Dr. Ming  Hour Yang
My Social Links

Dr. Ming Hour Yang

Associate Professor
National Central University, Taiwan


Highest Degree
Ph.D. in Computer Science from National Central University, Taiwan

Share this Profile

Biography

Dr. Ming Hour Yang is currently working as Associate Professor at National Central University, Taiwan. He has completed his Ph.D. in Computer Science from same University. His main area of expertise includes Computer Security, and Authentication. He has published 2 book and book chapters, 25 conference papers, and 31 research articles in journals contributed as author/co-author.

Area of Interest:

Computer Sciences
100%
Computer Security
62%
Authentication
90%
Communication
75%
Communication Networks
55%

Research Publications in Numbers

Books
0
Chapters
0
Articles
0
Abstracts
0

Selected Publications

  1. Luo, J.N., M.H. Yang and Y.C. Ho, 2015. EMV-based mobile payment protocol for offline transaction-with the ability of mutual authentication. Int. J. Sci. Eng., 5: 61-66.
    Direct Link  |  
  2. Yang, M.H., 2014. Storage-efficient 16-bit hybrid IP traceback with single packet. Scient. World J., Vol. 2014. 10.1155/2014/659894.
    CrossRef  |  
  3. Yang, M.H., 2014. Security enhanced EMV-based mobile payment protocol. Scient. World J., Vol. 2014. 10.1155/2014/864571.
    CrossRef  |  
  4. Yang, M.H., 2014. Hybrid single-packet IP traceback with low storage and high accuracy. Scient. World J., Vol. 2014. 10.1155/2014/239280.
    CrossRef  |  Direct Link  |  
  5. Luo, J.N. and M.H. Yang, 2014. Multi-level offline delegation transfer in mobile RFID networks. J. Chung Cheng Inst. Technol., 43: 41-50.
  6. Luo, J.N. and M.H. Yang, 2014. An efficient offline delegation protocol in mobile RFID environment. Int. J. Networks, 9: 1114-1120.
    CrossRef  |  Direct Link  |  
  7. Luo, J.N. and M.H. Yang, 2014. An anonymous e-rental protocol based on ID-based cryptography and NFC. J. Supercomput., 70: 31-53.
    CrossRef  |  Direct Link  |  
  8. Yang, M.H., 2013. Cross authority ownership transfer protocol using mobile RFID. Int. J. Digital Content Technol. Applic., 7: 265-283.
  9. Yang, M.H. and K.P. Xie, 2013. TTP-based group ownership transfer in a mobile RFID environment. Int. J. Digital Content Technol. Applic., 7: 51-69.
  10. Yang, M.H., 2012. Secure multiple group ownership transfer protocol for mobile RFID. Electron. Commerce Res. Applic., 11: 361-373.
  11. Yang, M.H. and M.C. Yang, 2012. RIHT: A novel hybrid IP traceback scheme. IEEE Trans. Inform. Forensics Secur., 7: 789-797.
    CrossRef  |  Direct Link  |  
  12. Yang, M.H. and H.Y. Hu, 2012. Protocol for ownership transfer across authorities: With the ability to assign transfer target. Security Commun. Networks, 5: 164-177.
    CrossRef  |  Direct Link  |  
  13. Luo, J.N. and M.H. Yang, 2012. Mobile RFID mutual authentication and ownership transfer. Int. J. Adv. Comput. Technol., 4: 28-40.
  14. Yang, M.H., 2011. Security analysis of application layer protocols on WLAN. J. Shanghai Jiaotong Univ. (Sci.), 16: 586-592.
  15. Yang, M.H., 2011. Across-authority lightweight ownership transfer protocol. Electron. Commerce Res. Applic., 10: 375-383.
    CrossRef  |  Direct Link  |  
  16. Luo, J.N. and M.H. Yang, 2011. An E-mail authentication and disposable addressing scheme for filtering spam. J. Convergence Inform. Technol., 6: 161-171.
  17. Yang, M.H., 2010. Polymorphic penetration testcode carrier. Int. J. Digital Content Technol. Applic., 4: 48-61.
  18. Yang, M.H., 2010. Lightweight authentication protocol for mobile RFID networks. Int. J. Security Networks, 5: 53-62.
    CrossRef  |  Direct Link  |  
  19. Yang, M.H., 2010. Controlled delegation protocol in mobile RFID networks. EURASIP J. Wireless Commun. Networking, Vol. 2010. 10.1155/2010/170150.
    CrossRef  |  Direct Link  |  
  20. Yang, M.H. and S.P. Shieh, 2010. Tracing anonymous mobile attackers in wireless network. Int. J. Digital Content Technol. Applic., 4: 161-173.
  21. Yang, M.H., 2009. Polymorphic worms detection. Inform. Security Newslett., 15: 72-81.
  22. Yang, M.H. and J.N. Luo, 2009. A random key penetration testing approach with polymorphic detection avoidance mechanism. J. Internet Technol., 10: 393-404.
  23. Yang, M.H. and Y.C. Tseng, 2003. A borrow-and-return model to reduce client waiting time for broadcasting-based VOD services. IEEE Trans. Broadcasting, 49: 162-169.
    CrossRef  |  Direct Link  |  
  24. Tseng, Y.C., L.W. Chen, M.H. Yang and J.J. Wu, 2003. A stop-or-move mobility model for PCS networks and its location-tracking strategies. Comput. Commun., 26: 1288-1301.
    CrossRef  |  Direct Link  |  
  25. Yang, M.H., Y.C. Tseng, M.-S. Jian and C. Lin, 2002. Multi-node multicast in three and higher dimensional wormhole tori and meshes with load balance. J. Inform. Sci. Eng., 18: 959-980.
  26. Tseng, Y.C., M.H. Yang and C.H. Chang, 2002. A recursive frequency-splitting scheme for broadcasting hot videos in VOD service. IEEE Trans. Commun., 50: 1348-1355.
    CrossRef  |  Direct Link  |  
  27. Tseng, Y.C., M.H. Yang, C.M. Hsieh, W.H. Liao and J.P. Sheu, 2001. Data broadcasting and seamless channel transition for highly demanded videos. IEEE Trans. Commun., 49: 863-874.
    CrossRef  |  Direct Link  |  
  28. Tseng, Y.C., M.H. Yang and T.Y. Juang, 1999. Achieving fault-tolerant multicast in injured wormhole-routed tori and meshes based on euler path construction. IEEE Trans. Comput., 48: 1282-1296.
    CrossRef  |  Direct Link  |