李維斌

教授


學歷

  • 國立中正大學 資訊工程研究所 博士
  • 國立中正大學 資訊工程研究所 碩士
  • 私立中原大學 資訊工程學系 學士

專長

  • 網路安全
    Network Security
  • 密碼學
    Cryptography
  • 數位浮水印
    Digital Watermark
  • 資訊安全管理
    Information Security Management

校內經歷

  • 分析評量組 組長
  • 教學作業組 組長
  • 校務企劃組 組長
  • 資源管理中心 主任
  • 資訊工程學系 副教授
  • 資訊工程學系 教授
  • 資訊工程學系(所) 助理教授
  • 資訊處 副資訊長
  • 資訊處 資訊長
  • 資通安全研究中心 主任

校外經歷

  • 國立勤益工專 兼任講師
  • 國立中正大學 資訊工程所 兼任講師

論文及參與計畫

  1. Chew, C. J., Lee, W.B., Chen, T.H., Lin I.C., and Lee, J.S.*, "Log Preservation in Custody Dual Blockchain with Energy Regime and Obfuscation Shuffle," Accepted byIEEE Transactions on Network Science and Engineering, 000, 2024-03. (SCIE)
  2. Chew, C. J., Lee, W. B., Sung, L. Z., Chen, Y. C., Wang, S.J., Lee, J.S.*, "Lawful Remote Forensics Mechanism with Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime," Accepted byIEEE Transactions on Information Forensics and Security, 000, 2023-12. (SCIE)
  3. Lin, Ying-Dar and Pratama, Jehoshua-Hanky and Sudyana, Didik and Lai, Yuan-Cheng and Hwang, Ren-Hung and Lin, Po-Ching and Lin*, Hsuan-Yu and Lee, Wei-Bin and Chiang, Chen-Kuo, "ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions," Journal of Information Security and Applications, volume={71}, pages={103348},, 2022-12. (SCIE)
  4. Hsiu-Ling Chu, Yu-Chen Dai, Wei-Bin Lee, Ting-Shen Hsieh and 
Ming-Hung Wang*, "Characterizing Behaviors of Sockpuppets in Online Political Discourses," Accepted byJournal of Information Science and Engineering, DOI: 10.6688/JISE.202305_39(3).0003, 2022-12. (SCIE)
  5. Bui, Q.A., Lee, W.B., Lee, J.S.*, Wu, H.L., and Liu, J.U.,, "Biometric-based key management for satisfying patient’s control over health information in the HIPAA regulations," KSII Transactions on Internet and Information Systems, vol. 14, no. 1, pp. 437-453, 2020-01. (SCIE)
  6. Hsing-Bai Chen, Wei-Bin Lee, Tzung-Her Chen, "A novel DRM scheme for accommodating expectations of personal use," Multimedia Tools and Applications, 10.1007/s11042-018-5614-4, 2018-01. (SCIE)
  7. Kao, Y. H., Lee, W. B., Hsu, T. Y., Lin, C. Y., Tsai, H. F., Chen, T. S.*, "Data Perturbation Method Based on Contrast Mapping for Reversible Privacy Preserving Data Mining," Journal of Medical and Biological Engineering, Vol. 35, Issue 6, pp. 789-794, 2015-12. (SCIE,EI)
  8. Lin, C. Y., Chen, T. S., Tsai, H. F., Lee, W. B., Hsu, T. Y., Kao, Y. H.*, "A Novel Anti-classification Approach for Knowledge Protection," Journal of Medical Systems, Vol. 39, Issue 10, pp. 1-10, 2015-10. (SCIE)
  9. Li, J. H.*, Chen, T. H., and Lee, W. B., "Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication," International Journal of Digital Crime and Forensics, Vol. 6, Issue 3, 2014-09. (EI)
  10. Lee, W. B., Lee, C. D.* and Ho, Kevin I.-J., "A HIPAA-Compliant Key Management Scheme with Revocation of Authorization," Computer Methods and Programs in Biomedicine, Vol. 113, Issue 3, pp. 809-814, 2014-03. (SCIE,EI)
  11. Chen, T. S., Lee, W. B., Chen, J., Kao, Y. H., and Hou, P. W., "Reversible Privacy Preserving Data Mining: A Combination of Difference Expansion and Privacy Preserving," Journal of Supercomputing, Vol. 66, No.2 , pp. 907-917, 2013-11. (SCIE,EI)
  12. Qin, C., Chang, C. C., Lee, W. B. and Zhang, X., "A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing," Imaging Science Journal, Vol. 61, No.6, p.p. 509-517, 2013-07. (SCIE,EI)
  13. Kao, Y. H., Chen, T. S., Lee, W. B., Chen, R. C., Huang, C. C., Lin, M. C. and Wang, Y. L., "Key Training Items Search of Manufacturing Assessment Based on TTQS and GA-SVM," Information Technology Journal, Vol. 12, pp. 756-762, 2013-01. (EI)
  14. Tsaur, W. J.*, Li, J. H., Lee, W. B., "An efficient and secure multi-server authentication scheme with key agreement," Journal of Systems and Software, vol. 85, no. 4, 2012-04. (SCIE,EI)
  15. Chen, H. B., Lai, Y. H., Chen, K. W., and Lee, W. B., "Enhanced Delegation-based Authentication Protocol for Secure Roaming Service with Synchronization," Journal of Electronic Science and Technology, Vol. 9, No. 4, pp. 345-351, 2011-12. (EI)
  16. Lee, W. B., Huang, C. C., and Lin, C. C., "A Photo Certificate - A Framework for Generating Visualized Public Key Certificates," Journal of Electronic Science and Technology, Vol. 9, No. 4, pp. 339-344, 2011-12. (EI)
  17. Lee, W.B., Wang, L. M., Hsio, S. W., Chen, Chu, H. S., "A Study on the Quality Evaluation Methodology of Campus Website," International Journal of Science and Engineering, 2011-10.
