Lo-Yao Yen

Lo-Yao Yen  Adjunct Assistant Professor

Academic Degrees: Ph.D., National Chiao Tung University
Specialties: Applied Cryptography, Automotive Network Security, Mobile Computing, Formal Language
E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
 
 
 

Research and Pulication

Experience
  • 2009.2 ~ 2011.1 National Chi Nan University-Information Management Adjunct Lecturer
Journal Papers
  1. Lo-Yao Yeh, and Woei-Jiunn Tsaur, "A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems",  IEEE Transactions on Multimedia,  2012,10.(SCI) 
  2. Chen-Che Huang, Lo-Yao Yeh, Jiun-Long Huang, "EDG: An Energy-Efficient Data Gathering Scheme in Wireless Sensor Networks",  INFORMATION - International Information Institute,  2012,--.(SCI) 
  3. Lo-Yao Yeh, Chun-Chuan Yang, Jee-Gong Chang, and Yi-Lang Tsai, "A Secure and Efficient Batch Binding Update Scheme for Route Optimization of Nested NEtwork MObility (NEMO) in VANETs",  Journal of Network and Computer Applications,  2012,--.(SCI) 
  4. Lo-Yao Yeh, Woei-Jiunn Tsaur, Yu-Lun Huang, Anthony D. Joseph, and Shiuhpyng Shieh, "A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks",  IEEE Transactions on Vehicular Technology,  2012,--.(SCI) 
  5. Yen-Cheng Chen, Shu-Chuan Chuang, Lo-Yao Yeh, and Jiun-Long Huang, "A Practical Authentication Protocol with Anonymity for Wireless Access Networks",  Wireless Communications and Mobile Computing,  2011,10.(SCI) 
  6. Woei-Jiunn Tsaur and Lo-Yao Yeh, "A Novel Mobile Agent Authentication Scheme for Multi-host Environments Using Self-certified Pairing-based Public Key Cryptosystem",  International Journal of Innovative Computing, Information and Control,  2011,04.(SCI) 7.Lo-Yao Yeh, Yen-Cheng Chen, and Jiun-Long Huang,  "PAACP: A Portable 
  7. Privacy-Preserving Authentication and Access Control Protocol in Vehicular Ad hoc Networks", Computer Communications,  447-456,  2011,03.(SCI)
  8. Lo-Yao Yeh, Yen-Cheng Chen, and Jiun-Long Huang, "ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks",  IEEE Journal on Selected Areas in Communications,  2011,03.(SCI) 
  9. Lo-Yao Yeh, Jee-Gong Chang, and Yi-Lang Tsai, "A Fine-grained Access Control Scheme for Secure Video Multicast", ICIC Express Letters, Part B: Applications-An international Journal of Research and Surveys, 2011,02.(EI) 
  10. Jiun-Long Huang, Lo-Yao Yeh, Hung-Yu Chien, "ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-added Services in Vehicular Ad Hoc Networks", IEEE Transactions on Vehicular Technology,  248-262,  2011,01.(SCI) 
  11. Lo-Yao Yeh, Chen-Che Huang, Cheng-En Wu, and Jiun-Long Huang, "ALM: An Adaptive Location Management Scheme for Approximate Location Queries in Wireless Sensor Networks", Computer Communications,  2010,10.(SCI) 
  12. Yen-Cheng Chen and Lo-Yao Yeh, "A Portable Integrated Authentication and Access Control Scheme for Distributed Embedded Systems", International Journal of Innovative Computing, Information and Control,,  2010,02.(SCI) 
  13. Yen-Cheng Chen and Lo-Yao Yeh, "An Efficient Nonce-Based Authentication Scheme with Key Agreement", Applied Mathematics and Computation,  2005,04.(SCI)
Conference Papers
  1. Lo-Yao Yeh, Jee-Gong Chang, Weicheng Huang, and Yi-Lang Tsai, “A localized authentication and billing scheme for proxy mobile IPv6 in VANETs,”IEEE ICC 2012.
  2. Yi-Lang Tsai, Lo-Yao Yeh, Bo-Yi Lee, and Jee-Gong Chang, “Automated Malware Analysis Framework with Honeynet Technology in Taiwan Campuses,” IEEE ICPADS 2012. (Poster)
  3. C.-C. Huang, J.-L. Huang, J.-A. Yan and L.-Y. Yeh, "An In-Network Approximate Data Gathering Algorithm Exploiting Spatial Correlation in Wireless Sensor Networks," Proceedings of the 27th ACM Symposium on Applied Computing (SAC-12), March 26-30, 2012. (8/36=22%)
  4. G.-H. Ye, Lo-Yao Yeh and J.-L. Huang, "Hierarchical Role-based Data Dissemination for Large-Scale Wireless Sensor Networks with Mobile Sinks," IEEE PerCom Workshop, 2010.
  5. Y. L. Huang, J. D. Tygar, H. Y. Lin, Lo-Yao Yeh, H. Y. Tsai, K. Sklower, S. P. Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, "SWOON: A Testbed for Secure Wireless Overlay Networks," USENIX Workshop on Cyber Security Experimentation and Test, 2008.
  6. Yen-Cheng Chen, and Lo-Yao Yeh, "An Efficient Authentication and Access Control Scheme Using Smart Cards," IEEE ICPADS, Fukuoka, Japan, July 20 - 22, 2005.
 
National Chi Nan University - Information Management
Room 439, No. 470, University Rd., Puli, Nantou, Taiwan 54561 R.O.C.
886-49-2910960 #4541 or #4543