Journals

  1. T.F. Lee, C.Y. Lin, Chun-Li Lin and T. Hwang, “Provably secure extended chaotic map-based three-party key agreement protocols using password authentication,”
    Nonlinear Dynamics, 09 May 2015.
  2. Chun-Li Lin and C.P. Hung, “Cryptanalysis and Improvement on Lee-Chen's One-Time Password Authentication Scheme,”
    International Journal of Security and Its Applications, Vol. 2, No. 2, April 2008.
  3. Y.C. Liu, H.A. Wen, Chun-Li Lin and T. Hwang, “Proxy-Protected Signature Secure Against the Undelegated Proxy Signature Attack,” 
    Computers and Electrical Engineering (SCIE, EI), Vol. 33, No. 3, pp. 177-185, May 2007.
  4. Chun-Li Lin and C.P. Hung, “Impersonation Attack on Two-Gene-Relation Password Authentication Protocol (2GR),” 
    IEICE Transactions on Communications (SCI, EI), Vol. E89-B, No. 12, pp. 3425-3427, December 2006.
  5. H.A. Wen, Chun-Li Lin and T. Hwang, “Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients,” 
    Computers & Security (SCIE, EI), Vol. 25, No. 2, pp. 106-113, March 2006.
  6. Chun-Li Lin, H.A. Wen, T. Hwang and H.M. Sun, “Provably Secure Three-Party Password-Authenticated Key Exchange,” 
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (SCIE, EI), Vol. E87-A, No. 11, pp. 2990-3000, November 2004.
  7. T.F. Lee, T. Hwang and Chun-Li Lin, “Enhanced Three-Party Encrypted Key Exchange without Server Public Keys,” 
    Computers & Security (SCIE, EI), Vol. 23, No. 7, pp. 571-577, October 2004.
  8. X. Yi, C.K. Siew, H.M. Sun, H.T. Yeh, Chun-Li Lin and T. Hwang, “Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications,” 
    IEEE Transactions on Vehicular Technology (SCI, EI), Vol. 52, No. 2, pp. 465-468, March 2003.
  9. Chun-Li Lin and T. Hwang, “A Password Authentication Scheme with Secure Password Updating,”
    Computers & Security (SCIE, EI), Vol. 22, No. 1, pp. 68-72, January 2003.
  10. Chun-Li Lin, H.M. Sun, M. Steiner and T. Hwang, “Three-party Encrypted Key Exchange Without Server Public-Keys,” 
    IEEE Communications Letters (SCI, EI), Vol. 5, No. 12, pp. 497-499, December 2001.
  11. Chun-Li Lin, H.M. Sun and T. Hwang, “Attacks and Solutions on Strong-Password Authentication,” 
    IEICE Transactions on Communications (SCI, EI), Vol. E84-B, No. 9, pp. 2622-2627, September 2001.
  12. Chun-Li Lin, H.M. Sun and T. Hwang, “Efficient and Practical DHEKE Protocols,” 
    ACM SIGOPS Operating Systems Review (EI), Vol. 35, No. 1, pp. 41-47, January 2001.
  13. Chun-Li Lin, H.M. Sun and T. Hwang, “Three-party Encrypted Key Exchange: Attacks and A Solution,” 
    ACM SIGOPS Operating Systems Review (EI), Vol. 34, No. 4, pp. 12-20, October 2000.
  14. N.Y. Lee, C.C. Chang, Chun-Li Lin and T. Hwang, “Privacy and Non-Repudiation on Pay-TV Systems,” 
    IEEE Transactions on Consumer Electronics
     (SCI, EI), Vol. 46, No. 1, pp. 20-27, February 2000.

Conferences

  1. 林峻立、莊宗翰, 張彥威, “以區塊鏈達到公平的售票系統,”
    2017 Conference on Information Technology and Applications in Outlying Islands, pp. 385-392, May 19-21, 2017.
  2. 林峻立、孫揚理, 莊宗翰, “區塊鏈之電子書授權控制,”
    2017 Conference on Information Technology and Applications in Outlying Islands, pp. 398-402, May 19-21, 2017.
  3. 林峻立、張彥威, 孫揚理, “基於以太坊實現診斷證明之智能合約,”
    2017 Conference on Information Technology and Applications in Outlying Islands, pp. 393-397, May 19-21, 2017.
  4. 林峻立、許安迪, “防止Wi-Fi定位欺騙攻擊之認證協定,”
