Profile of Dr. ¹ù¤@µû
I. ¾Ç¾ú (Education)
II. ¸g¾ú (Teaching and Industrial Experiences)
l
¸t¬ù¿«¬ì§Þ¤j¾Ç, ¸ê°T¤uµ{¨t, °Æ±Ð±Â (²{¾) 2004-¦Ü¤µ
l
·s®H§Þ³N¾Ç°|¹q¾÷¨t, ¹q¾÷¤uµ{¨t, ±M¥ôÁ¿®v (§t·s®H¤u±M) 1990-2003
±Â½Ò¬ì¥Ø
´¿Á¿±Â¹L¤§½Òµ{¡Gºô¸ô¦w¥þ³]p»PÀ³¥Î¡Bpºâ¾÷ºô¸ô¡Bpºâ¾÷·§½×¡B·L³B²z¾÷¡B¾÷²v¡B²Õ¦X»y¨¥¡B¹q¤l¾Ç¡B±MÃD¹ê°Èµ¥½Òµ{¡C
III. µÛ§@ (Publications)
¬ã¨s»â°ì (Research Area)
Cryptography¡BNetwork security¡BAuthentication protocol¡BSmart card application¡BWireless communication
¬ã¨sºKn (Research Summary)
1. Since the number of server providing the facilities for the user is usually more than one, the authentication protocols for multi-server environment are required for practical applications. Most of password authentication schemes for multi-server environment are based on static ID, so the adversary can use this information to trace and identify the user¡¦s requests. It is unfavorable to be applied to special applications, such as e-ecommerce. We develop a secure dynamic ID based remote user authentication scheme to achieve user¡¦s anonymity.
2.
With
the rapid growth of Internet service, the authentication of remote user becomes
an important issue for practical application. Recently, the pairings operations
on elliptic curve have received considerable attention. Until to now, there
have been many schemes published in the literature and each published scheme
has its own merits and demerits. Hence, we develop a secure and efficient
scheme of remote user authentication based on bilinear pairings.
3.
Voice over Internet Protocol (VoIP) has received
much attention and has become a real competitor to
traditional Public Switched Telephone Networks (PSTN). The Session Initial Protocol
(SIP) is widely used as a signaling protocol based on HTTP-like
request/response exchange for VoIP. With the popularity
of SIP, the end user¡¦s authentication is an important research issue. The original authentication scheme for SIP typically uses HTTP Digest
authentication, which is vulnerable to some known attacks. Hence,
we
develop a secure
SIP authentication scheme using
self-certified keys (SCK) on elliptic curve. Due to using SCK, the proposed scheme avoids
the requirement of a large public key infrastructure (PKI), and then reduces
the amount of storage and computations in public key schemes.
¾Ç³N´Á¥Z (Journal Publications)
1. Y. P. Liao and C. M. Hsiao, ¡§A novel multi-server remote user authentication scheme using self-certified
public keys for mobile clients, ¡¨ Further Generation Computer System (FGCS)
(SCI, EI, ISSN :0167-739X, IF=2.365@2010) (Revised)
2.
Y. P. Liao and S. S. Wang, ¡§A new secure password authenticated key agreement
scheme for SIP using self-certified public keys on elliptic curves,¡¨ Computer Communications, vol. 33, issues 3, pp.
372-380, 2010(SCI, EI, ISSN :0140-3664, IF=0.884@2008) .
3. Y. P. Liao and S. S. Wang, ¡§A secure dynamic ID-based remote user
authentication scheme for multi-server Environments,¡¨ Computer Standards & Interfaces, vol. 31, no.1, pp. 24-29, 2009. (SCI,
EI, ISSN: 0920-5489, IF = 1.074@2008)
4.
Y. P. Liao and S. S. Wang, ¡§A
Robust User Authentication scheme with Anonymity using Smart Cards¡¨, Journal of St. John¡¦s
University, 2008. (ISSN 1817-1478)
5.
Y. P. Liao and S. S. Wang,
¡§An Effective Authentication Scheme with Anonymity for Wireless Environments¡¨,
Journal of St. John¡¦s University, vol. 24, pp. 35-40, 2007. (ISSN 1817-1478)
6.
Y. P. Liao and S. S. Wang, ¡§The
Security Analysis and Improvement for Remote User Authentication Scheme using
Smart Cards¡¨, Journal of St. John¡¦s University, vol. 23, pp. 105-113, 2006.
(ISSN 1817-1478)
¾Ç³N·|ij (Conference)
1.
Y. P. Liao and C. M. Hsiao,
¡§ The improvement of ID-based Remote
user authentication scheme using bilinear pairings¡¨, ¥þ°êpºâ¾÷·|ij (NCS 2011), ¹Å¸q¤j¾Ç, 2011, December 2~3.
2.
Y. P. Liao and C. M. Hsiao,
¡§ The improvement of ID-based Remote
user authentication scheme using bilinear pairings¡¨, IEEE IEME2011, Xianning, China, 2011, April 16~18 (EI, ISBN: 1-4244-1272-2)
3.
