著作管理系統
發表年月: 年 到
匯出:Excel格式



期刊論文
  1. Yang, M. H.; Chen, C. H.; Luo, J. N.; Vijayalakshmi, M.; Shalinie, S. M , “An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile Readers” , 2023 , IEEE Systems Journal , p.1-12. (SCI期刊)
  2. P Tyagi ; S Kumari ; BA Alzahrani ; A Gupta ; Ming-Hour Yang , “An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT” , 2022 , Sensors , vol.22 , p.1-23. (SCI期刊)
  3. Ming-Hour Yang; Yu-Shan Hsu; Hung-Yu Ko , “Dispute Resistance Multilayered RFID Partial Ownership Transfer With Blockchain” , 2022 , IEEE Access , vol.10 , p.1-17. (SCI期刊)
  4. Ming-Hour Yang, Jia-Ning Luo, M. Vijayalakshmi, S. Mercy Shalinie , “Contactless Credit Cards Payment Fraud Protection by Ambient Authentication” , 2022 , Sensors , vol.22 , p.1-22. (SCI期刊)
  5. M. Vijayalakshmi, S. Mercy Shalinie, Ming Hour Yang, Shou-Chuan Lai, Jia-Ning Luo , “ A Blockchain-based Secure radio frequency identification ownership transfer protocol” , 2022 , Security and Communication Networks , vol.2022 , p.1-12.
  6. Shin-Jia Ho, Yu-Shan Hsu, Chien-Hung Lai, Fong-Han Chen, Ming-Hour Yang , “Applying Game-Based Experiential Learning to Comprehensive Sustainable Development-Based Education” , 2022 , Sustainability , vol.14 , p.1-20.
  7. Luo, Jia-Ning, Chang-Ming Wu, Ming-Hour Yang , “A CAN-Bus Lightweight Authentication Scheme” , 2021 , Sensors , vol.21 , p.1-28. (SCI期刊)
  8. A. K. Biswal, D. Singh, B. K. Pattanayak, D. Samanta, M.-H. Yang , “IOT-based Smart Alert System for Drowsy Driver Detection” , 2021 , Wireless Communications and Mobile Computing , p.1-13. (SCI期刊)
  9. Vankamamidi S. Naresh, SivaranjaniReddi, Saru Kumari, V V L Divakar Allavarpu, Sachin Kumar, Ming-Hour Yang , “Practical Identity based online/off-line signcryption scheme for secure communication in Internet of Things” , 2021 , IEEE Access , vol. Vol.9 , p.21267-21278. (SCI期刊)
  10. Ming-Hour Yang, Jia-Ning Luo, Vijayalakshmi M, Mercy Shalinie S , “Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices” , 2020 , IEEE Access , vol. Vol.8 , p.201087-201097. (SCI期刊)
  11. M. Vijayalakshmi,S Mercy Shalinie,Ming Hour Yang,Rajameenakshmi U , “WEB phishing detection techniques a survey on the state-of-the-art, taxonomy and future directions” , 2020 , IET Networks , vol. Vol.9 , p.139244-139254. (EI期刊)
  12. Chaudhry, S. A., Yahya, K., Al-Turjman, F., M.-H. Yang , “A secure and reliable device access control scheme for IoT based sensor cloud systems” , 2020 , IEEE Access , vol. Vol.8 , p.139244-139254. (SCI期刊)
  13. 50. S. Ahmed, S. Kumari, M. A. Saleem, K. Agarwal, K. Mahmood, M.-H. Yang , “ Anonymous Key-Agreement Protocol for V2G Environment within Social internet of Vehicles” , 2020 , IEEE Access , vol. Vol.8 , p.119829-119839. (SCI期刊)
  14. J.-N. Luo, M.-H. Yang , “A Secure Partial Ownership Transfer Protocol with Multi-Owners” , 2020 , Sensors , vol.20 , p.1-18. (SCI期刊)
  15. J.-N. Luo, M.-H. Yang , “An e-cash Scheme with Multiple Denominations and Transferability” , 2019 , Journal of Internet Technology , vol.20 , p.2285-2296. (SCI期刊)
  16. J.-N. Luo, M.-H. Yang , “EMV-compatible offline mobile payment protocol with mutual authentication” , 2019 , Sensors , vol.19 , p.1-19. (SCI期刊)
  17. J.-N. Luo, M.-H. Yang, K-Y Tsai , “A geographic map-based middleware framework to obfuscate smart vehicles' locations” , 2019 , Multimedia Tools and Applications , vol.78 , p.28877-28902. (SCI期刊)
  18. J.-N. Luo, M.-H. Yang , “An Improved Single Packet Traceback Scheme for IoT Devices” , 2019 , Journal of Internet Technology , vol.20 , p.887-901. (SCI期刊)
  19. Kuo-Yu Tsai, Ming Hour Yang, Jia Ning Luo, Wei-Tim Liew , “Novel Designated Ownership Transfer with Grouping Proof” , 2019 , Applied Sciences , vol.9 , p.0-0. (SCI期刊)
  20. J.-N. Luo, M.-H. Tsai, N.-W. Lo, C.-Y. Kao, M.-H. Yang , “Ambient Audio Authentication,” , 2019 , Mathematical Biosciences and Engineering , vol.16 , p.6562-6586. (SCI期刊)
  21. 羅嘉寧, 楊明豪, 劉邦良 , “以室內定位技術之犯罪嫌疑人移動足跡分析與鑑識” , 2018 , Journal of Information, Technology and Society , vol.18 , p.42-64.
  22. M. Vijayalakshmi, M. Shalinie, M.-H. Yang , “HPSIPT: A High-Precision Single-Packet IP Traceback Scheme” , 2018 , Computer Networks , vol.143 , p.275-288. (SCI期刊)
  23. J.-N. Luo, M.-H. Yang , “An Anti-Shoulder-surfing Authentication Scheme of Mobile Device” , 2018 , Journal of Internet Technology , vol.9 , p.1263-1272. (EI期刊)(SCI期刊)
  24. M. Vijayalakshmi, S. Shalinie, M.-H. Yang , “Design and Analysis of Hybrid Single Packet IP Traceback Scheme” , 2018 , IET Networks , vol.7 , p.141-151. (EI期刊)
  25. J.-N. Luo, M.-H. Yang , “An offline transferable and divisible M-coupon scheme” , 2017 , Journal of Chung Cheng Institute of Technology , p.54-64. (EI期刊)
  26. J.-N. Luo, M.-H. Yang , “Unchained Cellular obfuscation areas for Location Privacy in Continuous Location–based Service Queries” , 2017 , Wireless Communications and Mobile Computing , vol.2017 , p.0-0. (SCI期刊)
  27. J.-N. Luo, M.-H. Yang , “A Mobile Authentication System Resists to Shoulder-surfing Attacks” , 2016 , Multimedia Tools and Applications , vol.75 , p.14075-14087. (SCI期刊)
  28. J.-N. Luo, M.-H. Yang , “Analysis and Improvement of Key Distribution Scheme for Secure Group Communication” , 2016 , Journal of Electrical and Computer Engineering , vol.2016 , p.1-7. (EI期刊)
  29. J.-N. Luo, M.-H. Yang, S.-Y. Huang , “An Unlinkable Anonymous Payment Scheme based on near field communication” , 2016 , Computers & Electrical Engineering , vol.49 , p.198-206. (SCI期刊)
  30. M.-H. Yang, J.-N. Luo, S.-Y. Lu , “A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme” , 2015 , Sensors , vol.15 , p.27087-27115. (SCI期刊)
  31. M.-H. Yang, J.-N. Luo , “Fast AntiNoise RFID-Aided Medical Care System” , 2015 , International Journal of Distributed Sensor Networks , vol.Vol.2015 , p.1-13. (SCI期刊)
  32. J.-N. Luo, M.-H. Yang , “An Anonymous NFC-Based Payment Protocol” , 2015 , Applied Mechanics and Materials , vol.764-765 , p.812-816. (Inspec期刊)
  33. J.-N. Luo, M.-H.Yang,Y.-C. Ho , “EMV-based mobile payment protocol for offline transaction–with the ability of mutual authentication” , 2015 , International Journal of Science and Engineering (IJSE) , vol.5 , p.61-66.
  34. M.-H. Yang , “Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet” , 2014 , Scientific World Journal , p.1-11.
  35. 羅嘉寧, 楊明豪 , “基植於NFC系統之匿名行動付款協定” , 2014 , Journal of Information, Technology and Society , vol.14 , p.17-32.
  36. J.-N. Luo, M.-H. Yang , “An Anonymous e-Rental Protocol Based On ID-based Cryptography and NFC” , 2014 , Journal of Supercomputing , p.31-53. (SCI期刊)
  37. J.-N. Luo, M.-H. Yang , “An Efficient Offline Delegation Protocol in Mobile RFID Environment” , 2014 , International Journal of Networks , vol.9 , p.1114-1120. (EI期刊)
  38. M.-H. Yang , “Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy” , 2014 , Scientific World Journal , p.1-12. (SCI期刊)
  39. Jia Ning Luo, Ming Hour Yang , “Multi-level Offline Delegation Transfer in Mobile RFID Networks” , 2014 , 中正嶺學報JCCIT , p.41-50. (EI期刊)
  40. M.-H. Yang , “Security Enhanced EMV-Based Mobile Payment Protocol” , 2014 , The Scientific World Journal , p.1-19. (SCI期刊)
  41. M.-H. Yang , “Cross Authority Ownership Transfer Protocol Using Mobile RFID” , 2013 , International Journal of Digital Content Technology and its Applications , vol.7 , p.265-283. (EI期刊)
  42. M. -H. Yang, Kai-Ping Xie , “TTP-Based Group Ownership Transfer in a Mobile RFID Environment” , 2013 , International Journal of Digital Content Technology and its Applications (JDCTA) , vol.7 , p.51-69. (EI期刊)
  43. M.-H. Yang , “Secure Multiple Group Ownership Transfer Protocol for Mobile RFID” , 2012 , Electronic Commerce Research and Applications (ECRA) , vol.11 , p.361-373. (SSCI期刊)(SCI期刊)
  44. Ming Hour Yang; M.-C Yang , “RIHT: A Novel Hybrid IP Traceback Scheme” , 2012 , IEEE Transactions on Information Forensics and Security , vol.7 , p.789-797. (SCI期刊)
  45. J.-N. Luo, M.-H. Yang , “Mobile RFID Mutual Authentication and Ownership Transfer” , 2012 , International Journal of Advancements in Computing Technology (IJACT) , vol.4 , p.28-40. (EI期刊)
  46. Ming Hour Yang;H.-Y. Hu , “Protocol for Ownership Transfer Across Authorities- with the ability to assign transfer target” , 2012 , Security and Communication Networks , vol.5 , p.164-177. (SCI期刊)
  47. Ming Hour Yang , “Security Analysis of Application Layer Protocols on WLAN” , 2011 , Journal of Shanghai Jiaotong University (Science) , vol.16 , p.586-592. (EI期刊)
  48. Ming Hour Yang , “Across-Authority Lightweight Ownership Transfer Protocol” , 2011 , Electronic Commerce Research and Applications , vol.10 , p.375-383. (SSCI期刊)(SCI期刊)
  49. J.-N. Luo;M.-H. Yang , “An E-mail Authentication and Disposable Addressing Scheme for Filtering Spam” , 2011 , Journal of Convergence Information Technology , vol.6 , p.161-171. (EI期刊)
  50. M. -H. Yang , “Controlled Delegation Protocol in Mobile RFID Networks” , 2010 , EURASIP Journal on Wireless Communications and Networking , vol.2010 , p.0-0. (SCI期刊)
  51. M. -H. Yang , “Polymorphic Penetration Testcode Carrier” , 2010 , International Journal of Digital Content Technology and its Applications , vol.4 , p.48-61. (EI期刊)
  52. M.- H. Yang;S.-P. Shieh , “Tracing Anonymous Mobile Attackers in Wireless Network” , 2010 , International Journal of Digital Content Technology and its Applications , vol.4 , p.161-173. (EI期刊)
  53. Ming Hour Yang , “Lightweight Authentication Protocol for Mobile RFID Networks” , 2010 , International Journal of Security and Networks , vol.5 , p.53-62. (EI期刊)
  54. Ming Hour Yang;J.-N. Luo , “A Random Key Penetration Testing Approach with Polymorphic Detection Avoidance Mechanism” , 2009 , Journal of Internet Technology , vol.10 , p.393-404. (SCI期刊)
  55. M.-H. Yang , “Polymorphic Worms Detection” , 2009 , Information Security Newsletter , vol.15 , p.72-81.
  56. Y.-C. Tseng; L.-W. Chen; M.-H. Yang; and J.-J. Wu , “A Stop-or-Move Mobility Model for PCS Networks and Its Location-Tracking Strategies” , 2003 , Computer Communications , vol.26 , p.1288-1301. (SCI期刊)
  57. M.-H. Yang;Y.-C. Tseng , “A Borrow-and-Return Model to Reduce Client Waiting Time for Broadcasting-Based VOD Services” , 2003 , IEEE Trans. On Broadcasting , vol.49 (SCI期刊)
  58. Y.-C. Tseng; M.-H. Yang; and C.-H. Chang , “A Recursive Frequency-Splitting Scheme for Broadcasting Hot Videos in VOD Service” , 2002 , IEEE Trans. on Communications , vol.50 , p.1348-1355. (SCI期刊)
  59. Y.-C. Tseng; M.-H. Yang; Chi-Ming Hsieh; Wen-Hwa Liao; Jang-ping Sheu , “Data Broadcasting and Seamless Channel Transition for Highly Demanded Videos” , 2001 , IEEE Trans. on Communications , vol.49 , p.863-874. (SCI期刊)
  60. M.-H. Yang; Y.-C. Tseng; M, -S. Jian; C. Lin , “Multi-Node Multicast in Multi-Dimensional Wormhole Tori and Meshes with Load Balance” , 2000 , Journal of Information Science and Engineering , vol.18 , p.959-980. (SCI期刊)
  61. M.-H. Yang , “Detecting Backdoors” , 2000 , Information Security Newsletter , vol.7
  62. Y.-C. Tseng; M.-H. Yang; T.-Y. Juang , “Achieving Fault-Tolerant Multicast in Injured Wormhole-Routed Tori and Meshes Based on Euler Path Construction” , 1999 , IEEE Trans. on Computers , vol.48 , p.1282-1296. (SCI期刊)
研討會論文
  1. Yu-Shan Hsu, Ming-Hour Yang , “Secure Credit Card Transactions Against Location Fraud” , 2023 , International Conference on Artificial Intelligence and Internet of Things , 2023 /7 /10 ~ 2023 /7 /12 , 大陸地區 .
