Ming-Hour Yang

Orcid: 0000-0003-4773-7352

According to our database1, Ming-Hour Yang authored at least 53 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile Readers.
IEEE Syst. J., September, 2023

Smart Manufacturing Security Challenges and Solutions.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

2022
Contactless Credit Cards Payment Fraud Protection by Ambient Authentication.
Sensors, 2022

An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT.
Sensors, 2022

A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer Protocol.
Secur. Commun. Networks, 2022

Dispute Resistance Multilayered RFID Partial Ownership Transfer With Blockchain.
IEEE Access, 2022

2021
IoT-Based Smart Alert System for Drowsy Driver Detection.
Wirel. Commun. Mob. Comput., 2021

A CAN-Bus Lightweight Authentication Scheme.
Sensors, 2021

Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things.
IEEE Access, 2021

2020
A Secure Partial RFID Ownership Transfer Protocol with Multi-Owners.
Sensors, 2020

Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions.
IET Networks, 2020

Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices.
IEEE Access, 2020

A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems.
IEEE Access, 2020

Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles.
IEEE Access, 2020

2019
EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication.
Sensors, 2019

A geographic map-based middleware framework to obfuscate smart vehicles' locations.
Multim. Tools Appl., 2019

2018
Design and analysis of hybrid single packet IP traceback scheme.
IET Networks, 2018

HPSIPT: A high-precision single-packet IP traceback scheme.
Comput. Networks, 2018

Offline Transferable E-Cash Mechanism.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location-Based Service Queries.
Wirel. Commun. Mob. Comput., 2017

Improved Single Packet Traceback Scheme with Bloom Filters.
Proceedings of the IoT as a Service - Third International Conference, 2017

Novel designated ownership transfer with grouping proof.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
A mobile authentication system resists to shoulder-surfing attacks.
Multim. Tools Appl., 2016

Analysis and Improvement of Key Distribution Scheme for Secure Group Communication.
J. Electr. Comput. Eng., 2016

An Unlinkable Anonymous Payment Scheme based on near field communication.
Comput. Electr. Eng., 2016

A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme.
Sensors, 2015

Fast Antinoise RFID-Aided Medical Care System.
Int. J. Distributed Sens. Networks, 2015

2014
An anonymous e-rental protocol based on ID-based cryptography and NFC.
J. Supercomput., 2014

An Efficient Offline Delegation Protocol in Mobile RFID Environment.
J. Networks, 2014

High accuracy and low storage hybrid IP traceback.
Proceedings of the International Conference on Computer, 2014

2013
An Anonymous Car Rental System Based on NFC.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

2012
RIHT: A Novel Hybrid IP Traceback Scheme.
IEEE Trans. Inf. Forensics Secur., 2012

Protocol for ownership transfer across authorities: with the ability to assign transfer target.
Secur. Commun. Networks, 2012

Secure multiple group ownership transfer protocol for mobile RFID.
Electron. Commer. Res. Appl., 2012

2011
Across-authority lightweight ownership transfer protocol.
Electron. Commer. Res. Appl., 2011

2010
Tracing Anonymous Mobile Attackers in Wireless Network.
J. Digit. Content Technol. its Appl., 2010

Polymorphic Penetration Testcode Carrier.
J. Digit. Content Technol. its Appl., 2010

Lightweight authentication protocol for mobile RFID networks.
Int. J. Secur. Networks, 2010

Controlled Delegation Protocol in Mobile RFID Networks.
EURASIP J. Wirel. Commun. Netw., 2010

2009
Using E-mail Authentication and Disposable E-mail Addressing for Filtering Spam.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Authentication Protocol in Mobile RFID Network.
Proceedings of the Fourth International Conference on Systems, 2009

2008
Tracing Mobile Attackers in Wireless Ad-Hoc Network.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Protect mobile RFID location privacy using dynamic identity.
Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, 2008

2003
A borrow-and-return model to reduce client waiting time for broadcasting-based VOD services.
IEEE Trans. Broadcast., 2003

A Stop-or-Move Mobility model for PCS networks and its location-tracking strategies.
Comput. Commun., 2003

2002
A recursive frequency-splitting scheme for broadcasting hot videos in VOD service.
IEEE Trans. Commun., 2002

Multi-Node Multicast in Multi-Dimensional Wormhole Tori and Meshes With Load Balance.
J. Inf. Sci. Eng., 2002

2001
Data broadcasting and seamless channel transition for highly demanded videos.
IEEE Trans. Commun., 2001

A Traveling Salesman Mobility Model and Its Location Tracking in PCS Networks.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
Multi-Node Multicast in Three and Higher Dimensional Wormhole Tori and Meshes with Load Balance.
Proceedings of the 2000 International Conference on Parallel Processing, 2000

1999
Achieving Fault-Tolerant Multicast in Injured Wormhole-Routed Tori and Meshes Based on Euler Path Construction.
IEEE Trans. Computers, 1999

1998
An Euler-Path-Based Multicasting Model for Wormhole-Routed Networks with Multi-Destination Capability.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998


  Loading...