Your browser does not support JavaScript!
多媒體與行動商務學系
多媒體系
楊仁和

楊仁和 --- 專任副教授

永遠樂觀面對逆境,因為只有面對光明,陰影才會在我們身後。 教學網站: https://sites.google.com/site/jenhoyang/
 
姓           名 楊仁和
職           稱 專任副教授
學           歷 
國立中正大學資訊工程博士
專           長 
資訊安全
電子商務之身份認證與付款機制
數位權利管理
電腦大數運算
網路與行動通訊安全
經           歷 
朝陽科技大學兼任講師
教 授 課 程 
資訊安全
資料結構
電子商務經營實務
密碼學
最 新 著 作 期刊:
Chang, C. C., Yang, J. H., and Wang, D. W., “An Efficient and Reliable E-DRM scheme for Mobile Environments”, Expert Systems with Applications,Vol.37,No.9,pp.6176-6181,Sep. 2010. (SCI, EI)
Yang, J. H. and Chang, C. C., “An Efficient Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments”, The Journal of Systems and Software,Vol.82,No.9,pp.1497-1502,Sep. 2009. (SCI, EI)
Yang, J. H. and Chang, C. C., “An Efficient Fair Electronic Payment System Based upon Non-Signature Authenticated Encryption Scheme”, International Journal of Innovative Computing, Information and Control,Vol.5,No.11,pp.3861-3873,Nov. 2009. (SCI, EI)
Yang, J. H. and Chang, C. C., “An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem”, Computers & Security,Vol.28,No.3-4,pp.138-143,May-Jun. 2009. (SCI, EI)
Chang, Y. F., Chang, C. C., and Yang, J. H., “An Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Computer Standards & Interfaces,Vol.27,No.3,pp.313-322,Mar. 2005. (SCI, EI)
Yang, J. H., Chang, C. C., and Chen, C. Y., “A High-Speed Division Algorithm in Residue Number System Using Parity-Checking Technique”, International Journal of Computer Mathematics,Vol.81,No.6,pp.775-780,Jun. 2004. (SCI)
Chang, C. C. and Yang, J. H., “A Parallel Conversion Algorithm Based upon Aryabhata Remainder Theorem for Residue Number System”, International Journal of Innovative Computing, Information and Control,Vol.5,No.7,pp.2053-2060,Jul. 2009. (SCI, EI)
Yang, J. H. and Chang, C. C., “Efficient RNS Iterative Modular Multiplication Algorithm for Fast Modular Exponentiation”, IET Computers and Digital Techniques,Vol.2,No.1,pp.1-5,Jan. 2008. (SCI, EI)
Yang, J. H., Chang, C. C, and Lin, C. H., “Residue Number System Oriented Image Encoding Schemes”, Imaging Science Journal,Vol.58,No.1,pp.3-11,Feb. 2010. (SCI)
Chang, C. C., Lai, Y. W., and Yang, J. H., “An Efficient Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem for Broadcast Environments”, ICIC Express Letters,Vol.4,No.1,pp.95-99,Feb. 2010. (EI)
Chang, C. C. and Yang, J. H., “An Efficient ID-Based User Identification Scheme for Mutual Authentication in Mobile Environments”, Journal of Discrete Mathematical Sciences and Cryptography,Vol.9,No.3,pp.537-548,Dec. 2006. (EI)
Yang, J. H., Chang, C. C., and Wang, C. H., “An Iterative Modular Multiplication Algorithm in RNS”, Applied Mathematics and Computation,Vol.171,No.1,pp.637-645,Dec. 2005. (SCI, EI)
Yang, J. H. and Chang, C. C., “An Efficient Payment Scheme by Using Electronic Bill of Lading”, International Journal of Innovative Computing, Information and Control,Vol.6,No.4,pp.1773-1779,Apr. 2010. (SCI, EI)
Chang, C. C., Yeh, J. S., and Yang, J. H., “Generalized Aryabhata Remainder Theorem”, International Journal of Innovative Computing, Information and Control,Vol.6,No.4,pp.1865-1871,Apr. 2010. (SCI, EI)
Jen-Ho Yang , Chin-Chen Chang, “A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users”, Wireless Personal Communication,Vol.63,No.1,pp.83-99,2012
楊仁和 , 孫崇軒 , 劉瑞榮, “適用於行動通訊設備之企業數位權利管理機制”, 商略學報(International Journal of Commerce and Strategy),Vol.3,No.2,pp.125-136,2011
Chang, C. C. and Yang, J. H., “A Parallel Computation Algorithm for Generalized Aryabhata Remainder Theorem”, to appear in International Journal of Computer Sciences and Engineering Systems,Vol.4,No.1,2010
Chin-Chen Chang , Jen-Ho Yang, “An Efficient ID-Based User Identification Scheme for Mutual Authentication in Mobile Environments”, Journal of Discrete Mathematical Sciences and Cryptography,Vol.9,No.3,pp.537-548,2009
會議論文:
Yang, J. H., Chang, C. C., and Wang, C. H., “A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme”, Ubiquitous Intelligence and Computing - Third International Conference on Ubiquitous Intelligence and Computing (UIC-06), (Book Chapter, Ma, J., Jin, H., Yang, L. T. and Tsai, J. P. Eds.), LNCS, Springer-Verlag Berlin Heidelberg, Germany,Vol.4159,pp.998-1007,.China,.Wuhan,Sep. 2006.
Chang, C. C., Lin, S. Y., and Yang, J. H., “Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices”, Proceedings of IEEE 9th International Conference on Computer and Information Technology (CIT09),pp.131-135,.China,.Xiamen,Oct. 2009. (EI)
Yang, J. H. and Chang, C. C., “Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem”, Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008),Vol.3,pp.3-5,.R.O.C.,.Kaohsiung,Nov. 2008. (EI)
Chang, C. C., Chang, K. J., and Yang, J. H., “An Efficient Identity Management Protocol for 3G Mobile Networks”, International Workshop on Security Engineering and Information Technology on High Performance Network 2006 (SIT06),pp.SIT15:1-8,.Korea,.Cheju Island,Nov. 2006.
Yang, J. H., Chang, C. C., and Wang, C. H., “An Efficient Key Establishment Scheme Using One-Way Function Tree for Sensor Networks”, Proceedings of the Fifth International Workshop for Applied PKC (IWAP'06),pp.31-46,.China,.Dalian,Nov. 2006.
Yang, J. H. and Chang, C. C., “An Efficient Authentication with Key Agreement Protocol for Sensor Networks”, Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06),pp.71-77,.Singapore,Jun. 2006.
Chang, C. C. and Yang, J. H., “An Efficient Generalized Secret Sharing Scheme Based on Chinese Remainder Theorem”, Proceedings of the Fifth International Conference on Information and Management Sciences Conference (IMS 2006),pp.333-336,.China,.Chengdu,Jul. 2006.
楊仁和, “一個有效率且公平的(t, n)門檻值之多重秘密分享機制”, 第十七屆模糊理論及其應用會議,pp.525-528,.R.O.C.,.Kaohsiung,Dec. 2009.
Lin, I. C., Chang, C. C., and Yang, J. H., “An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy”, Proceedings of Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008),pp.1537-1540,.China,.Harbin,Aug. 2008. (EI)
Yang, J. H. and Chang, C. C., “Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems”, Proceedings of Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008),pp.1379-1382,.China,.Harbin,Aug. 2008. (EI)
Chin-Chen Chang , Jen-Ho Yang , Kai-Jie Chang, “An Efficient and Flexible Mobile Payment Protocol”, Proceedings of The Sixth International Conference on Genetic and Evolutionary Computing (ICGEC2012),pp.63-66,2012
Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang, “An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme”, 2011 Fifth International Conference on Genetic and Evolutionary Computing,pp.180-183,.China,2011
Jen-Ho Yang , Chin-Chen Chang , Shih-Yi Lin, “An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices”, The Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing,pp.145-148,2011
 E-mail jenhoyang@mail.knu.edu.tw
 教   研   室 S408-2 分機:6069
在 校 時 間 在校時間表
檔 案 下 載 

 

瀏覽數  
將此文章推薦給親友
請輸入此驗證碼
Voice Play
更換驗證碼