陈建铭
通讯地址
深圳市南山区西丽深圳大学城哈工大校区D栋424 (518055)

电子邮件
chienming.taiwan@gmail.com
联系电话
+86-755-26033148
+86-755-26033148(传真)
个人简介      
陈建铭博士,哈尔滨工业大学(深圳)副教授,深圳市海外高层次B类人才(孔雀计划),台湾国立清华大学资讯工程系工学博士。课题组的主要研究方向为: 网络安全,物联网,移动互联网,云计算,社交网络隐私保护等等,至今已接收并发表70余篇高水平论文(23篇SCI期刊论文)。根据Google Scholar统计,目前论文总引用755余次,H-index为14。近五年来,先后主持了国家自然科学青年基金、深圳市基础研究等科研项目。
研究方向      
网络安全,物联网,移动互联网,云计算,社交网络隐私保护等
教育经历      
2003-2010
获工学博士学位(资讯工程),台湾清华大学
学位论文:用于付费广播电视访问控制的密钥管理之研究
2001-2003
获工学硕士学位(资讯工程),台湾辅仁大学
学位论文:以赫序函式为基础的通行码身份认证协议之研究
1997-2001
获学士学位(资讯工程),台湾辅仁大学
研究与工作经历    
2017/01-至今
副教授、硕士生导师,哈工大(深圳) 计算机科学与技术学院
2012/10 -2016/12
助理教授、硕士生导师,哈工大(深圳) 计算机科学与技术学院
2011-2012
博士后研究员,台湾清华大学
专业资质与学术兼职    
2014-至今
Journal of Information Hiding and Multimedia Signal Processing, 编委
2015-至今
Journal of Network Intelligence, 编委
2016-至今
Data Science and Pattern Recognition, 编委
2013-2015
The Scientific World Journal, 编委
2012-至今
IEEE Transactions on Information Forensics and Security等多个国际期刊审稿人
2012-至今
IIHMSP 2017等多个国际会议程序委员
科研项目    
2016.01-2017.12
深圳市基础研究项目,主持
2015.01-2017.12
国家自然科学青年基金,主持
2013.01-2014.12
哈工大创新基金,主持
2012.10-2014.12
新进教师科研启动项目,主持
2012.10-2014.10
深圳市科创委车载智能云终端系统,参与
科研成果及奖励    
2014
深圳市海外高层次人才(B类)
2006
台湾资讯安全会议最佳论文奖
发明专利    
1. 吴祖扬, 陈建铭, 林浚玮等. 云环境下的数据分层访问方法及系统, 授权号CN104320426, 2015. (国家发明专利)

2. 林浚玮, 潘正祥, 吴祖扬, 陈建铭, 罗牧之. 具有改善视线功能的车用装置, 授权号CN104354571A, 2015. (国家发明专利)

3. Hung-Min Sun, Shih-Pu Hsu, and Chien-Ming Chen,“Mobile jamming attack method in wireless sensor network and method defending the same,” US 7,907,888 B2, Cl. 455-1. [美国专利]

4. 孫宏民, 徐士卜, 陳建銘, “無線感測網路上移動式阻斷服務攻擊方法及其防禦方法” 台湾專利,證書號: I346491, 公告日: 2011/08/01
论文及著作    
1. Chien-Ming Chen, Weicheng Fang, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, King-Hang Wang, "Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol," accepted in Journal of Information Science and Engineering, 2017(SCI).
2. Chien-Ming Chen, Linlin Xu, King-Hang Wang, Shuai Liu, and Tsu-Yang Wu, "Cryptanalysis and improvements on three-party-authenticated key agreement protocols based on chaotic maps", accepted in Journal of Internet Technology, 2017 (SCI).3.
3. Chien-Ming Chen, Chun-Ta Li, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, “A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System,” accepted in IEEE Access, 2017 (SCI).
4. Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen, “A Novel Three-party Password-based Authenticated Key Exchange Protocol with User Anonymity Based on Chaotic Maps,” accepted in Soft Computing, , 2017.[SCI].
5. Chien-Ming Chen, Weicheng Fang, King-Hang Wang, and Tsu-Yang Wu, "Comments on An improved secure and efficient password and chaos-based two-party key agreement protocol", Nonlinear Dynamics, vol. 87, issue 3, pp. 2073-2075, Feb. 2017. (SCI).
6. Yu Chen, Chien-Ming Chen, Jeng-Shyang Pan, Tsu-Yang Wu and Shuai Liu, " Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps, " Journal of Information Hiding and Multimedia Signal Processing, vol. 7, no. 6, Nov. 2016 (EI).
7. Tsu-Yang Wu, Chien-Ming Chen*, Xiuyang Sun, Jerry Chun-Wei Lin, "A Countermeasure to SQL Injection Attack for Cloud Environment," Wireless Personal Communications, Oct. 2016. (SCI).
8. Chien-Ming Chen, Linlin Xu, Tsu-Yang Wu and Ci-Rong Li, "On the Security of a Chaotic Maps-based Three-Party Authenticated Key Agreement Protocol," Journal of Network Intelligence, Vol. 1, No 2, 2016.
9. Tsu-Yang Wu, Jerry Chun-Wei Lin, Chien-Ming Chen, Yuh-Min Tseng, Jaroslav Frnda, Lukas Sevcik, and Miroslav Voznak, "A brief review of revocable ID-based public key cryptosystem," Perspectives in Science, Dec, 2015.
10. Ci-Rong Li, Chen-Ju Lin, Yue-Hsiang Tien and Chien-Ming Chen, "A Multilevel Model of Team Cultural Diversity and Cretivity: The Role of Climate for Inclusion," The Journal of Creative Behavior, Jun, 2015. (SSCI)
11. Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, and Mu-En Wu, "On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks," Journal of Universal Computer Science, vol. 21, issue 3, pp. 406-418, 2015. (SCI).
12. Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin and Huaxiong Wang, "A Provable Authenticated Group Key Agreement Protocol for Mobile Environment", Information Sciences, vol.321, Nov. 2015 (SCI).
13. Chien-Ming Chen, Shaui-Min Chen, Wei-Chih Ting, Chi-Yi Kao, and Hung-Min Sun, "An Enhancement of Return Address Stack for Security", Computer Standards and Interfaces, vol. 38, pp. 17-24, Feb. 2015. (SCI)
14. Eric Ke Wang, Zhenjie Cao, Tsu-Yang Wu, Chien-Ming Chen, "MAPMP: A mutual authentication protocol for mobile payment", Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, page(s): 697-707, 2015 (EI).
15. Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu and Hung-Min Sun, "An Efficient Solution for Hierarchical Access Control Problem in Cloud Environment", Mathematical Problems in Engineering, vol. 2014, Article ID 569397, 8 pages, 2014. (SCI)
16. Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Lijun Yan, Huaxiong Wang and Hung-Min Sun, "Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID", Journal of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 4, page(s): 642-648, October 2014 (EI).
17. Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, and Hung-Min Sun, "A Secure RFID Authentication Protocol Adopting Error Correction Code," The Scientific World Journal, vol. 2014, Article ID 704623, 12 pages, 2014. (SCI)
18. Chien-Ming Chen, Xinying Zheng, and Tsu-Yang Wu, “A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks,” The Scientific World Journal, vol. 2014, Article ID 816549, 13 pages, 2014. (SCI)
19. Tsu-Yang Wu, Chengxiang Zhou, Chien-Ming Chen, Eric Ke Wang, "Towards Time-bound Hierarchical Key Assignment for Secure Data Access Control", Communications in computer and information science, Vol. 473, 2014. (EI)
20. Chien-Ming Chen, Jeng-Shyang, and Jia Zhao, "Journal of Computers: Special issue on technologies next-generation network environments", Journal of Computers, Vol 25, Issue.4, 2014. (EI)
21. M.-E. Wu, Chien-Ming Chen, Y.-H. Lin and H.-M. Sun, "On the Improvement of Wiener Attack on RSA with Small Private-exponent," The Scientific World Journal, vol. 2014, Article ID 650537, 2014. (SCI)
22. H.-Z. He, Chien-Ming Chen, Y.-P. Su, and H.-M. Sun, "A Defence Scheme against Identity Theft Attack based on Multiple Social Networks," Expert Systems with Applications, vol. 41, Issue 5, pages(s): 2345-2353, April, 2014. (SCI)
23. Chien-Ming Chen, Y.-H. Chen, Y.-H. Lin, and H.-M. Sun, "Eliminating Rouge Femtocells based on Distance Bounding Protocol and Geographic Information," Expert Systems with Applications, Vol. 41, Issue 2, pages(s): 426-433, Feb. 2014. (SCI)
24. Chien-Ming Chen, K.-H. Wang, T.-Y. Wu, J.-S. Pan, and H.-M. Sun, "A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices," IEEE Transactions on Information Forensics and Security, Vol.8, Issue 8, page(s): 1318-1330, August, 2013. (SCI)
24. Chien-Ming Chen, Y.-H. Lin, Y.-H. Chen, and H.-M. Sun, "SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN" Journal of Information Hiding and Multimedia Signal Processing, Vol. 4, No. 1, page(s) 57-72, January 2013. (EI)
26. Chien-Ming Chen, Y.-H. Lin, Y.-C. Lin, and H.-M. Sun, “RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, Issue 4, page(s): 727–734, April 2012. (SCI)
27. H.-M. Sun, H. Wang, K.-H. Wang, and Chien-Ming Chen, “A Native APIs Protection Mechanism in the Kernel Mode against Malicious Codes,” IEEE Transactions on Computers, vol. 60, Issue 6, page(s): 813–823, June 2011. (SCI)
28. H.-M. Sun, K.-H. Wang, and Chien-Ming Chen, “On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme,” IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 2, page(s): 159–160, April-June 2009. (SCI)
29. H.-M. Sun, Chien-Ming Chen, and C.-Z. Shieh, “Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems,” IEEE Transactions on Multimedia, vol. 10, issue. 6, Page(s): 1109–1120, Oct. 2008. (SCI)
30. H.-M. Sun, and Chien-Ming Chen, “An Introduction to Diameter Credit Control Application,” Communications of CCISA, vol.10, no.2, pp.114-122, Nov. 2004.
31. W.-C. Ku, H.-L. Lee, and Chien-Ming Chen, “Reflection Attack on a Generalized Key Agreement and Password Authentication Protocol,” IEICE Transactions on Communications, vol.E87-B, no.5, pp.1386-1388, May 2004. (SCI).
32. W.-C. Ku, Chien-Ming Chen, and H.-L. Lee, “Weaknesses of Lee-Li-Hwang's Hash-Based Password Authentication Scheme,” ACM Operating Systems Review, vol.37, no.4, pp.19-25, Oct. 2003. (EI).
33. W.-C. Ku, Chien-Ming Chen, and H.-C. Tsai, “Password Authentication Protocols based on Hash Functions,” Communications of CCISA, vol.9, no.3, pp.32-42, June 2003.
34. W.-C. Ku, Chien-Ming Chen, and H.-L. Lee, “Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication Scheme,” IEICE Transactions on Communications, vol.E86-B, no.5, pp.1682-1684, May 2003. (SCI).
35. Chien-Ming Chen and W.-C. Ku, “Stolen-Verifier Attack on Two New Strong-Password Authentication Protocols,” IEICE Transactions on Communications, vol.E85-B, no.11, pp.2519-2521, Nov. 2002. (SCI)
会议论文及发表演说    
1. Chien-Ming Chen, Lin-lin Xu, Tsu-Yang Wu, Mu-En Wu and Raylin Tso, "On the Security of a Three-Party-Authenticated Key Agreement Scheme based on Chaotic Maps", accepted in 2nd International Conference on Computer Science and Technology (CST 2017), May 2017.
2. Chien-Ming Chen, Linlin Xu, Weicheng Fang and Tsu-Yang Wu, A Three-Party Password Authenticated Key Exchange Protocol Resistant to Stolen Smart Card Attacks, in Proc. of the 12th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2016), Nov. 2016.
3. Tsu-Yang Wu, Fanya Meng, Chien-Ming Chen, Jeng-Shyang Pan, "On the security of a certificateless searchable public key encryption scheme", In Proc. of the 10th International Conference on Genetic and Evolutionary Computing (ICGEC 2016), Oct. 2016.
4. Chien-Ming Chen, Xiaojie Zhang and Tsu-Yang Wu, "A secure condition-based location authentication protocol for mobile devices," accepted in IEEE CMCSN 2016.
5. Shuai Liu, Jeng-Shyang Pan, Lingpin Kong and Chien-Ming Chen, "Time Competition Flooding in high-density Wireless Sensor Network,", accepted in CMCSN 2016.
6. Chien-Ming Chen, Linlin Xu, Xiaojie Zhang, Tsu-Yang Wu and Jeng-Shyang Pan, "On the security of a mutual authentication and key agreement protocol based on chaotic maps", In Proc. of the 3rd international Conference on Robot, Vision and Signal Processing, Nov, 2015.
7. Jeng-Shyang Pan, Chi-Yao Weng, Mu-En Wu, Chwei-Shyong Tsai, and Chien-Ming Chen, " A KL Divergence Function for Randomized Secret Shares," in Proc. of the 11th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2015), September, 2015.
8. Chia-Hung Wang, Mu-En Wu and Chien-Ming Chen, "Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints ," in Proc. of the 11th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2015), September, 2015.
9. Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang, "Security Analysis of A Time-bound Hierarchical Key Assignment Scheme," in Proc. of the 10th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2015), September, 2015.
10. Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen and Eric Ke Wang, "An Efficient Solution for Time-Bound Hierarchical key Assignment Scheme," In Proc. of the 9th International Conference on Genetic and Evolutionary Computing (ICGEC 2015), Auguest. 2015.
11. Jeng-Shyang Pan, Raylin Tso, Mu-En Wu, and Chien-Ming Chen, "Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-Server Environments", In Proc. of the 9th International Conference on Genetic and Evolutionary Computing (ICGEC 2015), Auguest. 2015.
12. EK Wang, C.W. Lin, T.Y. Wu, Chien-Ming Chen, Y. Ye, "Privacy Protection Framework in Social Networked Cars," International Conference on Multidisciplinary Social Networks Research. Springer Berlin Heidelberg, 2015.
13. EK Wang, H. Liu, G. Wang, Y. Ye, T.Y. Wu, and Chien-Ming Chen, "Context recognition for adaptive hearing-aids," In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN) (pp. 1102-1107). IEEE.
14. Xinying Zhang, Chien-Ming Chen, Chun-Hao Yeh, "A Novel CAPTCHA System", In Proc. of 2015 Conference on Information Technology and Application in Outlying Islands (IOAOI 2015), Taiwan, May, 2015.
15. Raylin Tso, Chien-Ming Chen, Xinying Zheng, Mu-En Wu, "A new ultra-lightweight RFID authentication protocol based on physical unclonable functions," In Proc. of 2014 Workshop on RFID Security (RFIDSec 2014), pp. 17-28, Hualian, Taiwan, November 2014.
16. Tsu-Yang Wu, Jeng-Shyang Pan, Chien-Ming Chen and Chun-Wei Lin, "Towards SQL Injection Attacks Detection Mechanism Using Parse Tree", In Proc. of the 8th International Conference on Genetic and Evolutionary Computing (ICGEC 2014), Oct. 2014.
17. Eric Ke Wang, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye and Futai Zou, "MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things", In Proc. of the 8th International Conference on Genetic and Evolutionary Computing (ICGEC 2014), Oct. 2014.
18. Haidan Zhao, Tsui-Ping Chung, Hongying Shan, and Chien-Ming Chen, "Scheduling on Parallel Machines with Mold Constraints," in Proc. of the 15th Asia Pacific Industrial Engineering and Management System Conference 2014.
19. Lulu Hu, Tsui-Ping Chung, Hongying Shan, and Chien-Ming Chen, "A Two-stage assembly scheduling Problem with makespan minimization", In Proc. of the 15th Asia Pacific Industrial Engineering and Management System Conference 2014.
20. Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, and Mu-En Wu, "Security Analysis and Improvement of Femtocell Access Control", In Proc. of the 8th International Conference on Network and System Security (NSS 2014), Oct. 2014.
21. Tsu-Yang Wu, Chengxiang Zhou, Chien-Ming Chen, Eric Ke Wang, "Towards Time-bound Hierarchical Key Assignment for Secure Data Access Control", In proc. of the Multidisciplinary International Social Networks Conference(MISNC 2014), Sept, 2014.
22. Chien-Ming Chen, Jeng-Shyang Pan, Raylin Tso, Szu-Wei Huang and Mu-En Wu, "Pitfalls in an Ultra-lightweight Authentication Protocol for Low-cost RFID", in Proc. of the 10th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2014), Auguest, 2014.
23. C.-Wei Lin, Wensheng Gan, Tzung-Pei Hong and Chien-Ming Chen, “Maintaining High-Utility Itemsets in Dynamic Databases,” In Proc. of International Conference on Machine Learning and Cybernetics (ICMCL 2014), July, 2014.
24. T.-Y. Wu, C. Zhou, Eric K. Wang, J.-S. Pan and Chien-Ming Chen, "Towards Time-Bound Hierarchical Key Management in Cloud Computing," in Proc. of the 1st Eruo-China Conference on Intelligent Data Analysis and Applications (ECC 2014), June, 2014.
25. X. Zhang, Chien-Ming Chen, T.-Y. Wu, Eric K. Wang and T.-P. Chung, "Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID," in Proc. of the 1st Eruo-China Conference on Intelligent Data Analysis and Applications (ECC 2014), June, 2014.
26. Ci-Rong Li, Chien-Ming Chen, Mu-En Wu, Tsui-Ping Chung, and Raylin Tso, " A Condition-based Location Authentication Protocol for Mobile Devices," In Proc. of the 2nd International Conference on Computing, Measurement, Control and Sensor Network (CMCSN 2014), May, 2014.
27. Chien-Ming Chen, M.-E Wu, B.-Z. He, X. Zheng, C. Hsing and Hung-Min Sun “A methodology for Hook-Based Kernel Level Rootkits” In Proc. of the International Conference on Information Security Practice and Experience (ISPEC 2014), May, 2014. (Accepting Rate 22.7% (36/158))
28. S-M Chen, X. Zheng, M.-E. Wu, and Chien-Ming Chen, "A Secure and Efficient Handover Procedure between WiFi and WiMAX Network," In Proc. of the International Conference on Computer, Network Security and Communication Engineering (CNCSE2014), Feb. 2014.
29. W. Kan, T.-Y. Wu, T. Han, C.-W. Lin, Chien-Ming Chen, and J.-S. Pan, “An Efficient Detecting Mechanism for Cross-Site Script Attacks in the Cloud,” In Proc. of the International Conference on Embedded and Multimedia Computing (EMC 2013), August, 2013.
30. L. Kong, Chien-Ming Chen, H.-C. Shih, C.-W. Lin, B.-Z. He, and J.-S. Pan, "An Energy-Aware Routing Protocol Using Cat Swarm Optimization for Wireless Sensor Networks", In Proc. of the International Conference on Embedded and Multimedia Computing (EMC 2013), August, 2013.
31. Chien-Ming Chen, T.-Y. Wu, B.-Z. He, and H.-M. Sun, "An Efficient Time-Bound Hierarchical Key Management Scheme without Tamper-Resistant Devices," In Proc. of the IEEE International Conference on Computing, Measurement, Control and Sensor Network (IEEE CMCSN 2012), July 2012.
32. Chien-Ming Chen, H.-T Chiao, S.-T. Chen, and H.-M. Sun, “A New Business Model in Pay-TV broadcasting Systems and its Conditional Access System,” In Proc. of the IEEE Region 10 Conference (IEEE TENCON 2010), Nov. 2010.
33. H.-M. Sun, Y.-H. Lin, Y.-C. Hsiao, and Chien-Ming Chen, “An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks,” In Proc. of IEEE International Conference on Embedded Software and Systems (IEEE ICESS 2008), Page(s):19 – 26, July 2008.
34. H.-M. Sun, Chien-Ming Chen, and Y.-C. Hsiao, “An Efficient Countermeasure to the Selective Forwarding Attack in Wireless Sensor Networks,” In Proc. of the IEEE Region 10 Conference (IEEE TENCON 2007), Page(s):1 – 4, Oct. 2007.
35. H.-M. Sun, S.-P. Hsu, and Chien-Ming Chen, “Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks,” In Proc. of the 21th IEEE International Conference on Advanced Information Networking and Applications Workshops (IEEE AINAW 2007), Page(s):457 – 462, May 2007.
36. H.-M. Sun, Chien-Ming Chen, and F.-Y. Chu, “An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks,” In Proc. of the 12th IEEE Symposium on Computers and Communications (IEEE ISCC 2007), Page(s):495 – 500, July 2007.
37. H.-M. Sun, C.-F. Hung, and Chien-Ming Chen, “An Improved Digital Rights Management System Based on Smart Cards,” In Proc. of 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007), Page(s):308 – 313, Feb. 2007.
38. H.-M. Sun, C.-Z. Shieh, and Chien-Ming Chen, “An Efficient and Flexible Key Distribution Scheme for Conditional Access System in Pay-TV System,” In Proc. of the 16th Information Security Conference, 2006. (Best Paper Award)
39. H.-M. Sun, Y.-K. Peng, and Chien-Ming Chen, “A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks,” In Proc. of the 15th Information Security Conference, pp.299–306, 2005.
40. W.-C. Ku, H.-L. Lee, and Chien-Ming Chen, “Weakness of a Generalized Key Agreement and Password Authentication Protocol,” In Proc. of the 2003 International Conference on Informatics, Cybernetics, and Systems, pp.366-370, Dec. 14-16, 2003.
41. W.-C. Ku and Chien-Ming Chen, “Attacks and Solutions on the OSPA Protocol,” In Proc. of the 13th Information Security Conference, pp.1-7, Aug. 28-29, 2003.
42. W.-C. Ku and Chien-Ming Chen, “Cryptanalysis of A One-Time Password Authentication Protocol,” In Proc. of the 2001 National Computer Symposium, pp.F046-F050, Dec. 2001.
任教和任导师经历    
2013级硕士研究生: 郑欣颍
2014级硕士研究生: 徐琳琳 、张晓洁
2015级硕士研究生: 方伟成、孟超、范晓宁、林月山
2016级硕士研究生: 项斌、王光杰、张文豪

讲授课程
全日制硕士课程 《无线传感器网络》,32学时 (2014春, 2015春, 2016春, 2017春)
非全日制, 工程硕士专题课 《工程硕士专题课》,4学时 (2015春)
最后更新:2017-06