張雅芬【教授】
學    歷 : 國立中正大學 資訊工程所 博士
電子信箱 : cyf@nutc.edu.tw
學校分機 : 6610
專       長 : 網路安全,資訊網路,資訊安全

論文期刊

1. Tai, W.L. and Chang, Y.F., "Comments on a Secure Authentication Scheme for IoT and Cloud Servers", International Journal of Network Security 19, 4, pp. 648-651, July, 2017
2. Tai, W.L., Chang, Y.F., and Li, W.H., "An IOT Notion–based Authentication and Key Agreement Scheme Ensuring User Anonymity for Heterogeneous Ad Hoc Wireless Sensor Networks", Information Security and Applications 34, 2, pp. 133-141, June, 2017
3. Tai, W.L., Chang, Y.F., and Chen, Y.C., "A Fast-handover-supported Authentication Protocol for Vehicular Ad Hoc Networks", Journal of Intelligent Information Hiding and Multimedia Signal Processing 7, 5, pp. 960-969, September, 2016
4. Tai, W.L., Chang, Y.F.*, and Kwang, T.S., "An Efficient Improvement on Safkhani et al.’s Hash-based Mutual Authentication Protocol for RFID Systems", Journal of Intelligent Information Hiding and Multimedia Signal Processing 7, 3, pp. 653-658, May, 2016
5. Jia, X.D., Chang, Y.F., Chang, C.C., and Wang, L.M., "A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks", Journal of Intelligent Information Hiding and Multimedia Signal Processing 6, 2, pp. 183-188, March, 2015
6. Chang, Y.F., Chen C.C., and Lin, S.C., "An Intelligent Context-aware Communication System for One Single Autonomic Region to Realize Smart Living", Information Fusion 21, pp. 57-67, January, 2015
7. Chang, Y.F., "A Flexible Hierarchical Access Control Mechanism Enforcing Extension Policies", Informatica 26, 2, pp. 181-198, January, 2015
8. Wang, C.C., Chang, Y.F., Chang, C.C., Jan, J.K., and Lin, C.C., "A High Capacity Data Hiding Scheme for Binary Images Based on Block Patterns", Journal of Systems and Software 93, pp. 152-162, July, 2014
9. Hwang, K.F., Chang, Y.F. and Chung K.Y., "A Content-based Image Retrieval System Based on Object-moment Feature", Imaging Science Journal 62, 8, pp. 415-422, November, 2014
10. Chang, Y.F., Tai, W.L., and Chang, H.C., "Untraceable Dynamic-identity-based Remote User Authentication Scheme with Verifiable Password Update", International Journal of Communication Systems 27, 11, pp. 3430-3440, November, 2014
11. Chen, C.C. and Chang, Y.F., "Developing a Smart Shopping Automation System: Ambient Intelligence in Practice", Ad Hoc & Sensor Wireless Networks 20, 1-2, pp. 95-105, January, 2014
12. Li, Y.F. and Chang, Y.F., "A Security Flaw of a Bilinear-pairing-based Electronic Cash Scheme with Trustee-based Anonymity Revo", Proceedings of ICGEC 2012 pp. 71-74, August, 2012
13. Chang, Y.F. and Chang, P.Y., "Comments on a Dynamic-ID-based Remote User Authentication Scheme for Multi-server Environment Using ", Proceedings of ICGEC 2012 pp. 59-62, August, 2012
14. Chang, Y.F., "A Critique of “A Novel Electronic Cash System with Trustee-based Anonymity Revocation from Pairing,”", Electronic Commerce Research and Applications 11, 4, pp. 441-442, July, 2012
15. Chang, Y.F., Tai, W.L. and Lin, C.Y., "A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-based Cryptographic App", Information Technology and Control 41, 1, pp. 60-68, March, 2012
16. Tai, W.L., Chang, Y.F., Li, Y.F., and Pan, S.M., "A Security Enhancement on A Remote User Authentication Scheme Based on the Rabin Cryptosystem with S", pp. 160-164, March, 2012
17. Chang, Y.F., Lin, J.Y., and Yen, Y.J., "Comments on A Secret-key-privacy-preserving Authentication and Key Agreement Scheme", ICGEC 2011 pp. 168-171, August, 2011
18. Chang, Y.F., Lin, S.C., and Chang, P.Y., "A Location-privacy-protected RFID Authentication Scheme", IEEE ICC 2011 Paper ID: 10.1109/icc.2011.5962656, June, 2011
19. Chang, Y.F. and Chang, P.Y., "An Improved User Authentication and Key Agreement Scheme Providing User Anonymity", Journal of Electronic Science and Technology 9, 4, pp. 352-358, December, 2011
20. Ya-Fen Chang, "Real Understanding of LPN-problem-based Lightweight Authentication Protocols", Information Technology and Control 39, 3, 236 – 240, September, 2010
21. Huang, H.F., Chang, Y.F., and Liu, C.H., "Enhancement of Two-Factor User Authentication in Wireless Sensor Networks", Proceedings of IIHMSP 2010 27-30, October, 2010
22. Chiang, H.H., Liu, C.C., Chen, Y.M., and Chang, Y.F., "Security of Indirect-authenticated Key Exchange Protocol", IIH-MSP 2009 pp. 336-339, September, 2009
23. Chang, Y.F. and Chang, H.C., "Security of Dynamic ID-based Remote User Authentication Scheme", NCM 2009 pp. 2108-2110, August, 2009
24. Chang, Y.F., Ciou, J. H., and Lin, J.J., "Verifiable and Untraceable Message Extraction System", Journal of Computers 20, 2, pp. 84-90, July, 2009
25. Chang, Y.F. and Lai, Y.C., "An LPN-problem-based Lightweight Authentication Protocol for Wireless Communications", ARES 2009 pp. 130-134, March, 2009
26. Chang, Y.F., Chen, P.C., and Chen, T.H., "A Verifiable Identity-based RSA Multisignature Scheme for Mobile Communications", Journal of Computers 20, 3, pp. 3-8, October, 2009
27. Lee, J.S., Chang, Y.F., and Chang, C.C., "A Novel Authentication Protocol for Multi-server Architecture without Smart Cards", International Journal of Innovative Computing, Information and Control 4, 6, pp. 1357-1364, June, 2008
28. Chang, Y.F., "A Practical Three-party Key Exchange Protocol with Round Efficiency", International Journal of Innovative Computing, Information and Control 4, 4, pp. 953-960, April, 2008
29. Chang, Y.F. and Chang, C.C., "Robust t-out-of-n Proxy Signature Based on RSA Cryptosystems", International Journal of Innovative Computing, Information and Control 4, 2, pp. 425-431, February, 2008
30. J.B. Feng, H.C. Wu, C.S. Tsai, Y.F. Chang, and Y.P. Chu, "Visual Secret Sharing for Multiple Secrets", Pattern Recognition 41, 12, pp. 3572-3581, December, 2008
31. Chang, Y.F. and Shiao, W.C., "The Essential Design Principles of Verifiable Non-interactive OT Protocols", Proceedings of ISDA 2008 3, pp. 241-245, November, 2008
32. Chang, Y.F., Feng, J.B., Tsai, C.S., and Chu, Y.P., "A New Data Hiding Scheme Using Pixel Swapping for Halftone Images", Image Science Journal 56, 5, pp. 279-290, October, 2008
33. Chiang, F.P., Lin, Y.M., and Chang, Y.F., "Comments on the Security Flaw of Hwang et al.’s Blind Signature Scheme", International Journal Network Security 6, 2, pp. 185-189, January, 2008
34. Chang, Y.F., Chang, C.C., and Lin, P.Y., "A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys", Informatica 18, 4, pp. 535-546, January, 2008

