C URRICULUM V ITAE J YH - HAW Y EH , P H .D Assistant Professor Boise State University Computer Science College of Engineering Telephone: (208) 426-3034 1910 University Drive E-mail: jhyeh@boisestate.edu Boise, Idaho 83725-2075 P ROFESSIONAL P REPARATION National Chung Hsing University Taichung, Taiwan Applied Mathematics B.S. 1988 Cleveland State University Cleveland, Ohio Computer and Information Science M.S. 1993 University of Florida Gainesville, Florida Computer and Information Science and Engineering Ph.D. 1999 A PPOINTMENTS 2000—current Assistant Professor, Boise State University 2013—May 2015 Co-director, IDoTeach Program, Boise State University 1996—1999 Teaching/Research Assistant, University of Florida C LASSES T AUGHT CS 221 Computer Science II CS 321 Data Structures CS 331 Computer Security and Information Assurance CS 410/510 Databases CS 421/521 Design and Analysis of Algorithms CS 498 Seminar CS 546 Computer Security P UBLICATIONS R EFEREED J OURNAL A RTICLES /C ONFERENCE P ROCEEDINGS Jyh-haw Yeh, "A probabilistic homomorphic encryption algorithm over integers - protecting data privacy in clouds," The 12th IEEE International Conference on Advanced and Trusted Computing (ATC 2015), short paper, Beijing, China, August 2015. Page 1 of 13 CV of Jyh-haw Yeh Jyh-haw Yeh, "The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it," Journal of Supercomputing, Springer, Vol. 70, No. 3, pp. 1110-1119, 2014. Jyh-haw Yeh, Fiona Zeng and Thoms Long, "P2P email encryption by an identity-based one-way group key agreement protocol," The 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2014), Hsinchu, Taiwan, December 2014. Jyh-haw Yeh, "An Efficient Time-Bound Hierarchical Key Management Based on TamperResistant Devices," 2013 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2013), Guangzhou, China, November 2013. Jyh-haw Yeh, "Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings," 2013 2nd International Conference on Information and Knowledge Management (ICIKM 2013), Chengdu, China, July 2013. Jyh-haw Yeh, "Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes," The 10th IEEE International Conference on Dependable, Automatic and Secure Computing (DASC 2012), Changzhou, China, December 2012. Jyh-haw Yeh, "A PASS Scheme in Cloud Computing - Protecting Data Privacy for Clients by Authentication and Secret Sharing," Proceedings of the International Conference on Security and Management (SAM'11), Las Vegas, July 2011. Jyh-haw Yeh, "Enforcing non-hierarchical access policies by hierarchical key assignment schemes," Information Processing Letters, Elsevier, Vol. 110, No. 2, pp. 46-49, 2009. Jyh-haw Yeh, "A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem," Information Processing Letters, Elsevier, Vol. 105, No. 4, pp. 117-120, 2008. Jyh-haw Yeh, "A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit," Proceedings of the International Conference on Security and Management (SAM'07), Las Vegas, June 2007. Jyh-haw Yeh, "Enforcement of Non-Hierarchical Access Policies," Proceedings of the 10th WSEAS International Conference of Computers, Athens, Greece, July 2006. Lei Chen, Chung-wei Lee and Jyh-haw Yeh, "Density-based Multipath Secure Communication over Mobile Ad Hoc Networks," Proceedings of the 44th Annual ACM Southeast Conference, Melbourne, Florida, March 2006. Jyh-haw Yeh, Wei Zhang, Wen-chen Hu and Chung-wei Lee, "Design and Simulation of a Supplemental Protocol for BGP," Computer Networks, Elsevier, Vol. 49, No. 2, pp. 172-200, 2005. Jyh-haw Yeh, Marion Scheepers and Wen-chen Hu, "Modifying YCN Key Assignment Scheme to Resist the Attack from Hwang," Information Processing Letters, Elsevier, Vol. 95, No. 4, pp. 435-440, 2005. Jyh-haw Yeh, "An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription," Proceedings of the ACM Fourteenth Conference on Information and Knowledge Management (CIKM), short paper, Bremen, Germany, October 2005. Jyh-haw Yeh, Randy Chow, and Richard Newman, "Key Assignment for Enforcing Access Control Policy Exceptions in Distributed Systems," Information Sciences, Elsevier, Vol. 152, pp. 63-88, 2003. Page 2 of 13 CV of Jyh-haw Yeh Jyh-haw Yeh, Chung-wei Lee, and Wen-chen Hu "Protecting Internet Public Information Integrity during Transmission," Proceedings of the International Conference of Internet Computing (IC'03), Las Vegas, June 2003. Jyh-haw Yeh, Wei Zhang (a student of mine), Chung-wei Lee and Wen-chen Hu, "A Supplement Protocol for BGP - Source Policy Route Discovery," Proceedings of the 41th Annual ACM Southeast Conference, Savannah, Georgia, March 2003. Hong Xie, Chung-wei Lee, Jyh-haw Yeh, "SIP-Based VoIP Call Setup Delay Measurement and Performance Optimization over Wireless Links," Proceedings of the 41th Annual ACM Southeast Conference, Savannah, Georgia, March 2003. Chung-wei Lee, Wen-Chen Hu, and Jyh-haw Yeh, "A system model for mobile commerce," Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops(ICDCSW'03), Workshop on Multimedia Network Systems and Applications, May 2003, IEEE Computer Society 2003. Jyh-haw Yeh and Wen-chen Hu, "Access Control for an Organization Connected by Insecure Public Networks," Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, Florida, July 2002. Jyh-haw Yeh, Wen-chen Hu and Chung-wei Lee, "A New Routing Strategy by Prediction for Internetwork Domain Communication," Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, Florida, July 2002. Jyh-haw Yeh, Randy Chow, and Richard Newman, "A Dynamic Interdomain Communication Path Setup in Active Network," The First International Working Conference on Active Network, June 1999, Lecture Notes in Computer Science 1653 Springer 1999. Jyh-haw Yeh, Randy Chow, and Richard Newman, "Key Assignment for Enforcing Access Control Policy Exceptions," International Symposium on Internet Technology 1998 (ISIT'98), Taipei, Taiwan, April 1998. Jyh-haw Yeh, Randy Chow, and Richard Newman, "Interdomain Access Control with Policy Routing," Proceedings for the sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems (FTDCS'97), Tunis, Tunisia, October 1997. B OOK C HAPTERS Jyh-haw Yeh, Wen-chen Hu, Chung-wei Lee, "Security Issues and their Possible Countermeasures for a Mobile Agent Based Mobile Commerce", A Book Chapter in Advances in Security and Payment Methods for Mobile Commerce , 2005. Wen-chen Hu, Chung-wei Lee and Jyh-haw Yeh, "Mobile Commerce Systems," A Book Chapter in Mobile Commerce Applications, Idea Group Publishing, 2004. Wen-chen Hu and Jyh-haw Yeh, "World Wide Web Search Engines," A Book Chapter in Architectural Issues of Web-Enabled Electronic Business, Idea Group Publishing, 2003. O THER P UBLICATIONS Jake Rodden, Jyh-haw Yeh, Elmer Duran, and Dan Kondratyuk, "Integrity Coded Databases (ICDB) – An Evaluation of Efficiency, Performance, and Practicality," Idaho Conference on Undergraduate Research, A Poster, Boise, Idaho, July 2015. Page 3 of 13 CV of Jyh-haw Yeh Wen-Chen Hu, Chyang-Huei Thomas Yang, Jyh-haw Yeh and Weihong Hu, "Mobile and Electronic Commerce Systems and Technologies," Journal of Electronic Commerce in Organizations, Vol. 6, No. 3, pp. 54-74, 2008. Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, and Hung-Jen Yang, "Handheld Computing and Programming for Mobile Commerce," International Journal of Web Information Systems (IJWIS), Vol. 2, No. 3&4 - double issue, 2007. Wen-Chen Hu, Jyh-haw Yeh, Yapin Zhong, and Sheng-Chien Lee, "Using Mobile-Computing Technologies to Access Internet-Enabled Genome Databases," Proceedings of the 40th Annual Midwest Instruction and Computing Symposium (MICS 2007), Grand Forks, North Dakota, April 2007. Wen-Chen Hu, Jyh-haw Yeh, I-Lung Kao, and Yapin Zhong, "Handheld computing and J2ME programming for mobile handheld devices," Encyclopedia of Mobile Computing and Commerce, Information Science Publishing, 2006. Wen-Chen Hu, Jyh-haw Yeh, Hung-Ju Chu, and Sheng-Chien Lee, "Adaptive Web browsing using Web mining technologies for Internet-enabled mobile handheld devices," Proceedings of the 16th Information Resources Management Association (IRMA 2006) International Conference, Washington, D.C., May 2006. Wen-Chen Hu, Jyh-haw Yeh, Yapin Zhong, and Chung-wei Lee, "Client-side handheld computing and Java 2 Platform, Micro Edition (J2ME)," Proceedings of the 39th Annual Midwest Instruction and Computing Symposium (MICS 2006), Mount Preasant, Iowa, April 2006. Wen-Chen Hu, I-Lung Kao, Hung-Jen Yang, and Jyh-haw Yeh, "Handheld computing and Palm OS for mobile handheld devices," Proceedings of the 39th Annual Midwest Instruction and Computing Symposium (MICS 2006), Mount Preasant, Iowa, April 2006. Jyh-haw Yeh, "A Simple Way to Enforce Non-Hierarchical Access Policies," WSEAS Transactions on Computers, Vol. 5, No. 9, pp. 1837-1842, 2006. Wen-chen Hu, Jyh-haw Yeh, Hung-Ju Chu and Chung-wei Lee, "Internet-enabled mobile handheld devices for mobile commerce," Contemporary Management Research, Vol. 1, No. 1, pp. 13-34, 2005. Wen-Chen Hu, Hung-Jen Yang and Jyh-haw Yeh, "Mobile Internet and handheld devices for virtual communities," Subhasish Dasgupta, editor, Encyclopedia of Virtual Communities and Technologies, pp. 314-320, Idea Group Publishing, 2005. Wen-Chen Hu, Jyh-haw Yeh, Hung-Jen Yang and Chung-wei Lee, "Mobile handheld devices for mobile commerce," Mehdi Khosrow-Pour, editor, Encyclopedia of E-Commerce, E-Government and Mobile Commerce, pp. 792-798, Idea Group Publishing, 2005.. Chung-wei Lee, Wen-chen Hu and Jyh-haw Yeh, "Mobile Commerce Technology," Encyclopedia of Information Science and Technology, Vol. I-V, 2005. Wen-chen Hu, Hung-jen Yang, Jyh-haw Yeh and Chung-wei Lee, "World Wide Web Search Technologies," Encyclopedia of Information Science and Technology, Vol. I-V, 2005. Wen-chen Hu, Jyh-haw Yeh and Chung-wei Lee, "Handheld Devices and Computing and Payment Methods for Mobile Commerce," Proceedings of the 38th Annual Midwest Instruction and Computing Symposium, Eau Claire, Wisconsin, April 2005. Jyh-haw Yeh and Chung-wei Lee, "An Algorithm to Extend Hierarchical Key Assignment Schemes to Enforce a Richer Set of Access Policies," Journal of Education and Information Technology, Vol. 1, No. 1, 2004. Jyh-haw Yeh, "A Policy Translation Algorithm - Enabling any Hierarchical Key Assignment Scheme to Enforce Non-hierarchical Access Policies," Proceedings of the 15th Annual IRMA (Information Resources Management Association) International Conference, New Orleans, LA, 2004. Page 4 of 13 CV of Jyh-haw Yeh Wen-chen Hu, Xuli Zong, Chung-wei Lee and Jyh-haw Yeh, "World Wide Web Usage Mining Systems and Technologies," Journal on Systemics, Cybernetics and Informatics, Vol. 1, No. 4, 2003. Wen-chen Hu and Jyh-haw Yeh, "An XML World Wide Web Search Engine Using Finite Automata," Proceedings of the 6th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida, July 2002. (Best Paper Award). Chung-wei Lee and Jyh-haw Yeh, "A Real-Time Multimedia Medical Information System in Mobile Environments," Proceedings of the 6th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida, July 2002. G RANT P ROPOSALS A WARDED G RANTS BAA HSHQDC-14-R-B0014, Cyber Security Division, Department of Homeland Security, "P2P Email Encryption Using Identity-based One-way Group Key Agreement," PI: Jyh-haw Yeh, CoPI: Dianxiang Xu. 11/2015 - 10/2017, $747,344. (Recommended for Funding) Google CS4HS Grant, “Mobile Computer Science Principles,” PI: Amit Jain, Co-PI: Jyh-haw Yeh, Alark Joshi, Timothy Andersen, Marissa Schmidt. 6/17/2015 – 6/19/2015, $24,233. NSF “REU Site: Software Security,” PI: Dianxiang Xu, Co-PI: Jyh-haw Yeh, Izzat Alsmadi. 3/01/2015 – 2/28/2018, $324,000. NSF CE21, “CS10K: IDoCode: A Sustainable Model for Computer Science in Idaho High Schools,” PI: Amit Jain, Co-PI: Jyh-haw Yeh, Alark Joshi, Tim Andersen, Jonathan Brendefur. 3/01/2014 – 2/18/2017, $992,067. Amazon Web Services in Education – Research Grant, "Data Privacy Protection for Relational Database Service (RDS) - Proof of Concepts for a Semantic Hiding Database (SHDB) Approach," PI: Jyh-haw Yeh, 10/01/2013 - 10/31/2015, $5,000. Amazon Web Services in Education – Course Grant, "Data Structures Course Project using AWS", PI: Jyh-haw Yeh, 9/01/2013 - 9/30/2014, $4,000. NASA Idaho EPSCoR Research Collaboration Grant, "Quantitative Measurement of security Primitives in Wireless Sensor Networks," PI: Jyh-haw Yeh, 8/01/2009 – 7/31/2010, $4,000. D ECLINED G RANTS NSF SaTC, "TWC: Small: Protecting Data Integrity for Mission-Critical Database Applications in Clouds," PI: Jyh-haw Yeh, Co-PI: Dianxiang Xu, Izzat Alsmadi. Submitted on January 2015, $497,925. NSF-SFS-Faculty Development, "Collaborative Research: Capacity Building: Faculty Development for Software Assurance Education," PI: Dianxiang Xu, Co-PI: Jyh-haw Yeh, Izzat Alsmadi. Submitted on November 2014, $152,967. NSF CRI, "II-NEW: Infrastructure for Automated Testing of SDN-Based Security Services," PI: Dianxiang Xu, Co-PI: Jyh-haw Yeh, Izzat Alsmadi. Submitted on November 2014, $579,227. Google Faculty Research Award, "Developing and testing a proof-of-concept point-to-point email encryption system," PI: Jyh-haw Yeh. Submitted on October 2014, $38,528. NSF SFS-Faculty Development, "Collaborative Research: Capacity Building: Faculty Development for Software Assurance," PI: Dianxiang Xu, Co-PI: Jyh-haw Yeh, Elena Sherman. Submitted on February 2014, $152,550. Boise State University, College of Innovation and Design, "Establishing a trans-disciplinary Cybersecurity Minor Program," PI: Liljana Babinkostova, Co-PI: Jyh-haw Yeh, Dianxiang Xu, Jim Buffenbarger, Robert Minch, Sharon Tabor, Marion Scheepers. Submitted on May 2014. Page 5 of 13 CV of Jyh-haw Yeh NSF SaTC, "TWC: Small: Enhancing Big Data Privacy in Clouds Using Semantic Hiding Approach," PI: Jyh-haw Yeh, Co-PI: Dianxiang Xu. Submitted on January 2014, $487,275. Idaho SBOE HERC Incubation Fund, "Hiding Semantics of Outsourced Data: Facilitating Cloud Computing for Idaho Small Businesses," PI: Jyh-haw Yeh, Submitted in 2012, $50,000. NSF SaTC, "SBES TWC: Medium: Behavioral Obstacles and Technical Solutions for Adopting Cloud Services," PI: Jyh-haw Yeh, Co-PI: Tim Chenoweth. Submitted on January 2012, $719,142. HP Lab Innovative Research Program, "Relational Semantic Hiding Database - Protecting Data Privacy in Clouds," PI: Jyh-haw Yeh, Submitted in 2012, $97,253. Google Faculty Reserach Award, "Towards better data privacy in clouds - encrypting data semantically," PI: Jyh-haw Yeh, Submitted on August 2011, $61,004. NASA Idaho EPSCoR Research Initiation Grant, "Security design and performance evaluation of multi-hop satellite networks for NASA spacecrafts' data delivery," PI: Jyh-haw Yeh, Submitted on May 2011, $60,000. HP Lab Innovative Research Program, "Developing an open network hierarchical identity-based access control system for enterprises," PI: Jyh-haw Yeh, Submitted on January 2010, $113,939. NSF Trustworthy Computing, "Development of a quantitative security measuring model for cryptographic algorithms," PI: Jyh-haw Yeh, Co-PI: Timothy Andersen. Submitted on December 2009, $358,737. Idaho INL, "LDRD: Security Evaluation Tool for Cryptographic Algorithms - Bit-wise Randomness Testing by Neural Networks," PI: Kurt Derr, Co-PI: Jyh-haw Yeh. Submitted on May 2008, $651,000. NSF Cyber Trust, "Cyber Trust: Randomness Study of Cryptographic Algorithms Using Neural Network Approach," PI: Jyh-haw Yeh, Co-PI: Amit Jain, Timothy Andersen. Submitted to NSF on March 2008, $499,670. NASA-ISGC, "Developing a Randomness Testing Tool for Cryptographic Encryption Algorithms," PI: Jyh-haw Yeh, Submitted to NASA Idaho Space Grant Consortium Faculty Research Funding on September 2007. NSF "NeTS-NR: Enhancing BGP by Source Policy Route Discovery," PI: Jyh-haw Yeh, Submitted on April 2004, $450,000. NSF-CAREER, "A Supplemental Protocol for BGP - Source Policy Route Discover," PI: Jyhhaw Yeh, Submitted on July 2003, $400,000. Idaho SBOE, "Design and Development of a Supplemental Protocol for BGP," PI: Jyh-haw Yeh, Submitted on April 2003. Idaho SBOE, "An Innovative Agent-based E-business Model with Digital Chamber of Commerce," PI: Jyh-haw Yeh, Submitted on April, 2003. NSF-EPSCoR Instrument Acquisition Program, "Building an Experimental Network Cluster to Develop a Supplemental Protocol for BGP," PI: Jyh-haw Yeh, Submitted on March 2003, $32,000. NSF-CAREER, "Internetwork Domain Policy Routing by Prediction," PI: Jyh-haw Yeh, Submitted on July 2001, $375,000. A DVISED G RADUATE I NDEPENDENT S TUDY /T HESIS /P ROJECT A S AN A DVISOR AT B OISE S TATE U NIVERSITY Ujwal karki, Master Thesis. TBD, In Progress. Srisarguru Sridhar, Master Thesis. TBD, In Progress. Page 6 of 13 CV of Jyh-haw Yeh Archana Nanjundarao, Master Thesis. Integrity Coded Relational Databases (ICRDB) Protecting Data Integrity in Clouds, In Progress. Fiona Zeng, Master Thesis. An end-to-end identity-based email encryption scheme, October 2014. Andres Campossainz, Master Project. An application to provide an interface to a mySQL database located in the cloud featuring data privacy, March 2013. Jasim Suadad, Independent Study. Building Web Based Applications using PHP, Summer 2013. Spandana Kudikala, Master Project. An Insider Outsider Attacks Detection System, April 2012. Spandana Kudikala, Independent Study. Cloud