Contact Information
-
Jyh-haw Yeh, Ph.D.
Professor
About Jyh-haw Yeh
Bio
Program Coordinator of MS Cybersecurity
Ph.D. from Computer and Information Science and Engineering at University of Florida.
Publications
My graduate student * My undergraduate student ^ High school student #
- Jyh-haw Yeh, Md Mashrur Arifin*, Ning Shen*, Ujwal Karki*, Yi Xie* and Archana Nanjundarao*. “Integrity Coded Databases – Protecting Data Integrity for Outsourced Databases,” Computers and Security (Elsevier), Available Online October 2023, https://doi.org/10.1016/j.cose.2023.103569
- Jyh-haw Yeh, Srisarguru Sridhar* and K. Dakota White^. “Developing Accessible Email Encryption Using a Certificateless One-Way Key Agreement Scheme,” 2023 4th Information Communication Technologies Conference, May 2023.
- Gang Ke, Ruey-Shun Chen, Shanshan Ji and Jyh-haw Yeh. “Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width,” International Journal of Information and Computer Security, Vol. 18, No. 1-2, pp. 1-11, May 2022. https://doi.org/10.1504/IJICS.2022.122910
- Ning Shen*, Jyh-haw Yeh, Hung-Min Sun, and Chien-Ming Chen. “A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases,” 26th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2021), December 2021
- Gang Ke, Ruey-Shun Chen, and Jyh-haw Yeh. “Network security situation prediction method based on support vector machine optimized by artificial bee colony algorithms,” Journal of Computers, Vol. 32, No. 1, pp. 144-153, 2021. DOI:10.3966/199115992021023201012.
- Thanh Hung Duong, Yunpeng Zhang, Jyh-haw Yeh, and Fengxiang Qiao. “A Multilayer Perceptrons Approach Focusing on the Class Imbalance for Injury Severity Analysis of Vehicle Crashes,” Submitted to IEEE Intelligent Transportation Systems Transactions, March 2021.
- Thanh Hung Duong, Fengxiang Qiao, Jyh-haw Yeh, and Yunpeng Zhang. “Prediction of Fatality Crashes with Multilayer Perceptrons on Crash Records Information System Dataset,” 20th IEEE International Conference on Cognitive Informatics & Cognitive Computing (IEEE ICCI*CC’20), September 2020.
- Xu-Shi Mei, Huan-Tong Chen, Hang-Yu Fan, Zhe-Ming Lu and Jyh-haw Yeh, “A Robust Digital Image Watermarking Scheme for Content Protection,” Journal of Network Intelligence, Vol. 5, No. 2, pp. 54-61, May 2020.
- Eric Ke Wang, Fan Wang, Saru Kumari, Jyh-Haw Yeh and Chien-Ming Chen, “Intelligent Monitor for Typhoon in IoT System of Smart City,” Journal of Supercomputing, Springer, 2020. DOI https://doi.org/10.1007/s11227-020-03381-0
- Zhuoyu Tie, Eric Ke Wang, Jyh-Haw Yeh, and Chien-Ming Chen. “Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme,” International Conference on Genetic and Evolutionary Computing (ICGEC 2019). In: Pan JS., Lin JW., Liang Y., Chu SC. (eds) Advances in Intelligent Systems and Computing, vol 1107, pp. 474-480, 2020. Springer, Singapore.
- Yuntao Duan, Jiangdai Li, Gautam Srivastava, and Jyh-haw Yeh, “Data Storage Security for Internet of Things,” Journal of Supercomputing, Springer, Vol. 76, No. 11, pp. 8529-8547, 2020. https://doi.org/10.1007/s11227-020-03148-7.
- Ning Shen*, Jyh-haw Yeh (corresponding author), Chien-Ming Chen, Ruey-Shun Chen and Yunpeng Zhang, “Ensuring Query Completeness in Outsourced Database using Order-Preserving Encryption,” The 17th IEEE Symposium on Parallel and Distributed Processing with Applications (ISPA 2019), December 2019.
- Ning Shen*, Holly Roisum^, Lois Urizar^, Jyh-Haw Yeh (corresponding author), Kedric Salisbury# and Megan Magette#, “Completeness Integrity Protection for Outsourced Databases Using Semantic Fake Data,” IEEE 2019 4th International Conference on Communication and Information Systems (ICCIS 2019), December 2019.
- Alark Joshi, Amit Jain, Jyh-haw Yeh, Ernie Covelli, Tim Andersen, “A Sustainable Model for High-School Teacher Preparation in Computer Science,” 2019 IEEE Frontiers in Education Conference (FIE2019), October 2019.
- Zhuoyu Tie, Eric Ke Wang, Jyh-haw Yeh, Tsu-Yang Wu and Chien-Ming Chen, “On the Security of a Dynamic Multi-Keyword Ranked Search Scheme,” 2019 International Conference on Intelligent Computing and Its Emerging Applications (ICEA2019), August 2019.
- Xiao-Cong Liang, Tsu-Yang Wu, Yu-Qi Lee, Chien-Ming Chen and Jyh-haw Yeh, “Cryptanalysis of a Pairing-Based Anonymous Key Agreement Scheme for Smart Grid,” In: Pan JS., Li J., Tsai PW., Jain L. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies (2020), Springer, vol 156, pp. 125-131. (The Best Paper Award in the 15th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Singapore, July 2019)
- Shanshan Ji, Ruey-Shun Chen, Gang Ke and Jyh-haw Yeh, “Network security situation prediction method based on ABC optimization SVM algorithm,” A workshop paper on Technologies for Next-Generation Network Environments Workshop, 2019 International Conference on Innovative Computing and Management Science, July 2019.
- Ruey-Shun Chen, Yeh-Cheng Chen, Jyh-haw Yeh, Yu-Xi Hu, Naixue Xiong, C-P Lee, “Using Intelligent Algorithms to Construct a Wafer Foundry System in Manufacturing Industry,” Proceedings of the 2019 3rd International Conference on Information System and Data Mining (ICISDM 2019), April 2019.
- Yang, D., Xu, D., Yeh, J., & Fan, Y, “Undergraduate Research Experience in Cybersecurity for Underrepresented Students and Students with Limited Research Opportunities,” Journal of STEM Education, Vol. 19, No. 5, pp. 42-53, January-March 2019.
- Jyh-haw Yeh, Srisarguru Sridhar*, Gaby Dagher, Hung-Min Sun, Ning Shen*, Kathleen White^, “A certificateless one-way group key agreement protocol for end-to-end email encryption,” The 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018), December 2018.
- Yeh-Cheng Chen, Hung-Min Sun, Ruey-Shun Chen, Jyh-haw Yeh, Xiaopeng Fan, I-Hsin Chou, “Intelligent Radioactive Waste Process Cloud-Base System for Nuclear Power Plant Decommissioning,” Journal of Ambient Intelligence & Humanized Computing (AIHC), Springer-Verlag, June 2018. DOI: https://doi.org/10.1007/s12652-018-0913-1
- Hung-Min Sun, Shouan-Tung Chen, Jyh-Haw Yeh, and Chia-Yun Cheng, “A Shoulder Surfing Resistant Graphical Authentication System,” IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 2, pp. 180-193, 2018.
- Carlos Luevanos^, John Elizarraras#, Khai Hirschi#, and Jyh-haw Yeh (corresponding author), “Analysis on the Security and Use of Password Managers,” 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’17), Taipei, Taiwan, December 2017.
- Yeh-Cheng Chen, C.N. Chu, H.M Sun, Jyh-haw Yeh, Ruey-Shun Chen, “Development of an Intelligent Equipment Lock Management System with RFID Technology,” 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’17), Taipei, Taiwan, December 2017.
- Jake Douglas^, Monica Robison^, Jyh-haw Yeh (corresponding author), “Query over encrypted database in clouds – the encryption strategy,” 21st International Computer Science & Engineering Conference (ICSEC 2017), Bangkok, Thailand, November 2017.
- Jyh-haw Yeh, “A secure homomorphic encryption algorithm over integers for data privacy protection in clouds,” International Conference on Smart Computing and Communication (SmartCom 2016), Springer LNCS 10135, pp. 111-121, Shenzhen, China, December 2016.
- Jyh-haw Yeh, “A probabilistic homomorphic encryption algorithm over integers – protecting data privacy in clouds,” The 12th IEEE International Conference on Advanced and Trusted Computing (ATC 2015), short paper, Beijing, China, August 2015.
- Jyh-haw Yeh, Fiona Zeng and Thoms Long, “P2P email encryption by an identity-based one-way group key agreement protocol,” The 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2014), Hsinchu, Taiwan, December 2014.
- Jyh-haw Yeh, “The Insecurity of Two Proxy Signcryption Schemes – Proxy Credential Forgery Attack and How to Prevent it,” Journal of Supercomputing, Springer, Vol. 70, No. 3, pp. 1110-1119, 2014.
- Jyh-haw Yeh, “An Efficient Time-Bound Hierarchical Key Management Based on Tamper-Resistant Devices,” 2013 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2013), Guangzhou, China, November, 2013.
- Jyh-haw Yeh, “Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings,” 2013 2nd International Conference on Information and Knowledge Management (ICIKM 2013), Chengdu, China, July, 2013.
- Jyh-haw Yeh, “Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes,” The 10th IEEE International Conference on Dependable, Automatic and Secure Computing (DASC 2012), Changzhou, China, December, 2012.
- Jyh-haw Yeh, “A PASS Scheme in Cloud Computing – Protecting Data Privacy by Authentication and Secret Sharing,” Proceedings of International Conference on Security and Management (SAM’11), Las Vegas, July, 2011.
- Jyh-haw Yeh, “Enforcing non-hierarchical access policies by hierarchical key assignment schemes,” Information Processing Letters, Vol. 110, No. 2, pp. 46-49, 2009.
- Jyh-haw Yeh, “A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem,” Information Processing Letters, Vol. 105, No. 4, pp 117-120, 2008.
- Wen-Chen Hu, Chyang-Huei Thomas Yang, Jyh-haw Yeh and Weihong Hu, “Mobile and Electronic Commerce Systems and Technologies,” Journal of Electronic Commerce in Organizations, Vol. 6, No. 3, pp. 54-73, 2008.
- Jyh-haw Yeh, “A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit,” Proceedings of the International Conference on Security and Management (SAM’07), Las Vegas, June, 2007.
- Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, and Hung-Jen Yang, “Handheld Computing and Programming for Mobile Commerce,” International Journal of Web Information Systems (IJWIS), Vol. 2, No. 3&4 – double issue, 2007.
- Wen-Chen Hu, Jyh-haw Yeh, Yapin Zhong, and Sheng-Chien Lee, “Using Mobile-Computing Technologies to Access Internet-Enabled Genome Databases,” Proceedings of the 40th Annual Midwest Instruction and Computing Symposium (MICS 2007), Grand Forks, North Dakota, April 20-21, 2007.
- Jyh-haw Yeh, “Enforcement of Non-Hierarchical Access Policies,” Proceedings of the 10th WSEAS International Conference of Computers, Athens, Greece, July, 2006.
- Lei Chen, Chung-wei Lee and Jyh-haw Yeh, “Density-based Multipath Secure Communication over Mobile Ad Hoc Networks,” Proceedings of the 44th Annual ACM Southeast Conference, Melbourne, Florida, March, 2006.
- Wen-Chen Hu, Jyh-haw Yeh, I-Lung Kao, and Yapin Zhong, “Handheld computing and J2ME programming for mobile handheld devices,” Encyclopedia of Mobile Computing and Commerce, Information Science Publishing , 2006.
- Wen-Chen Hu, Jyh-haw Yeh, Hung-Ju Chu, and Sheng-Chien Lee, “Adaptive Web browsing using Web mining technologies for Internet-enabled mobile handheld devices,” Proceedings of the 16th Information Resources Management Association (IRMA 2006) International Conference, Washington, D.C., May 21-24, 2006.
- Wen-Chen Hu, Jyh-haw Yeh, Yapin Zhong, and Chung-wei Lee, “Client-side handheld computing and Java 2 Platform, Micro Edition (J2ME)”, Proceedings of the 39th Annual Midwest Instruction and Computing Symposium (MICS 2006), Mount Preasant, Iowa, April 7-8, 2006.
- Wen-Chen Hu, I-Lung Kao, Hung-Jen Yang, and Jyh-haw Yeh, “Handheld computing and Palm OS for mobile handheld devices,” Proceedings of the 39th Annual Midwest Instruction and Computing Symposium (MICS 2006), Mount Preasant, Iowa, April 7-8, 2006.
