| 亞洲大學 |
2017-09 |
An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching
|
黃明祥; Yu-Lun Wang;Yu-Lun Wang;Jau-Ji Shen;Jau-Ji Shen; |
| 亞洲大學 |
2017-09 |
資訊與網路安全概論
|
黃明祥;林詠章;Lin, I. C. |
| 國立政治大學 |
2017-05-13 |
建構一套以定錨理論為基礎之課程推薦模式:以護理專業人員為實證分析對象
|
黃明祥; 梁喬治 |
| 國立政治大學 |
2017-05-13 |
以社會認知理論探討影響電腦技能課程學習成效因素之研究
|
黃明祥; 曾展美 |
| 亞洲大學 |
2017-05 |
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service
|
黃明祥;Sun, T. H.;Sun, Tsuei-Hung;Lee, C. C.;Lee, Cheng-Chi;* |
| 亞洲大學 |
2017-03 |
A Secure Privacy and Authentication Protocol for Passive RFID Tags
|
Wei, Chia-Hui;Wei, Chia-Hui;黃明祥*;Chin, Y. H.;Chin, Augustin Yeh-Hao |
| 亞洲大學 |
2017-01 |
資訊與網路安全實務
|
黃明祥;林詠章;Lin, Y. C.;周永振;CHOU, YUNG-CHEN |
| 亞洲大學 |
2017-01 |
Advances in Intelligent Systems and Computing
|
Tsai, C. Yi;Tsai, Cheng-Yi;Pan, Chiu-Shu;Pan, Chiu-Shu;黃明祥 |
| 亞洲大學 |
2017-01 |
Lecture Notes in Electrical Engineering
|
Yang, C. Y.;Yang, Cheng-Ying;Chung, T. Y.;Chung, Tsai-Yuan;黃明祥;Li, Cheng-Yi;Li, Cheng-Yi;Yao, J. F. JF;Yao, Jenq-Foung JF |
| 亞洲大學 |
2016-11 |
A Survey of Data Distortion Watermarking Relational Databases", International Journal of Network Security, Vol. 18, No. 6, pp. 1022-1033, 2016
|
Xie, Ming-Ru;Xie, Ming-Ru;Wu, Chia-Chun;Wu, Chia-Chun;Shen, Jau-Ji;Shen, Jau-Ji;黃明祥* |
| 亞洲大學 |
2016-09 |
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
|
Liu, Chi-Wei;Liu, Chi-Wei;Hsien, Wei-Fu;Hsien, Wei-Fu;Yang, C. C.;Yang, Chou-Chen;黃明祥* |
| 亞洲大學 |
2016-07 |
A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing
|
Liu, Chi-Wei;Liu, Chi-Wei;Hsien, Wei-Fu;Hsien, Wei-Fu;Yang, C. C.;Yang, Chou-Chen;黃明祥* |
| 國立成功大學 |
2016-06-03 |
結合KM與EMMS對電子廠設備效能改善之研究
|
黃明祥; Huang, Ming-Hsiang |
| 亞洲大學 |
2016-05 |
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
Ling, C. H.;Ling, Chung-Huei;Chen, S. M.;Chen, Shih-Ming;黃明祥* |
| 亞洲大學 |
2016-05 |
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
Ling, C. H.;Ling, Chung-Huei;Chen, S. M.;Chen, Shih-Ming;黃明祥* |
| 國立臺中教育大學 |
2016-03 |
《方言》本字與上古漢語之研究
|
陳世明; 黃明祥; Chen, Shih-Ming;Hwang, Min-Shiang |
| 亞洲大學 |
2016-03 |
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach
|
Ling), C. H. Ling(Chung-Huei;Hsien), Wei-Fu Hsien(Wei-Fu;黃明祥* |
| 亞洲大學 |
2016-03 |
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach
|
Ling, C. H.;Ling, Chung-Huei;Hsien, Wei-Fu;Hsien, Wei-Fu;黃明祥* |
| 亞洲大學 |
2016-01 |
The Moderately Hard DoS-resistant Authentication Protocol on Client Puzzles
|
黃明祥*;Chong), S. K. Chong(Song-Kong;Ou), Hsia-Hung Ou(Hsia-Hung |
| 亞洲大學 |
2016-01 |
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
|
Hsien), Wei-Fu Hsien(Wei-Fu;Yang), Chou-Chen Ya(Chou-Chen;黃明祥* |
| 亞洲大學 |
2016-01 |
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
|
Hsien, Wei-Fu;Hsien, Wei-Fu;Ya, Chou-Chen;Yang, Chou-Chen;黃明祥* |
| 亞洲大學 |
2015/11 |
International Journal of Network Security
|
;Shih, 施能義 Neng-Yih;黃明祥 |
| 亞洲大學 |
2015/01 |
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server
|
;黃明祥 |
| 亞洲大學 |
2015-12 |
Cases Study and Analysis of the Court Judgement of Cybercrimes in Taiwan
|
Sun), Jia-Rong Sun(Jia-Rong;施茂林;黃明祥 |
| 亞洲大學 |
2015-11 |
A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
|
Ya, Chun-Ming;Yang, Chun-Ming;施能義;Shih, Neng-Yih;黃明祥 |