Jyh-Haw Yeh

Orcid: 0000-0003-1069-9655

According to our database1, Jyh-Haw Yeh authored at least 35 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Integrity coded databases - protecting data integrity for outsourced databases.
Comput. Secur., January, 2024

2022
Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width.
Int. J. Inf. Comput. Secur., 2022

2021
Intelligent monitor for typhoon in IoT system of smart city.
J. Supercomput., 2021

A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

2020
Data storage security for the Internet of Things.
J. Supercomput., 2020

Prediction of Fatality Crashes with Multilayer Perceptron of Crash Record Information System Datasets.
Proceedings of the 19th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2020

2019
Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Using Intelligent Algorithms to Construct a Wafer Foundry System in Manufacturing Industry.
Proceedings of the 3rd International Conference on Information System and Data Mining, 2019

Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2019

A Sustainable Model for High-School Teacher Preparation in Computer Science.
Proceedings of the IEEE Frontiers in Education Conference, 2019

2018
Integrity Coded Databases - Protecting Data Integrity for Outsourced Databases.
Dataset, November, 2018

A Shoulder Surfing Resistant Graphical Authentication System.
IEEE Trans. Dependable Secur. Comput., 2018

A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

2017
Analysis on the Security and Use of Password Managers.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

Development of an Intelligent Equipment Lock Management System with RFID Technology.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

2016
A Secure Homomorphic Encryption Algorithm over Integers for Data Privacy Protection in Clouds.
Proceedings of the Smart Computing and Communication, 2016

2015
A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in Clouds.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it.
J. Supercomput., 2014

P2P email encryption by an identity-based one-way group key agreement protocol.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2009
Enforcing non-hierarchical access policies by hierarchical key assignment schemes.
Inf. Process. Lett., 2009

2008
Mobile and Electronic Commerce Systems and Technologies.
J. Electron. Commer. Organ., 2008

A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem.
Inf. Process. Lett., 2008

2007
A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Handheld Computing and Programming for Mobile Commerce.
Int. J. Web Inf. Syst., 2006

Density-based multipath secure communication over mobile ad hoc networks.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
Modifying YCN key assignment scheme to resist the attack from Hwang.
Inf. Process. Lett., 2005

Design and simulation of a supplemental protocol for BGP.
Comput. Networks, 2005

An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

Mobile Commerce Technology.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

World Wide Web Search Technologies.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2003
Key assignment for enforcing access control policy exceptions in distributed systems.
Inf. Sci., 2003

A System Model for Mobile Commerce.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

Protecting Internet Public Information Integrity During Transmission.
Proceedings of the International Conference on Internet Computing, 2003

1999
A Dynamic Interdomain Communication Path Setup in Active Network.
Proceedings of the Active Networks, First International Working Conference, 1999

1997
Interdomain Access Control with Policy Routing.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997


  Loading...