Chung-Huang Yang, Ph.D.
Professor, National Kaohsiung Normal University, Taiwan
Distinguished Professor, Xi’an University of Posts and Telecommunications, China
https://sites.google.com/view/chyang123/
Education:
Ph.D., Computer Engineering, University of Louisiana at Lafayette (formerly University of Southwestern Louisiana), U.S.A., 1990
M.S., Computer Engineering, University of Louisiana at Lafayette (formerly University of Southwestern Louisiana), U.S.A., 1986
B.S., Electrical Engineering, National Cheng-Kung University, Taiwan, 1981
Working Experience:
Professor, National Kaohsiung Normal University, Taiwan (2006 - Present).
Distinguished Professor, Xi’an University of Posts and Telecommunications, China (2014 - Present).
Guest Professor, Xidian University, China (2015 - 2018).
International Co-researcher, Information Security Application & Assurance Laboratory (ISAA), Department of Cyber Security, Ajou University, Korea (2017).
President, Chinese Cryptology and Information Security Association (CCISA), Taiwan (May 2012 - May 2015).
Professor & Chairman, Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan (2006 - 2009).
Visiting Scholar, Department of Information Science and Electrical Engineering, Kyushu University, Japan (June 2006 - July 2006).
Associate Professor, Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan (2002 - 2006).
Associate Editor, IEICE Trans. Communications (SCI/EI journal), March 2004 - 2005.
Research Scholar, Center for Advanced Computer Studies, University of Louisiana at Lafayette, USA (2004 Summer).
Associate Professor, Department of Information Management, National Kaohsiung First University of Science and Technology, Taiwan (Feb. 1997 - July 2002).
Visiting Researcher, Information Sharing Platform Laboratories, Nippon Telegraph and Telephone Corp. (NTT), Yokosuka, Kanagawa, Japan (2001 Summer).
Chairman, Department of Information Management, National Kaohsiung First University of Science and Technology, Taiwan (August 1998 - July 2000).
Project Manager, Information Security and Cryptology Project, Telecommunication Laboratories, Chunghua Telecom Co., Ltd., Yang-Mei, Taiwan (1996-1997).
Research Engineer at the Applied Technology Laboratory, Telecommunication Laboratories, Ministry of Transportation and Communications, Yang-Mei, Taiwan (1995-1996).
Engineer at the Visual Information Technology Division, Computer & Communication Laboratories, Industrial Technology Research Institute, Hsinchu, Taiwan (1993-1994).
Postdoctoral Fellow, Network Information Systems Laboratories, Nippon Telegraph and Telephone Corp. (NTT), Yokosuka, Kanagawa, Japan. (1991-1993).
Software Research and Development Engineer, RSA Data Security, Inc., Redwood City, California, USA (1991-1991).
Current Research Interests:
Mobile Device Security
Digital Forensics
Efficient Implementations of Cryptosystems
Professional Activities:
Associate Editor, Journal of Information and Communication Convergence Engineering (JICCE) (2017 - Present).
Editorial Board, International Journal of Reliable Information and Assurance (IJRIA) (2013 - Present).
Advisory/Editorial Board, International Journal of Hybrid Information Technology (IJHIT) (2008 - Present).
President, (Taiwan) Chinese Cryptology and Information Security Association (2012 - 2015).
Guest Associate Editor, IEICE 2022 Special Section on Blockchain Systems and Applications, IEICE Transactions on Information and Systems . (SCIE)
Guest Associate Editor, IEICE 2020 Special Section on Information and Communication System Security, IEICE Transactions on Information and Systems. (SCIE)
Guest Associate Editor, IEICE 2020 Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications, IEICE Transactions on Information and Systems. (SCIE)
Guest Associate Editor, IEICE 2018 Special Section on Information and Communication System Security, IEICE Transactions on Information and Systems (SCIE).
Guest Associate Editor, IEICE 2017 Special Section on Information and Communication System Security. (SCIE)
Guest Associate Editor, IEICE 2016 Special Section on Information and Communication System Security. (SCIE)
Guest Associate Editor, IEICE 2015 Special Section on Information and Communication System Security – Against Cyberattacks (SCIE).
Guest Associate Editor, IEICE 2012 Special Section on Trust, Security and Privacy in Computing and Communication Systems (SCIE).
Guest Associate Editor, IEICE 2011 Special Section on Information and Communication System Security (SCIE).
Visiting Member of the Board of Directors, Korea Institute of Information Security & Cryptology (KIISC) (2011).
General Co-Chair, The 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), May 25-26, 2015, Kaohsiung, Taiwan.
General Co-Chair, The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), September 4-5, 2014, Wuhan, China.
General Co-Chair, The 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), July 25-26, 2013, Seoul, Korea.
Program Co-Chair, International Conference on Convergence and Hybrid Information Technology (ICHIT 2012), Springer-Verlag Lecture Notes in Computer Science, Volume 7425, August 23-25, 2012, Daejeon, Korea.