  2. Yu-Shan Hsu, Ming-Hour Yang, I-An Lin, Yao-Yang Tsai , “Smart Manufacturing Security Challenges and Solutions” , 2023 , IEEE International Conference on Consumer Electronics-Taiwan , 2023 /7 /17 ~ 2023 /7 /19 , 中華民國 台灣 .
  3. 吳翰泓, 黎俊榮, 楊明豪, 徐玉姍 , “基於聯盟鏈之基因定序服務與交易框架” , 2022 , 2022台灣網際網路研討會 , 2022 /12 /15 ~ 2022 /12 /17 , 中華民國 台灣 .
  4. 方竹安,楊明豪,羅嘉寧,徐玉姍 , “基於不同權重之安全多 RFID 標籤所有權轉移方法” , 2022 , 2022台灣網際網路研討會 , 2022 /12 /15 ~ 2022 /12 /17 , 中華民國 台灣 .
  5. 郭子正, 楊明豪, 徐玉姍, 羅嘉寧 , “輕量化安全感測資料聚合方法” , 2022 , 第十七屆無線、隨意及感測網路研討會 , 2022 /8 /26 ~ 2022 /8 /27 , 中華民國 台灣 .
  6. 許孝銓, 楊明豪, 羅嘉寧,徐玉姍 , “基於新版EMV發展偽造應用選擇攻擊與中繼攻擊預防方法” , 2022 , 全國資訊安全會議 , 2022 /6 /16 ~ 2022 /6 /17 , 中華民國 台灣 .
  7. 柯宏諭, 楊明豪, 羅嘉寧, 徐玉姍 , “基於區塊鏈及群組證明之Mobile RFID多階層所有權轉移” , 2021 , NCS 2021全國計算機會議 , 2021 /12 /10 ~ 2021 /12 /12 , 中華民國 台灣 .
  8. 林緯彤, 楊明豪, 羅嘉寧, 吳章銘, 徐玉姍 , “在CAN-Bus上的輕量認證方法” , 2021 , 全國資訊安全會議 , 2021 /8 /5 ~ 2021 /8 /6 , 中華民國 台灣 .
  9. Jia-Ning Luo, Ming-Hour Yang , “An RFID Ownership Transfer based on Multiple Owners with Different Weights” , 2021 , 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications , 2021 /11 /18 ~ 2021 /11 /20 , 中華民國 台灣 .
  10. 林亞吟, 魯家瑜, 楊明豪, 羅嘉寧, 吳章銘 , “車用控制區域網路安全防護系統” , 2019 , 全國計算機會議 , 2019 /11 /14 ~ 2019 /11 /15 , 中華民國 台灣 .
  11. 謝俊宏, 楊明豪, 羅嘉寧, 徐玉姍 , “安全多擁有者共有群組標籤所有權轉移協定” , 2019 , Taiwan Academic network conference (Tanet'19) , 2019 /9 /25 ~ 2019 /9 /27 , 中華民國 台灣 .
  12. J.-N. Luo, M.-H. Yang , “User Path Prediction Based on Passive Indoor Location Technology,” , 2019 , Asia Joint Conference on Information Security , 2019 /8 /1 ~ 2019 /8 /2 , Japan .
  13. 黃奕升, 楊明豪, 羅嘉寧 , “真實來源標記轉存混合單一封包回溯機制” , 2019 , Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'19) , 2019 /8 /26 ~ 2019 /8 /27 , 中華民國 台灣 .
  14. Meng-Hsuan Tsai, Jia-Ning Luo, Ming-Hour Yang, Nai-Wei Lo , “Location Tracking and Forensic Analysis of Criminal Suspects’ Footprints” , 2019 , 2019 International Conference on Information and Computer Technologies , 2019 /3 /14 ~ 2019 /3 /17 , United States .
  15. Jia-Ning Luo, Ming-Hour Yang , “Offline Transferable E-Cash mechanism” , 2018 , The 2018 IEEE Conference on Dependable and Secure Computing , 2018 /12 /10 ~ 2018 /12 /13 , 中華民國 台灣 .
  16. ia-Ning Luo, Ming-Hour Yang, Mu-En Wu and Raylin Tso , “Forensic Analysis of Criminal Suspects’ Footprints with Indoor Positioning Technology” , 2018 , 12th Biennial Convention of the Pacific and Asian Communication Association , 2018 /7 /4 ~ 2018 /7 /6 , Malaysia .
  17. Jia-Ning Luo, Ming-Hour Yang, Mu-En Wu and Raylin Tso , “Positioning Algorithm for Feature Matching and Map Building” , 2018 , nternational Scientific Conference on Engineering and Applied Sciences (ISCEAS) , 2018 /6 /27 ~ 2018 /6 /29 , Japan .
  18. Jia Ning Luo, Ming-Hour Yang , “Multiple-Denomination E-Cash” , 2018 , IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW) , 2018 /5 /19 ~ 2018 /5 /21 , 中華民國 台灣 .