國際研討會論文

1. Chang, Y.F., Peng, C.H., and Tai, W.L., "Comments on a Secure Anonymous Authentication Scheme for Wireless Communications Using Smart Cards", Proceedings of IAM 2017 Winter, pp. 527-536, February, 2017
2. Chang, Y.F., Huang, R.K., and Tai, W.L., "A Critique of an Anonymity-preserving Three-factor Authenticated Key Exchange Protocol for Wireless Sensor Networks", Proceedings of IAM 2017 Winter, pp. 537-544, February, 2017
3. Chang, Y.F., Lo, Y.L., and Tai, W.L., "Comments on an Authentication Model of IoT Control System", Proceedings of ACEAIT 2016, pp. 771-776, March, 2016
4. Chang, Y.F., Hsu, M.H., and Tai, W.L., "Comments on Kuo et al.’s Anonymous Mobility Network Authentication Scheme", Proceedings of ACEAIT 2016, pp. 778-785, March, 2016
5. Chang, Y.F., Yang, J.H., Li, W.H., and Tai, W.L., "Comments on an IOT Notion–based Authentication and Key Agreement Scheme for Heterogeneous Ad Hoc Wireless Sensor Networks", Proceedings of ACEAIT 2015, pp. 264-270, March, 2015
6. Chang, Y.F., Lin, P.Y., Chen, Y.C., Chang, C.S., Fan, J.W., and Chan, C.W., "An Effective Authentication Scheme with Anonymity for Wireless Communications", Proceedings of ACEAIT 2015, pp. 255-263, March, 2015
7. Tai, W.L., Chang, Y.F., Li, Y.F., Lo, Y.L., and Hsu, M.H., "Comments on Space Efficient Secret Sharing Schemes for Implicit Data Security", Proceedings of ICETA 2015-Fall, pp. 79-85, November, 2015
8. Chang, Y.F., Tai, W.L., Wu, W.N., Li, W.H., and Chen, Y.C., "Comments on Chaotic Maps-based Password-authenticated Key Agreement Using Smart Cards", Proceedings of IIHMSP 2014, pp. 94-97, August, 2014
9. Liu, Y.C., Chang, Y.F., and Tai, W.L., "Security Analyses of a Certificateless-group-signcryption-based Offline Electronic Cash System", Proceedings of e-CASE & e-Tech 2014, pp. 1469-1479, April, 2014
10. Yen, Y.J., Chang, Y.F., and Tai, W.L., "Comments on an Identity-based Broadcast Authentication Scheme in Wireless Sensor Networks", Proceedings of e-CASE & e-Tech 2014, pp. 1463-1468, April, 2014
11. Kwang, T.S., Chang, Y.F., and Tai, W.L., "An Efficient Improvement on Doss et al.’s QR-based RFID Authentication Scheme", Proceedings of e-CASE & e-Tech 2014, pp. 1480-1487, April, 2014
12. Chang, Y.F. and Tai, W.L., "Computer-assisted Diagnosis of Blood Cells Using Data Mining", Proceedings of e-CASE & e-Tech 2014, pp. 1488-1495, April, 2014
13. Chang, Y.F., Tai, W.L., and Wu, W.N., "Comments on a Fault-tolerant Group Key Agreement Protocol", Proceedings of e-CASE & e-Tech 2013, pp. 675-684, April, 2013
14. Chang, Y.F., Tai, W.L., Lin, S.C., and Kwamg, T.S., "A Two-factor and Reader-undedicated Authentication Scheme with Passive RFID Tags in WLAN", Proceedings of SITIS 2013, pp. 279-284, December, 2013
15. Fan, J.W., Chan, C.W., and Chang, Y.F., "A Random Increasing Sequence Hash Chain and Smart Card-Based Remote User Authentication Scheme", Proceedings of ICICS 2013, We34.2-P0156, December, 2013
16. Yang, J.H., Chang, Y.F., and Huang, C.C., "A User Authentication Scheme on Multi-Server Environments for Cloud Computing", Proceedings of ICICS 2013, We34.4-P0200, December, 2013
17. Chang, Y.F. and Chang, P.Y., "Comments on a Dynamic-ID-based Remote User Authentication Scheme for Multi-server Environment Using ", Proceedings of ICGEC 2012, pp. 59-62, August, 2012
18. Li, Y.F. and Chang, Y.F., "A Security Flaw of a Bilinear-pairing-based Electronic Cash Scheme with Trustee-based Anonymity Revo", Proceedings of ICGEC 2012, pp. 71-74, August, 2012
19. Tai, W.L., Chang, Y.F., Li, Y.F., and Pan, S.M., "A Security Enhancement on A Remote User Authentication Scheme Based on the Rabin Cryptosystem with S", Proceedings of 2012 26th International Conference on Advanced Information Networking and Application, pp. 160-164, March, 2012
20. Chang, Y.F., Lin, J.Y., and Yen, Y.J., "Comments on A Secret-key-privacy-preserving Authentication and Key Agreement Scheme", ICGEC 2011, pp. 168-171, August, 2011
21. Chang, Y.F., Lin, S.C., and Chang, P.Y., "A Location-privacy-protected RFID Authentication Scheme", IEEE ICC 2011, Paper ID: 10.1109/icc.2011.5962656, June, 2011
22. Huang, H.F., Chang, Y.F., and Liu, C.H., "Enhancement of Two-Factor User Authentication in Wireless Sensor Networks", Proceedings of IIHMSP 2010, 27-30, October, 2010
23. Chang, Y.F., Lin, C.Y., and Shiao, W.C., "An Information Acquiring System with Privacy Protection on Distributed Communications Networks", ICUIMC-2010, January, 2010
24. Chang, Y.F., Lai, Y.C., and Chen, M.Y., "Further Remarks on Identity-based RSA Multisignature", IIH-MSP 2009, pp. 750-753, September, 2009
25. Chiang, H.H., Liu, C.C., Chen, Y.M., and Chang, Y.F., "Security of Indirect-authenticated Key Exchange Protocol", IIH-MSP 2009, pp. 336-339, September, 2009
26. Chang, Y.F. and Chang, H.C., "Security of Dynamic ID-based Remote User Authentication Scheme", NCM 2009, pp. 2108-2110, August, 2009
27. Chang, Y.F. and Lai, Y.C., "An LPN-problem-based Lightweight Authentication Protocol for Wireless Communications", ARES 2009, pp. 130-134, March, 2009
28. Chang, Y.F. and Shiao, W.C., "The Essential Design Principles of Verifiable Non-interactive OT Protocols", Proceedings of ISDA 2008, 3pp. 241-245, November, 2008

國內期刊、雜誌及會議論文

1. , "Security of An Anonymous Key Agreement Protocol Based on Chaotic Maps", CCISA, 22, 2, pp. 63-69, April, 2016
Exit >>