| 亞洲大學 |
2016-09 |
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
|
Liu, Chi-Wei;Liu, Chi-Wei;Hsien, Wei-Fu;Hsien, Wei-Fu;Yang, C. C.;Yang, Chou-Chen;黃明祥* |
| 亞洲大學 |
2016-07 |
A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing
|
Liu, Chi-Wei;Liu, Chi-Wei;Hsien, Wei-Fu;Hsien, Wei-Fu;Yang, C. C.;Yang, Chou-Chen;黃明祥* |
| 國立成功大學 |
2016-06-03 |
結合KM與EMMS對電子廠設備效能改善之研究
|
黃明祥; Huang, Ming-Hsiang |
| 亞洲大學 |
2016-05 |
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
Ling, C. H.;Ling, Chung-Huei;Chen, S. M.;Chen, Shih-Ming;黃明祥* |
| 亞洲大學 |
2016-05 |
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
Ling, C. H.;Ling, Chung-Huei;Chen, S. M.;Chen, Shih-Ming;黃明祥* |
| 國立臺中教育大學 |
2016-03 |
《方言》本字與上古漢語之研究
|
陳世明; 黃明祥; Chen, Shih-Ming;Hwang, Min-Shiang |
| 亞洲大學 |
2016-03 |
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach
|
Ling), C. H. Ling(Chung-Huei;Hsien), Wei-Fu Hsien(Wei-Fu;黃明祥* |
| 亞洲大學 |
2016-03 |
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach
|
Ling, C. H.;Ling, Chung-Huei;Hsien, Wei-Fu;Hsien, Wei-Fu;黃明祥* |
| 亞洲大學 |
2016-01 |
The Moderately Hard DoS-resistant Authentication Protocol on Client Puzzles
|
黃明祥*;Chong), S. K. Chong(Song-Kong;Ou), Hsia-Hung Ou(Hsia-Hung |
| 亞洲大學 |
2016-01 |
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
|
Hsien), Wei-Fu Hsien(Wei-Fu;Yang), Chou-Chen Ya(Chou-Chen;黃明祥* |
| 亞洲大學 |
2016-01 |
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
|
Hsien, Wei-Fu;Hsien, Wei-Fu;Ya, Chou-Chen;Yang, Chou-Chen;黃明祥* |
| 亞洲大學 |
2015/11 |
International Journal of Network Security
|
;Shih, 施能義 Neng-Yih;黃明祥 |
| 亞洲大學 |
2015/01 |
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server
|
;黃明祥 |
| 亞洲大學 |
2015-12 |
Cases Study and Analysis of the Court Judgement of Cybercrimes in Taiwan
|
Sun), Jia-Rong Sun(Jia-Rong;施茂林;黃明祥 |
| 亞洲大學 |
2015-11 |
A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
|
Ya, Chun-Ming;Yang, Chun-Ming;施能義;Shih, Neng-Yih;黃明祥 |
| 亞洲大學 |
2015-11 |
A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
|
Feng), 馮棟煌(Tung-Huang;Shih), 施能義(Neng-Yih;黃明祥 |
| 亞洲大學 |
2015-09 |
A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure
|
Sun), 孫加榮(Jia-Rong;施茂林;黃明祥 |
| 亞洲大學 |
2015-07 |
An Efficient IC-Lock Self-Reader Data Security in Cloud Computing
|
黃明祥;Le, Cheng-Chi;Chu, Pei-Shan |
| 亞洲大學 |
2015-07 |
The Secure Transaction Protocol in NFC Card Emulation Mode
|
Chi), 紀逸倫(Yi-Lun;Chen), C. H. Chen(Cheng Hao;Lin), I. C. Lin(Iuon-Chang;黃明祥 |
| 亞洲大學 |
2015-07 |
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures
|
Ren), YanLi Ren(YanLi;Wang), S. Z Wang(Shuozhong;Zhang), X. P.Zhang(Xinpeng;黃明祥 |
| 國立臺灣體育運動大學 |
2015-06 |
探討 桌球選手彭婉華準備 2011年全國大專校院運動會混合雙打
|
彭婉華;黃明祥;郭智翔 |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Chia-Hui Wei(Chia-Hui Wei); 黃明祥; Y, H.Chin(Augustin Yeh-hao Chin) |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Wei), Chia-Hui Wei(Chia-Hui;黃明祥;Y, H. Chin(Augustin Yeh-hao Chin) |
| 亞洲大學 |
2015-05 |
A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey
|
Feng), 馮棟煌(Tung-Huang;Li), Wei Teng Li(Wei Teng;黃明祥 |
| 亞洲大學 |
2015-03 |
Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
|
Wijayanto), H. Wijayanto(Heri;黃明祥 |