Vita

Chung-Huang Yang, Ph.D.

Professor, National Kaohsiung Normal University, Taiwan

Distinguished Professor, Xi’an University of Posts and Telecommunications, China

Guest Professor, Xidian University, China

Member of the Committee of Experts on Computer Forensics, Chinese Institute of Electronics

email: chyang@nknu.edu.tw

web: http://security.nknu.edu.tw/ , https://sites.google.com/view/chyang123/

Google Scholar

Education:

Working Experience:

Current Research Interests:

  • Mobile Device Security
  • Digital Forensics
  • Efficient Implementations of Cryptosystems

Professional Activities:

Publications: Google Scholar

Ph.D. Dissertation: On the Key Information Redundancy in Secret-Key Cryptosystems, The Center for Advanced Computer Studies, University of Louisiana at Lafayette, 1990.

Journal Papers

  1. Magdy A. Bayoumi and Chung-Huang Yang, "Reconfigurable Testable Bit-Serial Multiplier for DSP Applications," IEE Proceedings Computers & Digital Techniques, Vol. 136, Pt. E, No. 6, November 1989, pp. 517-523.
  2. Kencheng Zeng, Chung-Huang Yang, Dah-Yea Wei and T.R.N. Rao, "Pseudorandom Bit Generators in Stream-Cipher Cryptography," IEEE Computer, Vol. 24, No. 2, February 1991, pp. 8-17.
  3. Hikaru Morita and Chung-Huang Yang, "A Modular-Multiplication Algorithm using Lookahead Determination," IEICE Trans. Fundamentals, Vol. E76-A, No. 1, January 1993, pp. 70-77.
  4. Chung-Huang Yang, Hikaru Morita, and Tatsuaki Okamoto, "Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms," IEICE Trans. Communications, Vol. E88-B, No. 3, March 2005, pp. 1244-1248.
  5. T.R.N. Rao and Chung-Huang Yang, "Aryabhata Remainder Theorem: Relevance to Public-Key Crypto-algorithms," Circuits, Systems & Signal Processing, Vol. 25, No. 1, 2006, pp. 1-15.
  6. Chung-Huang Yang, Tzong-Yih Kuo, TaeNam Ahn, and Chia-Pei Lee, "Design and Implementation of a Secure Instant Messaging Service based on Elliptic-Curve Cryptography," Journal of Computers, Vol. 18, No. 4, January 2008, pp. 31-38.
  7. Bo Yang, Yong Yu, and Chung-Huang Yang, "A Secure Scalar Product Protocol Against Malicious Adversaries," Journal of Computer Science and Technology,Vol. 28, No. 1, pp. 152-158, Jan. 2013.
  8. Kuan-Lin Chen and Chung-Huang Yang, “Design and Implementation of Privacy Impact Assessment for Android Mobile Devices,” ZTE CommunicationsSpecial Issue onSecurity and Privacy in Communications, Vol. 14, No. S0, June 2016, pp. 37-43.
  • Conference Papers
  1. Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "On the Linear Consistency Test in Cryptanalysis," Advances in Cryptology - Crypto'89, Springer-Verlag Lecture Notes in Computer Science Vol. 435, 1990, pp. 164-174.
  2. Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "Large Primes in Stream Cipher Cryptography," Advances in Cryptology - Auscrypt'90, Springer-Verlag Lecture Notes in Computer Science Vol. 453, 1990, pp. 194-205.
  3. Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "An Improved Linear Syndrome Algorithm in Cryptanalysis with Applications," Advances in Cryptology - Crypto'90, Springer-Verlag Lecture Notes in Computer Science Vol. 537, 1991, pp. 34-47.
  4. Hikaru Morita and Chung-Huang Yang, "An Efficient Modular-Multiplication Algorithm for Smart-Card Software Implementation," IEICE TechnicalReport on Information Security, ISEC91-58, Kawasaki, Japan, March 18, 1992.
  5. Hikaru Morita and Chung-Huang Yang, "An Optimal Modular-Multiplication Algorithm using Lookahead Determination for Software," The 1992 Symp. on Cryptography and Information Security, Tateshina, Japan, April 2-4, 1992, SCIS92-12C.
  6. Shoji Miyaguchi, Chung-Huang Yang, and Hikaru Morita, "Dynamic Structure Neutralizing Differential Attack," IEICE Technical Report on Information Security, ISEC92-6, July 1992.
  7. Chung-Huang Yang, "Modular Arithmetic Algorithms for Smart Cards," IEICE Technical Report on Information Security, ISEC92-16, August, 1992.
  8. Chung-Huang Yang, "Pseudorandom Bit Generators for Secure Broadcasting Systems," HD-Media'93 , October 1993, pp. S9-32 - 35.
  9. Chung-Huang Yang, So-Lin Yen, Hwang David Liu, Kuei Liu, Bor-Shenn Jeng, Kung-Yao Chang, Min-Shin Chang, Yu-Ling Cheng, Jo-Ling Liang, and Don-Min Shien, “Secure Official Document Mail Systems for Office Automation,”IEEE Annual International Carnahan Conference on Security Technology, October, 1997, pp. 161-164.
  10. Chung-Huang Yang, Shy-Ming Ju, and T.R.N. Rao, "A Smartcard-based Framework for Secure Document Exchange, " IEEE Annual International Carnahan Conference on Security Technology, October 1998, pp. 93-96.
  11. Chung-Huang Yang, "On the Design of Campus-Wide Multi-Purpose Smartcard Systems," IEEE Annual International Carnahan Conference on Security Technology, October, 1999, pp. 465-468.
  12. Chung-Huang Yang, "A 6805-based Security System for Broadcasting Stock Information," IEEE Annual International Carnahan Conference on Security Technology, October 2000, pp. 238-241.
  13. Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes," Third International Conference on Information and Communications Security, ICICS 2001, Xian, China, November 2001, Springer-Verlag Lecture Notes in Computer Science Vol. 2229, pp. 419-428.
  14. Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, and Chung-Huang Yang, "Fast implementation of AES cryptographic algorithms in smart cards," IEEE Annual International Carnahan Conference on Security Technology, pp. 573-579, October 2003.
  15. Hsien-Hau Chen, Yung-Sheng Chen, Hsia-Ling Chiang, and Chung-Huang Yang, "Design and implementation of smartcard-based secure e-mail communication," IEEE Annual International Carnahan Conference on Security Technology, Proceedings, pp. 225-231, October 2003.
  16. Magdy A. Bayoumi, Rajat Roy, and Chung-Huang Yang, "A Fault-Tolerant Testable Multiplier for DSP Applications," 29th Midwest Symp. on Circuits and Systems, pp. 637-639, Lincoln, Neb., 1986.
  17. Magdy A. Bayoumi and Chung-Huang Yang, "A Fault Tolerant Testable Module for Wafer Scale Integrated Systems," IEEE Proc. CompEuro '87, Hamburg, West Germany, May 1987, pp. 590-593. Hikaru Morita and Chung-Huang Yang, "An Efficient Modular-Multiplication Algorithm for Smart-Card Software Implementation," IEICE Technical Report on Information Security ), ISEC91-58, Kawasaki, Japan, March 18, 1992.
  18. Hikaru Morita and Chung-Huang Yang, "An Optimal Modular-Multiplication Algorithm using Lookahead Determination for Software," The 1992 Symp. on Cryptography and Information Security, Tateshina, Japan, April 2-4, 1992, SCIS92-12C.
  19. Shoji Miyaguchi, Chung-Huang Yang, and Hikaru Morita, "Dynamic Structure Neutralizing Differential Attack," IEICE Technical Report on Information Security, ISEC92-6, July 1992.
  20. Chung-Huang Yang, "Modular Arithmetic Algorithms for Smart Cards," IEICE Technical Report on Information Security , ISEC92-16, August, 1992.
  21. Chung-Huang Yang, "Pseudorandom Bit Generators for Secure Broadcasting Systems," HD-Media'93 , October 1993, pp. S9-32 - 35.
  22. Chung-Huang Yang, "LFSR-based Cryptographic Checksums for Secure Broadcasting," Information Security Conference, pp. 85-87, May1995.
  23. Chung-Huang Yang, "Campus Smart Cards with Public-Key Infrastructure," TANET'99, Oct. 1999.
  24. Chung-Huang Yang, "On the Design of High-Speed Pseudorandom bit Generators for Secure Broadcasting System, " Japan-Korea Joint Workshop on Information Security and Cryptology 2000 (JW-ISC 2000), January 25-26, 2000, Okinawa, Japan, pp. 9-15.
  25. Chung-Huang Yang, "On the Design of Dual-Interface Campus Smart Cards," 2000 Symposium on Cryptography and Information Security (SCIS 2000), January 26-28, 2000, Okinawa, Japan, Section D32.
  26. Chung-Huang Yang, "Design and implementation of cryptographic systems using 68HC05 microcontrollers," 2000 Asia Pacific Conference on Multimedia Technology and Applications (APCMTA'2000), December 2000, pp. 429-432.
  27. Chung-Huang Yang, "Performance Evaluation of AES/DES/Camellia On the 6805 and H8/300 CPUs," 2001 Symposium on Cryptography and Information Security (SCIS2001), Oiso, Japan, January 2001, pp. 727-730.
  28. Xiu-Gi Zeng and Chung-Huang Yang, "Design and Implementation of CA/PKI on the Windows Environment," 2002 Symposium on Cryptography and Information Security (SCIS2002), January 2002, Shirahama, Wakayama, Japan, pp. 377-379.
  29. Chung-Huang Yang, Hikaru Morita, and Tatsuaki Okamoto, "On the Performance of ESIGN and RSA on IC Cards," 2003 Symposium on Cryptography and Information Security (SCIS 2003), Hamamatsu, Shizuoka, Japan, pp. 251-255, 2003.
  30. Chung-Huang Yang and Chin-Feng Tsai, "Cross-Platform Implementation of ANSI X9.62 ECDSA," ACME2003 Conference, pp. 519-524, Seattle, Washington, USA, August 2003.
  31. Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, and Chung-Huang Yang, "Fast implementation of AES cryptographic algorithms in smart cards," IEEE Annual International Carnahan Conference on Security Technology, Proceedings, pp. 573-579, October 2003.
  32. Hsien-Hau Chen, Yung-Sheng Chen, Hsia-Ling Chiang, and Chung-Huang Yang, "Design and implementation of smartcard-based secure e-mail communication," IEEE Annual International Carnahan Conference on Security Technology, Proceedings, pp. 225-231, October 2003.
  33. Chung-Huang Yang, Long-Jian Lin, and Kouichi Sakurai, "An Integration of PKI and IC Cards for IPsec," 2004 Symposium on Cryptography and Information Security, pp. 1375-1377, Sendai, Japan, Jan. 2004.
  34. Chung-Huang Yang, Chih-Ching Yeh, and Li-Ling Hsu, "On the Design and Implementation of a Secure Time-Stamping Service," 2004 Symposium on Cryptography and Information Security, pp. 603-605, Sendai, Japan, Jan. 2004.
  35. Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, and Chung-Huang Yang, "High Speed Software Driven AES Algorithm on IC Smartcards," 2004 Symposium on Cryptography and Information Security, pp. 459-464, Sendai, Japan, Jan. 2004.
  36. Chung-Huang Yang and Mu-Long Weng, "An Integration of PKI and IC cards for IPv6 Security," 1st French-Taiwanese Conference in Information Technologies, Palaiseau, France, April 2004.
  37. Chung-Huang Yang, Chih-Ching Yeh, and Fang-Dar Chu, "Design and Implementation of a RFC3161-Compliant Time-Stamping Service," The Third International Workshop for Applied PKI (IWAP2004), Fukuoka, Japan, October 2004.
  38. T.R.N. Rao and Chung-Huang Yang, "Aryabhata Remainder Theorem: Relevance to Public-Key Crypto-algorithms," 2005 Symposium on Cryptography and Information Security, Kobe, Japan, January 2005, pp. 1111-1116.
  39. T.R.N. Rao and Chung-Huang Yang, "Modular Arithmetic: From Ancient India to Public-Key Cryptography," 2nd French-Taiwanese Conference in Information Technologies,March 2005.
  40. Chung-Huang Yang, "On the Design of Clock-Controlled Pseudorandom Bit Generators," Information Security Conference, June 2005.
  41. Chung-Huang Yang, "Design and Implementation of a Windows-based ECDSA System," Association for Chinese Management Educators (ACME) 2005 Conference, San Diego, USA, July 28-30 2005.
  42. Chung-Huang Yang and Wen-Long Hsu, "Combination of Cryptographic Hash and On-Line Time-Stamping System for Securing Digital Evidence of File Systems," 2005 International Forensic Science Symposium, November 2005.
  43. Binhui Chou, Chung-Huang Yang, and Kouichi Sakurai, "Design and Implementation of an ECM-based Integer Factorization Tool with GMP-ECM on Windows Platforms," 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
  44. Wei-Tsung Chang and Chung-Huang Yang, “A User-Friendly Implementation of PSEC-KEM and ECDSA on the windows Environment,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
  45. Sheng-Hsiung Su and Chung-Huang Yang, “Design and Implementation of a live CD for Time-Stamping Service,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