Program Co-Chair, International Conference on Convergence and Hybrid Information Technology (ICHIT 2011), Springer-Verlag Lecture Notes in Computer Science, Volume 6935, September 22-24 , 2011, Daejeon, Korea.
Program Co-Chair, ICCCT 2011-International Conference on Computer Convergence Technology, October 20-22, 2011, Seoul, Korea.
Outstanding Leadership Award, Korea Knowledge Information Technology Society, 2011.
Program Co-Chair, The 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-Summer).
Track Vice Chair, Track of Security and Trustworthy Computing, IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS 2011).
Workshop Co-Organizer, The 6th IEEE International Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2016), June 10-14, 2016, Atlanta, Georgia, USA.
Workshop Co-Organizer, The 5th IEEE International Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2015), July 1-5, 2015, Taichung, Taiwan.
Workshop Co-Chair, The 9th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2012).
Steering Committee member, The 6th IEEE International Workshop on Network Optimization and Performance Evaluation (NOPE-18), October 8-12, 2018, Guangzhou, China.
General Co-Chair, The 2nd International Workshop on Blockchain and its Applications (Blockchain 2019), Guangzhou, China, November 12-15, 2019.
Steering Committee member, The 2nd International Workshop on Blockchain and its Applications (Blockchain 2019), Guangzhou, China, November 12-15, 2019.
Program Committee member, IEEE The 17th International Conference on Ubiquitous Information Management and Communication (IMCOM 2023), January 3~5, 2023, Seoul, South Korea.
Program Committee member, IEEE The 16th International Conference on Ubiquitous Information Management and Communication (IMCOM 2022), January 3~5, 2022, Seoul, South Korea.
Program Committee member, IEEE The 15th International Conference on Ubiquitous Information Management and Communication (IMCOM 2021), January 4~6, 2021, Seoul, South Korea.
Program Committee member, The 14th International Conference on Provable Security (ProvSec 2020), 22 - 25 September, 2020, Singapore.
Program Committee member, The 13th International Conference on Provable Security (ProvSec 2019), October 1-4, 2019, Cairns, Australia.
Program Committee member, The 5th International Conference on Mathematics and Computing (ICMC 2019), February 7-9, 2019, Bhubaneswar, India.
Program Committee member, The 13th International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2019), January 4-6, 2019, Phuket, Thailand.
Program Committee member, The 12th International Conference on Provable Security (ProvSec 2018), October 25-28, 2018, Jeju Island, Korea.
Program Committee member, The 2018 IEEE International Symposium on Smart City and Informatization (iSCI 2018), October 12-14, 2018, Guangzhou, China.
Program Committee member, The Sixth International Symposium on Security in Computing and Communications (SSCC’18), September 19-22, 2018, Bangalore, India.
Program Committee member, The 13th International Workshop on Security (IWSEC 2018), September 3 - September 5, 2018, Sendai, Japan.
Program Committee member, The 18th International Conference on Computational Science and Its Applications (ICCSA 2018), July 2 - 5, 2018, Melbourne, Australia.
Program Committee member, The 6th International Conference on Cryptography and Cloud Computing Security (CCCS2018), June 16-17, 2018, Yantai, Shandong, China.
Program Committee member, The 4th International Conference on Mathematics and Computing (ICMC 2018), January 9-11, 2018, Varanasi, India.
Program Committee member, The 12th International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2018), January 5-7, 2018, Langkawi, Malaysia.
Program Committee member, The 3rd International Workshop on Digital Crime and Forensics (IWDCF 2017), November 18-19, 2017, Nanchang, China.
Program Committee member, The 11th International Conference on Provable Security (ProvSec 2017), October 23-24, 2017, Xi’an, China.
Program Committee member, The Fifth International Symposium on Security in Computing and Communications (SSCC'17), September 13-16, 2017, Manipal, India.
Program Committee member, The 12th International Workshop on Security (IWSEC 2017), August 30 - September 1, 2017, Hiroshima, Japan.
Program Committee member, The 17th International Conference on Computational Science and Its Applications (ICCSA 2017), July 3 - 6, 2017, Trieste, Italy.
Program Committee member, The 5th International Conference on Cryptography and Cloud Computing Security (CCCS2017), June 17-20, 2017, Yuncheng, Shanxi, China.
Program Committee member, The 11th International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2017), January 5-7, 2017, Beppu, Japan.
Program Committee member, The 2nd International Workshop on Digital Crime and Forensics (IWDCF 2016), December 18, 2016, Nanjing, China.
Program Committee member, The Tenth International Conference on Provable Security (ProvSec 2016), November 10-12, 2016, Nanjing, China.
Program Committee member, The 11th International Workshop on Security (IWSEC 2016), September 12-14, 2016, Tokyo, Japan.
Program Committee member, The 17th International Workshop on Information Security Applications (WISA 2016), August 25-27, 2016, Juju Island, Korea.
Program Committee member, The 4th International Conference on Cryptography and Cloud Computing Security (CCCS2016), June 17-20, 2016, Guangzhou, China.
