Lo-Yao Yeh

Orcid: 0000-0002-9764-0455

According to our database1, Lo-Yao Yeh authored at least 35 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Willingness Maximization for Ego Network Data Extraction in Multiple Online Social Networks.
IEEE Trans. Knowl. Data Eng., August, 2023

Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
Blockchain-Based Privacy-Preserving and Sustainable Data Query Service Over 5G-VANETs.
IEEE Trans. Intell. Transp. Syst., 2022

Learning to Extract Expert Teams in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2022

GDPR-Aware Revocable P2P File-Sharing System Over Consortium Blockchain.
IEEE Syst. J., 2022

Analyzing Federated Learning with Enhanced Privacy Preservation.
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022

Decentralized Federated Learning with Enhanced Privacy Preservation.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2022

2020
SOChain: A Privacy-Preserving DDoS Data Exchange Service Over SOC Consortium Blockchain.
IEEE Trans. Engineering Management, 2020

Efficient Extraction of Target Users for Package Promotion in Big Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

Integrating Cellphone-based Hardware Wallet with Visional Certificate Verification System.
Proceedings of the IEEE Global Communications Conference, 2020

2019
DANS: A Secure and Efficient Driver-Abnormal Notification Scheme With IoT Devices Over IoV.
IEEE Syst. J., 2019

Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices.
Comput. Secur., 2019

Design of a Data Collection System with Data Compression for Small Manufacturers in Industrial IoT Environments.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

A Monitorable Peer-to-Peer File Sharing Mechanism.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

2018
Cloud-Based Fine-Grained Health Information Access Control Framework for LightweightIoT Devices with Dynamic Auditing andAttribute Revocation.
IEEE Trans. Cloud Comput., 2018

An Privacy-Preserving Cross-Organizational Authentication/Authorization/Accounting System Using Blockchain Technology.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control.
ACM Trans. Intell. Syst. Technol., 2017

NCHC Blockchain Construction Platform (NBCP): Rapidly Constructing Blockchain Nodes around Taiwan.
Proceedings of the 2017 ACM/IEEE Joint Conference on Digital Libraries, 2017

2014
PBS: A Portable Billing Scheme with Fine-Grained Access Control for Service-Oriented Vehicular Networks.
IEEE Trans. Mob. Comput., 2014

A Proxy-Based Authentication and Billing Scheme With Incentive-Aware Multihop Forwarding for Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2014

2013
A conditional access system with efficient key distribution and revocation for mobile pay-TV systems.
ACM Trans. Multim. Comput. Commun. Appl., 2013

Hierarchical role-based data dissemination in wireless sensor networks.
J. Supercomput., 2013

A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs.
J. Netw. Comput. Appl., 2013

2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Veh. Technol., 2012

A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems.
IEEE Trans. Multim., 2012

An in-network approximate data gathering algorithm exploiting spatial correlation in wireless sensor networks.
Proceedings of the ACM Symposium on Applied Computing, 2012

A localized authentication and billing scheme for proxy mobile IPv6 in VANETs.
Proceedings of IEEE International Conference on Communications, 2012

2011
A practical authentication protocol with anonymity for wireless access networks.
Wirel. Commun. Mob. Comput., 2011

ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011

ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks.
IEEE J. Sel. Areas Commun., 2011

PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks.
Comput. Commun., 2011

2010
ALM: An adaptive location management scheme for approximate location queries in wireless sensor networks.
Comput. Commun., 2010

Hierarchical Role-based Data Dissemination for large-scale wireless sensor networks with mobile sinks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

2005
An efficient nonce-based authentication scheme with key agreement.
Appl. Math. Comput., 2005

An Efficient Authentication and Access Control Scheme Using Smart Cards.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005


  Loading...