黃慧鳳【教授】
學    歷 : 國立中正大學 資訊工程研究所 博士
個人網址 : http://163.17.136.168
電子信箱 : phoenix@nutc.edu.tw
學校分機 : (04)2219-6601
專       長 : 作業研究、密碼學、資訊安全、演算法

論文期刊

1. Ya-Fen Chang, Yuo-Ju Yen, and Hui-Feng Huang, "Security of An Anonymous Key Agreement Protocol Based on Chaotic Maps", Communications of the Chinese Cryptology and Information Security Association Vol.22, No. 2, pp. 63-69,, April, 2016
2. Ya-Fen Chang, Yuo-Ju Yen, and Hui-Feng Huang, "Security of An Anonymous Key Agreement Protocol Based on Chaotic Maps", Communications of the Chinese Cryptology and Information Security Association Vol.22, No. 2, pp. 63-69,, April, 2016
3. Hui-Feng Huang*, Hong-Wei Chang, and Po-Kai Yu, "Enhancement of Timestamp-based User Authentication Scheme with Smart Card", International Journal of Network Security Vol.16, No.4, pp.385-389, 2014, July, 2014
4. Hui-Feng Huang, Pin-Han Lin, and Min-Hsuan Tsai,, "Convertible Multi-authenticated Encryption Scheme for Data Communication", International Journal of Network Security Vol.16, No.6, pp.549-557, December, 2014
5. Der-Chyuan Lou and Hui-Feng Huang*, "An Efficient t-out-n Oblivious Transfer for Information Security and Privacy Protection", International Journal of communication systems Vol. 27, pp. 3759-3767, October, 2014
6. Der-Chyuan Lou, Chao-Lung Chou, Hung-Yuan Wei , and Hui-Feng Huang, "Active steganalysis for interpolation-error based reversible data hiding", Pattern Recognition Letters Vol. 34, pp. 1032-1036, August, 2013
7. Hui-Feng Huang*, Su-E Liu and Hui-Fang Chen, "Designing a new mutual authentication scheme based on nonce and smart cards", Journal of the Chinese Institute of Engineers Vol. 36, No. 1, , pp. 98-102, May, 2013
8. Chia-Chen Chen, Hui-Feng Huang* , Cheng-Yi Liu, and Chi-Wen Lai, "Efficient Mobile Conference Scheme for Wireless Communication", Informatica Vol. 24, No. 1,, pp. 59-70,, May, 2013
9. Chia-Chen Chen, Hui-Feng Huang* , Cheng-Yi Liu, and Chi-Wen Lai, "User Authentication with Anonymity for Roaming Service with Smart Cards in Global Mobility Networks", Ad Hoc & Sensor Wireless Networks Vol. 20, pp. 5-19,, January, 2013
10. Hui-Feng Huang, Kuo-Ching Liu, Hong-Wei Chang, "Advanced Smart Card Based Password Authentication with User Anonymity", Journal of Convergence Information Technology Vol 7, N) 14, pp. 419 ~ 427, July, 2012
11. Kuo-Ching Liu, Hui-Feng Huang, and Hui-Fang Chen, "Efficient Dynamic ID-Based Authentication for User Anonymity", ICIC Express Letters Vol. 5, No.7, pp. 2193-2197, July, 2011
12. Huang, H. F, "A New Design of Access Control in wireless Sensor Networks", International Journal of Distributed Sensor Networks doi:10.1155/2011/412146, pp. 1-7, May, 2011
13. Der-Chyuan Lou and Hui-Feng Huang, "Efficient Three-Party Password Based Key Exchange Scheme", International Journal of communication systems Vol. 24, No.4, pp. 504-512, April, 2011
14. Huang, H. F. and Liu, K. C, "Efficient Key Management for Preserving HIPAA Regulations", Journal of Systems and Software Vol. 84, pp. 113-119, January, 2011
15. Huang, H. F. and Liu, K. C, "Designing a new efficient Encryption/Decryption for Field Applications", ICIC Express Letters Vol. 4,, No. 4,, 1363-1366, August, 2010
16. Kuo-Ching Liu and Hui-Feng Huang, "Efficient Access Control in a Hierarchy for Hardware-limited Users", Journal of Convergence Information Technology Vol. 5, No.5, pp. 179-185, July, 2010
17. Liu, K. C. and Huang, H. F, "A New Design of Encryption/Decryption for Field Applications", Journal of Convergence Information Technology Vol. 5, No. 5, pp. 39-43, July, 2010
18. Huang, H. F, "A New Design of Access Control in wireless Sensor Networks", International Journal of Distributed Sensor Networks doi:10.1155/2011/412146, pp. 1-7, May, 2010
19. Huang, H. F., "A Simple Three-Party Password Based Key Exchange Protocol", International Journal of communication systems Vol. 22, pp. 857-862,, April, 2009
20. Huang, H. F., Chan, C. W., Lin, C. H., and Wang H. W, "A Low-computation Conference Key System for Mobile Communications", International Journal of Innovative Computing, Information and Control Vol. 5, VolNo.2, pp. 461-466., February, 2009
21. Huang, H. F., "A Novel Access Control Protocol for Secure Sensor Networks", Computer Standards & Interfaces Vol. 31, Vol. No.2, pp. 272-276, February, 2009
22. Huang, H. F., Liu, K. C., and Wang, H. W, "A New Design of Cryptographic Key", International Journal of Innovative Computing, Information and Control Vol. 5, No.11(A), pp. 3923-3931, November, 2009
23. Huang, H. F., "A New Design of Oblivious Transfer for Private Information Retrieval", International Journal of Computer Science and Network Security Vol. 8, No. 9, pp. 346-350, September, 2008
24. Huang, H. F., "A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks", Lecture Notes in Computer Science LNCS 5075, pp. 77-82, June, 2008
25. Huang, H. F. and Chang, C. C, "Low-Computation Oblivious Transfer Scheme for Private Information Retrieval", International Journal of Innovative Computing, Information and Control Vol. 4, No. 6, pp.1365-1370, June, 2008
26. Huang, H. F., "A Novel Efficient Conference Scheme for Mobile Communications", International Journal of Mobile Communications Vol. 6, No. 6, pp. 750-759, June, 2008
27. Huang, H. F., Chan, C. W., Lin, C. H., and Wang H. W., "A Low-computation Conference Key System for Mobile Communications", International Journal of Innovative Computing, Information and Control Vol. 5, No.2, pp. 461-466, December, 2008
28. Huang, H. F., "A Novel Access Control Protocol for Secure Sensor Networks", Computer Standards & Interfaces Vol. 31, No. 2, pp. 272-276, December, 2008
29. Huang, H. F. and Wei, W. C, "A new efficient and complete remote user authentication protocol with smart cards", International Journal of Innovative Computing, Information and Control Vol. 4, No. 11, pp. 2803-2808, November, 2008
30. Huang, H. F. and Chang, C. C., "A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierarchy", Fundamenta Informaticae Vol. 84, pp. 353-361, January, 2008
31. Liu, K. C. and Huang, H. F., "Ubiquitous Healthcare over World Wide Web", Research Journal of Medical Sciences Vol. 1, No 4, pp. 191-194, August, 2007
32. Huang, H. F. and Chang, C. C., "A New Forward-Secure Blind Signature Scheme", Journal of Engineering and Applied Sciences Vol. 2, No.1, pp. 230-235, February, 2007
33. Huang, H. F., "An Efficient Mutual Authentication protocol on RFID Tags", Lecture Notes in Computer Science LNCS 4809, pp. 550-556, December, 2007
34. Huang, H. F. and Chang, C. C, "A New t-out-n Oblivious Transfer with Low Bandwidth", Applied Mathematics Sciences Vol. 1, No. 7, pp. 311-320, January, 2007
35. Huang, H. F. and Chang, C. C., "A Novel Identity-Based Society Oriented Signature Scheme with Anonymous Signers", Applied Mathematics Sciences Vol. 1, No. 3, pp. 1551-1562, January, 2007
36. Huang, H. F. and Chang, "A Novel Efficient (t,n) Threshold Proxy Signature Scheme", Information Sciences Vol. 176, No. 10, pp. 1338-1349, June, 2006
37. Huang, H. F. and Chang, C. C, "An Efficient and Flexible Forward-Secure Signature Scheme", International Journal of Computer Science and Network Security Vol. 6, No. 3, pp. 211-219, March, 2006
38. Chang, Y. F., Chang, C. C., and Huang H. F., "Digital Signature with Message Recovery Using Self-certified Public Keys without Trustworthy System", Applied Mathematics and Computation Vol. 161, No. 1, pp. 211-227, January, 2005
39. Huang, H. F. and Chang, C. C, "Multisignatures with Signing Authorities for Sequential and Broadcasting Architectures", Computer Standards and Interfaces Vol. 27, No. 2, pp. 169-176, September, 2004
40. Huang, H. F. and Chang, C. C., "A New Design of Efficient Partially Blind Signature Scheme,", The Journal of Systems and Software Vol. 73, pp. 397-403, June, 2004
41. Huang, H. F. and Chang, C. C., "A New Crpytographic key Assignment Scheme with Time-Constraint Access Control in a Hierarchy", Computer standards and Interfaces vol. 26, pp. 159-166, May, 2004
42. Huang, H. F. and Chang, C. C., "An Efficient and Practical (t,n) Threashold Proxy Signature Scheme with Known Signers", Fundamenta Informaticae Vol. 56, No. 3, pp. 243-253, August, 2003

國際研討會論文

1. Yung-Feng Lu1, Hui-Feng Huang2,*, and An-Ting Liu3, "Efficient Conference Key Protocol Based on Secret Sharing", The International Conference on Computing and Precision Engineering 2015 (ICCPE 2015), pp. 1-6November, 2015
2. Hui-Feng Huang,*, and Po-Kai Yu , and Kuo-Ching Liu, "A Privacy and Authentication Protocol for Mobile RFID System", EEE Symposium Series on Computational Intelligence (IEEE SSCI 2014), pp. 1-6December, 2014
3. Hui-Feng Huang , Pin-Han Lin, "The Sixth International Conference on Genetic and Evolutionary Computing (ICGEC-2012), Kitakyushu, J", EI, 55-58, August, 2012
4. Hui-Feng Huang, Su-E Liu and Hui-Fang Chen, "Designing a new mutual authentication scheme based on nonce and smart cards", The 2010 IEEE International Symposium on Parallel and Distributed Processing with Applications (201, 570-573, September, 2010
5. Hui-Feng Huang, Ya-Fen Chang, and Chun-Hung Liu, "Enhancement of Two-Factor User Authentication in Wireless Sensor Networks", The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processin, pp. 27-30, October, 2010
6. Huang, H. F., Chang, Y. J., and Liu, K. C., "An Efficient Three Party Authenticated Key Exchange for Mobile Communications", The 10th International Symposium on Pervasive Systems, Algorithms and Networks I-SPAN 2009, pp. 249-253, December, 2009
7. Huang, H. F., Chang, Y. J., and Liu, K. C., "An Efficient Three Party Authenticated Key Exchange for Mobile Communications", The 10th International Symposium on Pervasive Systems, Algorithms and Networks I-SPAN 2009, pp. 249-253, December, 2009
8. Huang, H. F., Liu, K. C, "A New Dynamic Access Control in Wireless Sensor Networks", The Third IEEE Asia-Pacific Services Computing Conference APSCC 2008, December, 2008
9. Huang, H. F., Liu, K. C, "A New Dynamic Access Control in Wireless Sensor Networks", The Third IEEE Asia-Pacific Services Computing Conference APSCC 2008, pp. 901-906, December, 2008
10. Huang, H. F. and Chang, C. C., "An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm", 2007 IEEE International conference on Multimedia and Ubiquitous Engineering, pp. 982-986, April, 2007
11. Liu, K. C., Wang H. W., and Huang, H. F., "Enhancement of the Mutual authentication protocol on RFID passive tags", The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processin, pp. 261-264, November, 2007
12. Huang, H. F, "A New Design of Efficient Key Pre-distribution Scheme for Secure Wireless Sensor Networks", The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processin, pp. 253-256, November, 2007
13. Huang, H. F. and Chang, C. C., "An Untraceable Forward-Secure Blind Signature Scheme", International Multiconference of Engineers and Computer Scientists 2006 (IMECS), pp. 441-446, June, 2006
14. Huang, H. F. and Wei, W. C., "A New Efficient Authentication Scheme for Session Initiation Procotol", 9th Joint Conference on Information Sciences 2006, pp. 689-692, October, 2006
15. . and Liu, C. C, "A New Cryptographic Key Assignment Scheme Using a one-way hash function", 9th Joint Conference on Information Sciences 2006, pp. 689-692, October, 2006
16. Huang, H. F. and Chang, C. C., "A New Design of Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash", 2006 IEEE International conference on E-Business Engineering (ICEBE 2006), pp. 39-46, October, 2006
17. Huang, H. F., Chang, C. C. and Yeh, J. S., "Enhancement of Non-Interactive Oblivious Transfer Scheme", Fourth International Conference on Information and Management Sciences (IMS), pp. 196-199, July, 2005
18. Huang, H. F. and Chang, C. C, "A New Design for Efficient t-out-n Oblivious Transfer Scheme", The First International Workshop on Information Networking and Applications (INA 2005), pp. 499-502, March, 2005
19. Huang, H. F. and Chang, C. C., "An Efficient Deniable Authentication Protocol", 2005 International Conference on Cyberworlds, pp. 307-310, November, 2005

國際專書論文

1. Huang, H. F., "A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks", Lecture Notes in Computer Science, Spring-Verlag, LNCS 5075, pp. 77-82, June, 2008
2. Huang, H. F., "An Efficient Mutual Authentication protocol on RFID Tags", Lecture Notes in Computer Science, Spring-Verlag, LNCS. 4809, pp. 550-556, December, 2007
3. 2. Huang, H. F. and Chang, C. C, "A Novel Conference Key Distribution System with Re-keying Protocol", Lecture Notes in Computer Science, LNCS. 3597, pp. 282-290, July, 2005
4. 3. Huang, H. F. and Chang, C. C., "Enhancement of an Authenticated Mulitple-key Agreement Protocol without Using Conventional One-way F", Lecture Notes in Artificial Intelligence, Springer-Verlag, LNAI. 3802, pp. 554-559, December, 2005
5. 1. Huang, H. F. and Chang, C. C, "An Efficient Convertible Authenticated Encryption Scheme and Its Variant", Lecture Notes in Computer Science (ICICS 2003), Springer-Verlag, Germany, LNCS. 2836, pp. 382-392, October, 2003

國內期刊、雜誌及會議論文

1. 黃慧鳳 ,林杏涓, "適用於行動通訊之三方驗證協定", 第二十七屆ICIM2016國際資訊管理學術研討會, pp. 191, May, 2016
2. Hui-Feng Huang*, Kuo-Feng Hwang, and Chia-Wen Lin, "Enhancement of a Three-Party Password Based Authentication Key Exchange Protocol", 2013第八屆數位教學暨資訊實務研討會The E-Learning and Information Technology Symposium, pp. 1-8, March, 2013
3. 劉正義 黃慧鳳 詹昭文 程瑞芳, "網格計算之通訊安全設計", TANET 2013臺灣網際網路研討會, pp 1-4, October, 2013
4. 劉正義 黃慧鳳 詹昭文 程瑞芳, "網格計算之通訊安全設計", TANET 2013臺灣網際網路研討會, pp 1-4, October, 2013
5. 黃國峰 黃慧鳳 林嘉文, "植基於距離測量之影像檢索系統", TANET 2013臺灣網際網路研討會, pp. 83-87, October, 2013
6. 黃國峰 黃慧鳳 林嘉文, "植基於距離測量之影像檢索系統", TANET 2013臺灣網際網路研討會, pp. 83-87, October, 2013
7. Huang, H. F. and Liu, S. E, "An efficient authentication protocol for a large-scale RFID system", 2011 Workshop on Consumer Electronics, pp. 1695-1699, November, 2011
8. 黃慧鳳 林麒寶 曾信憲, "安全e付款服務之設計與應用", 2009 資訊管理與實務研討會, 1-11, May, 2009
9. Liu, K. C. and Huang, H. F, "Security and Privacy Protection Protocol for Shared Medical records", International Medical Informatics Symposium in Taiwan 2007 (MIST 2007), pp. 377-381, November, 2007
10. 黃慧鳳與李執緯, "模糊傳送 (oblivious transfer) 應用於飯店提供顧客安全e化服務與管理之設計", 第二屆資訊管理學術暨專案管理實務研討會, B15, pp. 1-11, May, 2006
11. Liu, K. C. and Huang. H. F, "A Novel Authentication Scheme for Secure and Safe Living Environments in Sensor Networks", International Medical Information Symposium in Taiwan (MIST 2006), pp. 47-51, October, 2006
Exit >>