C.
M. Hsiao and Y. P. Liao, ¡§Domain-Based
Causal Ordering Group Communication in Wireless Hybrid Networks¡¨, ACM
ICUIMC 2011, Seoul, Korea, February 21~23.
4.
Y. P. Liao and S. S. Wang,
¡§A robust password-based
remote user authentication scheme using bilinear pairings without using smart
cards¡¨ 2010
International Computer Symposium (ICS
2010), ¦¨¥\¤j¾Ç, 2010,
December 16~18.
5.
Y. P. Liao and S. S. Wang,
¡§An ID-based
remote user authentication scheme without using smart cards for multi-server
environment,¡¨ ¥þ°êpºâ¾÷·|ij (NCS 2009), ¥x¥_¤j¾Ç, 2009.
6. Y. P. Liao and S. S. Wang, ¡§A Robust Remote User Authentication scheme with Smart Cards based on
Elliptic Curve Cryptosystem¡¨, TANET 2009,¥xÆWºô¸ô¬ã°Q·|,¹ü¤Æ®v¤j, 2009 (³Ì¨Î½×¤åÔ¿ï).
7.
Y. P. Liao and S. S. Wang, ¡§A
Secure Authentication protocol for SIP¡¨, ICIM2009, ²Ä¤G¤Q©¡°ê»Ú¸ê°TºÞ²z¾Ç³N¬ã°Q·|, ¥@·s¤j¾Ç, 2009.
8.
Y. P. Liao and S. S. Wang, ¡§An
Improved Remote User Authentication using Bilinear Pairings¡¨ , 2009
Symposium on Application and Development of Management Information System and
Personal Training, St. John¡¦s University, 2009.
9.
Y. P. Liao and S. S. Wang, ¡§¹ï¦h¦øªA¾¹Àô¹Ò§Q¥ÎÂù½u©Ê°t¹ï©Ò´£¥XµL¶·¾ÌÃÒ¥B°·¥þªº»·ºÝ¨Ï¥ÎªÌÅçÃÒ¤è®×¡¨, ²Ä¤©¡¬y³q»P¥þ²y¹BÄw½×¤å¬ã°Q·|, ¥x¤¤§Þ³N¾Ç°|, 2008.
10.Y. P. Liao and S. S. Wang, ¡§¤@Ө㦳²V¦X¤½Æ_±K½X¨t²Î¥B¦³®Ä²vªº±K½XÅçÃÒ¨ó©w¡¨, 2008²Ä¤@¬É·í¥N¹q¤l°Ó°ÈÀ³¥Î»P¹ê°È¬ã°Q·|, ¤¤¿³¤j¾Ç, 2008.
11.Y. P. Liao and S. S. Wang, ¡§UMTS¥þ²y¦æ°Ê³q°T¨t²Î¨¤ÀÅçÃҤΪ÷Æ_¨óij¨ó©w¤§§ï¶i¡¨,
2008¸ê°TºÞ²z»P¹ê°ÈÀ³¥Îµo®iº[¸ê°T¤H¤~°ö¨|¬ã°Q·|, ¸t¬ù¿«¬ì¤j, 2008. (ISBN:978-986-
12.Y. P. Liao and S. S. Wang, ¡§A New
Remote User Authentication Scheme based on Bilinear Pairings for Multi-server
Environment¡¨, 2007 ¥þ°êpºâ¾÷·|ij, ¨È¬w¤j¾Ç, 2007.
13.
Y. P. Liao, ¡§A Secure and
Efficient Scheme of Remote User Authentication Based on Bilinear Pairings¡§,
IEEE TENCON 2007,
14.
Y. P. Liao and S. S. Wang, ¡§Cryptanalysis of
Remote User Authentication Scheme with smart cards Using Bilinear Pairings and
ECC¡¨, 2007 The Third National Workshop on Internet and Communication
Technology, pp.83-88, 2007.
15.
Y. P. Liao and S. S. Wang, ¡§A Secure and
Efficient User Authentication Scheme based on Bilinear Pairings with Smart
Cards¡¨, 2007 ¶Ç¼½§Þ³N»P¼Æ¦ì¤º®e¬ã°Q·|.(ISBN:986816683-7)
16.
Y. P. Liao and S. S. Wang,¡¨ A New
Dynamic ID-based Remote User Authentication Scheme Using Smart Cards¡¨, The 16th Information Security Conference,
°Ñ»P°ê»Ú´Á¥Z½×¤å¼f½Z
1.
¾á¥ôSecurity &
Communication Networks°ê»Ú¾Ç³N´Á¥ZReviewer (2011)
2.
¾á¥ôComputer Standards
& Interfaces°ê»Ú¾Ç³N´Á¥ZReviewer (2011)
3.
¾á¥ôTransactions on
Internet and Information Systems°ê»Ú¾Ç³N´Á¥ZReviewer (2011)
4.
¾á¥ôInformation Fusion °ê»Ú¾Ç³N´Á¥ZReviewer (2010)
5.
¾á¥ôJournal of
Communication and Networks °ê»Ú¾Ç³N´Á¥ZReviewer (2010)
6.
¾á¥ôSecurity and
Communication °ê»Ú¾Ç³N´Á¥ZReviewer (2010)
7.
¾á¥ôInformation
Science°ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C
8. ¾á¥ôComputation networks °ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C
9.
¾á¥ôIEEE Computation Letter °ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C
10.¾á¥ôComputation & Electrical Engineering °ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C
11.¾á¥ôSecurity and Communication °ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C
¬ã¨spµe®×º[²£¾Ç®× (Funded Research Grant Proposals and the Like)
1. ¡y«È»s¤Æª«¬y¸ê°TºÞ²z¨t²Î¤§³W¹º¡z²£·~ÃöÃhpµe¡A°õ¦æ´Á¶¡99/7~99/12
2. ¡y¶}µo¾ã¦X«¬ª«¬y°t°e»P°lÂܺ޲z¨t²Î¡z²£¾Ç¦X§@®×¡A °õ¦æ´Á¶¡99/4~99/10
3.
´¼¼z¥dº|¬}ªº¬ã¨s¤ÀªR»P¸Ñ¨M¹ïµ¦¡z²£¾Ç¦X§@®×¡Apµe½s¸¹:960608, °õ¦æ´Á¶¡
±M·~¨ü°V¤Î»{ÃÒ
1. ¡yITEºô¸ô³q°TÃҷӱЮv¬ã²ßÀç¡z¬ã²ßÃÒ®Ñ(98)¡C
2. ¦Ò¨ú¸gÀÙ³¡¸ê°T±M·~¤Hû(ITE)ºô¸ô³q°TÃþÃÒ·Ó(98)¡C
3. ±Ð¨|³¡«e¤´¹¤ù¨t²Î³]p¤H¤~¤§¡y´O¤J¦¡¦h®Ö¤ß¨t²Î»P³nÅé¬ã²ß½Òµ{¡z¬ã²ßÃÒ®Ñ(99)¡C
4. ´O¤J¦¡¨t²Î³]p°V½m¥¥x¹ê§@½Òµ{(⶧¬ì§ÞSPICE3200) ¬ã²ßÃÒ®Ñ(99)
5. ¡y±Ð¨|³¡¤j±M°|®Õ¼Æ¦ì¾Ç²ß±À¼s»P¼Æ¦ì¾Ç²ß¸ó®Õ¦X§@pµe¡z¬ã²ßÃÒ®Ñ(99)
6. ¡yPSoC´O¤J¦¡·L¹q¸£±±¨îµo®i¨t²Î¡z¬ã²ßÃÒ®Ñ(99)
7. ¡y3ds Max¦h´CÅéÃҷӱЮv¬ã²ßÀç¡z¬ã²ßÃÒ®Ñ(100)¡C
8. ¦Ò¨ú3ds Max¦h´CÅéÃÒ·Ó(100)
9. ¦Ò¨ú·L³nMTA(Microsoft Technology Associate)
Security Fundamentals¤ÎNetworking Fundamentals¨â±iÃÒ·Ó(100)¡C
10.
¡y¹q¸£¸ê®Æ®w¹ê°È³]p¬ã²ßÀç¡z32hr¬ã²ßÃÒ®Ñ(100)
IV. ¦Û¶Ç (Biography)
Yi-Pin
Liao
received his Ph.D. in Graduate Institute of Communications Engineering from the
V. Àò¼ú (Award)
1.Àò¿ï¸t¬ù¿«¬ì§Þ¤j¾Ç97¾Ç¦~±Ð¾Ç¨ô¶VpµeÀu¨}±Ð®v¡C
2.Àò¿ï¸t¬ù¿«¬ì§Þ¤j¾Ç97¾Ç¦~Àu¨}¦Ñ®v¡C
3.Àò¿ï¸t¬ù¿«¬ì§Þ¤j¾Ç95¾Ç¦~±Ð¾Ç¨ô¶VpµeÀu¨}±Ð®v¡C
4.Àò¿ï¸t¬ù¿«¬ì§Þ¤j¾Ç94¾Ç¦~«×Àu¨}¾É®v¡C
5.Àò¿ï²Ä28©¡¸ê²`Àu¨}±Ð®v¡C
6.82¦~«ü¾É¾Ç¥ÍÀò±Ð¨|³¡±MÃD¤ñÁɨΧ@¡C
@ Ápµ¸¤è¦¡ (Contact)
¡±
Address:
499, Sec. 4, Tam King Road Tamsui, Taipei, R.O.C ,
Department of Computer Science and Information Engineering, St. John's
University, Taipei 106, Taiwan
¡±
¡±