- Jyh-haw Yeh, “An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription,” ACM Fourteenth Conference on Information and Knowledge Management (CIKM), Bremen, Germany, November, 2005.
- Jyh-haw Yeh, Marion Scheepers and Wen-chen Hu, “Modifying YCN Key Assignment Scheme to Resist the Attack from Hwang,” Information Processing Letters, Vol. 95, No. 4, pp. 435-440, 2005.
- Jyh-haw Yeh, Wei Zhang, Wen-chen Hu and Chung-wei Lee, “Design and Simulation of a Supplemental Protocol for BGP,” Computer Networks, Vol. 49, No. 2, pp. 172-200, 2005.
- Wen-chen Hu, Jyh-haw Yeh, Hung-Ju Chu and Chung-wei Lee, “Internet-enabled mobile handheld devices for mobile commerce,” Contemporary Management Research, Vol. 1, No. 1, pp. 13-34, 2005.
- Wen-Chen Hu, Hung-Jen Yang and Jyh-haw Yeh, “Mobile Internet and handheld devices for virtual communities,” Subhasish Dasgupta, editor, Encyclopedia of Virtual Communities and Technologies, pp. 314-320, Idea Group Publishing, 2005.
- Wen-Chen Hu, Jyh-haw Yeh, Hung-Jen Yang and Chung-wei Lee, “Mobile handheld devices for mobile commerce,” Mehdi Khosrow-Pour, editor, Encyclopedia of E-Commerce, E-Government and Mobile Commerce, pp. 792-798, Idea Group Publishing, 2005.
- Jyh-haw Yeh, Wen-chen Hu, Chung-wei Lee, “Security Issues and their Possible Countermeasures for a Mobile Agent Based Mobile Commerce”, Advances in Security and Payment Methods for Mobile Commerce, Idea Group Publishing, 2005.
- Chung-wei Lee, Wen-chen Hu and Jyh-haw Yeh, “Mobile Commerce Technology,” Encyclopedia of Information Science and Technology, Vol. I-V, 2005.
- Wen-chen Hu, Hung-jen Yang, Jyh-haw Yeh and Chung-wei Lee, “World Wide Web Search Technologies,” Encyclopedia of Information Science and Technology, Vol. I-V, 2005.
- Wen-chen Hu, Jyh-haw Yeh and Chung-wei Lee, “Handheld Devices and Computing and Payment Methods for Mobile Commerce,” Proceedings of the 38th Annual Midwest Instruction and Computing Symposium, Eau Claire, Wisconsin, April, 2005.
- Wen-chen Hu, Chung-wei Lee and Jyh-haw Yeh, “Mobile Commerce Systems,” A Book Chapter in Mobile Commerce Applications, Idea Group Publishing, 2004.
- Jyh-haw Yeh and Chung-wei Lee, “An Algorithm to Extend Hierarchical Key Assignment Schemes to Enforce a Richer Set of Access Policies,” Journal of Education and Information Technology, Vol. 1, No. 1, 2004.
- Jyh-haw Yeh, “A Policy Translation Algorithm – Enabling any Hierarchical Key Assignment Scheme to Enforce Non-hierarchical Access Policies”, Proceedings of the 15th Annual IRMA (Information Resources Management Association) International Conference, 2004.
- Jyh-haw Yeh, Chung-wei Lee, and Wen-chen Hu, “Protecting Internet Public Information Integrity during Transmission,” Proceedings of the International Conference of Internet Computing (IC’03), Las Vegas, Nevada, June, 2003, Volume 1. CSREA Press 2003, ISBN 1-932415-00-9.
- Jyh-haw Yeh, Randy Chow and Richard Newman, “Key Assignment for Enforcing Access Control Policy Exceptions in Distributed Systems,” Information Sciences, Vol. 152, pp. 63-88, 2003.
- Wen-chen Hu, Xuli Zong, Chung-wei Lee and Jyh-haw Yeh, “World Wide Web Usage Mining Systems and Technologies,” Journal on Systemics, Cybernetics and Informatics, Vol. 1, No. 4, 2003.
- Jyh-haw Yeh, Wei Zhang (a student of mine), Chung-wei Lee and Wen-chen Hu, “A Supplement Protocol for BGP – Source Policy Route Discovery,” Proceedings of the 41th Annual ACM Southeast Conference, Savannah, Georgia, March, 2003.
- Hong Xie, Chung-wei Lee and Jyh-haw Yeh, “SIP-Based VoIP Call Setup Delay Measurement And Performance Optimization Over Wireless Links,” Proceedings of the 41th Annual ACM Southeast Conference, Savannah, Georgia, March, 2003.
- Chung-wei Lee, Wen-Chen Hu, and Jyh-haw Yeh, “A system model for mobile commerce,” Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW’03): Multimedia Network Systems and Applications, Providence, Rhode Island, May, 2003. IEEE Computer Society 2003, ISBN 0-7695-1921-0.
- Wen-chen Hu and Jyh-haw Yeh, “World Wide Web Search Engines,” A Book Chapter in Architectural Issues of Web-Enabled Electronic Business, Idea Group Publishing, 2003.
- Jyh-haw Yeh and Wen-chen Hu, “Access Control for an Organization Connected by Insecure Public Networks,” Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics, July, 2002.
- Jyh-haw Yeh, Wen-chen Hu and Chung-wei Lee, “A New Routing Strategy by Prediction for Internetwork Domain Communication,” Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics, July, 2002.
- Wen-chen Hu and Jyh-haw Yeh, “An XML World Wide Web Search Engine Using Finite Automata,” Proceedings of the 6th World Multi-Conference on Systemics, Cybernetics and Informatics, July, 2002. (BEST PAPER AWARD).
- Chung-wei Lee and Jyh-haw Yeh, “A Real-Time Multimedia Medical Information System in Mobile Environments,” Proceedings of the 6th World Multi-Conference on Systemics, Cybernetics and Informatics, July, 2002.
- Jyh-haw Yeh, Randy Chow, and Richard Newman, “A Dynamic Interdomain Communication Path Setup in Active Network,” The First International Working Conference on Active Network 1999 (IWAN’99), Berlin, Germany, June, 1999. Lecture Notes in Computer Science 1653 Springer 1999, ISBN 3-540-66238-3.
- Jyh-haw Yeh, Randy Chow, and Richard Newman, “Key Assignment for Enforcing Access Control Policy Exceptions,” International Symposium on Internet Technology 1998 (ISIT’98), Taipei, Taiwan, Apr 1998.
- Jyh-haw Yeh, Randy Chow, and Richard Newman-Wolfe, “Interdomain Access Control with Policy Routing,” Proceedings for the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems (FTDCS’97), Tunis, Tunisia, 1997. IEEE Computer Society 1997, ISBN 0-8186-8153-5.
Research
- My research area is computer security in general, specializing in applied cryptography, network access control, and security. I am currently working on data security-preserving computing.
Funded projects
- NSA “GenCyber 2024 Summer Camp at Boise State University for Secondary Teachers,” PIs: Jyh-haw Yeh (Program Director), Doug Twitchell (Instructional Lead), Shane Panter (Instructor), and Edward Vasko (Guest Speaker), 7/24/23-7/24/25, $149,998.
- DoD CySP: 2023 DoD Cyber Scholarship (for Service) Program. PI: Jyh-haw Yeh, Co-PI: Edward Vasko, Sin Ming Loo, and Liljana Babinkostova. 9/05/2023 – 12/05/2024, $104,332.
- NSF “REU-Site: Cloud Computing Security and Privacy (CNS 2244596),” PI: Jyh-haw Yeh, Co-PI: Jerry Fails, Senior Personnel: Hao Chen and Yantian Hou. 3/01/2023-2/28/2026, $394,645.
- Idaho HERC “The Cyberdome – An Investment in Idaho’s Cybersecurity Future,” PI: Edward Vasko, Co-PIs: Amit Jain, Sin Ming Loo, Edoardo Serra, Francesca Spezzano and Jyh-haw Yeh. 7/01/2021-6/30/2024, $2.1M.
- NSA “GenCyber 2023 Summer Camp at Boise State University for Secondary Teachers,” PIs: Jyh-haw Yeh (Program Director), Doug Twitchell (Instructional Lead) and Edward Vasko (Instructor), 6/29/22-6/28/24, $149,923.
- NSA “GenCyber 2022 Summer Camp at Boise State University for Secondary Teachers,” PIs: Jyh-haw Yeh (Program Director) and Doug Twitchell (Instructional Lead), 8/16/21-12/31/24, $137K.
- Idaho Cybersecurity Education Initiatives (ICEI), “Design and develop a graduate-level interdisciplinary cybersecurity introduction course,” PI: Jyh-haw Yeh, 5/20/21-12/31/21, $7.5K.
- NSA “GenCyber 2020-2021 Summer Camp at Boise State University for Secondary Teachers,” PIs: Jyh-haw Yeh (Program Director), Hoda Mehrpouyan (Instructional Lead), and Marissa Schmidt, 4/01/2020 – 3/31/2022, $100K.
- NSA “GenCyber 2019 Summer Camp at Boise State University for Secondary Teachers,” PIs: Jyh-haw Yeh (Program Director), Yantian Hou (Instructional Lead), and Hoda Mehrpouyan, 3/01/2019 – 2/28/2020, $100K.
- NASA-ISGC Summer STEM Experience for High School Students Grant, “Summer Research Experience for High School Students in Cybersecurity,” PI: Jyh-haw Yeh, Co-PI: Dianxiang Xu, 5/01/2017-3/31/2018, $50K ($25K from NASA, $25K BSU Cost Share).
- NSA “GenCyber 2017 Summer Camp at Boise State University for Secondary Teachers in Boise Metropolitan area,” PIs: Hoda Mehrpouyan (Program Director), Jyh-haw Yeh (Instructional Lead), Yantian Hou and Marissa Schmidt, 3/01/2017 – 2/28/2018, $99K.
- Idaho SBOE HERC Incubation Fund, “Cyber Forensic Investigation Toolkit (CFIT): Next-generation Evidence-gathering for Law Enforcement,” PI: Gaby Dagher, Co-PI: Jyh-haw Yeh. 7/01/2016 – 6/30/2017, $58K.
- Google CS4HS for the US and Canada, “High School Teacher Professional Development on CS,” PI: Amit Jain, Co-PI: Jyh-haw Yeh, Alark Joshi, Timothy Andersen, Marissa Schmidt. 6/14/2016 – 6/17/2016, $35K.
- BAA HSHQDC-14-R-B0014, Cyber Security Division, Department of Homeland Security, “P2P Email Encryption Using Identity-based One-way Group Key Agreement,” PI: Jyh-haw Yeh, Co-PI: Dianxiang Xu. 8/20/2015 – 8/19/2017, $747K. (Recommended for Funding, but not funded due to DHS internal financial considerations )
- Google CS4HS Grant, “Mobile Computer Science Principles,” PI: Amit Jain, Co-PI: Jyh-haw Yeh, Alark Joshi, Timothy Andersen, Marissa Schmidt. 6/17/2015 – 6/19/2015, $24K.
- NSF “REU Site: Software Security,” PI: Dianxiang Xu, Co-PI: Jyh-haw Yeh, Izzat Alsmadi. 3/01/2015 – 2/28/2018, $344K.
- NSF CE21, “CS10K: IDoCode: A Sustainable Model for Computer Science in Idaho High Schools,” PI: Amit Jain, Co-PI: Jyh-haw Yeh, Alark Joshi, Tim Andersen, Jonathan Brendefur. 3/01/2014 – 2/18/2017, $1,046K.
- Amazon Web Services in Education – Research Grant, “Data Privacy Protection for Relational Database Service (RDS) – Proof of Concepts for a Semantic Hiding Database (SHDB) Approach,” PI: Jyh-haw Yeh, 10/01/2013 – 10/31/2015, $5K.
- Amazon Web Services in Education – Course Grant, “Data Structures Course Project using AWS”, PI: Jyh-haw Yeh, 9/01/2013 – 9/30/2014, $4K.
- NASA Idaho EPSCoR Research Collaboration Grant, “Quantitative Measurement of security Primitives in Wireless Sensor Networks,” PI: Jyh-haw Yeh, 8/01/2009 – 7/31/2010, $4K.
Areas of Interest
- Applied Crypto
- Network and Cloud Security and Privacy
- Cybersecurity Education and Workforce Development