楊明豪 Yang. Ming-Hour

Conference Papers

  • Y.-C. Tseng, T.-Y. Juang, and M.-H. Yang, "A Euler-Path-Based Model for Wormhole-Routed Networks:It’s Applications to Damaged 2D Tori and Meshes," Int'l Performance, Computing, and Communication Conf.(IPCCC), 1997 pp. 444-450
  • Y.-C. Tseng, M.-H. Yang, and T.-Y. Juang, "An Euler-Path-Based Multicasting Model for Wormhole-Routed Networks with Multi-Destination Capability," Int'l Conf. on Parallel Processing (ICPP), 1998 pp. 366-373.
  • Y.-C. Tseng, M.-H. Yang, and T.-Y. Juang, "An Euler-Path-Based Multicasting Model for Wormhole-Routed Networks with Multi-Destination Capability," Workshop on Distributed System Technology and Applications ((一九九八分散式系統及應用研討會), 1998 .
  • K.-W. Chen, M.-H. Yang, Y.-C. Tseng, and J.-P. Sheu, "Channel-Combine Strategies for On-Demand Multicast on Mobile Wireless Networks," Int'l Computer Symposium, Workshop on Computer Networks, Internet, and Multimedia, Taiwan, 1998 pp60-67.
  • Y.-C. Tseng, Chi-Ming Hsieh, M.-H. Yang, Wen-Hwa Liao, and Jang-ping Sheu, "Data Broadcasting and Seamless Transition for Highly-Demanded Videos," INFOCOM, 2000 pp. 727-736
  • M.-H. Yang, L.-W. Chen, and Y.-C. Tseng, "The Location Tracking Problem Based on a Traveling Salesman Moving Model," Mobile Computing Workshop, 2000 pp. 113-120
  • M.-H. Yang, Y.-C. Tseng, M, -S. Jiam, and C. Lin, "Multi-Node Multicast in Three and Higher Dimensional Wormhole Tori and Meshes with Load Balance," Int'l Conf. on Parallel Processing (ICPP), 2000 pp. 25-32
  • M.-H. Yang, L.-W. Chen, and Y.-C. Tseng, "A traveling Salesman Mobility Model and Its Location Tracking in PCS Networks," International Conference on Distributed Computing Systems(ICDCS), 2001 pp.517-523
  • F.-Y. Lee, S.-P. Shieh, and M.-H. Yang, “Tracing the Sources of Single-Packet Attacks,” Information Security Conference, 2004 pp.9-22
  • K.-H. Chou, S.-P. Shieh, M.-H. Yang and F.-Y. Lee, “Marking-Based Source Identification Scheme for Defending Against DDoS Attacks,” Information Security Conference, 2004 pp.23-28
  • 楊明豪,李軒豪,廖柏穎,胡弘淵,李國瑋, “追蹤無線網路匿名移動癱瘓服務攻擊者感測網路,” National Conference Symposium, 2007 pp.418-426
  • 楊明豪,李昱霖,李佳鴻,蔡宗成, “IEEE 802.11 WLAN 存取控制之弱點研究與攻擊偵測,” 國防科技學術合作計劃成果發表會, 2007
  • 楊明豪,陳銘乾, “以 Chameleon 動態保護RFID使用者隱私,” National Conference Symposium, 2007 pp.375-384
  • M.-H. Yang, C.-S. Chiu, and Shiuhpyng Shieh, ” Tracing Mobile Attackers in Wireless Ad-hoc Network,” SLAECE in conjunction with International Conference on Internet and Web Applications and Services (ICIW), 2008 pp.7-12 (Best Paper Award) (EI)
  • M.-H. Yang, Jain-Shing Wu, and Shih-Jen Chen, “Protect Mobile RFID Location Privacy Using Dynamic Identity,” IEEE International Conference on Cognitive Informatics (ICCI) 2008 pp.366-374 (EI)
  • 楊明豪,羅嘉寧,李佳鴻, “Lightweight Mobile RFID Authentication Protocol for Location Privacy,”2008資訊管理及應用國際研討會pp.435-446
  • 楊明豪,羅嘉寧,李昱霖, ”Mobile RFID 雙向認證及所有權轉移,” Taiwan Academic network conference (Tanet08), 2008 pp. 133-138
  • 楊明豪,羅嘉寧,許明淵,吳建興,陳世仁, ”具變形躲避偵測機制穿透測試載具,” Taiwan Academic network conference (Tanet08), 2008 pp. 105-110 (Best Paper Award)
  • 楊明豪,羅嘉寧,簡辰澔, “以 COMP-128 為基礎的行動無線射頻認證協定,” National Symposium on Telecommunications (NST08), 2008 (accepted)
  • M.-H. Yang, J.-N. Luo, “Authentication Protocol in Mobile RFID Network,” The Fourth International Conference on Systems (ICONS’09), 2009 pp. 108-113 (EI)
  • J.-N. Luo, M.-H. Yang, “Using E-mail Authentication and Disposable E-mail Addressing for Filtering Spam,” International Symposium on Pervasive Systems, Algorithms and Networks, 2009 pp.356-363 (EI)
  • 楊明豪,曾詠仁, ”限制讀取次數之 Mobile RFID 委任協定,” Taiwan Academic network conference (Tanet09), 2009 (accepted)
  • 楊明豪,蔡宗成 “Mobile RFID 跨領域所有權轉移,” National Computer Symposium, 2009 pp. 508-519
  • 楊明豪,胡弘淵, “指定對象跨領域所有權轉移,” Information Technologies, Applications and Management Conference, June 2010. (accepted)
  • 楊明豪,胡弘淵,李國瑋, ”安全 Mobile RFID 標籤所有權轉移協定,”Taiwan Academic network conference (Tanet'10), 2010 (accepted)
  • J.-N. Luo, M.-H. Yang, “Mobile RFID Mutual Authentication and Ownership Transfer,” The Sixth International Conference on Systems (ICONS 2011),2011 pp. 88-94 (EI)
  • 楊明豪, "利用無線網路的應用層安全研究," International Conference on Information Security & The First Cross-Straits Conference on Information Security (CSCIS 2011), 2011 (accepted)
  • 羅嘉寧, 楊明豪, 許博宇, "行動式無線射頻技術委任授權協定之分析及改良," Cryptology and Information Security Conference, 2011
  • 楊明豪, 羅嘉寧, 謝凱評, "安全多群組 RFID 標籤所有權轉移協定," Taiwan Academic network conference (Tanet'11), 2011 (accepted)
  • 羅嘉寧, 楊明豪, 姚佳政," 防止肩窺攻擊之圖形化密碼機制," National Symposium on Telecommunications (NST11), 2011 (accepted)
  • 楊明豪, 羅嘉寧, 謝凱評, "跨領域群組 RFID 標籤所有權轉移協定," National Computer Symposium, 2011 (accepted)
  • M.-C. Yang, M.-H. Yang, "Reliability Analysis of Balanced Hypercubes," IEEE Computing, Communications & Applications Conference (ComComAp) ,2012 pp. 376-379 (EI)
  • J.-N. Luo, Ming-Hour Yang, M.-C. Yang, M.-C. Tseng, "Offline Delegation Protocol for Mobile RFID," IEEE International Conference on Communication, Networks and Satellite (ComNetSat), 2012 pp. 138-141 (EI)
  • J.-N. Luo, Ming-Hour Yang, " An Efficient Delegation Protocol in Mobile RFID Networks," International Conference on Information Security and Intelligent Control, 2012 pp. 160-163 (EI)
  • 楊明豪, 羅嘉寧, 謝學和, "具實用性高精確度低儲存量的複合單一封包溯源機制," Taiwan Academic network conference (Tanet'12), 2012 (accepted)
  • 羅嘉寧, 楊明豪, 翁博亭, "基植於 NFC 手機之匿名租車系統," Taiwan Academic network conference (Tanet'12), 2012 (accepted)
  • J.-N. Luo, Ming-Hour Yang, M. -C. Yang, " An Anonymous Car Rental System Based on NFC," International Symposium on Biometrics and Security Technologies, 2013 (accepted)
  • 李維哲, 蔡承諺, 楊佳蓁, 楊明豪"以 NFC 手機實作自動汽車租賃系統," National Computer Symposium, 2013 (accepted)
  • 楊明豪, 洪聖翔,"相容 EMV 具雙向認證且適合離線及線上交易之行動付款協定," Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'13), 2013,苗栗,2013.8.27-28
  • 羅嘉寧, 楊明豪, 黃思穎, 蔡卓倫,"相容於 NFC 之行動付款協定," Taiwan Academic network conference (Tanet'13)," 2013 台中,2013.10.23-25
  • J.-N. Luo, Ming-Hour Yang, "A Novel Graphical Password Scheme Resistant to Shoulder Surfing Attacks," The 2014 FTRA International Workshop on Advanced Multimedia Computing (AMC-14),2014 (EI) 韓國 濟州島 2014.4.23-25
  • 羅嘉寧, 楊明豪, 梁少鵬, "基於 NFC 手機之可轉移與可分割之匿名行動優惠券," Cryptology and Information Security Conference, 2014 台北, 2014.5.30-6.1
