Follow
Chung-Huang Yang
Chung-Huang Yang
National Kaohsiung Normal University
Verified email at nknu.edu.tw - Homepage
Title
Cited by
Cited by
Year
Pseudorandom bit generators in stream-cipher cryptography
K Zeng, CH Yang, TRN Rao
Computer, 1991
2001991
On the linear consistency test (LCT) in cryptanalysis with applications
K Zeng, CH Yang, TRN Rao
Advances in Cryptology—CRYPTO’89 Proceedings 9, 164-174, 1990
1171990
System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats
SK Choi, CH Yang, J Kwak
KSII Transactions on Internet and Information Systems (TIIS) 12 (2), 906-918, 2018
682018
An improved linear syndrome algorithm in cryptanalysis with applications
K Zeng, CH Yang, TRN Rao
Conference on the Theory and Application of Cryptography, Crypto'90, 34-47, 1990
681990
Design and implementation of live sd acquisition tool in android smart phone
SW Chen, CH Yang, CT Liu
2011 Fifth International Conference on Genetic and Evolutionary Computing …, 2011
452011
Fast implementation of AES cryptographic algorithms in smart cards
CF Lu, YS Kao, HL Chiang, CH Yang
IEEE 37th Annual 2003 International Carnahan Conference onSecurity …, 2003
402003
Design and implementation of forensic system in Android smart phone
X Lee, C Yang, S Chen, J Wu
The 5th Joint Workshop on Information Security, 1-11, 2009
282009
Aryabhata remainder theorem: relevance to public-key crypto-algorithms
TRN Rao, CH Yang
Circuits, Systems and Signal Processing 25, 1-15, 2006
282006
Design and implementation of a live-analysis digital forensic system
PH Yen, CH Yang, TN Ahn
Proceedings of the 2009 international Conference on Hybrid information …, 2009
262009
Designing a taxonomy of web attacks
JY Lai, JS Wu, SJ Chen, CH Wu, CH Yang
2008 International Conference on Convergence and Hybrid Information …, 2008
262008
Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot
PS Huang, CH Yang, TN Ahn
Proceedings of the 2009 International Conference on Hybrid Information …, 2009
222009
Fast deployment of computer forensics with USBs
CH Yang, PH Yen
2010 International Conference on Broadband, Wireless Computing …, 2010
202010
Design and implementation of honeypot systems based on open-source software
CH Yeh, CH Yang
2008 IEEE International Conference on Intelligence and Security Informatics …, 2008
202008
Design and implementation of mobile forensic tool for android smart phone through cloud computing
Y Lai, C Yang, C Lin, TN Ahn
Convergence and Hybrid Information Technology: 5th International Conference …, 2011
192011
A modular-multiplication algorithm using lookahead determination
H Morita, CH Yang
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 1993
191993
Design and implementation of a secure instant messaging service based on elliptic-curve cryptography
CH Yang, TY Kuo, T Ahn, CP Lee
Journal of Computers 18 (4), 31-38, 2008
172008
Cryptanalysis of the Hwang-Rao secret error-correcting code schemes
K Zeng, CH Yang, TRN Rao
Information and Communications Security: Third International Conference …, 2001
172001
Implement web attack detection engine with snort by using modsecurity core rules
CH Yang, CH Shen
Fourth the E-Learning and Information Technology Symposium (EITS 09), 2009
162009
On the design of campus-wide multi-purpose smart card systems
CH Yang
Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on …, 1999
161999
Fast deployment of botnet detection with traffic monitoring
CH Yang, KL Ting
2009 Fifth International Conference on Intelligent Information Hiding and …, 2009
152009
The system can't perform the operation now. Try again later.
Articles 1–20