Profile of Dr. ¹ù¤@µû

I.      ¾Ç¾ú (Education)

  • ¤j¦P¤j¾Ç³q°T¤uµ{¬ã¨s©Ò³Õ¤h¡A2004/9~2010/1
  • ¤j¦P¤j¾Ç¹q¾÷¤uµ{¬ã¨s©ÒºÓ¤h¡A1988/9-1990/6
  • ²H¦¿¤j¾Ç¹q¤l¤uµ{¾Ç¨t¾Ç¤h¡A1984/9-1988/6

II.   ¸g¾ú (Teaching and Industrial Experiences)

l    ¸t¬ù¿«¬ì§Þ¤j¾Ç, ¸ê°T¤uµ{¨t, °Æ±Ð±Â (²{¾) 2004-¦Ü¤µ

l    ·s®H§Þ³N¾Ç°|¹q¾÷¨t, ¹q¾÷¤uµ{¨t, ±M¥ôÁ¿®v (§t·s®H¤u±M) 1990-2003

±Â½Ò¬ì¥Ø

´¿Á¿±Â¹L¤§½Òµ{¡Gºô¸ô¦w¥þ³]­p»PÀ³¥Î¡B­pºâ¾÷ºô¸ô¡B­pºâ¾÷·§½×¡B·L³B²z¾÷¡B¾÷²v¡B²Õ¦X»y¨¥¡B¹q¤l¾Ç¡B±MÃD¹ê°Èµ¥½Òµ{¡C

III.  µÛ§@ (Publications)

¬ã¨s»â°ì (Research Area)

Cryptography¡BNetwork security¡BAuthentication protocol¡BSmart card application¡BWireless communication

¬ã¨sºK­n (Research Summary)

1.          Since the number of server providing the facilities for the user is usually more than one, the authentication protocols for multi-server environment are required for practical applications. Most of password authentication schemes for multi-server environment are based on static ID, so the adversary can use this information to trace and identify the user¡¦s requests. It is unfavorable to be applied to special applications, such as e-ecommerce. We develop a secure dynamic ID based remote user authentication scheme to achieve user¡¦s anonymity.

2.          With the rapid growth of Internet service, the authentication of remote user becomes an important issue for practical application. Recently, the pairings operations on elliptic curve have received considerable attention. Until to now, there have been many schemes published in the literature and each published scheme has its own merits and demerits. Hence, we develop a secure and efficient scheme of remote user authentication based on bilinear pairings.

3.          Voice over Internet Protocol (VoIP) has received much attention and has become a real competitor to traditional Public Switched Telephone Networks (PSTN). The Session Initial Protocol (SIP) is widely used as a signaling protocol based on HTTP-like request/response exchange for VoIP. With the popularity of SIP, the end user¡¦s authentication is an important research issue. The original authentication scheme for SIP typically uses HTTP Digest authentication, which is vulnerable to some known attacks. Hence, we develop a secure SIP authentication scheme using self-certified keys (SCK) on elliptic curve. Due to using SCK, the proposed scheme avoids the requirement of a large public key infrastructure (PKI), and then reduces the amount of storage and computations in public key schemes.

¾Ç³N´Á¥Z (Journal Publications)

1.      Y. P. Liao and C. M. Hsiao, ¡§A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients, ¡¨  Further Generation Computer System (FGCS) (SCI, EI, ISSN :0167-739X, IF=2.365@2010) (Revised)

2.      Y. P. Liao and S. S. Wang, ¡§A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves,¡¨ Computer Communications, vol. 33, issues 3, pp. 372-380, 2010(SCI, EI, ISSN :0140-3664, IF=0.884@2008) .

3.    Y. P. Liao and S. S. Wang, ¡§A secure dynamic ID-based remote user authentication scheme for multi-server Environments,¡¨ Computer Standards & Interfaces, vol. 31, no.1, pp. 24-29, 2009. (SCI, EI, ISSN: 0920-5489, IF = 1.074@2008)

4.      Y. P. Liao and S. S. Wang, ¡§A Robust User Authentication scheme with Anonymity using Smart Cards¡¨, Journal of St. John¡¦s University, 2008. (ISSN 1817-1478)

5.      Y. P. Liao and S. S. Wang, ¡§An Effective Authentication Scheme with Anonymity for Wireless Environments¡¨, Journal of St. John¡¦s University, vol. 24, pp. 35-40, 2007. (ISSN 1817-1478)

6.      Y. P. Liao and S. S. Wang, ¡§The Security Analysis and Improvement for Remote User Authentication Scheme using Smart Cards¡¨, Journal of St. John¡¦s University, vol. 23, pp. 105-113, 2006. (ISSN 1817-1478)

¾Ç³N·|ij (Conference)

1.    Y. P. Liao and C. M. Hsiao, ¡§ The improvement of ID-based Remote user authentication scheme using bilinear pairings¡¨, ¥þ°ê­pºâ¾÷·|ij (NCS 2011), ¹Å¸q¤j¾Ç, 2011, December 2~3.

2.    Y. P. Liao and C. M. Hsiao, ¡§ The improvement of ID-based Remote user authentication scheme using bilinear pairings¡¨, IEEE  IEME2011, Xianning, China, 2011, April 16~18 (EI, ISBN: 1-4244-1272-2)

3.    C. M. Hsiao and Y. P. Liao, ¡§Domain-Based Causal Ordering Group Communication in Wireless Hybrid Networks¡¨, ACM ICUIMC 2011, Seoul, Korea, February 21~23.

4.    Y. P. Liao and S. S. Wang, ¡§A robust password-based remote user authentication scheme using bilinear pairings without using smart cards¡¨ 2010 International Computer Symposium (ICS 2010), ¦¨¥\¤j¾Ç, 2010, December 16~18.

5.    Y. P. Liao and S. S. Wang, ¡§An ID-based remote user authentication scheme without using smart cards for multi-server environment,¡¨ ¥þ°ê­pºâ¾÷·|ij (NCS 2009), ¥x¥_¤j¾Ç, 2009.

6. Y. P. Liao and S. S. Wang, ¡§A Robust Remote User Authentication scheme with Smart Cards based on Elliptic Curve Cryptosystem¡¨, TANET 2009,¥xÆWºô¸ô¬ã°Q·|,¹ü¤Æ®v¤j, 2009 (³Ì¨Î½×¤å­Ô¿ï).

7.    Y. P. Liao and S. S. Wang, ¡§A Secure Authentication protocol for SIP¡¨, ICIM2009, ²Ä¤G¤Q©¡°ê»Ú¸ê°TºÞ²z¾Ç³N¬ã°Q·|, ¥@·s¤j¾Ç, 2009.

8.    Y. P. Liao and S. S. Wang, ¡§An Improved Remote User Authentication using Bilinear Pairings¡¨ , 2009 Symposium on Application and Development of Management Information System and Personal Training, St. John¡¦s University, 2009.

9.    Y. P. Liao and S. S. Wang, ¡§¹ï¦h¦øªA¾¹Àô¹Ò§Q¥ÎÂù½u©Ê°t¹ï©Ò´£¥XµL¶·¾ÌÃÒ¥B°·¥þªº»·ºÝ¨Ï¥ÎªÌÅçÃÒ¤è®×¡¨, ²Ä¤­©¡¬y³q»P¥þ²y¹BÄw½×¤å¬ã°Q·|, ¥x¤¤§Þ³N¾Ç°|, 2008.

10.Y. P. Liao and S. S. Wang, ¡§¤@­Ó¨ã¦³²V¦X¤½Æ_±K½X¨t²Î¥B¦³®Ä²vªº±K½XÅçÃÒ¨ó©w¡¨, 2008²Ä¤@¬É·í¥N¹q¤l°Ó°ÈÀ³¥Î»P¹ê°È¬ã°Q·|, ¤¤¿³¤j¾Ç, 2008.

11.Y. P. Liao and S. S. Wang, ¡§UMTS¥þ²y¦æ°Ê³q°T¨t²Î¨­¤ÀÅçÃҤΪ÷Æ_¨óij¨ó©w¤§§ï¶i¡¨, 2008¸ê°TºÞ²z»P¹ê°ÈÀ³¥Îµo®iº[¸ê°T¤H¤~°ö¨|¬ã°Q·|, ¸t¬ù¿«¬ì¤j, 2008. (ISBN:978-986-6765-03-2)

12.Y. P. Liao and S. S. Wang, ¡§A New Remote User Authentication Scheme based on Bilinear Pairings for Multi-server Environment¡¨, 2007 ¥þ°ê­pºâ¾÷·|ij, ¨È¬w¤j¾Ç, 2007.

13.      Y. P. Liao, ¡§A Secure and Efficient Scheme of Remote User Authentication Based on Bilinear Pairings¡§, IEEE TENCON 2007, Taipei, Taiwan, 2007. (EI, ISBN: 1-4244-1272-2)

14.      Y. P. Liao and S. S. Wang, ¡§Cryptanalysis of Remote User Authentication Scheme with smart cards Using Bilinear Pairings and ECC¡¨, 2007 The Third National Workshop on Internet and Communication Technology, pp.83-88, 2007.

15.      Y. P. Liao and S. S. Wang, ¡§A Secure and Efficient User Authentication Scheme based on Bilinear Pairings with Smart Cards¡¨, 2007 ¶Ç¼½§Þ³N»P¼Æ¦ì¤º®e¬ã°Q·|.(ISBN:986816683-7)

16.      Y. P. Liao and S. S. Wang,¡¨ A New Dynamic ID-based Remote User Authentication Scheme Using Smart Cards¡¨, The 16th Information Security Conference, Taiwan, pp.88-91, 2006.

°Ñ»P°ê»Ú´Á¥Z½×¤å¼f½Z

1.  ¾á¥ôSecurity & Communication Networks°ê»Ú¾Ç³N´Á¥ZReviewer (2011)

2.  ¾á¥ôComputer Standards & Interfaces°ê»Ú¾Ç³N´Á¥ZReviewer (2011)

3.  ¾á¥ôTransactions on Internet and Information Systems°ê»Ú¾Ç³N´Á¥ZReviewer (2011)

4.  ¾á¥ôInformation Fusion °ê»Ú¾Ç³N´Á¥ZReviewer (2010)

5.  ¾á¥ôJournal of Communication and Networks °ê»Ú¾Ç³N´Á¥ZReviewer (2010)

6.  ¾á¥ôSecurity and Communication °ê»Ú¾Ç³N´Á¥ZReviewer (2010)

7.  ¾á¥ôInformation Science°ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C

8.  ¾á¥ôComputation networks °ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C

9.  ¾á¥ôIEEE Computation Letter °ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C

10.¾á¥ôComputation & Electrical Engineering °ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C

11.¾á¥ôSecurity and Communication °ê»Ú¾Ç³N´Á¥ZReviewer (2009)¡C

¬ã¨s­pµe®×º[²£¾Ç®× (Funded Research Grant Proposals and the Like)

1.  ¡y«È»s¤Æª«¬y¸ê°TºÞ²z¨t²Î¤§³W¹º¡z²£·~ÃöÃh­pµe¡A°õ¦æ´Á¶¡99/7~99/12

2.  ¡y¶}µo¾ã¦X«¬ª«¬y°t°e»P°lÂܺ޲z¨t²Î¡z²£¾Ç¦X§@®×¡A °õ¦æ´Á¶¡99/4~99/10

3.      ´¼¼z¥dº|¬}ªº¬ã¨s¤ÀªR»P¸Ñ¨M¹ïµ¦¡z²£¾Ç¦X§@®×¡A­pµe½s¸¹:960608, °õ¦æ´Á¶¡2007/7/1~2007/12/12

±M·~¨ü°V¤Î»{ÃÒ

1.  ¡yITEºô¸ô³q°TÃҷӱЮv¬ã²ßÀç¡z¬ã²ßÃÒ®Ñ(98)¡C

2.  ¦Ò¨ú¸gÀÙ³¡¸ê°T±M·~¤H­û(ITE)ºô¸ô³q°TÃþÃÒ·Ó(98)¡C

3.  ±Ð¨|³¡«e¤´¹¤ù¨t²Î³]­p¤H¤~¤§¡y´O¤J¦¡¦h®Ö¤ß¨t²Î»P³nÅé¬ã²ß½Òµ{¡z¬ã²ßÃÒ®Ñ(99)¡C

4.  ´O¤J¦¡¨t²Î³]­p°V½m¥­¥x¹ê§@½Òµ{(­â¶§¬ì§ÞSPICE3200) ¬ã²ßÃÒ®Ñ(99)

5.  ¡y±Ð¨|³¡¤j±M°|®Õ¼Æ¦ì¾Ç²ß±À¼s»P¼Æ¦ì¾Ç²ß¸ó®Õ¦X§@­pµe¡z¬ã²ßÃÒ®Ñ(99)

6.  ¡yPSoC´O¤J¦¡·L¹q¸£±±¨îµo®i¨t²Î¡z¬ã²ßÃÒ®Ñ(99)

7.  ¡y3ds Max¦h´CÅéÃҷӱЮv¬ã²ßÀç¡z¬ã²ßÃÒ®Ñ(100)¡C

8.  ¦Ò¨ú3ds Max¦h´CÅéÃÒ·Ó(100)

9.  ¦Ò¨ú·L³nMTA(Microsoft Technology Associate) Security Fundamentals¤ÎNetworking Fundamentals¨â±iÃÒ·Ó(100)¡C

10.   ¡y¹q¸£¸ê®Æ®w¹ê°È³]­p¬ã²ßÀç¡z32hr¬ã²ßÃÒ®Ñ(100)

 

 

 

 

 

 

IV.   ¦Û¶Ç (Biography)

Yi-Pin Liao received his Ph.D. in Graduate Institute of Communications Engineering from the Tatung University, Taipei, Taiwan, R.O.C in 2010. He is currently a associate professor in the Department of Computer Science and Information Engineering at St. John¡¦s University, Taipei, Taiwan, R.O.C. His current research interests include cryptosystem, network security, wireless communication, remote user authentication, smart card application.

V.   Àò¼ú (Award)

1.Àò¿ï¸t¬ù¿«¬ì§Þ¤j¾Ç97¾Ç¦~±Ð¾Ç¨ô¶V­pµeÀu¨}±Ð®v¡C

2.Àò¿ï¸t¬ù¿«¬ì§Þ¤j¾Ç97¾Ç¦~Àu¨}¦Ñ®v¡C

3.Àò¿ï¸t¬ù¿«¬ì§Þ¤j¾Ç95¾Ç¦~±Ð¾Ç¨ô¶V­pµeÀu¨}±Ð®v¡C

4.Àò¿ï¸t¬ù¿«¬ì§Þ¤j¾Ç94¾Ç¦~«×Àu¨}¾É®v¡C

5.Àò¿ï²Ä28©¡¸ê²`Àu¨}±Ð®v¡C

6.82¦~«ü¾É¾Ç¥ÍÀò±Ð¨|³¡±MÃD¤ñÁɨΧ@¡C

@ Ápµ¸¤è¦¡ (Contact)

¡±  Address:

499, Sec. 4, Tam King Road Tamsui, Taipei, R.O.C , Department of Computer Science and Information Engineering, St. John's University, Taipei 106, Taiwan

¡±   +886-2-28013131 ext. 6784

¡±   newsun87@mail.sju.edu.tw