  19. Chih-Yung Chang, Chih-Yao Hsiao, Ming Hour Yang and Sheng-Shih Wang , “Surveillance algorithms for barrier coverage in wireless camera sensor networks” , 2018 , International Conference on Electronics Technology (ICET 2018) , 2018 /5 /23 ~ 2018 /5 /27 , 大陸地區 .
  20. 蔡孟軒,羅嘉寧,楊明豪,高誌陽 , “以音頻為基礎之環境因子認證” , 2018 , Cryptology and Information Security Conference , 2018 /5 /24 ~ 2018 /5 /25 , 中華民國 台灣 .
  21. 羅嘉寧,楊明豪,林奕成 , “基於被動室內定位技術之使用者路徑預測” , 2018 , Cryptology and Information Security Conference , 2018 /5 /24 ~ 2018 /5 /25 , 中華民國 台灣 .
  22. Kuo-HuiYeh, Mu-En Wu, Jia-NingLuo, Ming-Hour Yang , “Continuous Authentication Scheme Using Brainwave-based Bio-features” , 2018 , The 2nd Int’l Symposium on Computational and Applied Mathematics (ISCAM 2018) , 2018 /1 /13 ~ 2018 /1 /15 , 大陸地區 .
  23. Jia Ning Luo, Ming Hour Yang , “Improved Single Packet Traceback Scheme with Bloom Filters” , 2017 , EAI international conference on IOT as a Service (IOTaaS’17) , 2017 /9 /20 ~ 2017 /9 /20 , 中華民國 台灣 .
  24. 謝奇軒, 羅嘉寧, 楊明豪 , “特徵匹配與地圖疊加演算法” , 2017 , 2017臺灣智慧型機器人研討會(NCAR2017) , 2017 /9 /6 ~ 2017 /9 /8 , 中華民國 台灣 .
  25. Wei Tim Liew, Kuo-Yu Tsai, Jia Ning Luo, Ming Hour Yang , “Novel Designated Ownership Transfer with Grouping Proof” , 2017 , IEEE Dependable and Secure Computing (DSC’17) , 2017 /8 /7 ~ 2017 /8 /10 , 中華民國 台灣 .
  26. Jia Ning Luo, Ming-Hour Yang, Kuo-Yu Tsai , “A Geographic Map-based Middleware Framework to Obfuscate Mobile Phone’s Location” , 2017 , International Workshop on Multimedia Technology for Intelligent Computing (MUTEC 2017) , 2017 /7 /10 ~ 2017 /7 /14 , Malaysia .
  27. 邱建勳, 羅嘉寧, 楊明豪 , “球型鑑識機器人之定位與控制之研究,” , 2017 , Symposium on Digital Life Technologies (DLT’17) , 2017 /6 /24 ~ 2017 /6 /25 , 中華民國 台灣 .
  28. 段榮成, 羅嘉寧, 楊明豪 , “使用NS3模擬具重組性低存儲量複合式封包溯源機制以追蹤攻擊者” , 2017 , Symposium on Digital Life Technologies (DLT’17) , 2017 /6 /24 ~ 2017 /6 /25 , 中華民國 台灣 .
  29. 羅嘉寧, 楊明豪, 張翎翎, 邱輝展 , “基於使用者行為之防肩窺攻擊行動裝置認證機制” , 2016 , Taiwan Academic network conference (Tanet'16) , 2016 /10 /19 ~ 2016 /10 /21 , 中華民國 台灣 .
  30. 羅嘉寧, 楊明豪, 劉邦良, 蔡孟軒 , “基於室內定位技術之使用者移動足跡分析” , 2016 , Taiwan Academic network conference (Tanet'16) , 2016 /10 /19 ~ 2016 /10 /21 , 中華民國 台灣 .
  31. J.-N. Luo, M.-H. Yang, C.-L. Tsai , “Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism” , 2016 , International Conference on Network and System Security (NSS 2016) , 2016 /9 /28 ~ 2016 /9 /30 , 中華民國 台灣 .
  32. 楊明豪, 羅嘉寧, 黃柏燁 , “基於藍牙低功耗之群組證明” , 2016 , Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'16) , 2016 /8 /23 ~ 2016 /8 /24 , 中華民國 台灣 .
  33. 楊明豪, 羅嘉寧, 蔡承諺 , “熱門景點斷鏈位置隱私保護方法” , 2016 , 第26屆全國資訊安全會議 , 2016 /5 /26 ~ 2016 /5 /27 , 中華民國 台灣 .
  34. Ming-Hour Yang, J.-N. Luo, S.-Y. Lu , “A Multilayered Grouping Proof Method for Improving Cargo Management” , 2015 , Asia-Pacific Conference on Engineering & Applied Sciences (APCES 2015) , 2015 /8 /25 ~ 2015 /8 /27 , Japan .
  35. 楊明豪, 羅嘉寧, 李維哲 , “EMV-based offline payment with multiple cards” , 2015 , Mobile Computing , 2015 /8 /25 ~ 2015 /8 /26 , 中華民國 台灣 .
  36. 楊明豪, 羅嘉寧, 徐世杰 , “可轉移之多面額電子現金” , 2015 , Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'15) , 2015 /8 /25 ~ 2015 /8 /26 , 中華民國 台灣 .
  37. J.-N. Luo, M.-H. Yang , “An offline transferable and divisible mobile coupon based on NFC” , 2015 , International Conference on Computing, Mechanical and Electronics Engineering (ICCMEE'2015) , 2015 /7 /9 ~ 2015 /7 /10 , Republic of Singapore .
  38. 羅嘉寧, 楊明豪, 何宇承, 劉邦良 , “相容EMV具雙向認證之離線行動付款協定” , 2015 , International Conference on Information Management , 2015 /5 /23 ~ 2015 /5 /23 , 中華民國 台灣 .
  39. 羅嘉寧, 楊明豪, 蔡卓倫, 張翎翎 , “行動裝置防肩窺之身分認證機制” , 2015 , Cryptology and Information Security Conference , 2015 /5 /28 ~ 2015 /5 /29 , 中華民國 台灣 .
  40. 楊明豪, 羅嘉寧, 呂紹永 , “基於供應鏈管理所需針對大量標籤之多層式群組證明” , 2015 , Cryptology and Information Security Conference , 2015 /5 /28 ~ 2015 /5 /29 , 中華民國 台灣 .
  41. 楊明豪, 羅嘉寧, 邱柏銓 , “鏈狀蜂巢模糊區域保護連續查詢位置隱私” , 2014 , Taiwan Academic network conference (Tanet'14) , 2014 /10 /22 ~ 2014 /10 /24 , 中華民國 台灣 .
  42. M.-H. Yang , J.-N. Luo, M. -C. Yang,Wei Chun Hsu , “High Accuracy and Low Storage Hybrid IP Traceback” , 2014 , The 2014 International Conference on Computer, Information and Telecommunication Systems (CITS 2014) , 2014 /7 /7 ~ 2014 /7 /9 , Republic of Korea .
  43. M. -C. Yang, J.-N. Luo, M.-H. Yang , “Super Connectivity of Burnt Pancake Graphs” , 2014 , " Public Health Conference 2014 (PHC 2014) , 2014 /7 /12 ~ 2014 /7 /14 , Thailand .
  44. 羅嘉寧, 楊明豪, 梁少鵬 , “基於 NFC 手機之可轉移與可分割之匿名行動優惠券” , 2014 , Cryptology and Information Security Conference, 2014 , 2014 /5 /30 ~ 2014 /5 /31 , 中華民國 台灣 .
  45. J.-N. Luo, Ming-Hour Yang , “A Novel Graphical Password Scheme Resistant to Shoulder Surfing Attacks” , 2014 , The 2014 FTRA International Workshop on Advanced Multimedia Computing (AMC-14) , 2014 /4 /23 ~ 2014 /4 /25 , Republic of Korea .
  46. 李維哲, 蔡承諺, 楊佳蓁, 楊明豪 , “以NFC手機實作自動汽車租賃系統” , 2013 , National Computer Symposium , 2013 /12 /13 ~ 2013 /12 /14 , 中華民國 台灣 .
  47. 羅嘉寧, 楊明豪, 黃思穎, 蔡卓倫 , “相容於NFC之行動付款協定” , 2013 , Taiwan Academic network conference (Tanet'13) , 2013 /10 /23 ~ 2013 /10 /25 , 中華民國 台灣 .
  48. 楊明豪, 洪聖翔 , “相容EMV具雙向認證且適合離線及線上交易之行動付款協定” , 2013 , Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'13) , 2013 /8 /27 ~ 2013 /8 /28 , 中華民國 台灣 .
  49. J.-N. Luo, Ming-Hour Yang,M. -C. Yang , “An NFC-based Anonymous Car Rental System” , 2013 , International Symposium on Biometrics and Security Technologies, (ISBAST’13)2013 , 2013 /7 /2 ~ 2013 /7 /5 , 大陸地區 .
  50. 楊明豪, 羅嘉寧, 謝學和 , “具實用性高精確度低儲存量的複合單一封包溯源機制” , 2012 , Taiwan Academic network conference (Tanet'12) , 2012 /10 /23 ~ 2012 /10 /25 , 中華民國 台灣 .
  51. 羅嘉寧, 楊明豪, 翁博亭 , “基植於NFC手機之匿名租車系統” , 2012 , Taiwan Academic network conference (Tanet'12) , 2012 /10 /23 ~ 2012 /10 /25 , 中華民國 台灣 .
  52. J.-N. Luo, Ming-Hour Yang , “An Efficient Delegation Protocol in Mobile RFID Networks” , 2012 , International Conference on Information Security and Intelligent Control , 2012 /8 /14 ~ 2012 /8 /16 , 中華民國 台灣 .
