楊明豪 Yang. Ming-Hour

Journal Papers

  • Y.-C. Tseng, M.-H. Yang, and T.-Y. Juang, "Achieving Fault-Tolerant Multicast in Injured Wormhole-Routed Tori and Meshes Based on Euler Path Construction," IEEE Trans. on Computers, Vol. 48, No.11, Nov. 1999, pp. 1282-96.(SCI, EI)
  • Y.-C. Tseng, M.-H. Yang, Chi-Ming Hsieh, Wen-Hwa Liao, and Jang-ping Sheu, "Data Broadcasting and Seamless Transition for Highly-Demanded Videos," IEEE Trans. on Communications., Vol. 49, No.5, May 2001, pp. 863-874(SCI, EI)
  • M.-H. Yang, "Detecting Backdoors," Information Security Newsletter, Vol. 7 No. 1, Dec. 2000
  • Y.-C. Tseng, M.-H. Yang, and C.-H. Chang, "Recursive Frequency-Splitting Scheme for Broadcasting Hot Videos in VOD Service," IEEE Trans. on Communications, Vol. 50, No. 8, Aug. 2002, pp. 1348-55. (SCI, EI)
  • M.-H. Yang, Y.-C. Tseng, M, -S. Jian, and C. Lin, "Multi-Node Multicast in Three and Higher Dimensional Wormhole Tori and Meshes with Load Balance," Journal of Information Science and Engineering, special issue on Parallel and Distributed Systems, Vol. 18, No. 6, pp. 959-980.(SCIE,EI)
  • M.-H. Yang, and Y.-C. Tseng, "A Borrow-and-Return Model to Reduce Client Waiting Time for Broadcasting-Based VOD Services," IEEE Trans. on Broadcasting, Vol. 49, No. 2, June 2003, pp. 162-169. (SCI,EI)
  • Y.-C. Tseng, L.-W. Chen, M.-H. Yang, and J.-J. Wu, "A Stop-or-Move Mobility Model for PCS Networks and Its Location-Tracking Strategies," Computer Communications, Vol. 26, No. 12, July 2003, pp. 1288-1301. (SCIE,EI)
  • M.-H. Yang, “Polymorphic Worms Detection,” Information Security Newsletter, Vol. 15, No. 2, April 2009, pp. 72-81
  • M.-H. Yang, J.-N. Luo, “A Random Key Penetration Testing Approach with Polymorphic Detection Avoidance Mechanism,” Journal of Internet Technology, Vol. 10, No. 4, 2009, pp. 393-404 (SCIE, EI)
  • M.-H. Yang, “Lightweight Authentication Protocol for Mobile RFID Networks,” International Journal of Security and Networks, Vol. 5, No. 1, 2010, pp. 53-62 (EI)
  • M.- H. Yang, and S.-P. Shieh, “Tracing Anonymous Mobile Attackers in Wireless Network,” International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 4, No. 4, July 2010, pp 161- 173 (EI)
  • M. -H. Yang, "Polymorphic Penetration Testcode Carrier," International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 4, No. 6, September 2010, pp 48- 61 (EI)
  • M. -H. Yang, "Controlled Delegation Protocol in Mobile RFID Networks," EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 170150, 13 pages, 2010. doi:10.1155/2010/170150 (SCI, IF=0.815)
  • M.-H. Yang, H.-Y. Hu, "Protocol for Ownership Transfer Across Authorities- with the ability to assign transfer target," Security and Communication Networks, Vol. 5, No. 2, February 2012, pp. 164-177, DOI: 10.1002/sec.300 (SCI, IF=0.356)
  • J.-N. Luo, M.-H. Yang, “An E-mail Authentication and Disposable Addressing Scheme for Filtering Spam,” Journal of Convergence Information Technology (JCIT), Vol. 6, No. 2, February 2011, pp. 161-171 (EI)
  • M.-H. Yang, "Across-Authority Lightweight Ownership Transfer Protocol," Electronic Commerce Research and Applications (ECRA), Vol. 10, No. 4, July-August 2011, pp. 375- 383 (SSCI, SCI, IF=1.946)
  • M.-H. Yang, "Security Analysis of Application Layer Protocols on WLAN," Journal of Shanghai Jiaotong University (Science)(J.SJTUS), Vol. 16, No. 5, October 2011, pp. 586- 592 (EI)
  • M.-H. Yang, M. -C. Yang, "RIHT: A Novel Hybrid IP Traceback Scheme," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, April 2012, pp. 789- 796 (SCI, IF=1.725)
  • J.-N. Luo, M.-H. Yang, “Mobile RFID Mutual Authentication and Ownership Transfer,” International Journal of Advancements in Computing Technology (IJACT),Vol. 4, No. 7, April 2012, pp. 28-40 (EI)
