|
Issue |
Title |
|
Vol 25, No 1 (2019) |
107 年度執行資訊安全領域相關研究摘要 |
Details
|
Chi-Yuan Chen |
|
Vol 26, No 1 (2020) |
108 年度執行資訊安全領域相關研究摘要 |
Details
|
Chi-Yuan Chen |
|
Vol 29, No 1 (2023) |
A Block-chain based Coupon Protocol with Online Evaluations and Bonus Rewards |
Abstract
|
Xiu-Rong Lin, Sue-Chen Hsueh, Jia-He Zeng |
|
Vol 27, No 2 (2021) |
A Lightweight mutual authentication based on Attribute-based Encryption |
Abstract
|
I-Te Chen, Yin-Tung Chen, Jer-Min Tsai |
|
Vol 24, No 1 (2018) |
A Novel VENOM Attack Identification Mechanism in Cloud Virtualization Environment |
Abstract
|
Cheick Abdoul-Kader, Shih-Hao Chang |
|
Vol 28, No 3 (2022) |
A Preliminary Study on Non-Fungible Tokens - Mechanisms and Markets |
Abstract
|
Rui-Zhong Zheng, Ming-Hung Wang |
|
Vol 27, No 4 (2021) |
A Secure Blockchain-SIM Architecture for Mobile |
Abstract
|
Jia-Xsuan Lee, Chi-Yuan Chen |
|
Vol 30, No 2 (2024) |
A study on the use of the new COTS device to implement a small-scale fraud attack by merchants |
Abstract
|
Ching-Huang Lin, Ta-Wei Tseng, De-Cian Li |
|
Vol 30, No 1 (2024) |
Active defense framework for malicious attacks |
Abstract
|
Eric Hsieh, Kuo-Chun Tseng |
|
Vol 28, No 1 (2022) |
AI-based safety tips wearables |
Abstract
|
Chien-Hung Wu, Hsin-Te Wu |
|
Vol 26, No 4 (2020) |
An Effective Hyperparameter Selection for Deep Learning Algorithm in Intrusion Detection System |
Abstract
|
Wei-Yan Chang, Yi-Lin Chen, Huang Chen, Chun-Wei Tsai |
|
Vol 23, No 4 (2017) |
An Energy Conservation Authentication Scheme in Wireless Body Area Network |
Abstract
|
Chin-Chen Chang, Jung-San Lee, Jia-Shang Wu |
|
Vol 29, No 3 (2023) |
An Overview of 5G Technology Evolution with Cases on Drone, Smart Healthcare and Smart City |
Abstract
|
Rai Manu, Chit-Jie Chew, Ying-Chin Chen, Yun-Yi Fan, Jung-San Lee |
|
Vol 28, No 3 (2022) |
An RFID Ownership Transfer Protocol based on multiple owners and different weights |
Abstract
|
Jia-Ning Luo, MingHour Yang, Shu-Yu Hsu |
|
Vol 29, No 1 (2023) |
Analysis and Improvements of Real-Time Phishing Resilience for Two-Factor Authentication Apps Based on One-Time Passwords |
Abstract
|
Xing-Min Wu, Wei-Chi Ku, Chuan-Hsin Yu |
|
Vol 30, No 3 (2024) |
Analysis and Mitigation Strategies for Prompt Injection Attacks |
Abstract
|
Kun-Ji Li, Sheng-Shan Chen, Chin-Yu Sun |
|
Vol 27, No 2 (2021) |
Analysis and Solution of Exploiting Vulnerabilities of Smart Contracts in Decentralized Financial Applications |
Abstract
|
Wan-Shiuan Hsu, Iuon-Chang Lin |
|
Vol 21, No 2 (2015) |
Androbug: Android應用程序之安全漏洞分析系統 |
Abstract
|
林禹成() , 歐捷登() , 孫宏民() |
|
Vol 21, No 2 (2015) |
AppBeach: A Static Behavior Checker for iOS Mobile Applications |
Abstract
|
Fang Yu, Steven Tai, Tang-Wei Shao, Wei-Ren Wang |
|
Vol 28, No 2 (2022) |
Automatic Android Malware Detection Rule Generation based on Quark Engine |
Abstract
|
Yu-Shiang Dang, Kun-Yu Chen, Sheng-Feng Lu |
|
Vol 29, No 2 (2023) |
Blockchain Technology Application for Product Information Validation |
Abstract
|
Jiin-Chiou Cheng, Cheng-Hao Wu |
|
Vol 25, No 4 (2019) |
Building a Platform System for Information Security Log Management and Malware Analysis—an Example at the School Departments |
Abstract
|
Ching-Yu Yang, Jia-Siang Guo, Hsin-Te Wu |
|
Vol 28, No 1 (2022) |
Building a Push Broadcast System Based on Bilinear Pairings |
Abstract
|
Hsin-Te Wu |
|
Vol 23, No 2 (2017) |
BYOD安全威脅之彙整與分類 |
Abstract
|
陳昱仁 , 廖耕億 , 王齎諺 |
|
Vol 25, No 1 (2019) |
Call for Papers |
Details
|
Chi-Yuan Chen |
|
1 - 25 of 304 Items |
1 2 3 4 5 6 7 8 9 10 > >> |