羅乃維 Professor

 Nai-Wei Lo

"Spiritual concentration sense to solve problems in your graduate time is the key to your success in the future."

  • Ph.D., State University of New York at Stony Brook
  • Research Interests : Applications of information security, Web services integration, RFID, Network
  • Taught Courses : Programming Language, Information Security for Web Services, IBM Mainframe
  • Office : MA 309
  • Contact : +886-2-27376778
  • Email :

Journals

  • Liang-Chun Chen, Chien-Lung Hsu, Nai-Wei Lo, Kuo-Hui Yeh and Ping-Hsien Lin, (Oct 2017), "Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks", IEICE Transactions on Information and Systems, No.10, Pages 2267-2273. (SCI)
  • Yung-Chun Chen, Nai-Wei Lo, Ren-Zong Kuo, Enrico Winata and Kuo-Hui Yeh, (Jan 2017), "A Fast Collision Arbitration Algorithm for RFID Tag Identification in Supply Chain Environment", Journal of Internet Technology, Vol.18, No.1, Pages 125-134. (SCI)
  • Nai-Wei Lo, Kuo-Hui Yeh and Chuan-Yen Fan, (Dec 2016), "Leakage-detection and Risk-assessment on Privacy for Android Applications: LRPdroid", IEEE Systems Journal, Vol.10, No.4, Pages 1361-1369. (SCI)
  • 吳佳怡、羅乃維、莊祐軒、陳世仁、許明淵, (Dec 2016), "一個支援長期檢驗電子健康記錄管理之身份識別與授權機制", 資訊安全通訊, Vol.22, No.1, Pages 73-91.
  • Jia-Lun Tsai and Nai-Wei Lo, (Jun 2016), "Provably Secure Anonymous Authentication with Batch Verification for Mobile Roaming Services", Ad Hoc Networks, Vol.44, Pages 19-31. (SCI)
  • Nai-Wei Lo and Jia-Lun Tsai, (May 2016), "An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks without Pairings", IEEE Transactions on Intelligent Transportation Systems, Vol.17, No.5, Pages 1319-1328. (SCI)
  • Ta-Chih Yang, Nai-Wei Lo, Horng-Twu Liaw and Wei Chen Wu, (Apr 2016), "A Secure Smart Card Authentication and Authorization Framework using in Multimedia Cloud", Multimedia Tools and Applications, forthcoming. (SCI)
  • Jia-Lun Tsai and Nai-Wei Lo, (Mar 2016), "Secure Anonymous Key Distribution Scheme for Smart Grid", IEEE Transactions on Smart Grid, Vol.7, No.2, Pages 906-914. (SCI)
  • Jia-Lun Tsai and Nai-Wei Lo, (Sep 2015), "A Chaotic Map-based Anonymous Multi-server Authenticated Key Agreement Protocol using Smart Card", International Journal of Communication Systems, Vol.28, No.13, Pages 1955-1963. (SCI)
  • Jia-Lun Tsai and Nai-Wei Lo, (Sep 2015), "A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services", IEEE Systems Journal, Vol.9, No.3, Pages 805-815. (SCI)
  • Jia-Lun Tsai and Nai-Wei Lo, (Jul 2015), "Secure Chaotic Maps-based Authenticated Key Agreement Protocol without Smartcard for Multi-server Environments", Security and Communication Networks, Vol.8, No.11, Pages 1971-1978. (SCI)
  • Jia-Lun Tsai and Nai-Wei Lo, (May 2015), "Secure Anonymous Key Distribution Scheme for Smart Grid", IEEE Transactions on Smart Grid. (SCI)
  • Nai-Wei Lo, Kuo-Hui Yeh and Chuan-Yen Fan, (Oct 2014), "Leakage-detection and Risk-assessment on Privacy for Android Applications: LRPdroid", IEEE Systems Journal. (SCI)
  • Chih-Ta Yen, Horng-Twu Liaw and Nai-Wei Lo, (Oct 2014), "Digital Rights Management System with User Privacy, Usage Transparency, and Superdistribution Support", International Journal of Communication Systems, Vol.27, No.10, Pages 1714-1730. (SCI)
  • Tsung-I Chuang, Wei-Ning Yang and Nai-Wei Lo, (Sep 2014), "An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard", Journal of Internet Technology, Vol.15, No.5, Pages 727-732. (SCI)
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Sep 2014), "Secure Anonymous Authentication Scheme without Verification Table for Mobile Satellite Communication Systems", International Journal of Satellite Communications and Networking, Vol.32, No.5, Pages 443-452. (SCI)
  • Yung-Chun Chen, N.W. Lo, Enrico Winata and Kuo-Hui Yeh, (Aug 2014), "A Fast Collision Arbitration Algorithm for RFID Tag Identification in Supply Chain Environment", Journal of Internet Technology. (SCI)
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Jul 2014), "Weaknesses and Improvements of an Efficient Certificateless Signature Scheme without Using Bilinear Pairings", International Journal of Communication Systems, Vol.27, No.7, Pages 1083-1090. (SCI)
  • Nai-Wei Lo and Jia-Lun Tsai, (May 2014), "A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings", Journal of Applied Mathematics, Vol.2014. (SCI)
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Dec 2013), "Efficient Proxy Signature Scheme for Mobile Devices Using Bilinear Pairings", Information Technology and Control, Vol.42, No.4, Pages 309-314. (SCI)
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Dec 2013), "Secure Handover Authentication Protocol Based on Bilinear Pairings", Wireless Personal Communications, Vol.73, No.3, Pages 1037-1047. (SCI)
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Nov 2013), "Novel Anonymous Authentication Scheme Using Smart Cards", IEEE Transactions on Industrial Informatics, Vol.9, No.4, Pages 2004-2013. (SCI)
  • Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu and Chieh Wang, (Oct 2013), "Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care", International Journal of Distributed Sensor Networks, Vol.2013. (SCI)
  • 莊祐軒、羅乃維, (Oct 2013), "物聯網安全的現況與挑戰", 資訊安全通訊, Vol.19, No.4, Pages 16-29.
