[ Ph. D. (graduate) ] [ Ph. D. (in school)] [ Master (graduate) ] [ Master (in school) ]

Ph. D. Students (graduated)


01. Lin, Chu-Hsing

Title: Some Control Mechanisms for Data Security in Computer Systems

Completion Date: June 1991
02. Wu, T. C.

Title: The Study of Encryption and Control Techniques for Information System

Completion Date: June 1992
03. Chen, Y.J.

Title: Some Properties on Vectorial Addition Chains

Completion Date: December 1994
04. Chen, C. Y.

Title: The Study of Properties for Local Queries in Multi-Key File Systems

Completion Date: June 1995
05. Hwang, S. J.

Title: The Design and Server-Aided Secret Computation of Digital Signatures

Completion Date: April 1996
06. Chen, C. Y.

Title: The Study of Properties and Applications for Public Key Cryptosystem Based on Number Theorem

Completion Date: April 1996
07. Lou, D. C.

Title: Fast Computations for Some Public Key Cryptosystems

Completion Date: March 1997
08. Lee, Wei-Bin

Title: Designing Some Digital Signature Schemes and Extending Their Applications to Information Security Systems

Completion Date: May 1997
09. Hwang, R. J.

Title¡GSome Secret Sharing Schemes and Their Applications

Completion Date: April 1998
10. Lee, C. F.

Title¡GSome Indexing Design and File Organizations for Spatial Match Retrieval

Completion Date: June 1998
11. Hu, Y. C.

Title¡GSome Image Encoding Schemes Based on Vector Quantization Completion Date: Decmeber 1999
12. Jiang, J. H.

Title¡GEffective Algorithms for Compressing Various Data Completion Date: December 1999
13. Wang, C. T.

Title¡GDesigning Some Cryptographic Schemes for Group Communication Systems

Completion Date: December 1999
14. Chan, Y. K.

Title¡GSimilar Image and Video Retrieval Systems Based on Spatial and Color Attributes

Completion Date: December 2000
15. Hung, K. L.

Title¡GBlock Reconstruction Techniques for Image Recovery

Completion Date: January 2002
16. Tsai, C. S.

Title¡GA Study of Image Intellectual Property Rights Protection and Image Camouflage

Completion Date: May 2002
17. Wu, H. C.

Title¡GCopyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery

Completion Date: June 2002
18. Hwang, K. F.

Title¡GSecure Encryption and Authentication Schemes for Text Data and Digital Images

Completion Date: June 2002
19. Tsai, Pi-Yu

Title¡GThe Study of Image Protection Mechanisms for Image Hiding and Image Authentication

Completion Date: January 2004
20. Lin, Iuon-Chang

Title: Data Communication and Security in Mobile Computing Environment

Completion Date: March 2004
21. Lai, Yeu-Pong

Title: Fast Exponentiation Computations and Number System Transformations

Completion Date: July 2004
22. Chuang, Jun-Chou

Title: Steganography and Watermarking in Digital Images

Completion Date: October 2004
23. Yu, Yuan-Hui

Title: The Study of Digital Image Hiding and Recognition

Completion Date: January 2005
24. Tseng, Hsien-Wen

Title: Image Coding Schemes for Data Hiding and Error Resiliency

Completion Date: January 2005
25. Chan, Chao-Wen

Title: The Enhancements of Some Public Key Cryptosystems and Their Applications in Electronic Commerce

Completion Date: January 2005
26. Huang, Hui-Feng

Title: The Design and Applications of Some Digital Signatures

Completion Date: January 2005
27. Lu, Tzu-Chuen

Title: The Study of Information Hiding Mechanisms

Completion Date: December 2005
28. Chang, Ya-Fen

Title: Authentication and Digital Signature Schemes and Their Applications to E-commerce

Completion Date: December 2005
29. Chan, Chi-Shiang

Title: The Study of Image Steganography and Digital Watermarking

Completion Date: December 2005

Ph. D. Students (in school)


Wu, Ming-Ni Lee, Yu-Chiang Lin, Chi-Nan
Lin, Chin-Yang Yang, Jen-Ho Chou, Yung-Chen
Lee, Jung-San Wu, Wen-Juan Chen, Chang-Chu
Wu, Chia-Chi Lin, Chih-Wei Lin, Pei-Yu
Tai, Wei-Liang Hsieh, Yi-Pei Chen, Yi-Hui
Tsai, Hao-Chuan Lee, Chia-Yin Pai, Shang-Chin
Lin, Keng-Chu Tsou, Chih-Chiang


International Exchange Student

Jochen Penne

Master Students (graduated)


