yu-Yi Chen, Yi-Hwa Chen, Group-based Authentication to Protect Digital Content for Business Applications, International Journal of Innovative Computing, Information and Control (IJICIC) (ISSN: 1349-4198), Vol.5, No.5, pp.1243-1251, May 2009. [SCI  Expanded (2009 Impact factor=2.932, Automation & Control Systems, Rank=3/59)] [H-INDEX] (NSC 97-2221-E-324 -013)
  22. Yu-Yi Chen, Chin-Ling Chen, Jinn-Ke Jan, A Mobile Ticket System Based on Personal Trusted Device, Wireless Personal Communications (ISSN: 0929-6212), Vol.40, No.4, pp.569-578, March 2007. [SCI Expanded (2007 Impact factor=0.230, Telecommunications, Rank=47/66)] [EI] [H-INDEX] (NSC-94-2213-E-324-028)
  23. Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, A Fair and Secure Mobile Billing System, Computer Networks (ISSN:1389-1286), Vol.48, No.4, pp.517-524, July 2005. [SCI (2005 Impact factor=0.978, Telecommunications, Rank=17/59)] [EI] [H-INDEX]
  24. Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, Design of a Fair Proxy Raffle Protocol on the Internet, Computer Standards & Interfaces (ISSN: 0920-5489), Vol.27, No.4, pp.415-422, April 2005. [SCI (2005 Impact factor=0.620, Computer Science, Software Engineering, Rank=48/79)] [EI] [H-INDEX]
  25. Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, A Novel Proxy Deposit Protocol for E-Cash Systems, Applied Mathematics and Computation (ISSN: 0096-3003), Vol.163, No.2, pp.869-877, April 2005. [SCI (2005 Impact factor =0.688, Mathematics, Rank=66/151)] [EI] [H-INDEX]
  26. Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, The Design of a Secure Anonymous Internet Voting System,Computers & Security (ISSN: 0167-4048), Vol. 23, No. 4, pp.330-337, June 2004. [SCI (2004 Impact factor =0.412, Computer Science, Information Systems, Rank=59/78)] [EI] [H-INDEX
  27. Jinn-Ke Jan, Yu-Yi Chen, A Secure Anonymous Voting Protocol with a Complete Supervision, International Journal of Computer Systems Science & Engineering, Vol.17, No.4, pp.211-219, July 2002. [SCI (2002 Impact factor =0.333, Computer Science, Hardware & Architecture, Rank=35/46)]  [EI] (NSC95-2221-E- 005-021)
  28. Jinn-Ke Jan, Yu-Yi Chen, "Paramita wisdom" password authentication scheme without verification tables, Journal of Systems and Software, Vol.42, Issue.1, pp.45-57, July 1998. [SCI Expanded (1999 Impact factor =0.237, Computer Science, Software, Graphics, Programming, Rank=53/67))] [H-INDEX] 

(2)系所認可之期刊論文(EI期刊論文)
  1. Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan, A Novel Design of Authentication-as-a-Services (AaaS) Architecture in Cloud Computing, Journal of Computers (ISSN: 1991-1599), Vol. 24, No. 3, pp.19-25, October 2013. [EI]
  2. Chin-Ling Chen, Yu-Yi Chen, Tsungm-Min Kuo, Kuo-Ching Chiou, Yong-Yuan Deng, Design of an RFID On-line Authentication and Anti-counterfeit Transaction Protocol, International Journal of RF Technologies: Research and Applications (ISSN: 1754-5730), Vol.4, No.1, pp.37-53, December 2012. [EI]
  3. Yu-Yi Chen, Meng-Lin Tsai, Yu-Tan Chen, Jinn-Ke Jan, A Tagged-Product Ownership Transfer Mechanism used in Retailer and Second-Hand Transaction, International Journal of Radio Frequency Identification Technology and Applications (ISSN: 1745-3216), Vol.3, Issue 1/2, pp.47-53, April 2011. [EI]
  4. Yu-Yi Chen, Jinn-Ke Jan, Der-Chen Huang, Yi-Cheng Wei, A Design of Lightweight RFID Anti-Counterfeiting Mechanism, Journal of Computers (ISSN:1991-1599), Vol.20, No.2, pp.16-22, July 2009. [EI] (經濟部98-EC-17-A- 29-S2- 0033)
  5. Chin-Ling Chen, Yu-Yi Chen, Yu-Cheng Huang, Chen-Shen Liu, Chia-I Lin, Tzay-Farn Shih, Anti-counterfeit Ownership Transfer Protocol for Low Cost RFID System, WSEAS Transactions on Computers (ISSN: 1109-2750), Vol. 7, Issue 8, pp.1149-1158, Aug. 2008. [EI] [H-INDEX] (NSC97-2221-E-005-053)
  6. Chin-Ling Chen, Yu-Yi Chen, Jinn-Ke Jan, A Secure Authentication Scheme for a Public Terminal Before a Transaction, Network-Based Information Systems (ISSN:0302-9743), Lecture Notes in Computer Science, Vol.4658, pp.118-126, Aug. 2007. [EI] (NSC95-2221-E-005-021)

(3)國際會議論文
  1. Der-Chen Huang, Ying-Yi Chu, Yu-Yi Chen, Chun-Fang Hsiao, Chi-Hung Hwang, A Failure Predication Method of Power System by Using MACD and TRIX. IEEE I2MTC – International Instrumentation and Measurement Technology Conference (I2MTC 2018), Houston, Texas, USA, May 2018.
  2. Yu-Yi Chen, Chuan-Chiang Huang, Jinn-Ke Jan, The Design of Secure Group Communication with Contributory Group Key Agreement Based on Mobile Ad Hoc Network, 2016 International Symposium on Computer, Consumer and Control (IS3C), Xi'an, China, July 2016.
  3. Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan, A Multi-Servers Remote User Authentication Scheme using a Smarter Smart Card, The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), pp.33-42, Kuala Lumpur, Malaysia, March 4-6, 2013.
  4. Yu-Yi Chen and Wei Hsuan Lo, A Mobile Application Design for Interpersonal Network Management, 2013 International Congress on Social Sciences and Business (2013 ICSSB), Taipei, Taiwan, Jan 8-10, 2013.
  5. Yu-Yi Chen and Ching Yi Hu, The Design of Indoor-navigation based Real-time Promotion Mobile Application, 2013 International Congress on Social Sciences and Business (2013 ICSSB), Taipei, Taiwan, Jan 8-10, 2013.
  6. Yu-Yi Chen and Tzu-Hsuan Huang, A Conditional-Anonymous Reviews Retrieval Mechanism Based on Social Networks, 2012 International Conference on Advanced Information Technologies (AIT 2012), Taichung, Taiwan, April 27-28, 2012. 
  7. Jun-Chao Lu, Yu-Yi Chen*, Jing-Min Wang, Jinn-Ke Jan, Chih-Cheng Chen, Yeong-Lin Lai, Study and Implementation of RFID Eseals for Power Meters, Proceedings of the 2011 2nd International Conference on Innovations in Bio-inspired Computing and Applications (IBICA 2011), pp.352-355, Shenzhen, China, Dec 16-18, 2011. [EI]
  8. Yu-Yi Chen, Zhen-Jie Qiu, Jun-Chao Lu, Jinn-Ke Jan, A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping, Proceedings of the 2011 International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), Barcelona, Spain, pp.405-410, Oct 26-28, 2011. [EI]
  9. Jun-Chao Lu, Yu-Yi Chen, Jinn-Ke Jan, A Secure Negotiable On-demand Services Model for Cloud Environment, EUROCON - IEEE International Conference on Computer as a Tool (EUROCON 2011), pp.1-4, Lisbon, Portugal, April 27-29, 2011. [EI]
  10. Yu-Yi Chen, Jun-Chao Lu, Chih-Chiang Lin, Jinn-Ke Jan, Der-Chen Huang, A Novel Metropolitan Area Network Service Model with Free Use and Privacy Protection, International Computer Symposium (ICS2010), Tainan, Taiwan, pp.376-380, Dec 16-18, 2010. [EI]
  11. Jun-Chao Lu, Yu-Yi Chen, Shin-I Chen, and Jinn-Ke Jan, A Low-Cost RFID Authentication Protocol with Location Privacy Protection, 5th International Conference on Information Assurance and Security (IAS'09), Xi’an, China, August 18-20, 2009. [EI] (經濟部98-EC-17-A-29-S2-0033)
  12. Yu-Yi Chen, Jinn-Ke Jan, Yo-Yu Chi, Meng-Lin Tsai, A Feasible DRM Mechanism for BT-like P2P System, International Conference on e-Business and Information System Security (EBISS 2009), Wuhan, China, May 23-24, 2009. [EI] (NSC95-2221-E-005-045-MY2)
  13. Yu-Yi Chen, Yao-Jen Wang, Cheng-Jie Chen, A Fair-use DRM System based on Web Service, 8th International Conference on Intelligent System Design and Applications (ISDA 2008), Kaohsiung, Taiwan, November 26-28, 2008. [EI] (NSC95-2221-E-005-045-MY2)
  14. Yu-Yi Chen, Jun-Chao Lui, Shin-I Chen, A Customer Privacy Protection Protocol on Agent-based Electronic Commerce Transaction, 8th International Conference on Intelligent System Design and Applications (ISDA 2008), Kaohsiung, Taiwan, November 26-28, 2008. [EI]
  15. Chin-Ling Chen, Yu-Cheng Huang, Yu-Yi Chen, Chen-Shen Liu, Chia-I Lin, Tzay-Farn Shih, With Anti-counterfeit Ownership Transfer for RFID System, 6th WSEAS International Conference on Applied Electromagnetics, Wireless and Optical Communications (ELECTROSCIENCE’08) (ISSN: 1790-5117), Trondheim, Norway, pp.78-82, July 2-4, 2008. (NSC97-2221- E-005-053)
  16. Chin-Ling Chen, Hung-Yi Lin, Yu-Yi Chen, Jinn-Ke Jan, A Fair Transaction Model in Mobile Commerce, The 6th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2006), Vancouver, Canada, pp.484-489, August 27-30, 2006. [EI] (NSC95- 2213-E-324-025)
  17. Jinn-Ke Jan, Yu-Yi Chen, Chin-Ling Chen, A Novel Method to Authenticate a Public Terminal (Kiosk) before a Transaction, Proceedings of the International Conference on Information Technology: Prospects and Challenges in the 21st Century, Kathmandu, Nepal, May 23 - 26, 2003.
  18. Jinn-Ke Jan, Yu-Yi Chen, Chin-Ling Chen, A Realistic Secure Anonymous E-Voting Protocol based on the ElGamal Scheme, Proceedings of the International Conference on Communications & Broadband Networking, Bangalore, INDIA, pp.(Sect III)1-9, May 2003.
  19. Jinn-Ke Jan, Yu-Yi Chen, Yi Lin, The Design of Protocol for e-Voting on the Internet, Proceedings of the IEEE International Carnahan Conference on Security Technology, London, England, pp.180-189, Oct. 2001.

(4) 國內會議論文
  1. 陳育毅、傅思允、洪承榆, 以Google Apps Script快速佈建個資檔案去識別化服務, TANET 2018臺灣網際網路研討會, 2018. (佳作論文獎)
  2. 張雅嵐、楊崇誠、呂仲聖、張延任、陳育毅, 兼具即時及交談性之台中區網流量異常告警服務, TANET 2018臺灣網際網路研討會, 2018.
  3. 陳育毅、林煒傑, 教育機構資安驗證稽核人員能力養成及評估系統之探討, TANET 2018臺灣網際網路研討會, 2018.
  4. 劉孟坤、林中義、張延任、陳育毅, 移動影像感知結合手機通訊軟體即時推播監視系統-以臺中區網中心機房應用為例, TANET 2018臺灣網際網路研討會, 2018.
  5. 陳育毅、張芸瑄、蔡宜霖, 利用Google表單蒐集個人資料之安全管理機制, TANET 2017臺灣網際網路研討會, 2017.
  6. 陳仕豪、楊崇誠、葉宏、呂仲聖、劉孟坤、張延任、陳育毅, 使用LINE機器人(LINE BOT)之自動即時資安通報系統設計, TANET 2017臺灣網際網路研討會, 2017.
  7. 張雅嵐、陳仕豪、楊崇誠、呂仲聖、劉孟坤、林中義、張延任、陳育毅, 響應式網路氣象台結合LINE自動告警機制-以台中區網為例, TANET 2017臺灣網際網路研討會, 2017.
  8. 吳欣蒨、張雅婷、吳賢明、陳育毅, 兼具分流、容錯及安全防護的分散式DNS 建置-以國立中興大學為例, TANET 2016臺灣網際網路研討會, pp.100-105, Nov 1, 2016.
  9. 劉孟坤、呂仲聖、陳仕豪、楊崇誠、張雅嵐、張延任、陳育毅, 建置虛擬桌面基礎架構(VDI)最佳資源配置及節能效率之探討, TANET 2016臺灣網際網路研討會, pp.691-696, Nov 1, 2016.
  10. 陳育毅、劉柏伸、蔡孟琳、詹進科, 結合RFID系統之全新線上多媒體影音租賃系統, TANET 2011臺灣網際網路研討會, Oct 24-26, 2011. (NSC 99-2221-E-005-11)
  11. 陳育毅、許肇基、呂俊超、詹進科, 有線式RFID 搜尋機制之安全設計, TANET 2011臺灣網際網路研討會, Oct 24-26, 2011.
  12. 許志義、陳育毅、王京明、史印芝、林子靖, 行銷通路3.0雲端平台商業模式及其市場接受度之調查分析, 第8屆新世紀優質企業理念與價值創造研討會(競爭力的提升:創新與企業創業), Nov 20, 2010.
  13. 陳育毅、詹進科、呂俊超、邱振傑, “適用於大賣場購物行為及售後服務之RFID安全機制設計”, 2010第六屆知識社群研討會, May 29, 2010.
  14. 陳育毅、詹進科、許肇基, 離線式RFID搜尋機制之安全設計, 2010第六屆知識社群研討會, May 29, 2010. (最佳論文獎)
  15. 陳育毅、詹進科、顧純菁, RFID於零售業存貨管理之安全監控應用系統–TRP的問題與改良設計, 2009 National Computer Symposium(全國計算機會議) - Workshop on Cryptography and Information Security, Nov 27-28, 2009. (優良論文獎)
  16. 陳育毅、詹進科、顧純菁, RFID於零售業存貨管理之安全監控應用系統, 2009資訊管理與數位內容研討會, Nov 20, 2009.
  17. 葉俞晨、陳育毅、許志義, 以T-Plan策略技術藍圖探討台灣數位家庭的未來發展, 2009電子商務與數位生活研討會(Conference on e-Commerce and Digital Life 2009), pp.14-27, March 14, 2009.
  18. 蔡孟琳、陳育毅、詹進科、黃德成, 適用於P2P系統架構之網路電視服務的條件式接取機制, 第十四屆資訊管理暨實務研討會, Dec 13, 2008.
  19. 葉俞晨、林子欽、蔡孟琳、陳育毅, 從Shopping 3.0趨勢探討商圈網站之改善規劃, 第二屆資訊教育與科技應用研討會(Information Education and Technological Applications Conference, IETAC), Nov 7, 2008.
  20. 蔡孟琳、紀宥宇、陳育毅、詹進科, 基植於P2P系統架構上的數位產權管理機制設計, 第五屆流通與全球運籌論文研討會, Oct 31, 2008. (NSC95-2221-E-005-045-MY2)
  21. 陳育毅、蔡孟琳、黃俊一, 適用於集合住宅單位之直播衛星系統的條件式接取機制, TANET 2008臺灣網際網路研討會, Oct 20-22, 2008.
  22. Zong-Ming Guo, Chen-Shen Liu, Chia-I Lin, Chin-Ling Chen, Yu-Yi Chen, With an On-line Authentication for RFID Secure Transaction System, 2008 Symposium on Digital Life Technologies: Human- Centric Smart Living Technology(2008數位生活科技研討會-人本智慧生活科技), June 5-6, 2008.
  23. 陳育毅、詹進科、劉柏伸, 一個改良SAPA之無線射頻(RFID)驗證協定(An Improved RFID Authentication Protocol based on SAPA), 2008管理與技術國際學術研討會, June 4-5, 2008.
  24. 陳育毅、詹進科、紀宥宇, 具合理使用的家庭數位內容共享機制, 第十八屆全國資訊安全會議(Proceedings of the 18th Information Security Conference), May 29-30, 2008.
  25. 陳育毅、詹進科、林志強, 公平及安全的無線網路計費系統(A Fair and Secure WLAN Billing System), 第七屆離島資訊技術與應用研討會(ITAOI2008), May 30, 2008.
  26. 陳育毅、林志強, 保障使用隱私之免費城市無線網路運作模式, 2008資訊管理暨商務科技研討會(IMCT2008), May 16, 2008.
  27. 陳育毅、詹進科、呂俊超, 適用於賣方主導交易模式的行動代理人安全交易機制(A Negotiable Contract Transaction Mechanism Based on Mobile Agent Services), 第十九屆國際資訊管理學術研討會(ICIM2008), May 16, 2008.
  28. 陳育毅、曾燕芬, 群組成員存取權限差異化與所有權可移轉之RFID系統,第十九屆國際資訊管理學術研討會(ICIM2008), May 16, 2008.
  29. 陳育毅、詹進科、韋宜成, 以RFID實現供應鏈管理之所有權安全移轉機制(A Secure RFID Ownership Transfer Mechanism for Supply Chain Management),第十九屆國際資訊管理學術研討會(ICIM2008), May 16, 2008.
  30. 陳育毅、詹進科、陳昱潭, 一種RFID的標籤擁有者轉換之安全協定-適用於零售通路商品, 2008台灣商管理論與實務研討會, May 9, 2008.
  31. 陳育毅、詹進科、曾燕芬, 群組成員存取權限差異化之RFID系統(Diversity of Group Member Access Right in RFID System), 2008全國RFID相關論文研討會, Feb 1, 2008.
  32. 陳育毅、詹進科、曾燕芬, 適用於群組成員不同權限等級之RFID安全存取控制協定(The Design of Secure RFID Access Control System with Different Authorized Group), 2007全國計算機會議(2007 National Computer Symposium), Dec 20-21, 2007. (論文佳作獎)
  33. 陳育毅、蕭世易, 一種更安全的行動通訊本地服務之研究, 第十七屆全國資訊安全會議(Proceedings of the 17th Information Security Conference), June 7, 2007.
  34. 陳育毅、詹進科、蕭世易, 支援行動服務提供者之本地服務系統設計, 資訊科技管理與資訊人才培育研討會, pp.208-213, June 6, 2007.
  35. 陳育毅、廖璟璜, 一種MANet 環境的存取控制設計, 資訊科技管理與資訊人才培育研討會, pp.112-118, June 6, 2007.
  36. 陳育毅、蔡孟琳, 演算法動畫視覺系統之研究, 第二屆數位內容管理與應用學術研討會, June 1-2, 2007.
  37. 陳育毅、詹進科、呂俊超, 以IOTP建構安全的國際貿易B2B電子商務系統–以信用狀為例, 第三屆流通與全球運籌論文研討會, pp.N2-1-10, Oct 28, 2005. (NSC94-2213-E-005-038)
  38. 陳育毅、黃蓉德、詹進科, 行動電話數位產權管理的分層設計與合理使用, 2005商管與資訊研討會(Taiwan conference on Business and Information), Sep 29-30, 2005.
  39. 陳育毅、蔡柏宏、詹進科, 建立家庭網路與個人合理使用的跨平台數位產權管理機制, 2005商管與資訊研討會(Taiwan conference on Business and Information), Sep 29-30, 2005.
  40. Jinn-Ke Jan, Hung-Yu Chien, C. P. Chen, Yu-Yi Chen, 嵌入圖檔的資訊隱藏方法與實作, 第十三屆全國資訊安全會議(Proceedings of the 13th Information Security Conference), pp.422-429, May 2003.