  46. Pei-Chi Cheng, Chung-Huang Yang, and Kouichi Sakurai, “Design and Implementation of a Live-CA CD/DVD on an Open Source Environment,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
  47. Pao-Kuan Wang and Chung-Huang Yang, “Design and Implementation of a Live CD/DVD for Vulnerability Scanning,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
  48. Ming-Kuen Lee and Chung-Huang Yang, “Design and Implementation for Integrated Service Authentication System on the basis of Secure LDAP Server,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
  49. Shankara K Narayandas, Chung-Huang Yang, and T.R.N. Rao, "Building a Universal Secure E-Mail System, " 2006 SWDSI Annual Conference, March 2006, pp. 250-260.
  50. Chung-Huang Yang, TaeNam Ahn, and Chia-Han Chang, "On the Design and Implementation of a Time-Stamping Service with Linking Schemes, " The 1st Joint Workshop on Information Security, September 2006, Seoul, Korea, pp. 501-509.
  51. Chiu-Niang Chen and Chung-Huang Yang,"Design and Implementation of Cybercrime Investigation Systems Based on Open Source",2006 Conference on Open Source Technologies and Applications,Nov. 2006.
  52. Shih-Jen Chen, Chung-Huang Yang, and Shao-Wei Lan, "A Distributed Network Security Assessment Tool with Vulnerability Scan and Penetration Test," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
  53. Shih-Yi Tu and Chung-Huang Yang, "A User-Friendly Implementation of EPOC on the Windows Environment," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
  54. Chun-Chih Peng and Chung-Huang Yang, "Design and Implementation for Integer Factorization and Primality Testing Tools with Elliptic Curve on Windows Platforms," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
  55. Chih-Kun Tai and Chung-Huang Yang, "Design and Implementation of a Windows-based WLAN Integrated Analysis System," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
  56. Chung-Huang Yang, Chih-Hung Lin, Li-Chou Juan, Jain-Shing Wu, Tai-Yun Huang, "Design and Development of an NIDS Evasion Test Tool with GUI," The 2nd Joint Workshop on Information Security (JWIS 2007), Tokyo, Japan on August 6-7, 2007.
  57. Chun-Fung Lin, Chung-Huang Yang, and Kouichi Sakurai, "Research and Implementation of ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device," 2008 Symposium on Cryptography and Information Security, Miyazaki, January 2008.
  58. Jung-Ying Lai, Chun-Fung Lin, and Chung-Huang Yang, "Design and Implementation of an Electronic Voting System with Contactless IC Cards," The 19th International Conference on Information Management 2008 (ICIM 2008), May 16 -17, 2008, Nantou, Taiwan.
  59. Chao-Hsi Yeh and Chung-Huang Yang, "Design and Implementation of Honeypot System Based on Open-Source Software, " IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2008), June 2008.
  60. Ya-Ping Fu, Kwo-Jean Farn, and Chung-Huang Yang, "CORAS for the Research of ISAC," IEEE 2008 International Conference on Convergence & Hybrid Information Technology (IEEE ICHIT 2008), August 2008, Daejeon, Korea, pp. 250-256.
  61. Jung-Ying Lai, Jain-Shing Wu, Shih-Jen Chen, Chia-Huan Wu, and, Chung-Huang Yang, "Designing a Taxonomy of Web Attacks," IEEE 2008 International Conference on Convergence & Hybrid Information Technology (IEEE ICHIT 2008), August 2008, Daejeon, Korea, pp. 278-282.
  62. Hui-Ting Hsieh, Chung-Huang Yang, and TaeNam Ahn, "Implementation of SEA Algorithm on the Windows Platforms, " IEEE 2008 International Conference on Convergence & Hybrid Information Technology (IEEE ICHIT 2008), August 2008, Daejeon, Korea, pp. 363-370.
  63. Hsiu Wang, Tung-Kuan Liu, Chung-Huang Yang, "Multiple Teacher Transfer Optimization using Genetic Algorithms – Case Study on Kindergarten Teacher Transfer," The 2008 International Computer Symposium (ICS 2008), November 13-15, 2008, Tamkang University, Damsui, Taipei County, Taiwan.