  18. Li, J. H., Lee, W. B., Ye, D., Liu, T. J., and Qin, C., "Adaptive Secret Sharing for Color Images," International Journal of Computational Intelligence Systems, Vol.4, No. 5, PP. 797~805, 2011-09. (SCIE,EI)
  19. Lee, C. D., Ho, Kevin I. J., and Lee, W. B., "A Novel Key Management Solution for Reinforcing Compliance with HIPAA Privacy/Security Regulations," IEEE Transactions on Information Technology in Biomedicine, Vol. 15, No. 4, PP. 550~556, 2011-07. (SCIE,EI)
  20. Li, J. H., Qin, C., and Lee, W. B., "On the Security of the Steganographic Method Based upon JPEG and Particle Swarm Optimization Algorithm," ICIC Express Letter, Vol. 5, No. 6, p.p. 2077-2082, 2011-06. (EI)
  21. Ho, Kevin I. J., Liao, C. W., and Lee, W. B.*, "IC-Lock Approach: a Key Management Solution for Outsourced Database," International Journal of Innovative Computing, Information a, Vol. 7, No. 5, 2011-05. (SCIE,EI)
  22. Chen, H. B., Lee, W. B.*, Ho, Kevin I. J., and Yeh, C. K., "A Secure and Cost-Effective Content Protection Scheme for DRM Systems," Journal of Computational Information Systems, Vol. 6, No. 5, PP. 1377~1386, 2010-05. (EI)
  23. Chen, T. H., Yeh, S. C., Liao, K. C., and Lee, W. B., "Practical and Efficient Electronic Checkbook," Journal of Organizational Computing and Electronic Commerce, Vol. 19, No. 4, PP. 285~293, 2009-10. (SCIE)
  24. Lin, R. D., Chen, T. H., Huang, C. C., Lee, W. B., and Chen, W. S., "A Secure Image Authentication Scheme with Tampering Proof and Remedy Based on Hamming Code," INT J INNOV COMPUT I (IJICIC), Vol. 5, No. 9, PP. 2603~2617, 2009-09. (SCIE,EI)
  25. Chen, H. B., Chen, T. H., Chang, C. K., and Lee, W. B., "A New E-Coupon System with Security and Efficiency in Mobile Commerce," Journal of Computational Information Systems, Vol. 5, No. 4, PP. 1059~1065, 2009-08. (EI)
  26. Lee, W. B., Li, J. H., Chen, S. C., and Chen, T. H., "An Authenticated Secure Image Hiding Scheme," The Imaging Science Journal, Vol. 57, No. 2, PP. 109~117, 2009-04. (SCIE)
  27. Chen, T. H., Lee, W. B., and Chen, H. B., "A Self-Verification Authentication Mechanism for Mobile Satellite Communication Systems," Computers & Electrical Engineering, Vol. 35, No. 1, PP. 41~48, 2009-01. (SCIE,EI)
  28. Liao, C. W., Lee, W. B., "Key Management for Encrypted Storage on a Grid," Journal of the Chinese Institute of Engineers, Vol. 31, No. 7, PP. 1141~1150, 2008-11. (SCIE,EI)
  29. Wu, C. C., Lee, W. B., and Tsaur, W. J., "A Secure Authentication Scheme with Anonymity for Wireless Communications," IEEE Communications Letters, Vol. 12, No. 10, PP. 722~723, 2008-10. (SCIE)
  30. Chen, T. H., Lee, W. B., and Chen, H. B., "A Round- and Computation-Efficient Three-Party Authenticated Key Exchange Protocol," Journal of Systems and Software, Vol. 81, No. 9, PP. 1581~1590, 2008-09. (SCIE,EI)
  31. 蘇勝君、李維斌、陳超、王朔中, "利用範本建構語法模版生成仿自然語言隱藏文本," 電子與信息學報, Vol. 30, No. 8, PP. 1936~1939, 2008-08. (EI)
  32. Lee, W. B. and Yeh, C. K., "A Self-Concealing Mechanism for Authentication on Portable Communication Systems," International Journal of Network Security, Vol. 6, No. 3, PP. 285~290, 2008-05.
  33. Chen, H. B. and Lee, W. B., "Efficient and Portable Digital Rights Management for Preserving User Privacy Using Smart Cards," Journal of Computers, the special issue E-Commerce Security, Vol. 19, No. 1, PP. 3~12, 2008-04.
  34. Lee, W. B. and Lee, C. D., "A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations," IEEE Transactions on Information Technology in Biomedicine, Vol. 12, No. 1, PP. 34~41, 2008-01. (SCIE,EI)
  35. Chen, T. H. and Lee, W. B, "A New Method for Using Hash Functions to Solve Remote User Authentication," Computers & Electrical Engineering, Vol. 34, No. 1, PP. 53~62, 2008-01. (SCIE,EI)
  36. Chen, H. B., Chen, T. H., Lee, W. B. and Chang, C. C., "Security Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks," Computer standards & Interfaces, Vol. 30, No. 1-2, PP. 95~99, 2008-01. (SCIE,EI)
  37. Chen, H. B., Chen, T. H., Lee, W. B., and Lin, R. D., "Security Analysis of a Password-Based Simple Three-Party Key Exchange Protocol," WSEAS Transactions on Information Science and Applications, Vol. 4, No. 10, PP. 1371~1377, 2007-10. (EI)
  38. Lee, W. B., Wu, C. C., and Tsaur, W. J, "A Novel Deniable Authentication Protocol Using Generalized ElGamal Signature Scheme," Information Sciences, Vol. 177, No. 6, PP. 1376~1381, 2007-03. (SCIE,EI)
  39. Yeh, C. K. and Lee, W. B., "A Dual-Purpose Signature for Authentication on UMTS," Journal of the Chinese Institute of Engineers, Vol. 30, No. 2, PP. 343~347, 2007-03. (SCIE)
  40. Lee, W. B., Wu, W. J., and Chang C. Y., "A Portable DRM Scheme using Smart Cards," Journal of Organizational Computing and Electronic Commerce, Vol. 17, No. 3, PP. 247~258, 2007-01. (SCIE)
  41. Lee, W. B., Chen, T. H., Lo, J. W., and Chang, C. Y., "An Efficient Group Signature Based on PSS-R," WSEAS Transactions on Information Science and Applications, Vol. 3, No. 10, PP. 1804~1809, 2006-10. (EI)
  42. Lee, W. B., Chen, T. H., and Lee, C. C., "Security of new encryption algorithm for image cryptosystems," The Imaging Science Journal, Vol. 54, No. 3, PP. 178~187, 2006-09. (SCIE)
  43. Liao, K. C., Lee, W. B., and Liao, C. W., "Security of fragile watermarking scheme for image authentication," The Imaging Science Journal, Vol. 54, No.3, PP. 129~133, 2006-09. (SCIE)
  44. Lee, W.B. and Liao, K.C., "Improved Self-Certified Group-Oriented Cryptosystem without a Combiner," Journal of Systems and Software, Vol. 79, No. 4, PP. 502~506, 2006-04. (SCIE,EI)
  45. Tsaur, W. J., Wu, C. C. and Lee, W. B., "An enhanced user authentication scheme for multi-server Internet services," Applied Mathematics and Computation, Vol. 170, No. 1, PP. 258~266, 2005-11. (SCIE,EI)
  46. Chen, T. H., Lee, W. B. and Horng, G., "Remarks on some signature schemes based on factoring and discrete logarithms," Applied Mathematics and Computation, Vol. 169, No. 2, PP. 1070~1075, 2005-10. (SCIE,EI)
  47. Chen, T. H., Horng, G., and Lee, W. B.,, "A Publicly Verifiable Copyright-proving Scheme Resistant to Malicious Attacks," IEEE Transactions on Industrial Electronics, Vol. 52, No. 1, PP. 327~334, 2005-02. (SCIE,EI)
  48. Lee, W. B. and Yeh, C. K., "A New Delegation-based Authentication Protocol for Use in Portable Communications Systems," IEEE Transactions on Wireless Communications, Vol. 4, No. 1, PP. 57~64, 2005-01. (SCIE)
  49. Chen, T. H., Lee, W. B., and Horng, G., "Remarks on some signature schemes based on factoring and discrete logarithms," Applied Mathematics and Computation, 2004-12. (EI)
  50. Tsaur, W. J., Wu, C. C. and Lee, W. B., "An Enhanced User Authentication Scheme for Multi-server Internet Services," Applied Mathematics and Computation, 2004-12. (SCIE,EI)
  51. Chen, T. H., Lee, W. B. and Horng, G., "Secure SAS-like password authentication schemes," Computer Standards and Interfaces, Vol.27, No.1, PP. 25~31, 2004-11. (SCIE,EI)
  52. Tsaur, W. J., Wu, C.C. and Lee, W. B., "A smart card-based remote scheme for password authentication in multi-server Internet services," Computer Standards and Interfaces, Vol.27, No.1, PP. 39~51, 2004-11. (SCIE,EI)
  53. Lee, W. B. and Liao, K. C., "Constructing Identity-Based Cryptosystems for Discrete Logarithm Based Cryptosystems," Journal of Network and Computer Applications, Vol.27, No.4, PP. 191~199, 2004-11. (SCIE,EI)
  54. Lee, W. B. and Chu, T. H., "On the Security of Saeednia's Convertible Group Signature Scheme," Internet Journal ElectronicsLetters.com, #2/5/2003, 2003-08.
  55. Lee, W. B. and Chen, T. H., "Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms," Information & Security, Vol. 12, No. 2, PP. 250~258, 2003-08.
  56. Chen, T. H. and Lee, W. B, "A Variance-Based Public Verifiable Copyright-Protection Scheme Surviving Intentional Attacks," Imaging Science Journa, Vol. 15, PP. 1~12, 2003-08. (SCIE)
  57. Lee, W. B., Lee, C. C. and Chen, T. H., "Improvement of an Encryption Scheme for Binary Images," Pakistan Journal of Information & Technology, Vol. 2, No. 2, 2003-04.
  58. Lee, W. B. and Liao, K. C., "Security Enhancement for Some Modified Authenticated Key Agreement Protocols," Journal of Computers, Vol. 14, No. 3, PP. 41~51, 2002-12.
  59. Lee, W.B. and Chen, T. H., "A Public Verifiable Copy Protection Technique for Still Images,," The Journal of Systems and Softwar, 62, PP. 195~204, 2002-08. (SCIE)
  60. 李維斌、C. C. Chang, "User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks," Computer Systems Science and Engineering, Vol. 15/ No. 4, PP. 113~116, 1999-08.
  61. 李維斌、C. C. Chang, "(t, n) Threshold Digital Signature with Traceability Property," Journal of Information Science and Engineering, Vol. 15/ No. 5, PP. 669~678, 1999-08.
  62. Hwang, R. J., Lee, W. B., and Chang, C. C, "A Concept of Designing Cheater Identification Methods for Secret Sharing," Journal of Systems and Software, Vol. 46, PP. 7~11, 1999-08. (SCIE)
  63. C. C. Chang、P. C. Hwang、李維斌, "Conference Key Distribution Scheme for Portable Communication System," Computer Communications, Vol. 22/ No. 10, PP. 1160~1164, 1999-08.
  1. 李維斌,蔡閔亘,劉南軒*,"軟體定義網路中多控制器的驗證機制 ," 2016資訊管理暨電子商務經營管理研討會(IMECM 2016), pp.60, 2016-05. 台東 .
  2. Wei-Bin Lee, Yu-Ting Lin*, Min-Hsuan Tsai, Hsing-Bai Chen,"A Novel One-Time Password Mutual Authentication Scheme Using Biometrics-Based Key and Visual Secret Sharing ," International Conference on Science, Technology, Engineering and Management, 43, 2015-03. HongKong .
  3. Wei-Bin Lee, Shihfan Lo*, Chien Ding Lee,"一種保障醫療隱私的保險給付簽章方法 ," Joint Conference on Medical Informatics in Taiwan 2014, *, 2014-11. 國立臺北護理健康大學B118會議室 .
  4. 黃廷宇*,李維斌,楊晴雯,楊景昇,"遠端醫療監視設備的網路安全分析器 ," Cryptology and Information Security Conference 2014, pp. 157, 2014-05. NCCU, Taipei, Taiwan .
  5. Wei-Bin Lee, Tzung-Her Chen , Wei-Rung Sun, Kevin I-J Ho*,"A S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter ," The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), 無, 2014-05. Vancouver, Canada .
  6. Yin-Chia Lo*, Wei-Bin Lee, Nien-Lin Hsueh, Kevin I.-J. Ho,"A Study on Adopting the Agile Software Development for the CMMI ML2 Certified small Software Enterprises to Manage Projects ," 3rd International Congress on Natural Sciences and Engineering (ICNSE 2014), 無, 2014-05. Kyoto,Japan .
  7. Hsu, T. C., Chang, C. H., Chu, W. C., Ho, S. Y., Hsueh, N. L. and Lee, W. B.,"Applying Cloud computing technologies to Gerontology and Geriatrics Health Care System ," 2013 13th International Conference on Quality Software, pp. 355-360, 2013-07. Nanjing, China .
  8. Lee, W.B., Teng, C.W., Hsueh, N.L.,&Li, Y.H.,"Using Facebook to Better Engage College Students in Learning ," International Computer Symposium 2012, none, 2012-12. Hualien, Taiwan .
  9. Lee, W. B., Fan, C.W., Ho, Kevin, Dow, C. R.,"A CAPTCHA with Tips Related to Alphabets Upper or Lower Case ," Proceeding of 7th International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 458-461, 2012-11. Victoria, Canada .
  10. Lin, C. H., Lin, H. Y., Lee, W.B.,"Routing Protocols with Power Saving and Data Salvation for Wireless Sensor Networks ," Proceeding of 7th International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 468-471, 2012-11. Victoria, Canada .
  11. Dow, C. W., Hu, R. Y., Lee, Y. H., Hwang, S. F., and Lee, W. B.,"A SWE-Based Network Management Framework for Environment Monitoring ," Proceeding of 7th International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 472-477, 2012-11. Victoria, Canada .
  12. Ho, K. I. J., Lee, W. B., Lau, S. C., Sum, J.,"Convergence Time of Wang's kWTA Network with Stochastic Output Nodes ," 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing, pp. 182-187, 2012-06. Vancouver, Canada .
  13. Chun-Jung Lee, Wei-Bin Lee, Chin-Sheng Liu, Kevin Ho, Chyi-Ren Dow,"A Novel Friendly Image-Based CAPTCHA with Auto-Generation of Test Data ," 7th International Conference on Information Warfare and Security ICIW-2012, 2012-03. Seattle, USA .
  14. 李維斌,陳星百,葉昌國,林世衛,"基於IEEE 802.11i無線網路使用票證的快速換手認證機制 ," 第十七屆資訊管理暨實務研討會, 2011-12. 台南,台灣 .
  15. 黃建二,陳昇瑋,李維斌,"線上節奏遊戲外掛偵測研究 ," TANET2011臺灣網際網路研討會, 2011-10. 宜蘭,台灣 .
  16. Lee, W. B., Chen, H. B., Chang, S. S., and Yang, C. C.,"An Anti-Phishing User Authentication Scheme without Using a Sensitive Key Table ," Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2011), 2011-10. Dalian, China .
  17. 陳星百、李維斌、陳平益、陳寅龍,"一個具效率的RFID標籤認證方法 ," 第二十一屆資訊安全會議 (CISC 2011), 2011-05. 雲林,台灣 .
  18. 宋邦俊 劉振緒,"對於藏密解析的對策與反制 ," 資訊服務與創新應用研討會, 68-75, 2011-04. 台灣 .
  19. Qin, C., Li, J. H., Lee, W. B., and Zhang, X. P.,"Secure Image Delivery Scheme Using Poisson Editing ," Proceedings of the 2010 International Workshop on Secure Multimedia Communication and Services, 2010-11. Nanjing, China .
  20. 李維斌,林家禎,張舜賢,陳星百,江柏宣,"一種防制網路釣魚攻擊之使用者驗證方法 ," TANET2010台灣網際網路研討會, 2010-10. 台南 .
  21. 李維斌,王履梅,蕭尚文,陳星百,朱琇伶,"校園網站品質評鑑之方法-以逢甲大學為例 ," TANET2010台灣網際網路研討會, 2010-10. 台南 .
  22. Lee, W. B, Chen, H. B., Cheng, C. C.,"Secure Communication between Set-top Box and Smart Card for Fair Use in DTV Broadcasting ," The IEEE Intelligence and Security Informatics Conference (ISI2010), pp. 156-158, 2010-05. Vancouver, Canada .
  23. 2. Chen, S. K., Wang, P. C., Lee, W. B, and Fang, Y. T.,"Strengthening Student Safety in Special Education Schools with Wireless Sensor Networks ," the 4th International Symposium on Medical Information and Communication Technology (ISMICT 2010), 2010-03. Taipei, Taiwan .
  24. Chang, C. C., Lee, C. Y., and Lee, W. B.,"Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications ," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), 2009-09. Kyoto, Japan .
  25. Chen, H. B., Lee, W. B., Zhao, Y. H., and Chen, Y. L.,"Enhancement of the RFID Security Method with Ownership Transfer ," the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC 2009), 2009-01. SKKU, Suwon, Korea .
  26. Huang, M. W., Chen, H. B., and Lee, W. B.,"An Efficient Non-repudiation Mechanism for SIP-based Services ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP08), pp. 1541-1544, 2008-08. Harbin, China .
  27. 2. Lee, W. B., Liu, M. Y., and Li, J. H.,"A Quality Adaptable Multilayer Video Content Protection Scheme ," International Conference in Audio, Language and Image Processing 2008, 2008-07. 中國大陸 .
  28. Chen, T. H. Wu, C. S., and Lee, W. B.,"A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hidin ," Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP07), 2007-11. Kaohsiung City, Taiwan .
  29. Chang, C. K., Chen, H. B, Chen, T. H., and Lee, W. B.,"E-Gift Certificate Book with Different Face Values ," The 2007 International Conference on e-Commerce (e-CASE 2007), 2007-08. Harbour Plaza, Hong Kong .
  30. Wu, C. C., Lee, W. B., and Tsaur, W. J.,"A secure protocol for misbehavior-penalization-based fair digital signature exchange ," The 2007 International Conference on Wireless Communications and Mobile Computing (ICWCMC'07), pp. 138-139, 2007-08. Honolulu, Hawaii, USA .
  31. Tsai, C. C., Liao, K. C., Chen, T. H., and Lee, W. B.,"Security enhancement of a novel proxy key generation protocol ," 2nd IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2007), 2007-07. Beijing, China .
  32. 李維斌,葉書辰,陳宗和,"植基於單向赫序鏈之電子旅行支票系統 ," 2007年資訊技術與產業應用研討會(ITIA07), 2007-06. Taipei, R.O.C. .
  33. Liao, K. C., Chen, T. H., Chang, C. K., and Lee, W. B.,"Remarks on a Practical Password-Based Two-Server Authentication and Key Exchange System ," 2007 Conference of Digital Technology and Innovation Management, 2007-06. Taipei, R.O.C. .
  34. Qin, C., Lee, W. B., Zhang, X., and Wang. S. Z.,"Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting ," The 9th International Conference on Control, Automation, Robotics and Visio, 2006-12. Grand Hyatt Singapore .
  35. 李維斌, 陳順德, 廖俊威,"稽核日誌的保密與搜尋方法 ," 2006資通技術管理與應用會議(SAICT2006), 2006-06. Kaohsiung, Taiwan .
  36. 吳明勳,廖冠捷,李維斌,"在群組金鑰管理中一個有效率的金鑰更新訊息封裝方法 ," The 16th Information Security Conference, 2006-06. Taichung, Taiwan .
  37. Lee, W. B. and Chen, C. Y.,"Extending Public-key Cryptography into Kerberos with Little Impact ," The 16th Information Security Conference, 2006-06. Taichung, Taiwan .
  38. 李維斌,許有財,廖冠捷,"適用於智慧型運輸系統的電子票券機制 ," 七屆電子化企業經營管理理論暨實務研討會, 2006-05. Chang-Hua, Taiwan .
  39. Chen, H. B., Lee, W. B., Liao, C. W., and Huang, C. H.,"Efficient hierarchical access control and key management for mobile agents ," The First International Workshop on Privacy and Security in Agent-based Collaborative Environments, 2006-05. Future University-Hakodate, Japan .
  40. Lee, W. B., Wu, C. C., and Tsaur, W. J.,"A Secure Negotiation over Internet Using New Deniable Authentication Protocol ," World Multi-Conference on Systemics, Cybernetics and Informatics, 2005-07. Orlando, Florida, USA .
  41. W. B. Lee, C. C. Wu and W. J. Tsaur,"A Secure Remote Password Authentication Scheme with Key Agreement for Multi-Server Environments ," 9th World Multi-Conference on Systemics, Cybernetics and Informatics, 2005-07. Orlando, Florida, USA .
  42. Wei-Bin Lee, Hsing-Bai Chen, and Chyi-Ren Dow,"Remote User Authentication Scheme with User Anonymity ," the 2005 International Conference on Security and Management (WCAC SAM’05), 412-418, 2005-06. Las Vegas, Nevada, USA .
  43. Wei-Bin Lee, Jia-Hong Li, and Chyi-Ren Dow,"Efficient Date-Constraint Hierarchical Key Assignment Scheme ," the 2005 International Conference on Security and Management (WCAC SAM’05), 51-57, 2005-06. Las Vegas, Nevada, USA .
  44. Tzong-Jye Liu, Chia-Lin Lee, Chyi-Ren Dow, Wei-Bin Lee and Hsing-Bai Chen,"Self-Stabilization Neighborhood Synchronizer for Uniform Rings ," the 2005 International Conference on Parallel and Distributed Processing Techniques and Applications (IMCSE PDPTA’05), 346-352, 2005-06. Las Vegas, Nevada, USA .
  45. Li, J. H., Lee, W. B., and Liao, C. W.,"Comments on Access Control in a Hierarchy Using One-way Hash Functions ," the 15th Conference on Information Security, 2005-06. Kaohsiung R. O. C .
  46. Liao, K. C., Lee, W. B. Lee, and Liao, C. W.,"Log-in Authentication Scheme Based on Circle Property ," The 22nd Workshop on Combinatorial Mathematics and Computational Theory, 2005-05. Tainan R.O.C. .
  47. W. B. Lee, C. R. Dow, C. C. Fang, H. C. Lin, and K. H. Chen,"An Efficient Method for Involving Faculty in the Self-Assessment Process ," 2004 International Conference on Teaching and Learning in Higher Education, pp. 230-234, 2004-12. Singapore .
  48. W. B. Lee, C. R. Dow, H. C. Lin, C. C. Fang, and K. H. Chen,"An Assisant Approach to Accomplish Institutional Self-Assessment ," 2004 International Conference on Teaching and Learning in Higher Education, pp. 258-263, 2004-12. Singapore .
  49. C. R. Dow, W. B. Lee, and K. H. Chen,"SPDP: A Versatile Electronic Portfolio System for Senior Project Design Assessment ," 2004 International Conference on Teaching and Learning in Higher Education, 2004-12. Singapore .
  50. Lee, W. B. and Lee, C. E.,"Alternative Credit Card Payment Scheme with GSM Networks ," 8th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol. 8, pp.114-117, 2004-07. Orlando, Florida, USA .
  51. Chang, C. Y. and Lee, W. B.,"Delegation-oriented Signature and Its Network Applications ," 8th World Multi-Conference on Systemics, Cybernetics and Informatics, 8/103-107, 2004-07. Orlando, Florida, USA .
  52. Lee, W. B., Liao, K. C and Hsiao, Y. H.,"A Novel User Authentication and Access Control Scheme for a Distributed Computer Network ," 8th World Multi-Conference on Systemics, Cybernetics and Informatics, 8/118-122, 2004-07. Orlando, Florida, USA .
  53. Lee, W. B., Chen, S. C. and Chen T. H.,"A Secure Image Hiding Scheme with Authentication ," 2004 年資訊管理國際研討會, 2004-06. 苗栗 .
  54. Lee, W. B. and Li, J. H.,"Hierarchy-Based Key Assignment Scheme with Data-Constraint ," 14th Conference on Information Security, 2004-06. Taipei .
  55. Lee, W. B. and Liao, K. C,"Remarks on Lee-Hwang-Li key authentication scheme ," 第九屆資訊管理暨實務研討會, 2003-12. 大葉大學 .
  56. 李維斌, 林宏達,"實用的電子投票技術 ," the 13th Conference on Information Security, 2003-08. 桃園 長庚大學 .
  57. Lee, W. B. and Hsu, C. C.,"An Internet Voting Scheme for Large-Scale Elections ," the 13th Conference on Information Security, 2003-08. 桃園 長庚大學 .
  58. Lee, W. B., and Lee, C. E.,"Mobile Credit Payment Scheme ," the Second International Conforence on Information and Management Sciences(IMS2003), pp. 39-43, 2003-08. 中國四川省成都 .
  59. Chen, T. H., Horng, G., Lin, K. L., and Lee, W. B.,"Further Security Enhancement for Optimal Strong-Password Authentication Protocol ," 2004電子商務與數位生活研討會, 2003-08. 台北大學 .
  60. Lee, W. B. and Yeh, C. K.,"A more Efficient Authentication Protocol for GSM Networks, ," Proceedings of the 6th World Multiconference on System, Cybernetics and Informatics,, Vol. X, pp. 511-515, 2002-07. Orlando, Florida, U.S.A .
  61. Lee W. B.、Hsiao Y. H.、Liao, K. C.,"Improved Proxy Deposit Protocol for E-cash Systems ," Proceedings of the 12th Conference on Information Security, CD-ROM, 2002-05. Taichung R.O.C. .
  62. Lee W. B.、Wang S. C.,"The Security of Mambo et al.'s Proxy Signature Scheme ," Proceedings of the 12th Conference on Information Security, CD-ROM, 2002-05. Taichung R.O.C. .
  63. Lee W. B.、Liao K. C.、Hsiao Y. H.,"The Security of User Efficient E-cash Scheme with Anonymous Certificates ," Proceedings of the 12th Conference on Information Security, CD-ROM, 2002-05. Taichung R.O.C. .
  64. 李維斌,曹祥彬,"建構可調式即時資料庫入侵偵測架構 ," Proceedings of the 12th Conference on Information Security, CD-ROM, 2002-05. Taichung R.O.C. .
  65. Lee W.B.、Chang C. Y.,"A Practical Key Changeable Digital Signature Scheme ," Proceedings of the Seventh International Conference on Distributed Multimedia Systems, 194~198, 2001-09. Taipei R. O. C. .
  66. Lee, W. B., Wu, Y. C. and Chang, C. Y,"Enhance the Performance of the Yang-Shieh Password Authentication Schemes ," 11th Conference on Information Security, pp. 225-117, 2001-05. 台灣 .
  67. 李維斌, 曾政國,"電子商務金融系統 ," 廿一世紀數位生活與網際網路科技研討會, 2001-05. 台南成功大學 .
  68. Lee, W. B. and Wu, Y. C.,"A Simple and Efficient Key Authentication Scheme ," 18th Workshop on Combinational Mathematics and Computational Theory, pp. 70-77, 2001-03. Hualien .
  69. Lee, W. B. and Chen, T. H.,"A Robust Copyright Protection Scheme for Still Images ," Proceedings of 2000 International Computer Symposium Workshop, pp. 104-111, 2000-12. Taiwan .
  70. Chang, C.C., Buehere, D.J., and Lee, Wei-Bin,"A method for Constructing a Generalized Group-Oriented Cryptosystem ," The First Workshop on Information Security Applications, 2000-11. Seoul Korea .
  71. Lee, W. B. and Chen, T. H.,"數位影像著作權保護-一個無失真高強韌度的浮水印技術 ," Proceedings of 2000年第五屆全國電腦與通訊研討會, pp. 1D-9-1D-13, 2000-10. 大葉大學 .
  72. 李維斌、C. Y. Chang,"Efficient Proxy-Protected Proxy Signature Scheme Based on Discrete Logarithm ," 10th Conference on Information Security, 4~7, 2000-05. Hualien, Taiwan .
  73. 李維斌、C. H. Tien,"利用隱藏術來傳遞秘密訊息 ," 第一屆管理學域學術研討會, 171~177, 2000-05. Wufeng, Taiwan .
  74. 李維斌、C. C. Chang,"On the Security of the Digital Signature Based on Factoring and Discrete Logarithm ," Proceedings of 10th Conference on Information Security, 8~12, 2000-05. Hualien, Taiwan .
  1. 專業書籍/Chu-Hsing Lin, Wei-Bin Lee, Iuon-Chang Lin/Progress on Cryptography: 20 Years of Cryptography in Taiwan/ McGraw-Hill International Enterprises, LLC., Taiwan Branch /2014-11-01/ /
  2. 專業書籍/馬彥彬、李維斌、王履梅/數位教育與網路學習計畫成果專書/ 教育部 /2013-03-01/ /
  3. 專業書籍/Lee, W. B.,Kou, W.D., Yesha, Y./"Chapter 3 Wireless security," Enabling Technologies for Wireless E-Business/ Springer-Verlag New York Inc./ 美國 /2006-05-01/32/ /
  4. 技術報告/李維斌, 葉昌國/整合GSM簡訊機制之簡易安全無線區域網路認證系統/ 資訊安全通訊/ 中華民國 /2004-04-01/ /
  5. 技術報告/Chang, Chin-Chen and Lee, Wei-Bin/Taiwan: Focus on the Information Security Market/ IT Professional/ 中華民國 /2003-09-01/ /
  6. 技術報告/李維斌, 陳宗和/數位影像驗證與數位簽章/ 資訊安全通訊/ 中華民國 /2001-06-01/ /
  7. 技術報告/張真誠, 李維斌/談電腦中毒與防毒/ 暨大電子雜誌/ 中華民國 /2001-03-01/ /
  1. 健康服務中隱私保護機制之研究(3/3)/2017-08~2018-07 /MOST104-2221-E-035-039-MY3 /主持人
  2. 健康服務中隱私保護機制之研究(2/3)/2016-08~2017-07 /MOST104-2221-E-035-039-MY3 /主持人
  3. 健康服務中隱私保護機制之研究(1/3)/2015-08~2016-07 /MOST104-2221-E-035-039-MY3 /主持人
  4. 電子病歷之隱私保護研究(3/3)/2014-08~2015-07 /MOST101-2221-E-035-070-MY3 /主持人
  5. 電子病歷之隱私保護研究(2/3)/2013-08~2014-07 /NSC101-2221-E-035-070-MY3 /主持人
  6. 應用雲端計算技術之老年學和老年醫學健康服務系統,-子計畫4:基於老人健康照護系統之隱私安全保護機制/2013-08~2014-07 /NSC 102-2218-E-035-007- /主持人
  7. 電子病歷之隱私保護研究(1/3)/2012-08~2013-07 /NSC101-2221-E-035-070-MY3 /主持人
  8. 基於雲端計算與高交互操作性下之感測網路技術於緊急管理之研究-基於雲端分散架構與即時巨量感測器資訊運算平台之資訊安全.../2012-08~2013-07 /NSC101-2119-M-035-004- /主持人
  9. 大學雲:分散式雲端運算中介軟體-子計畫七:雲端資訊安全機制/2010-08~2011-07 /NSC99-2218-E-035-001- /主持人
  10. 消費者為導向的數位版權管理系統之研究/2009-08~2010-07 /NSC98-2221-E-035-031- /主持人
  11. 可驗證的門檻式全彩影像秘密分享策略及其應用(2/2)/2008-08~2009-07 /NSC96-2628-E-035-001-MY2 /主持人
  12. 可驗證的門檻式全彩影像秘密分享策略及其應用(1/2)/2007-08~2008-07 /NSC96-2628-E-035-001-MY2 /主持人
  13. 可驗證的門檻式全彩影像秘密分享策略及其應用(I)/2006-08~2007-07 /NSC95-2221-E-035-070- /主持人
  14. 整合3G與WLAN雙網系統的認證與收費協定/2005-08~2006-07 /NSC94-2213-E-035-024- /主持人
  15. 一個保護機密性及隱私權的資料庫加密模式/2004-08~2005-07 /NSC93-2213-E-035-042- /主持人
