系所介紹
本系特色
師資介紹
空間設備
地理位置
國際期刊 (International Journal)
- Lo-Yao Yeh*, Peggy Joy Lu, Szu-Hao Huang, Jiun-Long Huang, “SOChain: A Privacy-preserving DDoS Data Exchange Service over SOC Consortium Blockchain,” accepted by IEEE Transactions on Engineering Management, 2020. (SCI, IF = 1.867)
- Jen-Wei Hu, Lo-Yao Yeh*, Shih-Wei Liao, Chu-Sing Yang, “An Autonomous and Malware-proof Blockchain-based Firmware Update Platform with Efficient Batch Verification for IoT Devices,” Computers & Security, Vol. 86, pp. 238-252, 2019. (SCI) (IF=3.062, Rank: 43/155= 27.7%, 2018, Q2, COMPUTER SCIENCE, INFORMATION SYSTEMS)
- Woei-Jiunn Tsaur, Lo-Yao Yeh*,” DANS: A Secure and Efficient Driver-Abnormal Notification Scheme with IoT Devices over IoV,” IEEE Systems Journal, Vol.13, No.2, pp.1628-1639, 2019. (IF = 4.337, Rank: 4/84=4%, 2017 Q1, OPERATIONS RESEARCH & MANAGEMENT SCIENCE)
- Lo-Yao Yeh, Pei-Yu Chiang, Yi-Lang Tsai, and Jiun-Long Huang*, ”Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation,” IEEE Transactions on Cloud Computing, vol. 6, No. 2, 2018. (SCI IF = 7.928, Rank: 3/148=2%, 2017 Q1, COMPUTER SCIENCE,INFORMATION SYSTEMS)
- Lo-Yao Yeh*, Woei-Jiunn Tsaur, and Hsin-Han Huang, “Secure IoT-based, Incentive-aware Emergency Personnel Dispatching Scheme with Weighted Fine-grained Access Control,” ACM Transactions on Intelligent Systems and Technology, Vol.9, No. 1, 2017. (SCI, EI)(IF = 2.414, Rank: 20/144=13%, 2015 Q1, COMPUTER SCIENCE,INFORMATION SYSTEMS)
- Lo-Yao Yeh*, Yu-Cheng Lin,” A Proxy-based Authentication and Billing Scheme with Incentive-aware multihop Forwarding for Vehicular Networks,” IEEE Transactions on Intelligent Transportation Systems, Vol. 15, No. 4, 2014. (SCI, EI)(IF = 2.472, Rank: 8/124=6%, 2013 Q1, ENGINEERING, CIVIL)
- Lo-Yao Yeh, and Jiun-Long Huang*, “PBS: A Portable Billing Scheme with Fine-Grained Access Control for Service-Oriented Vehicular Networks,” IEEE Transactions on Mobile Computing, Vol. 13, No. 11, 2014. (SCI, EI)(IF = 2.912, Rank: 6/78=7%, 2013 Q1, TELECOMMUNICATIONS)
- Lo-Yao Yeh, and Jiun-Long Huang*, “A Conditional Access System with Efficient Key Distribution and Revocation for Mobile Pay-TV Systems,” ACM Transactions on Multimedia Computing Communications and Applications, Vol 9, No.3, 2013. (SCI, EI)(IF = 0.935, Rank:37/100=37%, 2012 Q2, COMPUTER SCIENCE, THEORY & METHODS)
- Chen-Che Huang, Lo-Yao Yeh, Jiun-Long Huang*, “EDG: An Energy-Efficient Data Gathering Scheme in Wireless Sensor Networks,” INFORMATION – International Information Institute, Vol 16, No. 7, pp. 5007-5018, 2013. (SCI)
- Lo-Yao Yeh*, and Woei-Jiunn Tsaur, “A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 14, No. 6, 2012. (SCI, EI)(IF = 1.935, Rank: 7/104=6%, 2011 Q1, COMPUTER SCIENCE, SOFTWARE ENGINEERING)
- Lo-Yao Yeh, Yu-Lun Huang, Anthony D. Joseph, Shiuhpyng Shieh, and Woei-Jiunn Tsaur*, “A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks,” IEEE Transactions on Vehicular Technology., Vol 61, No.4, 2012. (SCI, EI) ((IF = 1.921, Rank: 16/79=22%, 2011 Q1, TELECOMMUNICATIONS)
- Lo-Yao Yeh*, Chun-Chuan Yang, Jee-Gong Chang, and Yi-Lang Tsai, “A Secure and Efficient Batch Binding Update Scheme for Route Optimization of Nested NEtwork MObility (NEMO) in VANETs,” Journal of Network and Computer Applications., Vol. 36, No. 1, 2013. (SCI)(IF=1.467, Rank 24/105=2%, 2012 Q1, Computer Science, Software Engineering)
- Chen-Che Huang, Tsun-Tse Huang, Jiun-Long Huang*, Lo-Yao Yeh, “Hierarchical role-based data dissemination in wireless sensor networks,” Journal of Supercomputing, Vol. 5, 2013. (SCI)
- Lo-Yao Yeh, Yen-Cheng Chen*, and Jiun-Long Huang,”ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications special issue on Vehicular Communications and Networks, Vol. 29, No. 3, 2011. (SCI)( IF = 4.232, Rank: 1/80 =1%, 2010 Q1 , TELECOMMUNICATIONS)
- Jiun-Long Huang, Lo-Yao Yeh*, Hung-Yu Chien, “ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-added Services in Vehicular Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, Vol. 60, No. 1, 2011. (SCI, EI)(IF = 1.912, Rank: 18/80=22%, 2010 Q1, TELECOMMUNICATIONS)
- Lo-Yao Yeh*, Jee-Gong Chang, and Yi-Lang Tsai, “A Fine-grained Access Control Scheme for Secure Video Multicast,” ICIC Express Letters, Part B: Applications-An international Journal of Research and Surveys, Vol 2, No. 6, 2011. (EI)
- Woei-Jiunn Tsaur and Lo-Yao Yeh ,”A Novel Mobile Agent Authentication Scheme for Multi-host Environments Using Self-certified Pairing-based Public Key Cryptosystem,” International Journal of Innovative Computing, Information and Control , Vol. 7, No. 4, 2011. (SCI, EI)(IF = 1.667, Rank: 12/60=20%, 2010 Q1, AUTOMATION & CONTROL SYSTEMSTELECOMMUNICATIONS)
- Lo-Yao Yeh, Yen-Cheng Chen*, and Jiun-Long Huang,” PAACP: A Portable Privacy-Preserving Authentication and Access Control Protocol in Vehicular Ad hoc Networks,” Computer Communications, Vol. 34, No.3, 2011. (SCI, EI) (IF = 0.816, 2010 Q2)
- Lo-Yao Yeh, Chen-Che Huang, Cheng-En Wu, and Jiun-Long Huang*,” ALM: An Adaptive Location Management Scheme for Approximate Location Queries in Wireless Sensor Networks,” Computer Communications, Vol. 33, No. 16, 2010. (SCI, EI) (IF = 0.933, 2009 Q2)
- Yen-Cheng Chen*, Shu-Chuan Chuang, Lo-Yao Yeh, and Jiun-Long Huang, “A Practical Authentication Protocol with Anonymity for Wireless Access Networks,” Wireless Communications and Mobile Computing, on-line version, 2010. (SCI, EI) (IF = 1.016, 2009 Q2)
- Yen-Cheng Chen* and Lo-Yao Yeh, “A Portable Integrated Authentication and Access Control Scheme for Distributed Embedded Systems,” International Journal of Innovative Computing, Information and Control , Vol. 6, No.2, 2010. (SCI, EI)(IF=2.932, Rank: 14/103 = 13%, 2009 Q1, COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE)
- Yen-Cheng Chen* and Lo-Yao Yeh,”An Efficient Nonce-Based Authentication Scheme with Key Agreement,” Applied Mathematics and Computation, 169, pp. 982-994, 2005. (SCI, EI) (IF = 1.536, Rank: 29/236=12%)
國際會議論文(International Conference)
- Lo-Yao Yeh, Wan-Hsin Hsu, Jiun-Long Huang, Chih-Ya Shen, Chi Wu-Lee, Integrating Cellphone-based Hardware Wallet withVisional Certificate Verification System, IEEE GLOBECOM 2020.
- W.-C. Huang, L.-Y. Yeh, and J.-L. Huang, “A Monitorable Peer-to-Peer File Sharing Mechanism,” Proceedings of Asia-PacificNetwork Operations and Management Symposium (APNOMS), September 18-20, 2019. (Poster)
- C. Tsai, W.-Y.h Shih, Y.-S. Lu, J.-L. Huang, and L.-Y. Yeh, “Design of a Data Collection System with Data Compression for Small Manufacturers in Industrial IoT Environments ,” Proceedings of Asia-PacificNetwork Operations and Management Symposium (APNOMS), September 18-20, 2019. (Poster)
- Lo-Yao Yeh*, Jiun-Long Huang, Ting-Yin Yen and Jen-Wei Hu, “A Collaborative DDoS Defense Platform Based on Blockchain Technology,” Ubi-media 2019.
- Peggy Joy Lu, Lo-Yao Yeh, Jiun-Long Huang,“An Privacy-preserving Cross-organizational Authentication/Authorization/Accounting System using Blockchain Technology,” IEEE ICC 2018.
- Lo-Yao Yeh, Woei-Jiunn Tsaur, Shih-Wei Liao, Cheng-Feng Huang, Jen-Chun Chang, Ching-Ching Lin, “E-university Applications: A Privacy-Preserving Diploma Notarization Platform in Taiwan,” 17th International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE’18), 2018.
- Lo-Yao Yeh, Peggy Joy Lu and Jen-Wei Hu, “NCHC Blockchain Construction Platform (NBCP): Rapidly Constructing Blockchain Nodes around Taiwan,” ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL), 2017.
- Lo-Yao Yeh, “A Practical Third-Party Auditor Prototype for Cloud Storage Service,” 7th IEEE International Conference on Software Engineering and Service Science (IEEE ICSESS’16), 2016.
- Hsin-Han Huang, Lo-Yao Yeh, and Woei-Jiunn Tsaur, “Ultra-Lightweight Mutual Authentication and Ownership Transfer Protocol with PUF for Gen2 v2 RFID Systems,” International MultiConference of Engineers and Computer Scientists (DATICS-IMECS 2016), 2016.
- Lo-Yao Yeh, and Yi-Lang Tsai, “An Automated Framework for Command and Control Server Connection and Malicious Mail Detection,” The Eleventh International Conference on Networking and Services (ICNS), 2015.
- Lo-Yao Yeh, Yi-Lang Tsai, and Jee-Gong Chang “A User-centric Botnet Malware Prevention and Collection System”, The Thirteenth International Conference on Networks (ICN, 2014.), 2014.
- Lo-Yao Yeh, Yi-Lang Tsai, Bo-Yi Lee, and Jee-Gong Chang “An automated security framework for malware detection and infection notification,” The Ninth International Conference on Internet Monitoring and Protection (ICIMP 2014).
- Lo-Yao Yeh, Yi-Lang Tsai, Bo-Yi Lee, and Jee-Gong Chang “An Automatic Botnet Detection and Notification System in Taiwan”, International Conference on Security and Management (SAM’13), 2013.
- Lo-Yao Yeh, Jee-Gong Chang, Weicheng Huang, and Yi-Lang Tsai, “A localized authentication and billing scheme for proxy mobile IPv6 in VANETs,” IEEE ICC 2012.
- Yi-Lang Tsai, Lo-Yao Yeh, Bo-Yi Lee, and Jee-Gong Chang, “Automated Malware Analysis Framework with Honeynet Technology in Taiwan Campuses,” IEEE ICPADS 2012.
- Woei-Jiunn Tsaur, Lo-Yao Yeh, “Identifying Rootkit Infections Using a New Windows Hidden-driver-based Rootkit, “ accepted by The 2012 International Conference on Security and Management (SAM’12)
- C.-C. Huang, J.-L. Huang, J.-A. Yan and L.-Y. Yeh, “An In-Network Approximate Data Gathering Algorithm Exploiting Spatial Correlation in Wireless Sensor Networks,” Proceedings of the 27th ACM Symposium on Applied Computing (SAC-12), March 26-30, 2012. (8/36=22%)
- G.-H. Ye, Lo-Yao Yeh and J.-L. Huang, “Hierarchical Role-based Data Dissemination for Large-Scale Wireless Sensor Networks with Mobile Sinks,” IEEE PerCom Workshop, 2010.
- Y. L. Huang, J. D. Tygar, H. Y. Lin, Lo-Yao Yeh, H. Y. Tsai, K. Sklower, S. P. Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, “SWOON: A Testbed for Secure Wireless Overlay Networks,” USENIX Workshop on Cyber Security Experimentation and Test, 2008.
- Yen-Cheng Chen, and Lo-Yao Yeh, “An Efficient Authentication and Access Control Scheme Using Smart Cards,” IEEE ICPADS, Fukuoka, Japan, July 20 – 22, 2005.
專利 (Patent)
- 葉羅堯、盧沛怡、洪嘉賢,分散式儲存系統之同步刪除方法,專利號碼:107145526,中華民國專利.