Program Committee member, The 10th International Workshop on Security (IWSEC 2015), August 26-28, 2015, Nara, Japan.
Program Committee member, The 16th International Workshop on Information Security Applications (WISA 2015), August 20-22, 2015, Juju Island, Korea.
Program Committee member, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), August 20-22, 2015, Helsinki, Finland.
Program Committee member, The 3rd International Conference on Cryptography and Cloud Computing Security (CCCS2015), June 12-15, 2015, Guangzhou, China.
Program Committee member, The 9th International Conference on Ubiquitous Information Management and Communication, ACM IMCOM (ICUIMC) 2015, January 8~10, 2015, Bali, Indonesia.
Program Committee member, The 9th International Workshop on Security (IWSEC 2014), August 27-29, 2014, Hirosaki, Japan.
Program Committee member, The 15th International Workshop on Information Security Applications (WISA 2014), August 25-27, 2014, Juju Island, Korea.
Program Committee member, IEEE SERE 2014 (The 8th International Conference on Software Security and Reliability), San Francisco, California, USA, June 30-July 2, 2014.
Program Committee member, The 8th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2014), January 9-11, 2014, Siem Reap, Cambodia.
Program Committee member, The 8th International Workshop on Security (IWSEC 2013), November 18-20, 2013, Okinawa, Japan.
Program Committee member, The 9th China International Conference on Information Security and Cryptology (INSCRYPT 2013) , November 27 - 30, 2013, Guangzhou, China.
Program Committee member, The ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC) , January 17-19, 2013, Kota Kinabalu, Malaysia. (2013).
Program Committee member, The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2012) (2012).
Program Committee member, The 6th International Conference on Network and System Security (NSS 2012).
Program Committee member, The Second International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2012 (MCNCS 2012).
Program Committee member, The Sixth International Conference on Genetic and Evolutionary Computing (ICGEC 2012).
Program Committee member, The ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC) (2012).
Program Committee member, Workshop on Information Security Applications 2011 (WISA2011).
Program Committee member, The International Conference on Genetic and Evolutionary Computing (ICGEC 2011).
Program Committee member, The First International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2011 (MCNCS 2011).
Program Committee member, The 2011 International Conference on Computational Science and Its Applications (ICCSA 2011).
Program Committee member, The ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC) (2011).
Program Committee member, The 6th International Conference on Frontier of Computer Science and Technology (FCST-11) (2011).
Program Committee member, The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11) (2011) .
Program Committee member, The 7th China International Conference on Information Security and Cryptology (Inscrypt'2011) (2011) .
Program Committee member, The 2011 International Workshop on Secure and Trust Computing (ST Com-11).
Guest Associate Editor, IEICE 2010 Special Section on Trust, Security and Privacy for Pervasive Applications (SCI).
Program Co-Chair, International Conference on Convergence and Hybrid Information Technology (ICHIT 2010) .
Workshop Program Chair, ICS 2010 Workshop of Information Security.
Program Committee member, 2010 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2010).
Program Committee member, The 6th Information Security Practice and Experience Conference (ISPEC 2010).
Program Committee member, The Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10).
Program Committee member, The 11th International Workshop on Information Security Applications (WISA 2010) .
Program Committee member, The FTRA 2010 International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10).
Program Committee member, Security and trustworthy Computing Track, The 5th International Conference on Frontier of Computer Science and Technology (FCST 2010).
Program Committee member, The Fourth International Conference on Genetic and Evolutionary Computing (ICGEC 2010).
Program Committee member, The first Asia-Pacific Workshop on Cyber Security (APWCS 2010).
Program Committee member, Track 4. Security in Internet Symposium, The 2nd International Conference on Internet (ICONI 2010).
Program Committee member, The 2010 International Conference on Computational Science and Its Applications (ICCSA 2010).
Guest Associate Editors, IEICE 2009 Special Section on Information and Communication System Security (SCI).
Program Committee member, Security for CE Communications Track, The 6th Annual IEEE Consumer Communications and Networking Conference (CCNC) (2009) .
Program Committee member & Section Chair (B12 Section and Keynote Speech C), The Fifth International Conference on Information Assurance and Security (IAS09) .
Program Committee member, The 4th International Workshop on Security (IWSEC2009).
Program Committee member, The Workshop on Information Security Applications (WISA2009).
Program Co-Chair, International Conference on Convergence and Hybrid Information Technology (ICHIT 2009).
Program Committee member, 2009 Joint Workshop on Information Security (JWIS2009).
Organization and Publicity Chair, the Fourth International Conference on Convergence and hybrid Information Technology (ICCIT09).
Program Co-Chair, Joint Workshop on Information Security (JWIS 2008).
Program Co-Chair, International Conference on Convergence and Hybrid Information Technology (ICHIT 2008).
Chair of Keynote Speech II, Information Security Conference (ISC08).
Organization and Publicity Chair, the Third International Conference on Convergence and hybrid Information Technology (ICCIT08).
Program Committee member, The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-08).
