楊明豪 Yang. Ming-Hour

Journal Papers

  • 1. Y.-C. Tseng, M.-H. Yang, and T.-Y. Juang, "Achieving Fault-Tolerant Multicast in Injured Wormhole-Routed Tori and Meshes Based on Euler Path Construction," IEEE Trans. on Computers, Vol. 48, No.11, Nov. 1999, pp. 1282-96.(SCI, EI)
  • 2. Y.-C. Tseng, M.-H. Yang, Chi-Ming Hsieh, Wen-Hwa Liao, and Jang-ping Sheu, "Data Broadcasting and Seamless Transition for Highly-Demanded Videos," IEEE Trans. on Communications., Vol. 49, No.5, May 2001, pp. 863-874(SCI, EI)
  • 3. M.-H. Yang, "Detecting Backdoors," Information Security Newsletter, Vol. 7 No. 1, Dec. 2000
  • 4. Y.-C. Tseng, M.-H. Yang, and C.-H. Chang, "Recursive Frequency-Splitting Scheme for Broadcasting Hot Videos in VOD Service," IEEE Trans. on Communications, Vol. 50, No. 8, Aug. 2002, pp. 1348-55. (SCI, EI)
  • 5. M.-H. Yang, Y.-C. Tseng, M, -S. Jian, and C. Lin, "Multi-Node Multicast in Three and Higher Dimensional Wormhole Tori and Meshes with Load Balance," Journal of Information Science and Engineering, special issue on Parallel and Distributed Systems, Vol. 18, No. 6, pp. 959-980.(SCIE,EI)
  • 6. M.-H. Yang, and Y.-C. Tseng, "A Borrow-and-Return Model to Reduce Client Waiting Time for Broadcasting-Based VOD Services," IEEE Trans. On Broadcasting, Vol. 49, No. 2, June 2003, pp. 162-169. (SCI,EI)
  • 7. Y.-C. Tseng, L.-W. Chen, M.-H. Yang, and J.-J. Wu, "A Stop-or-Move Mobility Model for PCS Networks and Its Location-Tracking Strategies," Computer Communications, Vol. 26, No. 12, July 2003, pp. 1288-1301. (SCIE,EI)
  • 8. M.-H. Yang, “Polymorphic Worms Detection,” Information Security Newsletter, Vol. 15, No. 2, April 2009, pp. 72-81
  • 9. M.-H. Yang, J.-N. Luo,?“A Random Key Penetration Testing Approach with Polymorphic Detection Avoidance Mechanism,” Journal of Internet Technology, Vol. 10, No. 4, 2009, pp. 393-404 (SCIE, EI)(IF=0.481 COMPUTER SCIENCE, INFORMATION SYSTEMS 104/132 TELECOMMUNICATIONS 61/78)(引用:1)
  • 10. M.-H. Yang, “Lightweight Authentication Protocol for Mobile RFID Networks,” International Journal of Security and Networks, Vol. 5, No. 1, 2010, pp. 53-62 (EI) (引用:29)
  • 11. M.- H. Yang, and S.-P. Shieh, “Tracing Anonymous Mobile Attackers in Wireless Network,” International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 4, No. 4, July 2010, pp 161- 173 (EI)
  • 12. M. -H. Yang, "Polymorphic Penetration Testcode Carrier," International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 4, No. 6, September 2010, pp 48- 61 (EI)
  • 13. M. -H. Yang, "Controlled Delegation Protocol in Mobile RFID Networks," EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 170150, 13 pages, 2010. doi:10.1155/2010/170150 (SCI IF=0.540)
  • ( ENGINEERING, ELECTRICAL & ELECTRONIC 192/243,TELECOMMUNICATIONS 56/78) (引用:9)(德國)(永仁)(引用:4)
  • 14. M.-H. Yang, H.-Y. Hu, "Protocol for ownership transfer across authorities: with the ability to assign transfer target," Security and Communication Networks, Vol. 5, No. 2, February 2012, pp. 164-177, DOI: 10.1002/sec.300 (SCI IF=1.288) (美國) (引用:17)
  • 15. J.-N. Luo, M.-H. Yang, “An E-mail Authentication and Disposable Addressing Scheme for Filtering Spam,” Journal of Convergence Information Technology (JCIT), Vol. 6, No. 2, February 2011, pp. 161-171 (EI) (韓國)
