楊仁和簡歷

 

楊仁和(Jen-Ho Yang學經歷簡介


 

最高學歷
國立中正大學資訊工程所博士 (Sept. 2002 ~ Jun. 2009)
教學經歷
朝陽科技大學資管系兼任講師
教授課程: 作業系統、資訊安全
(Sept. 2008 ~ Jun. 2009)
 
開南大學資訊及電子商務系助理教授(現職)
教授課程: 資訊安全、電子商務、資料結構、網路安全、密碼學、電子商務經營實務、多媒體程式設計
(Sept. 2009 ~ 迄今)
 
曾參與之國科會計畫
名稱
編號
職稱
擔任工作
 
我國數位簽章演算法標準之研擬
NSC90-2213-E-214-057
研究助理
計畫及論文撰寫
 
利用餘數系統轉換設計高速的密碼運算機制
NSC96-2221-E-035-010
研究助理
計畫及論文撰寫
 
網際網路的電子交易安全機制之研究
NSC97-2221-E-035-039-MY3
研究助理
計畫及論文撰寫
 
研究專長
資訊安全(Information Security)、電子商務(Electronic Commerce)、行動通訊安全(Mobile Communication Security)、電腦大數運算演算法(Computer Arithmetic for Large Number Computing) 、身分認證協定(Authentication Protocols for E-Commerce)、電子付款系統(Electronic Payment Systems)、密碼學(Cryptography)、數位權利管理與保護(Digital Right Management and Protection)
 
曾授課科目
資訊安全、電子商務、作業系統、資料結構、演算法、網路安全、程式語言、多媒體程式設計、計算機概論
 
論文評審委員
1.        Information Science
2.        Journal of Systems and Software
3.        Journal of Information Science and Engineering
4.        EURASIP Journal on Wireless Communications and Networking
5.        第十七屆模糊理論及其應用會議論文評審委員
 
其他學術經歷
資訊安全通訊特約編輯、資訊安全協會終身會員
 
博士論文題目及指導教授
中文題目
認證協定在電子商務上之應用
 
英文題目
Authentication Protocols for E-Commerce Applications
 
指導教授
張真誠博士 (Prof. Chin-Chen Chang)
 
碩士論文題目及指導教授
中文題目
餘數系統下之快速除法演算法
 
英文題目
A Fast Division Algorithm in Residue Number System
 
指導教授
陳建源博士 (Prof. Chin-Chen Chang)
 

 
Professional Publication
 
國際期刊論文 (International Journal paper)
 
