I-Te Yiter Chen Publications
    Journal Papers

  1. Jer-Min Tsai, I-Te Chen, Ying-Fong Huang and Cheng-Che Lin*, "Watermarking Technique for Improved Management of Digital Medical Images," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 18, No. 6, pp. 785-799, December, 2015. [EI]
  2. Jinn-Tsong Tsai, Yi-Lung Chiang, I-Te Chen, and Jyh-Horng Chou*, "Genetic Algorithm for Optimal Resolution Planning in DOE-based Taguchi Method," Journal of Chinese Society of Mechanical Engineers, Accepted 2014. (IF=0.274, Engineering, Mechanical 114/125) [SCI]
  3. Shi HY, Hwang SL, Lee IC, Chen IT, Lee KT,* Lin CL, "Trends and Outcome Predictors after Traumatic Brain Injury Surgery: A Nationwide Population-Based Study in Taiwan," Journal of Neurosurgery, Accepted 2014.(SCI, 1st Revision, IF=3.148, SURGERY 21/198)
  4. I-Te Chen “Random Numbers Generated from Audio and Video Sources,” Vol. 2013, Article ID: 285373, Mathematical Problems in Engineering, 2013. IF: 1.383, ranking: 23/90 (25.56%) [SCI]
  5. I-Te Chen, Jinn-Tsong Tsai, Ching-Feng Wen and Wen-Hsien Ho*, “Artificial neural network with hybrid Taguchi-genetic algorithm for nonlinear MIMO model of machining processes”, Int. J. of Innovative Computing, Information and Control, Vol. 9, No.4, pp.1455-1475, April, 2013. [SCIE]
  6. I-Te Chen, Jer-Min Tsai, and Jengnan Tzeng*, “Re-encryption method designed by Row Complete Matrix,” Mathematical Problems in Engineering, Vol. 2012, Article ID 402890. [SCI] IF: 0.777, ranking: 42/90 (46.67%)
  7. Jer-Min Tsai, Jengnan Tzeng, and I-Te Chen*, "Random Number Generated from white noise of Video," ICIC Express Letter, Vol.6, No.7, pp. 1827-1832, 2012. [EI]
  8. Wen-Hsien Ho, Shinn-Horng Chen, I-Te Chen, Jyh-Horng Chou and Chun-Chin Shuk, "Design of Stable and Quadratic-Optimal Static Output Feedback Controllers for TS-Fuzzy-Model- Based Control Systems: An Integrative Computational Approach," International Journal of Innovative Computing, Information and Control, (IJICIC-10-09039), Vol.8, No.1(A), pp. 403-418, January 2012,. [SCIE]
  9. Chieh-Fan Chen, Wen-Hsien Ho, Shu-Mei Yang, I-Te Chen and Hon-Yi Shi*, "Long-term prediction of emergency department revenue and visitor volume using autoregressive integrated moving average model", Computational and Mathematical Methods in Medicine, 2011, Article ID 395690. [SCI, EI] IF:0.814
  10. Ming-Hsin Chang, I-Te Chen*, and Ming-Te Chen, "Design of Proxy signature in ECDSA," Journal of Information Assurance and Security (JIAS), Vol.5 Issue 1, pp. 360-366. 2010.
  11. Yi-Shiung Yeh, Ting-Yu Huang, I-Te Chen, and Shih-Chin Chou, “Analyze SHA-1 in message schedule,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10(2007), No. 1, pp.1-7. Feb. 2007.
  12. Yi-Shiung Yeh, I-Te Chen, Ting-Yu Huang, and Chan-Chi Wang, “ Dynamic Extended DES,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9(2006), No.2, pp.321-330, Aug. 2006.
  13. I-Te Chen, Ming-Hsin Chang, and Yi-Shiung Yeh “ Design of proxy signature schemes in the Digital Signature Algorithm (DSA)”Journal of Information Science and Engineering, Vol. 22 No. 4, pp. 965-973 (July 2006)[SCIE/EI]
  14. I-Te Chen, and Yi-Shiung Yeh “ Security analysis of Transformed-Key Asymmetric Watermarking System,” IEEE Signal Processing Letters, Vol. 13, Issue 4, pp.213- 215, April 2006. [SCIE/EI]
  15. Yi-Shiung Yeh, I-Te Chen, and Chan-Chi Wang, “ Randomizing Encryption Mode,” Journal of Discrete Mathematical Sciences & Cryptography. Vol. 8(2005), No.3, pp.355-364.
  16. I-Te Chen, and Yi-Shiung Yeh, “ Proxy Signature Scheme Based on Quadratic Residues,” Asian Journal of Information Technology, Vol. 4 No. 5, pp. 541-549, May, 2005.
  17. Yi-Shiung Yeh, Ming-Hsin Chang, I-Te Chen and I-Chen Wu “ Schnorr Blind Signature Scheme based on Elliptic Curves, ” Asian Journal of Information Technology, Vol. 2 No. 3, pp.130-134, July-September, 2003.
  18. Yi-Shiung Yeh, Wei Shen Lai, and I-Te Chen, “ An N-D Cryptoscheme ,” Journal of Information & Optimization Sciences, Vol. 23, No.1, pp. 19-36,2002. [EI]
    Journal Papers (Chinese)