No. Name Thesis Title Completion Date
1. Su, D. H. Some Properties of Multi-Attribute File System Based upon Multiple Key Hashing Functions for Partial Match Queries 5/1984
2. Lian, L. S. Toward the Strict Optimality Study on Concurrent Disk Accessing 5/1984
3. Shen, Jau-Ji Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk System 5/1984
4. Liang, J. Performance Analysis of the k-nearest Neighbor Search Technique Based upon Multiple Key Hashing Functions 5/1984
5. Yuan, S. T. A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems 5/1985
6. Tsai, W. H. A Branch and Bound Algorithm for Allocating Multi-attribute File Systems 5/1985
7. Shieh, J. C. On the Design of Letter Oriented Minimal Perfect Hashing Functions 5/1985
8. Hung, M. F. An Access Control Mechanism for Information Protection System 5/1986
9. Chen, C. P. A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem 5/1986
10. Chen, H. Y. Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems 5/1986
11. Hsiao, M. D. The Study of File Allocation Strategies for Concurrent Retrieval 5/1986
12. Lee, Y. P. A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing 5/1986
13. Lin, C. H. A Strategy of Information Secure Broadcasting 5/1986
14. Cheng, W. Y. The Study of a User-Hierarchy Mechanism for Computer System Resources 5/1987
15 Chang, C. H. A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem 5/1987
16 Chen, C. H. The Study of Data Missing and Data Integrity 5/1987
17 Wu, H.C. The Design of a Minimal Perfect Hashing Function for Mandarin Symbols System 5/1987
18 Wang, C. T. The Development of a Computer Assisted Instruction System for Structure Assembly Languages 5/1987
19 Mong, I. H. A New Data Compression Scheme Based upon Lempel-Ziv Universal Algorithm 5/1988
20 Chang, S. S. Optimal Properties of Binary Cartesian Product File System 5/1988
21 Chen, C. H. Organizing Distributed Data Based for Parallel Searching 5/1988
22 Hsiao, J. Y. Strings Near-Matching Techniques for Large Textual Files 5/1988
23 Leu, D. F. Multi-key Sorting as a File Organization Scheme When Queries Are Not Equally Likely 5/1988
24 Chou, A. Y. H. The Study of File Systems Suitable for Queries 5/1989
25 Chow, L. C. The Study of Visual Form Transformation System 5/1989
26 Wu, T. C. The Studies of Computer Authentication and Secure Broadcasting Based upon Euclidean Geometry 5/1989
27 Liao, H. T. A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control 5/1989
28 Wu, L. H. An Arithmetic Coding Oriented Single Key Access Control Scheme 5/1989
29 Wu, C. H. The Study of Security Technologies for Broadcasted Network Systems 5/1989
30 Lin, J. C. A Fast Spatial Match Accessing Scheme for Symbolic Pictures 5/1990
31 Dai, J. Y. Sharing a Circular Storage for Multiple Stacks 5/1990
32 Chen, D. C. A Modified Arithmetic Coding Scheme Suitable for Binary Search 5/1990
33 Hwang, S. M. A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid 5/1990
34 Lin, J. F. A Chinese Syllables Compression Scheme Based Upon Perfect Hashing 5/1990
35 Wang, S. J. A Dynamic Key-Lock-Pair Access Control Scheme 5/1991
36 Hwang, R. J. Controlling Access in Hierarchical Structures Using Cryptographic Keys 11/1991
37 Hwang, S. J. Sharing a Dynamic Secret 11/1991
38 Lee, H.C. A Solution to Generalized Group Oriented Cryptography 5/1992
39 Chen, C. Y. A Dynamic Access Control Scheme Based Upon Ziegler's Row Displacement Method 5/1992
40 Chen, Y. W. A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis 5/1992
41 Kowng, H. C. A Digital Signature Scheme Based Upon Theory of Quadratic Residues 5/1992
42 Lee, W. B. On the Design and Implementation of an Analyzer and a Vaccination for Computer Viruses 5/1993
43 Liou, F. Y. A Digital Multisignature Scheme Based upon Modified E1Gamal's Public Key Cryptosystem And Its Digital Signature Scheme 5/1993
44 Wang, C. H. A Modified Lempel-Ziv-Welch Encoding Scheme Based on the Frequencies of Characters 5/1993
45 Liao, W. Y. A Remote password authentication scheme based upon ElGamal's signature scheme 5/1993
46 Lin, T. H. A Secure Group-Oriented Secret Sharing Scheme 5/1993
47 Lee, C. F. A Greedy Relaxed Generalised Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems 5/1994
48 Tsu, S. M. An Improvement on a Probabilistic Encryption Scheme and Its Applications 5/1994
