top of page

SCI Journals

  1. Chen, Y.C., Cheng, C.H.Lin, T.W., Lee, J.S, Diverse Machine Learning-based Malicious Detection for Industrial Control System, Electronics, Vol. 14, No. 10, 2025, DOI:10.3390/electronics14101947.

  2. Lin, T.W., Hsu, C.L., “ID-based Proxy Signature with Key-insulated Scheme for Portable Healthcare Devices in 5G-IoHT,” Journal of Internet Technology, Vol. 26, No. 3, 2025, pp. 283-292.

  3. Chin, Y.C., Hsu, C.L.,Lin, T.W., Tsai ,K.Y., A Hierarchical Blockchain System for Social Economy Services, Electronics, Vol. 13, No. 20, 2024, DOI:10.3390/electronics13204004.

  4. Chen, Y.J., Hsu, C.L., Lin, T.W., Lee, J.S., Design and Evaluation of Device Authentication and Secure Communication System with PQC for AIoT Environments, Electronics, Vol. 13, No. 8, 2024, DOI:10.3390/electronics13081575.

  5. Lin, T.W., “A Privacy-preserved ID-based Secure Communication Scheme in 5G-IoT Telemedicine Systems,” Sensors, Vol. 22, No. 18, 2022, DOI: 10.3390/s22186838.

  6. Lin, T.W., Hsu, C.L., Le, T.V., Lu, C.F., Huang, B.Y. “A Smartcard-based User-controlled Single Sign-on for Privacy Preservation in 5G-IoT Telemedicine Systems,” Sensors, Vol. 21, No. 8, 2021, pp. 1-22, DOI: 10.3390/s21082880.

  7. Lin, T.W., Hsu, C.L., “FAIDM for Medical Privacy Protection in 5G Telemedicine Systems,” Applied Sciences, Vol. 11, No. 3, 2021, pp. 1-22, DOI: 10.3390/app11031155.

  8. Hsu, C.L., Le, T.V., Lu, C.F., Lin, T.W., Chuang, T.H., “A Privacy-preserved E2E Authenticated Key Exchange Protocol for Multi-server Architecture in Edge Computing Networks,” IEEE Access, Vol. 8, 2020, pp. 40791-40808, DOI: 10.1109/ACCESS.2020.2976431.

  9. Wong, A.M.K., Hsu, C.L., Le, T.V., Hsieh, M.C., Lin, T.W., “Three-factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-server E-Health Systems in 5G-based Wireless Sensor Networks,” Sensors, Vol. 20, No. 9, 2020, DOI: 10.3390/s20092511.

  10. Lin, T.W., Hsu, C.L., “Anonymous Group Key Agreement Protocol for Multi-server and Mobile Environments Based on Chebyshev Chaotic Maps,” Journal of Supercomputing, Vol. 74, No. 9, 2018, pp. 4521-4541, DOI: 10.1007/s11227-018-2251-7.

Other Journals

  1. Lin, T.W., Hsu, C.L., “Chaotic Maps-based Privacy-preserved Three-factor Authentication Scheme for Telemedicine Systems,” International Journal of Network Security, Vol. 25, No. 2, 2023, pp. 194-200, DOI: 10.6633/IJNS.202303 25(2).02.

Academic Journals Published in Taiwan

  1. 蔡國裕、林子煒(Lin, T.W.)、尤婕蓉、林玟欣,《基於後量子密碼學之醫療資訊安全系統設計》,資訊安全通訊,第30卷,第4期,頁1-13,2024。

  2. 林子煒(Lin, T.W.)、蔡國裕、郭崇韋、林玟欣、李品臻、梁瑋宸、黃千芸、范秩嘉、陳宣廷、王富貴,《設計與建置利用開源結合 AI 之校園資安監測平台-以臺灣中部某大學為例》,資訊安全通訊,第30卷,第4期,頁36-44,2024。

  3. 林子煒(Lin, T.W.),《適用於5G智慧救護車之植基於切比雪夫混沌映射聯合匿名身分管理協定》,資訊安全通訊,第28卷,第4期,頁1-15,2022。

  4. 許建隆,蔡昇宏,林子煒(Lin, T.W.),《基於開放源碼雲端運算架構之高彈性駭客攻防教學平台之設計與評估》,資訊安全通訊,第23卷,第2期,頁1-23,2015。

  5. 范仲玫,許建隆,林子煒(Lin, T.W.),《同意書簽署數位化之安全可行性方案設計與評估研究—以醫院同意書簽署為例》,資訊安全通訊,第23卷,第2期,頁57-77,2015。


International Conference Papers

  1. Lin, T.W., Yu, C.J., Privacy-preserved PQC-based UCSSO in Telemedicine Systems, on 2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025), 2025.