  1. 蔡哲民, 曾正男, 陳以德*, “參數式列完備矩陣之轉加密方法,”資訊安全通訊, Communications of the CCISA, Vol. 21 No. 4, pp.22-31, October, 2015.
  2. 曾正男, 陳以德*, "利用破壞自格函數的平滑性設計之亂數產生器,"資訊安全通訊, Communications of the CCISA, Vol 15 No. 1, pp.22-31, January , 2009.
  3. 簡文山、陳以德、郭乃文B楊哲銘" 可攜式電子病歷的初步安全基礎架構---以TMT為例," 資訊安全通訊, Communications of the CCISA, Vol 14 No. 4, pp.149-161, October 10, 2008
  4. 張靜芬, 郭宏亮, 陳以德, 盧天鴻* ”MRI作業場所的電磁輻射強度之調查,”中華民國環境保護學會學刊, Journal of the environmental protection society, Vol. 30 No. 2, pp. 114-122, Feb. 2007. ISSN: 0254-0010.
  5. Chan-Chi Wang, Wei Shen Lai, I-Te Chen, and Yi-Shiung Yeh,“一個同態墊塞機制,” Journal of Computers Vol.16 ,No.5 ,June 2005.

    Conference Papers

  1. Cheng-Yuan Wang, Wen-Yu Ho, Ying-Fong Huang, Jer-Min Tsai, I-Te Chen, and Jer-Chia Tsai, “Genetic-Psycho-Social-Biological Encounter (GPSBE) SOAP mind map approach for clinical reasoning and medical record: A pilot study for medical clerk ship in general internal medicine,” Association for Medical Education in Europe (AMEE), Poster Presentation. 24-28 30 August~3 September 2014.
  2. Jer-Min Tsai, I-Te Chen, and Jengnan Tzeng*, “Rounding error type random number generator designed by subspace projection,” International Workshop on Cloud Computing and Information Security (CCIS 2013), Paper ID: CS29252, pp.123-126, Shanghai, 2013.11-9~11.
  3. Yu-Hsien Chiu, Hao-Yun Kao, I-Te Chen, I-Nong Lee, Wen-Hsien Ho, Liang-Yu Chen, Pin-Han Huang, Sin-Hao Chen, Chih-Yun Liu, Hsiao-Yan Lu, “A Body-Sensed Motor Assessment System for Stroke Upper-Limb Rehabilitation: A Preliminary Study,” 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp.3819- 3824, 13-16 Oct. 2013.
  4. Jer-Min Tsai, I-Te Chen, Ying-Fong Huang and Cheng-Che Lin*, “Watermarking Technique for Improved Management of Digital Medical Images,” The Second Cross-Straits Conference on Information Security (CSCIS 2013), pp.13-25, 2013. 9.11~13.
  5. Shi, H.-Y, Tsai, J.-T, Ho, W.-H, Wang, S.-C, Chen, I-Te, Lee, K.-T, “Comparison of artificial neural network and logistic regression models for predicting in-hospital survival after hepatocellular carcinoma surgery,” Society of Instrument and Control Engineers of Japan, SICE 2012, Article number:6318640, pp. 1262-1265, Akita, 2012.8.20~23.
  6. Jengnan Tzeng, Jer-Min Tsai and I-Te Chen* “Secure File Sharing in the Cloud by Row Complete Matrix Re-encryption Method,” Innovative Management, Information & Production in Otaru (IMIP2011 Excellent paper award), pp.13-24, October 8-10, 2011.
  7. I-Te Chen, Jer-Min Tsai, and Jengnan Tzeng, “Audio Random Number Generator and its Application,” International Conference on Machine Learning and Cybernetics (ICMLC 2011), pp.1678-1683, July 10-13, 2011. [EI]
  8. Jer-Min Tsai, I-Te Chen*, and Jengnan Tzeng, “Random number generated from white noise of webcam,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), September 12-14, 2009.
  9. Jengnan Tzeng, I-Te Chen*, and, Jer-Min Tsai “Random Number Generator designed by the divergence of scaling functions,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), September 12-14, 2009.
  10. Ming-Hsin Chang and I-Te Chen, Ming-Te Chen "Proxy-protected signature scheme based on the ECDSA," (ISDA 2008) Vol.3 pp. 17~22, 2008.11.26-28.
  11. I-Te Chen, Yi-Shiung Yeh, and Ming-Hsin Chang, “ Proactive secret sharing proxy signature scheme with proxy share recovery,” International Association for Computer Information Systems (IACIS) Pacific 2005. pp.52-58. 2005.5.20.
    Conference Papers (Chinese)

  1. 蔡哲民, 曾正男, 陳以德*, “參數式列完備矩陣之轉加密方法,” 全國資訊安全會議 (CISC2015), pp. 129-133, 2015.5.28~29.
  2. 蔡哲民, 陳以德, 楊東霖, 劉澔暐, “以手機搖動亂數為基礎的LBS餐廳選擇器,” NCS 2013.
  3. 林皇辰, 黃英峰*, 鍾相彬, 陳以德, 蔡哲民, “核子醫學全身骨掃描及鎵-67掃描影像融合,” International Symposium on Frontier Biomedical and Molecular Imaging(ISFBMI), Poster. Nov. 5-6, 2011.
  4. 盧天鴻, 陳以德, 黃英峰, 蔡哲民, 林正哲* ”運用Watermark 增進電子病歷影像之安全性,”第十四屆電子商務研討會, 2010.10.30.
  5. 陳以德, 曾正男, 蔡哲民*, ”適用於多媒體時代的亂數產生器,” 2010 International Conference on Multimedia Communication Technology and Application (IMCTA 2010),台南, pp.35-42, 2010.10.29
  6. 李正崙, 朱慧媛, 孫靖婷, 楊縢清, 廖晏辰, 莊峻鴻, 陳以德*, 陳明德, “結合憑證之安全電子病歷傳輸系統,” 全國計算機會議National Computer Symposium (NCS 2009), 2009.11.27~28
  7. 葉義雄, 陳以德, 黃定宇, 及周士欽, “ 分析與改進SHA-1 的訊息處理模式,” 全國資訊安全會議ISC2005, 2005.6.9
  8. 陳以德, 李正國 “利用層級分析法進行國中生教育類網站評鑑,” 「學習與創造.教育與創新」國際研討會論文集, pp. 354-364, 2005.5.20.
    Patent(獲證)
  1. 美國發明專利(US 13/364,797, 公開號: US 2013/0204915A1, 授權US 8793296 B2):Random number generating method, 2014-07-29
  2. 美國發明專利(US 13/422,159, 公開號: US2013/0246789A1, 授權US8533493 B1):Method for Securing Transmission Data, 2013-9-10
  3. 中華民國發明專利(證號: I462009):一種影音雙模亂數產生方法與系統, 2014-11-21
  4. 中華民國發明專利(證號:I488476):基於完整列矩陣之再加密方法, 2013-04-01公開2015-06-11獲證
  5. 中華民國發明專利(證號:I501189):擬人化醫療資訊紀錄方法及輔助診療系統2014-3-14
  6. 中華民國發明專利(公開號: 201443818):目標導向復健輔助系統與其工作設定方法, 2014-11-16

      Patent(申請中)
    1. 發明專利(公開號: 201445493):一種自主復健動作量化評估系統, 2013-05-20
    2. 發明專利(申請號:):一種擴增實境動作編輯與評估系統2013-8-5
    3. 美國發明專利(公開號:US-2015-0261925-A1 ):Avatar-based Charting System for Assisted Diagnosis 2014-3-14
        Submitted Papers