    2016 Conference on Information Technology and Applications in Outlying Islands, pp. 215-220, May 20-21, 2016.
  5. 林峻立、許智源、吳楨智, “智慧行動裝置之雙因子認證,”
    2015 Conference on Information Technology and Applications in Outlying Islands, pp. 182-186, May 22-23, 2015.
  6. 林峻立、黃琦展、莊宗翰、孫揚理、蔡佩諭, “遠端管控行動裝置之使用,”
    2014 Conference on Information Technology and Applications in Outlying Islands, pp. 268-273, May 23-24, 2014.
  7. 林峻立、許智源, “結合手寫簽名及地理位置之行動裝置認證機制,”
    2014 The Fourth National Conference on Web Intelligence and Applications (NCWIA 2014), May 2-3, 2014.
  8. 林峻立、鄭仁傑、許智豪, “有效率且無連結之雲端儲存密文搜尋,”
    2013 Conference on Information Technology and Applications in Outlying Islands, pp. 861-865, May 24-26, 2013.
  9. 林峻立、許智豪、鄭仁傑, “植基於門檻技術之可靠的異質雲儲存,”
    2013 Conference on Information Technology and Applications in Outlying Islands, pp. 857-860, May 24-26, 2013.
  10. Chun-Li Lin, “具動態維護及合取關鍵字搜尋之無連結性密文搜尋機制,”
    2013 Cryptology and Information Security Conference (CISC 2013), pp. 272-275, May 23-24, 2013, Tainan, Taiwan.
  11. 李添福、孫珮文、林峻立, “使用 Indefinite-index 之改良式 RFID 認證機制,”
    2013 Cryptology and Information Security Conference (CISC 2013), pp. 136-140, May 23-24, 2013, Tainan, Taiwan.
  12. Chun-Li Lin, “Insider Attack on a Smart Card-Based User Authentication and Key Agreement Scheme,”
    2013 The Third National Conference on Web Intelligence and Applications (NCWIA 2013), pp. 88-90, April 26, 2013, Kaohsiung, Taiwan.
  13. Chun-Li Lin, “A False Positive-Based Unlinkable Ciphertext Searching for Cloud Storage Services,”
    2012 International Conference on Business and Information (BAI 2012), July 3-5, 2012, Sapporo, Japan.
  14. 林峻立、薛富鍵, “TrueCrypt安全性之探討與改進,”
    2012 Conference on Information Technology and Applications in Outlying Islands, pp. 161-166, May 25th ~ 26th, 2012.
  15. 林峻立、曾思維, “Nicetext轉換實現可否認加密之改進,”
    2012 Conference on Information Technology and Applications in Outlying Islands, pp. 450-455, May 25th ~ 26th, 2012.
  16. Chun-Li Lin and K.Y. Liang, “An Ultralightweight RFID Authentication Protocol Based on An Ultralightweight Hash Primitive,”
    2011 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology (e-CASE & e-Tech 2011), January 18-20, 2011, Tokyo, Japan.
  17. Chun-Li Lin, “An Anonymous Authentication Scheme for Telematics Applications,”
    The Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2010), December 13-15, 2010, Shenzhen, China.
  18. Chun-Li Lin and L.M. Ko, “An Effective URL Similarity Checking Algorithm for Phishing Detection,”
    2010 International Conference on Business and Information (BAI 2010), July 5-7, 2010, Kitakyushu, Japan.
  19. 林峻立、梁魁元, “植基於輕量雜湊原件之Ultralightweight RFID認證機制,”
    2010 Symposium on Applications of Information, Management and Communication Technology, June 11, 2010.
  20. 林峻立、閻一平, “基層人員資安概念與教育規劃之探討-以公務機關P單位為例,”
    2010 Symposium on Applications of Information, Management and Communication Technology, June 11, 2010.
  21. 林峻立、陳又誠, “雲端儲存服務之無連結性搜尋樣式密文搜尋,”
    2010 Conference on Information Technology and Applications in Outlying Islands, May 28th ~ 29th, 2010.
  22. 林峻立、王宏竹、陳柏銘、張家豪、顏崇仁, “個人電腦網址嫁接偵防機制,”
    2009 Conference on Information Technology and Applications in Outlying Islands, pp. 582-586, May 22th ~ 23th, 2009.
  23. 林建州、林峻立、蕭博元、張育倫、許銘祥、薛人頊, “隨身加密器-指紋加密系統之實現,”
    2009 Conference on Information Technology and Applications in Outlying Islands, pp. 564-568, May 22th ~ 23th, 2009.
  24. Chun-Li Lin and Y.C. Chen, “不具連結性搜尋樣式之加密資料搜尋,”
    2009 International Conference on Advanced Information Technologies (AIT 2009), April 24th ~ 25th, 2009.
  25. Chun-Li Lin and L.M. Ke, “網路釣魚偵測演算法-LinkGuard的弱點與改進,”
    2008 Taiwan Academic Network Conference (TANET 2008), October 20th ~ 22th, 2008.
  26. Chun-Li Lin and L.C. Chang, “An Efficient AES-Based RFID Authentication Protocol,”
    The 3rd Joint Workshop on Information Security (JWIS 2008), July 10-11, 2008, Hanyang University, Seoul, Korea.
  27. Chun-Li Lin and M.H. Cheng, “抵擋網路釣魚攻擊之一次性通行碼認證機制,”
    2008 Symposium on Applications of Information, Management and Communication Technology, June 13, 2008.
  28. Chun-Li Lin and L.C. Chang, “使用輕量讀取器之離線式RFID認證協定,”
    2008 Symposium on Applications of Information, Management and Communication Technology, June 13, 2008.
  29. Chun-Li Lin and L.C. Chang, “植基於AESRFID認證機制之安全分析,”
    2008 RFID Technology Conference, February 2008.
  30. Chun-Li Lin and C.P. Hung, “Masquerade on One-Time Password Authentication Scheme,”
    2007 Future Generation Communication and Networking (FGCN 2007), December 6th ~ 8th, 2007, Jeju-Island, Korea.
  31. Chun-Li Lin and C.P. Hung, “Security Enhancement for Two-Gene-Relation Password Authentication Protocol (2GR),”
    2007 Taiwan Academic Network Conference (TANET 2007), October 22th ~ 25th, 2007.
  32. Chun-Li Lin and K.C. Chang, “針對Chien-Chen所提RFID認證機制之向前安全性攻擊,”
    2007 Symposium on Applications of Information, Management and Communication Technology, June 2007.
  33. Chun-Li Lin and K.C. Chang, “EPC Class 1 Generation 2 RFID認證機制之安全分析,” 
    The 17th Information Security Conference
    (ISC2007), pp. 600-606, June 2007.
  34. Chun-Li Lin and M.C. Chan, “有效率的密碼更換方法,”
    2006 Symposium on Applications of Information, Management and Communication Technology, June 2006.
  35. Chun-Li Lin and C.J. Shie, “階層式存取控制運用單向雜湊函數之改進,” 
    The 16th Information Security Conference
    (ISC2006), pp. 418-425, June 2006.
  36. Chun-Li Lin and C.P. Hung, “Improvement on Robust and Simple Authentication (ROSI),”
    2006 Symposium on Application and Development of Management Information System, pp. 214-217, June 2006.
  37. Chun-Li Lin and M.C. Chan, “Guessing Attack on Two Password Change Schemes,”
    2006 International Conference of Digital Technology and Innovation Management, pp. 1670-1677, April 2006.
  38. Chun-Li Lin and C.P. Hung, “Collusion Attack on Chien's Time-Bound Hierarchical Key Assignment Scheme,”
    2006 International Conference of Digital Technology and Innovation Management, pp. 1642-1647, April 2006.
  39. Chun-Li Lin and M.C. Chan, “匿名性行動通訊系統安全性之分析,”
    The 12th Mobile Computing Workshop, March 2006.
  40. Chun-Li Lin and M.C. Chan, “Quick Partition Attack on Password Authenticated Key Exchange for Imbalanced Wireless Networks,”
    The 12th Mobile Computing Workshop, March 2006.
  41. Chun-Li Lin and R.C. Huang, “Yang-Fan-Shieh安全群播協定的弱點,”
    2005 Symposium on Applications of Information, Management and Communication Technology, June 2005.
  42. M.C. Chan and Chun-Li Lin, “具撤銷能力之身份認證協定,”
    2005 Symposium on Applications of Information, Management and Communication Technology, June 2005.
  43. M.C. Chan and Chun-Li Lin, “A Robust Password-Authenticated Key Exchange Protocol,” 
    The 15th Information Security Conference
    (ISC2005), June 2005.
  44. C.H. Chen and Chun-Li Lin, “An Efficient Conference Key Distribution Scheme of Mobile Communications,” 
    2004 Conference on Electronic Communication and Applications
    (CECA 2004), May 2004.
  45. K.H. Chen and Chun-Li Lin, “An Efficient Authentication Scheme for Roaming on Wireless LAN,” 
    2004 Conference on Electronic Communication and Applications
    (CECA 2004), May 2004.
  46. Y.F. Li and Chun-Li Lin, “An Improved UMTS Authentication Scheme,” 
    2004 Conference on Electronic Communication and Applications
    (CECA 2004), May 2004.