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Aug 2013), "A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks", Wireless Personal Communications, Vol.71, No.3, Pages 1977-1988. (SCI)
  • Chih-Ta Yen, Ming-Huang Guo, Nai-Wei Lo and Der-Jiunn Deng, (Aug 2013), "Authentication with Low-cost RFID Tags in Mobile Networks", Security and Communication Networks, Vol.6, No.8, Pages 1021-1027. (SCI)
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Mar 2013), "ID-based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices", Ad Hoc & Sensor Wireless Networks, Vol.17, No.3, Pages 221-231. (SCI)
  • Kuo-Hui Yeh, N.W. Lo, Tien-Ruey Hsiang, Yi-Chun Wei and Hung-Yi Hsieh, (Mar 2013), "Chaos between Password-based Authentication Protocol and Dictionary Attacks", Advanced Science Letters, Vol.19, No.3, Pages 1048-1051.
  • Yi-Chung Yen, Tzong-Chen Wu, Nai-Wei Lo and Kuo-Yu Tsai, (Nov 2012), "A Fair-exchange e-Payment Protocol for Digital Products with Customer Unlinkability", KSII Transactions on Internet and Information Systems, Vol.6, No.11, Pages 2956-2979. (SCI)
  • Yi-Chung Yen, Nai-Wei Lo and Tzong-Chen Wu, (Oct 2012), "Two RFID-Based Solutions for Secure Inpatient Medication Administration", Journal of Medical Systems, Vol.36, No.5, Pages 2769-2778. (SCI)
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Jul 2012), "Secure Delegation-Based Authentication Protocol for Wireless Roaming Service", IEEE Communications Letters, Vol.16, No.7, Pages 1100-1102. (SCI)
  • Kuo-Hui Yeh, N. W. Lo, Yingjiu Li, Yung-Chun Chen and Tzong-Chen Wu, (Jul 2012), "New Findings on RFID Authentication Schemes against De-synchronization Attack", International Journal of Innovative Computing Information and Control, Vol.8, No.7, Pages 4431-4449. (EI)
  • Kuo-Hui Yeh, N.W. Lo and Enrico Winata, (Nov 2011), "An Efficient Ultralightweight Mutual Authentication Scheme for RFID Systems: Airy Protocol", Journal of Internet Technology, Vol.12, No.6, Pages 887-898. (SCI)
  • Nai-Wei Lo and Kuo-Hui Yeh, (Oct 2011), "A Simple Three-party Password Authenticated Key Exchange Protocol", Journal of Shanghai Jiaotong University (Science), Vol.16, No.5, Pages 600-603. (EI)
  • Yung-Chun Chen, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li and Enrico Winata, (Aug 2011), "Adaptive Collision Resolution for Efficient RFID Tag Identification", EURASIP Journal on Wireless Communications and Networking. (SCI)
  • Kuo-Hui Yeh, Nai-Wei Lo and Yingjiu Li, (Jul 2011), "Cryptanalysis of Hsiang-Shih's Authentication Scheme for Multi-server Architecture", International Journal of Communication Systems, Vol.24, No.7, Pages 829-836. (SCI)
  • Kuo-Hui Yeh, Nai-Wei Lo and Enrico Winata, (Mar 2011), "CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems", Journal of Information Science and Engineering, Vol.27, No.2, Pages 777-788. (SCI)
  • Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li and Yi-Xiang Hung, (Dec 2010), "Two Robust Remote User Authentication Protocols using Smart Cards", Journal of Systems and Software, Vol.83, No.12, Pages 2556-2565. (SCI)
  • Nai-Wei Lo and Kuo-Hui Yeh, (Sep 2010), "Mutual RFID Authentication Scheme for Resource-constrained Tags", Journal of Information Science and Engineering, Vol.26, No.5, Pages 1875-1889. (SCI)
  • Kuo-Hui Yeh and Nai Wei Lo, (Aug 2010), "A Novel Remote User Authentication Scheme for Multi-server Environment without Using Smart Cards", International Journal of Innovative Computing, Information & Control, Vol.6, No.8, Pages 3467-3478. (EI)
  • Nai Wei Lo and Kuo-Hui Yeh, (Jul 2010), "A Novel Authentication Scheme for Mobile Commerce Transactions", International Journal of Innovative Computing, Information & Control, Vol.6, No.7, Pages 3093-3103. (EI)
  • Nai-Wei Lo and Kuo-Hui Yeh, (Jul 2010), "Anonymous Coexistence Proofs for RFID Tags", Journal of Information Science and Engineering, Vol.26, No.4, Pages 1213-1230. (SCI)
  • N. W. Lo and Kuo-Hui Yeh, (Jun 2010), "A Practical Three-Party Authenticated Key Exchange Protocol", International Journal of Innovative Computing, Information & Control, Vol.6, No.6, Pages 2469-2483. (EI)
  • Kuo-Hui Yeh and N. W. Lo, (Jun 2010), "Improvement of Two Lightweight RFID Authentication Protocols", Information Assurance and Security Letters, Vol.1, Pages 6-11.
  • Kuo-Hui Yeh, N. W. Lo and Enrico Winata, (Jun 2010), "Cryptanalysis of an Efficient Remote User Authentication Scheme with Smart Cards", International Journal of Innovative Computing, Information & Control, Vol.6, No.6, Pages 2595-2608. (EI)
  • Nai-Wei Lo and Hsiao-Chien Tsai, (Sep 2009), "A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks", EURASIP Journal on Wireless Communications and Networking, Vol.2009. (SCI)
  • Hsiao-Chien Tsai, Nai-Wei Lo and Tzong-Chen Wu, (May 2009), "A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks", IEICE Trans. Inf. & Syst., Vol.92, No.5, Pages 777-786. (SCI)
  • N. W. Lo and Kuo-Hui Yeh, (Mar 2009), "Cryptanalysis of Two Three-party Encrypted Key Exchange Protocols", Computer Standards & Interfaces, Vol.31, Pages 1167-1174. (SCI)
  • N.W. Lo, Kuo-Hui Yeh and Chan Yeob Yeun, (Aug 2008), "New Mutual Agreement Protocol to Secure Mobile RFID-enabled Devices", Information Security Technical Report, Vol.13, No.3, Pages 151-157. (EI)
  • 羅乃維、鍾順麒、蕭穎聰, (Sep 2005), "格網環境下的醫療影像處理效能運算分析", 中華民國資訊學會季刊通訊, Vol.8, No.3, Pages 127-144.
  • N.W. Lo, Bradley S. Carlson, and D.L. Tao, (Dec 1997), "Fault Tolerant Algorithms for Broadcasting on the Star Graph Network", IEEE Transactions on Computers, Vol.46, No.12, Pages 1357-1362. (SCI)

Conferences

  • Kuo-Yang Wu, Yo-Hsuan Chuang, Tzong-Chen Wu and Nai-Wei Lo, (Sep 2017), "A Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Network", Proceedings of the 5th International Conference on Soft Computing, Intelligent System and Information Technology (ICSIIT 2017).
  • Kuo-Hui Yeh, Nai-Wei Lo and Chun-Kai Wang, (Aug 2017), "A NFC-based Authentication Scheme for Personalized IPTV Services", Proceedings of the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2017).
  • Nai-Wei Lo, Chia-Yi Wu, and Yo-Hsuan Chuang, (Dec 2016), "An Authentication and Authorization Mechanism for Long-term Electronic Health Records Management", Proceedings of the 8th International Conference on Advances in Information Technology (IAIT 2016). (EI).
  • Nai-Wei Lo, Kuo-Hui Yeh, Raylin Tso, Kuo-Yu Tsai, Bor-Shiun Lin, Tzu-Yin Chang and Chih-Hao Liu, (Nov 2016), "Real-time Public Sentiments Analysis and Information Integration Platform for Disaster Prevention and Victims of Disaster Rescue based on Social Networks", Proceedings of the 15th Global Spatial Data Infrastructure Conference (GSDI 15).
  • Alexander Yohan, Nai-Wei Lo, and Henry Roes Lie, (Sep 2016), "Dynamic Multi-factor Authentication for Smartphone", Proceedings of the 27th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2016). (EI).
  • Nai-Wei Lo, Shau-Kang Lu, and Yo-Hsuan Chuang, (Aug 2016), "A Framework for Third Party Android Marketplaces to Identify Repackaged Apps", Proceedings of the 14th IEEE International Conference on Pervasive Intelligence and Computing (PICom 2016). (EI).
  • Alexander Yohan, Nai-Wei Lo, Vincentius Randy, Shih-Jen Chen, and MingYuan Hsu, (Jan 2016), "A Novel Authentication Protocol for Micropayment with Wearable Devices", Proceedings of the 10th ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2016). (EI).
  • Nai-Wei Lo, Yu-Chen Cheng, Tzong-Chen Wu, Shih-Jen Chen, and Ming-Yuan Hsu, (Dec 2015), "Security Analysis on Yu et al.’s Group Certificate Digital Signature Scheme for EMR Authentication Process", Proceedings of the 3rd International Conference on Advances in Intelligent Systems in Bioinformatics, Chem-Informatics, Business Intelligence, Social Media and Cybernetics 2015 (Intelisys 2015)..
  • Kuo-Hui Yeh, Nai-Wei Lo, Lin-Chih Chen, and Ping-Hsien Lin, (Oct 2015), "A Fraud Detection System for Real-time Messaging Communication on Android Facebook Messenger", Proceedings of the 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE 2015). (EI).
  • Nai-Wei Lo and Cheng Tsung Liu, (Sep 2015), "An Accountable Identity-based Billing Protocol for Cloud Environment", Proceedings of the Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2015).
  • Nai-Wei Lo, Che-Wei Chuang and Tzong-Chen Wu, (Jul 2015), "A Secure Group Data Access Protocol with Provable Data Possession for Cloud Environment", Proceedings of the Fourth International Conference on Informatics & Applications (ICIA2015).
  • Nai-Wei Lo, Meng-Chih Chiang and Chao Yang Hsu, (May 2015), "Hash-based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks", Proceedings of 2015 10th Asia Joint Conference on Information Security (AsiaJCIS 2015).
  • Nai-Wei Lo, Chi-Kai Yu and Chao Yang Hsu, (May 2015), "Intelligent Display Autolock Scheme for Mobile Devices", Proceedings of 2015 10th Asia Joint Conference on Information Security (AsiaJCIS 2015).
  • Nai-Wei Lo, Pei-Chi Fan and Tzong-Chen Wu, (May 2015), "An Efficient Virtual Machine Provisioning Mechanism for Cloud Data Center", Proceedings of 2014 IEEE Workshop on Electronics, Computer and Applications (IWECA 2014).
  • Kuo-Hui Yeh, Nai-Wei Lo and Chuan-Yen Fan, (Oct 2014), "An Analysis Framework for Information Loss and Privacy Leakage on Android Applications", Proceedings of 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE 2014).
  • Nai-Wei Lo and Alexander Yohan, (Sep 2014), "Danger Theory-based Privacy Protection Model for Social Networks", Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (FedCSIS 2014).
  • Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chao Cha, Nai-Wei Lo, Gary Chung and Chun-Kun Liu, (Jan 2014), "Motivations, Deployment, and Assessment of Taiwan’s e-Invoicing System: An Overview", Proceedings of 2014 47th Hawaii International Conference on System Sciences (HICSS-47).
  • Nai-Wei Lo and Ya-Hsiang Chen, (Dec 2013), "Web Services Selection Framework with Negotiation Capability", Proceedings of 2013 National Computer Symposium (NCS 2013).
  • Nai-Wei Lo and Hsin-Lin Chiu, (Dec 2013), "Are Selfish Nodes in MANET a Real Security Threat?", Proceedings of 2013 National Computer Symposium (NCS 2013).
  • Nai-Wei Lo and Hsin-Hsiang Huang, (Sep 2013), "Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks", Proceedings of the Second Cross-Straits Conference on Information Security (CSCIS 2013).
  • Kuo-Hui Yeh, Nai-Wei Lo, Shih-Chao Cha, Chun-Kun Liu and Sheng-Hsiang Hsu, (Sep 2013), "A Novel Consumer-oriented e-Invoicing System in Taiwan", Proceedings of International Conference on Internet Studies (NETs2013).
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Jul 2013), "New Identity-based Sequential Aggregate Signature Scheme from RSA", 2013 International Symposium on Biometrics and Security Technologies (ISBAST 2013).
  • Nai-Wei Lo and Pei-Hwa Wu, (Jun 2013), "A Cloaking Algorithm to Support Privacy-aware Location-based Services based on Road Networks", The 7th International Conference on New Trends in Information Science and Service Science (NISS 2013).
  • Kuo-Hui Yeh, Kuo-Yu Tsai, Chung-Fu Lu and Nai-Wei Lo, (May 2013), "Scalable and Anonymous Authentication Scheme", The 23rd Cryptology and Information Security Conference (CISC 2013).
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Apr 2013), "Novel Convertible Multi-authenticated Encryption Scheme for Group Communications", The 8th International Conference on Intelligent Information Processing (ICIIP 2013).
  • 楊大治、羅乃維、廖鴻圖、李皓倫、許景濬, (Oct 2012), "應用於雲端服務之智慧卡安全認證機制", 台灣網際網路研討會議論文集(TANET 2012).
  • Kuo-Hui Yeh, N.W. Lo and Chieh Wang, (Sep 2012), "A Patient Privacy-aware e-Health System based on Passive RFID", The 9th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2012).
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, (Aug 2012), "Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment", The 6th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID 2012).
  • Nai-Wei Lo, Kuo-Hui Yeh and Pei-Yun Liu, (Aug 2012), "An Efficient Resource Allocation Scheme for Cross-Cloud Federation", The 6th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID 2012).
  • Kuo-Hui Yeh, N.W. Lo and Chieh Wang, (Aug 2012), "Coexistence Proof on Passive RFID for Medication Error Elimination", International Conference on Internet Studies (NETs2012).
  • Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Ta-Chi Yang and Horng-Twu Liaw,, (Aug 2012), "Analysis of an eHealth Care System with Smart Card based Authentication", The 7th Asia Joint Conference on Information Security (AsiaJCIS 2012).
  • Nai-Wei Lo, Kuo-Hui Yeh, and Hsuan-Yu Chen, (Jul 2012), "Analysis against Secret Redundancy Mechanism for RFID Authentication Protocol", IEEE International Conference on Communications, Network and Satellite (COMNETSAT 2012).
  • Nai-Wei Lo, Kuo-Hui Yeh, and Hsuan-Yu Chen, (May 2012), "De-synchronization Attack Model for Ultra-lightweight RFID Authentication Protocols", The 22nd Cryptology and Information Security Conference (CISC 2012).
  • 羅乃維、盧宣良, (May 2012), "電子郵件社交工程演練之自動化教育訓練系統", 第22屆資訊安全會議論文集 (CISC 2012).
  • Ta-Chi Yang, Nai-Wei Lo and Horng-Twu Liaw, (May 2012), "An Enhanced RBAC Mechanism for Multi-Tenancy Cloud Environment", The 1st International Workshop on Advanced Information Technology and Applications (IWAITA 2012).
  • Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu, (Mar 2012), "Efficient Convertible Multi-Authenticated Encryption Scheme for Group Communications", 2012 International Symposium on Biometrics and Security Technologies (ISBAST 2012).
  • Nai-Wei Lo, Shiou-Huei Ruan and Tzong-Chen Wu, (Dec 2011), "Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators", The 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011).
  • Kuo-Hui Yeh, Yung-Chun Chen, Nai-Wei Lo and Chia-Chun Lin, (May 2011), "An Efficient Anti-collision Protocol for RFID-based Supply Chain Networks", International Conference on Networking, VLSI and Signal Processing (ICNVSP 2011).
  • 羅乃維、蔡効謙、黃昶銘、盧宣良、阮綉惠, (May 2011), "聯合服務架構的隱私協商機制之設計與雛形實作–以OpenID為例", 第21屆資訊安全會議論文集(CISC 2011).
  • Yan-Chen Liu, Hung-Yu Chen, Yu-Chang Chen, Chu-Sing Yang and Nai-Wei Lo, (Apr 2011), "Integrated EPC Information Service Authentication using OpenID in Cross Domains", 2011 Workshop on RFID Security (RFIDsec' 11 Asia).
  • Chih-Ta Yen, Hrong-Twu Laiw, Nai-Wei Lo, Ting-Chun Liu and Jay Stu, (Nov 2010), "Transparent Digital Rights Management System with Superdistribution", 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (the First International Workshop on Cloud, Wireless and e-Commerce Security).
  • N. W. Lo and Kuo-Hui Yeh, (Oct 2010), "De-synchronization Attack on RFID Authentication Protocols", 2010 International Symposium on Information Theory and its Applications (ISITA 2010).
  • Kuo-Hui Yeh, N. W. Lo and Tzong-Chen Wu, (Aug 2010), "Formal Analysis on RFID Authentication Availability", The 5th Joint Workshop on Information Security (JWIS 2010).
  • Nai-Wei Lo, I-Fan Wang and Yo-Hsuan Chuang, (Nov 2014), "RFID Multi-Ownership Transfer Protocol in VMI Environments", Radio Frequency Identification System Security (Cryptology and Information Security Series, Vol. 12), pp. 51-66, edited by Nai-Wei Lo, Yingjiu Li and Kuo-Hui Yeh, published by IOS Press.
  • Kuo-Hui Yeh, Nai-Wei Lo and Siao-Mei Chen, (May 2014), "Grouping Proof Protocols Based on Low-cost RFID Tags", Chapter 8, Radio-Frequency Identification (RFID)-Emerging Technologies, Applications and Improvement Strategies, pp. 187-213, edited by Xinxin Fan, published by Nova Science Publishers.
  • Nai-Wei Lo and Fang-Ling Liu, (May 2013), "A Secure Routing Protocol to Prevent Co-operative Black Hole Attack in MANET", Lecture Notes in Electrical Engineering Vol. 234, pp. 59-65.
  • Nai-Wei Lo, Kuo-Hui Yeh and Hsuan-Yu Chen, (Nov 2012), "Cryptanalyses of Two Ultralightweight RFID Authentication Protocols", Radio Frequency Identification System Security (Cryptology and Information Security Series, Vol. 8), pp. 85-93, edited by Nai-Wei Lo and Yingjiu Li, published by IOS Press.
  • 羅乃維, (Jun 2011), "行動裝置應用程式設計,第四章:基於地理位置資訊之車用行動商務程式開發,75-93頁", 賴源正、黃崇明編審,東華書局出版.
  • Yan-Chen Liu, Hung-Yu Chen, Yu-Chang Chen, Chu-Sing Yang and Nai-Wei Lo, (Apr 2011), "Integrated EPC Information Service Authentication using OpenID in Cross Domains", Radio Frequency Identification System Security (Cryptology and Information Security Series, Vol. 6), pp. 144-153, edited by Tieyan Li, Chao-Hsien Chu, Ping Wang and Guilin Wang, published by IOS Press.
  • Nai-Wei Lo and Kuo-Hui Yeh, (Mar 2010), "An Efficient Cut-through Mechanism for Tree-based RFID Tag Identification Schemes", Chapter 14, Advanced Radio Frequency Identification Design and Applications, pp. 259-268, edited by Stevan Preradović, published by InTech, Rijeka, Croatia.
  • Kuo-Hui Yeh, Nai-Wei Lo and Enrico Winata, (Feb 2010), "An Efficient Ultralightweight Authentication Protocol for RFID Systems", Radio Frequency Identification System Security (Cryptology and Information Security Series, Vol. 4), pp. 49-60, edited by Yingjiu Li and Jianying Zhou, published by IOS Press.
  • Nai-Wei Lo, Tzu-Li Yang and Kuo-Hui Yeh, (Feb 2009), "A Secure Mutual Authentication Protocol for Low-cost RFID System", in the book Development and Implementation of RFID Technology, edited by Cristina Turcu, published by I-Tech Education and Publishing KG, Vienna, Austria.
  • Nai-Wei Lo and Hsiao-Yi Kuo, (Nov 2008), "Two-Hops Neighbor-Aware Routing Protocol in Mobile Ad Hoc Networks", Lecture Notes in Computer Science Vol. 5200, pp.761-770.
  • Nai-Wei Lo and Kuo-Hui Yeh, (Dec 2007), "An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System", Lecture Notes in Computer Science Vol. 4809, pp.43-56.
  • Nai-Wei Lo and Kuo-Hui Yeh, (Sep 2007), "Novel RFID Authentication Schemes for Security Enhancement and System Efficiency", Lecture Notes in Computer Science Vol. 4721, pp.203-212.

