Nai-Wei Lo

Position Title
- Professor (Dean of Library)
Expertise and Research Areas
- Information Security, Internet of Vehicles, Blockchain, Internet of Things, Cloud Computing, Web Technology, RFID
Teaching Courses
- Creativity and Leadership, Seminars in Management Excellence, Global Business Operation and Management, Leadership: Theory and Practice, IoT Applications and Business Models, Lean Product and Process Development, Multimedia & Web Technologies.
- Special Topics in Cybersecurity Technology and Management, Information Security for Web Services.
- Object Oriented Programming Language, Applied Programming Language, Architecture, Technology and Practice on Internet of Things.
Contact
- Office: MA 309
- Tel: +886-2-2737-6778
- Email: nwlo@cs.ntust.edu.tw
Laboratory
Education
- Ph.D., State University of New York at Stony Brook (1993/01 至 1998/12)
Experience
- National Taiwan University of Science and Technology, Dean, Library (2025/02 – Present)
- National Taiwan University of Science and Technology, Dean, School of Management (2021/08 – 2024/07)
- National Taiwan University of Science and Technology, Director, Computer Center (2021/02 – 2021/07)
- National Taiwan University of Science and Technology, Associate Dean, School of Management (2020/08 – 2021/07)
- National Taiwan University of Science and Technology, Chairman, Dept. of Information Management (2019/08 – 2021/07)
- National Taiwan University of Science and Technology, Professor (2015/02 – Present)
- National Taiwan University of Science and Technology, Associate Professor (2010/08 – 2015/01)
- National Taiwan University of Science and Technology, Assistant Professor (2003/02 – 2010/07)
- National Taiwan University of Science and Technology, Director, Taiwan Information Security Center @ NTUST (2014/08 – 2019/01)
Journal Publications
- Jheng-Jia Huang, Zheng-Yan Lin, Nai-Wei Lo and Sheng-Feng Feng, 2025, Feb., "Dynamic Trust Management Framework using Blockchain for Zero-trust-based Authentication in BYOD Environments," Enterprise Information Systems, Vol. 19, Issue 1-2, Article: 2457952. (SCI)
- Nai-Wei Lo, Chi-Ying Chuang, Jia-Ning Luo and Chong-Long Yang, 2024, March, "Vehicle Identity Anonymity Framework with Accountability for VANET Environment," Journal of Internet Technology, Vol. 25, No. 2, pp. 267-280. (SCI)
- Nai-Wei Lo, Sheng-Chiang Chen and Shou-Chun Chang, 2020, Sept., "A Flexible Electronic Data Exchange Framework Based on Consortium Blockchain," Journal of Internet Technology, Vol. 21, No. 5, pp. 1313-1324. (SCI)
- Alexander Yohan and Nai-Wei Lo, 2020, May, "FOTB: A Secure Blockchain-based Firmware Update Framework for IoT Environment," International Journal of Information Security, Vol. 19, pp. 257-278. (SCI)
- Nai-Wei Lo and Alexander Yohan, 2020, Jan., "BLE Based Authentication Protocol for Micropayment Using Wearable Device," Wireless Personal Communications, Vol.112, Number 4, pp. 2351-2372. (SCI)
- Jia-Ning Luo, Meng-Hsuan Tsai, Nai-Wei Lo, Chih-Yang Kao and Ming-Hour Yang, 2019, July, "Ambient Audio Authentication," Mathematical Biosciences and Engineering, Vol. 16, No. 6, pp. 6562-6586. (SCI)
- Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani and Nai-Wei Lo, 2019, July, "A Machine Learning Framework for Biometric Authentication using Electrocardiogram," IEEE Access, Vol. 7, pp. 94858-94868. (SCI)
- Yu-Hsuan Chuang, Nai-Wei Lo, Cheng-Ying Yang and Ssu-Wei Tang, 2018, April, "A Lightweight Continuous Authentication Protocol for the Internet of Things," Sensors, Vol. 18, Issue 4, Article 1104. (SCI)
- Alexander Yohan, Nai-Wei Lo and Doni Winata, 2018, March, "An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology," Sensors, Vol. 18, Issue 4, Article 974. (SCI)
- Kuo-Hui Yeh, Nai-Wei Lo and Chun-Kai Wang, 2018, March, "A Robust NFC-based Personalized IPTV Service System," Multimedia Tools and Applications, Vol. 77, Issue 5, pp. 5129-5148. (SCI)
- Liang-Chun Chen, Chien-Lung Hsu, Nai-Wei Lo, Kuo-Hui Yeh and Ping-Hsien Lin, 2017, Oct., "Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks," IEICE Transactions on Information and Systems, Vol. E100-D, No. 10, pp. 2267-2273. (SCI)
- Kuo-Hui Yeh, Nai-Wei Lo, Ren-Zong Kuo, Chunhua Su, Hsuan-Yu Chen, 2017, July, "Formal Analysis on RFID Authentication Protocols Against De-Synchronization Attack," Journal of Internet Technology, Vol. 18, No. 4, pp. 765-773. (SCI)
- Ta-Chih Yang, Nai-Wei Lo, Horng-Twu Liaw and Wei Chen Wu, 2017, May, "A Secure Smart Card Authentication and Authorization Framework using in Multimedia Cloud," Multimedia Tools and Applications, Vol. 76, Issue 9, pp. 11715-11737. (SCI)
- Yung-Chun Chen, Nai-Wei Lo, Ren-Zong Kuo, Enrico Winata and Kuo-Hui Yeh, 2017, Jan., "A Fast Collision Arbitration Algorithm for RFID Tag Identification in Supply Chain Environment," Journal of Internet Technology, Vol. 18, No. 1, pp. 125-134. (SCI)
- Nai-Wei Lo, Kuo-Hui Yeh and Chuan-Yen Fan, 2016, Dec., "Leakage-detection and Risk-assessment on Privacy for Android Applications: LRPdroid," IEEE Systems Journal, Vol. 10, No. 4, pp. 1361-1369. (SCI)
- Jia-Lun Tsai and Nai-Wei Lo, 2016, July, "Provably Secure Anonymous Authentication with Batch Verification for Mobile Roaming Services," Ad Hoc Networks, Vol. 44, pp. 19-31. (SCI)
- Nai-Wei Lo and Jia-Lun Tsai, 2016, May, "An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks without Pairings," IEEE Transactions on Intelligent Transportation Systems, Vol. 17, No. 5, pp. 1319-1328. (SCI)
- Jia-Lun Tsai and Nai-Wei Lo, 2016, March, "Secure Anonymous Key Distribution Scheme for Smart Grid," IEEE Transactions on Smart Grid, Vol. 7, No. 2, pp. 906-914. (SCI)
- 吳佳怡、羅乃維、莊祐軒、陳世仁、許明淵,2016年1月,「一個支援長期檢驗電子健康記錄管理之身份識別與授權機制」,資訊安全通訊,第二十二卷 第一期,pp.73-91。
- Jia-Lun Tsai and Nai-Wei Lo, 2015, Sept., "A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services," IEEE Systems Journal, Vol. 9, No. 3, pp. 805-815. (SCI)
- Jia-Lun Tsai and Nai-Wei Lo, 2015, Sept., "A Chaotic Map-based Anonymous Multi-server Authenticated Key Agreement Protocol using Smart Card," International Journal of Communication Systems, Vol. 28, Issue 13, pp. 1955-1963. (SCI)
- Jia-Lun Tsai and Nai-Wei Lo, 2015, July, "Secure Chaotic Maps-based Authenticated Key Agreement Protocol without Smartcard for Multi-server Environments," Security and Communication Networks, Vol. 8, Issue 11, pp. 1971-1978. (SCI)
- Kuo-Hui Yeh, Nai-Wei Lo and Pei-Yun Liu, 2015, May, "An Efficient Resource Allocation Scheme for Cloud Federations," Information Technology and Control, Vol. 44, No. 1, pp. 64-76. (SCI)