Computing & Cloud Security, Spring 2011. kamatam Sowjanya, Master Project. A Bit-wise Randomness Study of AES, MD5 and RSA, May 2010. Rajasree Shyam, Master Project. An Efficient Time-Bound Hierarchical Key Assignment Scheme with a New Merge Function: a Performance Study, October 2009. Sean Ma, Master Thesis. Enforcing Non-Hierarchical Access Control Policy without Public Key Cryptography, November 2005. Wei Zhang, Master Thesis. Development, Implementation and Simulation of a Source Policy Route Discovery Protocol, August 2003. A S AN A DVISORY C OMMITTEE M EMBER AT B OISE S TATE U NIVERSITY Jimmy Wang, Master Thesis. TBD, In Progress. Ning Shen, Master Project. Coverage-based test generation for XACML policies, In Progress. Juan Carlos Diaz Velez, Master Thesis. A Framework for management of distributed data processing and event selection for the IceCube Neutrino Observatory, May 2013. Peter Games, Master Thesis. A Mobile Visualization System, May 2013. Surya Mahesh Tatapudi, Master Thesis. Dynamic Transmission Scheduling for Contention Avoidance in Wireless Sensor Networks, March 2013. Sandyha Vinnakota, Master Project. Object Oriented Implementation of the Parallel Toolkit Library, December 2012. Sreekanth Yalamanchili, Master Thesis. Congestion Mitigation by Traffic Dispersion in Wireless Sensor Networks, Oct 2012. Marissa Hollingsworth, Master Thesis. Hadoop and Hive as Scalable Alternatives to DBMS Business Intelligence Solutions for Big Data, August 2012. Ramya Ammu, Master Thesis. Improving Data Freshness to Enhance the Quality of Observations in Wireless Sensor Networks, January 2011. Rahul Kavalapara, Master Thesis. Reliable Coverage for Wireless Sensor Networks, 2010. Madhura Phansalkar, Master Project. Modification to Clusmon: A Beowulf Cluster Montoring System May 2009. Kishore Sajja, Master Project. Performance Study of Lucene in Parallel and Distributed Environments, Oct 2007. Brad Seewald, Master Project. COMBALG: A Combinatorial Algorithm Library, May 2007. Kirsten Allison, Master Project. PTK: A Parallel Toolkit Library, March 2007. Neeraja Julakanti, Master Project. A Chosen Ciphertext Attack, July 2005. Hongyi Hu, Master Project. Manual versus Automatic Parallelization Using PVM and HPF, October 2004. Michael Shelton, Master Project. Connection Pooling in PostgreSQL, June 2004. Eric Fialkowski, Master Project. Java Bindings to Parallel Virtual Machine, March 2004. A S AN A DVISORY C OMMITTEE M EMBER FOR O THER U NIVERSITIES Page 7 of 13 CV of Jyh-haw Yeh Advised four Master Theses at National Tsing Hua University, Taiwan o Zhiqiang Liang, The Design and Implementation of Tracking your Friend’s Locations on Android Devices, July 2105 o Andrea E. Medina Paredes, Unsupervised Learning: Using Clustering Algorithms to Detect Peer 2 Peer Botnet Flows, July 2015 o Jaime Alvarez, Botnet Detection Using Unsupervised Machine Learning, July 2015 o Shi-Chi Wang, Automatic UI Interaction Script Generator for Android Applications Using Activity Call Graph Analysis, July 2015 Advised one Ph.D dissertation at National Tsing Hua University, Taiwan o Bing Zhe He, A Group Key Agreement Scheme with Time-bound Property for Mobile Environments, July 2015 S PECIAL C OMMENTS FROM S TUDENTS In the issue no. 62 (vol. 24) of ``The Arbiter'' on May 3, 2012, The headline story interviewed a computer science student Samuel Dorsey Campbell who won Boise State's App-athon competition. In the story, he explained how and why he changed his career path to computer science and how he felt about computer scince education here at BSU. The following paragraph is quoted from the article. According to Campbell, he is pleased with the department. He is especially pleased with Professor Jyhhaw Yeh, saying Yeh ``dripped with brilliance.' Campbell also said computer science is exciting for him because it is a creative activity that allows him to problem in innovative and unique ways. P ROFESSIONAL D EVELOPMENT C ONFERENCE AND T RAINING Industrial Control System and Critical Infrastructure (ICSCI) Security Workshop, INL (Idaho National Laboratory), Idaho Falls, Idaho, September 22, 2014. ACM Technical Symposium on Computer Science Education, Atlanta, Georgia, March 5-8, 2014. ABET Symposium, Irvine, CA, 2011. Ethics/Legal Issue Case Study, Faculty Advising Institute, March 6, 2009. Academic Support Services, Faculty Advising Institute, May 23 - 25, 2007. Designing Courses for Significant Learning, Center of Teaching and Learning workshops, May 11, 2007. 16th Annual National Effective Teaching Institute, American Society for Engineering Education (ASEE), June 15 - 17, 2006. Blackboard 6.1 - What's New and Different, Center of Teaching and Learning Workshops, August 20, 2004. Teaching and Learning with Technology: Promoting online collaboration - strategies and Risks, Center Of Teaching and Learning Workshops, April 4, 2003. S ERVICE A CTIVITIES U NIVERSITY S ERVICE Department Level: o (Chair) CS Education Faculty Search Committee (2015) o (Chair) CS HCI Faculty Search Committee (2015) Page 8 of 13 CV of Jyh-haw Yeh o o o o o CS Cybersecurity Faculty Search Committee (2015) Ph.D in Computing Program Development Committee (2015) CS-INL Cybersecurity Faculty Search Committee (2014-2015) Coordinator of Cybersecurity Minor (2014-current) Coordinator of Graduate Certificate in Computer Science Teacher Education (2015current) o Tenure Progress and Review Committee (2006-2009; 2011-current) o Tenure Recommendation Committee (2007) o Graduate Admission Committee (2002-2007) o Graduate Comprehensive Exam Committee (2002-2005) College Level: o (Chair) COEN Undergraduate Curriculum Committee (as a chair: 2010-current; as a member: 2007-2009); o COEN Educator Search Committee (2014) o CS Representative in Albertson Library (2001-current) o COEN Tenure and Promotion Committee (2003, 2010, 2011) o Graduate Committee (2001-2003) University Level: o University Curriculum Committee (2007-current) o Co-Director of IDoTeach Program (2013-current) o (Chair) IdoTeach 4th Master Teacher Search Committee (2015) o IdoTeach 3rd Master Teacher Search Committee (2014) P ROFESSIONAL S ERVICE Journal Reviews: reviewed more than 40 articles in the following Journals o Journal of Computing o International Journal of Communication Systems o Journal of Supercomputing o Applied Mathematics and Information Sciences o Security and Communication Networks o IEEE Trans. On Wireless Communications o IEEE Journal on Selected Areas in Communications o Journal of Systems and Software o Information Sciences o Information Processing Letters o International Journal of Handheld Computing Research o Computers and Mathematics with Applications o Information Resource Management Journal Conference Committees: o Program Committee of the International Conference of Cloud Computing and Big Data (CCBD 2015) o Track Chair (Track 5: Information and Cyber Security) of the 13th International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN 2014) o Workshop Chair of the 13th IEEE International Conference on Computers and Information Technology (CIT 2013) o Program Committee of the 6th IEEE International Conference on Ubi-Media Computing (UMEDIA 2013) o Program Committee of ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2010 and SERA 2009) Page 9 of 13 CV of Jyh-haw Yeh o Program Committee of 2009 World Congress on Computer Science and Information Engineering (CSIE 2009) o Program Committee of the IRMA international conference (2004 and 2005) Proposal Reviewer: o NSF Cyber Trust (CT) Panel (2008) Journal Editor: o Guest Editor of the special issue “Security and Privacy in Distributed Sensor Networks” for the International Journal of Distributed Sensor Networks (2014) o Editorial Board of the Journal of Computer Science and Systems Biology (2011-current) o Associate Editor of the International Journal of Handheld Computing Research (2009current) o Ad Hoc Reviewer of the Editorial Review Board of the Information Resources Management Journal (2004-2008) o Editorial Review Board of the International Journal of E-Business Research (2004-2008) O UTREACH A CTIVITIES Outreach: o Hosting Coding is Cool Summer Workshops for Treasure Valley High School Teachers/students (6/13-6/14/2013; 6/19-6/20/2014; 6/23-6/24/2015; 6/25-6/26/2015) with Dr. Amit Jain, Dr. Tim Andersen, and Dr. Alark Joshi o Hosting Google CS4HS Workshop for High School Teachers (6/17-6/19/2015) with Dr. Amit Jain, Dr. Tim Andersen, Dr. Alark Joshi, and Marissa Schmidt o Hosting App Inventor Workshop for Meridian High School Technology Student Association (11/14/2013) with Dr. Amit Jain, Dr. Tim Andersen, and Dr. Louis Nadelson o Presenting a poster in BSU Expo at HP (2005) Volunteering: o Founding Board Member of the non-profit Idaho Chinese Organization (2012-2014) o President of Idaho Chinese Association (2009) o Summer Student Advising (2006) o Winter Student Advising (2005) o Volunteer as a Guide in the Jason Project (2005) o BSU Science Competition Proctor (2005) A PPENDIX P APER R EVIEWED "A Shareable Keyword Search over Encrypted Data in Cloud Computing," Journal of Supercomputing, Springer, May 2015. "A Lightweight Security and Authentication Protocol for NFC-Based Mobile Payments," Information Sciences, Elsevier, June 2014. "Key Management Scheme for Small Dynamic Node Groups in Wireless Sensor Networks," The 6th IEEE International Conference on Ubi-Media Computing (UMEDIA 2013), November 2013. "Energy Consumption of Three Scheduling Algorithms for Cloud Computing: A Comparative Analysis," Journal of Computing, Springer, October 2013. "A Novel Verifiable Secret Sharing Mechanism Using Theory of Numbers and a Method for Sharing Secrets," International Journal of Communication Systems, Wiley, June 2013. Page 10 of 13 CV of Jyh-haw Yeh "On scheduling data access with cooperative load balancing in vehicular ad hoc networks (VANETs)," Journal of Supercomputing, Springer, May 2013. "A Theoretical Model: Using Logistic Regression for Malware Signature-based Detection," Journal of Computing - special issue on Autonomic and Trusted Computing, Springer, April 2013. "Security Analysis of RSA Cryptosystem Algorithm and its Properties," Applied Mathematics and Information Sciences, Natural Sciences Publishing, September 2012. "Efficient Identity-based Hierarchical Access Authentication Protocol for Mobile Network," Security and Communication Networks, Wiley, August 2011. "USF: A Unified Security Framework for Multi-domain Wireless Mesh Networks," IEEE Transactions on Wireless Communications, May 2011. "Toward a Ubiquitous Wireless Communications: Passport/Visa Authentication Protocols," IEEE Journal on Selected Areas in Communications -- Special Issue Cooperative Networking Challenges and Applications, March 2011. "A Novel Public-Key Assignment Scheme for Enforcing Access Control and Multicast Communications in a User Hierarchy," revised version, Information Sciences, Elsevier, January 2011. "WiMAX Networks: Operations and QoS in Developing Countries," International Journal of Handheld Computing Research (IJHCR), IGI Global, October 2010. "Efficient Proxy Signcryption Scheme with Provable CCA and CMA Security," Computers & Mathematics with Applications, Elsevier, June 2010. "Cryptanalysis of an RSA Key Generation Algorithm with a Large Private Key," revised version, Information Sciences, Elsevier, March 2010. "Provably Secure Proxy Signcryption Scheme Based on Pairings," Computers & Mathematics with Applications, Elsevier, January 2010. "Hierarchical information-protected system with multiple predecessors," Information Sciences, Elsevier, March 2009. "Bi-associative one-way function construction for public key cryptosystem," Journal of Systems and Software, Elsevier, February 2009. "A Novel Public-Key Assignment Scheme for Enforcing Access Control and Multicast Communications in a User Hierarchy," Information Sciences, Elsevier, September 2008. "Improvement of Santis et al.'s Time-Bound Hierarchical Key Assignment Scheme," Information Sciences, Elsevier, July 2008. "Identity-Based Threshold Decryption with Provable Security in Random Oracle and Generic Model," Information Sciences, Elsevier, April 2008. "Cryptanalysis of an RSA Key Generation Algorithm with a Large Private Key," Information Sciences, Elsevier, March 2008. "A New Efficient Access Control in a Hierarchy for Hardware-Limited Users," Information Sciences, Elsevier, February 2008. "Provably Secure Identity-Based Authenticated Key Agreement Protocols without Random Oracles," Information Sciences, Elsevier, October 2007. "Suspicious-Taint-Based Access Control for Protecting OS from Network Attacks," Journal of Systems and Software, Elsevier, September 2007. "Cytogenesis of Neural Cell: Phenomics of emotion-based control in species," International Symposium on Biomedical informatics and Cybernetics: BMIC 2007, June 2007. "Cybernetics of Motivation and Emotion," International Symposium on Biomedical informatics and Cybernetics: BMIC 2007, June 2007. "Coastal Data and Information Management for Integrated Coastal Management: the Role of IODE," Information Resource Management Journal, IGI Global, June 2007. Page 11 of 13 CV of Jyh-haw Yeh "An Efficient Key Management Scheme for Access Control in a User Hierarchy," Journal of Systems and Software, Elsevier, September 2006. "An Empirical Examination of Customer Perceptions of Mobile Advertising," Information Resource Management Journal, IGI Global, June 2005. "Innovative Pricing and Charging in Next-Generation Wireless Networks," Annual Conference of Information Resource Management Association, 2005. "Bridging the International Digital Divide: Content Relevancy and Creation," Annual Conference of Information Resource Management Association, 2005. "Considerations of Public Key Infrastructure (PKI), functioning as a chain of trust in electronic payments systems," International Journal of E-Business Research, IGI Global, December 2004. "Tolerant Key Assignment for Enforcing Complicated Access Control Policy in a Hierarchy," Information Sciences, Elsevier, December 2004. "A Novel Method for Rating and Alive Detecting Web Pages on the Metasearch Engine," International Journal of E-Business Research, IGI Global, September 2004. "How Does IT Support Vertical Integration: The Case of Wal-Mart Stores," Information Resource Management Journal, IGI Global, August 2004. "An Efficient Key Assignment for Access Control in Large Partially Ordered Hierarchy," Journal of Systems and Software, Elsevier, July 2004. Student Crossroad Magazine, ACM, November, 2002. P APER P RESENTATIONS "A probabilistic homomorphic encryption algorithm over integers - protecting data privacy in clouds," The 12th IEEE International Conference on Advanced and Trusted Computing (ATC 2015) , Beijing, China, August 2015. "P2P Email Encryption by an Identity-based One-way Group Key Agreement Protocol," The 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS'14), Hsinchu, Taiwan, December 2014. "An Efficient Time-Bound Hierarchical Key Management Based on Tamper-Resistant Devices," 2013 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2013), Guangzhou, China, November 2013. "Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings," 2013 2nd International Conference on Information and Knowledge Management (ICIKM 2013), Chengdu, China, July 2013. "Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes," The 10th IEEE International Conference on Dependable, Automatic and Secure Computing (DASC 2012), Changzhou, China, December 2012. "A PASS Scheme in Cloud Computing - Protecting Data Privacy by Authentication and Secret Sharing," Proceedings of International Conference on Security and Management (SAM'11), July 2011. "A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit," The International Conference on Security and Management (SAM'07), June 2007. "Enforcement of Non-Hierarchical Access Policies," The 10th WSEAS International Conference of Computers, July 2006. "An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription," The ACM Fourteenth Conference on Information and Knowledge Management (CIKM'05), October 2005. "A Policy Translation Algorithm - Enabling any Hierarchical Key Assignment Scheme to Enforce Non-hierarchical Access Policies," The 15th Annual Conference on Information Resources Management Association (IRMA'04), May 2004. Page 12 of 13 CV of Jyh-haw Yeh "Protecting Internet Public Information Integrity during Transmission," The International Conference of Internet Computing (IC'03), June 2003. "A Supplement Protocol for BGP - Source Policy Route Discovery," The 41th Annual ACM Southeast Conference, Savannah, Georgia, March 2003. "A New Routing Strategy by Prediction for Internetwork Domain Communication," The 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI'02), July 2002. "Access Control for an Organization Connected by Insecure Public Networks," The 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI'02), July 2002. "Key Assignment for Enforcing Access Control Policy Exception," The International Symposium on Internet Technology (ISIT'98), April 1998. "Interdomain Access Control with Policy Routing," The sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems (FTDCS'97), October 1997. Page 13 of 13 CV of Jyh-haw Yeh