(1)SCI期刊論文
- Yu-Yi Chen, Yih-Jiun Lee, Kai-Wen Lien, Tzu-Yi Chen, Customized Panorama System for Wayfinding and Walkthrough, Journal of Internet Technology (ISSN: 1607-9264), Vol 20, No 5, pp.1649-1656, Sep. 2019. [SCIE (2018 Impact factor=0.715, COMPUTER SCIENCE, INFORMATION SYSTEMS, Rank=142/155)]
- Der-Chen Huang, Ying-Yi Chu, Yuan-Kwei Tzeng, Yu-Yi Chen, Wei-Ming Chen, Secure Routing for WSN-Based Tactical-Level Intelligent Transportation Systems, Journal of Internet Technology (ISSN: 1607-9264), Vol 20, No 4, pp.1013-1026, July 2019. [SCIE (2018 Impact factor=0.715, COMPUTER SCIENCE, INFORMATION SYSTEMS, Rank=142/155)]
- Meng-Lin Tsai and Yu-Yi Chen, A Novel Group Ownership Proof and Transfer Scheme for B2B, B2C and C2C Transactions, International Journal of Ad Hoc and Ubiquitous Computing (ISSN: 1743-8225), Volume 29, Issue 1-2, 2018. [SCIE (2018 Impact factor=0.560, COMPUTER SCIENCE, INFORMATION SYSTEMS, Rank=149/155)] [H-INDEX]
- Yu-Yi Chen, Meng-Lin Tsai, Fong-Jia Chang, The Design of Secure Mobile Coupon Mechanism with the Implementation for NFC Smartphones, Computers & Electrical Engineering (ISSN: 0045-7906), Vol 59, pp.204-217, April 2017. [SCIE (2017 Impact factor=1.747, COMPUTER SCIENCE, HARDWARE & ARCHITECTURE, Rank=20/52)] [H-INDEX]
- Yu-Yi Chen, Chuan-Chiang Huang, Jinn-Ke Jan, The Design of AATIS Emergency Access Authorization for Personally Controlled Online Health Records, Journal of Medical and Biological Engineering (ISSN: 1609-0985), Vol. 35, Issue 6, pp 765-774, Dec 2015. [SCIE (2015 Impact factor=1.018, ENGINEERING, BIOMEDICAL, Rank=55/76)] [H-INDEX]
- Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, The Design of Conditional Access Mechanism for Ubiquitous Video on Demand Services, Security and Communication Networks (ISSN: 1939-0114), Vol.7, Issue 12, pp.2587–2595, Dec. 2014. [SCIE (2014 Impact factor=0.720, TELECOMMUNICATIONS, Rank=54/77)]
- Yu-Yi Chen, Yao-Jen Wang, Jinn-Ke Jan, A Novel Deployment of Smart Cold Chain System using 2G-RFID-Sys, Journal of Food Engineering (ISSN: 0260-8774), Vol.141, pp.113-121, Nov 2014. [SCIE (2014 Impact factor=2.771, FOOD SCIENCE & TECHNOLOGY, Rank=19/123)] [H-INDEX]
- Chin-Ling Chen, Yu-Yi Chen, Cheng-Chi Lee, Cheng-Hsun Wu, Design and Analysis of A Secure and Effective Emergency System for Mountaineering Events, Journal of Supercomputing (ISSN: 0920-8542), Vol.70, Issue 1, pp.54-74, Oct. 2014. [SCIE (2014 Impact factor:0.858, COMPUTER SCIENCE, THEORY & METHODS, Rank=56/102)] [H-INDEX]
- Chin-Ling Chen, Yu-Yi Chen, Jinn-Ke Jan, Chih-Cheng Chen, A Secure Anonymous E-Voting System Based on Discrete Logarithm Problem, Applied Mathematics & Information Sciences (ISSN: 2325-0399) , Vol. 8, No.5, pp.2571-2578, Sep. 2014. [SCIE (2013 Impact factor=1.232, MATHEMATICS, APPLIED, Rank=53/251)] [H-INDEX]
- Chin-Ling Chen, Woei-Jiunn Tsaur, Yu-Yi Chen, Yao-Chung Chang, A Secure Mobile DRM System Based on Cloud Architecture, Computer Science and Information Systems (ISSN: 1820-0214), Vol.11, Issue 3, pp.925-941, Aug 2014. [SCIE (2014 Impact factor=0.477, COMPUTER SCIENCE, SOFTWARE ENGINEERING, Rank=87/104)] [H-INDEX]
- Yu-Yi Chen, A Design of IPTV Conditional Access Mechanism based on P2P Network, Peer-to-Peer Networking and Applications (ISSN: 1936-6442), Vol. 7, Issue 1, pp 24-30, March 2014. [SCIE (2014 Impact factor=0.632, TELECOMMUNICATIONS, Rank=61/77)] [H-INDEX]
- Yu-Yi Chen and Meng-Lin Tsai, An RFID Solution for Enhancing Inpatient Medication Safety with Real-Time Verifiable Grouping-Proof, International Journal of Medical Informatics (ISSN: 1386-5056), Vol. 83, Issue 1, pp.70-81, January 2014. [SCIE (2014 Impact factor=2.004, COMPUTER SCIENCE, INFORMATION SYSTEMS, Rank=24/138)] [H-INDEX]
- Chin-Ling Chen, Wei-Chen Tsai, Yu-Yi Chen*, Woei-Jiunn Tsaur, Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET, Information Technology and Control (ISSN: 1392-124X), Vol.42, No. 4, pp.369-379, Dec. 2013. [SCI Expanded (2013 IF=0.813, Computer Science, Information Systems, Rank=86/135)] [H-INDEX]
- Yu-Yi Chen, Yao-Jen Wang, Jinn-Ke Jan, The Design of Speedy Seamless Safe Messaging Mechanism in VANET, International Journal of Computer Mathematics (ISSN: 0020-7160), Vol.90, Issue 12, pp. 2614-2630, July 2013. [SCI Expanded (2013 Impact factor=0.721, Mathematics, Applied, Rank=129/251)]
- Yu-Yi Chen, Yao-Jen Wang, Jinn-Ke Jan, A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System, Journal of Medical Systems (ISSN:0148-5598), Vol.37, Issue 3, Article:9940, June 2013. [SCI Expanded (2013 Impact factor=1.372, Medical Informatics, Rank=13/24)]
- Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan, A Secure EHR System based on Hybrid Clouds, Journal of Medical Systems (ISSN:0148-5598), Vol.36, Issue 5, pp 3375-3384, October 2012. [SCI Expanded (2012 Impact factor=1.783, Medical Informatics, Rank=11/23)] [H-INDEX]
- Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, Jinn-Ke Jan, A Design of Tamper Resistant Prescription RFID Access Control System, Journal of Medical Systems (ISSN:0148-5598), Vol.36, Issue 5, pp 2795-2801, October 2012. [SCI Expanded (2012 Impact factor=1.783, Medical Informatics, Rank=11/23)] [H-INDEX]
- Yu Yi Chen, Jinn Ke Jan, Meng Lin Tsai, Chun Ching Ku, Der Chen Huang, On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management, KSII Transactions on Internet and Information Systems (ISSN: 1976-7277), Vol.6, No.2, pp.515-528, Feb. 2012. [SCI Expanded (2012 Impact factor=0.560, Telecommunications, Rank=54/78)] [H-INDEX] (NSC 99-2221-E-005-118)
- Yu-Yi Chen, Meng-Lin Tsai, Jinn-Ke Jan, The Design of RFID Access Control Protocol using the Strategy of Indefinite-Index and Challenge-Response, Computer Communications (ISSN:0140-3664), Vol.34 Issue 3, pp.250-256, March 2011. [SCI Expanded (2011 Impact factor=1.044, Telecommunications, Rank=35/79)] [H-INDEX]
- Chin-Ling Chen and Yu-Yi Chen, A Non-repudiated Self-service Store System Based on Portable Trusted Device, Wireless Personal Communications (ISSN: 0929-6212), Vol.49, No.4, pp.475-485, Jun 2009. [SCI Expanded (2009 Impact factor=0.418, Telecommunications, Rank=49/77)] [EI] (NSC 95-2221-E-324-025)
- Chin-Ling Chen, Yu-Yi Chen, Yi-Hwa Chen, Group-based Authentication to Protect Digital Content for Business Applications, International Journal of Innovative Computing, Information and Control (IJICIC) (ISSN: 1349-4198), Vol.5, No.5, pp.1243-1251, May 2009. [SCI Expanded (2009 Impact factor=2.932, Automation & Control Systems, Rank=3/59)] [H-INDEX] (NSC 97-2221-E-324 -013)
- Yu-Yi Chen, Chin-Ling Chen, Jinn-Ke Jan, A Mobile Ticket System Based on Personal Trusted Device, Wireless Personal Communications (ISSN: 0929-6212), Vol.40, No.4, pp.569-578, March 2007. [SCI Expanded (2007 Impact factor=0.230, Telecommunications, Rank=47/66)] [EI] [H-INDEX] (NSC-94-2213-E-324-028)
- Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, A Fair and Secure Mobile Billing System, Computer Networks (ISSN:1389-1286), Vol.48, No.4, pp.517-524, July 2005. [SCI (2005 Impact factor=0.978, Telecommunications, Rank=17/59)] [EI] [H-INDEX]
- Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, Design of a Fair Proxy Raffle Protocol on the Internet, Computer Standards & Interfaces (ISSN: 0920-5489), Vol.27, No.4, pp.415-422, April 2005. [SCI (2005 Impact factor=0.620, Computer Science, Software Engineering, Rank=48/79)] [EI] [H-INDEX]
- Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, A Novel Proxy Deposit Protocol for E-Cash Systems, Applied Mathematics and Computation (ISSN: 0096-3003), Vol.163, No.2, pp.869-877, April 2005. [SCI (2005 Impact factor =0.688, Mathematics, Rank=66/151)] [EI] [H-INDEX]
- Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, The Design of a Secure Anonymous Internet Voting System,Computers & Security (ISSN: 0167-4048), Vol. 23, No. 4, pp.330-337, June 2004. [SCI (2004 Impact factor =0.412, Computer Science, Information Systems, Rank=59/78)] [EI] [H-INDEX]
- Jinn-Ke Jan, Yu-Yi Chen, A Secure Anonymous Voting Protocol with a Complete Supervision, International Journal of Computer Systems Science & Engineering, Vol.17, No.4, pp.211-219, July 2002. [SCI (2002 Impact factor =0.333, Computer Science, Hardware & Architecture, Rank=35/46)] [EI] (NSC95-2221-E- 005-021)
- Jinn-Ke Jan, Yu-Yi Chen, "Paramita wisdom" password authentication scheme without verification tables, Journal of Systems and Software, Vol.42, Issue.1, pp.45-57, July 1998. [SCI Expanded (1999 Impact factor =0.237, Computer Science, Software, Graphics, Programming, Rank=53/67))] [H-INDEX]
(2)系所認可之期刊論文(EI期刊論文)
- Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan, A Novel Design of Authentication-as-a-Services (AaaS) Architecture in Cloud Computing, Journal of Computers (ISSN: 1991-1599), Vol. 24, No. 3, pp.19-25, October 2013. [EI]
- Chin-Ling Chen, Yu-Yi Chen, Tsungm-Min Kuo, Kuo-Ching Chiou, Yong-Yuan Deng, Design of an RFID On-line Authentication and Anti-counterfeit Transaction Protocol, International Journal of RF Technologies: Research and Applications (ISSN: 1754-5730), Vol.4, No.1, pp.37-53, December 2012. [EI]
- Yu-Yi Chen, Meng-Lin Tsai, Yu-Tan Chen, Jinn-Ke Jan, A Tagged-Product Ownership Transfer Mechanism used in Retailer and Second-Hand Transaction, International Journal of Radio Frequency Identification Technology and Applications (ISSN: 1745-3216), Vol.3, Issue 1/2, pp.47-53, April 2011. [EI]
- Yu-Yi Chen, Jinn-Ke Jan, Der-Chen Huang, Yi-Cheng Wei, A Design of Lightweight RFID Anti-Counterfeiting Mechanism, Journal of Computers (ISSN:1991-1599), Vol.20, No.2, pp.16-22, July 2009. [EI] (經濟部98-EC-17-A- 29-S2- 0033)
- Chin-Ling Chen, Yu-Yi Chen, Yu-Cheng Huang, Chen-Shen Liu, Chia-I Lin, Tzay-Farn Shih, Anti-counterfeit Ownership Transfer Protocol for Low Cost RFID System, WSEAS Transactions on Computers (ISSN: 1109-2750), Vol. 7, Issue 8, pp.1149-1158, Aug. 2008. [EI] [H-INDEX] (NSC97-2221-E-005-053)
- Chin-Ling Chen, Yu-Yi Chen, Jinn-Ke Jan, A Secure Authentication Scheme for a Public Terminal Before a Transaction, Network-Based Information Systems (ISSN:0302-9743), Lecture Notes in Computer Science, Vol.4658, pp.118-126, Aug. 2007. [EI] (NSC95-2221-E-005-021)
(3)國際會議論文
- Der-Chen Huang, Ying-Yi Chu, Yu-Yi Chen, Chun-Fang Hsiao, Chi-Hung Hwang, A Failure Predication Method of Power System by Using MACD and TRIX. IEEE I2MTC – International Instrumentation and Measurement Technology Conference (I2MTC 2018), Houston, Texas, USA, May 2018.
- Yu-Yi Chen, Chuan-Chiang Huang, Jinn-Ke Jan, The Design of Secure Group Communication with Contributory Group Key Agreement Based on Mobile Ad Hoc Network, 2016 International Symposium on Computer, Consumer and Control (IS3C), Xi'an, China, July 2016.
- Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan, A Multi-Servers Remote User Authentication Scheme using a Smarter Smart Card, The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), pp.33-42, Kuala Lumpur, Malaysia, March 4-6, 2013.
- Yu-Yi Chen and Wei Hsuan Lo, A Mobile Application Design for Interpersonal Network Management, 2013 International Congress on Social Sciences and Business (2013 ICSSB), Taipei, Taiwan, Jan 8-10, 2013.
- Yu-Yi Chen and Ching Yi Hu, The Design of Indoor-navigation based Real-time Promotion Mobile Application, 2013 International Congress on Social Sciences and Business (2013 ICSSB), Taipei, Taiwan, Jan 8-10, 2013.
- Yu-Yi Chen and Tzu-Hsuan Huang, A Conditional-Anonymous Reviews Retrieval Mechanism Based on Social Networks, 2012 International Conference on Advanced Information Technologies (AIT 2012), Taichung, Taiwan, April 27-28, 2012.
- Jun-Chao Lu, Yu-Yi Chen*, Jing-Min Wang, Jinn-Ke Jan, Chih-Cheng Chen, Yeong-Lin Lai, Study and Implementation of RFID Eseals for Power Meters, Proceedings of the 2011 2nd International Conference on Innovations in Bio-inspired Computing and Applications (IBICA 2011), pp.352-355, Shenzhen, China, Dec 16-18, 2011. [EI]
- Yu-Yi Chen, Zhen-Jie Qiu, Jun-Chao Lu, Jinn-Ke Jan, A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping, Proceedings of the 2011 International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), Barcelona, Spain, pp.405-410, Oct 26-28, 2011. [EI]
- Jun-Chao Lu, Yu-Yi Chen, Jinn-Ke Jan, A Secure Negotiable On-demand Services Model for Cloud Environment, EUROCON - IEEE International Conference on Computer as a Tool (EUROCON 2011), pp.1-4, Lisbon, Portugal, April 27-29, 2011. [EI]
- Yu-Yi Chen, Jun-Chao Lu, Chih-Chiang Lin, Jinn-Ke Jan, Der-Chen Huang, A Novel Metropolitan Area Network Service Model with Free Use and Privacy Protection, International Computer Symposium (ICS2010), Tainan, Taiwan, pp.376-380, Dec 16-18, 2010. [EI]
- Jun-Chao Lu, Yu-Yi Chen, Shin-I Chen, and Jinn-Ke Jan, A Low-Cost RFID Authentication Protocol with Location Privacy Protection, 5th International Conference on Information Assurance and Security (IAS'09), Xi’an, China, August 18-20, 2009. [EI] (經濟部98-EC-17-A-29-S2-0033)
- Yu-Yi Chen, Jinn-Ke Jan, Yo-Yu Chi, Meng-Lin Tsai, A Feasible DRM Mechanism for BT-like P2P System, International Conference on e-Business and Information System Security (EBISS 2009), Wuhan, China, May 23-24, 2009. [EI] (NSC95-2221-E-005-045-MY2)
- Yu-Yi Chen, Yao-Jen Wang, Cheng-Jie Chen, A Fair-use DRM System based on Web Service, 8th International Conference on Intelligent System Design and Applications (ISDA 2008), Kaohsiung, Taiwan, November 26-28, 2008. [EI] (NSC95-2221-E-005-045-MY2)
- Yu-Yi Chen, Jun-Chao Lui, Shin-I Chen, A Customer Privacy Protection Protocol on Agent-based Electronic Commerce Transaction, 8th International Conference on Intelligent System Design and Applications (ISDA 2008), Kaohsiung, Taiwan, November 26-28, 2008. [EI]
- Chin-Ling Chen, Yu-Cheng Huang, Yu-Yi Chen, Chen-Shen Liu, Chia-I Lin, Tzay-Farn Shih, With Anti-counterfeit Ownership Transfer for RFID System, 6th WSEAS International Conference on Applied Electromagnetics, Wireless and Optical Communications (ELECTROSCIENCE’08) (ISSN: 1790-5117), Trondheim, Norway, pp.78-82, July 2-4, 2008. (NSC97-2221- E-005-053)
- Chin-Ling Chen, Hung-Yi Lin, Yu-Yi Chen, Jinn-Ke Jan, A Fair Transaction Model in Mobile Commerce, The 6th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2006), Vancouver, Canada, pp.484-489, August 27-30, 2006. [EI] (NSC95- 2213-E-324-025)
- Jinn-Ke Jan, Yu-Yi Chen, Chin-Ling Chen, A Novel Method to Authenticate a Public Terminal (Kiosk) before a Transaction, Proceedings of the International Conference on Information Technology: Prospects and Challenges in the 21st Century, Kathmandu, Nepal, May 23 - 26, 2003.
- Jinn-Ke Jan, Yu-Yi Chen, Chin-Ling Chen, A Realistic Secure Anonymous E-Voting Protocol based on the ElGamal Scheme, Proceedings of the International Conference on Communications & Broadband Networking, Bangalore, INDIA, pp.(Sect III)1-9, May 2003.
- Jinn-Ke Jan, Yu-Yi Chen, Yi Lin, The Design of Protocol for e-Voting on the Internet, Proceedings of the IEEE International Carnahan Conference on Security Technology, London, England, pp.180-189, Oct. 2001.
(4) 國內會議論文
- 陳育毅、傅思允、洪承榆, 以Google Apps Script快速佈建個資檔案去識別化服務, TANET 2018臺灣網際網路研討會, 2018. (佳作論文獎)
- 張雅嵐、楊崇誠、呂仲聖、張延任、陳育毅, 兼具即時及交談性之台中區網流量異常告警服務, TANET 2018臺灣網際網路研討會, 2018.
- 陳育毅、林煒傑, 教育機構資安驗證稽核人員能力養成及評估系統之探討, TANET 2018臺灣網際網路研討會, 2018.
- 劉孟坤、林中義、張延任、陳育毅, 移動影像感知結合手機通訊軟體即時推播監視系統-以臺中區網中心機房應用為例, TANET 2018臺灣網際網路研討會, 2018.
- 陳育毅、張芸瑄、蔡宜霖, 利用Google表單蒐集個人資料之安全管理機制, TANET 2017臺灣網際網路研討會, 2017.
- 陳仕豪、楊崇誠、葉宏、呂仲聖、劉孟坤、張延任、陳育毅, 使用LINE機器人(LINE BOT)之自動即時資安通報系統設計, TANET 2017臺灣網際網路研討會, 2017.
- 張雅嵐、陳仕豪、楊崇誠、呂仲聖、劉孟坤、林中義、張延任、陳育毅, 響應式網路氣象台結合LINE自動告警機制-以台中區網為例, TANET 2017臺灣網際網路研討會, 2017.
- 吳欣蒨、張雅婷、吳賢明、陳育毅, 兼具分流、容錯及安全防護的分散式DNS 建置-以國立中興大學為例, TANET 2016臺灣網際網路研討會, pp.100-105, Nov 1, 2016.
- 劉孟坤、呂仲聖、陳仕豪、楊崇誠、張雅嵐、張延任、陳育毅, 建置虛擬桌面基礎架構(VDI)最佳資源配置及節能效率之探討, TANET 2016臺灣網際網路研討會, pp.691-696, Nov 1, 2016.
- 陳育毅、劉柏伸、蔡孟琳、詹進科, 結合RFID系統之全新線上多媒體影音租賃系統, TANET 2011臺灣網際網路研討會, Oct 24-26, 2011. (NSC 99-2221-E-005-11)
- 陳育毅、許肇基、呂俊超、詹進科, 有線式RFID 搜尋機制之安全設計, TANET 2011臺灣網際網路研討會, Oct 24-26, 2011.
- 許志義、陳育毅、王京明、史印芝、林子靖, 行銷通路3.0雲端平台商業模式及其市場接受度之調查分析, 第8屆新世紀優質企業理念與價值創造研討會(競爭力的提升:創新與企業創業), Nov 20, 2010.
- 陳育毅、詹進科、呂俊超、邱振傑, “適用於大賣場購物行為及售後服務之RFID安全機制設計”, 2010第六屆知識社群研討會, May 29, 2010.
- 陳育毅、詹進科、許肇基, 離線式RFID搜尋機制之安全設計, 2010第六屆知識社群研討會, May 29, 2010. (最佳論文獎)
- 陳育毅、詹進科、顧純菁, RFID於零售業存貨管理之安全監控應用系統–TRP的問題與改良設計, 2009 National Computer Symposium(全國計算機會議) - Workshop on Cryptography and Information Security, Nov 27-28, 2009. (優良論文獎)
- 陳育毅、詹進科、顧純菁, RFID於零售業存貨管理之安全監控應用系統, 2009資訊管理與數位內容研討會, Nov 20, 2009.
- 葉俞晨、陳育毅、許志義, 以T-Plan策略技術藍圖探討台灣數位家庭的未來發展, 2009電子商務與數位生活研討會(Conference on e-Commerce and Digital Life 2009), pp.14-27, March 14, 2009.
- 蔡孟琳、陳育毅、詹進科、黃德成, 適用於P2P系統架構之網路電視服務的條件式接取機制, 第十四屆資訊管理暨實務研討會, Dec 13, 2008.
- 葉俞晨、林子欽、蔡孟琳、陳育毅, 從Shopping 3.0趨勢探討商圈網站之改善規劃, 第二屆資訊教育與科技應用研討會(Information Education and Technological Applications Conference, IETAC), Nov 7, 2008.
- 蔡孟琳、紀宥宇、陳育毅、詹進科, 基植於P2P系統架構上的數位產權管理機制設計, 第五屆流通與全球運籌論文研討會, Oct 31, 2008. (NSC95-2221-E-005-045-MY2)
- 陳育毅、蔡孟琳、黃俊一, 適用於集合住宅單位之直播衛星系統的條件式接取機制, TANET 2008臺灣網際網路研討會, Oct 20-22, 2008.
- Zong-Ming Guo, Chen-Shen Liu, Chia-I Lin, Chin-Ling Chen, Yu-Yi Chen, With an On-line Authentication for RFID Secure Transaction System, 2008 Symposium on Digital Life Technologies: Human- Centric Smart Living Technology(2008數位生活科技研討會-人本智慧生活科技), June 5-6, 2008.
- 陳育毅、詹進科、劉柏伸, 一個改良SAPA之無線射頻(RFID)驗證協定(An Improved RFID Authentication Protocol based on SAPA), 2008管理與技術國際學術研討會, June 4-5, 2008.
- 陳育毅、詹進科、紀宥宇, 具合理使用的家庭數位內容共享機制, 第十八屆全國資訊安全會議(Proceedings of the 18th Information Security Conference), May 29-30, 2008.
- 陳育毅、詹進科、林志強, 公平及安全的無線網路計費系統(A Fair and Secure WLAN Billing System), 第七屆離島資訊技術與應用研討會(ITAOI2008), May 30, 2008.
- 陳育毅、林志強, 保障使用隱私之免費城市無線網路運作模式, 2008資訊管理暨商務科技研討會(IMCT2008), May 16, 2008.
- 陳育毅、詹進科、呂俊超, 適用於賣方主導交易模式的行動代理人安全交易機制(A Negotiable Contract Transaction Mechanism Based on Mobile Agent Services), 第十九屆國際資訊管理學術研討會(ICIM2008), May 16, 2008.
- 陳育毅、曾燕芬, 群組成員存取權限差異化與所有權可移轉之RFID系統,第十九屆國際資訊管理學術研討會(ICIM2008), May 16, 2008.
- 陳育毅、詹進科、韋宜成, 以RFID實現供應鏈管理之所有權安全移轉機制(A Secure RFID Ownership Transfer Mechanism for Supply Chain Management),第十九屆國際資訊管理學術研討會(ICIM2008), May 16, 2008.
- 陳育毅、詹進科、陳昱潭, 一種RFID的標籤擁有者轉換之安全協定-適用於零售通路商品, 2008台灣商管理論與實務研討會, May 9, 2008.
- 陳育毅、詹進科、曾燕芬, 群組成員存取權限差異化之RFID系統(Diversity of Group Member Access Right in RFID System), 2008全國RFID相關論文研討會, Feb 1, 2008.
- 陳育毅、詹進科、曾燕芬, 適用於群組成員不同權限等級之RFID安全存取控制協定(The Design of Secure RFID Access Control System with Different Authorized Group), 2007全國計算機會議(2007 National Computer Symposium), Dec 20-21, 2007. (論文佳作獎)
- 陳育毅、蕭世易, 一種更安全的行動通訊本地服務之研究, 第十七屆全國資訊安全會議(Proceedings of the 17th Information Security Conference), June 7, 2007.
- 陳育毅、詹進科、蕭世易, 支援行動服務提供者之本地服務系統設計, 資訊科技管理與資訊人才培育研討會, pp.208-213, June 6, 2007.
- 陳育毅、廖璟璜, 一種MANet 環境的存取控制設計, 資訊科技管理與資訊人才培育研討會, pp.112-118, June 6, 2007.
- 陳育毅、蔡孟琳, 演算法動畫視覺系統之研究, 第二屆數位內容管理與應用學術研討會, June 1-2, 2007.
- 陳育毅、詹進科、呂俊超, 以IOTP建構安全的國際貿易B2B電子商務系統–以信用狀為例, 第三屆流通與全球運籌論文研討會, pp.N2-1-10, Oct 28, 2005. (NSC94-2213-E-005-038)
- 陳育毅、黃蓉德、詹進科, 行動電話數位產權管理的分層設計與合理使用, 2005商管與資訊研討會(Taiwan conference on Business and Information), Sep 29-30, 2005.
- 陳育毅、蔡柏宏、詹進科, 建立家庭網路與個人合理使用的跨平台數位產權管理機制, 2005商管與資訊研討會(Taiwan conference on Business and Information), Sep 29-30, 2005.
- Jinn-Ke Jan, Hung-Yu Chien, C. P. Chen, Yu-Yi Chen, 嵌入圖檔的資訊隱藏方法與實作, 第十三屆全國資訊安全會議(Proceedings of the 13th Information Security Conference), pp.422-429, May 2003.