      1. Ming-Hsin Chang, I-Te Chen, and Yi-Shiung Yeh, “Partially Blind Threshold Signature with Low Computation”(Submit to Computer Systems, Science and Engineering) 2003.2.6
      2. Yi-Shiung Yeh, and I-Te Chen, “Padding problem solution on block ciphers with homophony approach,” (Submit to IPL) 2004.4.20
      3. Yi-Shiung Yeh, and I-Te Chen “Extended SHA-1 for security enhancement,” (Submit to Applied Mathematics and Computation AMC_518) 2005.1.28
        Ongoing Papers

      1. Ming-Hsin Chang, I-Te Chen, Tzu-Shin Lin, and Yi-Shiung Yeh,“Forward Secure Proxy Signature and its applications,” (Submit to
      2. Yi-Shiung Yeh, I-Te Chen, and Wei Shen Lai, “The Orthogonal Signature,” (Submit to
      3. I-Te Chen, Chan-Chi Wang, and Yi-Shiung Yeh, “Dynamic CBC-MACs,” (Submit to Electronic Letters)
      4. I-Te Chen, Yi-Shiung Yeh, and Ming-Hsin Chang, “Proactive secret sharing proxy signature scheme with proxy share recovery,” (Submit to JCIS)
      5. I-Te Chen, C-J Fang and Jengnan Tseng, “Audio watermark,” (Submit to xxx)
      6. I-Te Chen, Ming-Hsin Chang, and Yi-Shiung Yeh, “Improving encoded Lamport’s one-time signature scheme without trapdoors,” (Submit to xxx)

        著作

      1. 陳以德、陳明德、簡文山, "可攜性電子病歷保護," 資通安全專論, T97014, 行政院國家科學委員會科學技術資料中心, 2009.
      2. 張明信、陳以德、葉義雄, “帳戶式支付之行動電子交易,”資通安全專輯之四:系統安全, 行政院國家科學委員會科學技術資料中心,2002.12.25.
      3. 葉義雄、林祝興、王銓祺、詹進科、陳以德, “密碼標準,”第一章與第四章, 資通安全專輯之六, 行政院國家科學委員會科學技術資料中心, 2004.12.25.
        參與過計劃

      1. 中山高醫,整合生醫訊號之雲端化安全電子病歷系統,103/1/1~103/12/31, NSYSUKMU 103-I- 001, 子計畫主持人, 480,000
      2. 國科會,密碼與亂數產生系統之研發,2013/08/01~2014/07/31,102-2218-E-168-001-,協同主持人,373,000
      3. 中山高醫,直覺式安全電子病歷之研發,102/1/1~102/12/31, NSYSUKMU-P001, 主持人, 400,000
      4. 教育部,公民素養陶塑計畫,2011/8/1-2013/1/31,計畫參與人。9,000,000.-
      5. 國科會,植基於個人設備之亂數產生器,2010/7-2011/7,NSC 99-2221-E-037-04, 主持人. 490,000.
      6. 教育部, 98 高醫「教學卓越計畫」主軸2 -子計畫4:提升語文與資訊能力,2011/1-2011/12,計畫參與人
      7. 教育部, 98 高醫「教學卓越計畫」主軸1 - 子計畫6:建構數位學習環境,提升學生資訊能力,2009/8-2010/7,主持人
      8. 教育部, 96~97 高醫?u教學卓越計畫」主軸5 - 子計畫3:建置全校學習社群網路,促進學生合作學習,2007/8-2009/7,主持人
      9. 教育部,「人文教育革新計畫」中綱計畫,紅樓夢課程發展計畫,2010/1-2010/7,協同主持人
      10. 教育部,「人文教育革新計畫」中綱計畫,醫學人文課程發展計畫,2010/1-2010/7,主持人
      11. 教?|?﹛A「人文教育革新計畫」中綱計畫,蘇試課程發展計畫,2008/8-2009/1,協同主持人
      12. 教育部,「人文教育革新計畫」中綱計畫,文化創意產業課程發展計畫,2007/8-2008/1,主持人
      13. 工研院,數位電視 – Security Manager Part,2005-2007
      14. 中華電信,SSL Relay 計劃,2002
      15. 中華電信,憑證中心計劃,2001-2002
      16. 國科會,用行動代理人設計與實作可存活性之感測器網路,2005-2008
      17. 國科會,行動代理人入侵偵測系統,2002-2005
      18. 國科會,具抵擋錯誤攻擊能力的對稱型塊狀加密器之研製,1998-2001
      19. 國科會,符合AES標準之衍生DES密碼系統之研究,2000
      20. 推廣教育中心,線上教務系統、ICEE2000會議網頁小組,2000
      Last revised is :