楊明豪 Yang. Ming-Hour

Journal Papers

  • Y.-C. Tseng, M.-H. Yang, and T.-Y. Juang, "Achieving Fault-Tolerant Multicast in Injured Wormhole-Routed Tori and Meshes Based on Euler Path Construction," IEEE Trans. on Computers, Vol. 48, No.11, Nov. 1999, pp. 1282-96.(SCI, EI)
  • Y.-C. Tseng, M.-H. Yang, Chi-Ming Hsieh, Wen-Hwa Liao, and Jang-ping Sheu, "Data Broadcasting and Seamless Transition for Highly-Demanded Videos," IEEE Trans. on Communications., Vol. 49, No.5, May 2001, pp. 863-874(SCI, EI)
  • M.-H. Yang, "Detecting Backdoors," Information Security Newsletter, Vol. 7 No. 1, Dec. 2000
  • Y.-C. Tseng, M.-H. Yang, and C.-H. Chang, "Recursive Frequency-Splitting Scheme for Broadcasting Hot Videos in VOD Service," IEEE Trans. on Communications, Vol. 50, No. 8, Aug. 2002, pp. 1348-55. (SCI, EI)
  • M.-H. Yang, Y.-C. Tseng, M, -S. Jian, and C. Lin, "Multi-Node Multicast in Three and Higher Dimensional Wormhole Tori and Meshes with Load Balance," Journal of Information Science and Engineering, special issue on Parallel and Distributed Systems, Vol. 18, No. 6, pp. 959-980.(SCIE,EI)
  • M.-H. Yang, and Y.-C. Tseng, "A Borrow-and-Return Model to Reduce Client Waiting Time for Broadcasting-Based VOD Services," IEEE Trans. on Broadcasting, Vol. 49, No. 2, June 2003, pp. 162-169. (SCI,EI)
  • Y.-C. Tseng, L.-W. Chen, M.-H. Yang, and J.-J. Wu, "A Stop-or-Move Mobility Model for PCS Networks and Its Location-Tracking Strategies," Computer Communications, Vol. 26, No. 12, July 2003, pp. 1288-1301. (SCIE,EI)
  • M.-H. Yang, “Polymorphic Worms Detection,” Information Security Newsletter, Vol. 15, No. 2, April 2009, pp. 72-81
  • M.-H. Yang, J.-N. Luo, “A Random Key Penetration Testing Approach with Polymorphic Detection Avoidance Mechanism,” Journal of Internet Technology, Vol. 10, No. 4, 2009, pp. 393-404 (SCIE, EI)
  • M.-H. Yang, “Lightweight Authentication Protocol for Mobile RFID Networks,” International Journal of Security and Networks, Vol. 5, No. 1, 2010, pp. 53-62 (EI)
  • M.- H. Yang, and S.-P. Shieh, “Tracing Anonymous Mobile Attackers in Wireless Network,” International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 4, No. 4, July 2010, pp 161- 173 (EI)
  • M. -H. Yang, "Polymorphic Penetration Testcode Carrier," International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 4, No. 6, September 2010, pp 48- 61 (EI)
  • M. -H. Yang, "Controlled Delegation Protocol in Mobile RFID Networks," EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 170150, 13 pages, 2010. doi:10.1155/2010/170150 (SCI, IF=0.815)
  • M.-H. Yang, H.-Y. Hu, "Protocol for Ownership Transfer Across Authorities- with the ability to assign transfer target," Security and Communication Networks, Vol. 5, No. 2, February 2012, pp. 164-177, DOI: 10.1002/sec.300 (SCI, IF=0.356)
  • J.-N. Luo, M.-H. Yang, “An E-mail Authentication and Disposable Addressing Scheme for Filtering Spam,” Journal of Convergence Information Technology (JCIT), Vol. 6, No. 2, February 2011, pp. 161-171 (EI)
  • M.-H. Yang, "Across-Authority Lightweight Ownership Transfer Protocol," Electronic Commerce Research and Applications (ECRA), Vol. 10, No. 4, July-August 2011, pp. 375- 383 (SSCI, SCI, IF=1.946)
  • M.-H. Yang, "Security Analysis of Application Layer Protocols on WLAN," Journal of Shanghai Jiaotong University (Science)(J.SJTUS), Vol. 16, No. 5, October 2011, pp. 586- 592 (EI)
  • M.-H. Yang, M. -C. Yang, "RIHT: A Novel Hybrid IP Traceback Scheme," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, April 2012, pp. 789- 796 (SCI, IF=1.725)
  • J.-N. Luo, M.-H. Yang, “Mobile RFID Mutual Authentication and Ownership Transfer,” International Journal of Advancements in Computing Technology (IJACT),Vol. 4, No. 7, April 2012, pp. 28-40 (EI)
  • M.-H. Yang, " Secure Multiple Group Ownership Transfer Protocol for Mobile RFID," Electronic Commerce Research and Applications (ECRA) , Vol.11, No.4, 2012, pp.361-373 (SSCI, SCI, IF=1.472)
  • M. -H. Yang, Kai-Ping Xie, "TTP-Based Group Ownership Transfer in a Mobile RFID Environment," International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 7, No. 2, January 2013, pp 51-69 (INSPEC)
  • M.-H. Yang, "Cross Authority Ownership Transfer Protocol Using Mobile RFID," International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 7, No. 8 April 2013, pp. 265-283 (INSPEC)
  • J.-N. Luo, M.-H. Yang, "An Anonymous e-Rental Protocol Based On ID-based Cryptography and NFC," Journal of Supercomputing DOI:10.1007/s11227-013-1051-3 , Vol.70, No.1, 2014, pp.31-53 (SCI, IF=0.917)
  • J.-N. Luo, M.-H. Yang, "An Efficient Offline Delegation Protocol in Mobile RFID Environment," International Journal of Networks, vol. 9, no. 5, 2014, pp. 1114-1120 (EI)
  • M.-H. Yang, "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy," Scientific World Journal, vol. 2014, Article ID 239280, 2014. doi:10.1155/2014/239280 (SCI, IF=1.29)
  • M.-H. Yang, " Security Enhanced EMV-Based Mobile Payment Protocol," Scientific World Journal, vol. 2014, Article ID 864571, 19 pages, 2014. doi:10.1155/2014/864571 (SCI, IF=1.29)
  • J.-N. Luo, M.-H. Yang, "Multi-level Offline Delegation Transfer in Mobile RFID Networks," Journal of Chung Cheng Institute of Technology, Vol.43, No.2, 2014, pp. 41-50 (EI)
  • M.-H. Yang, "Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet," Scientific World Journal, vol. 2014, Article ID 659894, 2014. doi:10.1155/2014/659894
  • 羅嘉寧, 楊明豪, “基植於NFC系統之匿名行動付款協定,” Journal of Information, Technology and Society, Vol. 14, No. 22, 2014
  • J.-N. Luo, M.-H. Yang, Y.-C. Ho, "EMV-based mobile payment protocol for offline transaction–with the ability of mutual authentication," International Journal of Science and Engineering (IJSE), Vol.5,no1,2015
  • J.-N. Luo, M.-H. Yang, " An Anonymous NFC-Based Payment Protocol," Applied Mechanics and Materials, Vol. 764-765(2015),pp812-816
  • J.-N. Luo, M.-H. Yang, S.-Y. Huang, "An Unlinkable Anonymous Payment Scheme based on near field communication," Computers and Electrical Engineering, Vol. 49 January 2016, pp. 198–206 (SCI, IF=0.817)
  • M.-H. Yang, J.-N. Luo, "Fast Anti-Noise RFID-Aided Medical Care System," International Journal of Distributed Sensor Networks vol. 2015, Article ID 971710, 19 pages, 2014. doi:10.1155/2014/864571 (SCI, IF=1.29)
  • M.-H. Yang, J.-N. Luo, S.-Y. Lu, " A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme," Sensors Vol. 15 No. 10 October 2015, pp. 27087–27115 (SCI, IF=2.245)
  • M.-H. Yang, J.-N. Luo, "A Mobile Authentication System Resists to Shoulder-surfing Attacks," Multimedia Tools and Applications vol. 2016, Article ID 75: 14075. doi:10.1007/s11042-015-3129-9 (SCI)
  • J.-N. Luo, M.-H. Yang, "Analysis and Improvement of Key Distribution Scheme for Secure Group Communication," Journal of Electrical and Computer Engineering (accepted) (EI)
  • J.-N. Luo, M.-H. Yang, "An Anti-Shoulder-surfing Authentication Scheme of Mobile Device,” Journal of Internet Technology, (accepted) (SCI, EI)
  • J.-N. Luo, M.-H. Yang, "Unchained Cellular obfuscation areas for Location Privacy in Continuous Location–based Service Queries,” Wireless Communications and Mobile Computing, (accepted) (SCI)
  • J.-N. Luo, M.-H. Yang, "An offline transferable and divisible M-coupon scheme," Journal of Chung Cheng Institute of Technology, (accepted) (EI)
  • S. Ahmed, S. Kumari, M. A. Saleem, K. Agarwal, K. Mahmood, M.-H. Yang, "Anonymous Key-Agreement Protocol for V2G Environment within Social internet of Vehicles,” IEEE Access, Vol 8, June 2020, pages 119829-119839 (SCI, IF=3.758)
  • M. Vijayalakshmi, M. Shalinie, M.-H. Yang, Rajameenakshmi U, "WEB Phishing Detection Techniques: A Survey on The State-of-The-Art, Taxonomy and Future Directions," IET Networks, Vol 9 Issue 5, July 2020, pages 139244-139254
  • S. A. Chaudhry, K. Yahya, F. Al-Turjman, M.-H. Yang, "A secure and reliable device access control scheme for IoT based sensor cloud systems,” IEEE Access, Vol 8, July 2020, pages 139244-139254 (SCI, IF=3.758)
  • M.-H. Yang, J.-N. Luo, M. Vijayalakshmi, M. Shalinie, "Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices," IEEE Access, Vol 8, Oct 2020, pages 201087-201097 (SCI, IF=3.758)
  • V. S. Naresh, S. Reddi, S. Kumari, V V L D. Allavarpu, S. Kumar, M.-H. Yang, "Practical Identity based online/off-line signcryption scheme for secure communication in Internet of Things,” IEEE Access, Vol 9, Jan 2021, pages 21267-21278 (SCI, IF=3.758)
  • A. K. Biswal, D. Singh, B. K. Pattanayak, D. Samanta, M.-H. Yang, "IOT-based Smart Alert System for Drowsy Driver Detection,” Wireless Communications and Mobile Computing, Mar 2021 (SCI, IF=2.146)
  • Luo, Jia-Ning, Chang-Ming Wu, Ming-Hour Yang" A CAN-Bus Lightweight Authentication Scheme,” Sensors, Vol 21 No 21, October 2021, (SCI, IF=3.847)
  • M. Vijayalakshmi, S. Mercy Shalinie, Ming Hour Yang, Shou-Chuan Lai, Jia-Ning Luo" A Blockchain-based Secure radio frequency identification ownership transfer protocol,” Security and Communication Networks, Jan 2022 (SCIE, IF=1.968)
  • Shin-Jia Ho, Yu-Shan Hsu, Chien-Hung Lai, Fong-Han Chen, Ming-Hour Yang " Applying Game-Based Experiential Learning to Comprehensive Sustainable Development-Based Education," Sustainability, 2022 (SCIE, IF=3.889)
  • Ming-Hour Yang, Jia-Ning Luo, M. Vijayalakshmi, S. Mercy Shalinie " Contactless Credit Cards Payment Fraud Protection by Ambient Authentication," Sensors, 2022 (SCI, IF=3.847)
  • P Tyagi, S Kumari, BA Alzahrani, A Gupta, Ming-Hour Yang "An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT," Sensors, 2022 (SCI, IF=3.847)
  • Ming-Hour Yang; Yu-Shan Hsu; Hung-Yu Ko, "Dispute Resistance Multilayered RFID Partial Ownership Transfer With Blockchain,” IEEE Access, Vol 10, Dec 2022, (SCI, IF=3.758)
  • Yang, M. H., Chen, C. H., Luo, J. N., Vijayalakshmi, M., & Shalinie, S. M, "An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile Readers,” IEEE Systems Journal, 2023, (SCI, IF=4.802)