A shoulder surfing resistant graphical authentication system HM Sun, ST Chen, JH Yeh, CY Cheng IEEE Transactions on Dependable and Secure Computing 15 (2), 180-193, 2016 | 132 | 2016 |
Key assignment for enforcing access control policy exceptions in distributed systems J Yeh, R Chow, R Newman Information Sciences 152, 63-88, 2003 | 53 | 2003 |
Intelligent monitor for typhoon in IoT system of smart city EK Wang, F Wang, S Kumari, JH Yeh, CM Chen The Journal of Supercomputing 77 (3), 3024-3043, 2021 | 42 | 2021 |
Internet-enabled mobile handheld devices for mobile commerce WC Hu, J Yeh, HJ Chu, C Lee Contemporary Management Research 1 (1), 13-34, 2005 | 40 | 2005 |
World Wide Web usage mining WC Hu, HJ Yang, C Lee, J Yeh Encyclopedia of data warehousing and mining, 1242-1248, 2005 | 35 | 2005 |
An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription J Yeh Proceedings of the 14th ACM international conference on Information and …, 2005 | 34 | 2005 |
A system model for mobile commerce C Lee, WC Hu, J Yeh 23rd International Conference on Distributed Computing Systems Workshops …, 2003 | 34 | 2003 |
Mobile and electronic commerce systems and technologies WC Hu, CHT Yang, J Yeh, W Hu Journal of Electronic Commerce in Organizations (JECO) 6 (3), 54-73, 2008 | 32 | 2008 |
Analysis on the security and use of password managers C Luevanos, J Elizarraras, K Hirschi, JH Yeh 2017 18th International Conference on Parallel and Distributed Computing …, 2017 | 30 | 2017 |
Mobile commerce systems WC Hu, C Lee, J Yeh Mobile commerce applications, 1-23, 2004 | 21 | 2004 |
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem J Yeh Information Processing Letters 105 (4), 117-120, 2008 | 19 | 2008 |
Cryptanalysis of a pairing-based anonymous key agreement scheme for smart grid XC Liang, TY Wu, YQ Lee, CM Chen, JH Yeh Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2020 | 18 | 2020 |
Undergraduate research experience in cybersecurity for underrepresented students and students with limited research opportunities D Yang, D Xu, JH Yeh, Y Fan Journal of STEM Education 19 (5), 2019 | 18 | 2019 |
World wide web search technologies WC Hu, HJ Yang, J Yeh, C Lee Encyclopedia of Information Science and Technology, First Edition, 3111-3117, 2005 | 14 | 2005 |
Handheld Computing and Programming for Mobile Commerce WC Hu, JH Yeh, L Fu, HJ Yang International Journal of Web Information Systems 2 (3/4), 164-175, 2007 | 11 | 2007 |
P2P email encryption by an identity-based one-way group key agreement protocol J Yeh, F Zeng, T Long 2014 20th IEEE International Conference on Parallel and Distributed Systems …, 2014 | 10 | 2014 |
Interdomain access control with policy routing J Yeh, R Chow, R Newman-Wolfe Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of …, 1997 | 9 | 1997 |
Data storage security for the internet of things Y Duan, J Li, G Srivastava, JH Yeh The Journal of Supercomputing 76 (11), 8529-8547, 2020 | 8 | 2020 |
A PASS Scheme in Cloud Computing-Protecting Data Privacy by Authentication and Secret Sharing J Yeh Proceedings of the International Conference on Security and Management (SAM), 1, 2011 | 8 | 2011 |
Intelligent radioactive waste process cloud-based system for nuclear power plant decommissioning YC Chen, HM Sun, RS Chen, J Yeh, X Fan, IH Chou Journal of Ambient Intelligence and Humanized Computing, 1-11, 2024 | 7 | 2024 |