- Yu-Yi Chen, Jinn-Ke Jan, Chih-Fang Kuo, A Refined Proxy Deposit Protocol for E-cash Systems, 第十二屆全國資訊安全會議(Proceedings of the 12th Information Security Conference), pp.141-146, May 2002.
- Yu-Yi Chen, Jinn-Ke Jan, Muh-Don Hsiao, A Novel Web-Payment Scheme for the Off-line Environment, 第十二屆全國資訊安全會議(Proceedings of the 12th Information Security Conference), pp.211-219, May 2002.
(5)專書與技術報告
- 解昆樺、陳育毅、吳育龍、張俊彥、黃天祥、陳偉峯、盧翰莛、黃律澄、張玉書, 你也可以數位人文:數位策展x多媒體應用x創新教學, (ISBN 9789869866651), 國立中興大學出版中心, Jan. 2020.
- Yu-Yi Chen and Meng-Lin Tsai, The Study on Secure RFID Authentication and Access Control, Current Trends and Challenges in RFID (ISBN 978-953-307-356-9), Editor Cornel Turcu, InTech, July 2011.
- 陳育毅、蔡孟琳, 資通訊科技數位匯流之安全議題, 國家實驗研究院科技政策研究與資訊中心97年度資通安全專論, Feb. 2009.
- 陳育毅, 建立更安全公平的跨平台數位產權管理機制, 國科會專題研究計畫成果報告, Oct. 2008.
- 陳育毅、陳金鈴, RFID與PKI結合應用研究, 財團法人工業技術研究院專題研究計畫成果報告, Nov. 2007.
- 陳金鈴、陳育毅, 一種公平且不可否認的行動商務系統之研究, 國科會專題研究計畫成果報告, Oct. 2007.
- 陳育毅, 建立更安全公平的跨平台數位產權管理機制, 國科會專題研究計畫期中報告, Oct. 2007.
- 陳育毅, 網際商貿開放協定(IOTP)之安全研究與B2B商務應用, 國科會專題研究計畫成果報告, Oct. 2007.
- 陳育毅, 網際商貿開放協定(IOTP)之安全研究與B2B商務應用, 國科會專題研究計畫期中報告, Oct. 2006.
(6)其他期刊論文
- 陳育毅、蔡孟琳, RFID電子標籤的辨識、驗證、存取控制、防偽等研究之關連性, Communications of the CCISA(資訊安全通訊),Vol.14, No.3, pp.71-84, July 2008.
- Yu-Yi Chen, Shin-Yi Hsiao, A Secure and Private LBS Protocol on Mobile Communication Network, Journal of Computers(ISSN:1991-1599), Vol.19, No.1, pp.39-48, April 2008.
- Yu-Yi Chen, Yan-Fen Tzeng, RFID系統不同權限讀取器的安全存取控制協定(Secure Access Control Protocol of RFID System for Different Authorized Reader), 興大工程學刊(Journal of Engineering, National Chung Hsing Univerity), Vol.19, No.1, March 2008.
- Yu-Yi Chen, Jinn-Ke Jan, Cheng-Jie Chen, The Design of Fair-use Online DRM System, Journal of Computers(ISSN:1991-1599), Vol.16, No.5, pp.8-16, June 2005.
- Yu-Yi Chen, Jinn-Ke Jan, Chih-Fang Kuo, 一種更完善的不可追踪電子票券協定, Journal of Computers(ISSN:1991-1599), Vol.16, No.4, pp.1-6, September 2004.
- Yu-Yi Chen, Jinn-Ke Jan, Yuh-Min Tseng, Chin-Ling Chen, Cryptanalysis of a Blind Signature Scheme Based on ElGAMAL Signature, 興大工程學刊(Journal of Engineering, National Chung Hsing Univerity), Vol. 15, No.1, pp.37-39, March 2004.
- 陳育毅、謝鳳儀、沈欣宜、賴佳君、易真珮、何佳真, 專業網站自動化建製系統之應用與探討, 資訊與教育雜誌, pp.44-55, Feb. 2003.