Conference Papers
Conference Papers
Chun-I Fan, Wei-Chen Wu, Cheng-Han Shie, Hsin-Nan Kuo*, and Bo-Yi Lee, "Automatic APT Attack Reconstruction Supporting Lateral Movement," 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, New Taipei City, Taiwan, Dec. 7-9, 2023.
Arijit Karati, Li-Chun Chang, Chun-I Fan*, and Debasis Das, "On the Security of Lightweight Authentication and Batch Verification in VANETs," 2023 World Conference on Communication & Computing (WCONF), Raipur, India. July 14-16, 2023.
Chun-I Fan, Jun-Huei Wang, Cheng-Han Shie*, and Yu-Lung Tsai, "Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack," The 17th International Conference on Ubiquitous Information Management and Communication, Seoul, South Korea, January 03 - 05, 2023. (EI)
Chun-I Fan, Yen-Lin Lai, and Cheng-Han Shie*, "Clustering-Based Network Intrusion Detection System," The 2022 IEEE Conference on Dependable and Secure Computing, Edinburgh, UK, June 22 - 24, 2022.
Chun-I Fan, Cheng-Han Shie*, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, and Takeshi Takahashi, "IoT Botnet Detection Based on the Behaviors of DNS Queries," The 2022 IEEE Conference on Dependable and Secure Computing, Edinburgh, UK, June 22 - 24, 2022.
Chun-I Fan, Zhen-Yu Jian, and Er-Shuo Zhuang*, "Lattice-Based Anonymous Multi-Receiver ID-Based Encryption," The 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, Taichung, Taiwan, Nov. 18-20, 2021.
Chun-I Fan, Kai-Yuan Zheng, Yu-Tse Shih, Er-Shuo Zhuang, and Jheng-Jia Huang*, “An Efficient Secure Handover Scheme Supporting Cross-Network Slicing for Multi-Operator Environments,” The 13th International Conference on Mobile Computing and Ubiquitous Networking, Tokyo, Japan, Nov. 17-19, 2021.
Chun-I Fan, Yi-Fan Tseng and Cheng-Chun Feng. ‘CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model,’ The 2021 IEEE Conference on Dependable and Secure Computing, Aizuwakamatsu, Fukushima, Japan, 30 Jan - 2 Feb, 2021.
Jheng-Jia Huang, Chun-I Fan*, Yu-Chen Hsu, and Arijit Karati, ‘A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments,’ The Eighth International Symposium on Security in Computing and Communications (SSCC’20), Chennai, India, October 14-17, 2020
Chun-I Fan, Yi-Fan Tseng, and Yen-Lin Huang, ‘Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map,’ The 15th Asia Joint Conference on Information Security (AsiaJCIS 2020), Taipei, Taiwan, August 20-21, 2020. (Best Paper Award)
Ruei-Hau Hsu, Yi-Cheng Wang, Chun-I Fan, Bo Sun, Tao Ban, Takeshi Takahashi, Ting-Wei Wu and Shang-Wei Kao, ‘A Privacy-Preserving Federated Learning System for Android Malware Detection based on Edge Computing,’ The 15th Asia Joint Conference on Information Security (AsiaJCIS 2020), Taipei, Taiwan, August 20-21, 2020.
Siyuan Zhang, Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Yu-Tse Shih and Hsin-Nan Kuo, Cheng-Han Shie, ‘Dynamic Blockchain Storage Scheme Based on Sidechains,’ Annual Conference on Engineering and Applied Science, Kyoto, Japan, December 17-19, 2019
Han Gao, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hsin-Nan Kuo and Yu-Tse Shih, ‘Anonymous Fair P2P-Lending Scheme,’ The International Conference on Innovative Computing and Management Science (ICMS 2019), Osaka, Japan, July 19-22, 2019.