  53. J.-N. Luo, Ming-Hour Yang, M.-C. Yang, M.-C. Tseng , “Offline Delegation Protocol for Mobile RFID” , 2012 , IEEE International Conference on Communication, Networks and Satellite (ComNetSat) , 2012 /7 /12 ~ 2012 /7 /14 , Republic of Indonesia .
  54. M.-C. Yang, M.-H. Yang , “Reliability Analysis of Balanced Hypercubes” , 2012 , IEEE Computing, Communications & Applications Conference (ComComAp) , 2012 /1 /11 ~ 2012 /1 /13 , 中華民國 台灣 .
  55. 楊明豪; 羅嘉寧; 謝凱評 , “跨領域群組RFID標籤所有權轉移協定” , 2011 , Taiwan Academic network conference , 2011 /12 /2 ~ 2011 /12 /3 , 中華民國 台灣 .
  56. 羅嘉寧, 楊明豪, 謝凱評 , “防止肩窺攻擊之圖形化密碼機制” , 2011 , National Symposium on Telecommunications (NST11) , 2011 /11 /18 ~ 2011 /11 /19 , 中華民國 台灣 .
  57. 楊明豪, 羅嘉寧, 謝凱評 , “安全多群組RFID標籤所有權轉移協定” , 2011 , Taiwan Academic network conference (Tanet'11) , 2011 /10 /24 ~ 2011 /10 /26 , 中華民國 台灣 .
  58. 羅嘉寧;楊明豪;許博宇 , “行動式無線射頻技術委任授權協定之分析及改良” , 2011 , Cryptology and Information Security Conference , 2011 /5 /26 ~ 2011 /5 /27 , 中華民國 台灣 .
  59. Ming Hour Yang , “利用無線網路的應用層安全研究” , 2011 , International Conference on Information Security , 2011 /4 /12 ~ 2011 /4 /15 , 大陸地區 .
  60. J.-N. Luo;M.-H. Yang , “Mobile RFID Mutual Authentication and Ownership Transfer” , 2011 , The Sixth International Conference on Systems (ICONS 2011) , 2010 /1 /23 ~ 2010 /1 /28 , Netherlands .
  61. 楊明豪;胡弘淵;李國瑋 , “安全Mobile RFID 標籤所有權轉移協定” , 2010 , Taiwan Academic network conference , 2010 ~ 2010 .
  62. 楊明豪;胡弘淵 , “指定對象跨領域所有權轉移” , 2010 , Information Technologies, Applications and Management Conference , 2010 ~ 2010 .
  63. J.-N. Luo;M.-H. Yang , “Using E-mail Authentication and Disposable E-mail Addressing for Filtering Spam” , 2009 , International Symposium on Pervasive Systems, Algorithms and Networks , 2009 /12 /14 ~ 2009 /12 /16 .
  64. 楊明豪,蔡宗成 , “Mobile RFID跨領域所有權轉移” , 2009 , National Computer Symposium , 2009 /11 /27 ~ 2009 /11 /29 .
  65. 楊明豪;曾詠仁 , “限制讀取次數之Mobile RFID委任協定” , 2009 , Taiwan Academic network conference (Tanet09) , 2010 /10 /28 ~ 2010 /10 /30 .
  66. M.-H. Yang;J.-N. Luo , “Authentication Protocol in Mobile RFID Network” , 2009 , The Fourth International Conference on Systems (ICONS’09) , 2009 /3 /1 ~ 2009 /3 /6 .
  67. 楊明豪;羅嘉寧;簡辰澔 , “以COMP-128為基礎的行動無線射頻認證協定” , 2008 , National Symposium on Telecommunications (NST08) , 2008 /12 /5 ~ 2008 /12 /6 .
  68. 楊明豪;羅嘉寧;許明淵;吳建興;陳世仁 , “具變形躲避偵測機制穿透測試載具” , 2008 , Taiwan Academic network conference (Tanet08) , 2008 /10 /20 ~ 2008 /10 /22 .
  69. 楊明豪;羅嘉寧;李昱霖 , “Mobile RFID雙向認證及所有權轉移” , 2008 , Taiwan Academic network conference (Tanet08) , 2008 /10 /20 ~ 2008 /10 /22 .
  70. M.-H. Yang , “Protect mobile RFID Location Privacy Using Dynamic Identity” , 2008 , IEEE International Conference on Cognitive Informatics , 2008 /8 /14 ~ 2008 /8 /16 .
  71. M.-H. Yang; C.-S. Chiu; Shiuhpyng Shieh , “Tracing Mobile Attackers in Wireless Ad-hoc Network” , 2008 , The Third International Conference on Internet and Web Applications and Services , 2008 /6 /8 ~ 2008 /6 /13 .
  72. 楊明豪;羅嘉寧;李佳鴻 , “Lightweight Mobile RFID Authentication Protocol for Location Privacy” , 2008 , 2008資訊管理及應用國際研討會 , 2008 /6 /6 ~ 2008 /6 /6 .
  73. 楊明豪;李軒豪;廖柏穎;胡弘淵;李國瑋 , “追蹤無線網路匿名移動癱瘓服務攻擊者感測網路” , 2007 , National Conference Symposium , 2007 /12 /20 ~ 2007 /12 /21 .
  74. 楊明豪;陳銘乾 , “以Chameleon動態保護RFID使用者隱私” , 2007 , National Conference Symposium , 2007 /12 /20 ~ 2007 /12 /21 .
  75. 楊明豪;李昱霖;李佳鴻;蔡宗成 , “IEEE 802.11 WLAN存取控制之弱點研究與攻擊偵測” , 2007 , 國防科技學術合作計劃成果發表會 , 2007 ~ 2007 .
  76. F.-Y. Lee; S.-P. Shieh; M.-H. Yang , “Tracing the Sources of Single-Packet Attacks” , 2004 , Information Security Conference , 2004 ~ 2004 .
  77. K.-H. Chou; S.-P. Shieh; M.-H. Yang; F.-Y. Lee , “Marking-Based Source Identification Scheme for Defending Against DDoS Attacks” , 2004 , Information Security Conference , 2004 ~ 2004 .
  78. M.-H. Yang; L.-W. Chen; Y.-C. Tseng , “A traveling Salesman Mobility Model and Its Location Tracking in PCS Networks” , 2001 , International Conference on Distributed Computing Systems(ICDCS) , 2001 ~ 2001 .
  79. M.-H. Yang; L.-W. Chen; Y.-C. Tseng , “The Location Tracking Problem Based on a Traveling Salesman Moving Model” , 2000 , Mobile Computing Workshop , 2000 ~ 2000 .
  80. Y.-C. Tseng; Chi-Ming Hsieh; M.-H. Yang;Wen-Hwa Liao; Jang-ping Sheu , “Data Broadcasting and Seamless Transition for Highly-Demanded Videos” , 2000 , INFOCOM , 2000 ~ 2000 .
  81. M.-H. Yang; Y.-C. Tseng; M, -S. Jiam; C. Lin , “Multi-Node Multicast in Three and Higher Dimensional Wormhole Tori and Meshes with Load Balance” , 2000 , Int'l Conf. on Parallel Processing (ICPP) , 2000 ~ 2000 .
  82. Y.-C. Tseng; M.-H. Yang; T.-Y. Juang , “An Euler-Path-Based Multicasting Model for Wormhole-Routed Networks with Multi-Destination Capability” , 1998 , Wokshop on Distributed System Technology and Applications (一九九八分散式系統及應用研討會) , 1998 ~ 1998 .
  83. Y.-C. Tseng; M.-H. Yang; T.-Y. Juang , “An Euler-Path-Based Multicasting Model for Wormhole-Routed Networks with Multi-Destination Capability” , 1998 , Int'l Conf. on Parallel Processing(ICPP) , 1998 ~ 1998 .
  84. K.-W. Chen; M.-H. Yang; Y.-C. Tseng; J.-P. Sheu , “Channel-Combine Strategies for On-Demand Multicast on Mobile Wireless Networks” , 1998 , Int'l Computer Symposium, Workshop on Computer Networks, Internet, and Multimedia , 1998 ~ 1998 .
  85. Y.-C. Tseng; T.-Y. Juang; M.-H. Yang , “A Euler-Path-Based Model for Wormhole-Routed Networks:It’s Applications to Damaged 2D Tori and Meshes” , 1997 , Int'l Performance, Computing, and Communication Conf.(IPCCC) , 1997 ~ 1997 .
專書
  1. M.-H. Yang; G.-C.Lai , “網路駭客手冊→後門的攻擊、偵測、與防禦” , 2001 .
部分專書
  1. J.-N. Luo;Ming Hour Yang , 自著者 , “A Mobile RFID authentication scheme based on the COMP-128 algorithm” , Radio Frequency Identification Fundamentals and Application , IN-TECH Publishing , 2010 , 978-953-7619-73-2 .
  2. 楊明豪;蔡宗成;胡凱勛 , “WLAN應用層認證弱點” , 資訊安全專論,財團法人國家實驗研究院科技政策研究與資訊中心 , 2008 .
  3. M. –H. Yang ; S.-P. Shieh , “分散式癱瘓服務攻擊解決策略--追蹤匿名攻擊者” , 資訊安全專論 , 財團法人國家實驗研究院科技政策研究與資訊中心 , 2006 .
  4. M.-H. Yang , “網際網路攻防技術與實例” , 資訊安全專輯 , 財團法人國家實驗研究院科技政策研究與資訊中心 , 2005 .
  5. M.-H. Yang ; Y.-C. Tseng , “Distributed Multimedia Databases: Techniques and Applications” , Distributed Multimedia Databases: Techniques and Applications , 2001 .
其他
  1. M.-H. Yang , “後門程式的偵測與防治” , 2001 .
  2. M.-H. Yang , “Introduction to microsoft iis” , 2000 .