|
Issue |
Title |
|
Vol 26, No 3 (2020) |
Security Policy and Privacy Protection of Electronic Medical Information System |
Abstract
|
Kuan-Hung Hsu, Yao-Ming Huang, Zhen-Yu Wu, Tzer-Shyong Chen |
|
Vol 22, No 3 (2016) |
Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based System |
Abstract
|
Han-Yu Lin, Yao-Min Hung |
|
Vol 29, No 1 (2023) |
Smart contract security protection and detection platform implementation |
Abstract
|
Yu-Qing Jiang, Yuan-Di Chen, Ming-Hsien Lu, Yu-Han Wang, Tzung-Her Chen |
|
Vol 25, No 3 (2019) |
Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management |
Abstract
|
Yunmin He, Yu-Chi Chen, Zhong-Yi Guo, Raylin Tso, Shaozhen Ye |
|
Vol 26, No 2 (2020) |
Smart Pillboxes with Network Security |
Abstract
|
Yong-Sheng Chen, Rong-Cheng Kuang, Chi-Hsien Liao, Hsin-Te Wu |
|
Vol 25, No 1 (2019) |
Survey on A Smart Health Monitoring System Based on Context Awareness Sensing |
Abstract
|
Schalk Wilhelm Pienaar, Reza Malekian |
|
Vol 22, No 4 (2016) |
The Centrifuge of Cloud Service: Separated Cryptographic and Ciphered-storage Services |
Abstract
|
Zheng-Yun Zhuang, Yi-Chang Hsu, Hsing-Hua Liu, Chien-Hsing Wu |
|
Vol 30, No 2 (2024) |
The fastest matrices multiplication using involutory matrix in AES MixColumns-InvMixcolumns transformation |
Abstract
|
San Yuan Wang, Fu Jung Kan, Yan Haw Chen, Shui Hsiang Su, Ling Ling Dai, Kes Shan Lin |
|
Vol 30, No 4 (2024) |
The Integration of FIDO in Online Credit Card Transaction Authentication Mechanism |
Abstract
PDF
|
Shu-Zhen Yang, Chia-Ning Luo, Ming-Hao Yang |
|
Vol 28, No 1 (2022) |
The Module on Secure Communication Scheme in Smart Manufacturing Environment |
Abstract
|
Wen-Yan Dai, Shao-Wei Tung, Jheng-Jia Huang |
|
Vol 27, No 1 (2021) |
The Risks and Challenges for System-Wide Ad-Block Services |
Abstract
|
He-Jin Zhang, Chun-Ying Huang |
|
Vol 28, No 3 (2022) |
The Stream Cipher Based on Sliding Window Cellular Automata in Secure IoT |
Abstract
|
Shyi-Tsong Wu, Guo-Hua Wu |
|
Vol 29, No 4 (2023) |
The Study of Cheating Detection Mechanisms in Cybersecurity Practical Exercises |
Abstract
|
Yu-Chih Wei, Wei-Yao Chen, Chien Hung Chen |
|
Vol 26, No 1 (2020) |
Using Artificial Intelligence Network to Analyze Man-in-the-Middle Attack Mechanism in Fog Networking Environment |
Abstract
|
Shih-Hao Chang, Yi-Ju Shiau |
|
Vol 27, No 2 (2021) |
Using Blockchain Technology to Establish a Deferred Commodity (Service) Platform with a Performance Guarantee Mechanism: Take the Supplementary Education Industry as an Example |
Abstract
|
Da-Wei Shou, Shan-Ting Wu |
|
Vol 26, No 1 (2020) |
Verifiable Data Streaming via Noncryptographic Approach |
Abstract
|
Fan-Hsun Tseng, Fan-Yi Kao |
|
Vol 26, No 4 (2020) |
Wifi Device Identification through Neural Network based on Channel State Information |
Abstract
|
Li-Hsien Lin, Hsin-Hung Cho, Chi-Yuan Chen |
|
Vol 26, No 1 (2020) |
Zero-day Intrusion Detection System based on Dual Neural Network and Aggregation Mechanism |
Abstract
|
Chih-Lung Chen, Kuo-Jui Wei, Ying-Chin Chen, Jung-San Lee |
|
Vol 23, No 4 (2017) |
個人資料管理系統驗證要求事項標準化進程初探:根基於ISO/IEC JTC 1/SC 27在2017-01公布的框架 |
Abstract
|
Yun-Chen Tsai, Kwo-Jean Farn |
|
Vol 22, No 1 (2016) |
個人資料管理系統標準化初論:根基於個人資料去識別化之議題 |
Abstract
|
樊國楨 , 蔡昀臻 |
|
Vol 20, No 1 (2014) |
全同態加密發展與現狀的綜述 |
Abstract
|
胡予濮 , 陳虎 , 連至助 |
|
Vol 20, No 4 (2014) |
兩類型入侵偵測攻擊圖與警報關連配對之研究 |
Abstract
|
王智弘 , 宋孝謙 , 邱業宸 , 楊吉閔 , 陳彥學 |
|
Vol 22, No 4 (2016) |
共享經濟的RFID群組驗證架構及機制 |
Abstract
|
奚正德 |
|
Vol 20, No 3 (2014) |
具自身可逆性的重曝隱藏機制 |
Abstract
|
蘇昱嘉 , 李榮三 |
|
Vol 24, No 1 (2018) |
具安全隱私的雲端資料去重複技術 |
Abstract
|
Ku-Sung Hsieh, Chia-Mu Yu |
|
176 - 200 of 304 Items |
<< < 3 4 5 6 7 8 9 10 11 12 > >> |