楊明豪 Yang. Ming-Hour

Other Publications

Books/Book Chapters

  • 1. J.-N. Luo, M.-H. Yang, “A Mobile RFID authentication scheme based on the COMP-128 algorithm,” a book chapter in Radio Frequency Identification Fundamentals and Application, IN-TECH Publishing, edited by Vedran Kordic, Feb 2010
  • 2. 楊明豪, 蔡宗成, 胡凱勛, A book chapter in “WLAN應用層認證弱點,” a book chapter in 資訊安全專論, 財團法人國家實驗研究院科技政策研究與資訊中心, 2008
  • 3. M. –H. Yang and S.-P. Shieh, A book chapter in “分散式癱瘓服務攻擊解決策略--追蹤匿名攻擊者,” in 資訊安全專論, 財團法人國家實驗研究院科技政策研究與資訊中心, 2006
  • 4. M.-H. Yang, A Book Chapter in “網際網路攻防技術與實例,”財團法人國家實驗研究院科技政策研究與資訊中心, edited by ShihPing Shiuh, June 2005
  • 5. M.-H. Yang and Y.-C. Tseng, A Book Chapter in "Distributed Multimedia Databases: Techniques and Applications," Idea Group Publishing, edited by T. K. Shih, Fall 2001
  • 6. M.-H. Yang and G.-C.Lai"網路駭客手冊→後門的攻擊、偵測、與防禦," 旗標出版社, June 2001.
  • 7. M.-H. Yang, "Efficient Data Broadcasting Schemes for Videos of High Demand," phD dissertation, May 2001
  • 8. M.-H. Yang, "A Euler-Path Based Model for Fault-Tolerant Multicasting in Wormhole-Routed Networks," Master dissertation, May 1996

Other publications

  • 1. M.-H. Yang, "Introduction to microsoft iis", Windows 2000 magazine, Jan. 2000, pages 82-87.
  • 2. M.-H. Yang, "後門程式的偵測與防治" 網際先鋒, Feb. 2001
  • 3. M.-H. Yang, A Book chapter in "資訊安全手冊,”行政院, Mar. 2001