49 Jiang, J. H. A Spatial Filter for Similarity Retrieval 5/1994
50 Wu, W. B. A Secure Voting System on a Public Network 5/1994
51 Horng, W. J. A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm 5/1994
52 Lin, D. C. Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters 5/1995
53 Li, W. T. A Fast Search Algorithm for Vector Quantization Based Upon Principal Component Analysis Technique 5/1995
54 Leu, JJyh-Jong The Performance Analysis of Bloom and Random Filters 5/1995
55 Kuo, C. L. Fast Codeword Search Techniques for Vector Quantization 6/1996
56 Chou, J. S. An Image Coding Scheme Using Prediction of Euclidean Distance Computation on a Smaller Codebook 6/1996
57 Sung, C. H. Locally Adaptive Schemes for Data Compression Using Multilist Structure 6/1997
58 Chen, L. L. Some Searching Techniques for Block Motion Estimation for Video Compression 6/1997
59 Jau, J. J. Image Compression and Transmission Using Vector Quantization and S-tree 6/1998
60 Hwang, P. C. Accessing Shared Secrets in a Hierarchy 6/1998
61 Shine, F. C. Some Techniques of Image Compression and Transmission Using Vector Quantization and Bit-plane 6/1998
62 Chen, Kuo-Lun Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t,n) Threshold Scheme 6/1999
63 Kuo, Y. T. Fast Algorithm for Some Meta-Operations in Cryptographic Systems 6/1999
64 Chung, P. F. Two Copyright Protection Scheme for Digital Images 6/2000
65 Xiao, G. X. Two Prediction Methods for Image Compression and Progressive Image Transmission 6/2000
66 Lin, Y. Image Compression and Copyright Protection Using Edge Detection Methods 6/2000
67 Hsia, H.C. Two Hiding Techniques for Data Security and Image Copyright Protection 6/2000
68 Chuang, J. C. The Study of Image Tampering Detection 6/2000
69 Hsieh, C. P. The Study of Denoising Technique for Digital Images 6/2001
70 Lu, P. W. The Application of Vector Quantization Techniques to Digital Image Tamper Proofing 6/2001
71 Jiang,J. L. The Design of Some Filter for Image Denoising 6/2001
72 Yeh, J. C. The Study of Copyright Protection Schemes for Digital Images 6/2001
73 Chan, C. S. Some Data Hiding Techniques for Digital Images 6/2001
74 Yu, T. X. The Study of Digital Image Ciphering and Hiding Mechanisms 6/2002
75 Pan,Y. P. The Study of Multisecret Sharing Schemes and Their Applications to Access Control in a User Hierarchy 6/2002
76 Chung, C. Y. Some Protocols for Passing Messages Securely and Protecting Rightful Ownership 6/2002
77 Chen, G. I. TheStudy of Lossless Image Compression an Image Magnification 6/2002
78 Su, Y. Y. Two Color Image Quantization Schemes for Non-true-color Display 6/2002
79 Lee, C. F. Code Transformation Between Various Image Splitting Tree Representations and Chinese Calligraphy Transmission Progressively Based on Quadtrees 6/2003
80 Wu, W. J. Data Hiding and Content Retrieval in Digital Image Database 6/2003
81 Chen, G. M. Lossless Vector Quantization Indices Compression and Information Hiding Schemes Based on Search-Order Coding 6/2003
82 Liao, C. T. Some Image Compression and Data Protection Techniques Using Support Vector Machines 6/2003
83 Chou, H. C. Some Studies on Digital Image Steganographic and Watermarking Techniques 7/2003
84 Hu, Y. H. Retrieving Digital Images from Frequency Domain Transformed Databases 6/2004
85 Tai. W. L. Hiding a Digital Image into Two Cover Images 6/2004
86 Liu, Y. L. The Techniques of Digital Image Transmission and Authentication 6/2004
87 Lin, P. Y. Two Data Hiding Schemes for Grayscale Images and Image Compression Codes 6/2004
88 Tseng, Chun-Sen Various Secret Embedding Schemes for Binary and Gray Level Techniques 6/2005
89 Wang, Yu-Zheng Some Image Steganography Schemes with High Embedding Capacity 6/2005
90 Yeh, Jun-Bin Hiding Secrets in Data Compression Codes 6/2005
91 Kao, Chia-Lin On Authentication Protocols for Communication Networks 6/2005
92 Kuo, Jui-Yi Some Password Authentication Schemes Using Smart Cards for Single and Multiple Server Architectures 6/2005
93 Lin, Keng-Chu Some Efficient Techniques for Secure Peer-to-Peer Networking 6/2005

Master Students (in school)


Chang, Pen-Yi Shue, Yu-Wei Cheng, Yi-Fang
Fan, Yi-Hsuan Chiu, Yen-Chang Chang, Kai-Jie
Lin, Shih-Yi Li, Kuan-Ming Chang, Shin-Chang
Cheng, Ting-Fang Lin, Chia-Hsuan Yah, Chia-Ming
Lee, Yi-Ta