  • 16. M.-H. Yang, "Across-Authority Lightweight Ownership Transfer Protocol," Electronic Commerce Research and Applications (ECRA), Vol. 10, No. 4, July-August 2011, pp. 375- 383 (SSCI, SCI, IF=3.824) (區域網路) (引用: 22)
  • 17. M.-H. Yang, "Security Analysis of Application Layer Protocols on WLAN," Journal of Shanghai Jiaotong University (Science)(J.SJTUS), Vol. 16, No. 5, October 2011, pp. 586- 592 (EI) (區域網路)
  • 18. M.-H. Yang, M. -C. Yang, "RIHT: A Novel Hybrid IP Traceback Scheme," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, April 2012, pp. 789- 796 (SCI, IF=6.013) (單一封包) (美國) (引用:51)
  • 19. J.-N. Luo, M.-H. Yang, “Mobile RFID Mutual Authentication and Ownership Transfer,” International Journal of Advancements in Computing Technology (IJACT), Vol. 4, No. 7, April 2012, pp. 28-40 (EI)(NFC)(韓國) (引用:4)
  • 20. M.-H. Yang, " Secure Multiple Group Ownership Transfer Protocol for Mobile RFID," Electronic Commerce Research and Applications (ECRA) , Vol.11, No.4, 2012, pp.361-373 (SSCI, SCI, IF=3.824) (NFC)(7月,荷蘭) (引用:18)
  • BUSINESS 46/152 Q2
  • 21. M. -H. Yang, Kai-Ping Xie, "TTP-Based Group Ownership Transfer in a Mobile RFID Environment," International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 7, No. 2, January 2013, pp 51-69 (EI) (INSPEC) (韓國)(物流管理)
  • 22. M.-H. Yang, "Cross Authority Ownership Transfer Protocol Using Mobile RFID," International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 7, No. 8 April 2013, pp. 265-283 (INSPEC) (EI) (韓國) (物流管理)
  • 23. J.-N. Luo, M.-H. Yang, "An Anonymous e-Rental Protocol Based On ID-based Cryptography and NFC," Journal of Supercomputing DOI:10.1007/s11227-013-1051-3, Vol.70, No.1, 2014, pp.31-53 (SCI,IF=2.469) (美國) (物流管理) (引用:1)
  • 24. J.-N. Luo, M.-H. Yang, "An Efficient Offline Delegation Protocol in Mobile RFID Environment," International Journal of Networks, vol. 9, no. 5, 2014, pp. 1114-1120 (EI) (芬蘭) (物流管理) (引用:1) (引用:2)
  • 25. M.-H. Yang, "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy," Scientific World Journal, vol. 2014, Article ID 239280, 2014. doi:10.1155/2014/239280 (SCI, IF=1.219) (EI) (物流管理) (引用:3)
  • 26. J.-N. Luo, M.-H. Yang, "Multi-level Offline Delegation Transfer in Mobile RFID Networks," Journal of Chung Cheng Institute of Technology, Vol.43, No.2, 2014, pp. 41-50 (EI) (物流管理)
  • 27. M.-H. Yang, " Security Enhanced EMV-Based Mobile Payment Protocol," Scientific World Journal, vol. 2014, Article ID 864571, 19 pages, 2014. doi:10.1155/2014/864571 (SCI, IF=1.219) (EI) (物流管理) (美國) (引用:3)
  • 28. M.-H. Yang, "Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet," Scientific World Journal, vol. 2014, Article ID 659894, 2014. doi:10.1155/2014/659894 (平台開發) (美國)
  • 29. 羅嘉寧, 楊明豪, “基植於NFC系統之匿名行動付款協定,” Journal of Information, Technology and Society, Vol. 14, No. 22, 2014 (物流管理) (警察大學)
  • 30. J.-N. Luo, M.-H. Yang, Y.-C. Ho, "EMV-based mobile payment protocol for offline transaction–with the ability of mutual authentication," International Journal of Science and Engineering (IJSE), Vol.5, no1, 2015, pp61-66 (平台開發) (台灣)
  • 31. J.-N. Luo, M.-H. Yang, " An Anonymous NFC-Based Payment Protocol," Applied Mechanics and Materials, Vol. 764-765(2015), pp812-816 (平台開發)(美國)
  • 32. M.-H. Yang, J.-N. Luo, "Fast Anti-Noise RFID-Aided Medical Care System," International Journal of Distributed Sensor Networks vol. 2015, Article ID 971710, 19 pages, 2014. doi:10.1155/2014/864571 (SCI, IF=1.151) (美國)(RFID) (引用:0)
  • 33. M.-H. Yang, J.-N. Luo, S.-Y. Lu, " A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme," Sensors Vol. 15 No. 10 October 2015, pp. 27087–27115 (SCI, IF=3.847) (加拿大)(RFID) (引用:12)
  • 34. J.-N. Luo, M.-H. Yang, S.-Y. Huang, "An Unlinkable Anonymous Payment Scheme based on near field communication," Computers and Electrical Engineering, Vol. 49 January 2016, pp. 198–206 (SCI, IF=2.663) (美國)(平台開發) (引用:15)
  • 35. M.-H. Yang, J.-N. Luo, "A Mobile Authentication System Resists to Shoulder-surfing Attacks," Multimedia Tools and Applications vol. 2016, Article ID 75: 14075. doi:10.1007/s11042-015-3129-9 (SCI, IF=2.313) (物流管理) (荷蘭) (引用:7)
  • 36. J.-N. Luo, M.-H. Yang, "Analysis and Improvement of Key Distribution Scheme for Secure Group Communication," Journal of Electrical and Computer Engineering, Volume 2016, Article ID 2750268 (EI) (RFID) (加拿大) (引用:0)
  • 37. J.-N. Luo, M.-H. Yang, "An Anti-Shoulder-surfing Authentication Scheme of Mobile Device,” Journal of Internet Technology, Vol 19 No 4, July 2018, Pages 1263–1272 (SCI, IF=1.14, EI) (數位鑑識2) (台灣) (引用:3)
  • 38. J.-N. Luo, M.-H. Yang, "Unchained Cellular obfuscation areas for Location Privacy in Continuous Location–based Service Queries,” Wireless Communications and Mobile Computing, Volume 2017, Article ID 7391982 (SCI IF=2.146) (數位鑑識) (英國) (引用:4)
  • 39. J.-N. Luo, M.-H. Yang, "An offline transferable and divisible M-coupon scheme," Journal of Chung Cheng Institute of Technology, v46, Nov 2017, pp.51-64 (EI) (數位鑑識) (台灣) (引用:0)
  • 40. 羅嘉寧, 楊明豪, 劉邦良,“以室內定位技術之犯罪嫌疑人移動足跡分析與鑑識,” Journal of Information, Technology and Society, Vol 18, 2018, pp.42-64
  • 41. M. Vijayalakshmi, M. Shalinie, M.-H. Yang, "Design and Analysis of Hybrid Single Packet IP Traceback Scheme," IET Networks, Vol 7 No 3, May 2018, pp.141-151 (EI) (英國) (引用:2)
  • 42. M. Vijayalakshmi, M. Shalinie, M.-H. Yang, " HPSIPT: A High-Precision Single-Packet IP Traceback Scheme," Computer Networks, v143, OCT 2018, p.275-288 (SCI, SCIE IF=5.493) (引用:8) (台灣)
  • 43. J.-N. Luo, M.-H. Yang, "An Improved Single Packet Traceback Scheme for IoT Devices,” Journal of Internet Technology, Vol 20 No 3, May 2019, Pages 887–901 (SCI, IF=1.14, EI) (數位鑑識Ⅱ) (台灣) (引用:1)
  • 44. J.-N. Luo, M.-H. Yang, K.-Y. Tsai, "A Geographic Map-based Middleware Framework to Obfuscate Smart Vehicles' Locations," Multimedia Tools and Applications, Vol 78 No 20, Oct 2019, Pages 28877–28902 (SCI, IF=2.577) (數位鑑識Ⅱ) (引用:3) (荷蘭)
  • 45. Kuo-Yu Tsai, Ming Hour Yang, Jia Ning Luo, Wei-Tim Liew, " Novel Designated Ownership Transfer with Grouping Proof," Applied Sciences, Vol 9 No 4, Feb 2019, (SCI, IF=2.838) (數位鑑識Ⅱ) (瑞士) (引用:9)
  • 46. J.-N. Luo, M.-H. Tsai, N.-W. Lo, C.-Y. Kao, M.-H. Yang, "Ambient Audio Authentication,” Mathematical Biosciences and Engineering, Vol 16 No 6, January 2019, Pages 6562–6586 (SCI, IF=2.194) (數位鑑識Ⅱ)(美國) (引用:4)
  • 47. J.-N. Luo, M.-H. Yang, "An e-cash Scheme with Multiple Denominations and Transferability,” Journal of Internet Technology, Vol 20 No 7, Nov 2019, Pages 2285–2296 (SCI, IF=1.14, EI) (安全轉移) (台灣) (引用:0)
  • 48. J.-N. Luo, M.-H. Yang, "EMV-compatible offline mobile payment protocol with mutual authentication,” Sensors, Vol 19 No 11, Nov 2019, Pages 1–19 (SCI, IF=3.847)(安全轉移) (瑞士) (引用:2)
  • 49. J.-N. Luo, M.-H. Yang, " A Secure Partial Ownership Transfer Protocol with Multi-owners,” Sensors, Vol 20 No 1, January 2020, Pages 1–18 (SCI, IF=3.847)(安全轉移)(瑞士) (引用:6) (當年度Q1)
  • 50. S. Ahmed, S. Kumari, M. A. Saleem, K. Agarwal, K. Mahmood, M.-H. Yang, "Anonymous Key-Agreement Protocol for V2G Environment within Social internet of Vehicles,” IEEE Access, Vol 8, June 2020, pages 119829-119839 (SCI, IF=3.758) (引用:6)
  • 51. M. Vijayalakshmi, M. Shalinie, M.-H. Yang, Rajameenakshmi U, "WEB Phishing Detection Techniques: A Survey on The State-of-The-Art, Taxonomy and Future Directions," IET Networks, Vol 9 Issue 5, July 2020, pages 139244-139254 (EI) (引用:7)
  • 52. S. A. Chaudhry, K. Yahya, F. Al-Turjman, M.-H. Yang, "A secure and reliable device access control scheme for IoT based sensor cloud systems,” IEEE Access, Vol 8, July 2020, pages 139244-139254 (SCI, IF=3.758) (引用:42)
  • 53. M.-H. Yang, J.-N. Luo, M. Vijayalakshmi, M. Shalinie, "Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices," IEEE Access, Vol 8, Oct 2020, pages 201087-201097 (SCI, IF=3.758) (引用:4)
  • 54. V. S. Naresh, S. Reddi, S. Kumari, V V L D. Allavarpu, S. Kumar, M.-H. Yang, "Practical Identity based online/off-line signcryption scheme for secure communication in Internet of Things,” IEEE Access, Vol 9, Jan 2021, pages 21267-21278 (SCI, IF=3.758) (引用:6)
  • 55. A. K. Biswal, D. Singh, B. K. Pattanayak, D. Samanta, M.-H. Yang, "IOT-based Smart Alert System for Drowsy Driver Detection,” Wireless Communications and Mobile Computing, Mar 2021 (SCI, IF=2.146) (引用:18)
  • 56. Luo, Jia-Ning, Chang-Ming Wu, Ming-Hour Yang" A CAN-Bus Lightweight Authentication Scheme,” Sensors, Vol 21 No 21, October 2021, (SCI, IF=3.847)(瑞士) (引用:0)(當年度Q1)
  • 57. M. Vijayalakshmi, S. Mercy Shalinie, Ming Hour Yang, Shou-Chuan Lai, Jia-Ning Luo" A Blockchain-based Secure radio frequency identification ownership transfer protocol,” Security and Communication Networks, Jan 2022 (SCIE, IF=1.968) (英國) (引用:1)
  • 58. Shin-Jia Ho, Yu-Shan Hsu, Chien-Hung Lai, Fong-Han Chen, Ming-Hour Yang " Applying Game-Based Experiential Learning to Comprehensive Sustainable Development-Based Education," Sustainability, 2022 (SCIE, IF=3.889) (瑞士) (引用:0)
  • 59. Ming-Hour Yang, Jia-Ning Luo, M. Vijayalakshmi, S. Mercy Shalinie " Contactless Credit Cards Payment Fraud Protection by Ambient Authentication," Sensors, 2022 (SCI, IF=3.847) (瑞士) (引用:0)
  • 60. P Tyagi, S Kumari, BA Alzahrani, A Gupta, Ming-Hour Yang "An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT," Sensors, 2022 (SCI, IF=3.847) (瑞士) (引用:1)
  • 61. Ming-Hour Yang; Yu-Shan Hsu; Hung-Yu Ko, "Dispute Resistance Multilayered RFID Partial Ownership Transfer With Blockchain,” IEEE Access, Vol 10, Dec 2022, (SCI, IF=3.758) (引用:0)
  • 62. Yang, M. H., Chen, C. H., Luo, J. N., Vijayalakshmi, M., & Shalinie, S. M, "An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile Readers,” IEEE Systems Journal, 2023, (SCI, IF=4.802) (引用:0)