| Issue | Title | |
| Vol 29, No 3 (2023) | Preface | Abstract |
| Chi-Yuan Chen | ||
| Vol 29, No 4 (2023) | Preface | Abstract |
| Chi-Yuan Chen | ||
| Vol 30, No 1 (2024) | Preface | Abstract |
| Chi-Yuan Chen | ||
| Vol 30, No 2 (2024) | Preface | Abstract |
| Chi-Yuan Chen | ||
| Vol 30, No 3 (2024) | Preface | Abstract |
| Chi-Yuan Chen | ||
| Vol 28, No 2 (2022) | Quantum Cryptography: A Brief Overview | Abstract |
| Kuo-Chun Tseng | ||
| Vol 26, No 2 (2020) | Ransomware Classification Using LeNet-5 Convolutional Neural Networks | Abstract |
| Ping Wang, Wei-Qian Hong, Dong-Lin Tsai, Ming-Sheng Jhou | ||
| Vol 28, No 4 (2022) | Ransomware Detection Technique by using Network Packet Analysis and Machine Learning | Abstract |
| Wen-Tsung Tsai, Shao-Ru Lin, Te-Min Liu, Chao-Lung Chou | ||
| Vol 27, No 3 (2021) | Research of Information Security Standards for Smart Grid | Abstract |
| Ming-Xuan Sung, Hsi-Hsun Yeh, Wen-Chung Kuo | ||
| Vol 31, No 3 (2025) | Retrieval-Augmented Generation for Identifying ATT&CK Technique | Abstract PDF |
| Sheng-Shan Chen, Kai-Siang Cao, Chung-Kuan Chen, Chin-Yu Sun | ||
| Vol 31, No 2 (2025) | Reversible data hiding in encrypted image using pixel prediction and room reservation | Abstract PDF |
| Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Yin-Ting Wu, Shiuh-Jeng WANG | ||
| Vol 22, No 2 (2016) | Security of an Anonymous Key Agreement Protocol Based on Chaotic Maps | Abstract |
| Ya-Fen Chang, Yuo-Ju Yen, Hui-Feng Huang | ||
| Vol 26, No 3 (2020) | Security Policy and Privacy Protection of Electronic Medical Information System | Abstract |
| Kuan-Hung Hsu, Yao-Ming Huang, Zhen-Yu Wu, Tzer-Shyong Chen | ||
| Vol 22, No 3 (2016) | Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based System | Abstract |
| Han-Yu Lin, Yao-Min Hung | ||
| Vol 29, No 1 (2023) | Smart contract security protection and detection platform implementation | Abstract |
| Yu-Qing Jiang, Yuan-Di Chen, Ming-Hsien Lu, Yu-Han Wang, Tzung-Her Chen | ||
| Vol 25, No 3 (2019) | Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management | Abstract |
| Yunmin He, Yu-Chi Chen, Zhong-Yi Guo, Raylin Tso, Shaozhen Ye | ||
| Vol 26, No 2 (2020) | Smart Pillboxes with Network Security | Abstract |
| Yong-Sheng Chen, Rong-Cheng Kuang, Chi-Hsien Liao, Hsin-Te Wu | ||
| Vol 25, No 1 (2019) | Survey on A Smart Health Monitoring System Based on Context Awareness Sensing | Abstract |
| Schalk Wilhelm Pienaar, Reza Malekian | ||
| Vol 22, No 4 (2016) | The Centrifuge of Cloud Service: Separated Cryptographic and Ciphered-storage Services | Abstract |
| Zheng-Yun Zhuang, Yi-Chang Hsu, Hsing-Hua Liu, Chien-Hsing Wu | ||
| Vol 30, No 2 (2024) | The fastest matrices multiplication using involutory matrix in AES MixColumns-InvMixcolumns transformation | Abstract |
| San Yuan Wang, Fu Jung Kan, Yan Haw Chen, Shui Hsiang Su, Ling Ling Dai, Kes Shan Lin | ||
| Vol 30, No 4 (2024) | The Integration of FIDO in Online Credit Card Transaction Authentication Mechanism | Abstract PDF |
| Shu-Zhen Yang, Chia-Ning Luo, Ming-Hao Yang | ||
| Vol 28, No 1 (2022) | The Module on Secure Communication Scheme in Smart Manufacturing Environment | Abstract |
| Wen-Yan Dai, Shao-Wei Tung, Jheng-Jia Huang | ||
| Vol 27, No 1 (2021) | The Risks and Challenges for System-Wide Ad-Block Services | Abstract |
| He-Jin Zhang, Chun-Ying Huang | ||
| Vol 28, No 3 (2022) | The Stream Cipher Based on Sliding Window Cellular Automata in Secure IoT | Abstract |
| Shyi-Tsong Wu, Guo-Hua Wu | ||
| Vol 29, No 4 (2023) | The Study of Cheating Detection Mechanisms in Cybersecurity Practical Exercises | Abstract |
| Yu-Chih Wei, Wei-Yao Chen, Chien Hung Chen | ||
| 176 - 200 of 316 Items | << < 3 4 5 6 7 8 9 10 11 12 > >> | |