- Chih-Ta Yen, Horng-Twu Liaw and Nai-Wei Lo, 2014, Oct., "Digital Rights Management System with User Privacy, Usage Transparency, and Superdistribution Support," International Journal of Communication Systems, Vol. 27, Issue 10, pp. 1714-1730. (SCI)
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2014, Sept., "Secure Anonymous Authentication Scheme without Verification Table for Mobile Satellite Communication Systems," International Journal of Satellite Communications and Networking, Vol. 32, Issue 5, pp. 443-452. (SCI)
- Tsung-I Chuang, Wei-Ning Yang and Nai-Wei Lo, 2014, Sept., "An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard," Journal of Internet Technology, Vol. 15, No. 5, pp. 727-732. (SCI)
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2014, July, "Weaknesses and Improvements of an Efficient Certificateless Signature Scheme without Using Bilinear Pairings," International Journal of Communication Systems, Vol. 27, Issue 7, pp. 1083-1090. (SCI)
- Nai-Wei Lo and Jia-Lun Tsai, 2014, May, "A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings," Journal of Applied Mathematics, Vol. 2014, Article ID 454393. (SCI)
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, Dec., "Secure Handover Authentication Protocol Based on Bilinear Pairings," Wireless Personal Communications, Vol. 73, Issue 3, pp. 1037-1047. (SCI)
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, Dec., "Efficient Proxy Signature Scheme for Mobile Devices Using Bilinear Pairings," Information Technology and Control, Vol. 42, No. 4, pp. 309-314. (SCI)
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, Nov., "Novel Anonymous Authentication Scheme Using Smart Cards," IEEE Transactions on Industrial Informatics, Vol. 9, No. 4, pp. 2004-2013. (SCI)
- 莊祐軒、羅乃維,2013年10月,「物聯網安全的現況與挑戰」,資訊安全通訊,第十九卷 第四期,pp.16-29。
- Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu and Chieh Wang, 2013, Oct., "Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care," International Journal of Distributed Sensor Networks, Vol. 2013, Article ID 752412. (SCI)
- Chih-Ta Yen, Ming-Huang Guo, Nai-Wei Lo and Der-Jiunn Deng, 2013, Aug., "Authentication with Low-cost RFID Tags in Mobile Networks," Security and Communication Networks, Vol. 6, Issue 8, pp. 1021-1027. (SCI)
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, Aug., "A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks," Wireless Personal Communications, Vol. 71, Issue 3, pp. 1977-1988. (SCI)
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, Mar., "ID-based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices," Ad Hoc & Sensor Wireless Networks, Vol. 17, Issue 3/4, pp. 221-231. (SCI)
- Kuo-Hui Yeh, N.W. Lo, Tien-Ruey Hsiang, Yi-Chun Wei and Hung-Yi Hsieh, 2013, March, "Chaos between Password-based Authentication Protocol and Dictionary Attacks," Advanced Science Letters, Vol. 19, No. 3, pp. 1048-1051.
- Yi-Chung Yen, Tzong-Chen Wu, Nai-Wei Lo and Kuo-Yu Tsai, 2012, Nov., "A Fair-exchange e-Payment Protocol for Digital Products with Customer Unlinkability," KSII Transactions on Internet and Information Systems, Vol. 6, No. 11, pp. 2956-2979. (SCI)
- Yi-Chung Yen, Nai-Wei Lo and Tzong-Chen Wu, 2012, Oct., "Two RFID-Based Solutions for Secure Inpatient Medication Administration," Journal of Medical Systems, Vol. 36, Issue 5, pp. 2769-2778. (SCI)
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2012, July, "Secure Delegation-Based Authentication Protocol for Wireless Roaming Service," IEEE Communications Letters, Vol. 16, No. 7, pp. 1100-1102. (SCI)
- Kuo-Hui Yeh, N. W. Lo, Yingjiu Li, Yung-Chun Chen and Tzong-Chen Wu, 2012, July, "New Findings on RFID Authentication Schemes against De-synchronization Attack," International Journal of Innovative Computing Information and Control, Vol. 8, Number 7(A), pp. 4431-4449. (EI)
- Kuo-Hui Yeh, N.W. Lo and Enrico Winata, 2011, Nov., "An Efficient Ultralightweight Mutual Authentication Scheme for RFID Systems: Airy Protocol," Journal of Internet Technology, Vol. 12, No. 6, pp. 887-898. (SCI)
- Nai-Wei Lo and Kuo-Hui Yeh, 2011, Oct., "A Simple Three-party Password Authenticated Key Exchange Protocol," Journal of Shanghai Jiaotong University (Science), Vol. 16, Number 5, pp. 600-603. (EI)
- Yung-Chun Chen, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li and Enrico Winata, 2011, August, "Adaptive Collision Resolution for Efficient RFID Tag Identification," EURASIP Journal on Wireless Communications and Networking, 2011:139. (SCI)
- Kuo-Hui Yeh, Nai-Wei Lo and Yingjiu Li, 2011, July, "Cryptanalysis of Hsiang-Shih's Authentication Scheme for Multi-server Architecture," International Journal of Communication Systems, Vol. 24, Issue 7, pp. 829-836. (SCI)
- Kuo-Hui Yeh, Nai-Wei Lo and Enrico Winata, 2011, March, "CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems," Journal of Information Science and Engineering, Vol. 27, No. 2, pp. 777-788. (SCI)
- Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li and Yi-Xiang Hung, 2010, December, "Two Robust Remote User Authentication Protocols using Smart Cards," Journal of Systems and Software, Vol. 83, Issue 12, pp. 2556-2565. (SCI)
- Nai-Wei Lo and Kuo-Hui Yeh, 2010, Sept., "Mutual RFID Authentication Scheme for Resource-constrained Tags," Journal of Information Science and Engineering, Vol. 26, No. 5, pp. 1875-1889. (SCI)
- Kuo-Hui Yeh and Nai Wei Lo, 2010, August, "A Novel Remote User Authentication Scheme for Multi-server Environment without Using Smart Cards," International Journal of Innovative Computing, Information & Control, Vol. 6, No. 8, pp. 3467-3478. (EI)
- Nai-Wei Lo and Kuo-Hui Yeh, 2010, July, "Anonymous Coexistence Proofs for RFID Tags," Journal of Information Science and Engineering, Vol. 26, No. 4, pp. 1213-1230. (SCI)
- Nai Wei Lo and Kuo-Hui Yeh, 2010, July, "A Novel Authentication Scheme for Mobile Commerce Transactions," International Journal of Innovative Computing, Information & Control, Vol. 6, No. 7, pp. 3093-3103. (EI)
- Kuo-Hui Yeh, N. W. Lo and Enrico Winata, 2010, June, "Cryptanalysis of an Efficient Remote User Authentication Scheme with Smart Cards," International Journal of Innovative Computing, Information & Control, Vol. 6, No. 6, pp. 2595-2608. (EI)
- Kuo-Hui Yeh and N. W. Lo, 2010, "Improvement of Two Lightweight RFID Authentication Protocols," Information Assurance and Security Letters, Vol. 1 (2010), pp. 6-11.
- N. W. Lo and Kuo-Hui Yeh, 2010, June, "A Practical Three-Party Authenticated Key Exchange Protocol," International Journal of Innovative Computing, Information & Control, Vol. 6, No. 6, pp. 2469-2483. (EI)
- Nai-Wei Lo and Hsiao-Chien Tsai, 2009, Sept., "A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks," EURASIP Journal on Wireless Communications and Networking, Vol. 2009, Article ID 125348. (SCI)
- Hsiao-Chien Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2009, May, "A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks," IEICE Trans. Inf. & Syst., vol. E92-D, no. 5, pp. 777-786 (SCI).
- N. W. Lo and Kuo-Hui Yeh, 2009, March, "Cryptanalysis of Two Three-party Encrypted Key Exchange Protocols," Computer Standards & Interfaces, vol. 31 (2009), pp. 1167-1174. (SCI)
- N.W. Lo, Kuo-Hui Yeh and Chan Yeob Yeun, 2008, August, "New Mutual Agreement Protocol to Secure Mobile RFID-enabled Devices," Information Security Technical Report vol. 13, issue 3, pp. 151-157 (EI).
- 羅乃維、鍾順麒、蕭穎聰,2005年9月,「格網環境下的醫療影像處理效能運算分析」,中華民國資訊學會季刊通訊,第八卷 第三期,pp.127-144。
- N.W. Lo, Bradley S. Carlson, and D.L. Tao, 1997, December, "Fault Tolerant Algorithms for Broadcasting on the Star Graph Network," IEEE Transactions on Computers, vol. 46, no. 12, pp. 1357-1362. (SCI)
Conference Publications
- Hao-Yi Hsu, Raylin Tso, Tao-Hsiang Chang, Jen-Chieh Hsu, and Nai-Wei Lo, 2024, Dec. 10-13, "Quantum-Resistant Updatable Public Keys: Enhancing the Quisquis Protocol with LWE-Based Security," Proceedings of the 2024 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2024).(EI)
- Jheng-Jia Huang, Guan-Yu Chen, and Nai-Wei Lo, 2024, Oct. 14-18, "Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key," Proceedings of the 31th ACM Conference on Computer and Communications Security (ACM CCS 2024).(EI)
- Han-Ting Gao, Shang-Yi Yang, Chun-Han Chang, Jung-Kuo, Guan-Yu Chen, Jheng-Jia Huang, and Nai-Wei Lo, 2023, Dec. 7-9, "Information and Public Opinion Analysis Platform Based on Social Media," Proceedings of 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023). (EI)
- Jheng-Jia Huang, Wei-Hsueh Wang, Yi-Fan Tseng, Guan-Yu Chen, Hao-Hsiang Chang Chien, Wen-Yan Dai, and Nai-Wei Lo, 2023, Aug. 15-16, "Anonymous and Unlinkable Identity Scheme in Open Data Environment," Proceedings of the 18th Asia Joint Conference on Information Security (AsiaJCIS 2023).(EI)
- Nai-Wei Lo, Jheng-Jia Huang, Kai-Shiang Zhang, Tzu-Hao Huang, Yu-Xuan Luo, Yi-Chun Hung, and Kai-Yi Chang, 2023, June 1-2, "A Trust Management Mechanism for the Internet of Vehicles," 第三十三屆全國資訊安全會議論文集 (CISC 2023).
- Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo, Nai-Wei Lo and Ernesto Damiani, 2023, Feb. 20-23, "Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms," Proceedings of 8th International Congress on Information and Communication Technology (ICICT 2023).(EI)
- Bo-An Lai, Yi-Hsiu Yeh, Guan-Yu Chen, Jheng-Jia Huang and Nai-Wei Lo, 2022, Dec. 15-17, "A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments," Proceedings of 2022 International Computer Symposium (ICS 2022).(EI)
- 江忠晏、羅乃維,2022年6月16-17日,「基於雲端環境下智慧製造系統之安全通道實作分析」,第32屆全國資訊安全會議論文集(CISC 2022)。
- 吳宗成、羅乃維、查士朝、葉國暉、藍袖瑛、高嘉蔚、利文韡、趙守豐、楊冠彥,2022年6月16-17日,「長照機構與醫療院所的安全跨鏈應用設計」,第32屆全國資訊安全會議論文集(CISC 2022)。
- Jheng-Jia Huang, Yi-Fan Tseng, Nai-Wei Lo, Shao-Wei Tung and Wen-Yan Dai, 2021, Nov. 18-20, "Lightweight and Efficient Source Authentication Scheme Based on Blockchain Approach in Open Data Environment," Proceedings of 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021). (EI)
- Alexander Yohan, Nai-Wei Lo and Kevin Valentino, 2021, Aug. 25-26, "A Design of Secure Supply Chain Management System with Blockchain Technology," Proceedings of the 3rd Bi-Annual International Conference on Informatics, Technology, and Engineering (InCITE 2021). (EI)
- 吳宗成、羅乃維、查士朝、葉國暉、藍袖瑛、李云、利文韡、彭聖貿、李林發,2021年8月5-6日,「以中繼鏈為基礎之區塊鏈框架設計」,第31屆全國資訊安全會議論文集(CISC 2021)。
- 吳宗成、羅乃維、查士朝、藍袖瑛、舒君達、利文韡、彭聖貿,2020年9月1-4日,「具跨領域存取控制之異質區塊鏈安全聯合框架」,第30屆全國資訊安全會議論文集(CISC 2020)。
- Meng-Hsuan Tsai, Yu-Cheng Hsu and Nai-Wei Lo, 2020, Aug. 20-21, "An Efficient Blockchain-based Firmware Update Framework for IoT Environment," Proceedings of the 15th Asia Joint Conference on Information Security (AsiaJCIS 2020). (EI)
- Nai-Wei Lo, Meng-Hsuan Tsai, Jing-Lun Lin, Meng-Hsuan Lai and Yen-Ju Chen, 2019, Nov. 22-24, "Smart Manufacturing Management Framework for Industrial Internet of Things Environment," Proceedings of the 16th International Conference on Automation Technology (Automation 2019).
- Alexander Yohan, Nai-Wei Lo and Liem Peter Santoso, 2019, Oct. 15-18, "Secure and Lightweight Firmware Update Framework for IoT Environment," Proceedings of IEEE 8th Global Conference on Consumer Electronics (GCCE 2019). (EI)
- Nai-Wei Lo and Sheng-Hsiang Hsu, 2019, Sept. 15-17, "A Secure IoT Firmware Update Framework based on MQTT Protocol," Proceedings of the 40th International Systems Architecture and Technology (ISAT 2019). (EI)
- Nai-Wei Lo, Meng-Hsuan Tsai, Jing-Lun Lin, Meng-Hsuan Lai and Yen-Ju Chen, 2019, July 29 - Aug. 1, "Realization of Intelligent Management Platform for Cyber-Physical Systems," Proceedings of the 18th International Conference on Information & Knowledge Engineering (IKE 2019).
- 許祐晨、蔡孟軒、楊崇隆、牛愛元、羅乃維,2019年5月23-24日,「裝置對裝置輕量級身分鑑別協定」,第29屆全國資訊安全會議論文集(CISC 2019)。
- Yuan-Cheng Lai, Kai-Zhong Zhou, Si-Ru Lin and Nai-Wei Lo, 2019, May 20-24, "Flow-based Anomaly Detection Using Multilayer Perceptron in Software Defined Networks," Proceedings of the 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2019). (EI)
- Chuan-Kai Yang, Chiun-How Kao, Yuan-Cheng Lai and Nai-Wei Lo, 2019, May 20-24, "Privacy-Preserving Encryption-Domain Video Retrieval over the Cloud via Block Transformations of Key Frames," Proceedings of the 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2019). (EI)
- Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Yousef Al-Hammadi and Nai-Wei Lo, 2019, May 8-10, "New Blockchain Adoptation for Automotive Security by Using Systematic Innovation," Proceedings of 2019 IEEE Transportation Electrification Conference and EXPO Asia-Pacific (ITEC 2019 Asia-Pacific). (EI)
- Meng-Hsuan Tsai, Jia-Ning Luo, Ming-Hour Yang and Nai-Wei Lo, 2019, Mar. 14-17, "Location Tracking and Forensic Analysis of Criminal Suspects’ Footprints," Proceedings of the 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT 2019). (EI)
- Chao-Lung Yang, Chen-Yi Yang, Zhi-Xuan Chen and Nai-Wei Lo, 2019, Jan. 14-16, "Multivariate Time Series Data Transformation for Convolutional Neural Network," Proceedings of the 2019 IEEE/SICE International Symposium on System Integration (SII 2019). (EI)
- Alexander Yohan and Nai-Wei Lo, 2018, Dec. 10-13, "An Over-the-Blockchain Firmware Update Framework for IoT Devices," Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (DSC 2018). (EI)
- 黎哲宇、羅乃維、莊祐軒,2018年10月24-26日,「基於區塊鏈即時交易系統設計 - 以售票系統為例」,台灣網際網路研討會議論文集(TANET 2018)。
- Alexander Yohan, Nai-Wei Lo and Suttawee Achawapong, 2018, July 30 - Aug. 2, "Blockchain-based Firmware Update Framework for Internet-of-Things Environment," Proceedings of 17th International Conference on Information & Knowledge Engineering (IKE 2018).
- 洪麒鈞、詹哲宇、賴孟泫、黎哲宇、莊祐軒、羅乃維,2018年5月24-25日,「適用於物聯網之輕量級連續性鑑別協定」,第28屆全國資訊安全會議暨資安產業技術研討會論文集(CISC 2018)。
- Chao-Lung Yang, Hendri Sutrisno, Nai-Wei Lo, Zhi-Xuan Chen, Ching-Chih Wei, Han-Wei Zhang, Chin-Teng Lin, Chen-Lung Wei and Shang-Heng Hsieh, 2018, May 15-18, "Streaming Data Analysis Framework for Cyber-Physical System of Metal Machining Processes," Proceedings of the 1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2018).(EI)
- Kuo-Yang Wu, Yo-Hsuan Chuang, Tzong-Chen Wu and Nai-Wei Lo, 2017, Sept. 26-29, "A Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Network," Proceedings of the 5th International Conference on Soft Computing, Intelligent System and Information Technology (ICSIIT 2017).
- Kuo-Hui Yeh, Nai-Wei Lo and Chun-Kai Wang, 2017, Aug. 12-15, "A NFC-based Authentication Scheme for Personalized IPTV Services," Proceedings of the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2017).(EI)
- Chuan-Yen Fan, Jain-Shing Wu and Nai-Wei Lo, 2017, June 24-25, "Secure Communication based on Ambient Context," Proceedings of Symposium on Digital Life Technologies (DLT 2017).
- 譚學勇、莊祐軒、賴柏融、羅乃維,2017年5月25-26日,「開放式公用資源服務平台之研究」,第27屆全國資訊安全會議論文集(CISC 2017)。
- Nai-Wei Lo, Chia-Yi Wu, and Yo-Hsuan Chuang, 2016, Dec. 19-22, "An Authentication and Authorization Mechanism for Long-term Electronic Health Records Management," Proceedings of the 8th International Conference on Advances in Information Technology (IAIT 2016). (EI)
- Nai-Wei Lo, Kuo-Hui Yeh, Raylin Tso, Kuo-Yu Tsai, Bor-Shiun Lin, Tzu-Yin Chang and Chih-Hao Liu, 2016, Nov. 29-Dec. 2, "Real-time Public Sentiments Analysis and Information Integration Platform for Disaster Prevention and Victims of Disaster Rescue based on Social Networks," Proceedings of the 15th Global Spatial Data Infrastructure Conference (GSDI 15).
- Alexander Yohan, Nai-Wei Lo, and Henry Roes Lie, 2016, Sept. 4-7, "Dynamic Multi-factor Authentication for Smartphone," Proceedings of the 27th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2016). (EI)
- Nai-Wei Lo, Shau-Kang Lu, and Yo-Hsuan Chuang, 2016, Aug. 8-12, "A Framework for Third Party Android Marketplaces to Identify Repackaged Apps," Proceedings of the 14th IEEE International Conference on Pervasive Intelligence and Computing (PICom 2016). (EI)
- 唐偲瑋、許勝翔、劉佳琳、莊祐軒、羅乃維,2016年5月26-27日,「在Android平台上使用特徵指紋技術以實現App完整性驗證機制」,第26屆全國資訊安全會議論文集(CISC 2016)。
- Alexander Yohan, Nai-Wei Lo, Vincentius Randy, Shih-Jen Chen, and MingYuan Hsu, 2016, Jan. 4-6, "A Novel Authentication Protocol for Micropayment with Wearable Devices," Proceedings of the 10th ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2016). (EI)
- Nai-Wei Lo, Yu-Chen Cheng, Tzong-Chen Wu, Shih-Jen Chen, and Ming-Yuan Hsu, 2015, Dec. 19-20, "Security Analysis on Yu et al.’s Group Certificate Digital Signature Scheme for EMR Authentication Process," Proceedings of the 3rd International Conference on Advances in Intelligent Systems in Bioinformatics, Chem-Informatics, Business Intelligence, Social Media and Cybernetics 2015 (Intelisys 2015).
- Kuo-Hui Yeh, Nai-Wei Lo, Lin-Chih Chen, and Ping-Hsien Lin, 2015, Oct. 27-30, "A Fraud Detection System for Real-time Messaging Communication on Android Facebook Messenger," Proceedings of the 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE 2015). (EI)
- Nai-Wei Lo and Cheng Tsung Liu, 2015, Sept. 23-25, "An Accountable Identity-based Billing Protocol for Cloud Environment," Proceedings of the Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2015). (EI)
- Nai-Wei Lo, Che-Wei Chuang and Tzong-Chen Wu, 2015, July 20-22, "A Secure Group Data Access Protocol with Provable Data Possession for Cloud Environment," Proceedings of the Fourth International Conference on Informatics & Applications (ICIA 2015).
- Nai-Wei Lo, Meng-Chih Chiang and Chao Yang Hsu, 2015, May 24-26, "Hash-based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks," Proceedings of 2015 10th Asia Joint Conference on Information Security (AsiaJCIS 2015). (EI)
- Nai-Wei Lo, Chi-Kai Yu and Chao Yang Hsu, 2015, May 24-26, "Intelligent Display Autolock Scheme for Mobile Devices," Proceedings of 2015 10th Asia Joint Conference on Information Security (AsiaJCIS 2015). (EI)
- Kuo-Hui Yeh, Nai-Wei Lo and Chuan-Yen Fan, 2014, Oct. 7-10, "An Analysis Framework for Information Loss and Privacy Leakage on Android Applications," Proceedings of 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE 2014). (EI)
- Nai-Wei Lo and Alexander Yohan, 2014, Sept. 7-10, "Danger Theory-based Privacy Protection Model for Social Networks," Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (FedCSIS 2014), pp. 1397-1406. (EI)
- Nai-Wei Lo, Pei-Chi Fan and Tzong-Chen Wu, 2014, May 8-9, "An Efficient Virtual Machine Provisioning Mechanism for Cloud Data Center," Proceedings of 2014 IEEE Workshop on Electronics, Computer and Applications (IWECA 2014) (EI).
- Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chao Cha, Nai-Wei Lo, Gary Chung and Chun-Kun Liu, 2014, Jan. 6-9, "Motivations, Deployment, and Assessment of Taiwan’s e-Invoicing System: An Overview," Proceedings of 2014 47th Hawaii International Conference on System Sciences (HICSS-47), pp. 2200-2209. (EI)
- Nai-Wei Lo and Ya-Hsiang Chen, 2013, Dec. 13-14, "Web Services Selection Framework with Negotiation Capability," Proceedings of 2013 National Computer Symposium (NCS 2013).
- Nai-Wei Lo and Hsin-Lin Chiu, 2013, Dec. 13-14, "Are Selfish Nodes in MANET a Real Security Threat?," Proceedings of 2013 National Computer Symposium (NCS 2013).
- Nai-Wei Lo and Hsin-Hsiang Huang, 2013, Sept. 9-13, "Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks," Proceedings of the Second Cross-Straits Conference on Information Security (CSCIS 2013).
- Kuo-Hui Yeh, Nai-Wei Lo, Shih-Chao Cha, Chun-Kun Liu and Sheng-Hsiang Hsu, 2013, Sept. 7-8, "A Novel Consumer-oriented e-Invoicing System in Taiwan," Proceedings of International Conference on Internet Studies (NETs 2013).
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, July 2-5, "New Identity-based Sequential Aggregate Signature Scheme from RSA," Proceedings of the 2013 International Symposium on Biometrics and Security Technologies (ISBAST 2013), pp. 136-140. (EI)
- Nai-Wei Lo and Pei-Hwa Wu, 2013, June 18-20, "A Cloaking Algorithm to Support Privacy-aware Location-based Services based on Road Networks," Proceedings of the 7th International Conference on New Trends in Information Science and Service Science (NISS 2013).
- Kuo-Hui Yeh, Kuo-Yu Tsai, Chung-Fu Lu and Nai-Wei Lo, 2013, May 23-24, "Scalable and Anonymous Authentication Scheme," Proceedings of the 23rd Cryptology and Information Security Conference (CISC 2013).
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, April 1-3, "Novel Convertible Multi-authenticated Encryption Scheme for Group Communications," Proceedings of the 8th International Conference on Intelligent Information Processing (ICIIP 2013).
- 楊大治、羅乃維、廖鴻圖、李皓倫、許景濬,2012年10月23-25日,「應用於雲端服務之智慧卡安全認證機制」,台灣網際網路研討會議論文集(TANET 2012)。
- Kuo-Hui Yeh, N.W. Lo and Chieh Wang, 2012, Sept. 4-7, "A Patient Privacy-aware e-Health System based on Passive RFID," Proceedings of the 9th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2012), pp. 967-972. (EI)
- Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2012, Aug. 24-26, "Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment," Proceedings of the 6th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID 2012). (EI)
- Nai-Wei Lo, Kuo-Hui Yeh and Pei-Yun Liu, 2012, Aug. 24-26, "An Efficient Resource Allocation Scheme for Cross-Cloud Federation," Proceedings of the 6th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID 2012).(EI)
- Kuo-Hui Yeh, N.W. Lo and Chieh Wang, 2012, Aug. 17-19, "Coexistence Proof on Passive RFID for Medication Error Elimination," Proceedings of International Conference on Internet Studies (NETs2012).
- Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Ta-Chi Yang and Horng-Twu Liaw, 2012, Aug. 9-10, "Analysis of an eHealth Care System with Smart Card based Authentication," Proceedings of the 7th Asia Joint Conference on Information Security (AsiaJCIS 2012), pp. 59-61.(EI)
- N.W. Lo, Kuo-Hui Yeh, and Hsuan-Yu Chen, 2012, July 12-14, "Analysis against Secret Redundancy Mechanism for RFID Authentication Protocol," Proceedings of IEEE International Conference on Communications, Network and Satellite (COMNETSAT 2012), pp. 157-161.(EI)
- N.W. Lo, Kuo-Hui Yeh, and Hsuan-Yu Chen, 2012, May 30-31, "De-synchronization Attack Model for Ultra-lightweight RFID Authentication Protocols," Proceedings of the 22nd Cryptology and Information Security Conference (CISC 2012).
