Jen‐Ho Yang

556 total citations
34 papers, 413 citations indexed

About

Jen‐Ho Yang is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Jen‐Ho Yang has authored 34 papers receiving a total of 413 indexed citations (citations by other indexed papers that have themselves been cited), including 28 papers in Information Systems, 20 papers in Artificial Intelligence and 17 papers in Computer Networks and Communications. Recurrent topics in Jen‐Ho Yang's work include Cryptography and Data Security (18 papers), Advanced Authentication Protocols Security (11 papers) and Digital Rights Management and Security (7 papers). Jen‐Ho Yang is often cited by papers focused on Cryptography and Data Security (18 papers), Advanced Authentication Protocols Security (11 papers) and Digital Rights Management and Security (7 papers). Jen‐Ho Yang collaborates with scholars based in Taiwan, United States and China. Jen‐Ho Yang's co-authors include Chin‐Chen Chang, Pei-Yu Lin, Ya‐Fen Chang, Yi-Hui Chen, Chien‐Yuan Chen, Iuon‐Chang Lin, Deron R. Herr, Chun‐Ming Huang, Chih‐Hung Wang and Arun Balasubramaniam and has published in prestigious journals such as SHILAP Revista de lepidopterología, Expert Systems with Applications and Human Reproduction.

In The Last Decade

Jen‐Ho Yang

32 papers receiving 380 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jen‐Ho Yang Taiwan 9 299 262 232 86 33 34 413
Horng–Twu Liaw Taiwan 11 243 0.8× 269 1.0× 253 1.1× 76 0.9× 47 1.4× 45 442
Kuo‐Yu Tsai Taiwan 8 212 0.7× 193 0.7× 174 0.8× 39 0.5× 22 0.7× 31 313
Diogo A. B. Fernandes Portugal 4 298 1.0× 182 0.7× 179 0.8× 39 0.5× 67 2.0× 5 421
Qinlong Huang China 14 352 1.2× 166 0.6× 427 1.8× 53 0.6× 18 0.5× 38 577
Barry Leiba United States 7 170 0.6× 127 0.5× 133 0.6× 32 0.4× 31 0.9× 22 263
Hitesh Tewari Ireland 13 188 0.6× 286 1.1× 166 0.7× 47 0.5× 21 0.6× 26 440
Phu Dung Le Australia 9 101 0.3× 149 0.6× 80 0.3× 53 0.6× 29 0.9× 58 251
Rasib Khan United States 10 190 0.6× 188 0.7× 76 0.3× 37 0.4× 25 0.8× 29 295
Marta Beltrán Spain 10 177 0.6× 161 0.6× 84 0.4× 21 0.2× 44 1.3× 45 292
Gang Han China 8 188 0.6× 89 0.3× 174 0.8× 26 0.3× 14 0.4× 29 304

Countries citing papers authored by Jen‐Ho Yang

Since Specialization
Citations

This map shows the geographic impact of Jen‐Ho Yang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jen‐Ho Yang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jen‐Ho Yang more than expected).

Fields of papers citing papers by Jen‐Ho Yang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jen‐Ho Yang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jen‐Ho Yang. The network helps show where Jen‐Ho Yang may publish in the future.

Co-authorship network of co-authors of Jen‐Ho Yang

This figure shows the co-authorship network connecting the top 25 collaborators of Jen‐Ho Yang. A scholar is included among the top collaborators of Jen‐Ho Yang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jen‐Ho Yang. Jen‐Ho Yang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Yang, Jen‐Ho. (2023). A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT. SHILAP Revista de lepidopterología. 2023(1). 3 indexed citations
5.
Yang, Jen‐Ho, et al.. (2018). An ID-Based Group Key Agreement Scheme for Controlling Access and Privacy in Cloud. International Journal of Computer and Communication Engineering. 7(1). 1–7. 1 indexed citations
6.
Yang, Jen‐Ho & Pei-Yu Lin. (2018). A New Third-party Payment Scheme with Anonymity for Mobile Commerce. 網際網路技術學刊. 19(6). 1929–1934. 2 indexed citations
7.
Yang, Jen‐Ho, et al.. (2017). Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery. Informatica. 28(2). 375–386. 1 indexed citations
8.
Yang, Jen‐Ho. (2016). An Electronic Transaction Mechanism Using Mobile Devices for Cloud Computing. Wireless Personal Communications. 94(3). 713–724. 3 indexed citations
9.
Chang, Chin‐Chen, et al.. (2015). An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks. International journal of network security. 17(6). 702–707. 2 indexed citations
10.
Yang, Jen‐Ho & Pei-Yu Lin. (2015). A mobile payment mechanism with anonymity for cloud computing. Journal of Systems and Software. 116. 69–74. 25 indexed citations
11.
Yang, Jen‐Ho, et al.. (2013). ID-Based User Authentication Scheme for Cloud Computing. Journal of Electronic Science and Technology. 11(2). 221–224. 1 indexed citations
12.
Chang, Chin‐Chen & Jen‐Ho Yang. (2013). A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies.. International journal of network security. 15. 471–477. 5 indexed citations
13.
Yang, Jen‐Ho, Ya‐Fen Chang, & Yi-Hui Chen. (2013). An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment. Information Technology And Control. 42(4). 315–324. 22 indexed citations
14.
Chang, Chin‐Chen, et al.. (2012). An Efficient and Flexible Mobile Payment Protocol. 63–66. 2 indexed citations
15.
Lin, Jiaping, et al.. (2011). Mechanical Properties of Copper Micrometer Pillars Fabricated by Intermittent MAGE Process. International Journal of Electrochemical Science. 6(8). 3536–3549. 3 indexed citations
16.
Yang, Jen‐Ho & Chin‐Chen Chang. (2010). A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users. Wireless Personal Communications. 63(1). 83–99. 14 indexed citations
17.
Yang, Jen‐Ho & Chin‐Chen Chang. (2009). An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Journal of Systems and Software. 82(9). 1497–1502. 41 indexed citations
18.
Yang, Jen‐Ho & Chin‐Chen Chang. (2008). An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security. 28(3-4). 138–143. 171 indexed citations
19.
Yang, Jen‐Ho & Chin‐Chen Chang. (2008). Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem. 29. 3–5. 6 indexed citations
20.
Yang, Jen‐Ho, Chin‐Chen Chang, & Chih‐Hung Wang. (2005). An iterative modular multiplication algorithm in RNS. Applied Mathematics and Computation. 171(1). 637–645. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026