  • M.-H. Yang, " Secure Multiple Group Ownership Transfer Protocol for Mobile RFID," Electronic Commerce Research and Applications (ECRA) , Vol.11, No.4, 2012, pp.361-373 (SSCI, SCI, IF=1.472)
  • M. -H. Yang, Kai-Ping Xie, "TTP-Based Group Ownership Transfer in a Mobile RFID Environment," International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 7, No. 2, January 2013, pp 51-69 (INSPEC)
  • M.-H. Yang, "Cross Authority Ownership Transfer Protocol Using Mobile RFID," International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 7, No. 8 April 2013, pp. 265-283 (INSPEC)
  • J.-N. Luo, M.-H. Yang, "An Anonymous e-Rental Protocol Based On ID-based Cryptography and NFC," Journal of Supercomputing DOI:10.1007/s11227-013-1051-3 , Vol.70, No.1, 2014, pp.31-53 (SCI, IF=0.917)
  • J.-N. Luo, M.-H. Yang, "An Efficient Offline Delegation Protocol in Mobile RFID Environment," International Journal of Networks, vol. 9, no. 5, 2014, pp. 1114-1120 (EI)
  • M.-H. Yang, "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy," Scientific World Journal, vol. 2014, Article ID 239280, 2014. doi:10.1155/2014/239280 (SCI, IF=1.29)
  • M.-H. Yang, " Security Enhanced EMV-Based Mobile Payment Protocol," Scientific World Journal, vol. 2014, Article ID 864571, 19 pages, 2014. doi:10.1155/2014/864571 (SCI, IF=1.29)
  • J.-N. Luo, M.-H. Yang, "Multi-level Offline Delegation Transfer in Mobile RFID Networks," Journal of Chung Cheng Institute of Technology, Vol.43, No.2, 2014, pp. 41-50 (EI)
  • M.-H. Yang, "Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet," Scientific World Journal, vol. 2014, Article ID 659894, 2014. doi:10.1155/2014/659894
  • 羅嘉寧, 楊明豪, “基植於NFC系統之匿名行動付款協定,” Journal of Information, Technology and Society, Vol. 14, No. 22, 2014
  • J.-N. Luo, M.-H. Yang, Y.-C. Ho, "EMV-based mobile payment protocol for offline transaction–with the ability of mutual authentication," International Journal of Science and Engineering (IJSE), Vol.5,no1,2015
  • J.-N. Luo, M.-H. Yang, " An Anonymous NFC-Based Payment Protocol," Applied Mechanics and Materials, Vol. 764-765(2015),pp812-816
  • J.-N. Luo, M.-H. Yang, S.-Y. Huang, "An Unlinkable Anonymous Payment Scheme based on near field communication," Computers and Electrical Engineering, Vol. 49 January 2016, pp. 198–206 (SCI, IF=0.817)
  • M.-H. Yang, J.-N. Luo, "Fast Anti-Noise RFID-Aided Medical Care System," International Journal of Distributed Sensor Networks vol. 2015, Article ID 971710, 19 pages, 2014. doi:10.1155/2014/864571 (SCI, IF=1.29)
  • M.-H. Yang, J.-N. Luo, S.-Y. Lu, " A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme," Sensors Vol. 15 No. 10 October 2015, pp. 27087–27115 (SCI, IF=2.245)
  • M.-H. Yang, J.-N. Luo, "A Mobile Authentication System Resists to Shoulder-surfing Attacks," Multimedia Tools and Applications vol. 2016, Article ID 75: 14075. doi:10.1007/s11042-015-3129-9 (SCI)
  • J.-N. Luo, M.-H. Yang, "Analysis and Improvement of Key Distribution Scheme for Secure Group Communication," Journal of Electrical and Computer Engineering (accepted) (EI)
  • J.-N. Luo, M.-H. Yang, "An Anti-Shoulder-surfing Authentication Scheme of Mobile Device,” Journal of Internet Technology, (accepted) (SCI, EI)
  • J.-N. Luo, M.-H. Yang, "Unchained Cellular obfuscation areas for Location Privacy in Continuous Location–based Service Queries,” Wireless Communications and Mobile Computing, (accepted) (SCI)
  • J.-N. Luo, M.-H. Yang, "An offline transferable and divisible M-coupon scheme," Journal of Chung Cheng Institute of Technology, (accepted) (EI)