Chun-I Fan, Yi-Fan Tseng, Chen-Hsi Cheng, Hsin-Nan Kuo, Jheng-Jia Huang, and Yu-Tse Shih, ‘Anonymous Authentication and Key Agreement Protocol for LTE Networks,’ The 2nd International Conference on Communication Engineering and Technology (ICCET 2019), Nagoya, Japan, April 12-15, 2019, pp. 68-71.
Arijit Karati, Chun-I Fan, and Ruei-Hau Hsu, ‘Enhancement of FTP-NDN Supporting Nondesignated Receivers,’2018 International Computer Symposium, Yunlin, Taiwan, December 10-13, 2018. (EI)
Wei-Hao Chen, Chun-I Fan , and Yi-Fan Tseng, ‘Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds,’ The 2018 IEEE Conference on Dependable and Secure Computing , Kaohsiung, Taiwan, December 10-13, 2018.
Ruei-Hau Hsu, Jemin Lee, Tony Q.S. Quek, and Chun-I Fan, ‘CORE: Cooperative Encryption with Its Applications to Controllable Security Services,’The 2018 IEEE Conference on Dependable and Secure Computing , Kaohsiung, Taiwan, December 10-13, 2018.
Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Yen-Hao Chen, and Hsin-Nan Kuo, ‘Verifiable Privacy-Preserving Payment Mechanism for Smart Grids,’ The 11th International Conference on Internet and Distributed Computing Systems, Tokyo, Japan, October 11-13, 2018.
Chun-I Fan, Yi-Fan Tseng, Cheng-Yuan E, and Jheng-Jia Huang,‘Transformation Between Attribute-Based Encryption and Key-Aggregate Cryptosystem,’The 13th Asia Joint Conference on Information Security (AsiaJCIS 2018), Guilin, China, August 8-9, 2018. (Best Paper Award)
陳韋任, 劉育瑋, 張家樺, 黃彥霖, 黃政嘉*, 范俊逸,“輕量且抗量子攻擊之通訊行動應用程式,”第二十八屆全國資訊安全會議, 台北, 2018.
Jheng-Jia Huang, Yi-Fan Tseng, Qi-Liang Yang, and Chun-I Fan*, “A Lattice-Based Group Authentication Scheme,” 2018 The International Conference on Smart Science (ICSS 2018), Miyazu, Kyoto Japan, 29 March - 3 April, 2018.
Xuping Huang, Hiroaki Kikuchi, and Chun-I Fan, "Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation,” the 32-nd IEEE International Conference on Advanced Information Networking and Applications (AINA-2018), Pedagogical University of Kracow, Poland, May 16-18, 2018.
Chun-I Fan, Yi-Fan Tseng, Yi-Hui Lin, and Fangguo Zhang, “Storage-Saving Bi-Dimensional Privacy-Preserving Data Aggregation in Smart Grids,” International Conference on Security with Intelligent Computing and Big-data Services, Hualien, Taiwan, Dec. 15-17, 2017.
Yi-Fan Tseng and Chun-I Fan*, “Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme,” National Computer Symposium, Hualien, Taiwan, December 14-15, 2017.
Yi-Fan Tseng, Chun-I Fan*, Ting-Chuan Kung, Jheng-Jia Huang, Hsin-Nan Kuo, “Homomorphic Encryption Supporting Logical Operations,” 2017 International Conference on Telecommunications and Communication Engineering (ICTCE 2017), Osaka, Japan, October 22-24, 2017, pp. 66~69.
Chien-Nan Wu, Chun-I Fan∗, Jheng-Jia Huang, Yi-Fan Tseng, and Hiroaki Kikuchi, “An Efficient Signature Scheme for Anonymous Credentials,” the 5th International Conference on Applied Computing & Information Technology (ACIT 2017), Hamamatsu, Japan, July 9-13, 2017,
Cheng-An Fu, Fu-Chun Chang, Chun-I Fan, and Cheng-Wei Sung, “植基於聊天軟體之萬用訊息加密機制,” Cryptology and Information Security Conference 2017 (CISC 2017), Kaohsiung, Taiwan, May 24-27, 2017.
Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, and Hiroaki Kikuchi, “Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments,” The 13th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2016), Hiroshima, Japan, November 28 - December 1, 2016.
Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, and Hiroaki Kikuchi, “Flexible Authentication Protocol with Key Reconstruction in WBAN Environments,” The 6th International Conference on IT Convergence and Security (ICITCS 2016), Prague, Czech Republic, September 26 -29, 2016.
Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui, and Chun-I Fan, “Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares,” The 11th Asia Joint Conference on Information Security (AsiaJCIS 2016), Fukuoka, Japan, August 4-5, 2016.
Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, and Huang-Kai Chu, “Mutually Anonymous Fair Exchange Protocol with Offline Third Party,” The 7th International Conference on Internet (ICONI 2015), Kuala Lumpur, Malaysia, December 13-16, 2015.
Chun-I Fan, Yu-Chi Lin, Yi-Fan Tseng, and Jheng-Jia Huang, “Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function,” The Fourth International Conference on Informatics & Applications (ICIA 2015), Kagawa University, Japan, July 20-22, 2015.
Chun-I Fan, Han-Wei Hsiao, Chun-Han Chou, and Yi-Fan Tseng, “Malware Detection System Based on API Log Data Mining,” The 5th IEEE International Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2015), Taichung, Taiwan, July 1-5, 2015, pp. 255-260. (EI)
Chun-I Fan, Shi-Yuan Huang and Wen-Che Hsu, “Encrypted Data Deduplication in Cloud Storage,” The 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), Kaohsiung, Taiwan, May 24-26, 2015, pp. 18-25. (EI)
范俊逸, 李佳鴻, 宋承威, ‘行動裝置上具快速佈署能力之 APT 防禦機制,’ 第二十五屆全國資訊安全會議, 高雄(第一科大), 5月, 2015.
Chun-I Fan, Chien-Nan Wu, Chun-Hung Chen and Yi-Fan Tseng, C.-C. Feng, “Attribute-Based Proxy Re-Encryption with Dynamic Membership,” The 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), Kaohsiung, Taiwan, May 24-26, 2015, pp. 26-32. (EI)
范俊逸, 宋佳玲, 莊媛媛, ‘在Android環境中植基於檔案封存之資料備援機制,’ 第二十五屆全國資訊安全會議, 高雄(第一科大), 5月, 2015.
Jheng-Jia Huang, Wen-Shenq Juang and Chun-I Fan, “A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments,” The 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), Kaohsiung, Taiwan, May 24-26, 2015. (EI)
Jheng-Jia Huang, Wen-Shenq Juang, and Chun-I Fan, ‘An Efficient Authentication and Service Key Agreement Scheme in IOT Environments,’ (Ebook Article) Frontiers in Artificial Intelligence and Applications, vol. 274: Intelligent Systems and Applications - Proceedings of the International Computer Symposium (ICS) held at Taichung, Taiwan, December 12-14, 2014, pp. 715~723. (EI)
Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Feng Tseng, and Wen-Tsuen Chen, ‘Anonymous Credential Scheme Supporting Active Revocation,’ The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), Wuhan, China, September 3-5, 2014. (EI)
Chun-I Fan, Wei-Zhe Sun, Shih-Wei Huang, Jheng-Jia Huang, and Wen-Shenq Juang, ‘Strongly Privacy-Preserving Communication Protocol for VANETs,’ The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), Wuhan, China, September 3-5, 2014. (EI)
范俊逸, 林稚雯, 歐鎧誼, 王柏堯, 羅睿, 黃政嘉, 林語綺, ‘植基於事件授權之行動裝置個資保護系統,’ 第二十四屆全國資訊安全會議, 臺北(政治大學), 5月, 2014.
Chun-I Fan, Pei-Jen Tsai, Jheng-Jia Huang, and Wen-Tsuen Chen, ‘Anonymous Multi-Receiver Certificate-Based Encryption,’ the Second International Workshop on Cyber Security and Privacy (CSP) (in Proceedings of 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery), Beijing, China, October 10-12, 2013, pp. 19~26. (EI)
Chun-I Fan, Pei-Hsiu Ho, Jheng-Jia Huang, and Yi-Fan Tseng, ‘Secure Certificateless Signature Scheme Supporting Batch Verification,’ 2013 Eighth Asia Joint Conference on Information Security (AsiaJCIS 2013), Seoul, Korea, July 25-26, 2013, pp. 8~11. (EI)
Chi-Yao Weng, Cheng-Hsing Yang, Chun-I Fan, Kuan-Liang Liu, and Hung-Min Sun, ‘Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality,’ 2013 Eighth Asia Joint Conference on Information Security (AsiaJCIS 2013), Seoul, Korea, July 25-26, 2013, pp. 102~107. (EI)
Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, and Chung-Yu Lin, ‘Active One-Time Password Mechanism for User Authentication,’ the 8th International Conference on Grid and Pervasive Computing (GPC 2013), Seoul Olympic Parktel, Seoul, Korea, May 9-11, 2013. (Lecture Notes in Computer Science, Volume 7861, Springer, 2013, pp. 464~471) (EI)
Chun-I Fan, Shi-Yuan Huang, and Wen-Che Hsu, ‘Hybrid Data Deduplication in Cloud Environment,’ the 2012 International Conference on Information Security and Intelligent Control (ISIC’12), Yunlin, Taiwan, August 14-16, 2012, pp. 174~177. (EI)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, and Chun-I Fan, ‘A Secure Payment Scheme Using RFID Technique for Retailing Services,’ the Third International Conference Ubiquitous Computing and Multimedia Application (UCMA 2012), Bali, Indonesia, June 28-30, 2012, vol. 7, pp. 36~41. (EI)
Chun-Ta Li, Chi-Yao Weng, and Chun-I Fan, ‘Cryptanalysis of A Robust and Efficient Smart Card Based Remote Login Mechanism for Multi-Server Architecture,’ the Sixth International Conference on Information Security and Assurance (ISA), Shanghai, China, April 28-30, 2012, vol. 1, pp. 4~6.
喬峰、劉長威、黃翔國、張雪翔、黃士原、范俊逸, ‘雲端運算環境中具搜尋隱私保護之安全網路郵件服務,’ 第二十二屆資訊安全會議, 2012
Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, and Chia-Hsiu Kuo, ‘Cryptanalysis on Secure Single Sign-on Mechanism for Distributed Computer Networks,’ The 2012 Symposium on Cloud and Service Computing (SC2-2012), Taichung, Taiwan, Feb. 23-24, 2012.
Chi-Yao Weng, Chun-I Fan, Chin-Feng Lee, and Shiuh-Jeng Wang, ‘Predictive Pixel Differencing Expansion in Data Reversibility Scheme,’ ACM International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC), Kuala Lumpur, Malaysia, Feb. 20-22, 2012. (EI)
Chun-I Fan, Chien-Nan Wu, and Wei-Kuei Chen, ‘On-line/Off-line Blind Signature,’ The 2011 FTRA International Workshop on Strategic Security Management for Industrial Technology (SSMIT), 2011.
Chun-I Fan, Chien-Nan Wu, Wei-Zhe Sun, and Wei-Kuei Chen, ‘Flexibly Sanitizable Signature Scheme,’ The First International Conference on Engineering and Technology Innovation (ICETI2011), Kenting, Taiwan, November 11-15, 2011.
Chun-I Fan, Ruei-Hau Hsu, and Mark Manulis, ‘Group Signature with Constant Revocation Costs for Signers and Verifiers,’ The 10th International Conference on Cryptography and Network Security, Sanya, China, December 10-12, 2011, pp. 214~233. (EI).
Chun-I Fan and Shi-Yuan Huang, ‘Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage,’ International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Beijing, China, October 10-12, 2011, pp. 269~273. (EI)
Chun-I Fan, Yu-Kuang Liang, and Chien-Nan Wu, “An Anonymous Fair Offline Micropayment Scheme,” International Conference on Information Society (i-Society), London, UK, June 27-29, 2011, pp. 377~381. (EI)
Chun-I Fan, Hoi-Tung Hau, and Wei-Zhe Sun, “Date Attachable Offline Efficient Electronic Cash Scheme,” The 16th Mobile Computing Workshop (MC-2011), 2011.
曾昭巽, 蘇哲漢, 王耀霆, 郭文魁, 林宜慧, 范俊逸,‘運用JavaCard實作整合掌靜脈與指紋並保障隱私性之雙重生物特徵身份認證機制,’ 第二十一屆資訊安全會議, 2011.
Chun-I Fan, Wen-Shenq Juang, and Ming-Te Chen, “Efficient Fair Content Exchange in Cloud Computing,” International Computer Symposium, Tainan, Taiwan, pp. 294-299, December 16-18, 2010. (EI)
Chun-I Fan, Vincent Shi-Ming Huang, and Yao-Chun Yu, “Provably Secure Off-Line E-Cash Scheme with Efficient Anonymity Revoking,” Proceedings of Workshop on Cryptography and Information Security, National Computer Symposium, 2009, pp. 78-87.
Chun-I Fan, Ruei-Hau Hsu, and Pei-Hsiu Ho, ‘Cryptanalysis on Du-Wen Certificateless Short Signature Scheme,’ The 4th Joint Workshop on Information Security, 2009.
范俊逸, 黃士原,‘由競標者合作開標且匿名的一般化Vickrey競標協定,’第十九屆資訊安全會議, 2009.
Chun-I Fan, Ming-Te Chen, and Lung-Hsien Chen, “Truly Anonymous Paper Submission and Review Scheme,” Third International Workshop on Advances in Information Security, 2009. (EI) . (In Proceedings of the Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan. pages 960-965, IEEE Computer Society, 2009.)
Chun-I Fan, Chien-Nan Wu, and Wei-Zhe Sun, ‘Multi-Recastable E-Bidding Scheme,’ The 8th International Conference on Intelligent Systems Design and Applications (ISDA 2008), 2008, Taiwan, pp. 462-466. (EI)
Chun-I Fan, Ruei-Hau Hsu, and Chun-Hao Tseng, ‘Pairing-Based Message Authentication Scheme with Privacy Protection in Vehicular Ad Hoc Networks,’ The International Conference on Mobile Technology, Applications & Systems 2008 (Mobility Conference), 2008. (EI)
Chun-I Fan and Shi-Yuan Huang, ‘RFID Authentication Protocol in Supply Chains,’ The 3rd Joint Workshop on Information Security, 2008, Korea, pp. 462~469.
Chun-I Fan and Vincent Shi-Ming Huang, ‘Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications,’ International Workshop on Security (IWSEC), LNCS 4752, Springer-Verlag, 2007, pp.412-427. (EI) NSC 95-2219-E-110-004
Ling-Ying Huang and Chun-I Fan, ‘Anonymous Multi-Receiver Identity-Based Encryption,’ National Information Security Conference, 2007, pp. 291-302. (The Best Student Paper Award) NSC 95-2219-E-110-004
Chun-I Fan and Wei-Zhe Sun, ‘Efficient Encoding Scheme for Date Attachable Electronic Cash,’ The 24th Workshop on Combinatorial Mathematics and Computation Theory, 2007, pp. 405-410.
Chun-I Fan, Ming-Te Chen, and Wei-Zhe Sun, ‘Buyer-Seller Watermarking Protocols with Off-line Trusted Parties,’ The First International Conference on Multimedia and Ubiquitous Engineering, 2007, pp. 1035-1040. (EI) NSC 95-2219-E-110-004
Chun-I Fan, Pei-Hsiu Ho, and Hsin-Yu Chen, ‘Nested One-Time Secret Mechanisms for Fast Mutual Authentication in Mobile Communications,’ IEEE Wireless Communications and Networking Conference, 2007, pp. 2714 - 2719. (EI) NSC 95-2219-E-110-004
Chun-I Fan, Yu-Kuang Liang, and Bo-Wei Lin, ‘Fair Transaction Protocols Based on Electronic Cash,’ The 7th International Conference on Parallel and Distributed Computing, Applications and Technologies, 2006, pp. 383-388. (EI) NSC 95-2219-E-110-004
Dai-Rui Lin, Chih-I Wang, Chun-I Fan, and D-J Guan, ‘Forward-Secure Subliminal Channels based on GQ Signature,’ Proceedings of the 2006 International Computer Symposium, 2006, pp. 231-243.
Chun-I Fan, Yi-Hui Lin, and Ruei-Hau Hsu, ‘Remote Password Authentication Scheme with Smart Cards and Biometrics,’ IEEE GLOBECOM Conference, 2006, pp. 1-5. (EI) NSC 95-2219-E-110-004
Chun-I Fan and Wei-Zhe Sun, ‘Uncoercible Anonymous Electronic Voting,’ Proceedings of the 9th Joint Conference on Information Sciences, 2006, pp. 721-725. (EI) NSC 94-2219-E-110-001
Chun-I Fan, Pei-Hsiu Ho, and Chun-Liang Chang, ‘Anonymous Electronic Lottery Scheme Using the Bank as an Issuer,’ National Information Security Conference, 2006, pp. 386-393. NSC 94-2219-E-110-001
Chun-I Fan, D. J. Guan, Chih-I Wang, and Dai-Rui Lin, ‘Cryptanalysis of Lee-Hwang-Yang Blind Signature Scheme,’ The 23rd Workshop on Combinatorial Mathematics and Computation Theory, 2006, pp. 204~206.
Yung-Cheng Chan and Chun-I Fan, ‘Further Analysis of Remote Password Authentication Scheme Based on Cross Product,’ Information Security Conference, 2005, pp. 156 ~ 161.
Dai-Rui Lin, Zhi-Kai Zhang, D. J. Guan, and Chun-I Fan, ‘One-time Signatures with Subliminal Channels,’ National Information Security Conference, 2005, pp. 269 ~ 276.
Zhi-Kai Zhang, Dai-Rui Lin, D. J. Guan, and Chun-I Fan, ‘A Subliminal Channel without Sharing Signer’s Secret Key,’ Information Security Conference, 2005, pp. 277 ~ 280.
Zhi-Kai Zhang, D. J. Guan, and Chun-I Fan, ‘Fair Blind Signature with Observer,’ IADIS International Conference Applied Computing, 2004, pp. II.168~II.171.
Chun-I Fan and Ming-Te Chen, ‘An Attack on Untraceable Blind Signature Scheme,’ National Computer Symposium, 2003, pp. 1288~1290
Chun-I Fan and Wei-Kuei Chen, ‘An Efficient Randomization Scheme for Chaum Blind Signatures,’ National Information Security Conference, 2003, pp. 121~128.
Chun-I Fan, Lin-Chuan Wu, and Yi-Shiung Yeh, ‘Nearly Optimal User Efficient Partially Blind Signatures,’ Proceedings of the 2002 International Computer Symposium, vol. 2, 2002, pp. 1083-1090.
Chung-Ming Ou, Chun-I Fan, and Hwai-Ling Shan, ‘PKI Interoperability in Taiwan,’ The Second International Workshop for Asian Public Key Infrastructures, 2002, pp. 10-13.
Chun-I Fan, Lin-Chuan Wu, and Yi-Shiung Yeh, ‘Cryptanalysis on New Rabin-like Blind Signature Scheme,’ National Information Security Conference, 2002. pp. 147-149
Chun-I Fan and Wei-Kuei Chen, ‘User Efficient Randomized Chaum's Blind Signatures,’ 2001 National Computer Symposium, the Proceedings of Information Security, 2001, pp. F036-F042.
Chun-I Fan, Chin-Laung Lei, and Yun-Peng Chiu, ‘A Fast Blind Signature Scheme,’ Workshop Proceedings of the Seventh International Conference on Distributed Multimedia Systems, Knowledge Systems Institute, 2001, pp. 189-193.
Pei-Ling Yu, Chin-Laung Lei, Chun-I Fan, and Huei-Ju Chen, ‘A User Efficient Fair E-cash Scheme without On-line Trusted Third Party,’ Workshop Proceedings of the Seventh International Conference on Distributed Multimedia Systems, Knowledge Systems Institute, 2001, pp. 246-251.
Wei-Kuei Chen, Chun-I Fan, and Lin-Chuan Wu, ‘An Untraceable Electronic Ticket Protocol for Information Hiding,’ National Information Security Conference, 2001, pp. 47-49.
Chun-I Fan, Chin-Laung Lei, and Yun-Peng Chiu, ‘Comments on Improved User Efficient Blind Signatures,’ National Information Security Conference, 2001, pp. 51-53.
Wei-Kuei Chen and Chun-I Fan, ‘An Efficient Payee Designated Electronic Cash Scheme,’ 第二屆管理學域學術研討會, 2001, pp. 163-165.
Chun-I Fan and Wei-Kuei Chen, ‘An Anonymous Electronic Voting Protocol with the Latest Decision on Voters’ Intentions,’ Proceedings of The 2000 ICDCS Workshops on Internet 2000, IEEE Computer Society, pp. A-9~A-12.
Chun-I Fan, Wei-Kuei Chen, and Yi-Shiung Yeh, ‘A Randomization Enhanced Scheme for Chaum’s Blind Signatures,’ Proceedings of The 2000 ICDCS Workshops on Internet 2000, IEEE Computer Society, pp. A-5~A-8.
Chun-I Fan and Wei-Kuei Chen, ‘An Improved Date Attachable Electronic Cash Scheme,’ Proceedings of the Tenth National Conference on Information Security, 2000, pp. 202-206.
Chun-I Fan, ‘高效率電子貨幣通訊協定之研究,’ 2000電信科技研討會論文集, 2000, pp. 280-285.
Chun-I Fan, Wei-Kuei Chen, and Yi-Shiung Yeh, ‘A New Electronic Cash Scheme Based on Blind Signatures and Asymmetric Cryptosystems,’ The 14th International Conference on Information Networking (ICOIN-14), 2000, pp. 1B-3.1~1B-3.5.
Chun-I Fan and Chin-Laung Lei, ‘A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process,’ 1999 National Computer Symposium, vol. 3, 1999, pp. C269-C276.
Chun-I Fan, Wei-Kuei Chen, and Yi-Shiung Yeh, ‘How to Dynamically Date Untraceable Electronic Cash,’ Proceedings of the Cross-Strait Information Technology Workshop (CSIT), 1999, pp. 37-43.
Chun-I Fan, ‘On the Ownership Assignment of Untraceable Electronic Cash,’ Proceedings of National Conference on Information Security, 1999, pp. LXXIII-LXXXI.
Chun-I Fan, Wei-Kuei Chen, and Yi-Shiung Yeh, ‘Blind Signatures with Double-Hashed Messages for Fair Electronic Elections and Ownership Claimable Digital Cash,’ Proceedings of First International Conference on Enterprise Information Systems (ICEIS), Setubal, Portugal, March 27-30, vol. 2, 1999, pp. 612-618.
Chun-I Fan, Chin-Laung Lei, and Chih-Yuh Chang, ‘An Efficient Election Scheme for Resolving Ties,’ 1998 International Computer Symposium, Workshop on Cryptology and Information Security, Tainan, Taiwan, R.O.C., 1998, pp. 95-100.
Chun-I Fan, Chin-Laung Lei, Chih-Yuh Chang, and Pei-Ling Yu, ‘An Efficient Divisible Blind Signature Scheme,’ Proceedings of National Conference on Information Security, 1998, pp. 215-224.
Chun-I Fan and Chin-Laung Lei, ‘Efficient Fair Blind Signatures for Electronic Cash,’ Proceedings of National Computer Symposium, vol. 2, 1997, pp. C89-C94.
Chin-Laung Lei and Chun-I Fan, ‘Low-Computation Partially Blind Signatures for Electronic Cash,’ Proceedings of National Computer Symposium, vol. 2, 1997, pp. C101-C106.
Chun-I Fan and Chin-Laung Lei, ‘Secure Rewarding Schemes,’ Proceedings of the 30th Annual Hawaii International Conference on System Sciences, vol. 3, 1997, pp. 571-580.
Wen-Shenq Juang, Chin-Laung Lei, and Chun-I Fan, ‘Anonymous Channel and Authentication in Wireless Communications,’ Proceedings of Joint Conference of 1996 International Computer Symposium on Networking and Multimedia, 1996, pp. 227-234.
Wen-Shenq Juang, Chin-Laung Lei, and Chun-I Fan, ‘A Secure and Practical Electronic Voting Scheme for Real World Environments,’ Proceedings of National Conference on Information Security, 1996, pp. 153-160.
Chun-I Fan, Chin-Laung Lei, and Wen-Shenq Juang, ‘On the Analysis of Public-Key Cryptosystems,’ Proceedings of National Conference on Information Security, 1996, pp. 228-235.
Wen-Shenq Juang, Chin-Laung Lei, and Chun-I Fan, ‘A Collision Free Secret Ballot Protocol for Computerized General Elections,’ International Computer Symposium, 1994, pp. 309-314.
Yi-Shiung Yeh and Chun-I Fan, ‘A Lagrange Interpolating Polynomials Cryptoscheme,’ Proceedings of the Third Conference on Information Security, 1993, pp. (B.1) 2.1-2.10.
Technical Reports:
Chun-I Fan et al, ‘對稱式密碼演算法之設計與運用研究計畫期中報告書,’ Telecommunication Labs, Chunghwa Telecom Co., Ltd., 2001.
Chun-I Fan, ‘改良式用戶端高效率盲簽章機制之評論,’ Technical Report, TL8F0-ISCI13-QR, Telecommunication Labs, Chunghwa Telecom Co., Ltd., 2001.
Chun-I Fan, ‘A Randomized Chaum’s Blind Signature Scheme,’ Technical Report, TL8F0-ISCI05-QR, Telecommunication Labs, Chunghwa Telecom Co., Ltd., 2001.
Chun-I Fan, ‘Efficient Digital Cash,’ Technical Report, TLATR-89653BS -QR, Telecommunication Labs, Chunghwa Telecom Co., Ltd., 2000.
Chun-I Fan, ‘An Efficient Anonymous Electronic Voting Protocol,’ Technical Report, TLATR-89653EV-QR, Telecommunication Labs, Chunghwa Telecom Co., Ltd., 2000.
Chun-I Fan, ‘A Fast Blind Digital Signature Scheme,’ Technical Report, TLATR-89653EB-QR, Telecommunication Labs, Chunghwa Telecom Co., Ltd., 2000.
Chun-I Fan et al, ‘中華電信公司最具潛力新服務之研究專題報告書,’ Telecommunication Labs, Chunghwa Telecom Co., Ltd., 2000.