Session Chair, Japan-Taiwan Joint Research on Cryptography and Information Security towards next IT-society, Fukuoka, Japan, October 14 - 15, 2008.
Program Committee member, 2006 International Conference on Hybrid Information Technology, Cheju Island, Nov. 9-16, 2006.
Member of Program Committee and Track Moderator, RSA Conference 2004.
Publications: Google Scholar
Ph.D. Dissertation: On the Key Information Redundancy in Secret-Key Cryptosystems, The Center for Advanced Computer Studies, University of Louisiana at Lafayette, 1990.
Journal Papers
Magdy A. Bayoumi and Chung-Huang Yang, "Reconfigurable Testable Bit-Serial Multiplier for DSP Applications," IEE Proceedings Computers & Digital Techniques, Vol. 136, Pt. E, No. 6, November 1989, pp. 517-523.
Kencheng Zeng, Chung-Huang Yang, Dah-Yea Wei and T.R.N. Rao, "Pseudorandom Bit Generators in Stream-Cipher Cryptography," IEEE Computer, Vol. 24, No. 2, February 1991, pp. 8-17.
Hikaru Morita and Chung-Huang Yang, "A Modular-Multiplication Algorithm using Lookahead Determination," IEICE Trans. Fundamentals, Vol. E76-A, No. 1, January 1993, pp. 70-77.
Chung-Huang Yang, Hikaru Morita, and Tatsuaki Okamoto, "Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms," IEICE Trans. Communications, Vol. E88-B, No. 3, March 2005, pp. 1244-1248.
T.R.N. Rao and Chung-Huang Yang, "Aryabhata Remainder Theorem: Relevance to Public-Key Crypto-algorithms," Circuits, Systems & Signal Processing, Vol. 25, No. 1, 2006, pp. 1-15.
Bo Yang, Yong Yu, and Chung-Huang Yang, "A Secure Scalar Product Protocol Against Malicious Adversaries," Journal of Computer Science and Technology,Vol. 28, No. 1, pp. 152-158, Jan. 2013.
Kuan-Lin Chen and Chung-Huang Yang, “Design and Implementation of Privacy Impact Assessment for Android Mobile Devices,” ZTE CommunicationsSpecial Issue onSecurity and Privacy in Communications, Vol. 14, No. S0, June 2016, pp. 37-43.
Seul-Ki Choi, Chung-Huang Yang and Jin Kwak, "System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats," KSII Transactions on Internet and Information Systems, Vol. 12, No. 2, pp. 906-918, 2018.
Conference Papers
Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "On the Linear Consistency Test in Cryptanalysis," Advances in Cryptology - Crypto'89, Springer-Verlag Lecture Notes in Computer Science Vol. 435, 1990, pp. 164-174.
Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "Large Primes in Stream Cipher Cryptography," Advances in Cryptology - Auscrypt'90, Springer-Verlag Lecture Notes in Computer Science Vol. 453, 1990, pp. 194-205.
Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "An Improved Linear Syndrome Algorithm in Cryptanalysis with Applications," Advances in Cryptology - Crypto'90, Springer-Verlag Lecture Notes in Computer Science Vol. 537, 1991, pp. 34-47.
Hikaru Morita and Chung-Huang Yang, "An Efficient Modular-Multiplication Algorithm for Smart-Card Software Implementation," IEICE TechnicalReport on Information Security, ISEC91-58, Kawasaki, Japan, March 18, 1992.
Hikaru Morita and Chung-Huang Yang, "An Optimal Modular-Multiplication Algorithm using Lookahead Determination for Software," The 1992 Symp. on Cryptography and Information Security, Tateshina, Japan, April 2-4, 1992, SCIS92-12C.
Shoji Miyaguchi, Chung-Huang Yang, and Hikaru Morita, "Dynamic Structure Neutralizing Differential Attack," IEICE Technical Report on Information Security, ISEC92-6, July 1992.
Chung-Huang Yang, "Modular Arithmetic Algorithms for Smart Cards," IEICE Technical Report on Information Security, ISEC92-16, August, 1992.
Chung-Huang Yang, "Pseudorandom Bit Generators for Secure Broadcasting Systems," HD-Media'93 , October 1993, pp. S9-32 - 35.
Chung-Huang Yang, So-Lin Yen, Hwang David Liu, Kuei Liu, Bor-Shenn Jeng, Kung-Yao Chang, Min-Shin Chang, Yu-Ling Cheng, Jo-Ling Liang, and Don-Min Shien, “Secure Official Document Mail Systems for Office Automation,”IEEE Annual International Carnahan Conference on Security Technology, October, 1997, pp. 161-164.
Chung-Huang Yang, Shy-Ming Ju, and T.R.N. Rao, "A Smartcard-based Framework for Secure Document Exchange, " IEEE Annual International Carnahan Conference on Security Technology, October 1998, pp. 93-96.
Chung-Huang Yang, "On the Design of Campus-Wide Multi-Purpose Smartcard Systems," IEEE Annual International Carnahan Conference on Security Technology, October, 1999, pp. 465-468.
Chung-Huang Yang, "A 6805-based Security System for Broadcasting Stock Information," IEEE Annual International Carnahan Conference on Security Technology, October 2000, pp. 238-241.
Kencheng Zeng, Chung-Huang Yang, and T.R.N. Rao, "Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes," Third International Conference on Information and Communications Security, ICICS 2001, Xian, China, November 2001, Springer-Verlag Lecture Notes in Computer Science Vol. 2229, pp. 419-428.
Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, and Chung-Huang Yang, "Fast implementation of AES cryptographic algorithms in smart cards," IEEE Annual International Carnahan Conference on Security Technology, pp. 573-579, October 2003.
Hsien-Hau Chen, Yung-Sheng Chen, Hsia-Ling Chiang, and Chung-Huang Yang, "Design and implementation of smartcard-based secure e-mail communication," IEEE Annual International Carnahan Conference on Security Technology, Proceedings, pp. 225-231, October 2003.
Magdy A. Bayoumi, Rajat Roy, and Chung-Huang Yang, "A Fault-Tolerant Testable Multiplier for DSP Applications," 29th Midwest Symp. on Circuits and Systems, pp. 637-639, Lincoln, Neb., 1986.
Magdy A. Bayoumi and Chung-Huang Yang, "A Fault Tolerant Testable Module for Wafer Scale Integrated Systems," IEEE Proc. CompEuro '87, Hamburg, West Germany, May 1987, pp. 590-593. Hikaru Morita and Chung-Huang Yang, "An Efficient Modular-Multiplication Algorithm for Smart-Card Software Implementation," IEICE Technical Report on Information Security ), ISEC91-58, Kawasaki, Japan, March 18, 1992.
Hikaru Morita and Chung-Huang Yang, "An Optimal Modular-Multiplication Algorithm using Lookahead Determination for Software," The 1992 Symp. on Cryptography and Information Security, Tateshina, Japan, April 2-4, 1992, SCIS92-12C.
Shoji Miyaguchi, Chung-Huang Yang, and Hikaru Morita, "Dynamic Structure Neutralizing Differential Attack," IEICE Technical Report on Information Security, ISEC92-6, July 1992.
Chung-Huang Yang, "Modular Arithmetic Algorithms for Smart Cards," IEICE Technical Report on Information Security , ISEC92-16, August, 1992.
Chung-Huang Yang, "Pseudorandom Bit Generators for Secure Broadcasting Systems," HD-Media'93 , October 1993, pp. S9-32 - 35.
Chung-Huang Yang, "LFSR-based Cryptographic Checksums for Secure Broadcasting," Information Security Conference, pp. 85-87, May1995.
Chung-Huang Yang, "Campus Smart Cards with Public-Key Infrastructure," TANET'99, Oct. 1999.
Chung-Huang Yang, "On the Design of High-Speed Pseudorandom bit Generators for Secure Broadcasting System, " Japan-Korea Joint Workshop on Information Security and Cryptology 2000 (JW-ISC 2000), January 25-26, 2000, Okinawa, Japan, pp. 9-15.
Chung-Huang Yang, "On the Design of Dual-Interface Campus Smart Cards," 2000 Symposium on Cryptography and Information Security (SCIS 2000), January 26-28, 2000, Okinawa, Japan, Section D32.
Chung-Huang Yang, "Design and implementation of cryptographic systems using 68HC05 microcontrollers," 2000 Asia Pacific Conference on Multimedia Technology and Applications (APCMTA'2000), December 2000, pp. 429-432.
Chung-Huang Yang, "Performance Evaluation of AES/DES/Camellia On the 6805 and H8/300 CPUs," 2001 Symposium on Cryptography and Information Security (SCIS2001), Oiso, Japan, January 2001, pp. 727-730.
Xiu-Gi Zeng and Chung-Huang Yang, "Design and Implementation of CA/PKI on the Windows Environment," 2002 Symposium on Cryptography and Information Security (SCIS2002), January 2002, Shirahama, Wakayama, Japan, pp. 377-379.
Chung-Huang Yang, Hikaru Morita, and Tatsuaki Okamoto, "On the Performance of ESIGN and RSA on IC Cards," 2003 Symposium on Cryptography and Information Security (SCIS 2003), Hamamatsu, Shizuoka, Japan, pp. 251-255, 2003.
Chung-Huang Yang and Chin-Feng Tsai, "Cross-Platform Implementation of ANSI X9.62 ECDSA," ACME2003 Conference, pp. 519-524, Seattle, Washington, USA, August 2003.
Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, and Chung-Huang Yang, "Fast implementation of AES cryptographic algorithms in smart cards," IEEE Annual International Carnahan Conference on Security Technology, Proceedings, pp. 573-579, October 2003.
Hsien-Hau Chen, Yung-Sheng Chen, Hsia-Ling Chiang, and Chung-Huang Yang, "Design and implementation of smartcard-based secure e-mail communication," IEEE Annual International Carnahan Conference on Security Technology, Proceedings, pp. 225-231, October 2003.
Chung-Huang Yang, Long-Jian Lin, and Kouichi Sakurai, "An Integration of PKI and IC Cards for IPsec," 2004 Symposium on Cryptography and Information Security, pp. 1375-1377, Sendai, Japan, Jan. 2004.
Chung-Huang Yang, Chih-Ching Yeh, and Li-Ling Hsu, "On the Design and Implementation of a Secure Time-Stamping Service," 2004 Symposium on Cryptography and Information Security, pp. 603-605, Sendai, Japan, Jan. 2004.
Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, and Chung-Huang Yang, "High Speed Software Driven AES Algorithm on IC Smartcards," 2004 Symposium on Cryptography and Information Security, pp. 459-464, Sendai, Japan, Jan. 2004.
Chung-Huang Yang and Mu-Long Weng, "An Integration of PKI and IC cards for IPv6 Security," 1st French-Taiwanese Conference in Information Technologies, Palaiseau, France, April 2004.
Chung-Huang Yang, Chih-Ching Yeh, and Fang-Dar Chu, "Design and Implementation of a RFC3161-Compliant Time-Stamping Service," The Third International Workshop for Applied PKI (IWAP2004), Fukuoka, Japan, October 2004.
T.R.N. Rao and Chung-Huang Yang, "Aryabhata Remainder Theorem: Relevance to Public-Key Crypto-algorithms," 2005 Symposium on Cryptography and Information Security, Kobe, Japan, January 2005, pp. 1111-1116.
T.R.N. Rao and Chung-Huang Yang, "Modular Arithmetic: From Ancient India to Public-Key Cryptography," 2nd French-Taiwanese Conference in Information Technologies,March 2005.
Chung-Huang Yang, "On the Design of Clock-Controlled Pseudorandom Bit Generators," Information Security Conference, June 2005.
Chung-Huang Yang, "Design and Implementation of a Windows-based ECDSA System," Association for Chinese Management Educators (ACME) 2005 Conference, San Diego, USA, July 28-30 2005.
Chung-Huang Yang and Wen-Long Hsu, "Combination of Cryptographic Hash and On-Line Time-Stamping System for Securing Digital Evidence of File Systems," 2005 International Forensic Science Symposium, November 2005.
Binhui Chou, Chung-Huang Yang, and Kouichi Sakurai, "Design and Implementation of an ECM-based Integer Factorization Tool with GMP-ECM on Windows Platforms," 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
Wei-Tsung Chang and Chung-Huang Yang, “A User-Friendly Implementation of PSEC-KEM and ECDSA on the windows Environment,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
Sheng-Hsiung Su and Chung-Huang Yang, “Design and Implementation of a live CD for Time-Stamping Service,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
Pei-Chi Cheng, Chung-Huang Yang, and Kouichi Sakurai, “Design and Implementation of a Live-CA CD/DVD on an Open Source Environment,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
Pao-Kuan Wang and Chung-Huang Yang, “Design and Implementation of a Live CD/DVD for Vulnerability Scanning,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
Ming-Kuen Lee and Chung-Huang Yang, “Design and Implementation for Integrated Service Authentication System on the basis of Secure LDAP Server,” 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
Shankara K Narayandas, Chung-Huang Yang, and T.R.N. Rao, "Building a Universal Secure E-Mail System, " 2006 SWDSI Annual Conference, March 2006, pp. 250-260.
Chung-Huang Yang, TaeNam Ahn, and Chia-Han Chang, "On the Design and Implementation of a Time-Stamping Service with Linking Schemes, " The 1st Joint Workshop on Information Security, September 2006, Seoul, Korea, pp. 501-509.
Chiu-Niang Chen and Chung-Huang Yang,"Design and Implementation of Cybercrime Investigation Systems Based on Open Source",2006 Conference on Open Source Technologies and Applications,Nov. 2006.
Shih-Jen Chen, Chung-Huang Yang, and Shao-Wei Lan, "A Distributed Network Security Assessment Tool with Vulnerability Scan and Penetration Test," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
Shih-Yi Tu and Chung-Huang Yang, "A User-Friendly Implementation of EPOC on the Windows Environment," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
Chun-Chih Peng and Chung-Huang Yang, "Design and Implementation for Integer Factorization and Primality Testing Tools with Elliptic Curve on Windows Platforms," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
Chih-Kun Tai and Chung-Huang Yang, "Design and Implementation of a Windows-based WLAN Integrated Analysis System," 2007 Symposium on Cryptography and Information Security, Sasebo, Japan, January 2007.
Chung-Huang Yang, Chih-Hung Lin, Li-Chou Juan, Jain-Shing Wu, Tai-Yun Huang, "Design and Development of an NIDS Evasion Test Tool with GUI," The 2nd Joint Workshop on Information Security (JWIS 2007), Tokyo, Japan on August 6-7, 2007.
Chun-Fung Lin, Chung-Huang Yang, and Kouichi Sakurai, "Research and Implementation of ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device," 2008 Symposium on Cryptography and Information Security, Miyazaki, January 2008.
Jung-Ying Lai, Chun-Fung Lin, and Chung-Huang Yang, "Design and Implementation of an Electronic Voting System with Contactless IC Cards," The 19th International Conference on Information Management 2008 (ICIM 2008), May 16 -17, 2008, Nantou, Taiwan.
Chao-Hsi Yeh and Chung-Huang Yang, "Design and Implementation of Honeypot System Based on Open-Source Software, " IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2008), June 2008.
Ya-Ping Fu, Kwo-Jean Farn, and Chung-Huang Yang, "CORAS for the Research of ISAC," IEEE 2008 International Conference on Convergence & Hybrid Information Technology (IEEE ICHIT 2008), August 2008, Daejeon, Korea, pp. 250-256.
Jung-Ying Lai, Jain-Shing Wu, Shih-Jen Chen, Chia-Huan Wu, and, Chung-Huang Yang, "Designing a Taxonomy of Web Attacks," IEEE 2008 International Conference on Convergence & Hybrid Information Technology (IEEE ICHIT 2008), August 2008, Daejeon, Korea, pp. 278-282.
Hui-Ting Hsieh, Chung-Huang Yang, and TaeNam Ahn, "Implementation of SEA Algorithm on the Windows Platforms, " IEEE 2008 International Conference on Convergence & Hybrid Information Technology (IEEE ICHIT 2008), August 2008, Daejeon, Korea, pp. 363-370.
Hsiu Wang, Tung-Kuan Liu, Chung-Huang Yang, "Multiple Teacher Transfer Optimization using Genetic Algorithms – Case Study on Kindergarten Teacher Transfer," The 2008 International Computer Symposium (ICS 2008), November 13-15, 2008, Tamkang University, Damsui, Taipei County, Taiwan.
Kwo-Jean Farn, Yen-Fang Wang, Shu-Kuo Lin, Chung-Huang Yang, Chien-Cheng Huang, "A Study on Industrial Control System Risk Assessment," The 2008 International Computer Symposium (ICS 2008), November 13-15, 2008, Tamkang University, Damsui, Taipei County, Taiwan.
Ting-Kao Liu and Chung-Huang Yang, "Design and Implementation of Campus Gate Control System Based on RFID," IEEE Asia-Pacific Services Computing Conference (APSCC’08), December 9-12, 2008, Yilan, Taiwan.
Chiung-Wan Chan and Chung-Huang Yang, "Design and Implementation of Open Source Web Application Security Tool" Joint Workshop on Information Security (JWIS) 2009, National Sun Yat-sen University, August 2009.
Chung-Huang Yang, Shih-Yi Tu, and Pei-Hua Yen, "Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting," The IEEE Fifth International Conference on Information Assurance and Security (IAS-2009), Xi'an, China, August, 2009.
Pei-Sheng Huang, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of A Distributed Early Warning System Combined with Intrusion Detection System and Honeypot" International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), August 2009, Daejeon, Korea.
Pei-Hua Yen, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of a Live-analysis Digital Forensic System," International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), August 2009, Daejeon, Korea.
Jiun-Kai Ke, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of Using W3af to Achieve Automated Penetration Testing By Live DVD / Live USB," International Conference on Convergence and Hybrid Information Technology (ICHIT 2009), August 2009, Daejeon, Korea.
Chung-Huang Yang and Kuang-Li Ting, Fast Deployment of Botnet Detection with Traffic Monitoring, The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, September 2009.
Yu-Ting Lo and Chung-Huang Yang, "Design and Implementation of a Secure Video of Instant Messaging Based on SIMPP," 2009 National Computer Symposium (NCS 2009), National Taipei University, Taiwan, Nov. 27-28, 2009.
Hui-Ting Hsieh and Chung-Huang Yang, "Implementation of Schoof’s Algorithm on the Windows Platforms," The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, August 2010.
Xin-Fang Li, Chung-Huang Yang, Shih-Jen Chen, and Jain-Shing Wu, "Design and Implementation of Forensic System in Android Smart Phone," The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, August 2010.
Chih-Hung Lin, Chung-Huang Yang, Shih-Jen Chen, and Jain-Shing Wu, "An Implementation of a Malware Collection and Data Sharing System Based on Honeypot," The 5th Joint Workshop on Information Security (JWIS), South China Agricultural University, Guangzhou, China, August 2010.
Kuang-Li Ting, Chung-Huang Yang, and Tae-Nam Ahn, "Fast Deployment of Botnet Detection based on Traffic Monitoring," International Conference on Convergence and Hybrid Information Technology (ICHIT 2010), August 2010, Daejeon, Korea.
Xin-Fang Li, Chung-Huang Yang, Shih-Jen Chen, and Jain-Shing Wu, and Tae-Nam Ahn "Forensic System Design and Implementation Based on Open Source Software in Android Smart Phone," International Conference on Convergence and Hybrid Information Technology (ICHIT 2010), August 2010, Daejeon, Korea.
Sheng-Wen Chen, Chung-Huang Yang, and Tae-Nam Ahn, "Design and Implementation of Internal Acquisition Tool in Symbian Smart Phone," International Conference on Convergence and Hybrid Information Technology (ICHIT 2010), August 2010, Daejeon, Korea.
Chih-Hung Lin and Chung-Huang Yang, "Implementation of Network Forensics Based on Honeypot," 2010 International Security Technology & Management Conference, September 2010, Taipei.
Chung-Huang Yang and Pei-Hua Yen, "Fast Deployment of Computer Forensics with USBs," The First International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2010), Fukuoka, Japan, November 2010.
Hong-Ming Wang and Chung-Huang Yang, "Design and Implementation of a Network Forensics System for Linux," The 2010 International Computer Symposium (ICS2010), December 2010, Tainan.
Sheng-Wen Chen, Chung-Huang Yang, and Chien-Tsung Liu, "Design and Implementation of Live SD Acquisition Tool in Android Smart Phone," the Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2011), August 29-30, 2011, Kinmen, Taiwan.
Yenting Lai, Chunghuang Yang, Chihhung Lin, and TaeNam Ahn, "Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing, " International Conference on Convergence and Hybrid Information Technology (ICHIT 2011), September 2011, Daejeon, Korea.
Jing-Siang Yang and Chung-Huang Yang, "Design and Implementation of Forensic Software for Android Smart Phones," 2011 Cross-Strait Conference on Information Science and Technology and iCube (CSCIST 2011 and iCube 2011), December 2011, Taipei, Taiwan.
Ren-Jie Chen and Chung-Huang Yang, "Research on Android Anti-Forensic Tools, " The 17th Conference on Information Management and Practice (IMP 2011), December, 2011, Tainan, Taiwan.
Chung-Huang Yang and Yen-Ting Lai, "Design and Implementation of Forensic Systems for Android Devices based on Cloud Computing," Applied Mathematics & Information Sciences, Vol. 6, No. 1S, 2012, pp. 243S-247S.
Chung-Huang Yang and Bo Yang, "Design and Implementation of Digital Forensic Systems," The 29th Symposium on Cryptography and Information Security (SCIS2012), Kanazawa, Japan, January 2012.
Yi-Hsiung Ting and Chung-Huang Yang, "Design and Implementation of a Cloud Digital Forensic Laboratory," The 30th Symposium on Cryptography and Information Security (SCIS2013), Kyoto, Japan, January 2013.
Chung-Nan Chen, Raylin Tso and Chung- Huang Yang, "Design and Implementation of Digital Forensic Software for iPhone," The 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), July 2013, Seoul, Korea.
Chung-Huang Yang and Chang-Min Chen, “Configuration Management of iOS Devices based on SCAP,” The 31th Symposium on Cryptography and Information Security (SCIS2014), Kagoshima, Japan, Jan. 2014.
Wen-Han Chuang and Chung-Huang Yang, “Design and Implementation of an Integrated Testing Environment for Mobile Devices by Live DVD/USB,” The 25th Cryptology and Information Security Conference (CISC 2015), Kaohsiung, Taiwan, May 2015.
Cheng-Liang Kuo and Chung-Huang Yang, “Security Design for Configuration Management of Android Devices,” 2015 IEEE 39th Annual International Computers, Software & Applications Conference (COMPSAC 2015), pp. 249-254, Taichung, Taiwan, July 2015.
Chung-Huang Yang and Lun-Ming Tung, “Securing BYOD with Mobile Device Management based on SCAP and SE Android,” 2016 Symposium on Cryptography and Information Security (SCIS 2016), Kumamoto, Japan, Jan. 2016.
Lun-Ming Tung and Chung-Huang Yang, “A Remote Control System for Improving the Mobile Device Security Based on SE Android,” International Conference on Advanced Information Technologies (AIT 2016), Taichung, Taiwan, April 2016.
Meng-Chiao Lee, Jin Kwak, and Chung-Huang Yang, “Design and Implementation of a Mobile Device Management System Based on SEAndroid,” International Conference on Advanced Information Technologies (AIT 2017), Taichung, Taiwan, April 2017.
Xin-long Song and Chung-Huang Yang, “Mobile Device Management System Based on AOSP and SELinux,” The 1st International Workshop on Data Security and Privacy in Internet of Things (DSPIoT 2017), 2017 IEEE Second International Conference on Data Science in Cyberspace, Shenzhen, China, June 2017.
Yu Shi, Dong Zheng, and Chung-Huang Yang, “The Efficient Implementation of the Android Kernel with China Standard Cryptographic Algorithm,” The 1st International Workshop on Data Security and Privacy in Internet of Things (DSPIoT 2017), 2017 IEEE Second International Conference on Data Science in Cyberspace, Shenzhen, China, June 2017.
Chan Gao and Chung-Huang Yang, “File-Based Encryption with SM4,” The 1st International Workshop on Data Security and Privacy in Internet of Things (DSPIoT 2017), 2017 IEEE Second International Conference on Data Science in Cyberspace, Shenzhen, China, June 2017.