|
Issue |
Title |
|
Vol 29, No 1 (2023) |
Preface |
Abstract
|
Chi-Yuan Chen |
|
Vol 29, No 2 (2023) |
Preface |
Abstract
|
Chi-Yuan Chen |
|
Vol 29, No 3 (2023) |
Preface |
Abstract
|
Chi-Yuan Chen |
|
Vol 29, No 4 (2023) |
Preface |
Abstract
|
Chi-Yuan Chen |
|
Vol 30, No 1 (2024) |
Preface |
Abstract
|
Chi-Yuan Chen |
|
Vol 28, No 2 (2022) |
Quantum Cryptography: A Brief Overview |
Abstract
|
Kuo-Chun Tseng |
|
Vol 26, No 2 (2020) |
Ransomware Classification Using LeNet-5 Convolutional Neural Networks |
Abstract
|
Ping Wang, Wei-Qian Hong, Dong-Lin Tsai, Ming-Sheng Jhou |
|
Vol 28, No 4 (2022) |
Ransomware Detection Technique by using Network Packet Analysis and Machine Learning |
Abstract
|
Wen-Tsung Tsai, Shao-Ru Lin, Te-Min Liu, Chao-Lung Chou |
|
Vol 27, No 3 (2021) |
Research of Information Security Standards for Smart Grid |
Abstract
|
Ming-Xuan Sung, Hsi-Hsun Yeh, Wen-Chung Kuo |
|
Vol 22, No 2 (2016) |
Security of an Anonymous Key Agreement Protocol Based on Chaotic Maps |
Abstract
|
Ya-Fen Chang, Yuo-Ju Yen, Hui-Feng Huang |
|
Vol 26, No 3 (2020) |
Security Policy and Privacy Protection of Electronic Medical Information System |
Abstract
|
Kuan-Hung Hsu, Yao-Ming Huang, Zhen-Yu Wu, Tzer-Shyong Chen |
|
Vol 22, No 3 (2016) |
Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based System |
Abstract
|
Han-Yu Lin, Yao-Min Hung |
|
Vol 29, No 1 (2023) |
Smart contract security protection and detection platform implementation |
Abstract
|
Yu-Qing Jiang, Yuan-Di Chen, Ming-Hsien Lu, Yu-Han Wang, Tzung-Her Chen |
|
Vol 25, No 3 (2019) |
Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management |
Abstract
|
Yunmin He, Yu-Chi Chen, Zhong-Yi Guo, Raylin Tso, Shaozhen Ye |
|
Vol 26, No 2 (2020) |
Smart Pillboxes with Network Security |
Abstract
|
Yong-Sheng Chen, Rong-Cheng Kuang, Chi-Hsien Liao, Hsin-Te Wu |
|
Vol 25, No 1 (2019) |
Survey on A Smart Health Monitoring System Based on Context Awareness Sensing |
Abstract
|
Schalk Wilhelm Pienaar, Reza Malekian |
|
Vol 22, No 4 (2016) |
The Centrifuge of Cloud Service: Separated Cryptographic and Ciphered-storage Services |
Abstract
|
Zheng-Yun Zhuang, Yi-Chang Hsu, Hsing-Hua Liu, Chien-Hsing Wu |
|
Vol 28, No 1 (2022) |
The Module on Secure Communication Scheme in Smart Manufacturing Environment |
Abstract
|
Wen-Yan Dai, Shao-Wei Tung, Jheng-Jia Huang |
|
Vol 27, No 1 (2021) |
The Risks and Challenges for System-Wide Ad-Block Services |
Abstract
|
He-Jin Zhang, Chun-Ying Huang |
|
Vol 28, No 3 (2022) |
The Stream Cipher Based on Sliding Window Cellular Automata in Secure IoT |
Abstract
|
Shyi-Tsong Wu, Guo-Hua Wu |
|
Vol 29, No 4 (2023) |
The Study of Cheating Detection Mechanisms in Cybersecurity Practical Exercises |
Abstract
|
Yu-Chih Wei, Wei-Yao Chen, Chien Hung Chen |
|
Vol 26, No 1 (2020) |
Using Artificial Intelligence Network to Analyze Man-in-the-Middle Attack Mechanism in Fog Networking Environment |
Abstract
|
Shih-Hao Chang, Yi-Ju Shiau |
|
Vol 27, No 2 (2021) |
Using Blockchain Technology to Establish a Deferred Commodity (Service) Platform with a Performance Guarantee Mechanism: Take the Supplementary Education Industry as an Example |
Abstract
|
Da-Wei Shou, Shan-Ting Wu |
|
Vol 26, No 1 (2020) |
Verifiable Data Streaming via Noncryptographic Approach |
Abstract
|
Fan-Hsun Tseng, Fan-Yi Kao |
|
Vol 26, No 4 (2020) |
Wifi Device Identification through Neural Network based on Channel State Information |
Abstract
|
Li-Hsien Lin, Hsin-Hung Cho, Chi-Yuan Chen |
|
151 - 175 of 283 Items |
<< < 2 3 4 5 6 7 8 9 10 11 > >> |