- 羅乃維、盧宣良,「電子郵件社交工程演練之自動化教育訓練系統」,2012年5月30-31日,第22屆資訊安全會議論文集 (CISC 2012)。
- Ta-Chi Yang, Nai-Wei Lo and Horng-Twu Liaw, 2012, May 25-27, "An Enhanced RBAC Mechanism for Multi-Tenancy Cloud Environment," Proceedings of the 1st International Workshop on Advanced Information Technology and Applications (IWAITA 2012).
- Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu, 2012, Mar. 26-29, "Efficient Convertible Multi-Authenticated Encryption Scheme for Group Communications," Proceedings of 2012 International Symposium on Biometrics and Security Technologies (ISBAST 2012), pp. 54-58. (EI)
- Nai-Wei Lo, Shiou-Huei Ruan and Tzong-Chen Wu, 2011, Dec. 11-14, "Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators," Proceedings of the 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011), pp. 484-489. (EI)
- Kuo-Hui Yeh, Yung-Chun Chen, Nai-Wei Lo and Chia-Chun Lin, 2011, May 27-28, "An Efficient Anti-collision Protocol for RFID-based Supply Chain Networks," Proceedings of the International Conference on Networking, VLSI and Signal Processing (ICNVSP 2011).
- 羅乃維、蔡効謙、黃昶銘、盧宣良、阮綉惠,2011年5月26-27日,「聯合服務架構的隱私協商機制之設計與雛形實作– 以OpenID為例」,第21屆資訊安全會議論文集(CISC 2011)。
- Chih-Ta Yen, Hrong-Twu Laiw, Nai-Wei Lo, Ting-Chun Liu and Jay Stu, 2010, Nov. 4-6, "Transparent Digital Rights Management System with Superdistribution," Proceedings of 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010), pp. 435-440. (EI)
- N. W. Lo and Kuo-Hui Yeh, 2010, Oct. 17-20, "De-synchronization Attack on RFID Authentication Protocols," Proceedings of 2010 International Symposium on Information Theory and its Applications (ISITA 2010), pp. 566-570.(EI)
- Kuo-Hui Yeh, N. W. Lo and Tzong-Chen Wu, 2010, August 5-6, "Formal Analysis on RFID Authentication Availability," Proceedings of the 5th Joint Workshop on Information Security (JWIS 2010).
- Kuo-Hui Yeh and N. W. Lo, 2010, July 9-12, "Tag Identification Efficiency for RFID Systems," Proceedings of the PACIS 2010 Doctoral Consortium (in conjunction with the 14th Pacific Asia Conference on Information Systems).
- Kuo-Hui Yeh, N. W. Lo, Yingjiu Li and Enrico Winata, 2010, April 20-23, "An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification," Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (HWISE 2010). (EI)
- N. W. Lo and Kuo-Hui Yeh, 2010, April 20-23, "A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems," Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (RFID & WSN and its Industrial Applications 2010). (EI)
- Kuo-Hui Yeh, N.W. Lo and Enrico Winata, 2010, Feb. 22-23, "An Efficient Ultralightweight Authentication Protocol for RFID Systems," Proceedings of the 2010 Workshop on RFID Security (RFIDsec’10 Asia).
- N.W. Lo, Enrico Winata and Kuo-Hui Yeh, 2009, Dec. 7-9, "Adaptive Delay Splitting for Efficient RFID Tag Identification," Proceedings of the Fourth International Conference on Innovative Computing, Information and Control (ICICIC 2009) (EI).
- Nai-Wei Lo and Tsung-Hao Hsu, 2009, Nov. 27-28, "Collaboration-based Misbehavior Detection System in Hybrid Vehicular Ad Hoc Networks," Proceedings of 2009 National Computer Symposium (NCS 2009).
- 羅乃維、蔡効謙、姜孟志、林鉫浚、吳文惠、吳佩樺,2009年10月28-30日,「Go Travel旅遊隨身包—一個適用於Android手機作業系統的旅遊加值服務平台」,台灣網際網路研討會議論文集(TANET 2009)。
- Kuo-Hui Yeh and N.W. Lo, 2009, August 18-20, "Improvement of an EPC Gen2 Compliant RFID Authentication Protocol," Proceedings of the Fifth International Conference on Information Assurance and Security (IAS09).
- N.W. Lo, Kuo-Hui Yeh and Meng-Chih Chiang, 2009, August 6-7, "Cryptanalysis of a Simple Three-party Key Exchange Protocol," Proceedings of the 4th Joint Workshop on Information Security (JWIS 2009).
- 陳金蓮、馬自莊、羅乃維、陳建中、張立中、賴坤財、胡能忠,2009年1月,「智慧型校園生活環境研擬與建置」,「智慧生活科技區域整合中心計畫」暨「前瞻優質生活環境計畫」聯合成果發表會。
- N.W. Lo, Chu-Hsiang Yang and Kuo-Hui Yeh, 2008, Nov. 13-15, "Performance Evaluation of Two Secure Communication Schemes on Vehicular Ad Hoc Networks," Proceedings of 2008 International Computer Symposium (ICS 2008), vol. 1, pp. 542-548.
- N.W. Lo and Kuo-Hui Yeh, 2008, July 10-11, "Potential Threat of Communication Scheme on Vehicular Ad Hoc Networks," Proceedings of the 3rd Joint Workshop on Information Security (JWIS 2008).
- N.W. Lo, Huei-Sz Shie and Kuo-Hui Yeh, 2008, July 10-11, "A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations," Proceedings of the 3rd Joint Workshop on Information Security (JWIS 2008).
- N.W. Lo and Shiou-Hung Chen, 2008, June 17-20, "A Study of Anti-robot Agent Mechanisms and Process on Online Games," Proceedings of IEEE International Conference on Intelligence and Security Informatics, pp. 203-205 (EI).
- 羅乃維、楊自立、葉國暉,2008年5月,「低成本無線射頻辨識系統之安全雙向認證機制」,第十九屆國際資訊管理學術研討會(ICIM 2008)。
- Kuo-Hui Yeh, N.W. Lo and Enrico Winata, 2008, March 25-28, "An Efficient Tree-based Tag Identification Protocol for RFID Systems," Proceedings of the 4th IEEE International Workshop on Heterogeneous Wireless Networks (HWISE 2008) pp. 966-970 (EI).
- N.W. Lo and Hsiao-Chien Tsai, 2007, Nov. 26-30, "Illusion Attack on VANET Applications – A Message Plausibility Problem," Proceedings of the 2nd IEEE Workshop on Automotive Networking and Applications (AutoNet'07), pp. 1-8 (EI).
- N.W. Lo and Kuo-Hui Yeh, 2007, November, "Hash-based Mutual Authentication Protocol for Mobile RFID Systems with Robust Reader-side Privacy Protection," Proceedings of the 1st ACM Workshop on Convergence of RFID and Wireless Sensor Networks and their Applications (SenseID'07)(EI).
- N.W. Lo and Chia-Hao Wang, 2007, Oct. 30 - Nov. 2, "Web Services QoS Evaluation and Service Selection Framework - A Proxy-oriented Approach," Proceedings of the IEEE Region 10 Annual International Conference (TENCON 2007) (EI).
- 張宇西、羅乃維、史朝陽,2007年10月,「普及運算下的情境感測架構之研究探討與實作」,台灣網際網路研討會議論文集(TANET 2007)。
- Tswen-Juh Gu, Nai-Wei Lo and Wei-Ning Yang, 2007, July, "Towards A COTS-Based Service-Oriented Simulation Architecture," Proceedings of 2007 Summer Computer Simulation Conference (SCSC'07).
- 葉國暉、羅乃維、賴源正、蔡効謙、林志宗,2007年6月,「行車間隨意網路的資訊安全與身份隱私整合應用架構之研究」,第17屆全國資訊安全會議論文集(CCISA 2007)。
- N.W. Lo and Hsiao-Yi Kuo, 2007, Jan., "Two-hops Neighbor-aware Routing Protocol in Mobile Ad Hoc Networks," Proceedings of the International Conference on Information Networking (ICOIN 2007).
- 羅乃維、陳首宏、張峰旗,2006年11月,「電腦網路遊戲外掛偵測機制及處理流程之研究」,台灣網際網路研討會議論文集(TANET 2006)。
- Nai-Wei Lo and Eu-Shing Chen, 2006, “ezBusiness – A Novel Mobile Business Application Architecture,” In Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications, pp. 96-101(EI).
- N.W. Lo, Bradley S. Carlson, and D.L. Tao, 1999, Nov. 4-6, "Fault Tolerant Broadcasting in Two Dimensional Torus Networks," The Proceedings of the ISCA 12th International Conference on Computer Applications in Industry and Engineering, pp. 25-30.
- Y.F. Liu, N.W. Lo, M. Subbarao, and Bradley S. Carlson, 1998, April, "Parallel Implementation of a Unified Approach to Image Focus and Defocus Analysis on the Parallel Virtual Machine," Proceedings of SPIE AeroSense Symposium, vol. 3387, pp. 100-111.
- N.W. Lo, Bradley S. Carlson, and D.L. Tao, 1997, Oct. 1-3, "Fault-Tolerant Broadcasting Algorithms in Two Dimensional Circuit-Switched Torus Network," Proceedings of the ISCA 10th International Conference on Parallel and Distributed Computing Systems, pp. 40-45.
- N.W. Lo, Bradley S. Carlson, and D.L. Tao, 1996, Aug. 18-21, "Fault Tolerant Algorithms for Broadcasting on the Star Graph Network," IEEE 39th Midwest Symp. on Circuits and Systems, vol. 3, pp. 1289-1292 (EI).
- Bradley S. Carlson, N.W. Lo, D.L. Tao, and Zhu Zheng, 1996, Aug. 18-21, "Granularity Experiments for the Adaptive MultiProcessor System (AMPS)," IEEE 39th Midwest Symp. on Circuits and Systems, vol. 3, pp. 1285-1288 (EI)
Research Project
- Resilience and Sustainability for Intelligent Zero Trust Architecture(2/2)(113-2634-F-011-002-MBK), National Science and Technology Council, 2024/06/01~2025/05/31
- On the Design of Secure Platform for Static Nodes and Robust Vehicle Authentication Scheme in Internet of Vehicles(112-2221-E-011-092-MY2), National Science and Technology Council, 2023/08/01~2025/07/31
- Resilience and Sustainability for Intelligent Zero Trust Architecture(1/2)(112-2634-F-011-002-MBK), National Science and Technology Council, 2023/06/01~2024/08/31
- ZTA-based Lightweight Authentication Protocol for Internet of Vehicles(111-2221-E-011-111-), National Science and Technology Council, 2022/08/01~2023/07/31
- Data Sharing and Traceability Provision Mechanisms Based on Secure Communications for Internet of Vehicles(111-2221-E-011-112-), National Science and Technology Council, 2022/08/01~2023/07/31
- Cross-chain Identity Authentication and Access Authorization Mechanism for Heterogeneous Blockchains(109-2221-E-011-109-MY2), National Science and Technology Council, 2020/08/01~2022/07/31
- Secure Cross-chain Data Exchange Mediation Mechanisms among Heterogeneous Blockchain Networks(109-2221-E-011-111-MY2), National Science and Technology Council, 2020/08/01~2022/07/31
- Access Control in 5G MEC(109-2923-E-011-006-MY3), National Science and Technology Council, 2020/01/01~2022/12/31
Book Chapters
- Bo-An Lai, Yi-Hsiu Yeh, Guan-Yu Chen, Jheng-Jia Huang and Nai-Wei Lo, 2022, Dec., "A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments," New Trends in Computer Technologies and Applications (Communications in Computer and Information Science, Vol. 1723), pp. 387-397, edited by Sun-Yuan Hsieh, Ling-Ju Hung, Ralf Klasing, Chia-Wei Lee, Sheng-Lung Peng, published by Springer.
- Nai-Wei Lo, I-Fan Wang and Yo-Hsuan Chuang, 2014, Nov., "RFID Multi-Ownership Transfer Protocol in VMI Environments," Radio Frequency Identification System Security (Cryptology and Information Security Series, Vol. 12), pp. 51-66, edited by Nai-Wei Lo, Yingjiu Li and Kuo-Hui Yeh, published by IOS Press.
- Kuo-Hui Yeh, Nai-Wei Lo and Siao-Mei Chen, 2014, May, "Grouping Proof Protocols Based on Low-cost RFID Tags," Chapter 8, Radio-Frequency Identification (RFID)-Emerging Technologies, Applications and Improvement Strategies, pp. 187-213, edited by Xinxin Fan, published by Nova Science Publishers, New York, USA.
- Nai-Wei Lo and Fang-Ling Liu, 2013, May, "A Secure Routing Protocol to Prevent Co-operative Black Hole Attack in MANET," Lecture Notes in Electrical Engineering Vol. 234, pp. 59-65. (EI)
- Nai-Wei Lo, Kuo-Hui Yeh and Hsuan-Yu Chen, 2012, Nov., "Cryptanalyses of Two Ultralightweight RFID Authentication Protocols," Radio Frequency Identification System Security (Cryptology and Information Security Series, Vol. 8), pp. 85-93, edited by Nai-Wei Lo and Yingjiu Li, published by IOS Press.
- 羅乃維,2011年6月,「行動裝置應用程式設計」,第四章:基於地理位置資訊之車用行動商務程式開發,75-93頁,賴源正、黃崇明編審,東華書局出版。
- Yan-Chen Liu, Hung-Yu Chen, Yu-Chang Chen, Chu-Sing Yang and Nai-Wei Lo, 2011, April, "Integrated EPC Information Service Authentication using OpenID in Cross Domains," Radio Frequency Identification System Security (Cryptology and Information Security Series, Vol. 6), pp. 144-153, edited by Tieyan Li, Chao-Hsien Chu, Ping Wang and Guilin Wang, published by IOS Press.
