Chang, Shih-Hao
-
Vol 24, No 1 (2018) - Articles
A Novel VENOM Attack Identification Mechanism in Cloud Virtualization Environment
Abstract PDF -
Vol 24, No 3 (2018) - Articles
在隨意行動網路通訊架構下利用拜占庭協議演算法來防禦及偵測女巫攻擊
Abstract PDF -
Vol 24, No 3 (2018) - Articles
工業物聯網加密的串流密碼機制
Abstract PDF -
Vol 26, No 1 (2020) - Articles
Using Artificial Intelligence Network to Analyze Man-in-the-Middle Attack Mechanism in Fog Networking Environment
Abstract PDF
Published by Chinese Cryptology and Information Security Association (CCISA), Taiwan, R.O.C
CCCISA Editorial Office
E-mail: ccisa.editor@gmail.com