I-Te Yiter Chen Publications
    Journal Papers

  1. Chun-I Fan, I-Te Chen*, Chen-Kai Cheng, Jheng-Jia Huang, and Wen-Tsuen Chen, "FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Non-Designated Receivers," IEEE System Journal, recommended publication, Volume: PP, Issue: 99, pp.1-12, July, 2016. (IF=2.114, Computer Science/Information systems 27/143=18.89%) [SCI]
  2. Jer-Min Tsai, I-Te Chen, Ying-Fong Huang and Cheng-Che Lin*, "Watermarking Technique for Improved Management of Digital Medical Images," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 18, No. 6, pp.785-799, December, 2015. [EI]
  3. Fu-I Chou, Yi-Lung Chiang, I-Te Chen and Jinn-Tsong Tsai*, "Genetic Algorithm for Optimal Resolution Planning in DOE-based Taguchi Method," Journal of Chinese Society of Mechanical Engineers, Vol.36, No.6, pp.481~490, Dec, 2015. (IF=0.274, Engineering, Mechanical 114/125) [SCI]
  4. Shi HY, Hwang SL, Lee IC, Chen IT, Lee KT,* Lin CL, "Trends and Outcome Predictors after Traumatic Brain Injury Surgery: A Nationwide Population-Based Study in Taiwan," Journal of Neurosurgery, Accepted 2014.(SCI, 1st Revision, IF=3.148, SURGERY 21/198)
  5. I-Te Chen “Random Numbers Generated from Audio and Video Sources,” Vol. 2013, Article ID: 285373, Mathematical Problems in Engineering, 2013. IF: 1.383, ranking: 23/90 (25.56%) [SCI]
  6. I-Te Chen, Jinn-Tsong Tsai, Ching-Feng Wen and Wen-Hsien Ho*, “Artificial neural network with hybrid Taguchi-genetic algorithm for nonlinear MIMO model of machining processes”, Int. J. of Innovative Computing, Information and Control, Vol. 9, No.4, pp.1455-1475, April, 2013. [SCIE]
  7. I-Te Chen, Jer-Min Tsai, and Jengnan Tzeng*, “Re-encryption method designed by Row Complete Matrix,” Mathematical Problems in Engineering, Vol. 2012, Article ID 402890. [SCI] IF: 0.777, ranking: 42/90 (46.67%)
  8. Jer-Min Tsai, Jengnan Tzeng, and I-Te Chen*, "Random Number Generated from white noise of Video," ICIC Express Letter, Vol.6, No.7, pp. 1827-1832, 2012. [EI]
  9. Wen-Hsien Ho, Shinn-Horng Chen, I-Te Chen, Jyh-Horng Chou and Chun-Chin Shuk, "Design of Stable and Quadratic-Optimal Static Output Feedback Controllers for TS-Fuzzy-Model- Based Control Systems: An Integrative Computational Approach," International Journal of Innovative Computing, Information and Control, (IJICIC-10-09039), Vol.8, No.1(A), pp. 403-418, January 2012,. [SCIE]
  10. Chieh-Fan Chen, Wen-Hsien Ho, Shu-Mei Yang, I-Te Chen and Hon-Yi Shi*, "Long-term prediction of emergency department revenue and visitor volume using autoregressive integrated moving average model", Computational and Mathematical Methods in Medicine, 2011, Article ID 395690. [SCI, EI] IF:0.814
  11. Ming-Hsin Chang, I-Te Chen*, and Ming-Te Chen, "Design of Proxy signature in ECDSA," Journal of Information Assurance and Security (JIAS), Vol.5 Issue 1, pp. 360-366. 2010.
  12. Yi-Shiung Yeh, Ting-Yu Huang, I-Te Chen, and Shih-Chin Chou, “Analyze SHA-1 in message schedule,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10(2007), No. 1, pp.1-7. Feb. 2007.
  13. Yi-Shiung Yeh, I-Te Chen, Ting-Yu Huang, and Chan-Chi Wang, “ Dynamic Extended DES,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9(2006), No.2, pp.321-330, Aug. 2006.
  14. I-Te Chen, Ming-Hsin Chang, and Yi-Shiung Yeh “ Design of proxy signature schemes in the Digital Signature Algorithm (DSA)”Journal of Information Science and Engineering, Vol. 22 No. 4, pp. 965-973 (July 2006)[SCIE/EI]
  15. I-Te Chen, and Yi-Shiung Yeh “ Security analysis of Transformed-Key Asymmetric Watermarking System,” IEEE Signal Processing Letters, Vol. 13, Issue 4, pp.213- 215, April 2006. [SCIE/EI]
  16. Yi-Shiung Yeh, I-Te Chen, and Chan-Chi Wang, “ Randomizing Encryption Mode,” Journal of Discrete Mathematical Sciences & Cryptography. Vol. 8(2005), No.3, pp.355-364.
  17. I-Te Chen, and Yi-Shiung Yeh, “ Proxy Signature Scheme Based on Quadratic Residues,” Asian Journal of Information Technology, Vol. 4 No. 5, pp. 541-549, May, 2005.
  18. Yi-Shiung Yeh, Ming-Hsin Chang, I-Te Chen and I-Chen Wu “ Schnorr Blind Signature Scheme based on Elliptic Curves, ” Asian Journal of Information Technology, Vol. 2 No. 3, pp.130-134, July-September, 2003.
  19. Yi-Shiung Yeh, Wei Shen Lai, and I-Te Chen, “ An N-D Cryptoscheme ,” Journal of Information & Optimization Sciences, Vol. 23, No.1, pp. 19-36,2002. [EI]
    Journal Papers (Chinese)

  1. 蔡哲民, 曾正男, 陳以德*, “參數式列完備矩陣之轉加密方法,”資訊安全通訊, Communications of the CCISA, Vol. 21 No. 4, pp.22-31, October, 2015.
  2. 曾正男, 陳以德*, "利用破壞自格函數的平滑性設計之亂數產生器,"資訊安全通訊, Communications of the CCISA, Vol 15 No. 1, pp.22-31, January , 2009.
  3. 簡文山、陳以德、郭乃文B楊哲銘" 可攜式電子病歷的初步安全基礎架構---以TMT為例," 資訊安全通訊, Communications of the CCISA, Vol 14 No. 4, pp.149-161, October 10, 2008
  4. 張靜芬, 郭宏亮, 陳以德, 盧天鴻* ”MRI作業場所的電磁輻射強度之調查,”中華民國環境保護學會學刊, Journal of the environmental protection society, Vol. 30 No. 2, pp. 114-122, Feb. 2007. ISSN: 0254-0010.
  5. Chan-Chi Wang, Wei Shen Lai, I-Te Chen, and Yi-Shiung Yeh,“一個同態墊塞機制,” Journal of Computers Vol.16 ,No.5 ,June 2005.

    Conference Papers

  1. Cheng-Yuan Wang, Wen-Yu Ho, Ying-Fong Huang, Jer-Min Tsai, I-Te Chen, and Jer-Chia Tsai, “Genetic-Psycho-Social-Biological Encounter (GPSBE) SOAP mind map approach for clinical reasoning and medical record: A pilot study for medical clerk ship in general internal medicine,” Association for Medical Education in Europe (AMEE), Poster Presentation. 24-28 30 August~3 September 2014.
  2. Jer-Min Tsai, I-Te Chen, and Jengnan Tzeng*, “Rounding error type random number generator designed by subspace projection,” International Workshop on Cloud Computing and Information Security (CCIS 2013), Paper ID: CS29252, pp.123-126, Shanghai, 2013.11-9~11.
  3. Yu-Hsien Chiu, Hao-Yun Kao, I-Te Chen, I-Nong Lee, Wen-Hsien Ho, Liang-Yu Chen, Pin-Han Huang, Sin-Hao Chen, Chih-Yun Liu, Hsiao-Yan Lu, “A Body-Sensed Motor Assessment System for Stroke Upper-Limb Rehabilitation: A Preliminary Study,” 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp.3819- 3824, 13-16 Oct. 2013.
  4. Jer-Min Tsai, I-Te Chen, Ying-Fong Huang and Cheng-Che Lin*, “Watermarking Technique for Improved Management of Digital Medical Images,” The Second Cross-Straits Conference on Information Security (CSCIS 2013), pp.13-25, 2013. 9.11~13.
  5. Shi, H.-Y, Tsai, J.-T, Ho, W.-H, Wang, S.-C, Chen, I-Te, Lee, K.-T, “Comparison of artificial neural network and logistic regression models for predicting in-hospital survival after hepatocellular carcinoma surgery,” Society of Instrument and Control Engineers of Japan, SICE 2012, Article number:6318640, pp. 1262-1265, Akita, 2012.8.20~23.
  6. Jengnan Tzeng, Jer-Min Tsai and I-Te Chen* “Secure File Sharing in the Cloud by Row Complete Matrix Re-encryption Method,” Innovative Management, Information & Production in Otaru (IMIP2011 Excellent paper award), pp.13-24, October 8-10, 2011.
  7. I-Te Chen, Jer-Min Tsai, and Jengnan Tzeng, “Audio Random Number Generator and its Application,” International Conference on Machine Learning and Cybernetics (ICMLC 2011), pp.1678-1683, July 10-13, 2011. [EI]
  8. Jer-Min Tsai, I-Te Chen*, and Jengnan Tzeng, “Random number generated from white noise of webcam,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), September 12-14, 2009.
  9. Jengnan Tzeng, I-Te Chen*, and, Jer-Min Tsai “Random Number Generator designed by the divergence of scaling functions,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), September 12-14, 2009.
  10. Ming-Hsin Chang and I-Te Chen, Ming-Te Chen "Proxy-protected signature scheme based on the ECDSA," (ISDA 2008) Vol.3 pp. 17~22, 2008.11.26-28.
  11. I-Te Chen, Yi-Shiung Yeh, and Ming-Hsin Chang, “ Proactive secret sharing proxy signature scheme with proxy share recovery,” International Association for Computer Information Systems (IACIS) Pacific 2005. pp.52-58. 2005.5.20.
    Conference Papers (Chinese)

