default search action
Jyh-Haw Yeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j14]Jyh-haw Yeh, Md Mashrur Arifin, Ning Shen, Ujwal Karki, Yi Xie, Archana Nanjundarao:
Integrity coded databases - protecting data integrity for outsourced databases. Comput. Secur. 136: 103569 (2024) - [j13]Yeh-Cheng Chen, Hung-Min Sun, Ruey-Shun Chen, Jyh-haw Yeh, Xiaopeng Fan, I-Hsin Chou:
Intelligent radioactive waste process cloud-based system for nuclear power plant decommissioning. J. Ambient Intell. Humaniz. Comput. 15(3): 1801-1811 (2024) - 2022
- [j12]Gang Ke, Ruey-Shun Chen, Shanshan Ji, Jyh-haw Yeh:
Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width. Int. J. Inf. Comput. Secur. 18(1/2): 1-11 (2022) - 2021
- [j11]Eric Ke Wang, Fan Wang, Saru Kumari, Jyh-Haw Yeh, Chien-Ming Chen:
Intelligent monitor for typhoon in IoT system of smart city. J. Supercomput. 77(3): 3024-3043 (2021) - 2020
- [j10]Yuntao Duan, Jiangdai Li, Gautam Srivastava, Jyh-Haw Yeh:
Data storage security for the Internet of Things. J. Supercomput. 76(11): 8529-8547 (2020) - 2018
- [j9]Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh, Chia-Yun Cheng:
A Shoulder Surfing Resistant Graphical Authentication System. IEEE Trans. Dependable Secur. Comput. 15(2): 180-193 (2018) - 2014
- [j8]Jyh-haw Yeh:
The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it. J. Supercomput. 70(3): 1100-1119 (2014) - 2009
- [j7]Jyh-haw Yeh:
Enforcing non-hierarchical access policies by hierarchical key assignment schemes. Inf. Process. Lett. 110(2): 46-49 (2009) - 2008
- [j6]Jyh-haw Yeh:
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem. Inf. Process. Lett. 105(4): 117-120 (2008) - [j5]Wen-Chen Hu, Chyuan-Huei T. Yang, Jyh-haw Yeh, Weihong Hu:
Mobile and Electronic Commerce Systems and Technologies. J. Electron. Commer. Organ. 6(3): 54-73 (2008) - 2006
- [j4]Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, Hung-Jen Yang:
Handheld Computing and Programming for Mobile Commerce. Int. J. Web Inf. Syst. 2(3/4): 164-175 (2006) - 2005
- [j3]Jyh-haw Yeh, Wei Zhang, Wen-Chen Hu, Chung-wei Lee:
Design and simulation of a supplemental protocol for BGP. Comput. Networks 49(2): 172-200 (2005) - [j2]Jyh-haw Yeh, Marion Scheepers, Wen-Chen Hu:
Modifying YCN key assignment scheme to resist the attack from Hwang. Inf. Process. Lett. 95(4): 435-440 (2005) - 2003
- [j1]Jyh-haw Yeh, Randy Chow, Richard E. Newman:
Key assignment for enforcing access control policy exceptions in distributed systems. Inf. Sci. 152: 63-88 (2003)
Conference and Workshop Papers
- 2024
- [c20]Md Mashrur Arifin, Troy Suyehara Tolman, Jyh-haw Yeh:
Unveiling the Efficacy of BERT's Attention in Memory Obfuscated Malware Detection. ISPEC 2024: 273-291 - 2021
- [c19]Ning Shen, Jyh-Haw Yeh, Hung-Min Sun, Chien-Ming Chen:
A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases. PRDC 2021: 133-142 - 2020
- [c18]Thanh Hung Duong, Fengxiang Qiao, Jyh-haw Yeh, Yunpeng Zhang:
Prediction of Fatality Crashes with Multilayer Perceptron of Crash Record Information System Datasets. IEEE ICCI*CC 2020: 225-229 - 2019
- [c17]Alark Joshi, Amit Jain, Ernie Covelli, Jyh-haw Yeh, Tim Andersen:
A Sustainable Model for High-School Teacher Preparation in Computer Science. FIE 2019: 1-9 - [c16]Zhuoyu Tie, Eric Ke Wang, Jyh-Haw Yeh, Chien-Ming Chen:
Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme. ICGEC 2019: 474-480 - [c15]Ruey-Shun Chen, Yeh-Cheng Chen, Jyh-haw Yeh, Yu-Xi Hu, Naixue Xiong, C.-P. Lee:
Using Intelligent Algorithms to Construct a Wafer Foundry System in Manufacturing Industry. ICISDM 2019: 1-5 - [c14]Ning Shen, Jyh-haw Yeh, Chien-Ming Chen, Yeh-Cheng Chen, Yunpeng Zhang:
Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption. ISPA/BDCloud/SocialCom/SustainCom 2019: 776-783 - 2018
- [c13]Jyh-haw Yeh, Srisarguru Sridhar, Gaby G. Dagher, Hung-Min Sun, Ning Shen, Kathleen Dakota White:
A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption. PRDC 2018: 34-43 - 2017
- [c12]Carlos Luevanos, John Elizarraras, Khai Hirschi, Jyh-haw Yeh:
Analysis on the Security and Use of Password Managers. PDCAT 2017: 17-24 - [c11]Yeh-Cheng Chen, C. N. Chu, H. M. Sun, Jyh-haw Yeh, Ruey-Shun Chen, Chorng-Shiuh Koong:
Development of an Intelligent Equipment Lock Management System with RFID Technology. PDCAT 2017: 33-38 - 2016
- [c10]Jyh-Haw Yeh:
A Secure Homomorphic Encryption Algorithm over Integers for Data Privacy Protection in Clouds. SmartCom 2016: 111-121 - 2015
- [c9]Jyh-Haw Yeh:
A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in Clouds. UIC/ATC/ScalCom 2015: 653-656 - 2014
- [c8]Jyh-haw Yeh, Fiona Zeng, Thomas Long:
P2P email encryption by an identity-based one-way group key agreement protocol. ICPADS 2014: 760-767 - 2007
- [c7]Jyh-haw Yeh:
A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit. Security and Management 2007: 131-137 - 2006
- [c6]Lei Chen, Chung-wei Lee, Jyh-haw Yeh:
Density-based multipath secure communication over mobile ad hoc networks. ACM Southeast Regional Conference 2006: 107-112 - 2005
- [c5]Jyh-haw Yeh:
An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription. CIKM 2005: 285-286 - 2003
- [c4]Jyh-haw Yeh, Chung-wei Lee, Wen-Chen Hu:
Protecting Internet Public Information Integrity During Transmission. International Conference on Internet Computing 2003: 308-314 - [c3]Chung-wei Lee, Wen-Chen Hu, Jyh-haw Yeh:
A System Model for Mobile Commerce. ICDCS Workshops 2003: 634-639 - 1999
- [c2]Jyh-haw Yeh, Randy Chow, Richard E. Newman:
A Dynamic Interdomain Communication Path Setup in Active Network. IWAN 1999: 274-284 - 1997
- [c1]Jyh-haw Yeh, Randy Chow, Richard E. Newman-Wolfe:
Interdomain Access Control with Policy Routing. FTDCS 1997: 46-52
Reference Works
- 2005
- [r2]Chung-wei Lee, Wen-Chen Hu, Jyh-haw Yeh:
Mobile Commerce Technology. Encyclopedia of Information Science and Technology (IV) 2005: 1967-1972 - [r1]Wen-Chen Hu, Hung-Jen Yang, Jyh-haw Yeh, Chung-wei Lee:
World Wide Web Search Technologies. Encyclopedia of Information Science and Technology (V) 2005: 3111-3117
Data and Artifacts
- 2018
- [d1]Jyh-haw Yeh, Hung-Min Sun, Ujwal Karki, Daniel Kondratyuk, Ning Shen:
Integrity Coded Databases - Protecting Data Integrity for Outsourced Databases. IEEE DataPort, 2018
Informal and Other Publications
- 2024
- [i1]Md Mashrur Arifin, Md Shoaib Ahmed, Tanmai Kumar Ghosh, Jun Zhuang, Jyh-haw Yeh:
A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes. CoRR abs/2407.08839 (2024)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint