大同大學 教職員資料 (Information of TTU Faculty & Staff)
 
基本資料 (Basic Info)
姓名:黃國軒 助理教授
單位:資訊工程學系  
電話:  
手機:  
email:khhuang@ttu.edu.tw  
網址:  
 
專長 (Specialty)
密碼學 Cryptography
資訊安全 Information Security
物聯網 Internet of Things
 
獎勵 (Award)
97學年度教學優良教師 (大同大學 2009-10-14)
 
研究計畫 (Project)
大同寶寶機器人延伸優化計畫(子計畫八)機器人室內定位與領航
大同大學 3107N0045 執行期間:2019-04-01 ~ 2019-12-31
銀髮族智慧購物車(3/3)
科技部 MOST 108-3011-F-036-00 執行期間:2019-02-01 ~ 2020-01-31
行動寬頻課程推廣計畫-物聯網技術
教育部 1107N0060 執行期間:2018-12-01 ~ 2020-01-31
資安實戰演練中心維運
協志聯合科技股份有限公司 E10708-I01-004 執行期間:2018-08-01 ~ 2019-07-31
線上採購與銷售助理
精技電腦股份有限公司 E10708-I03-015 執行期間:2018-08-01 ~ 2019-07-31
銀髮族智慧購物車(2/3)
科技部 MOST 107-3011-F-036-001 - 執行期間:2018-02-01 ~ 2019-01-31
適合銀髮族之語音記事與提醒系統
大同大學 B107-I05-040 執行期間:2018-01-01 ~ 2018-11-30
自然語意辨識與家電控制
仁寶電腦工業股份有限公司 E10701-I05-036 執行期間:2017-10-01 ~ 2018-03-31
適合銀髮外送點餐系統
科技部 執行期間:2017-07-01 ~ 2018-02-28
個人健康紀錄管理系統
大同大學 B106-105-032 執行期間:2017-01-01 ~ 2017-11-30
應用數位版權管理機制於網路電視之研究
大同大學 B100-I08-037 執行期間:2011-09-01 ~ 2012-07-15
具安全性與有效率之供應鏈管理平台建置
國科會 NSC 100-2221-E-036 -030 -  執行期間:2011-08-01 ~ 2012-07-31
具安全與隱私保護之RFID供應鏈管理系統
大同大學 B99-I07-044 執行期間:2010-09-01 ~ 2011-07-15
安全且可信賴的企業數位版權管理系統之研究(2/2)
國科會 NSC 98-2218-E-036-003-MY2 執行期間:2010-08-01 ~ 2011-07-31
安全且可信賴的企業數位版權管理系統之研究(1/2)
國科會 NSC 98-2218-E-036-003-MY2 執行期間:2009-11-01 ~ 2010-07-31
 
期刊論文 Refereed Paper
1. Chung-Yen Wu, Kuo-Hsuan Huang, and Shang-Lin Hsieh, "Designing a System for Smart Controlled using AWS," International Journal of Advances in Electronics and Computer Science, Volume 6, Issue 4, pp. 65-69, Apr. 2019
2. Hsien-Cheng Chou, Hung-Chang Lee, Hwan-Jeu Yu, Fei-Pei Lai, Kuo-Hsuan Huang, and Chih-Wen Hsueh, "Password Cracking Based on Learned Patterns from Disclosed Passwords," International Journal of Innovative Computing, Information and Control, Volume 9, Number 2, February 2013 EI 
3. K. H. Huang, S. H. Hsieh, Y. J. Chang, F. P. Lai, S. L. Hsieh, and H. H. Lee, "Application of Portable CDA for Secure Clinical-document Exchange," Journal of Medical Systems, Vol. 34, No. 4, pp. 531-539, Aug. 2010 SCI 
4. Sung-Huai Hsieh, Po-Hsun Cheng, Chi-Huang Chen, Kuo-Hsuan Huang, Po-Hao Chen, Yung-Ching Weng, Sheau-Ling Hsieh, and Feipei Lai, "A Multi-Voting Enhancement for Newborn Screening Healthcare Information System," Journal of Medical Systems, Vol. 34. No. 4, pp. 727-733, Aug. 2010 SCI 
5. Y. F. Chung and K. H. Huang, "Chameleon Signature with Conditional Open Verification," International Journal of Innovative Computing, Information and Control, Vol. 5, No. 9, pp. 2829-2836, Sep. 2009 SCI 
6. K. H. Huang, Y. F. Chung, C. H. Liu, F. P. Lai, and T. S. Chen, "A Conference Key Agreement Protocol with Fault-tolerant Capability," Computer Standards and Interfaces, Vol. 31, No. 2, pp. 401-405, Feb. 2009 SCI EI 
7. Y. F. Chung, K. H. Huang, and T. S. Chen, "Threshold authenticated encryption scheme using labor-division signature," Computer Standards & Interfaces, Vol. 31, No. 2, pp. 300-304, February 2009 SCI EI 
8. K. H. Huang, Y. F. Chung, C. H. Liu, F. P. Lai, and T. S. Chen, "Efficient Migration for Mobile Computing in Distributed Networks," Computer Standards & Interfaces, Vol. 31, No. 1, pp. 40-47, January 2009 SCI EI 
9. J. C. Lin, K. H. Huang, F. P. Lai, and H. C. Lee, "Secure and efficient group key management with shared key derivation," Computer Standards & Interfaces, Vol. 31, No. 1, pp. 192-208, January 2009 SCI EI 
10. Y. F. Chung, K. H. Huang, H. H. Lee, F. P. Lai, and T. S. Chen, "Bidder-anonymous English Auction Scheme with Privacy and Public Verifiability," Journal of Systems and Software, Vol. 81, No. 1, pp.113-119, Jan. 2008 SCI EI 
11. Y. F. Chung, K. H. Huang, F. P. Lai, and T. S. Chen, "ID-based Digital Signature Scheme on the Elliptic Curve Cryptosystem," Computer Standards & Interfaces, Vol. 29, No. 6, pp. 601-604, Sep. 2007 SCI EI 
12. T. S. Chen, K. H. Huang, and Y. F. Chung, "Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme," Applied Mathematics and Computation, Vol.159, No.1, pp.147-155, Nov. 2004 SCI EI 
13. T. S. Chen, Y. F. Chung, and K. H. Huang, "A Traceable Proxy Multisignature Scheme based on the Elliptic Curve Cryptosystem," Applied Mathematics and Computation, Vol. 159, No. 1, pp. 137-145, Nov. 2004 SCI EI 
14. T. S. Chen, K. H. Huang, and Y. F. Chung, "A Practical Authenticated Encryption Scheme based on the Elliptic Curve Cryptosystem," Computer Standards & Interfaces, Vol. 26, No. 5, pp. 461-469, Sep. 2004 SCI EI 
15. T. S. Chen, K. H. Huang, and Y. F. Chung, "Digital Multi-signature Scheme based on the Elliptic Curve Cryptosystem," Journal of Computer Science and Technology, Vol. 19, No. 4, pp. 570-573, July 2004 SCI EI 
16. T. S. Chen, Y. F. Chung, and G. S. Huang, "Efficient Proxy Multisignature Schemes based on the Elliptic Curve Cryptosystem," Computers and Security, Vol. 22, No. 6, pp. 527-534, Oct. 2003 SCI EI 
17. T. S. Chen, Y. F. Chung, and G. S. Huang, "A Study of Proxy Digital Signature Scheme," Communications of IICM, Vol. 6, No. 1, pp. 69-84, March 2003
18. T. S. Chen, K. H. Huang, and Y. F. Chung, "A Study of Forward-secure Digital Signature Scheme," Communications of IICM, Vol.6, No.1, pp.19-34, March 2003
 
區域研討會論文 Domestic Conference Paper
1.王立昇、黃國軒, "基於高斯濾波的KNN演算法," Cyberspace聯合研討會, 2018
2.楊哲明、黃國軒, "基於Beacon定位之導航系統研製之機構為例," Cyberspace聯合研討會, 2018
3.黃國軒、魏梅菁, "應用於列車控制系統之安全認證機制," 第28屆全國資訊安全會議暨資安產業技術研討會, 2018