  64. Kwo-Jean Farn, Yen-Fang Wang, Shu-Kuo Lin, Chung-Huang Yang, Chien-Cheng Huang, "A Study on Industrial Control System Risk Assessment," The 2008 International Computer Symposium (ICS 2008), November 13-15, 2008, Tamkang University, Damsui, Taipei County, Taiwan.
  65. Ting-Kao Liu and Chung-Huang Yang, "Design and Implementation of Campus Gate Control System Based on RFID," IEEE Asia-Pacific Services Computing Conference (APSCC’08), December 9-12, 2008, Yilan, Taiwan.
  66. Chiung-Wan Chan and Chung-Huang Yang, "Design and Implementation of Open Source Web Application Security Tool" Joint Workshop on Information Security (JWIS) 2009, National Sun Yat-sen University, August 2009.
  67. Chung-Huang Yang, Shih-Yi Tu, and Pei-Hua Yen, "Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting," The IEEE Fifth International Conference on Information Assurance and Security (IAS-2009), Xi'an, China, August, 2009.
  68. Pei-Sheng Huang, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of A Distributed Early Warning System Combined with Intrusion Detection System and Honeypot" International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), August 2009, Daejeon, Korea.
  69. Pei-Hua Yen, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of a Live-analysis Digital Forensic System," International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), August 2009, Daejeon, Korea.
  70. Jiun-Kai Ke, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of Using W3af to Achieve Automated Penetration Testing By Live DVD / Live USB," International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), August 2009, Daejeon, Korea.
  71. Chung-Huang Yang and Kuang-Li Ting, Fast Deployment of Botnet Detection with Traffic Monitoring, The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, September 2009.
  72. Yu-Ting Lo and Chung-Huang Yang, "Design and Implementation of a Secure Video of Instant Messaging Based on SIMPP," 2009 National Computer Symposium (NCS 2009), National Taipei University, Taiwan, Nov. 27-28, 2009.
  73. Hui-Ting Hsieh and Chung-Huang Yang, "Implementation of Schoof’s Algorithm on the Windows Platforms," The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, August 2010.
  74. Xin-Fang Li, Chung-Huang Yang, Shih-Jen Chen, and Jain-Shing Wu, "Design and Implementation of Forensic System in Android Smart Phone," The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, August 2010.
  75. Chih-Hung Lin, Chung-Huang Yang, Shih-Jen Chen, and Jain-Shing Wu, "An Implementation of a Malware Collection and Data Sharing System Based on Honeypot," The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, August 2010.
  76. Kuang-Li Ting, Chung-Huang Yang, and Tae-Nam Ahn, "Fast Deployment of Botnet Detection based on Traffic Monitoring," International Conference on Convergence and Hybrid Information Technology (ICHIT 2010), August 2010, Daejeon, Korea.
  77. Xin-Fang Li, Chung-Huang Yang, Shih-Jen Chen, and Jain-Shing Wu, and Tae-Nam Ahn "Forensic System Design and Implementation Based on Open Source Software in Android Smart Phone," International Conference on Convergence and Hybrid Information Technology (ICHIT 2010), August 2010, Daejeon, Korea.
  78. Sheng-Wen Chen, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of Internal Acquisition Tool in Symbian Smart Phone," International Conference on Convergence and Hybrid Information Technology (ICHIT 2010), August 2010, Daejeon, Korea.
  79. Chih-Hung Lin and Chung-Huang Yang, "Implementation of Network Forensics Based on Honeypot," 2010 International Security Technology & Management Conference, September 2010, Taipei.
  80. Chung-Huang Yang and Pei-Hua Yen, "Fast Deployment of Computer Forensics with USBs," The First International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2010), Fukuoka, Japan, November 2010.