  1. 鄭宜崴, 何文獻, 鄭雅倫, 陳以德*, “運用機器學習演算法於肌電圖手勢訊號辨識,” 全國計算機會議National Computer Symposium (NCS 2017), 2017.12.14~15
  2. 蔡哲民, 曾正男, 陳以德*, “參數式列完備矩陣之轉加密方法,” 全國資訊安全會議 (CISC2015), pp. 129-133, 2015.5.28~29.
  3. 蔡哲民, 陳以德, 楊東霖, 劉澔暐, “以手機搖動亂數為基礎的LBS餐廳選擇器,” NCS 2013.
  4. 林皇辰, 黃英峰*, 鍾相彬, 陳以德, 蔡哲民, “核子醫學全身骨掃描及鎵-67掃描影像融合,” International Symposium on Frontier Biomedical and Molecular Imaging(ISFBMI), Poster. Nov. 5-6, 2011.
  5. 盧天鴻, 陳以德, 黃英峰, 蔡哲民, 林正哲* ”運用Watermark 增進電子病歷影像之安全性,”第十四屆電子商務研討會, 2010.10.30.
  6. 陳以德, 曾正男, 蔡哲民*, ”適用於多媒體時代的亂數產生器,” 2010 International Conference on Multimedia Communication Technology and Application (IMCTA 2010),台南, pp.35-42, 2010.10.29
  7. 李正崙, 朱慧媛, 孫靖婷, 楊縢清, 廖晏辰, 莊峻鴻, 陳以德*, 陳明德, “結合憑證之安全電子病歷傳輸系統,” 全國計算機會議National Computer Symposium (NCS 2009), 2009.11.27~28
  8. 葉義雄, 陳以德, 黃定宇, 及周士欽, “ 分析與改進SHA-1 的訊息處理模式,” 全國資訊安全會議ISC2005, 2005.6.9
  9. 陳以德, 李正國 “利用層級分析法進行國中生教育類網站評鑑,” 「學習與創造.教育與創新」國際研討會論文集, pp. 354-364, 2005.5.20.
    Patent(獲證)
  1. 美國發明專利(US 13/364,797, 公開號: US 2013/0204915A1, 授權US 8793296 B2):Random number generating method, 2014-07-29
  2. 美國發明專利(US 13/422,159, 公開號: US2013/0246789A1, 授權US 8533493 B1):Method for Securing Transmission Data, 2013-9-10
  3. 美國發明專利(公開號:US-2015-0261925-A1):Avatar-based Charting System for Assisted Diagnosis 2014-3-14, 2015-9-17公開, 2018-8 獲證
  4. 發明專利(證號: I462009):亂數產生方法, 2014-11-21獲證
  5. 發明專利(證號: I488476):基於完整列矩陣之再加密方法, 2015-06-11獲證
  6. 發明專利(證號: I501189):擬人化醫療資訊紀錄方法及輔助診療系統, 2015-09-21獲證
  7. 發明專利(證號: I505228):一種自主復健動作量化評估系統, 2015-10-21獲證
  8. 發明專利(證號: I509556):目標導向復健輔助系統與其工作設定方法, 2015-11-21獲證
  9. 發明專利(證號: I591569):復健動作編輯與圖形化評量系統, 2017-07-11獲證
  10. 發明專利(證號: I621870):X光機輻射劑量攝影參數估測系統及其估測方法,2018-04-21獲
  11. 新型專利(申請號:M563135):組合式支架

    Patent(申請中)
  1. 發明專利(申請號: 105110617):資料加解密系統及其加解密方法(一種門檻式存取驗證之容錯式資料庫加解密方法與系統), 2016-04-1
  2. 發明專利(申請號:):一種擴增實境動作編輯與評估系統2013-8-5

    Submitted Papers

  1. Ming-Hsin Chang, I-Te Chen, and Yi-Shiung Yeh, “Partially Blind Threshold Signature with Low Computation”(Submit to Computer Systems, Science and Engineering) 2003.2.6
  2. Yi-Shiung Yeh, and I-Te Chen, “Padding problem solution on block ciphers with homophony approach,” (Submit to IPL) 2004.4.20
  3. Yi-Shiung Yeh, and I-Te Chen “Extended SHA-1 for security enhancement,” (Submit to Applied Mathematics and Computation AMC_518) 2005.1.28
    Ongoing Papers

  1. Ming-Hsin Chang, I-Te Chen, Tzu-Shin Lin, and Yi-Shiung Yeh,“Forward Secure Proxy Signature and its applications,” (Submit to
  2. Yi-Shiung Yeh, I-Te Chen, and Wei Shen Lai, “The Orthogonal Signature,” (Submit to
  3. I-Te Chen, Chan-Chi Wang, and Yi-Shiung Yeh, “Dynamic CBC-MACs,” (Submit to Electronic Letters)
  4. I-Te Chen, Yi-Shiung Yeh, and Ming-Hsin Chang, “Proactive secret sharing proxy signature scheme with proxy share recovery,” (Submit to JCIS)
  5. I-Te Chen, C-J Fang and Jengnan Tseng, “Audio watermark,” (Submit to xxx)
  6. I-Te Chen, Ming-Hsin Chang, and Yi-Shiung Yeh, “Improving encoded Lamport’s one-time signature scheme without trapdoors,” (Submit to xxx)