1.      Yang, J. H., Chang, C. C., and Chen, C. Y., “A High-Speed Division Algorithm in Residue Number System Using Parity-Checking Technique,” International Journal of Computer Mathematics, Vol. 81, No. 6, pp. 775-780, Jun. 2004. [SCI] (Impact Factor: 0.478, Ranking: 168/202)
2.      Chang, Y. F., Chang, C. C., and Yang, J. H., “An Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks,” Computer Standards & Interfaces, Vol.27, No. 3, pp. 313-322, Mar. 2005. [SCI, EI] (Impact Factor: 1.373, Ranking: 18/49)
3.     Yang, J. H., Chang, C. C., and Wang, C. H., “An Iterative Modular Multiplication Algorithm in RNS,” Applied Mathematics and Computation, Vol. 171, No. 1, pp. 637-645, Dec. 2005. [SCI, EI] (Impact Factor: 1.124, Ranking: 61/202)
4.      Chang, C. C. and Yang, J. H., “An Efficient ID-Based User Identification Scheme for Mutual Authentication in Mobile Environments,” Journal of Discrete Mathematical Sciences and Cryptography, Vol.9, No. 3, pp. 537-548, Dec. 2006. [EI]
5.      Yang, J. H. and Chang, C. C., “Efficient RNS Iterative Modular Multiplication Algorithm for Fast Modular Exponentiation,” IET Computers and Digital Techniques, Vol. 2, No. 1. pp. 1-5, Jan. 2008. [SCI, EI] (Impact Factor: 0.629, Ranking: 36/49)
6.      Yang, J. H. and Chang, C. C., “An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem,” Computers & Security, Vol. 28, No. 3-4, pp. 138-143, May-Jun. 2009. [SCI, EI] (Impact Factor: 1.488, Ranking: 48/116)
7.      Chang, C. C. and Yang, J. H., “A Parallel Conversion Algorithm Based upon Aryabhata Remainder Theorem for Residue Number System,” International Journal of Innovative Computing, Information and Control, Vol. 5, No. 7, pp. 2053-2060, Jul. 2009. [SCI, EI] (Impact Factor: 2.932, Ranking: 3/59)
8.      Yang, J. H. and Chang, C. C., “An Efficient Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments,” Journal of Systems and Software, Vol. 82, No. 9, pp. 1497-1502, Sep. 2009. [SCI, EI] (Impact Factor: 1.340, Ranking: 38/93)
9.      Yang, J. H. and Chang, C. C., “An Efficient Fair Electronic Payment System Based upon Non-Signature Authenticated Encryption Scheme,” International Journal of Innovative Computing, Information and Control, Vol. 5, No. 11, pp.3861-3873, Nov. 2009. [SCI, EI] (Impact Factor: 2.932, Ranking: 3/59)
10.    Yang, J. H., Chang, C. C, and Lin, C. H., “Residue Number System Oriented Image Encoding Schemes,” Imaging Science Journal, Vol. 58, No. 1, pp. 3-11, Feb. 2010. [SCI] (Impact Factor: 0.169, Ranking: 12/13)
11.    Chang, C. C., Lai, Y. W., and Yang, J. H.An Efficient Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem for Broadcast Environments,” ICIC Express Letters, Vol. 4, No. 1, pp. 95-99, Feb. 2010. [EI], “
12.       Yang, J. H. and Chang, C. C., “An Efficient Payment Scheme by Using Electronic Bill of Lading,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 4, pp. 1773-1779, Apr. 2010. [SCI, EI] (Impact Factor: 2.932, Ranking: 3/59)
13.    Chang, C. C., Yeh, J. S., and Yang, J. H., “Generalized Aryabhata Remainder Theorem,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 4, pp. 1865-1871, Apr. 2010.[SCI, EI] (Impact Factor: 2.932, Ranking: 3/59)
14.    Chang, C. C. and Yang, J. H., “A Parallel Computation Algorithm for Generalized Aryabhata Remainder Theorem,” International Journal of Computer Sciences and Engineering Systems, Vol.4, No. 1, pp. 61-67, Jan. 2010.
15.    Chang, C. C., Yang, J. H., and Wang, D. W., “An Efficient and Reliable E-DRM scheme for Mobile Environments,” Expert Systems with Applications, Vol. 37, No. 9, pp.6168-6176, Sep. 2010. [SCI, EI] (Impact Factor: 2.908, Ranking: 15/102)
16.    Yang, J. H. and Chang, C. C., “A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users,” to appear in Wireless Personal Communication, Jul. 2010. [SCI, EI] (Impact Factor: 0.418, Ranking: 49/76)
 
n           專書論文 (Book Chapter)
 
1.        Yang, J. H., Chang, C. C., and Wang, C. H., “A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme,” Ubiquitous Intelligence and Computing - Third International Conference on Ubiquitous Intelligence and Computing (UIC-06), (Ma, J., Jin, H., Yang, L. T. and Tsai, J. P. Eds.), LNCS, Springer-Verlag Berlin Heidelberg, Germany, Vol. 4159, pp. 998-1007, Sep. 2006.
 
國際會議論文 (International Conference Papers)
 
1.      Jen-Ho Yang, Chih-Cheng Hsueh, and Chien-Yuan Chen, “Partially Blind Multisignature Scheme Based on RSA Modulus,” Proceedings of the 2000 Asia Pacific Conference on Multimedia Technology and Applications, pp.421-424, DEC. 2000.
2.      Yang, J. H.and Chang, C. C., “An Efficient Authentication with Key Agreement Protocol for Sensor Networks,” Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), Singapore, pp. 71-77, Jun. 2006.
3.      Chang, C. C. and Yang, J. H., “An Efficient Generalized Secret Sharing Scheme Based on Chinese Remainder Theorem,” Proceedings of the Fifth International Conference on Information and Management Sciences Conference (IMS 2006), Chengdu, China, pp. 333-336, Jul. 2006.
4.      Yang, J. H., Chang, C. C., and Wang, C. H., “An Efficient Key Establishment Scheme Using One-Way Function Tree for Sensor Networks,” Proceedings of the Fifth International Workshop for Applied PKC (IWAP'06), Dalian, Liaoning, China, pp. 31-46, Nov. 2006.
5.      Chang, C. C., Chang, K. J., and Yang, J. H., “An Efficient Identity Management Protocol for 3G Mobile Networks,” International Workshop on Security Engineering and Information Technology on High Performance Network 2006 (SIT06), Cheju Island, Korea, pp. SIT15:1-8, Nov. 2006.
6.      Yang, J. H. and Chang, C. C., “Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems,” Proceedings of Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, pp. 1379-1382, Aug. 2008. [EI]
7.      Lin, I. C., Chang, C. C., and Yang, J. H., “An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy,” Proceedings of Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, pp.1537-1540, Aug. 2008. [EI]
8.      Yang, J. H. and Chang, C. C., “Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem,” Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), Vol. 3, Kaohsiung City, Taiwan, pp. 3-5, Nov. 2008. [EI]
9.      Chang, C. C., Lin, S. Y., and Yang, J. H., “Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices,” Proceedings of IEEE 9th International Conference on Computer and Information Technology (CIT09), Xiamen, China, pp. 131-135, Oct. 2009. [EI]
10.    Yang, J. H., Hsueh, C. C., Sun, C. H., “An Efficient and Flexible Authentication Scheme with User Anonymity for Digital Right Management”, Proceedings of The Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen, China, pp. 630-633, DEC. 2010. [EI]
 
國內雜誌文章
 
1.      陳建源、柯博文、謝忠益、薛智誠、楊仁和部分盲簽章與託管簽章簡介,資訊全通訊,第七卷,第三期,頁78-8520016月。
2.      楊仁和、劉瑞榮、楊治清,無同步交易問題之電子付款機制,資訊安全通訊(Communications of the CCISA: Special Issue on E-Commerce Security and Applications),第十六卷,第三期,頁36-4520107月。
3.      劉季綸、楊仁和私密地分享數位內容至自己與他人的社交圈:社交網路中數位內容保護之存取控制方法,資訊安全通訊(Communications of the CCISA: Digital Content Protection and Its Technology),第十七卷,第一期,頁73-8420111月。
 
國內會議論文
 
1.         Chih-Cheng Hsueh, Jen-Ho Yang, and Chien-Yuan Chen“A Partially Blind Multisignature Scheme Based on the Discrete Logarithm Problem”,第六屆資訊管理研究暨實務研討會,國立交通大學,pp. 10920005月。
2.     Jen-Ho Yang, Chien-Yuan Chen, and Chih-Hung Wang“An Improvement of the High-Speed Division Algorithm for Residue Number System”,第十二屆全國資訊安全會議,臺中健康管理學院,pp.273-27620025月。
3.      楊仁和一個有效率且公平的(t, n)門檻值之多重秘密分享機制,第十七屆模糊理論及其應用會議,高雄大學,pp. 525-528 200911月。
4.        楊仁和、孫崇軒、謝家祥,以群組為導向之企業數位權利管理機制 2010資訊安全技術創新應用研討會,中國文化大學,pp. 287-294 201012月。

電子報訂閱


姓名:

Email:

長頌科技股份有限公司 台北市中山區松江路3號4樓之2  TEL:02-25165900  [MAP]
All rights reserved. 建議使用 IE 7.0 以上瀏覽器 解析度 1024 x 768