- N. W. Lo and Kuo-Hui Yeh, 2011, March, "An Efficient Cut-through Mechanism for Tree-based RFID Tag Identification Schemes," Chapter 14, Advanced Radio Frequency Identification Design and Applications, pp. 259-268, edited by Stevan Preradović, published by InTech, Rijeka, Croatia.
- Kuo-Hui Yeh, N. W. Lo and Enrico Winata, 2010, Feb., "An Efficient Ultralightweight Authentication Protocol for RFID Systems," Radio Frequency Identification System Security (Cryptology and Information Security Series, Vol. 4), pp. 49-60, edited by Yingjiu Li and Jianying Zhou, published by IOS Press.
- N. W. Lo, Tzu-Li Yang and Kuo-Hui Yeh, 2009, Feb., "A Secure Mutual Authentication Protocol for Low-cost RFID System," in the book Development and Implementation of RFID Technology, edited by Cristina Turcu, published by I-Tech Education and Publishing KG, Vienna, Austria.
- N. W. Lo and Hsiao-Yi Kuo, 2008, November, "Two-Hops Neighbor-Aware Routing Protocol in Mobile Ad Hoc Networks," Lecture Notes in Computer Science Vol. 5200, pp.761-770. (EI)
- N.W. Lo and Kuo-Hui Yeh, 2007, December, "An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System," Lecture Notes in Computer Science Vol. 4809, pp.43-56. (EI)
- N.W. Lo and Kuo-Hui Yeh, 2007, September, "Novel RFID Authentication Schemes for Security Enhancement and System Efficiency," Lecture Notes in Computer Science Vol. 4721, pp.203-212. (EI)
Patents
- 查士朝、吳宗成、羅乃維,專利權期間2014年4月11日至2032年2月1日,專利名稱:「提供近場通訊裝置安全連線的系統及其方法」,台灣發明專利,專利號碼:發明第I434529號,專利所有權人:國立臺灣科技大學。
- 羅乃維、陳首宏,專利權期間2011年2月1日至2027年4月16日,專利名稱:「網路遊戲管理方法及應用其之網路遊戲管理裝置」,台灣發明專利,專利號碼:發明第I336631號,專利所有權人:國立臺灣科技大學。
Academic Services and Honors
- Listed in 2024 Stanford/Elsevier - Top 2% Scientists
- Elected as one of the 11th Board Members of the Chinese Cryptology and Information Security Association from 2024 to 2027, August 2024.
- Guest editor for the special issue of "Cybersecurity Issues in the Internet of Things" on Electronics (SCIE), 2024.
- Invited speaker, Advanced Cybersecurity Exploration Conference (ACE), Taipei, Taiwan, Oct. 18-19, 2023.
- Listed in 2022 Stanford/Elsevier - Top 2% Scientists
- Plenary speaker, International Conference on Electric Vehicle, Smart Grid, and Information Technology 2022 (ICESI 2022), Jeju Island, Republic of Korea, May 4-6, 2022.
- Received the 2021 Distinguished Alumni Award from the Department of Engineering Science at National Cheng Kung University in Taiwan.
- Elected as one of the 10th Board Members of the Chinese Cryptology and Information Security Association from 2021 to 2024, August 2021.
- Served as one of the Review Committee Members of the Computer Science and Information Engineering research area at the Department of Engineering and Technologies under the Ministry of Science and Technology from 2021 to 2023.
- Served as one of three supervisors of the Eden Social Welfare Foundation in Taiwan from April 2021 to March 2027.
- Guest editor for the special issue of "Trusted IoT Ecosystem" on Sensors (SCIE), 2020.
- Editor for Proceedings of the Fifth International Conference on Mathematics and Computing (ICMC 2019) published at Advances in Intelligent Systems and Computing Vol. 1170.
- 2018 NTUST Excellent Research Scholar Award winner.
- 2018 Outstanding Services Award winner of the School of Management at NTUST.
- Elected as one of the 9th Board Members of the Chinese Cryptology and Information Security Association from 2018 to 2021, May 2018.
- Program co-chair, The 28th Cryptology and Information Security Conference, Taipei, Taiwan, May 24-25, 2018.
- Keynote speaker, International Conference on Information Technology Applications and Systems 2018, Surabaya, Indonesia, Feb. 3-4, 2018.
- 2017 NTUST Outstanding Teacher Award winner.
- IEEE senior member since 2017.
- Associate Editor for Journal of Information Security and Applications, 2017~now.
- Invited speaker, International Conference on Informatics, Technology and Engineering 2017, Bali, Indonesia, August 24-25, 2017.
- General co-chair, The 10th International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, Sept. 28-30, 2016.
- Research member in Taiwan Tech Industry 4.0 Implementation Center since 2016.
- Elected as one of the 8th Board Members of the Chinese Cryptology and Information Security Association from 2015 to 2018, May, 2015.
- Program co-chair, The 2014 Workshop on RFID Security (RFIDsec’14 Asia), Hualien, Taiwan, Nov. 27-28, 2014.
- Served as one of the IT committee members for Eden Social Welfare Foundation in Taiwan since July 2014.
- Keynote speaker, Information Systems International Conference 2013 (ISICO 2013), Bali, Indonesia, Dec. 2-4, 2013.
- Guest editor for the special issue of "Innovative Applications and Security of Internet of Things" in the International Journal of Distributed Sensor Networks (SCIE), 2013.
- Guest editor for the special issue of "Internet of Things Security" on Communications of the CCISA, 2013.
- 2012 IBM Faculty Award winner.
- Program co-chair, The 2012 Workshop on RFID and IoT Security (RFIDsec’12 Asia), Taipei, Taiwan, Nov. 8-9, 2012.
- Elected as one of the members of the 7th Board of Supervisors of the Chinese Cryptology and Information Security Association for the term from 2012 to 2015, May 2012.
- Editor for International Journal of RFID Security and Cryptography, 2011~now.
- Invited speaker, Taiwan-Japan Joint Research on Cryptography and Information Technology toward Next IT-society, Kaohsiung, Taiwan, Nov. 15, 2010.
- Invited speaker, The Second International Workshop on RFID/USN Security and Cryptography, London, United Kingdom, Nov. 9, 2010.
- Invited speaker, The 2008 Workshop on RFID Security (RFIDSec 08), Budapest, Hungary, July 10, 2008.
- Invited speaker, 2007 first iCAST/CMU/TRUST Joint Conference - Crossing Boundaries: International Themes for Computer Security in Academia, Industry, & Services, Taipei, Taiwan, Jan. 8, 2007.
- Member of the Chinese Society of Information Management.
- Research member in TaiWan Information Security Center at National Taiwan University of Science and Technology (TWISC@NTUST) since 2005.
- Research member in the Center for IoT Innovation at the National Taiwan Univ. of Science and Technology since 2005.
Website
Click Num: