楊明豪 Yang. Ming-Hour

Conference Papers

  • 1. Y.-C. Tseng, T.-Y. Juang, and M.-H. Yang, "A Euler-Path-Based Model for Wormhole-Routed Networks:It’s Applications to Damaged 2D Tori and Meshes," Int'l Performance, Computing, and Communication Conf.(IPCCC), 1997 pp. 444-450
  • 2. Y.-C. Tseng, M.-H. Yang, and T.-Y. Juang, "An Euler-Path-Based Multicasting Model for Wormhole-Routed Networks with Multi-Destination Capability," Int'l Conf. on Parallel Processing(ICPP), 1998 pp. 366-373.
  • 3. Y.-C. Tseng, M.-H. Yang, and T.-Y. Juang, "An Euler-Path-Based Multicasting Model for Wormhole-Routed Networks with Multi-Destination Capability," Wokshop on Distributed System Technology and Applications ((一九九八分散式系統及應用研討會), 1998 .
  • 4. K.-W. Chen, M.-H. Yang, Y.-C. Tseng, and J.-P. Sheu, "Channel-Combine Strategies for On-Demand Multicast on Mobile Wireless Networks," Int'l Computer Symposium, Workshop on Computer Networks, Internet, and Multimedia, Taiwan, 1998 pp60-67.
  • 5. Y.-C. Tseng, Chi-Ming Hsieh, M.-H. Yang, Wen-Hwa Liao, and Jang-ping Sheu, "Data Broadcasting and Seamless Transition for Highly-Demanded Videos," INFOCOM, 2000 pp. 727-736
  • 6. M.-H. Yang, L.-W. Chen, and Y.-C. Tseng, "The Location Tracking Problem Based on a Traveling Salesman Moving Model," Mobile Computing Workshop, 2000 pp. 113-120
  • 7. M.-H. Yang, Y.-C. Tseng, M, -S. Jiam, and C. Lin, "Multi-Node Multicast in Three and Higher Dimensional Wormhole Tori and Meshes with Load Balance," Int'l Conf. on Parallel Processing (ICPP), 2000 pp. 25-32
  • 8. M.-H. Yang, L.-W. Chen, and Y.-C. Tseng, "A traveling Salesman Mobility Model and Its Location Tracking in PCS Networks," International Conference on Distributed Computing Systems(ICDCS), 2001 pp.517-523
  • 9. F.-Y. Lee, S.-P. Shieh, and M.-H. Yang, “Tracing the Sources of Single-Packet Attacks,” Information Security Conference, 2004 pp.9-22
  • 10. K.-H. Chou, S.-P. Shieh, M.-H. Yang and F.-Y. Lee, “Marking-Based Source Identification Scheme for Defending Against DDoS Attacks,” Information Security Conference, 2004 pp.23-28
  • 11. 楊明豪,李軒豪,廖柏穎,胡弘淵,李國瑋, “追蹤無線網路匿名移動癱瘓服務攻擊者感測網路,” National Conference Symposium, 2007 pp.418-426
  • 12. 楊明豪,李昱霖,李佳鴻,蔡宗成, ”IEEE 802.11 WLAN存取控制之弱點研究與攻擊偵測,” 國防科技學術合作計劃成果發表會, 2007
  • 13. 楊明豪,陳銘乾, “以Chameleon動態保護RFID使用者隱私,” National Conference Symposium, 2007 pp.375-384
  • 14. M.-H. Yang, C.-S. Chiu, and Shiuhpyng Shieh, ” Tracing Mobile Attackers in Wireless Ad-hoc Network,” SLAECE in conjunction with International Conference on Internet and Web Applications and Services (ICIW), 2008 pp.7-12 (Best Paper Award) (EI)
  • 15. M.-H. Yang, Jain-Shing Wu, and Shih-Jen Chen, “Protect Mobile RFID Location Privacy Using Dynamic Identity,” IEEE International Conference on Cognitive Informatics (ICCI) 2008 pp.366-374 (EI)
  • 16. 楊明豪,羅嘉寧,李佳鴻, “Lightweight Mobile RFID Authentication Protocol for Location Privacy,”2008資訊管理及應用國際研討會pp.435-446
  • 17. 楊明豪,羅嘉寧,李昱霖, ”Mobile RFID雙向認證及所有權轉移,” Taiwan Academic network conference (Tanet08), 2008 pp. 133-138
  • 18. 楊明豪,羅嘉寧,許明淵,吳建興,陳世仁, ”具變形躲避偵測機制穿透測試載具,” Taiwan Academic network conference (Tanet08), 2008 pp. 105-110 (Best Paper Award)
  • 19. 楊明豪,羅嘉寧,簡辰澔, “以COMP-128為基礎的行動無線射頻認證協定,” National Symposium on Telecommunications (NST08), 2008
  • 20. M.-H. Yang, J.-N. Luo, “Authentication Protocol in Mobile RFID Network,” The Fourth International Conference on Systems (ICONS’09), 2009 pp. 108-113 (EI),法國 2009.3.1-6
  • (引用:3+3) (引用:6+4)
  • 21. J.-N. Luo, M.-H. Yang, “Using E-mail Authentication and Disposable E-mail Addressing for Filtering Spam,” International Symposium on Pervasive Systems, Algorithms and Networks, 2009 pp.356-363 (EI)高雄2009.11.14-16 (引用:1) (引用:1)
  • 22. 楊明豪,曾詠仁, ”限制讀取次數之Mobile RFID委任協定,” Taiwan Academic network conference (Tanet09), 2009’ 彰化.2009.10.28-30
  • 23. 楊明豪,蔡宗成 “Mobile RFID跨領域所有權轉移,” National Computer Symposium, 2009 pp. 508-519,新北2009.11.27-28
  • 24. 楊明豪,胡弘淵, “指定對象跨領域所有權轉移,” Information Technologies, Applications and Management Conference, June 2010. 高雄 2010.6.25
  • 25. 楊明豪,胡弘淵,李國瑋, ”安全Mobile RFID 標籤所有權轉移協定,”Taiwan Academic network conference (Tanet'10), 2010,台南 2010.10.27-29
  • 26. J.-N. Luo, M.-H. Yang, “Mobile RFID Mutual Authentication and Ownership Transfer,” The Sixth International Conference on Systems (ICONS 2011),2011 pp. 88-94 (EI),荷蘭2011.1.23-28 (引用:1+2)
  • 27. 楊明豪, "利用無線網路的應用層安全研究," International Conference on Information Security & The First Cross-Straits Conference on Information Security (CSCIS 2011), 2011 ,杭州2011.4.13-15
  • 28. 羅嘉寧, 楊明豪, 許博宇, "行動式無線射頻技術委任授權協定之分析及改良," Cryptology and Information Security Conference, 2011,虎尾 2011.5.26-27
  • 29. 楊明豪, 羅嘉寧, 謝凱評, "安全多群組RFID標籤所有權轉移協定," Taiwan Academic network conference (Tanet'11), 2011,宜蘭 2011.10.24-26
  • 30. 羅嘉寧, 楊明豪, 姚佳政," 防止肩窺攻擊之圖形化密碼機制," National Symposium on Telecommunications (NST11), 2011,花蓮 2011.11.18-19
  • 31. 楊明豪, 羅嘉寧, 謝凱評, "跨領域群組RFID標籤所有權轉移協定," National Computer Symposium, 2011,嘉義 2011.12.2-3
  • 32. M.-C. Yang, M.-H. Yang, "Reliability Analysis of Balanced Hypercubes," IEEE Computing, Communications & Applications Conference (ComComAp) ,2012 pp. 376-379 (EI),香港2012.1.11~13 (引用:2)
  • 33. J.-N. Luo, M.-H. Yang, M.-C. Yang, M.-C. Tseng, "Offline Delegation Protocol for Mobile RFID," IEEE International Conference on Communication, Networks and Satellite (ComNetSat), 2012 pp. 138-141,(EI)峇里島2012..7.12~14 (引用:0)
  • 34. J.-N. Luo, M.-H. Yang, " An Efficient Delegation Protocol in Mobile RFID Networks," International Conference on Information Security and Intelligent Control, ISIC 2012 pp. 160-163 (EI)雲林,2012.8.14~16 (引用:0)
  • 35. 楊明豪, 羅嘉寧, 謝學和, "具實用性高精確度低儲存量的複合單一封包溯源機制," Taiwan Academic network conference (Tanet'12), 2012 桃園,2012.10.23-25
  • 36. 羅嘉寧, 楊明豪, 翁博亭,"基植於NFC手機之匿名租車系統," Taiwan Academic network conference (Tanet'12), 2012桃園,2012.10.23-25
  • 37. J.-N. Luo, Ming-Hour Yang,M. -C. Yang " An Anonymous Car Rental System Based on NFC," International Symposium on Biometrics and Security Technologies, (ISBAST’13)2013 (EI)四川,2013.7.2-5 (引用:1)
  • 38. 李維哲, 蔡承諺, 楊佳蓁, 楊明豪"以NFC手機實作自動汽車租賃系統," National Computer Symposium, 2013台中,2013.12.13-14
  • 39. 楊明豪, 洪聖翔,"相容EMV具雙向認證且適合離線及線上交易之行動付款協定," Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'13), 2013 苗栗,2013.8.27-28
  • 40. 羅嘉寧, 楊明豪, 黃思穎, 蔡卓倫"相容於NFC之匿名行動付款協定," Taiwan Academic network conference (Tanet'13), 2013 台中,2013.10.23-25
  • 41. J.-N. Luo, M.-H. Yang, "A Novel Graphical Password Scheme Resistant to Shoulder Surfing Attacks", The 2014 FTRA International Workshop on Advanced Multimedia Computing (AMC-14),2014 (EI) 韓國 濟州島 2014.4.23-25 (Selected paper)
  • 42. 羅嘉寧, 楊明豪, 梁少鵬,"基於 NFC 手機之可轉移與可分割之匿名行動優惠券"Cryptology and Information Security Conference, 2014 台北, 2014.5.30-31
  • 43. M.-H. Yang , J.-N. Luo, M. -C. Yang,Wei Chun Hsu " High Accuracy and Low Storage Hybrid IP Traceback "The 2014 International Conference on Computer, Information and Telecommunication Systems (CITS 2014),2014 (EI) 韓國 濟州島 2014.7.7-9 (Best Paper Award) (引用:0)
  • 44. M. -C. Yang, J.-N. Luo, M.-H. Yang " Super Connectivity of Burnt Pancake Graphs " Public Health Conference 2014 (PHC 2014),2014 泰國 曼谷 2014.7.12-14
  • 45. 羅嘉寧, 楊明豪, 何宇承, “EMV-based mobile payment protocol for offline transaction – with the ability of mutual authentication,” Mobile Computing 2014 台灣 台南2014.8.26-27 (Selected paper)
  • 46. J.-N. Luo, Ming-Hour Yang, " An Anonymous NFC-Based Payment Protocol" International Conference on Engineering and Technology Innovation (ICETI 2014),2014 台灣 墾丁 2014.10.31-11.4 (Selected paper)
  • 47. 楊明豪, 羅嘉寧, 邱柏銓,"鏈狀蜂巢模糊區域保護連續查詢位置隱私," Taiwan Academic network conference (Tanet'14)," 2014 台灣 高雄 2014.10.22-24
  • 48. 羅嘉寧, 楊明豪, 何宇承, 劉邦良,"相容EMV具雙向認證之離線行動付款協定," International Conference on Information Management, 2015台北, 2015.5.23
  • 49. 羅嘉寧, 楊明豪, 蔡卓倫, 張翎翎,"行動裝置防肩窺之身分認證機制," Cryptology and Information Security Conference, 2015高雄, 2015.5.28-5.29
  • 50. 楊明豪, 羅嘉寧, 呂紹永,"基於供應鏈管理所需針對大量標籤之多層式群組證明," Cryptology and Information Security Conference, 2015高雄, 2015.5.28-5.29