  81. Hong-Ming Wang and Chung-Huang Yang, "Design and Implementation of a Network Forensics System for Linux," The 2010 International Computer Symposium (ICS2010), December 2010, Tainan.
  82. Sheng-Wen Chen, Chung-Huang Yang, and Chien-Tsung Liu, "Design and Implementation of Live SD Acquisition Tool in Android Smart Phone," the Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2011), August 29-30, 2011, Kinmen, Taiwan.
  83. Yenting Lai, Chunghuang Yang, Chihhung Lin, and TaeNam Ahn, "Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing, " International Conference on Convergence and Hybrid Information Technology (ICHIT 2011), September 2011, Daejeon, Korea.
  84. Jing-Siang Yang and Chung-Huang Yang, "Design and Implementation of Forensic Software for Android Smart Phones," 2011 Cross-Strait Conference on Information Science and Technology and iCube (CSCIST 2011 and iCube 2011), December 2011, Taipei, Taiwan.
  85. Ren-Jie Chen and Chung-Huang Yang, "Research on Android Anti-Forensic Tools, " The 17th Conference on Information Management and Practice (IMP 2011), December, 2011, Tainan, Taiwan.
  86. Chung-Huang Yang and Yen-Ting Lai, "Design and Implementation of Forensic Systems for Android Devices based on Cloud Computing," Applied Mathematics & Information Sciences, Vol. 6, No. 1S, 2012, pp. 243S-247S.
  87. Chung-Huang Yang and Bo Yang, "Design and Implementation of Digital Forensic Systems," The 29th Symposium on Cryptography and Information Security (SCIS2012), Kanazawa, Japan, January 2012.
  88. Yi-Hsiung Ting and Chung-Huang Yang, "Design and Implementation of a Cloud Digital Forensic Laboratory," The 30th Symposium on Cryptography and Information Security (SCIS2013), Kyoto, Japan, January 2013.
  89. Chung-Nan Chen, Raylin Tso and Chung- Huang Yang, "Design and Implementation of Digital Forensic Software for iPhone," The 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), July 2013, Seoul, Korea.
  90. Chung-Huang Yang and Chang-Min Chen, “Configuration Management of iOS Devices based on SCAP,” The 31th Symposium on Cryptography and Information Security (SCIS2014), Kagoshima, Japan, Jan. 2014.
  91. Wen-Han Chuang and Chung-Huang Yang, “Design and Implementation of an Integrated Testing Environment for Mobile Devices by Live DVD/USB,” The 25th Cryptology and Information Security Conference (CISC 2015), Kaohsiung, Taiwan, May 2015.
  92. Cheng-Liang Kuo and Chung-Huang Yang, “Security Design for Configuration Management of Android Devices,” 2015 IEEE 39th Annual International Computers, Software & Applications Conference (COMPSAC 2015), pp. 249-254, Taichung, Taiwan, July 2015.
  93. Chung-Huang Yang and Lun-Ming Tung, “Securing BYOD with Mobile Device Management based on SCAP and SE Android,” 2016 Symposium on Cryptography and Information Security (SCIS 2016), Kumamoto, Japan, Jan. 2016.
  94. Lun-Ming Tung and Chung-Huang Yang, “A Remote Control System for Improving the Mobile Device Security Based on SE Android,” International Conference on Advanced Information Technologies (AIT 2016), Taichung, Taiwan, April 2016.
  95. Meng-Chiao Lee, Jin Kwak, and Chung-Huang Yang, “Design and Implementation of a Mobile Device Management System Based on SEAndroid,International Conference on Advanced Information Technologies (AIT 2017), Taichung, Taiwan, April 2017.
  96. Xin-long Song and Chung-Huang Yang, “Mobile Device Management System Based on AOSP and SELinux,” The 1st International Workshop on Data Security and Privacy in Internet of Things (DSPIoT 2017), Shenzhen, China, June 2017.
  97. Yu Shi, Dong Zheng, and Chung-Huang Yang, “The Efficient Implementation of the Android Kernel with China Standard Cryptographic Algorithm,The 1st International Workshop on Data Security and Privacy in Internet of Things (DSPIoT 2017), Shenzhen, China, June 2017.
  98. Chan Gao and Chung-Huang Yang, “File-Based Encryption with SM4,” The 1st International Workshop on Data Security and Privacy in Internet of Things (DSPIoT 2017), Shenzhen, China, June 2017.