| 亞洲大學 |
2015-01 |
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server
|
;黃明祥 |
| 亞洲大學 |
2015-01 |
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server
|
Sun, Jia-Rong;Sun, Jia-Rong;黃明祥 |
| 亞洲大學 |
2015-01 |
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server
|
Sun), Jia-Rong Sun(Jia-Rong;黃明祥 |
| 亞洲大學 |
2015 |
PHP+MySQL 資訊管理系統
|
黃明祥 |
| 亞洲大學 |
201411 |
Group Rekeying in Wireless Sensor Networks: A Survey
|
Li, Wei Teng;Li, Wei Teng;林宗輝;黃明祥 |
| 亞洲大學 |
201407 |
Phenethyl isothiocyanate triggers apoptosis in human malignant melanoma A375.S348 cells through reactive oxygen species and the mitochondria-dependent pathways
|
Yang), L.C.Huang(Li-Chin Huang); 黃明祥; W.P.Yang(Wei-Pang |
| 亞洲大學 |
201407 |
A Conference Key Distribution Scheme in Tree Hierarchies
|
Yang), L.C.Huang(Li-Chin Huang); 黃明祥; W.P.Yang(Wei-Pang |
| 國立交通大學 |
2014-12-12T02:46:11Z |
可證明安全的公開金鑰密碼系統與通行碼驗證金鑰交換
|
張庭毅; Ting-Yi Chang; 楊維邦; 黃明祥; Wei-Pang Yang; Min-Shiang Hwang |
| 國立交通大學 |
2014-12-12T02:28:52Z |
微振量測器之分析與應用
|
黃明祥; Hwang Ming-Shyang; 鄭璧瑩; Pi-Ying Cheng |
| 國立交通大學 |
2014-12-12T02:13:31Z |
以密碼學為基礎之資料庫安全性研究
|
黃明祥; Min-Shiang Hwang; 曾文貴, 楊維邦; Wen-Guey Tzeng, Wei-Pang Yang |
| 亞洲大學 |
2014-11 |
Group Rekeying in Wireless Sensor Networks: A Survey
|
Li, Wei Teng;Li, Wei Teng;林宗輝;黃明祥 |
| 亞洲大學 |
2014-09 |
Data Error Locations Reported by Public Auditing in Cloud Storage Service
|
黃明祥;C.C.Lee;Lee, Cheng-Chi;T.H.Sun;Sun, Tsuei-Hung |
| 亞洲大學 |
2014-09 |
Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey
|
Li, Wei Teng;Li, Wei Teng;馮棟煌;Feng, Tung-Huang;黃明祥 |
| 亞洲大學 |
2014-09 |
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
|
黃明祥;S.T.Hsu;Hsu, Shih-Ting;C.C.Lee;Lee, Cheng-Chi |
| 亞洲大學 |
2014-08 |
行動通訊點對點網路之數位權管理系統研發
|
黃明祥 |
| 亞洲大學 |
2014-08 |
雲端與行動智慧整合之安全電子投票系統
|
黃明祥 |
| 亞洲大學 |
2014-08 |
雲端系統之關鍵字搜尋公開金鑰加密法之研究
|
黃明祥 |
| 國立臺中教育大學 |
2014-07 |
臺語漢字教學芻議-以漢語拗音方法解決臺語有音無字為例-
|
陳世明; 黃明祥; Chen, Shu-Ming; Hwang, Min-Shiang |
| 亞洲大學 |
2014-07 |
Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments
|
T.H.Feng;Feng, Tung-Huang;C.H.Ling;Ling, Chung-Huei;黃明祥 |
| 亞洲大學 |
2014-05 |
Weaknesses of the Yoon-Kim-Yoo Remote User Authentication Scheme Using Smart Cards
|
Chen, Te-Yu;Chen, Te-Yu;林宗輝;Ling, Chung-Huei;黃明祥 |
| 亞洲大學 |
2014-03 |
An Efficient MQV Key Agreement Scheme
|
L.C.Huang;Huang, Li-Chin;黃明祥 |
| 亞洲大學 |
2014-01 |
A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments
|
P.S.Chung;Chung, Pei-Shan;Liu, Chi-Wei;Liu, Chi-Wei;黃明祥 |
| 亞洲大學 |
201309 |
A Study of Conjunctive Keyword Searchable Schemes
|
C.C.Lee;Lee, Cheng-Chi;S.T.Hsu;Hsu, Shih-Ting;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
201309 |
An Authentication Scheme for the Global Mobility Network
|
S.K.Chong;Chong, Song-Kong;C.C.Lee;Lee, Cheng-Chi;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
201309 |
Double Delegation-based Authentication and Key Agreement Protocol for PCSs
|
Ou, Hsia-Hung;Ou, Hsia-Hung;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
201304 |
A New Proxy Signature Scheme for a Specified Group of Verifiers
|
黃明祥;Hwang, Min-Shiang;Le, Cheng-Chi;Lee, Cheng-Chi;Shiang-Feng;Tzeng, Shiang-Feng |
| 亞洲大學 |
2013-12 |
以逆向工程技術解開臺語漢字書寫之謎
|
陳世明;黃明祥 |
| 亞洲大學 |
2013-12 |
智慧型景點導覽系統之研發
|
李哲瑋;楊宏文;黃明祥 |
| 亞洲大學 |
2013-11 |
Privacy Protection Data Access Control
|
Chen, Min-Yu;Chen, Min-Yu;C.C.Yang;Yang, Chou-Chen;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013-11 |
Towards Secure and Efficient User Authentication Scheme Using Smart Card for Multi-Server Environments
|
Chen, Te-Yu;Chen, Te-Yu;C.C.Lee;Lee, Cheng-Chi;黃明祥;Hwang, Min-Shiang;Jan, Jinn-Ke;Jan, Jinn-Ke |
| 亞洲大學 |
2013-07 |
A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments
|
Chu, Pei-Shan;Lee, Cheng-Chi;Chu, Pei-Shan;Chung, Pei-Shan;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013-03 |
A n2+n MQV Key Agreement Protocol
|
Hwang, L.C;Hwang, Li-Chin;C.C.Lee;Lee, Cheng-Chi;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013-03 |
A Study of Public Key Encryption with Keyword Search
|
Hs, Shih-Ting;Hsu, Shih-Ting;Ya, Chou-Chen;Yang, Chou-Chen;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013-03 |
A Reversible Data Hiding Method by Histogram Shifting in High Quality Medical Images
|
Huan, Li-Chin;Huang, Li-Chin;Tseng, Lin-Yu;Tseng, Lin-Yu;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013-01 |
Improved on Date Attachable Electronic Cash
|
Lo, Jung-Wen;Lo, Jung-Wen;Lu, Hung-Miao;Lu, Hung-Miao;Tsuei-Hung, S;Sun, Tsuei-Hung;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013-01 |
A New Group Signature Scheme Based on RSA Assumption
|
C.C.Yang;Yang, Chou-Chen;T.Y.Chang;Chang, Ting-Yi;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013-01 |
Guessing Attacks on Strong-Password Authentication Protocol
|
Le, Cheng-Chi;Lee, Cheng-Chi;Li, Chia-Hsin;Liu, Chia-Hsin;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013-01 |
A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol
|
Li, Chun-Ta;Li, Chun-Ta;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013-01 |
Two-party Authenticated Multiple-key Agreement Based on Elliptic Curve Discrete Logarithm Problem
|
Huan, Li-Chin;Huang, Li-Chin;黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2013 |
雲端儲存金鑰管理與審核代理機制之研究(II)
|
黃明祥 |
| 亞洲大學 |
2012.01 |
A Cryptographic Key Generation Scheme Without A Trusted Third Party For Access Control In Multilevel Wireless Sensor Network
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2012.01 |
A Secure and Efficient One-time Password Authentication Scheme for Wireless Sensor Networks
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2012-10 |
A Simple and Secure Key Agreement Protocol to Integrate a Key Distribution Procedure into the DSS
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2012-09 |
A Modified Ohta-Okamoto Digital Signature for Batch Verification and Its Multi-Signature Version
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2012-09 |
An Improved Authentication Protocol for Mobile Agent Device in RFID
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2012-09 |
Study of an Intrusion Detection System
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2012-08 |
A Secure Image Authentication Scheme for Tamper Detection and Recovery
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2012-08 |
An Effective AKA Protocol for UMTS
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2012-08 |
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2012-08 |
Improvement of Convertible Authenticated Encryption Schemes
|
黃明祥;Hwang, Min-Shiang |