default search action
Chung-Huang Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j8]SeulKi Choi, Chung-Huang Yang, Jin Kwak:
System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. KSII Trans. Internet Inf. Syst. 12(2): 906-918 (2018) - 2017
- [c21]Xin-long Song, Chung-Huang Yang:
Mobile Device Management System Based on AOSP and SELinux. DSC 2017: 417-420 - [c20]Yu Shi, Dong Zheng, Chung-Huang Yang:
The Efficient Implementation of the Android Kernel with China Standard Cryptographic Algorithm. DSC 2017: 421-425 - [c19]Chan Gao, Chung-Huang Yang:
File-Based Encryption with SM4. DSC 2017: 426-430 - 2015
- [j7]Seok-Hun Kim, Chung-Huang Yang:
Special issue on advance in multimedia and its application for convergence technologies. Telecommun. Syst. 60(2): 199 (2015) - [c18]Cheng-Liang Kuo, Chung-Huang Yang:
Security Design for Configuration Management of Android Devices. COMPSAC Workshops 2015: 249-254 - 2013
- [j6]Bo Yang, Chung-Huang Yang, Yong Yu, Dan Xie:
A Secure Scalar Product Protocol and Its Applications to Computational Geometry. J. Comput. 8(8): 2018-2026 (2013) - [j5]Bo Yang, Yong Yu, Chung-Huang Yang:
A Secure Scalar Product Protocol Against Malicious Adversaries. J. Comput. Sci. Technol. 28(1): 152-158 (2013) - [c17]Chung-Nan Chen, Raylin Tso, Chung-Huang Yang:
Design and Implementation of Digital Forensic Software for iPhone. AsiaJCIS 2013: 90-95 - 2011
- [c16]Sheng-Wen Chen, Chung-Huang Yang, Chien-Tsung Liu:
Design and Implementation of Live SD Acquisition Tool in Android Smart Phone. ICGEC 2011: 157-162 - [c15]Yenting Lai, Chung-Huang Yang, Chih-Hung Lin, TaeNam Ahn:
Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing. ICHIT (2) 2011: 196-203 - 2010
- [c14]Chung-Huang Yang, Pei-Hua Yen:
Fast Deployment of Computer Forensics with USBs. BWCCA 2010: 413-416
2000 – 2009
- 2009
- [c13]Chung-Huang Yang, Shih-Yi Tu, Pei-Hua Yen:
Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting. IAS 2009: 122-125 - [c12]Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn:
Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. ICHIT 2009: 232-238 - [c11]Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn:
Design and implementation of a live-analysis digital forensic system. ICHIT 2009: 239-243 - [c10]Jiun-Kai Ke, Chung-Huang Yang, Tae-Nam Ahn:
Using w3af to achieve automated penetration testing by live DVD/live USB. ICHIT 2009: 460-464 - [c9]Chung-Huang Yang, Kuang-Li Ting:
Fast Deployment of Botnet Detection with Traffic Monitoring. IIH-MSP 2009: 856-860 - [c8]Sheng-Wen Pan, Chiung-Cheng Chuang, Chung-Huang Yang, Yu-Sheng Lai:
A Novel OTA with Dual Bulk-driven Input Stage. ISCAS 2009: 2721-2724 - [e1]Geuk Lee, Daniel Howard, Jeong Jin Kang, Dominik Slezak, Tae Nam Ahn, Chung-Huang Yang:
Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009. ACM International Conference Proceeding Series 321, ACM 2009, ISBN 978-1-60558-662-5 [contents] - 2008
- [c7]Ting-Kuo Liu, Chung-Huang Yang:
Design and Implementation of Campus Gate Control System Based on RFID. APSCC 2008: 1406-1411 - [c6]Chao-Hsi Yeh, Chung-Huang Yang:
Design and implementation of honeypot systems based on open-source software. ISI 2008: 265-266 - [c5]Kwo-Jean Farn, Shu-Kuo Lin, Kuo-Sui Lin, Chung-Huang Yang:
A study on critical infrastructure information technology Malfunction controls-- illustration of Taiwan. ISI 2008: 269-270 - 2006
- [j4]Wen-Yaw Chung, Yeong-Tsair Lin, Dorota G. Pijanowska, Chung-Huang Yang, Ming-Chia Wang, Alfred Krzyskow, Wladyslaw Torbicz:
New ISFET interface circuit design with temperature compensation. Microelectron. J. 37(10): 1105-1114 (2006) - 2005
- [j3]Chung-Huang Yang, Hikaru Morita, Tatsuaki Okamoto:
Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms. IEICE Trans. Commun. 88-B(3): 1244-1248 (2005) - 2004
- [j2]Wen-Yaw Chung, Chung-Huang Yang, Yaw-Feng Wang, Yi-Je Chan, Wladyslaw Torbicz, Dorota G. Pijanowska:
A signal processing ASIC for ISFET-based chemical sensors. Microelectron. J. 35(8): 667-675 (2004) - 2001
- [c4]Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao:
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes. ICICS 2001: 419-428
1990 – 1999
- 1991
- [j1]Kencheng Zeng, Chung-Huang Yang, Dah-Yea Wei, T. R. N. Rao:
Pseudorandom Bit Generators in Stream-Cipher Cryptography. Computer 24(2): 8-17 (1991) - 1990
- [c3]Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao:
Large Primes in Stream Cipher Cryptography. AUSCRYPT 1990: 194-205 - [c2]Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao:
An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications. CRYPTO 1990: 34-47
1980 – 1989
- 1989
- [c1]Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao:
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. CRYPTO 1989: 164-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint