| 亞洲大學 |
2019-01-01 |
手機APP程式設計與智能應用
|
詹啟祥;Chan, Chi-Shiang;周永振;CHOU, YUNG-CHEN;胡文品;Hu, Wen-Pin;宋昱霖;Song, Yu-Lin;何承遠;Ho, Cheng-Yuan;連耀南;Lien, Yao-Nan;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2019-01 |
Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
|
Chio, Shu-Fen;Chiou, Shu-Fen;Hsieh-Tsen, P;Pan, Hsieh-Tsen;Ca, Eko Fajar;Cahyadi, Eko Fajar;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2019 |
應用機器學習技術於無人圖書館辨識系統之研發
|
黃明祥; 林子晴 |
| 亞洲大學 |
2019 |
應用機器學習技術於慢性疾病飲食食品檢索與分類之研發
|
黃明祥; 陳俊宇 |
| 亞洲大學 |
2019 |
應用機器學習技術於慢性疾病飲食食品檢索與分類之研發
|
黃明祥; 陳俊宇 |
| 亞洲大學 |
2018-11 |
A Conference Key Scheme Based on the Diffie-Hellman Key Exchange
|
Huan, Li-Chin;Huang, Li-Chin;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2018-07 |
A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching
|
Wang, Yu-Lun;Wang, Yu-Lun;Shen, Jau-Ji;Shen, Jau-Ji;黃明祥;Hwang, Min-Shiang;* |
| 亞洲大學 |
2018-03 |
A Secure Group Signature Scheme", International Journal of Network Security, Vol. 20, No. 2, pp. 201-205, Mar. 2018
|
Tsa, Cheng-Yi;Tsai, Cheng-Yi;Ho, Pi-Fang;Ho, Pi-Fang;黃明祥;Hwang, Min-Shiang;* |
| 亞洲大學 |
2018-03 |
A Secure Group Signature Scheme", International Journal of Network Security, Vol. 20, No. 2, pp. 201-205, Mar. 2018
|
Tsa, Cheng-Yi;Tsai, Cheng-Yi;Ho, Pi-Fang;Ho, Pi-Fang;黃明祥;Hwang, Min-Shiang;* |
| 亞洲大學 |
2018-01 |
A Survey of Reversible Data Hiding for VQ-Compressed Images", International Journal of Network Security, Vol. 20, No. 1, pp. 1-8, Jan. 2018
|
Wang, Yu-Lun;Wang, Yu-Lun;Shen, Jau-Ji;Shen, Jau-Ji;黃明祥;Hwang, Min-Shiang;* |
| 亞洲大學 |
2018-01 |
A Survey of Reversible Data Hiding for VQ-Compressed Images", International Journal of Network Security, Vol. 20, No. 1, pp. 1-8, Jan. 2018
|
Wang, Yu-Lun;Wang, Yu-Lun;Shen, Jau-Ji;Shen, Jau-Ji;黃明祥;Hwang, Min-Shiang;* |
| 亞洲大學 |
2018 |
應用區塊鏈技術於電子書數位版權管理機制之研發
|
黃明祥; 陳俊宇 |
| 亞洲大學 |
2017-11 |
The Capacity Analysis in the Secure Cooperative Communication System
|
黃明祥; J. S. Chen;Jong-Shin Chen;C. Y. Yang;Cheng-Ying Yang |
| 亞洲大學 |
2017-11 |
The Capacity Analysis in the Secure Cooperative Communication System
|
Chen, J. S.;Chen, Jong-Shin;Yang, C. Y.;Yang, Cheng-Ying;黃明祥 |
| 亞洲大學 |
2017-09 |
Digital Signature with Message Recovery Based on Factoring and Discrete Logarithm,” , vol. 62, no. 3, pp. 415-423, Sept. 2016.
|
黃明祥;Chen, S. M.;Chen Shih-Ming;Liu, Chi-Yu;Liu, Chi-Yu; |
| 亞洲大學 |
2017-09 |
An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching
|
黃明祥; Yu-Lun Wang;Yu-Lun Wang;Jau-Ji Shen;Jau-Ji Shen; |
| 亞洲大學 |
2017-09 |
資訊與網路安全概論
|
黃明祥;林詠章;Lin, I. C. |
| 國立政治大學 |
2017-05-13 |
建構一套以定錨理論為基礎之課程推薦模式:以護理專業人員為實證分析對象
|
黃明祥; 梁喬治 |
| 國立政治大學 |
2017-05-13 |
以社會認知理論探討影響電腦技能課程學習成效因素之研究
|
黃明祥; 曾展美 |
| 亞洲大學 |
2017-05 |
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service
|
黃明祥;Sun, T. H.;Sun, Tsuei-Hung;Lee, C. C.;Lee, Cheng-Chi;* |
| 亞洲大學 |
2017-03 |
A Secure Privacy and Authentication Protocol for Passive RFID Tags
|
Wei, Chia-Hui;Wei, Chia-Hui;黃明祥*;Chin, Y. H.;Chin, Augustin Yeh-Hao |
| 亞洲大學 |
2017-01 |
資訊與網路安全實務
|
黃明祥;林詠章;Lin, Y. C.;周永振;CHOU, YUNG-CHEN |
| 亞洲大學 |
2017-01 |
Advances in Intelligent Systems and Computing
|
Tsai, C. Yi;Tsai, Cheng-Yi;Pan, Chiu-Shu;Pan, Chiu-Shu;黃明祥 |
| 亞洲大學 |
2017-01 |
Lecture Notes in Electrical Engineering
|
Yang, C. Y.;Yang, Cheng-Ying;Chung, T. Y.;Chung, Tsai-Yuan;黃明祥;Li, Cheng-Yi;Li, Cheng-Yi;Yao, J. F. JF;Yao, Jenq-Foung JF |
| 亞洲大學 |
2016-11 |
A Survey of Data Distortion Watermarking Relational Databases", International Journal of Network Security, Vol. 18, No. 6, pp. 1022-1033, 2016
|
Xie, Ming-Ru;Xie, Ming-Ru;Wu, Chia-Chun;Wu, Chia-Chun;Shen, Jau-Ji;Shen, Jau-Ji;黃明祥* |
| 亞洲大學 |
2016-09 |
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
|
Liu, Chi-Wei;Liu, Chi-Wei;Hsien, Wei-Fu;Hsien, Wei-Fu;Yang, C. C.;Yang, Chou-Chen;黃明祥* |
| 亞洲大學 |
2016-07 |
A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing
|
Liu, Chi-Wei;Liu, Chi-Wei;Hsien, Wei-Fu;Hsien, Wei-Fu;Yang, C. C.;Yang, Chou-Chen;黃明祥* |
| 國立成功大學 |
2016-06-03 |
結合KM與EMMS對電子廠設備效能改善之研究
|
黃明祥; Huang, Ming-Hsiang |
| 亞洲大學 |
2016-05 |
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
Ling, C. H.;Ling, Chung-Huei;Chen, S. M.;Chen, Shih-Ming;黃明祥* |
| 亞洲大學 |
2016-05 |
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
Ling, C. H.;Ling, Chung-Huei;Chen, S. M.;Chen, Shih-Ming;黃明祥* |
| 國立臺中教育大學 |
2016-03 |
《方言》本字與上古漢語之研究
|
陳世明; 黃明祥; Chen, Shih-Ming;Hwang, Min-Shiang |
| 亞洲大學 |
2016-03 |
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach
|
Ling), C. H. Ling(Chung-Huei;Hsien), Wei-Fu Hsien(Wei-Fu;黃明祥* |
| 亞洲大學 |
2016-03 |
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach
|
Ling, C. H.;Ling, Chung-Huei;Hsien, Wei-Fu;Hsien, Wei-Fu;黃明祥* |
| 亞洲大學 |
2016-01 |
The Moderately Hard DoS-resistant Authentication Protocol on Client Puzzles
|
黃明祥*;Chong), S. K. Chong(Song-Kong;Ou), Hsia-Hung Ou(Hsia-Hung |
| 亞洲大學 |
2016-01 |
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
|
Hsien), Wei-Fu Hsien(Wei-Fu;Yang), Chou-Chen Ya(Chou-Chen;黃明祥* |
| 亞洲大學 |
2016-01 |
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
|
Hsien, Wei-Fu;Hsien, Wei-Fu;Ya, Chou-Chen;Yang, Chou-Chen;黃明祥* |
| 亞洲大學 |
2015/11 |
International Journal of Network Security
|
;Shih, 施能義 Neng-Yih;黃明祥 |
| 亞洲大學 |
2015/01 |
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server
|
;黃明祥 |
| 亞洲大學 |
2015-12 |
Cases Study and Analysis of the Court Judgement of Cybercrimes in Taiwan
|
Sun), Jia-Rong Sun(Jia-Rong;施茂林;黃明祥 |
| 亞洲大學 |
2015-11 |
A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
|
Ya, Chun-Ming;Yang, Chun-Ming;施能義;Shih, Neng-Yih;黃明祥 |
| 亞洲大學 |
2015-11 |
A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
|
Feng), 馮棟煌(Tung-Huang;Shih), 施能義(Neng-Yih;黃明祥 |
| 亞洲大學 |
2015-09 |
A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure
|
Sun), 孫加榮(Jia-Rong;施茂林;黃明祥 |
| 亞洲大學 |
2015-07 |
An Efficient IC-Lock Self-Reader Data Security in Cloud Computing
|
黃明祥;Le, Cheng-Chi;Chu, Pei-Shan |
| 亞洲大學 |
2015-07 |
The Secure Transaction Protocol in NFC Card Emulation Mode
|
Chi), 紀逸倫(Yi-Lun;Chen), C. H. Chen(Cheng Hao;Lin), I. C. Lin(Iuon-Chang;黃明祥 |
| 亞洲大學 |
2015-07 |
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures
|
Ren), YanLi Ren(YanLi;Wang), S. Z Wang(Shuozhong;Zhang), X. P.Zhang(Xinpeng;黃明祥 |
| 國立臺灣體育運動大學 |
2015-06 |
探討 桌球選手彭婉華準備 2011年全國大專校院運動會混合雙打
|
彭婉華;黃明祥;郭智翔 |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Chia-Hui Wei(Chia-Hui Wei); 黃明祥; Y, H.Chin(Augustin Yeh-hao Chin) |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Wei), Chia-Hui Wei(Chia-Hui;黃明祥;Y, H. Chin(Augustin Yeh-hao Chin) |
| 亞洲大學 |
2015-05 |
A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey
|
Feng), 馮棟煌(Tung-Huang;Li), Wei Teng Li(Wei Teng;黃明祥 |
| 亞洲大學 |
2015-03 |
Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
|
Wijayanto), H. Wijayanto(Heri;黃明祥 |