S e l e c t e d   P u b l i c a t i o n
近 期 學 術 著 作

  1. Chi-Tung Chen, Cheng-Chi Lee, Iuon-Chang Lin (2020, Apr). Efficient and Secure Three-party Mutual Authentication Key Agreement Protocol for WSNs in IoT Environments. Plos One , PLOS ONE | https://doi.org/10.1371/journal.pone.0232277 April 30, 2020. (SCI, 24/69 MULTIDISCIPLINARY SCIENCES).
  2. Iuon-Chang Lin, Chen-Yang Cheng, Hsiang-Yu Chen (2019, Oct). A Real-time Parking Service with Proxy Re-encryption in Vehicular Cloud Computing. Engineering Applications of Artificial Intelligence, Vol. 85, October 2019, PP 208-213. (SCI).
  3. Chen-Yang Cheng, Iuon-Chang Lin, Hao-Ju Wu (2019, Apr). Recommendation System to Identify Collusive Users in Online Auctions Using the Pollution Diffusion Method. Journal of Internet Technology, Volume 20 (2019) No.2 pp. 353-358. (SCI).
  4. Chen-Yang Cheng, Cheng-Ta Huang, Iuon-Chang Lin, Hung-Huei Hsu, and Yi-Xiang Jie (2019, Feb). An Efficient and Secure RFID Authentication Scheme for C1G2 Standard. Journal of Internet Technology, Vol. 20, No. 3, PP.963-973. (SCI). MOST 107-2410-H-005-018-MY2.
  5. Iuon-Chang Lin and Hsiao-Chi Chiang (2019, Feb). A novel sharing m-coupons with lightweight computations via cloud computing. Advances in Intelligent Systems and Computing: Web, Artificial Intelligence and Network Applications. (EI). MOST 107-2410-H-005-018-MY2.
  6. Ping-Kun Hsu, Mu-Ting Lin, Iuon-Chang Lin (2019, Feb). Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage. Computer and Information Science Communications Series: Computer Technologies and Application. (EI). MOST 107-2410-H-005-018-MY2.
  7. Lin, I.C. and Cheng, C. Y. (2018, Apr). Case study of physical internet for improving efficiency in solar cell industry. Journal of Ambient Intelligence and Humanized Computing, Vol. 9, No. 2, PP.285-294. (SCI, 53/82, TELECOMMUNICATIONS ).
  8. Jen-Ho YANG, Iuon-Chang LIN, Po-Ching CHIEN (2017, Oct). Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery. Informatica, vol. 28, no. 2, pp. 375-386, 2017. (SCI, 47/254, 18.5%MATHEMATICS, APPLIED). MOST 106-2622-8-005-006-TM1.
  9. Iuon-Chang Lin and Tzu-Chun Liao (2017, Sep). A Survey of Blockchain Security Issues and Challenges. International Journal of Network Security, Vol.19, No.5, PP.653-659, Sept. 2017.. (EI). MOST 106-2622-8-005-006-TM1.
  10. Iuon-Chang Lin, Yang-Te Lee, Chen-Yang Cheng (2017, Sep). (r,QI)-transform:Reversible Data Anonymity Base on Numeric Type of Data in Outsourced Database. Journal of Electronic Science and Technology , DOI: 10.11989/JEST.1674-862X.60804020. (EI). MOST 106-2622-8-005-006-TM1.
  11. Chi, YY.L., Ho, Y.F., Lin, I.C. and Hwang, M.S. (2016, Sep). Development of Comment Correlation Matrix for Mobile Application Recommendation. Journal of Electronic Science and Technology, Vol.14, No.3, Sept. 2016. . (EI). MOST 106-2622-8-005-006-TM1.
  12. Chia-Chi Wu, Iuon-Chang Lin, and Ya-Hui Liu (2016, Aug). Multi-user Searchable Encryption Scheme For Text Document. International Journal of Natural Sciences Research, Vol.4, No.4, PP.68-74, 2016.DOI:18488/journal.63/2016.4.4/63.4.68.74..
  13.  IUON-CHANG LIN, YANG-TE LEE (2016, Apr). R-TRANSFORM: REVERSIBLE DATA ANONYMITY BASE ON NUMERIC TYPE OF DATA IN OUTSOURCED DATABASE. International Journal of Advances in Electronics and Computer Science , Volume-3, Issue-4, pp. 21-24.. MOST 105- 2410-H-005-023-MY2.
  14. Lin, I.C., Chi, Y.L., Chuang, H.C., and Hwang, M.S. (2016, Mar). The Novel Features for Phishing Based on User Device Detection. Journal of Computers, Vol.11, No.2, pp.109-115.
  15. Lin, I.C., Lin, Y.W. and Wu, Y.S. (2016, Mar). Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process. Journal of Computers, Vol.11, No.2, pp.124-131.
  16. Chang, C.C., Lin, I. C., and Wu, C. C. (2015, Nov). A Multi-Purpose Key Agreement Scheme in Ubiquitous Computing Environments. Mobile Information Systems, doi:10.1155/2015/934716.. (SCI29/82,TELECOMMUNICATIONS).
  17. Lin, I. C., Hsu, H. H. and Cheng, C. Y. (2015, Oct). A Cloud-Based Authentication Protocol for RFID Supply Chain Systems. Journal of Network and Systems Management, Vol.23, No.4, PP.978-997, October 2015.. (SCI, 44/82, TELECOMMUNICATIONS).
  18. Cheng, C.Y., Lin, I. C., and Huang, S. Y. (2015, Aug). An RSA-Like Scheme for Multi-User Broadcast Authentication in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, doi:10.1155/2015/743623. (SCI, 52/82, TELECOMMUNICATIONS).
  19. Chi, Y.L., Lin, I.C., Chen, C.H. (2015, Apr). The Secure Transaction Protocol in NFC Card Emulation Mode. Journal of Network Security, Vol. 17, No. 4, 2015, pp. 431-438.. (EI).
  20. Iuon-Chang Lin, Hao-Ju Wu, Shu-Fen Li, Chen-Yang Cheng (2015, Apr). A Fair Reputation System for Use in Online Auctions. Journal of Business Research, Vol.68, No.4, PP.878-882, April, 2015.. (SSCI, 40/120, BUSINESS). MOST 100-2410-H-005-046.
  21. Iuon-Chang lin, Yi-Lun Chi, Hsiang-Yu Chen, Min-Shiang Hwang (2015, Mar). A Preference-based Privacy Protection for Value-added Services in Vehicular Ad Hoc Networks. Computer Science and Information Technology, Vol. 3, No. 3, 2015, pp. 59-65.
  22. 林詠章,林久弘(2018年07月)。以太坊智能合約安全之研究 。資訊安全通訊,24:3 2018.07[民07] 頁16-33。

  1. Iuon-Chang Lin, Yung-Chen Chou, and Tzu-Chun Liao (2019, Feb). Appling Block-Chain for Bike Sharing Smart Contract. 13th International Conference on Science, Engineering and Technology (ICSET), Sapporo, Japan.
  2. Yi-Hui Chen; Shih-Hsin Chen; Iuon-Chang Lin Yi-Hui Chen (2018, Apr). Block Chain based Smart Contract for Bidding System. 2018 IEEE International Conference on Applied System Innovation, Tokyo,Japan.
  3. Iuon-Chang Lin, Hsuan Shih, Jui-Chun Liu, Yi-Xiang Jie (2017, Oct). Food Traceability System Using Blockchain. IASTEM-International Conference on Recent Advances in Engineering and Technology (ICRAET), Tokyo, MOST 106-2622-8-005-006-TM1.
  4. Yen-Ting Lin and Iuon-Chang Lin (2017, Apr). Locations-Content-aware Collaborative Filtering on GPS trajectory. The 2nd Asian Social Sciences & Technology Conference, Osaka, Japan. MOST 106-2622-8-005-006-TM1.
  5. Chin-Chen Chang, Iuon-Chang Lin, Yu-Wei Su and Yanjun Liu, (2017, Jan). A Digital Gift Certificate Scheme with Conditional Anonymity. 2017 The International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2017) , January 14-16, 2017 in Wuhan, China. MOST 106-2622-8-005-006-TM1.
  6. Iuon-Chang Lin, Cheng-Yi Tsai, Fang-Yi Shan, Yu-Shiang Hsu and Min-Shiang Hwang (2016, Dec). The Analysis of E-book Business Models in Taiwan . Advances in Education Research, 2016 5th EEM International Conference on Hospitality, Leisure, Sport, Tourism & Education (EEM-HLSTE 2016), Nadi, Fiji on December 20-21, 2016. MOST 106-2622-8-005-006-TM1.
  7. 林詠章、吳明峰(2019年11月)。利用區塊鏈於螢幕側錄資料保全。全國計算機會議 NCS2019,金門。
  8. 林詠章、馬宗成(2019年05月)。企業數位證據保全與鑑識。第二十九屆全國資訊安全會議(CISC 2019),台中。