  16. 適用於大型文件的快速加解密機制/2003-08~2004-07 /NSC92-2218-E-035-014 /主持人
  17. 一個安全且實用的虛擬信用卡模式/2001-08~2002-07 /NSC90-2213-E-035-004 /主持人
  18. 一個基植於代理簽章的安全實用電子拍賣模式/2000-08~2001-07 /NSC89-2213-E-035-048 /主持人
  19. 以名稱為驗證基礎的動態秘密分享策略/1999-10~2000-07 /NSC89-2213-E-035-044 /主持人
  1. 「原生創意中心」專案(105年1-3月) /2016-01~2016-03 /主持人
  2. 「原生創意中心」專案(104年10-12月) /2015-10~2015-12 /主持人
  3. 「原生創意中心」專案(104年7-9月) /2015-07~2015-09 /主持人
  4. 「原生創意中心」專案(104年4-6月) /2015-04~2015-06 /主持人
  5. 「原生創意中心」專案(104年1-3月) /2015-01~2015-03 /主持人
  6. 「原生創意中心」專案(103年10-12月) /2014-10~2014-12 /主持人
  7. 大專校院學生學籍資料電子查驗服務輔導計畫 /2014-07~2014-12 /主持人
  8. 「原生創意中心」專案(103年7-9月) /2014-07~2014-09 /主持人
  9. 資訊安全服務專案計畫 /2014-05~2014-12 /主持人
  10. 「原生創意中心」專案(103年4-6月) /2014-04~2014-06 /主持人
  11. 「原生創意中心」專案(103年1-3月) /2014-01~2014-03 /主持人
  12. 102年度行動化敏感作物種植面積調查系統擴充與推廣計畫勞務採購 /2013-11~2013-12 /主持人
  13. 103年度觀光遊樂地區交通疏運填報作業系統維護管理及駐點服務案 /2013-11~2015-10 /主持人
  14. 永慶房產集團-「資安服務專案」 /2013-10~2014-09 /主持人
  15. 糧政資訊跨區即時服務農民體系 /2013-10~2015-09 /主持人
  16. 「原生創意中心」專案(102年10-12月) /2013-10~2013-12 /主持人
  17. 私立大專校院個人資料保護管理架構研擬專案計畫 /2013-04~2013-12 /主持人
  18. 資策會自辦收費訓練課程機器使用費及場地費(102年1-4月份) /2013-01~2013-04 /主持人
  19. 102年度觀光遊樂地區交通疏運填報作業系統功能擴充、維護管理及駐點服務案 /2013-01~2013-11 /主持人
  20. 永慶房仲集團「資安服務專案」 /2012-10~2013-09 /主持人
  21. 資策會自辦收費訓練課程機器使用費及場地費(101/10-101/12) /2012-10~2012-12 /主持人
  22. 臺中市政府交通局僱用人員甄試試務工作 /2012-07~2012-10 /主持人
  23. 101年度行動化敏感作物種植面積調查系統擴充及推廣 /2012-06~2012-12 /主持人
  24. 內政部消防署「訓練中心e化管理系統擴充建置案」 /2012-05~2013-11 /主持人
  25. 資策會自辦收費訓練課程機器使用費及場地費(101/4-101/6) /2012-04~2012-06 /主持人
  26. 101年數位教育與網路學習總計畫營運專案 /2012-02~2013-03 /主持人
  27. 資料庫安全稽核系統整合 /2012-01~2012-12 /主持人
  28. 資策會自辦收費訓練課程機器使用費及場地費(101/1-101/3) /2012-01~2012-03 /主持人
  29. 資安服務專案 /2011-10~2012-09 /主持人
  30. 資策會自辦收費訓練課程機器使用費及場地費(100/10-100/12) /2011-10~2011-12 /主持人
  31. 教學評量與課程評鑑統計分析系統功能擴充案 /2011-09~2011-12 /主持人
  32. 101學年度身心障礙考試系統維運作業 /2011-09~2013-09 /主持人
  33. 共同推廣「專案管理」人才培訓、專業認證 /2011-09~2012-08 /主持人
  34. 臺中市捷運工程處約用人員甄試試務工作 /2011-07~2011-11 /主持人
  35. 資策會自辦收費訓練課程機器使用費及場地費(100/7-100/9) /2011-07~2011-09 /主持人
  36. 100年度農糧耕地與地政地籍資料碰檔核校作業 /2011-06~2011-12 /主持人
  37. 100年度農糧資訊網路系統功能維護與增修作業 /2011-06~2011-12 /主持人
  38. 資策會自辦收費訓練課程機器使用費及場地費(100/4-100/6) /2011-04~2011-06 /主持人
  39. 國立臺灣體育學院「校務資訊系統新增功能(學生學習歷程)」 /2011-04~2011-06 /主持人
  40. 資安服務專案 /2011-03~2011-05 /主持人
  41. 100-101年數位教育與網路學習總計畫營運專案 /2011-01~2012-02 /主持人
  42. 資策會自辦收費訓練課程機器使用費及場地費(100/1-100/3) /2011-01~2011-03 /主持人
  43. 100年度行動化敏感作物種植面積調查系統擴充及推廣計畫 /2011-01~2011-12 /主持人
  44. 太陽能光電遠端監控系統軟體開發案 /2010-12~2012-12 /主持人
  45. 內政部消防署「訓練中心e化管理系統建置案」 /2010-10~2011-04 /主持人
  46. 資策會自辦收費訓練課程機器使用費及場地費(99/9-99/12) /2010-09~2010-12 /主持人
  47. 資策會自辦收費訓練課程機器使用費及場地費(99/7-99/9) /2010-07~2010-09 /主持人
  48. 99年度農糧耕地與地政地籍資料碰檔核校作業 /2010-06~2010-12 /主持人
  49. 99年度農糧資訊網路系統功能維護與增修作業 /2010-06~2010-12 /主持人
  50. 「99年度輔導辦理水旱田利用調整業務計畫」之細部計畫:水旱田利用調整細部實施計畫 /2010-04~2010-12 /主持人
  51. 99年度行動化敏感作物種植面積調查系統擴充及推廣計畫 /2010-04~2010-12 /主持人
  52. 99年度農地租賃管理系統教育訓練 /2010-04~2010-06 /主持人
  53. 臺灣體院校務資訊系統整合規劃與開發委外服務案維護 /2010-04~2012-03 /主持人
  54. 資策會自辦收費訓練課程機器使用費及場地費(99/4-99/6) /2010-04~2010-06 /主持人
  55. 教學評量與課程評鑑統計分析系統 /2010-03~2010-07 /主持人
  56. 99年度RFID加值應用旗艦示範計畫(4/4)─RFID跨生活圈服務暨ASP示範應用推動計畫 /2010-03~2010-12 /共同主持人
  57. 99年度農糧資訊網路資料庫彙整作業 /2010-01~2010-04 /主持人
  58. 大台中地區路口監視系統結合警勤e化機制與資通安全架構之研究 /2010-01~2010-04 /共同主持人
  59. 資策會自辦收費訓練課程機器使用費及場地費(99/1-99/3) /2010-01~2010-03 /主持人
  60. 臺中市政府公有停車場停車繳費通知單建檔及轉製影像檔勞務作業 /2009-12~2011-12 /主持人
  61. 資策會自辦收費訓練課程機器使用費及場地費(98/10-98/12) /2009-10~2009-12 /主持人
  62. 建置水果次級品收購系統模組 /2009-09~2009-11 /主持人
  63. 國立彰化師範大學「人事基本資料暨退撫管理系統」 /2009-09~2010-01 /主持人
  64. 臺中市政府公有停車場停車收費管理員甄試試務工作 /2009-08~2009-10 /主持人
  65. 建國科技大學「教育機構資安驗證機制(電算中心)」 /2009-08~2010-07 /主持人
  66. 資策會自辦收費訓練課程機器使用費及場地費(98/7-98/9) /2009-07~2009-09 /主持人
  67. 98年度RFID加值應用旗艦示範計畫(3/4)之「校園RFID應用示範推動計畫」 /2009-06~2010-01 /主持人
  68. 國立聯合大學第二期(教學相長資訊系統)委外服務案 /2009-06~2009-10 /主持人
  69. 應用空間資訊技術於稻田利用調查輔助系統之建置 /2009-05~2009-12 /主持人
  70. 國立彰化師範大學「教務行政(含進修學院)資訊系統建置」 /2009-05~2012-08 /主持人
  71. 資策會自辦收費訓練課程機器使用費及場地費(98/4-98/6) /2009-04~2009-06 /主持人
  72. 98年度農糧資訊網路系統功能維護與增修作業 /2009-04~2009-12 /主持人
  73. 98年度輔導辦理水旱田利用調整業務計畫 /2009-04~2009-12 /主持人
  74. 98年度行動化敏感作物種植面積調查系統擴充及推廣 /2009-04~2009-12 /主持人
  75. 建置「恆溫核酸即時檢測儀之軟體開發與整合」 /2009-03~2009-10 /主持人
  76. 國中學生吸菸行為及健康行為調查電腦答案紙讀卡與轉檔 /2009-03~2009-03 /主持人
  77. 98年度農糧耕地與地政地籍資料碰檔核校作業 /2009-03~2009-12 /主持人
  78. 真理大學之校務系統Sybase資料庫轉移 /2009-01~2009-05 /主持人
  79. 資策會自辦收費訓練課程機器使用費及場地費(98/1-98/3) /2009-01~2009-03 /主持人
  80. 教育部97年度校園安全應用RFID協助學生安全建置計畫 /2008-12~2009-12 /主持人
  81. 資策會自辦收費訓練課程機器使用費及場地費(97/10-97/12) /2008-10~2008-12 /主持人
  82. 台灣體育大學(台中)「校務資訊系統整合規劃與開發(第二期)」 /2008-09~2011-10 /主持人
  83. 網路申請證明文件及電子繳費系統 /2008-09~2008-10 /主持人
  84. 97年度擴充及維護農糧資訊網路系統功能作業 /2008-08~2008-12 /主持人
  85. 法鼓佛教學院等院校「校園e化系統開發專案」 /2007-08~2015-09 /主持人
  86. 大學校院自行選送人才出國研修-李維斌 /2006-07~2007-06 /主持人
  87. 工程及科技教育認證先導型計畫 /2005-01~2005-12 /協同主持人
  88. 工程及科技教育認證先導型計畫 /2003-09~2004-12 /協同主持人
  89. 通訊科技教育改進計畫─網路應用與服務組─區域共同教學實驗室 /2003-03~2003-12 /共同主持人
  90. 教育部97年度校園安全應用RFID協助學生安全建置計畫 /主持人
  1. 100/100年度科技部獎勵特殊優秀人才 /研究發展處/ 2011-08-01/
  2. 99/Top 10 Articles in BioMedLib /BioMedLib(美國明尼蘇達大學生物醫學Lib)/ 2011-03-11/論文"A cryptographic key management solution for HIPAA..."
  3. 99/全國大專院校資安技能金盾獎 /資訊工業策進會/ 2010-12-10/指導學生江茂源、張舜賢、羅晟元獲光芒畢露獎
  4. 99/TANET2010佳作論文獎 /TANET 2010臺灣網際網路研討會/ 2010-10-27/指導學生朱琇伶獲大會佳作論文獎
  5. 99/99年度科技部獎勵特殊優秀人才 /研究發展處/ 2010-10-01/
  6. 98/「全國大專院校資安技能金盾獎」 /資訊工業策進會/ 2009-12-01/指導學生江茂源、張舜賢、羅晟元獲獎
  7. 97/「第三屆全國大專院校資安技能金盾獎」--潛力無窮獎 /資訊工業策進會/ 2008-12-05/指導學生江茂源、張舜賢、羅晟元獲獎
  1. 110/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2021-11-15/Biometric-based key management for satisfying patient’s control over health information in the HIPAA regulations
  2. 105/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2016-11-15/Data Perturbation Method Based on Contrast Mapping for Reversible Privacy Preserving Data Mining
  3. 105/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2016-11-15/A Novel Anti-classification Approach for Knowledge Protection
  4. 104/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2015-11-15/Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication
  5. 104/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2015-11-15/A HIPAA-Compliant Key Management Scheme with Revocation of Authorization
  6. 103/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2014-11-15/Reversible Privacy Preserving Data Mining: A Combination of Difference Expansion and Privacy Preserving
  7. 103/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2014-11-15/Key Training Items Search of Manufacturing Assessment Based on TTQS and GA-SVM
  8. 102/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2013-11-15/An efficient and secure multi-server authentication scheme with key agreement
  9. 101/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2012-11-15/A Novel Key Management Solution for Reinforcing Compliance with HIPAA Privacy/Security Regulations
  10. 101/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2012-11-15/IC-Lock Approach: a Key Management Solution for Outsourced Database
  11. 101/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2012-11-15/Adaptive Secret Sharing for Color Images
  12. 100/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2011-11-15/A Secure and Cost-Effective Content Protection Scheme for DRM Systems
  13. 99/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2010-11-15/A Secure Image Authentication Scheme with Tampering Proof and Remedy Based on Hamming Code
  14. 99/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2010-11-15/A Self-Verification Authentication Mechanism for Mobile Satellite Communication Systems
  15. 99/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2010-11-15/A New E-Coupon System with Security and Efficiency in Mobile Commerce
  16. 99/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2010-11-15/Practical and Efficient Electronic Checkbook
  17. 99/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2010-11-15/An Authenticated Secure Image Hiding Scheme
  18. 98/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2009-11-15/Key Management for Encrypted Storage on a Grid
  19. 98/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2009-11-15/Security Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks
  20. 98/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2009-11-15/A Round- and Computation-Efficient Three-Party Authenticated Key Exchange Protocol
  21. 98/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2009-11-15/A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations
  22. 98/逢甲大學論文著作獎勵 /逢甲大學/ 2009-11-15/Efficient and Portable Digital Rights Management for Preserving User Privacy Using Smart Cards
  23. 98/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2009-11-15/A New Method for Using Hash Functions to Solve Remote User Authentication
  24. 98/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2009-11-15/A Secure Authentication Scheme with Anonymity for Wireless Communications
  25. 98/逢甲大學論文著作獎勵 /逢甲大學/ 2009-11-15/A Self-Concealing Mechanism for Authentication on Portable Communication Systems
  26. 97/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2008-11-15/A Novel Deniable Authentication Protocol Using Generalized ElGamal Signature Scheme
  27. 97/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2008-11-15/Security Analysis of a Password-Based Simple Three-Party Key Exchange Protocol
  28. 97/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2008-11-15/A Dual-Purpose Signature for Authentication on UMTS
  29. 97/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2008-11-15/A Portable DRM Scheme using Smart Cards
  30. 96/逢甲大學論文著作獎勵 /逢甲大學/ 2007-11-15/電子商務的安全威脅
  31. 96/逢甲大學論文著作獎勵 /逢甲大學/ 2007-11-15/基於CAPTCHA的動態密碼驗證系統
  32. 96/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2007-11-15/An Efficient Group Signature Based on PSS-R
  33. 96/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2007-11-15/Security of new encryption algorithm for image cryptosystems
  34. 96/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2007-11-15/Security of fragile watermarking scheme for image authentication
  35. 96/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2007-11-15/Improved Self-Certified Group-Oriented Cryptosystem without a Combiner
  36. 96/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2007-11-15/整合GSM簡訊機制之簡易安全無線區域網路認證方法與系統
  37. 96/逢甲大學優良教材獎勵優等獎 /逢甲大學/ 2007-11-15/"Chapter 3 Wireless security," Enabling Technologies for Wireless E-Business
  38. 95/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2006-11-15/A New Delegation-based Authentication Protocol for Use in Portable Communications Systems
  39. 95/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2006-11-15/A Publicly Verifiable Copyright-proving Scheme Resistant to Malicious Attacks
  40. 95/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2006-11-15/Remarks on some signature schemes based on factoring and discrete logarithms
  41. 95/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2006-11-15/An enhanced user authentication scheme for multi-server Internet services
  42. 94/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2005-11-15/A smart card-based remote scheme for password authentication in multi-server Internet services
  43. 94/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2005-11-15/Constructing Identity-Based Cryptosystems for Discrete Logarithm Based Cryptosystems
  44. 94/逢甲大學論文著作獎勵優良獎 /逢甲大學/ 2005-11-15/Secure SAS-like password authentication schemes
  45. 93/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2004-11-15/A Variance-Based Public Verifiable Copyright-Protection Scheme Surviving Intentional Attacks
  46. 93/逢甲大學論文著作獎勵 /逢甲大學/ 2004-11-15/On the Security of Saeednia's Convertible Group Signature Scheme
  47. 93/逢甲大學論文著作獎勵 /逢甲大學/ 2004-11-15/Improvement of an Encryption Scheme for Binary Images
  48. 92/逢甲大學論文著作獎勵 /逢甲大學/ 2003-11-15/Security Enhancement for Some Modified Authenticated Key Agreement Protocols
  49. 92/逢甲大學論文著作獎勵傑出獎 /逢甲大學/ 2003-11-15/A Public Verifiable Copy Protection Technique for Still Images,
  1. 從秘密訊息長成無異狀的文章–一種自動產生的語言學隱藏術/國立暨南國際大學資訊工程學系/2011-12
  2. A Novel Key Management Solution for Reinforcing Compliance with HIPAA Privacy/Security Regulations/靜宜大學資訊管理學系/2011-12
  3. 資訊安全與個資保護/海巡署/2010-10
  4. 資訊安全與個資保護/勤益科技大學/2010-10
  5. 2010年海峽兩岸四地高校網路業務互通及資訊化研討會/華南理工大學/2010-07
  6. 資訊安全與網路安全問題之探討/彰化縣警局/2010-05
  7. 資訊安全管理/高雄師範大學/2010-05
  8. An Anti-Phishing User Authentication Mechanism/中原大學資工系/2010-04
  9. 資訊安全風險管理與校園網路安全問題之探討/臺中市國民中小學校長資訊教育/2009-12
  10. Digital Rights Management with Consumer Interests/國立中興大學資訊科學與工程學系/2009-11
  11. 校務系統與資訊服務之開發/大專校院校務資訊系統經驗交流/2009-09
  12. 大學CIO的挑戰與創新機遇/中國教育及科研計算機應用與網路/2009-04
  13. 資通安全概念與推動ISMS認證經驗談/建國科技大學/2009-01
  14. 建構資訊化數位教學環境/亞洲大學/2009-01
  15. 校務系統發展與維運之資訊安全/崑山科技大學/2008-09
  16. New Copyright Protection Model for Video Content/2008年電子信息兩岸青年科學家學/2008-09
  17. 『攜手計畫績優案例表揚暨網路填報系統教育訓練』專題演講/國立台南大學/2008-08
  18. Multimedia Security/上海 復旦大學/2008-07
  19. 以風險管理之概念建置資安架構/聯合大學資訊管理系/2008-04
  20. 以風險管理之概念建置資安架構/高雄師範大學資訊教育所/2008-04
  21. A Cryptographic Key Management Solution for HIPAA Privacy/Se/成功大學 資工系/2008-03
  22. 校園網路侵權相關法律問題之探討/2008年校園網路管理國際研討會/2008-02
  23. A Cryptographic Key Management Solution for HIPAA Privacy/Se/靜宜大學 資管系/2007-12
  24. 九十六年彰化教育局資訊安全認知與導入研習/彰化北斗國小/2007-12
  25. 九十六年彰化教育局資訊安全認知與導入研習/彰化南郭國小/2007-12
  26. 南投縣政府資通安全教育訓練/南投縣政府/2007-10
  27. 網路安全面觀/彰化基督教醫院/2007-10
  28. 電子交易/商務法律實務人才培訓(三):網路犯罪與資訊安全/資策會/2006-06
  29. 網路犯罪與資訊安全:資訊安全管理/彰化縣稅捐稽徵處/2006-06
  30. 資訊安全管理/上海大學通信與信息工程學院/2006-04
  31. 資訊安全管理簡介/聯合後勤學校/2006-03
  32. 國際工程與技術教育認證經驗分享/勤益科技大學/2005-12
  33. 工程及科技教育認證經驗交流研討會:學系推動工程及科技教育認證/虎尾科技大學/2005-11
  34. 網路犯罪與資訊安全/逢甲大學/2005-09
  35. 彰化縣稅捐稽徵處九十四年度資訊安全講習/彰化縣稅捐稽徵處/2005-06
  36. 安全的電子商務服務/僑光技術學院資管系/2005-05
  37. 網路上的安全威脅/台中師院/2005-04
  38. Image Hiding with Message Authentication Code/暨南大學/2005-04
  39. 資訊安全2004技術暨教學研討會/資訊安全相關課程規劃與教學經驗/2003-12
  40. 資訊安全的投資與回收/網路安全威脅與防護趨勢研討會/2003-10
  1. Hui-Ju Tseng, Wei-Bin Lee, Tzung-Her Chen, Kevin I.-J. Ho/A cooperative Authentication Scheme for Telemedicine/Progress on Cryptography: 20 Year of Cryptography in Taiwan (Chu-Hsing Lin, Wei-Bin Lee, Iuon-Chang Lin) /McGraw-Hill International Enterprises, LLC., Taiwan Branch /2014-11-01/ pp.453-461 /
  2. 李維斌、張舜賢、陳星百/無線射頻辨識系統現況與應用/資通安全分析專論 /科技政策研究與資訊中心 /2009-12-01
  3. 陳星百、李佳鴻、李維斌/數位多媒體版權管理與保護技術/資通安全分析專論 /科技政策研究與資訊中心 /2009-03-01
  4. 李維斌,陳星百,張真誠/電子商務的安全威脅/資通安全分析專論 /國家實驗研究院 /2006-11-01/ 229-263頁
  5. 張真誠,李榮三,李維斌/電子商務的消費機制/資通安全分析專論 /國家實驗研究院 /2006-09-01/ 111-143頁
  6. 李維斌, 張簡琮倫/基於CAPTCHA的動態密碼驗證系統/資訊安全通訊 /中華民國資訊安全學會 /2006-07-01/ 第12卷第3期50-58頁
  7. Chang, Chin-Chen and Lee, Wei-Bin/Taiwan: Focus on the Information Security Market/IT Professional /2003-08-01/ Vol.5,22-29 /IT Professional, Vol. 5, No. 5, Sep./Oct. 2003, pp. 26-29.
  1. 整合GSM簡訊機制之簡易安全無線區域網路認證方法與系統/發明 /第 I 252649號 /2006-04~ 2023-08
  2. 電子商務金融交易授權方法與系統/新型 /第182663號 /2003-06~ 2021-10
最後更新時間:2024-4-19, 9:13 a.m. 下次更新時間:2024-4-20, 9 a.m.