  • 51. J.-N. Luo, M.-H. Yang, " An offline transferable and divisible mobile coupon based on NFC" International Conference on Computing, Mechanical and Electronics Engineering (ICCMEE'2015),2015 新加坡 2015.7.9-7.10
  • 52. Ming-Hour Yang, J.-N. Luo, S.-Y. Lu, "A Multilayered Grouping Proof Method for Improving Cargo Management," Asia-Pacific Conference on Engineering & Applied Sciences (APCES 2015), 2015 Osaka, 日本 2015.8.25-27
  • 53. 楊明豪, 羅嘉寧, 李維哲, “EMV-based offline payment with multiple cards,” Mobile Computing, 2015 南投 2015.8.25-26
  • 54. 楊明豪, 羅嘉寧, 徐世杰, “可轉移之多面額電子現金,” Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'15), 2015南投 2015.8.25-26
  • 55. 楊明豪, 羅嘉寧, 蔡承諺, “熱門景點斷鏈位置隱私保護方法,” 第26屆全國資訊安全會議, 2016台中 2016.5.26-27
  • 56. J.-N. Luo, M.-H. Yang, C.-L. Tsai, "Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism," International Conference on Network and System Security (NSS 2016), 2016 台北 2016.9.28-30
  • 57. 楊明豪, 羅嘉寧, 黃柏燁, “基於藍牙低功耗之群組證明,” Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'16), 2016 南投 2016.8.23-24
  • 58. 羅嘉寧, 楊明豪, 張翎翎, 邱輝展,"基於使用者行為之防肩窺攻擊行動裝置認證機制," Taiwan Academic network conference (Tanet'16), 2016 花蓮 2016.10.19-21
  • 59. 羅嘉寧, 楊明豪, 劉邦良, 蔡孟軒,"基於室內定位技術之使用者移動足跡分析," Taiwan Academic network conference (Tanet'16), 2016 花蓮 2016.10.19-21
  • 60. 邱建勳, 羅嘉寧, 楊明豪, “球型鑑識機器人之定位與控制之研究,” Symposium on Digital Life Technologies (DLT’17), 2017 嘉義 2017.6.24-25
  • 61. 段榮成, 羅嘉寧, 楊明豪, “使用NS3模擬具重組性低存儲量複合式封包溯源機制以追蹤攻擊者,” Symposium on Digital Life Technologies (DLT’17), 2017 嘉義 2017.6.24-25
  • 62. Wei Tim Liew, Kuo-Yu Tsai, Jia Ning Luo, Ming Hour Yang, " Novel Designated Ownership Transfer with Grouping Proof," IEEE Dependable and Secure Computing (DSC’17), 2017 台北2017.8.7-10
  • 63. Jia Ning Luo, Ming Hour Yang, " Improved Single Packet Traceback Scheme with Bloom Filters,” EAI international conference on IOT as a Service (IOTaaS’17) , 2017, 台中 2017.9.20-22
  • 64. Jia Ning Luo, Ming-Hour Yang, Kuo-Yu Tsai " A Geographic Map-based Middleware Framework to Obfuscate Mobile Phone’s Location, " International Workshop on Multimedia Technology for Intelligent Computing (MUTEC 2017) , 2017, 馬來西亞 沙巴 2017.7.11-14
  • 65. Jia Ning Luo, Ming-Hour Yang, “Multiple-Denomination E-Cash,” IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 2018 台中 2018.5.19-21
  • 66. Jia-Ning Luo, Ming-Hour Yang, Mu-En Wu and Raylin Tso, “Positioning Algorithm for Feature Matching and Map Building,” International Scientific Conference on Engineering and Applied Sciences (ISCEAS), 2018 沖繩 2018.6.27-29
  • 67. 蔡孟軒,羅嘉寧,楊明豪,高誌陽," 以音頻為基礎之環境因子認證," Cryptology and Information Security Conference, 2018 台北 2018.5.24-25