  • M. -C. Yang, J.-N. Luo, Ming-Hour Yang, "Super Connectivity of Burnt Pancake Graphs," Public Health, 2014 泰國 曼谷 2014.7.9-11
  • Ming-Hour Yang, J.-N. Luo, M. -C. Yang, "High Accuracy and Low Storage Hybrid IP Traceback," International Conference on Computer, Information, and Telecommunication Systems (CITS 2014),2014 韓國 濟州島 2014.7.7-9 (Best Paper Award)
  • J.-N. Luo, Ming-Hour Yang, "An Anonymous NFC-Based Payment Protocol," International Conference on Engineering and Technology Innovation (IECTI 2014),2014 台灣 墾丁 2014.10.31-11.4
  • 羅嘉寧, 楊明豪, 何宇承, “EMV-based mobile payment protocol for offline transaction – with the ability of mutual authentication,” Mobile Computing 2014
  • 楊明豪, 羅嘉寧, 邱柏銓,"鏈狀蜂巢模糊區域保護連續查詢位置隱私," Taiwan Academic network conference (Tanet'14), 2014 高雄
  • 羅嘉寧, 楊明豪, 何宇承, 劉邦良,"相容 EMV 具雙向認證之離線行動付款協定," International Conference on Information Management, 2015台北, 2015.5.23
  • 羅嘉寧, 楊明豪, 蔡卓倫, 張翎翎,"行動裝置防肩窺之身分認證機制," Cryptology and Information Security Conference, 2015高雄, 2015.5.28-5.29
  • 楊明豪, 羅嘉寧, 呂紹永,"基於供應鏈管理所需針對大量標籤之多層式群組證明," Cryptology and Information Security Conference, 2015高雄, 2015.5.28-5.29
  • J.-N. Luo, Ming-Hour Yang, "An Offline transferable and divisible mobile coupon based on NFC," IIE International Conference on Computing, Mechanical and Electronics Engineering (ICCMEE 2015),2015 新加坡 2015.7.9-7.10
  • Ming-Hour Yang, J.-N. Luo, S.-Y. Lu, "A Multilayered Grouping Proof Method for Improving Cargo Management," Asia-Pacific Conference on Engineering & Applied Sciences (APCES 2015), 2015 Osaka, Japan 2015.8.25-27
  • 楊明豪, 羅嘉寧, 李維哲, “EMV-based offline payment with multiple cards,” Mobile Computing, 2015
  • 楊明豪, 羅嘉寧, 徐世杰, “可轉移之多面額電子現金,” Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'15), 2015
  • 楊明豪, 羅嘉寧, 蔡承諺, “熱門景點斷鏈位置隱私保護方法,” 第26屆全國資訊安全會議, 2016台中 2016.5.26-27
  • J.-N. Luo, M.-H. Yang, C.-L. Tsai, "Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism," International Conference on Network and System Security (NSS 2016), 2016 台北 2016.9.28-30
  • 楊明豪, 羅嘉寧, 黃柏燁, “基於藍牙低功耗之群組證明,” Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'16), 2016 南投
  • 羅嘉寧, 楊明豪, 張翎翎, 邱輝展,"基於使用者行為之防肩窺攻擊行動裝置認證機制," Taiwan Academic network conference (Tanet'16), 2016 花蓮
  • 羅嘉寧, 楊明豪, 劉邦良, 蔡孟軒,"基於室內定位技術之使用者移動足跡分析," Taiwan Academic network conference (Tanet'16), 2016 花蓮
  • 邱建勳, 羅嘉寧, 楊明豪, “球型鑑識機器人之定位與控制之研究,” Symposium on Digital Technologies (DTL’17), 2017 嘉義
  • 段榮成, 羅嘉寧, 楊明豪, “使用 NS3 模擬具重組性低存儲量複合式封包溯源機制以追蹤攻擊者,” Symposium on Digital Technologies (DTL’17), 2017 嘉義
  • Wei Tim Liew, Kuo-Yu Tsai, Jia Ning Luo, Ming Hour Yang, " Novel Designated Ownership Transfer with Grouping Proof," IEEE Dependable and Secure Computing (DSC’17), 2017 台北
  • Jia Ning Luo, Ming Hour Yang, " Improved Single Packet Traceback Scheme with Bloom Filters,” EAI international conference on IOT as a Service (IOTaaS’17) , 2017, 台中
  • Jia Ning Luo, Ming-Hour Yang, Kuo-Yu Tsai " A Geographic Map-based Middleware Framework to Obfuscate Mobile Phone’s Location, " International Workshop on Multimedia Technology for Intelligent Computing (MUTEC 2017) , 2017, 馬來西亞 沙巴