  2. Liang, W.C., Liou, Y.J., Ura, E., Lin, T.W.A CNN-Based Real-Time Facial Emotion Recognition System for Alzheimer’s Disease Patients, on 2025 IEEE 11th International Conference on Applied System Innovation (IEEE ICASI 2025), 2025.

  3. Huang, C.Y,, Chen, H.T., Wang, F.G., Lin, T.W.Design and Evaluation of a GRU-based Wearable Device for Heart Rate Measurement of Telemedicine Environments, on 2025 IEEE 11th International Conference on Applied System Innovation (IEEE ICASI 2025), 2025.

  4. Chi, Y.M., Lin, T.W., Wang, F.G., Tsai, K.Y., Distributed Security Deployment Framework Based on SDN and Zero Trust Architecture, on 2024 Taiwan Summer Workshop on Information Management, 2024.

  5. Chen, Y.J., Lin, T.W., Kuo, C.W., Tsai, K.Y., An Approach of Privacy-preserved PQC-based Cyber-threat Intelligence System, on 2024 8th International Conference on Cryptography, Security and Privacy (CSP 2024), 2024.

  6. Lin, T.W., “PP-3FAT Scheme for 5G-IoHT Telemedicine Systems” on 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023), 2023.

  7. Lin, T.W., Hsu, C.L., “Comprehensive Review of 5G-IoT Telemedicine Systems Scenario and Security-Related Issues” on International Conference on Medical Design (MD2022), 2022.

  8. Lin, T.W., Chen, W.R., Fang, J.H., Lee, S.Y., Li, P.C., “An AI-enabled Internet of Medical Things for Emergency Medical Service” on International Conference on Medical Design (MD2022), 2022.

  9. Lin, T.W., Hsu, C.L., “Privacy-preserved Hierarchical Authentication and Key Agreement for AI-enabled Telemedicine Systems” on  2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021), 2021.

  10. Lin, T.W., Hsu, C.L., Chuang H.M., “5G-based FAIDM for Medical Privacy Protection” on International Conference on Medical Design (MD2020), 2020.

  11. Yang, A.N., Hsu, C.L., Hsu, C.M., Lin, T.W., “Digital Forensic Laboratory Investigation Process and Management Based on
    Internet of Medical Things (IoMT)” on International Conference on Medical Design (MD2020), 2020.

  12. Chen, Y.J., Hsu, C.L., Lin, T.W., “Designing an NTRU-based Cryptographic Protocol for 5G-IoT Smart Healthcare Environments” on International Conference on Medical Design (MD2020), 2020.

  13. Hsu, C.L., Lin, T.W., Chuang, T.H., Chen, Y.J., “Design and Implement of a Post-quantum Blockchain Protocol for Enhancing Security and Privacy of IoT-based Healthcare Environment” on International Conference on Medical Design (MD2019), 2019.

  14. Hsu, C.L., Chuang, T.H., Lin, T.W., “A Dynamic Identity End-to-End Authentication Key Exchange Protocol for Wearable Devices in eHealth Environments” on Society for Design and Process Science (SDPS2019), 2019. (Poster)

  15. Hsu, C.L., Fan, C.M., Lin, T.W., “A Secure Handwritten Digital Signature Scheme for ePaper-based Intelligent Healthcare Services” on 2019 6th International Conference on Electronics Engineering and Technology (ICEET 2019), 2019.

  16. Lin, T.W., Hsu, C.L., “The Effect of Xbox Intervention on Weight Loss: a Meta-analysis Study,” on the 4th International Conference on Healthcare and Management (ICHM 2018), 2018.

  17. Hsu, C.L., Lu, S.H., Lin, T.W., “Design and Evaluation of Stroke Rehabilitation Games Based on Serious Game and Clinical Knowledge” on Society for Design and Process Science (SDPS2017), 2017, pp. 132-136.

  18. Hsu, C.L., Lin, T.W., Lu, H.C., Chuang, T.H., Chen, Y.H., “Privacy-preserved Conference Key Distribution Protocol” on 12th International Conference on Digital Information Management (ICDIM 2017), 2017, pp. 127-132.

  19. Hsu, C.L., Chuang, T.H., Chen, Y.H., Lin, T.W., Lu, H.C., “A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments” on 12th International Conference on Digital Information Management (ICDIM 2017), 2017, pp. 133-138.

  20. Hsu, C.L., Lin, T.W., Chung, M.H., Lee, S.T., “Attribute-based Encryption Scheme and Conference Key Distribution System” on Taiwan-Japan Workshop on “Security and Dependability Technologies for 2017,” 2017. (Poster)

  21. Hsu, C.L., Lu, S.H., Lin, T.W., “Design and Evaluation of Stroke Rehabilitation Games Based on Clinical Knowledge with Virtual Reality Technology” on 37th Great Lakes Biomedical Conference, 2017. (Poster)

  22. Hsu, C.L., Chuang, T.H., Lin, T.W., “End-to-End Authenticated Key Exchange Agreement for Wearable Devices in IoT Environments” on 37th Great Lakes Biomedical Conference, 2017. (Poster)

  23. Hsu, C.L., Lin, T.W., Pan, L.H., “The RFID Protocol with Unlimited Item-level Ownership Transfer for Supply Chain Environments” on Society for Design and Process Science (SDPS2016), 2016. (Poster)

  24. Lin, T.W., Hsu, C.L., Chuang H.M., “Federated Anonymous Identity Management for Cloud Computing” on Singapore International Conference on “Engineering & Technology, Computer, Basic & Applied Sciences” (ECBA-2015), 2015.

  25. Hsu, C.L., Lin, T.W., “Privacy-preserved Key Agreement with User Authentication” on the 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), 2015, pp. 12-17.

  26. Hsu, C.L., Lin, T.W., Lin, Y.L., “Authenticated Group Key Agreement Protocol based on Chebyshev Chaotic Map” on 2013 e-CASE & e-Tech International Conference, 2013, pp. 195-205.

  27. Hsu, C.L., Lin, T.W., “Password Authenticated Key Exchange Protocol for Multi-server Mobile Networks based on Chebyshev Chaotic Map” on the 9th International Workshop on Mobile Peer-to-Peer Computing 2013 (MP2P’13), 2013, pp. 90-95.

  28. Hsu, C.L., Chan, Y.S., Lin, T.W., “Security Analysis of eSeal used in Taiwan Customs Officials” on 17th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2011), 2011, pp. 668-675.

Academic Conference Papers in Taiwan

  1. 林子煒(Lin, T.W.)、尤婕蓉《應用於遠距醫療系統的後量子隱私保護UCSSO機制》,第三十五屆全國資訊安全會議,2025

  2. 吳如娟,王富貴,林子煒(Lin, T.W.)《人工智慧課程發展與知識領域之探討:以台灣人工智慧相關科系課程規劃為例》,第36屆國際資訊管理學術研討會,2025

  3. 吳如娟,王富貴,林子煒(Lin, T.W.)《人工智慧在高等教育課程規劃架構與產業人才需求之探討》,2025 國際大數據與ERP學術及實務研討會,2025。

  4. 蔡國裕林子煒(Lin, T.W.)尤婕蓉林玟欣《基於後量子密碼學之醫療資訊安全系統設計》,2024臺灣網際網路研討會,2024

  5. 蔡國裕林子煒(Lin, T.W.)尤婕蓉林玟欣《適用於雲端資料保護之基於網格密碼學屬性加密協定》,第三十四屆全國資訊安全會議,2024

  6. 林子煒(Lin, T.W.)蔡國裕郭崇韋林玟欣李品臻梁瑋宸黃千芸范秩嘉陳宣廷王富貴《設計與建置利用開源結合AI之校園資安監測平台 -以臺灣中部某大學為例》,第三十四屆全國資訊安全會議,2024。

  7. 林子煒(Lin, T.W.),《適用於遠距健康照護環境之植基於切比雪夫混沌映射具時間限制三因子使用者鑑別協定》,2021臺灣網際網路研討會暨全國計算機會議,2021。

  8. 許建隆陳宥任林子煒(Lin, T.W.),《適用於5G/IoT智慧健康照護環境之NTRU為基底之安全協議設計》,第三十一屆全國資訊安全會議,2021。

  9. 許建隆,蔡國裕,秦雅琪,林子煒(Lin, T.W.),《基於區塊鏈與密碼學之時間銀行安全信任平台設計》,第三十一屆全國資訊安全會議,2021。

  10. Lin, T.W., Hsu, C.L., “A User-Controlled Single Sign-On Authentication Protocol Based on Chebyshev Chaotic Maps”,第二十
    九屆全國資訊安全會議,2019。

  11. Hsu, C.L., Chu, C.W., Lin, T.W., Cheng, G.L., “Privacy-preserved Identification Protocol with Key Agreement”,第二十九屆全國資訊安全會議,2019。

  12. 許建隆,蔡國裕,林子煒(Lin, T.W.),謝美貞,《適用於多重伺服器之三因子匿名鑑別協定與群體金鑰分配協定》,第二十九屆全國資訊安全會議,2019。

  13. 許建隆,吳宗亮,林子煒(Lin, T.W.),陳偉鑫,《單一簽密者與多重解簽密者之屬性簽密法》,第二十八屆全國資訊安全會議暨資安產業技術研討會,2018。

  14. 許建隆、鍾孟軒,林子煒(Lin, T.W.),程冠霖,《具選擇性屬性撤銷及時效性之多人會議金鑰分配系統》,第二十八屆全國資訊安全會議暨資安產業技術研討會,2018。

  15. 許建隆,陳志清,謝美貞,林子煒(Lin, T.W.),蔡國裕,《適用於多重伺服器之具生物特徵身分鑑別與金鑰協定》,全國計算機會議,2017,頁919-923。

  16. 許建隆,陳建仁,林子煒(Lin, T.W.),詹宜勳,《適用於多重伺服器環境之可鑑別金鑰交換協定》,網際空間:資安、犯罪與法律社會學術暨實務研討會,2010

Articles

  1. 林子煒(Lin, T.W.),《正名CSIRT等同通稱CERT 資安應變小組營運學問大–資安長等級防禦部署心法 組織運作工具一以貫之 》,網管人,2023,URL. https://www.netadmin.com.tw/netadmin/zh-tw/technology/F53ABD5AF8EB4AA0ADF05DECDED4B8E0?type=#google_vignette

  2. 許建隆,子煒(Lin, T.W.),《混合式加解密難暴力破解 多樣感染途徑擴及全平台--沉寂十年竟變身大魔王 勒索軟體如何走到今天?》,網管人,2023​,URL. https://www.netadmin.com.tw/netadmin/zh-tw/technology/59B1CCE5B1DE40E98C0B69E709FB6E2A?type=

  3. 林子煒(Lin, T.W.),《區塊鏈技術去中心化加持 虛擬貨幣擺脫監控交易暢旺--暗網金融參雜勒索詐騙 濫用加密貨幣犯罪可追查》,網管人,2023,URL. https://www.netadmin.com.tw/netadmin/zh-tw/technology/CDAD0602D6FE49F08004BE6C41751781

  4. 林子煒(Lin, T.W.),《你夠在意嗎?考驗人性的社交工程誘惑》,清流雙月刊-在美軍撤離阿富汗後,法務部調查局,2021​ (111年1月(No.37)),頁65-70。

  5. 許建隆,子煒(Lin, T.W.),《物聯網(IoT)之發展與信任挑戰》,主計月刊,第726期,2016。​

  6. 子煒(Lin, T.W.),叢培侃《以STIX實現網路威脅情報標準化》,台網中心電子報,2014,URL. http://www.myhome.net.tw/2014_06/p02.htm

bottom of page