  • 68. 羅嘉寧,楊明豪,林奕成," 基於被動室內定位技術之使用者路徑預測," Cryptology and Information Security Conference, 2018 台北 2018.5.24-25
  • 69. Jia-Ning Luo, Ming-Hour Yang, Mu-En Wu and Raylin Tso, “Forensic Analysis of Criminal Suspects’ Footprints with Indoor Positioning Technology,” 12th Biennial Convention of the Pacific and Asian Communication Association, 2018 馬來西亞-沙巴 2018.7.4-6
  • 70. Jia-Ning Luo, Ming-Hour Yang, “Offline Transferable E-Cash mechanism,” The 2018 IEEE Conference on Dependable and Secure Computing, 2018 高雄 2018.12.10-13
  • 71. Meng-Hsuan Tsai, Jia-Ning Luo, Ming-Hour Yang, Nai-Wei Lo, “Location Tracking and Forensic Analysis of Criminal Suspects’ Footprints,” 2019 International Conference on Information and Computer Technologies (ICICT 2019) 夏威夷 2019.3.14-17
  • 72. Jia Ning Luo, Ming-Hour Yang, “User Path Prediction Based on Passive Indoor Location Technology,” Asia Joint Conference on Information Security, 日本神戶, 2019.8.1-8.2
  • 73. 黃奕升, 楊明豪, 羅嘉寧, “真實來源標記轉存混合單一封包回溯機制,” Workshop on Wireless, Ad Hoc and Sensor Networks (WANS'19), 2019 台南 2019.8.26-27
  • 74. 謝俊宏, 楊明豪, 羅嘉寧, 徐玉姍,"安全多擁有者共有群組標籤所有權轉移協定," Taiwan Academic network conference (Tanet'19), 2019 高雄 2019.9.25-27
  • 75. 林亞吟, 魯家瑜, 楊明豪, 羅嘉寧, 吳章銘,"車用控制區域網路安全防護系統," 全國計算機會議National Computer Symposium, 2019 金門 2019.11.14-15
  • 76. 林緯彤, 楊明豪, 羅嘉寧, 吳章銘, 徐玉姍, "在CAN-Bus上的輕量認證方法," 全國資訊安全會議, 2021 台北 2021.8.5-6
  • 77. 柯宏諭, 楊明豪, 羅嘉寧, and 徐玉姍, "基於區塊鏈及群組證明之Mobile RFID多階層所有權轉移," NCS 2021全國計算機會議, 2021.台中 2021.12.10-12
  • 78. Jia-Ning Luo and Ming-Hour Yang, “An RFID Ownership Transfer based on Multiple Owners with Different Weights,” 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, 台灣台中, 2021.11.18-20
  • 79. 許孝銓, 楊明豪, 羅嘉寧,徐玉姍 “基於新版EMV發展偽造應用選擇攻擊與中繼攻擊預防方法,” 全國資訊安全會議, 2022, 線上會議, 2022.6.16-17 (最佳論文佳作)
  • 80. 郭子正, 楊明豪, 徐玉姍, 羅嘉寧 “輕量化安全感測資料聚合方法,” 第十七屆無線、隨意及感測網路研討會, 台中, 2022.8.26-27
  • 81. 吳翰泓, 黎俊榮, 楊明豪, 徐玉姍“基於聯盟鏈之基因定序服務與交易框架,” 2022台灣網際網路研討會,2022.12.15-17
  • 82. 方竹安,楊明豪,羅嘉寧,徐玉姍“基於不同權重之安全多 RFID 標籤所有權轉移方法,”2022台灣網際網路研討會, 2022.12.15-17
  • 83. Yu-Shan Hsu, Ming-Hour Yang, “Secure Credit Card Transactions Against Location Fraud,” International Conference on Artificial Intelligence and Internet of Things, 2023 滁州 2023.7.10-12
  • 84. Yu-Shan Hsu, Ming-Hour Yang, I-An Lin, Yao-Yang Tsai, “Smart Manufacturing Security Challenges and Solutions,” IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 2023 墾丁 2023.7.17-19
  • 85. 朱吉裕, 徐玉姍, 楊明豪, 吳章銘 “基於時鐘偏移之車用網路入侵偵測系統,” 第十八屆無線、隨意及感測網路研討會, 基隆, 2022.8.28-29
  • 86. Yu-Shan Hsu, Chun-Jung Chang, Ming-Hour Yang, “An Efficient and Secure Method for Ownership Transfer with Different Weights,” The 5th International Conference on Information System and System Management (ISSM 2024), 泰國清邁, 2024.8.9-11