National Science Council

  • 計畫共同主持人,執行研究案「 既有舊系統之異質製造平台架構技術開發與網實系統升級應用驗證(2/3)」。(2017/10/01 ~ 2018/09/30)
  • 主持人,執行研究案「以物聯網技術為基礎之端對端系統安全架構-以物聯網技術為基礎之端 對端系統安全架構(1/3)」。(2017/06/01 ~ 2018/05/31)
  • 計畫共同主持人,執行研究案「新世代資通安全技術與檢測服務之研發(2/4)」。(2016/10/01 ~ 2017/09/30)
  • 計畫共同主持人,執行研究案「既有舊系統之異質製造平台架構技術開發與網實系統升級應用驗證(1/3)」。(2016/10/01 ~ 2017/09/30)
  • 子計畫一主持人,執行研究案「oT可信賴架構之設計與實作-總計畫暨子計畫一:使用者物聯網裝置啟 動之使用者鑑別協定與控管機制」。(2016/08/01 ~ 2019/07/31)
  • 子計畫四主持人,執行研究案「IoT可信賴架構之設計與實作-子計畫四:物聯網裝置與室內閘道器之感 測層鑑別與安全通訊技術」。(2016/08/01 ~ 2019/07/31)
  • 計畫共同主持人,執行研究案「 新世代資通安全技術與檢測服務之研發(1/4) 」。(2015/10/01 ~ 2016/09/30)
  • 主持人,執行研究案「基於社群網路之即時輿情分析與資訊整合防災救援平台-基於社群網路 之即時輿情分析與資訊整合防災救援平台」。(2015/09/01 ~ 2016/08/31)
  • 計畫共同主持人,執行研究案「刑事資料之巨量資料處理與資料公開在犯罪防範之應用研究-刑事資料 之巨量資料處理與資料公開在犯罪防範之應用研究」。(2015/04/01 ~ 2015/09/30)
  • 計畫共同主持人,執行研究案「可信賴的App安全應用框架-App應用服務可移轉性驗證」。(2014/08/01 ~ 2016/07/31)
  • 主持人,執行研究案「 可信賴的App安全應用框架-行動應用程式重新包裝安全威脅與權限洩漏 風險之防護研究」。(2014/08/01 ~ 2016/07/31)
  • 子計畫四主持人,執行研究案「可信賴的App安全應用框架-子計畫四:App程式碼及多個App間資料交換的完整性保之研究」。(2013/08/01 ~ 2014/07/31)
  • 子計畫四主持人,執行研究案「適用於 NFC 應用環境之聯合安全服務平台-子計畫四:使用者隱私協商機制」。(2012/08/01 ~ 2013/07/31)
  • 計畫主持人,執行研究案「為雲端服務而設計之智慧終端應用安全套件」。(2012/05/01 ~ 2013/04/30)
  • 計畫共同主持人,執行研究案「軟硬體應用安全檢測平台建置計畫」。(2010/01/01 ~ 2012/02/29)
  • 計畫主持人,執行研究案「具隱私協商與風險管理之聯合服務架構-子計畫三:個人隱私協商模組」。(2009/10/01 ~ 2010/07/31)
  • 計畫主持人,執行研究案「於智慧型手機中應用QR碼及GPS之高效能旅遊導航系統-具高安全性且支援導航路徑之智慧型加值服務平台」。(2008/10/01 ~ 2009/07/31)
  • 計畫共同主持人,執行研究案「資通安全跨國合作人才培育與關鍵技術研發-分項子計畫二:RFID應用之安全與隱私保護技術之研究」。(2006/04/01 ~ 2007/06/30)
  • 計畫參與人,執行研究案「智慧型校園生活環境研擬與建置子計畫六-普及資訊擷取架構」。(2005/11/01 ~ 2008/10/31)
  • 計畫主持人,執行研究案「在不同網路規模之下,二維Torus 互聯網路的容錯傳播之研究」。(2003/08/01 ~ 2004/07/31)

Others

  • 主持人,執行研究案「行動裝置+物連網之創新應用」。(2017/07/01 ~ 2018/06/30)
  • 主持人,執行研究案「物聯網2.0智慧應用服務平台」。(2016/11/01 ~ 2017/08/31)
  • 主持人,執行研究案「智慧校園系統」。(2016/06/01 ~ 2017/12/31)
  • 協同主持人,執行研究案「4G網路UE模糊測試自動化分析研究」。(2015/09/01 ~ 2016/03/15)
  • 協同主持人,執行研究案「104年度資安菁英人才培育先導計畫」。(2015/03/01 ~ 2016/02/29)
  • 主持人,執行研究案「物聯網智慧感測裝置之使用者客製化服務平台」。(2015/01/01 ~ 2015/08/31)
  • 協同主持人,執行研究案「UE設備安全能力分析技術先期研究」。(2014/09/30 ~ 2015/03/15)
  • 主持人,執行研究案「支付應用系統安全產學合作及技術授權」。(2014/09/01 ~ 2015/02/28)
  • 計畫協同主持人,執行研究案「智慧系統服務產業應用機會與人才培育機制研究」。(2012/07/01 ~ 2012/12/10)
  • 計畫主持人,執行研究案「互動式行銷決策整合系統」。(2012/06/15 ~ 2012/10/14)
  • 計畫協同主持人,執行研究案「二代健保網路服務及整體網路安全之評估」。(2012/05/17 ~ 2012/11/30)
  • 總計畫主持人,執行研究案「二代電子發票精進研究計畫」。(2012/01/01 ~ 2013/12/31)
  • 計畫主持人,執行研究案「行動數位版權傳遞技術研究」。(2010/04/02 ~ 2010/12/31)
  • 計畫主持人,執行研究案「經濟部技術處之學界協助中小企業科技關懷計畫-新世代視覺化商業戰情設計行動平台開發」。(2009/11/01 ~ 2010/04/30)
  • 課程編撰主持人暨授課人,執行研究案「教育部RFID科技及應用人才培育先導型計畫-RFID教育暨研發實驗資源中心」。(2007/07/01 ~ 2008/06/30)
  • 計畫主持人,執行研究案「合成化模擬戰場環境參數資料庫架構之分析、規劃與建置」。(2007/07/01 ~ 2008/02/29)
  • 子計畫一主持人,執行研究案「網路服務技術與商業應用整合研究-子計畫一:智慧型網路服務挑選與評估」。(2006/01/01 ~ 2009/03/31)
  • 子計畫一主持人,執行研究案「網路服務技術與商業應用整合研究子計畫一:智慧型網路服務挑選與評估」。(2006/01/01 ~ 2008/12/31)
  • 授課人,執行研究案「教育部顧問室94會計年度大專校院資訊人才培育先導型計畫-軟體工程課程推廣計畫」。(2005/03/01 ~ 2006/01/01)
  • 課程編撰人,執行研究案「教育部顧問室大專校院人才培育計畫:軟體工程聯盟發展計畫-分項子計畫:軟體專案管理課程編撰」。(2004/04/01 ~ 2005/12/31)
  • 1. 查士朝、吳宗成、羅乃維,「提供近場通訊裝置安全連線的系統及其方法」,中華民國專利第I434529號,公告日:2014/04/11。
  • 羅乃維、陳首宏,「網路遊戲管理方法及應用其之網路遊戲管理裝置」,中華民國專利第I336631號,公告日:2011/02/01。
  • Invited speaker, International Conference on Informatics, Technology and Engineering 2017, Bali, Indonesia, Aug. 24-25, 2017.
  • General co-chair, The 10th International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, Sept. 28-30, 2016.
  • Elected as one of members in the 8th Board of Chinese Cryptology and Information Security Association for the term from 2015 to 2018, May, 2015.
  • Program co-chair, The 2014 Workshop on RFID Security (RFIDsec’14 Asia), Hualien, Taiwan, Nov. 27-28, 2014.
  • Served as one of IT committee members for Eden Social Welfare Foundation in Taiwan since July, 2014.
  • Guest editor for special issue of "Innovative Applications and Security of Internet of Things" on International Journal of Distributed Sensor Networks (SCIE), 2013.
  • Guest editor for special issue of "Internet of Things Security" on Communications of the CCISA, 2013.
  • 2012 IBM Faculty Award Winner.
  • Program co-chair, The 2012 Workshop on RFID and IoT Security (RFIDsec’12 Asia), Taipei, Taiwan, Nov. 8-9, 2012.
  • Elected as one of the five supervisors in Chinese Cryptology and Information Security Association, May, 2012.
  • Guest editor for International Journal of RFID Security and Cryptography (ISSN 2046-3715 Online), 2011~2012.
  • Invited speaker, Taiwan-Japan Joint Research on Cryptography and Information Technology toward Next IT-society, Kaohsiung, Taiwan, Nov. 15, 2010.
  • Invited speaker, The Second International Workshop on RFID/USN Security and Cryptography, London, United Kingdom, Nov. 9, 2010.
  • Invited speaker, The 2008 Workshop on RFID Security (RFIDSec 08), Budapest, Hungary, July 10, 2008.
  • Invited speaker, 2007 first iCAST/CMU/TRUST Joint Conference - Crossing Boundaries: International Themes for Computer Security in Academia, Industry, & Services, Taipei, Taiwan, Jan. 8, 2007.
  • IEEE member since 1994.
  • Member of Chinese Society of Information Management.
  • Research member in TaiWan Information Security Center (TWISC).
  • Research member in RFID resources center of National Taiwan Univ. of Science and Technology.
  • 指導學生廖建銘、吳妮易參加『第19屆資訊應用服務創新競賽』獲得資訊技術應用組第一名與政府開放資料加值應用組第一名
  • 指導學生范雋彥、劉政宗參加『第18屆資訊應用服務創新競賽』獲得網路人氣獎第一名與電子發票創新應用組第二名
  • 指導學生劉佩芸、王婕、邱心伶參加『2011 IBM 2011大型主機校園競賽』於前20名完成第二階段實作並獲得獎項
  • 指導學生參加「2008 台灣安全產品精安獎創意設計競賽」,榮獲第三名智多星獎。
  • 指導之博士生葉國暉、碩士生林董原以「簡報光筆」獲得第三屆國立台灣科技大學創意發明競賽佳作獎,並將申請國家專利。(2007/11~2007/12)
  • 指導台科大資管系學生實務專題「i-Space空間管理系統」,榮獲資管系優等獎。(2005/3)
  • 率台科大資管系大四學生組隊參加中華電信舉辦之2004電信加值軟體大賽行動網路組比賽,榮獲佳作獎。(2004/10/11)