跳到主要內容區
德明財經科技大學資訊管理系        Department of Management Information System

謝濱燦 助理教授

ImgDesc

姓  名: 謝濱燦 [回上頁]
職  稱: 助理教授
校內分機: 5121
研 究 室: B204
電子郵件: bintsan@takming.edu.tw

⍝ 學  歷: 國立成功大學資訊工程博士
朝陽科技大學資訊管理碩士

⍝ 研究領域: 金鑰協議及身份認證、破密分析、數位簽章

⍝ 工作經歷: 立德管理學院兼任講師
南台科技大學兼任講師
實踐大學兼任講師

⍝ 主要授課: 企業資料通訊、網路規劃管理、資料庫實務、網頁與網站設計、計算機概論、專業證照檢定、資訊管理、資訊安全、系統程式、視窗程式設計、資料結構、Unix作業系統

⍝ 重要著作:
☄ 期刊論文
1. H.-M. Sun, B.-T. Hsieh, and H.-J. Hwang, “Secure E-mail protocols providing perfect forward secrecy,” IEEE Communications Letters, vol. 9, no. 1, pp. 58–60, January 2005. (SCI, EI)
2. H.-M. Sun, B.-T. Hsieh, and Shin-Mu Tseng, "On the Security of Some Proxy Blind Signature Schemes," Journal of Systems and Software, Volume 74, Issue 3,Pages 297-302, 2005. (SCI, EI)
3. B.-T. Hsieh and H.-M. Sun, "An Improvement of A Deniable Authentication Protocol," IEICE Transactions on Communications, Vol.E87-B No.10 pp.3099-3101, Oct. 2004. (SCI, EI)
4. H.-T. Yeh, H.-M. Sun, and B.-T. Hsieh, "Security of a Remote User Authentication Scheme using Smart Cards," IEICE Transactions on Communications, Vol.E87-B No.1 pp.192-194 2004. (SCI, EI)
5. B.-T. Hsieh, H.-M. Sun, and T. Hwang, "On the Security of Some Password Authentication Protocols," International Journal of Informatica, Vol. 14, Issue 2, pp. 195-204, 2003. (SCI, EI)
6. B.-T. Hsieh, H.-M. Sun, and T. Hwang, "Cryptanalysis of Enhancement for Simple Authentication Key Agreement Algorithm," IEE Electronics Letters, Vol. 38, Issue 1, pp. 20-21, 2002. (SCI, EI)
☄ 專書及會議論文
1. Hung-Min Sun, Cheng-Ta Yang, and Bin-Tsan Hsieh , "Cryptanalysis of a Threshold Proxy Signature Scheme," Information Security Conference 2004.
2. Hung-Min Sun and Bin-Tsan Hsieh, "Remarks on Designing Proxy Signature Schemes," Information Security Conference 2004.
3. Hung-Min Sun, Bin-Tsan Hsieh, and Shin-Mu Tseng, "Cryptanalysis of Aydos et al.’s ECC-Based Wireless Authentication," IEEE International Conference on e-Technology, e-Commerce, and e-Service(EEE-04), pp. 563-566, 2004.
4. Hung-Min Sun, Bin-Tsan Hsieh, "On the Security of Some Proxy Blind Signature Schemes," Australasian Information Security Workshop (AISW 2004), 2004.
5. Bin-Tsan Hsieh, Hung-Min Sun, "Key Compromise Impersonation Attack on Shim’s Key Agreement Protocol from Weil Pairing," Symposium on Digital Life and Internet Technologies, 2003.
6. Bin-Tsan Hsieh, Hung-Min Sun, "Cryptanalysis of Lee et al.’s Strong Proxy Signature Scheme and Its Applications," Symposium on Digital Life and Internet Technologies, 2003.
7. Hung-Min Sun and Bin-Tsan Hsieh, "Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection," International IEEE Carnahan Conference on Security Technology, pp. 474-476, 2003.
8. Bin-Tsan Hsieh, Her-Tyan Yeh, Hung-Min Sun, and Chern-Tang Lin "Crytanalysis of a fingerprint-based remote user authentication scheme using smart cards," International IEEE Carnahan Conference on Security Technology, pp.349-350, 2003.
9. Hung-Min Sun, Bin-Tsan Hsieh, Tzonelih Hwang, and C. T. Lin, "Analysis of A Blind Signature Scheme Based on ElGamal Signature," Symposium on Digital Life and Internet Technologies, 2002.
10. Bin-Tsan Hsieh, Hung-Min Sun, Tzonelih Hwang, and C. T. Lin, “An Improvement of Saeednia’s Identity-based Key Exchange Protocol,” Information Security Conference 2002, pp. 41-43, 2002.
11. Hung-Min Sun, Bin-Tsan Hsieh, and C. T. Lin, “Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme,” Information Security Conference 2002, pp. 151-154, 2002.
12. Hung-Min Sun, Bin-Tsan Hsieh, and S. J. Hwang, “Secure Email Protocols Providing Perfect Forward Secrecy,” Information Security Conference 2000, May 5-6, 2000.
13. Hung-Min Sun and Bin-Tsan Hsieh, “Remarks on Two Nonrepudiable Proxy Signature Schemes,” Proceedings of the Ninth National Conference on Information Security, pp. 241-246, May 14-15, 1999.
14. Hung-Min Sun and Bin-Tsan Hsieh, “Improved Authenticated Key Agreement Scheme via Password Authentication,” National Computer Symposium 1999.

瀏覽數: