CV - Computer Science - Boise State University

advertisement
C URRICULUM V ITAE
J YH - HAW Y EH , P H .D
Assistant Professor
Boise State University
Computer Science
College of Engineering
Telephone: (208) 426-3034
1910 University Drive
E-mail: jhyeh@boisestate.edu
Boise, Idaho 83725-2075
P ROFESSIONAL P REPARATION
National Chung Hsing University
Taichung, Taiwan
Applied Mathematics
B.S. 1988
Cleveland State University
Cleveland, Ohio
Computer and Information Science
M.S. 1993
University of Florida
Gainesville,
Florida
Computer and Information Science
and Engineering
Ph.D. 1999
A PPOINTMENTS
2000—current
Assistant Professor, Boise State University
2013—May 2015
Co-director, IDoTeach Program, Boise State University
1996—1999
Teaching/Research Assistant, University of Florida
C LASSES T AUGHT







CS 221 Computer Science II
CS 321 Data Structures
CS 331 Computer Security and Information Assurance
CS 410/510 Databases
CS 421/521 Design and Analysis of Algorithms
CS 498 Seminar
CS 546 Computer Security
P UBLICATIONS
R EFEREED J OURNAL A RTICLES /C ONFERENCE P ROCEEDINGS

Jyh-haw Yeh, "A probabilistic homomorphic encryption algorithm over integers - protecting data
privacy in clouds," The 12th IEEE International Conference on Advanced and Trusted
Computing (ATC 2015), short paper, Beijing, China, August 2015.
Page 1 of 13
CV of Jyh-haw Yeh















Jyh-haw Yeh, "The insecurity of two proxy signcryption schemes: proxy credential forgery attack
and how to prevent it," Journal of Supercomputing, Springer, Vol. 70, No. 3, pp. 1110-1119,
2014.
Jyh-haw Yeh, Fiona Zeng and Thoms Long, "P2P email encryption by an identity-based one-way
group key agreement protocol," The 20th IEEE International Conference on Parallel and
Distributed Systems (ICPADS 2014), Hsinchu, Taiwan, December 2014.
Jyh-haw Yeh, "An Efficient Time-Bound Hierarchical Key Management Based on TamperResistant Devices," 2013 IEEE International Conference on Computer Science and Automation
Engineering (CSAE 2013), Guangzhou, China, November 2013.
Jyh-haw Yeh, "Security Vulnerability in Identity-Based Public Key Cryptosystems from
Pairings," 2013 2nd International Conference on Information and Knowledge Management
(ICIKM 2013), Chengdu, China, July 2013.
Jyh-haw Yeh, "Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes," The 10th
IEEE International Conference on Dependable, Automatic and Secure Computing (DASC 2012),
Changzhou, China, December 2012.
Jyh-haw Yeh, "A PASS Scheme in Cloud Computing - Protecting Data Privacy for Clients by
Authentication and Secret Sharing," Proceedings of the International Conference on Security and
Management (SAM'11), Las Vegas, July 2011.
Jyh-haw Yeh, "Enforcing non-hierarchical access policies by hierarchical key assignment
schemes," Information Processing Letters, Elsevier, Vol. 110, No. 2, pp. 46-49, 2009.
Jyh-haw Yeh, "A secure time-bound hierarchical key assignment scheme based on RSA public
key cryptosystem," Information Processing Letters, Elsevier, Vol. 105, No. 4, pp. 117-120, 2008.
Jyh-haw Yeh, "A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime
Limit," Proceedings of the International Conference on Security and Management (SAM'07), Las
Vegas, June 2007.
Jyh-haw Yeh, "Enforcement of Non-Hierarchical Access Policies," Proceedings of the 10th
WSEAS International Conference of Computers, Athens, Greece, July 2006.
Lei Chen, Chung-wei Lee and Jyh-haw Yeh, "Density-based Multipath Secure Communication
over Mobile Ad Hoc Networks," Proceedings of the 44th Annual ACM Southeast Conference,
Melbourne, Florida, March 2006.
Jyh-haw Yeh, Wei Zhang, Wen-chen Hu and Chung-wei Lee, "Design and Simulation of a
Supplemental Protocol for BGP," Computer Networks, Elsevier, Vol. 49, No. 2, pp. 172-200,
2005.
Jyh-haw Yeh, Marion Scheepers and Wen-chen Hu, "Modifying YCN Key Assignment Scheme
to Resist the Attack from Hwang," Information Processing Letters, Elsevier, Vol. 95, No. 4, pp.
435-440, 2005.
Jyh-haw Yeh, "An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic
Article Subscription," Proceedings of the ACM Fourteenth Conference on Information and
Knowledge Management (CIKM), short paper, Bremen, Germany, October 2005.
Jyh-haw Yeh, Randy Chow, and Richard Newman, "Key Assignment for Enforcing Access
Control Policy Exceptions in Distributed Systems," Information Sciences, Elsevier, Vol. 152, pp.
63-88, 2003.
Page 2 of 13
CV of Jyh-haw Yeh









Jyh-haw Yeh, Chung-wei Lee, and Wen-chen Hu "Protecting Internet Public Information
Integrity during Transmission," Proceedings of the International Conference of Internet
Computing (IC'03), Las Vegas, June 2003.
Jyh-haw Yeh, Wei Zhang (a student of mine), Chung-wei Lee and Wen-chen Hu, "A Supplement
Protocol for BGP - Source Policy Route Discovery," Proceedings of the 41th Annual ACM
Southeast Conference, Savannah, Georgia, March 2003.
Hong Xie, Chung-wei Lee, Jyh-haw Yeh, "SIP-Based VoIP Call Setup Delay Measurement and
Performance Optimization over Wireless Links," Proceedings of the 41th Annual ACM Southeast
Conference, Savannah, Georgia, March 2003.
Chung-wei Lee, Wen-Chen Hu, and Jyh-haw Yeh, "A system model for mobile commerce,"
Proceedings of the 23rd International Conference on Distributed Computing Systems
Workshops(ICDCSW'03), Workshop on Multimedia Network Systems and Applications, May
2003, IEEE Computer Society 2003.
Jyh-haw Yeh and Wen-chen Hu, "Access Control for an Organization Connected by Insecure
Public Networks," Proceedings of the 6th World Multiconference on Systemics, Cybernetics and
Informatics, Orlando, Florida, July 2002.
Jyh-haw Yeh, Wen-chen Hu and Chung-wei Lee, "A New Routing Strategy by Prediction for
Internetwork Domain Communication," Proceedings of the 6th World Multiconference on
Systemics, Cybernetics and Informatics, Orlando, Florida, July 2002.
Jyh-haw Yeh, Randy Chow, and Richard Newman, "A Dynamic Interdomain Communication
Path Setup in Active Network," The First International Working Conference on Active Network,
June 1999, Lecture Notes in Computer Science 1653 Springer 1999.
Jyh-haw Yeh, Randy Chow, and Richard Newman, "Key Assignment for Enforcing Access
Control Policy Exceptions," International Symposium on Internet Technology 1998 (ISIT'98),
Taipei, Taiwan, April 1998.
Jyh-haw Yeh, Randy Chow, and Richard Newman, "Interdomain Access Control with Policy
Routing," Proceedings for the sixth IEEE Computer Society Workshop on Future Trends of
Distributed Computing Systems (FTDCS'97), Tunis, Tunisia, October 1997.
B OOK C HAPTERS



Jyh-haw Yeh, Wen-chen Hu, Chung-wei Lee, "Security Issues and their Possible
Countermeasures for a Mobile Agent Based Mobile Commerce", A Book Chapter in Advances
in Security and Payment Methods for Mobile Commerce , 2005.
Wen-chen Hu, Chung-wei Lee and Jyh-haw Yeh, "Mobile Commerce Systems," A Book Chapter
in Mobile Commerce Applications, Idea Group Publishing, 2004.
Wen-chen Hu and Jyh-haw Yeh, "World Wide Web Search Engines," A Book Chapter in
Architectural Issues of Web-Enabled Electronic Business, Idea Group Publishing, 2003.
O THER P UBLICATIONS

Jake Rodden, Jyh-haw Yeh, Elmer Duran, and Dan Kondratyuk, "Integrity Coded Databases
(ICDB) – An Evaluation of Efficiency, Performance, and Practicality," Idaho Conference on
Undergraduate Research, A Poster, Boise, Idaho, July 2015.
Page 3 of 13
CV of Jyh-haw Yeh
