    著作

  1. 陳以德、陳明德、簡文山, "可攜性電子病歷保護," 資通安全專論, T97014, 行政院國家科學委員會科學技術資料中心, 2009.
  2. 張明信、陳以德、葉義雄, “帳戶式支付之行動電子交易,”資通安全專輯之四:系統安全, 行政院國家科學委員會科學技術資料中心,2002.12.25.
  3. 葉義雄、林祝興、王銓祺、詹進科、陳以德, “密碼標準,”第一章與第四章, 資通安全專輯之六, 行政院國家科學委員會科學技術資料中心, 2004.12.25.
    參與過計劃

  1. 科技部,有氧加認知同步訓練方案於思覺失調症個案認知功能之療效: 軟體系統開發與成效驗證,共同主持人, 2018/
  2. 科技部,健康促進與照護器材產學技術聯盟跨領域技術服務提升計畫(1/3),2017/02/01 ~ 2018/01/31,106-2622-8-037 -001 -TB1,共同主持人,2,400,000
  3. 高雄醫學大學教學創新實踐計畫,網路攻防演練,2017/09/01~2018/01/31,45,000
  4. 高雄醫學大學產品導向計畫, 擬人化醫療資訊紀錄方法及輔助診療系統, 200,000.-, 2016.
  5. 高雄醫學大學計畫(KMU-M105020),醫療雲加密與轉加密機制,105/1/1~105/12/31,主持人, 150,000.-
  6. 中山高醫,整合生醫訊號之雲端化安全電子病歷系統,103/1/1~103/12/31, NSYSUKMU 103-I- 001, 子計畫主持人, 480,000
  7. 國科會,密碼與亂數產生系統之研發,2013/08/01~2014/07/31,102-2218-E-168-001-,協同主持人,373,000
  8. 中山高醫,直覺式安全電子病歷之研發,102/1/1~102/12/31, NSYSUKMU-P001, 主持人, 400,000
  9. 教育部,公民素養陶塑計畫,2011/8/1-2013/1/31,計畫參與人。9,000,000.-
  10. 國科會,植基於個人設備之亂數產生器,2010/7-2011/7,NSC 99-2221-E-037-04, 主持人. 490,000.
  11. 教育部, 98 高醫「教學卓越計畫」主軸2 -子計畫4:提升語文與資訊能力,2011/1-2011/12,計畫參與人
  12. 教育部, 98 高醫「教學卓越計畫」主軸1 - 子計畫6:建構數位學習環境,提升學生資訊能力,2009/8-2010/7,主持人
  13. 教育部, 96~97 高醫?u教學卓越計畫」主軸5 - 子計畫3:建置全校學習社群網路,促進學生合作學習,2007/8-2009/7,主持人
  14. 教育部,「人文教育革新計畫」中綱計畫,紅樓夢課程發展計畫,2010/1-2010/7,協同主持人
  15. 教育部,「人文教育革新計畫」中綱計畫,醫學人文課程發展計畫,2010/1-2010/7,主持人
  16. 教?|?﹛A「人文教育革新計畫」中綱計畫,蘇試課程發展計畫,2008/8-2009/1,協同主持人
  17. 教育部,「人文教育革新計畫」中綱計畫,文化創意產業課程發展計畫,2007/8-2008/1,主持人
  18. 工研院,數位電視 – Security Manager Part,2005-2007
  19. 中華電信,SSL Relay 計劃,2002
  20. 中華電信,憑證中心計劃,2001-2002
  21. 國科會,用行動代理人設計與實作可存活性之感測器網路,2005-2008
  22. 國科會,行動代理人入侵偵測系統,2002-2005
  23. 國科會,具抵擋錯誤攻擊能力的對稱型塊狀加密器之研製,1998-2001
  24. 國科會,符合AES標準之衍生DES密碼系統之研究,2000
  25. 推廣教育中心,線上教務系統、ICEE2000會議網頁小組,2000
Last revised is :