  41. Yu-Yi Chen, Jinn-Ke Jan, Chih-Fang Kuo, A Refined Proxy Deposit Protocol for E-cash Systems, 第十二屆全國資訊安全會議(Proceedings of the 12th Information Security Conference), pp.141-146, May 2002.
  42. Yu-Yi Chen, Jinn-Ke Jan, Muh-Don Hsiao, A Novel Web-Payment Scheme for the Off-line Environment, 第十二屆全國資訊安全會議(Proceedings of the 12th Information Security Conference), pp.211-219, May 2002.

(5)專書與技術報告
  1. 解昆樺、陳育毅、吳育龍、張俊彥、黃天祥、陳偉峯、盧翰莛、黃律澄、張玉書, 你也可以數位人文:數位策展x多媒體應用x創新教學, (ISBN 9789869866651), 國立中興大學出版中心, Jan. 2020.
  2. Yu-Yi Chen and Meng-Lin Tsai, The Study on Secure RFID Authentication and Access Control, Current Trends and Challenges in RFID (ISBN 978-953-307-356-9), Editor Cornel Turcu, InTech, July 2011.
  3. 陳育毅、蔡孟琳, 資通訊科技數位匯流之安全議題, 國家實驗研究院科技政策研究與資訊中心97年度資通安全專論, Feb. 2009.
  4. 陳育毅, 建立更安全公平的跨平台數位產權管理機制, 國科會專題研究計畫成果報告, Oct. 2008.
  5. 陳育毅、陳金鈴, RFID與PKI結合應用研究, 財團法人工業技術研究院專題研究計畫成果報告, Nov. 2007.
  6. 陳金鈴、陳育毅, 一種公平且不可否認的行動商務系統之研究, 國科會專題研究計畫成果報告, Oct. 2007.
  7. 陳育毅, 建立更安全公平的跨平台數位產權管理機制, 國科會專題研究計畫期中報告, Oct. 2007.
  8. 陳育毅, 網際商貿開放協定(IOTP)之安全研究與B2B商務應用, 國科會專題研究計畫成果報告, Oct. 2007.
  9. 陳育毅, 網際商貿開放協定(IOTP)之安全研究與B2B商務應用, 國科會專題研究計畫期中報告, Oct. 2006.

(6)其他期刊論文
  1. 陳育毅、蔡孟琳, RFID電子標籤的辨識、驗證、存取控制、防偽等研究之關連性, Communications of the CCISA(資訊安全通訊),Vol.14, No.3, pp.71-84, July 2008.
  2. Yu-Yi Chen, Shin-Yi Hsiao, A Secure and Private LBS Protocol on Mobile Communication Network, Journal of Computers(ISSN:1991-1599), Vol.19, No.1, pp.39-48, April 2008.
  3. Yu-Yi Chen, Yan-Fen Tzeng, RFID系統不同權限讀取器的安全存取控制協定(Secure Access Control Protocol of RFID System for Different Authorized Reader), 興大工程學刊(Journal of Engineering, National Chung Hsing Univerity), Vol.19, No.1, March 2008.
  4. Yu-Yi Chen, Jinn-Ke Jan, Cheng-Jie Chen, The Design of Fair-use Online DRM System, Journal of Computers(ISSN:1991-1599), Vol.16, No.5, pp.8-16, June 2005.
  5. Yu-Yi Chen, Jinn-Ke Jan, Chih-Fang Kuo, 一種更完善的不可追踪電子票券協定, Journal of Computers(ISSN:1991-1599), Vol.16, No.4, pp.1-6, September 2004.
  6. Yu-Yi Chen, Jinn-Ke Jan, Yuh-Min Tseng, Chin-Ling Chen, Cryptanalysis of a Blind Signature Scheme Based on ElGAMAL Signature, 興大工程學刊(Journal of Engineering, National Chung Hsing Univerity), Vol. 15, No.1, pp.37-39, March 2004.
  7. 陳育毅、謝鳳儀、沈欣宜、賴佳君、易真珮、何佳真, 專業網站自動化建製系統之應用與探討, 資訊與教育雜誌, pp.44-55, Feb. 2003.



© 2013 iPRESS. All rights resevered. Designed by Templateism