Wen-Chen Hu, Chyang-Huei Thomas Yang, Jyh-haw Yeh and Weihong Hu, "Mobile and
Electronic Commerce Systems and Technologies," Journal of Electronic Commerce in
Organizations, Vol. 6, No. 3, pp. 54-74, 2008.
Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, and Hung-Jen Yang, "Handheld Computing and
Programming for Mobile Commerce," International Journal of Web Information Systems
(IJWIS), Vol. 2, No. 3&4 - double issue, 2007.
Wen-Chen Hu, Jyh-haw Yeh, Yapin Zhong, and Sheng-Chien Lee, "Using Mobile-Computing
Technologies to Access Internet-Enabled Genome Databases," Proceedings of the 40th Annual
Midwest Instruction and Computing Symposium (MICS 2007), Grand Forks, North Dakota, April
2007.
Wen-Chen Hu, Jyh-haw Yeh, I-Lung Kao, and Yapin Zhong, "Handheld computing and J2ME
programming for mobile handheld devices," Encyclopedia of Mobile Computing and Commerce,
Information Science Publishing, 2006.
Wen-Chen Hu, Jyh-haw Yeh, Hung-Ju Chu, and Sheng-Chien Lee, "Adaptive Web browsing
using Web mining technologies for Internet-enabled mobile handheld devices," Proceedings of
the 16th Information Resources Management Association (IRMA 2006) International Conference,
Washington, D.C., May 2006.
Wen-Chen Hu, Jyh-haw Yeh, Yapin Zhong, and Chung-wei Lee, "Client-side handheld
computing and Java 2 Platform, Micro Edition (J2ME)," Proceedings of the 39th Annual Midwest
Instruction and Computing Symposium (MICS 2006), Mount Preasant, Iowa, April 2006.
Wen-Chen Hu, I-Lung Kao, Hung-Jen Yang, and Jyh-haw Yeh, "Handheld computing and Palm
OS for mobile handheld devices," Proceedings of the 39th Annual Midwest Instruction and
Computing Symposium (MICS 2006), Mount Preasant, Iowa, April 2006.
Jyh-haw Yeh, "A Simple Way to Enforce Non-Hierarchical Access Policies," WSEAS
Transactions on Computers, Vol. 5, No. 9, pp. 1837-1842, 2006.
Wen-chen Hu, Jyh-haw Yeh, Hung-Ju Chu and Chung-wei Lee, "Internet-enabled mobile
handheld devices for mobile commerce," Contemporary Management Research, Vol. 1, No. 1,
pp. 13-34, 2005.
Wen-Chen Hu, Hung-Jen Yang and Jyh-haw Yeh, "Mobile Internet and handheld devices for
virtual communities," Subhasish Dasgupta, editor, Encyclopedia of Virtual Communities and
Technologies, pp. 314-320, Idea Group Publishing, 2005.
Wen-Chen Hu, Jyh-haw Yeh, Hung-Jen Yang and Chung-wei Lee, "Mobile handheld devices for
mobile commerce," Mehdi Khosrow-Pour, editor, Encyclopedia of E-Commerce, E-Government
and Mobile Commerce, pp. 792-798, Idea Group Publishing, 2005..
Chung-wei Lee, Wen-chen Hu and Jyh-haw Yeh, "Mobile Commerce Technology,"
Encyclopedia of Information Science and Technology, Vol. I-V, 2005.
Wen-chen Hu, Hung-jen Yang, Jyh-haw Yeh and Chung-wei Lee, "World Wide Web Search
Technologies," Encyclopedia of Information Science and Technology, Vol. I-V, 2005.
Wen-chen Hu, Jyh-haw Yeh and Chung-wei Lee, "Handheld Devices and Computing and
Payment Methods for Mobile Commerce," Proceedings of the 38th Annual Midwest Instruction
and Computing Symposium, Eau Claire, Wisconsin, April 2005.
Jyh-haw Yeh and Chung-wei Lee, "An Algorithm to Extend Hierarchical Key Assignment
Schemes to Enforce a Richer Set of Access Policies," Journal of Education and Information
Technology, Vol. 1, No. 1, 2004.
Jyh-haw Yeh, "A Policy Translation Algorithm - Enabling any Hierarchical Key Assignment
Scheme to Enforce Non-hierarchical Access Policies," Proceedings of the 15th Annual IRMA
(Information Resources Management Association) International Conference, New Orleans, LA,
2004.
Page 4 of 13
CV of Jyh-haw Yeh



Wen-chen Hu, Xuli Zong, Chung-wei Lee and Jyh-haw Yeh, "World Wide Web Usage Mining
Systems and Technologies," Journal on Systemics, Cybernetics and Informatics, Vol. 1, No. 4,
2003.
Wen-chen Hu and Jyh-haw Yeh, "An XML World Wide Web Search Engine Using Finite
Automata," Proceedings of the 6th World Multi-Conference on Systemics, Cybernetics and
Informatics, Orlando, Florida, July 2002. (Best Paper Award).
Chung-wei Lee and Jyh-haw Yeh, "A Real-Time Multimedia Medical Information System in
Mobile Environments," Proceedings of the 6th World Multi-Conference on Systemics,
Cybernetics and Informatics, Orlando, Florida, July 2002.
G RANT P ROPOSALS
A WARDED G RANTS







BAA HSHQDC-14-R-B0014, Cyber Security Division, Department of Homeland Security, "P2P
Email Encryption Using Identity-based One-way Group Key Agreement," PI: Jyh-haw Yeh, CoPI: Dianxiang Xu. 11/2015 - 10/2017, $747,344. (Recommended for Funding)
Google CS4HS Grant, “Mobile Computer Science Principles,” PI: Amit Jain, Co-PI: Jyh-haw
Yeh, Alark Joshi, Timothy Andersen, Marissa Schmidt. 6/17/2015 – 6/19/2015, $24,233.
NSF “REU Site: Software Security,” PI: Dianxiang Xu, Co-PI: Jyh-haw Yeh, Izzat Alsmadi.
3/01/2015 – 2/28/2018, $324,000.
NSF CE21, “CS10K: IDoCode: A Sustainable Model for Computer Science in Idaho High
Schools,” PI: Amit Jain, Co-PI: Jyh-haw Yeh, Alark Joshi, Tim Andersen, Jonathan Brendefur.
3/01/2014 – 2/18/2017, $992,067.
Amazon Web Services in Education – Research Grant, "Data Privacy Protection for Relational
Database Service (RDS) - Proof of Concepts for a Semantic Hiding Database (SHDB)
Approach," PI: Jyh-haw Yeh, 10/01/2013 - 10/31/2015, $5,000.
Amazon Web Services in Education – Course Grant, "Data Structures Course Project using
AWS", PI: Jyh-haw Yeh, 9/01/2013 - 9/30/2014, $4,000.
NASA Idaho EPSCoR Research Collaboration Grant, "Quantitative Measurement of security
Primitives in Wireless Sensor Networks," PI: Jyh-haw Yeh, 8/01/2009 – 7/31/2010, $4,000.
D ECLINED G RANTS






NSF SaTC, "TWC: Small: Protecting Data Integrity for Mission-Critical Database Applications
in Clouds," PI: Jyh-haw Yeh, Co-PI: Dianxiang Xu, Izzat Alsmadi. Submitted on January 2015,
$497,925.
NSF-SFS-Faculty Development, "Collaborative Research: Capacity Building: Faculty
Development for Software Assurance Education," PI: Dianxiang Xu, Co-PI: Jyh-haw Yeh, Izzat
Alsmadi. Submitted on November 2014, $152,967.
NSF CRI, "II-NEW: Infrastructure for Automated Testing of SDN-Based Security Services," PI:
Dianxiang Xu, Co-PI: Jyh-haw Yeh, Izzat Alsmadi. Submitted on November 2014, $579,227.
Google Faculty Research Award, "Developing and testing a proof-of-concept point-to-point email
encryption system," PI: Jyh-haw Yeh. Submitted on October 2014, $38,528.
NSF SFS-Faculty Development, "Collaborative Research: Capacity Building: Faculty
Development for Software Assurance," PI: Dianxiang Xu, Co-PI: Jyh-haw Yeh, Elena Sherman.
Submitted on February 2014, $152,550.
Boise State University, College of Innovation and Design, "Establishing a trans-disciplinary
Cybersecurity Minor Program," PI: Liljana Babinkostova, Co-PI: Jyh-haw Yeh, Dianxiang Xu,
Jim Buffenbarger, Robert Minch, Sharon Tabor, Marion Scheepers. Submitted on May 2014.
Page 5 of 13
CV of Jyh-haw Yeh

















NSF SaTC, "TWC: Small: Enhancing Big Data Privacy in Clouds Using Semantic Hiding
Approach," PI: Jyh-haw Yeh, Co-PI: Dianxiang Xu. Submitted on January 2014, $487,275.
Idaho SBOE HERC Incubation Fund, "Hiding Semantics of Outsourced Data: Facilitating Cloud
Computing for Idaho Small Businesses," PI: Jyh-haw Yeh, Submitted in 2012, $50,000.
NSF SaTC, "SBES TWC: Medium: Behavioral Obstacles and Technical Solutions for Adopting
Cloud Services," PI: Jyh-haw Yeh, Co-PI: Tim Chenoweth. Submitted on January 2012,
$719,142.
HP Lab Innovative Research Program, "Relational Semantic Hiding Database - Protecting Data
Privacy in Clouds," PI: Jyh-haw Yeh, Submitted in 2012, $97,253.
Google Faculty Reserach Award, "Towards better data privacy in clouds - encrypting data
semantically," PI: Jyh-haw Yeh, Submitted on August 2011, $61,004.
NASA Idaho EPSCoR Research Initiation Grant, "Security design and performance evaluation of
multi-hop satellite networks for NASA spacecrafts' data delivery," PI: Jyh-haw Yeh, Submitted
on May 2011, $60,000.
HP Lab Innovative Research Program, "Developing an open network hierarchical identity-based
access control system for enterprises," PI: Jyh-haw Yeh, Submitted on January 2010, $113,939.
NSF Trustworthy Computing, "Development of a quantitative security measuring model for
cryptographic algorithms," PI: Jyh-haw Yeh, Co-PI: Timothy Andersen. Submitted on December
2009, $358,737.
Idaho INL, "LDRD: Security Evaluation Tool for Cryptographic Algorithms - Bit-wise
Randomness Testing by Neural Networks," PI: Kurt Derr, Co-PI: Jyh-haw Yeh. Submitted on
May 2008, $651,000.
NSF Cyber Trust, "Cyber Trust: Randomness Study of Cryptographic Algorithms Using Neural
Network Approach," PI: Jyh-haw Yeh, Co-PI: Amit Jain, Timothy Andersen. Submitted to NSF
on March 2008, $499,670.
NASA-ISGC, "Developing a Randomness Testing Tool for Cryptographic Encryption
Algorithms," PI: Jyh-haw Yeh, Submitted to NASA Idaho Space Grant Consortium Faculty
Research Funding on September 2007.
NSF "NeTS-NR: Enhancing BGP by Source Policy Route Discovery," PI: Jyh-haw Yeh,
Submitted on April 2004, $450,000.
NSF-CAREER, "A Supplemental Protocol for BGP - Source Policy Route Discover," PI: Jyhhaw Yeh, Submitted on July 2003, $400,000.
Idaho SBOE, "Design and Development of a Supplemental Protocol for BGP," PI: Jyh-haw Yeh,
Submitted on April 2003.
Idaho SBOE, "An Innovative Agent-based E-business Model with Digital Chamber of
Commerce," PI: Jyh-haw Yeh, Submitted on April, 2003.
NSF-EPSCoR Instrument Acquisition Program, "Building an Experimental Network Cluster to
Develop a Supplemental Protocol for BGP," PI: Jyh-haw Yeh, Submitted on March 2003,
$32,000.
NSF-CAREER, "Internetwork Domain Policy Routing by Prediction," PI: Jyh-haw Yeh,
Submitted on July 2001, $375,000.
A DVISED G RADUATE I NDEPENDENT S TUDY /T HESIS /P ROJECT
A S AN A DVISOR AT B OISE S TATE U NIVERSITY


Ujwal karki, Master Thesis. TBD, In Progress.
Srisarguru Sridhar, Master Thesis. TBD, In Progress.
Page 6 of 13
CV of Jyh-haw Yeh










Archana Nanjundarao, Master Thesis. Integrity Coded Relational Databases (ICRDB) Protecting Data Integrity in Clouds, In Progress.
Fiona Zeng, Master Thesis. An end-to-end identity-based email encryption scheme, October 2014.
Andres Campossainz, Master Project. An application to provide an interface to a mySQL
database located in the cloud featuring data privacy, March 2013.
Jasim Suadad, Independent Study. Building Web Based Applications using PHP, Summer 2013.
Spandana Kudikala, Master Project. An Insider Outsider Attacks Detection System, April 2012.
Spandana Kudikala, Independent Study. Cloud Computing & Cloud Security, Spring 2011.
kamatam Sowjanya, Master Project. A Bit-wise Randomness Study of AES, MD5 and RSA, May
2010.
Rajasree Shyam, Master Project. An Efficient Time-Bound Hierarchical Key Assignment Scheme
with a New Merge Function: a Performance Study, October 2009.
Sean Ma, Master Thesis. Enforcing Non-Hierarchical Access Control Policy without Public Key
Cryptography, November 2005.
Wei Zhang, Master Thesis. Development, Implementation and Simulation of a Source Policy
Route Discovery Protocol, August 2003.
A S AN A DVISORY C OMMITTEE M EMBER AT B OISE S TATE U NIVERSITY


















Jimmy Wang, Master Thesis. TBD, In Progress.
Ning Shen, Master Project. Coverage-based test generation for XACML policies, In Progress.
Juan Carlos Diaz Velez, Master Thesis. A Framework for management of distributed data
processing and event selection for the IceCube Neutrino Observatory, May 2013.
Peter Games, Master Thesis. A Mobile Visualization System, May 2013.
Surya Mahesh Tatapudi, Master Thesis. Dynamic Transmission Scheduling for Contention
Avoidance in Wireless Sensor Networks, March 2013.
Sandyha Vinnakota, Master Project. Object Oriented Implementation of the Parallel Toolkit
Library, December 2012.
Sreekanth Yalamanchili, Master Thesis. Congestion Mitigation by Traffic Dispersion in Wireless
Sensor Networks, Oct 2012.
Marissa Hollingsworth, Master Thesis. Hadoop and Hive as Scalable Alternatives to DBMS
Business Intelligence Solutions for Big Data, August 2012.
Ramya Ammu, Master Thesis. Improving Data Freshness to Enhance the Quality of
Observations in Wireless Sensor Networks, January 2011.
Rahul Kavalapara, Master Thesis. Reliable Coverage for Wireless Sensor Networks, 2010.
Madhura Phansalkar, Master Project. Modification to Clusmon: A Beowulf Cluster Montoring
System May 2009.
Kishore Sajja, Master Project. Performance Study of Lucene in Parallel and Distributed
Environments, Oct 2007.
Brad Seewald, Master Project. COMBALG: A Combinatorial Algorithm Library, May 2007.
Kirsten Allison, Master Project. PTK: A Parallel Toolkit Library, March 2007.
Neeraja Julakanti, Master Project. A Chosen Ciphertext Attack, July 2005.
Hongyi Hu, Master Project. Manual versus Automatic Parallelization Using PVM and HPF,
October 2004.
Michael Shelton, Master Project. Connection Pooling in PostgreSQL, June 2004.
Eric Fialkowski, Master Project. Java Bindings to Parallel Virtual Machine, March 2004.
A S AN A DVISORY C OMMITTEE M EMBER FOR O THER U NIVERSITIES
Page 7 of 13
CV of Jyh-haw Yeh


Advised four Master Theses at National Tsing Hua University, Taiwan
o Zhiqiang Liang, The Design and Implementation of Tracking your Friend’s Locations on
Android Devices, July 2105
o Andrea E. Medina Paredes, Unsupervised Learning: Using Clustering Algorithms to
Detect Peer 2 Peer Botnet Flows, July 2015
o Jaime Alvarez, Botnet Detection Using Unsupervised Machine Learning, July 2015
o Shi-Chi Wang, Automatic UI Interaction Script Generator for Android Applications
Using Activity Call Graph Analysis, July 2015
Advised one Ph.D dissertation at National Tsing Hua University, Taiwan
o Bing Zhe He, A Group Key Agreement Scheme with Time-bound Property for Mobile
Environments, July 2015
S PECIAL C OMMENTS FROM S TUDENTS
In the issue no. 62 (vol. 24) of ``The Arbiter'' on May 3, 2012, The headline story interviewed a computer
science student Samuel Dorsey Campbell who won Boise State's App-athon competition. In the story, he
explained how and why he changed his career path to computer science and how he felt about computer
scince education here at BSU. The following paragraph is quoted from the article.
According to Campbell, he is pleased with the department. He is especially pleased with Professor Jyhhaw Yeh, saying Yeh ``dripped with brilliance.'
Campbell also said computer science is exciting for him because it is a creative activity that allows him to
problem in innovative and unique ways.
P ROFESSIONAL D EVELOPMENT C ONFERENCE AND T RAINING









Industrial Control System and Critical Infrastructure (ICSCI) Security Workshop, INL (Idaho
National Laboratory), Idaho Falls, Idaho, September 22, 2014.
ACM Technical Symposium on Computer Science Education, Atlanta, Georgia, March 5-8, 2014.
ABET Symposium, Irvine, CA, 2011.
Ethics/Legal Issue Case Study, Faculty Advising Institute, March 6, 2009.
Academic Support Services, Faculty Advising Institute, May 23 - 25, 2007.
Designing Courses for Significant Learning, Center of Teaching and Learning workshops, May
11, 2007.
16th Annual National Effective Teaching Institute, American Society for Engineering Education
(ASEE), June 15 - 17, 2006.
Blackboard 6.1 - What's New and Different, Center of Teaching and Learning Workshops,
August 20, 2004.
Teaching and Learning with Technology: Promoting online collaboration - strategies and Risks,
Center Of Teaching and Learning Workshops, April 4, 2003.
S ERVICE A CTIVITIES
U NIVERSITY S ERVICE

Department Level:
o (Chair) CS Education Faculty Search Committee (2015)
o (Chair) CS HCI Faculty Search Committee (2015)
Page 8 of 13
CV of Jyh-haw Yeh
o
o
o
o
o


CS Cybersecurity Faculty Search Committee (2015)
Ph.D in Computing Program Development Committee (2015)
CS-INL Cybersecurity Faculty Search Committee (2014-2015)
Coordinator of Cybersecurity Minor (2014-current)
Coordinator of Graduate Certificate in Computer Science Teacher Education (2015current)
o Tenure Progress and Review Committee (2006-2009; 2011-current)
o Tenure Recommendation Committee (2007)
o Graduate Admission Committee (2002-2007)
o Graduate Comprehensive Exam Committee (2002-2005)
College Level:
o (Chair) COEN Undergraduate Curriculum Committee (as a chair: 2010-current; as a
member: 2007-2009);
o COEN Educator Search Committee (2014)
o CS Representative in Albertson Library (2001-current)
o COEN Tenure and Promotion Committee (2003, 2010, 2011)
o Graduate Committee (2001-2003)
University Level:
o University Curriculum Committee (2007-current)
o Co-Director of IDoTeach Program (2013-current)
o (Chair) IdoTeach 4th Master Teacher Search Committee (2015)
o IdoTeach 3rd Master Teacher Search Committee (2014)
P ROFESSIONAL S ERVICE


Journal Reviews: reviewed more than 40 articles in the following Journals
o Journal of Computing
o International Journal of Communication Systems
o Journal of Supercomputing
o Applied Mathematics and Information Sciences
o Security and Communication Networks
o IEEE Trans. On Wireless Communications
o IEEE Journal on Selected Areas in Communications
o Journal of Systems and Software
o Information Sciences
o Information Processing Letters
o International Journal of Handheld Computing Research
o Computers and Mathematics with Applications
o Information Resource Management Journal
Conference Committees:
o Program Committee of the International Conference of Cloud Computing and Big Data
(CCBD 2015)
o Track Chair (Track 5: Information and Cyber Security) of the 13th International
Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN 2014)
o Workshop Chair of the 13th IEEE International Conference on Computers and
Information Technology (CIT 2013)
o Program Committee of the 6th IEEE International Conference on Ubi-Media Computing
(UMEDIA 2013)
o Program Committee of ACIS International Conference on Software Engineering
Research, Management and Applications (SERA 2010 and SERA 2009)
Page 9 of 13
CV of Jyh-haw Yeh
o


Program Committee of 2009 World Congress on Computer Science and Information
Engineering (CSIE 2009)
o Program Committee of the IRMA international conference (2004 and 2005)
Proposal Reviewer:
o NSF Cyber Trust (CT) Panel (2008)
Journal Editor:
o Guest Editor of the special issue “Security and Privacy in Distributed Sensor Networks”
for the International Journal of Distributed Sensor Networks (2014)
o Editorial Board of the Journal of Computer Science and Systems Biology (2011-current)
o Associate Editor of the International Journal of Handheld Computing Research (2009current)
o Ad Hoc Reviewer of the Editorial Review Board of the Information Resources
Management Journal (2004-2008)
o Editorial Review Board of the International Journal of E-Business Research (2004-2008)
O UTREACH A CTIVITIES

Outreach:
o Hosting Coding is Cool Summer Workshops for Treasure Valley High School
Teachers/students (6/13-6/14/2013; 6/19-6/20/2014; 6/23-6/24/2015; 6/25-6/26/2015)
with Dr. Amit Jain, Dr. Tim Andersen, and Dr. Alark Joshi
o Hosting Google CS4HS Workshop for High School Teachers (6/17-6/19/2015) with Dr.
Amit Jain, Dr. Tim Andersen, Dr. Alark Joshi, and Marissa Schmidt
o Hosting App Inventor Workshop for Meridian High School Technology Student
Association (11/14/2013) with Dr. Amit Jain, Dr. Tim Andersen, and Dr. Louis Nadelson
o Presenting a poster in BSU Expo at HP (2005)

Volunteering:
o Founding Board Member of the non-profit Idaho Chinese Organization (2012-2014)
o President of Idaho Chinese Association (2009)
o Summer Student Advising (2006)
o Winter Student Advising (2005)
o Volunteer as a Guide in the Jason Project (2005)
o BSU Science Competition Proctor (2005)
A PPENDIX
P APER R EVIEWED





"A Shareable Keyword Search over Encrypted Data in Cloud Computing," Journal of
Supercomputing, Springer, May 2015.
"A Lightweight Security and Authentication Protocol for NFC-Based Mobile Payments,"
Information Sciences, Elsevier, June 2014.
"Key Management Scheme for Small Dynamic Node Groups in Wireless Sensor Networks," The
6th IEEE International Conference on Ubi-Media Computing (UMEDIA 2013), November 2013.
"Energy Consumption of Three Scheduling Algorithms for Cloud Computing: A Comparative
Analysis," Journal of Computing, Springer, October 2013.
"A Novel Verifiable Secret Sharing Mechanism Using Theory of Numbers and a Method for
Sharing Secrets," International Journal of Communication Systems, Wiley, June 2013.
Page 10 of 13
CV of Jyh-haw Yeh























"On scheduling data access with cooperative load balancing in vehicular ad hoc networks
(VANETs)," Journal of Supercomputing, Springer, May 2013.
"A Theoretical Model: Using Logistic Regression for Malware Signature-based Detection,"
Journal of Computing - special issue on Autonomic and Trusted Computing, Springer, April
2013.
"Security Analysis of RSA Cryptosystem Algorithm and its Properties," Applied Mathematics
and Information Sciences, Natural Sciences Publishing, September 2012.
"Efficient Identity-based Hierarchical Access Authentication Protocol for Mobile Network,"
Security and Communication Networks, Wiley, August 2011.
"USF: A Unified Security Framework for Multi-domain Wireless Mesh Networks," IEEE
Transactions on Wireless Communications, May 2011.
"Toward a Ubiquitous Wireless Communications: Passport/Visa Authentication Protocols," IEEE
Journal on Selected Areas in Communications -- Special Issue Cooperative Networking
Challenges and Applications, March 2011.
"A Novel Public-Key Assignment Scheme for Enforcing Access Control and Multicast
Communications in a User Hierarchy," revised version, Information Sciences, Elsevier, January
2011.
"WiMAX Networks: Operations and QoS in Developing Countries," International Journal of
Handheld Computing Research (IJHCR), IGI Global, October 2010.
"Efficient Proxy Signcryption Scheme with Provable CCA and CMA Security," Computers &
Mathematics with Applications, Elsevier, June 2010.
"Cryptanalysis of an RSA Key Generation Algorithm with a Large Private Key," revised version,
Information Sciences, Elsevier, March 2010.
"Provably Secure Proxy Signcryption Scheme Based on Pairings," Computers & Mathematics
with Applications, Elsevier, January 2010.
"Hierarchical information-protected system with multiple predecessors," Information Sciences,
Elsevier, March 2009.
"Bi-associative one-way function construction for public key cryptosystem," Journal of Systems
and Software, Elsevier, February 2009.
"A Novel Public-Key Assignment Scheme for Enforcing Access Control and Multicast
Communications in a User Hierarchy," Information Sciences, Elsevier, September 2008.
"Improvement of Santis et al.'s Time-Bound Hierarchical Key Assignment Scheme," Information
Sciences, Elsevier, July 2008.
"Identity-Based Threshold Decryption with Provable Security in Random Oracle and Generic
Model," Information Sciences, Elsevier, April 2008.
"Cryptanalysis of an RSA Key Generation Algorithm with a Large Private Key," Information
Sciences, Elsevier, March 2008.
"A New Efficient Access Control in a Hierarchy for Hardware-Limited Users," Information
Sciences, Elsevier, February 2008.
"Provably Secure Identity-Based Authenticated Key Agreement Protocols without Random
Oracles," Information Sciences, Elsevier, October 2007.
"Suspicious-Taint-Based Access Control for Protecting OS from Network Attacks," Journal of
Systems and Software, Elsevier, September 2007.
"Cytogenesis of Neural Cell: Phenomics of emotion-based control in species," International
Symposium on Biomedical informatics and Cybernetics: BMIC 2007, June 2007.
"Cybernetics of Motivation and Emotion," International Symposium on Biomedical informatics
and Cybernetics: BMIC 2007, June 2007.
"Coastal Data and Information Management for Integrated Coastal Management: the Role of
IODE," Information Resource Management Journal, IGI Global, June 2007.
Page 11 of 13
CV of Jyh-haw Yeh










"An Efficient Key Management Scheme for Access Control in a User Hierarchy," Journal of
Systems and Software, Elsevier, September 2006.
"An Empirical Examination of Customer Perceptions of Mobile Advertising," Information
Resource Management Journal, IGI Global, June 2005.
"Innovative Pricing and Charging in Next-Generation Wireless Networks," Annual Conference of
Information Resource Management Association, 2005.
"Bridging the International Digital Divide: Content Relevancy and Creation," Annual Conference
of Information Resource Management Association, 2005.
"Considerations of Public Key Infrastructure (PKI), functioning as a chain of trust in electronic
payments systems," International Journal of E-Business Research, IGI Global, December 2004.
"Tolerant Key Assignment for Enforcing Complicated Access Control Policy in a Hierarchy,"
Information Sciences, Elsevier, December 2004.
"A Novel Method for Rating and Alive Detecting Web Pages on the Metasearch Engine,"
International Journal of E-Business Research, IGI Global, September 2004.
"How Does IT Support Vertical Integration: The Case of Wal-Mart Stores," Information
Resource Management Journal, IGI Global, August 2004.
"An Efficient Key Assignment for Access Control in Large Partially Ordered Hierarchy," Journal
of Systems and Software, Elsevier, July 2004.
Student Crossroad Magazine, ACM, November, 2002.
P APER P RESENTATIONS










"A probabilistic homomorphic encryption algorithm over integers - protecting data privacy in
clouds," The 12th IEEE International Conference on Advanced and Trusted Computing (ATC
2015) , Beijing, China, August 2015.
"P2P Email Encryption by an Identity-based One-way Group Key Agreement Protocol," The 20th
IEEE International Conference on Parallel and Distributed Systems (ICPADS'14), Hsinchu,
Taiwan, December 2014.
"An Efficient Time-Bound Hierarchical Key Management Based on Tamper-Resistant Devices,"
2013 IEEE International Conference on Computer Science and Automation Engineering (CSAE
2013), Guangzhou, China, November 2013.
"Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings," 2013 2nd
International Conference on Information and Knowledge Management (ICIKM 2013), Chengdu,
China, July 2013.
"Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes," The 10th IEEE
International Conference on Dependable, Automatic and Secure Computing (DASC 2012),
Changzhou, China, December 2012.
"A PASS Scheme in Cloud Computing - Protecting Data Privacy by Authentication and Secret
Sharing," Proceedings of International Conference on Security and Management (SAM'11), July
2011.
"A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit," The
International Conference on Security and Management (SAM'07), June 2007.
"Enforcement of Non-Hierarchical Access Policies," The 10th WSEAS International Conference
of Computers, July 2006.
"An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article
Subscription," The ACM Fourteenth Conference on Information and Knowledge Management
(CIKM'05), October 2005.
"A Policy Translation Algorithm - Enabling any Hierarchical Key Assignment Scheme to
Enforce Non-hierarchical Access Policies," The 15th Annual Conference on Information
Resources Management Association (IRMA'04), May 2004.
Page 12 of 13
CV of Jyh-haw Yeh






"Protecting Internet Public Information Integrity during Transmission," The International
Conference of Internet Computing (IC'03), June 2003.
"A Supplement Protocol for BGP - Source Policy Route Discovery," The 41th Annual ACM
Southeast Conference, Savannah, Georgia, March 2003.
"A New Routing Strategy by Prediction for Internetwork Domain Communication," The 6th
World Multiconference on Systemics, Cybernetics and Informatics (SCI'02), July 2002.
"Access Control for an Organization Connected by Insecure Public Networks," The 6th World
Multiconference on Systemics, Cybernetics and Informatics (SCI'02), July 2002.
"Key Assignment for Enforcing Access Control Policy Exception," The International Symposium
on Internet Technology (ISIT'98), April 1998.
"Interdomain Access Control with Policy Routing," The sixth IEEE Computer Society Workshop
on Future Trends of Distributed Computing Systems (FTDCS'97), October 1997.
Page 13 of 13
CV of Jyh-haw Yeh
Download