Referred Articles
International Conferences/Proceedings
Academic Reports/Domestic Conferences
General Magazines/Talks
Textbooks
Life and Literature

Referred Articles

No.

1

Article

Y.T. Chang and S.J. WANG, “The Evidence Investigations to Memory in Forensics Procedure,” 2013.

No.

2

Article

W.J. Wang, C.T. Huang, S.R. Tsui, C.H. Yang, and S.J. WANG, “Fully Reversible Data Hiding Using Vector Quantization Transformation,” 2013.

No.

3

Article

Y.T. Chang, C.T. Huang, and S.J. WANG, “Data Hiding of High Compression Ratio in VQ Indices with Neighboring Correlations,” 2013.

No.

4

Article

W.J. Wang, C.T. Huang, A. Rajpurohit, and S.J. WANG, “Secret in Video Embedding for Key Evidence in Forensics,” 2013.

No.

5

Article

F.H. Hsu, M.H. Wu, C.Y. Weng, and S.J. WANG, “Medical Images with Reversible Data Hiding By Means of Histogram-shifting Strategy,” 2013.

No.

6

Article

W.J. Wang, C.T. Huang, Y.H. Zhang, and S.J. WANG, “QR-code Authentication in Visual Image Processing,” 2013.

No.

7

Article

F.H. Hsu, M.H. Wu, Y.W. Chang, and S.J. WANG, “Web Security in a Windows System as PrivacyDefender in Private Browsing Mode,” 2013.

No.

8

Article

F.H. Hsu, M.H. Wu, C.H. Yang, and S.J. WANG, “Reversible Watermarking-Payload Embedding with Adaptive Pixels in Spatial Domains,” 2013.

No.

9

Article

W.J. Wang, C.T. Huang, M.Y. Tsai, and S.J. WANG, “Two-Level Encoding in VQ-based Data Hiding Using Toral Automorphism with Adaptive Pixel Replacements,” 2013.

No.

10

Article

W.J. Wang, C.T. Huang, and S.J. WANG, “Greedy-USBIRDS: A Greedy Steganographic Algorithm Using Secret Bits for Image-Block Repairing Based on Differences under SMVQ," 2013.

No.

11

Article

W.J. Wang, C.T. Huang, and S.J. WANG, “VQ-encoded Images in Reversible Data Hiding of High Bit-compression-ratio,” 2013.

No.

12

Article

B.S. Ke, J.S. Lin, S.J. WANG, and H.K. Tso, “Private Browsing Evidence of Google History Investigations in Computer Forensics,” accepted in Journal of e-Business, http://jeb.cerps.org.tw/ , 2013. (TSSCI)

No.

13

Article

S.R. Wu and S.J. WANG, “Forensics in Virtual Machine with Evidence Investigations of Image Files,” accepted in The Journal of Chaoyang University of Technology, Nov. 2013.

No.

14

Article

H.M. Sun, C.Y. Weng, S.J. WANG, and C.H. Yang, “Data Embedding in Image-media using Weight-function on Modulo Operations,” ACM Trans. on Embedded Computing Systems, http://acmtecs.acm.org/index.htm Feb. 2013. (SCI)

No.

15

Article

Y.T. Chang, C.T. Huang, S.J. WANG, “Image Interpolating based Data Hiding in Conjunction with Pixel-Shifting of Histogram,” accepted in Journal of Supercomputing, 2013. (SCI)

No.

16

Article

W.J. Wang, C.T. Huang, C.M. Liu, P.C. Su, and S.J. WANG, “Data Embedding for Vector Quantization Image Processing on the Basis of Adjoining State-Codebook Mapping,” Information Sciences, Vol.. 246, pp. 69–82, 2013. (SCI)

No.

17

Article

C.Y. Weng, C.I Fan, Y.H. Chang, and S.J. WANG, “An Image Authentication for Secret on the Basis of Steganographic Immunization to HVS,” accepted in Journal of Telecommunication SystemsPublication, 2013. (SCI)

No.

18

Article

C.Y. Weng, Y.H. Zhang, and S.J. WANG, “Visible watermarking images in high quality of data hiding,” accepted in Journal of Supercomputing, 2013. (SCI)

No.

19

Article

F.H. Hsu, M.H. Wu, C.H. Yang, and S.J. WANG, “Image Reversibility in Data Embedding on the Basis of Blocking-Predictions,” accepted in Peer-to-Peer Networking and Applications, 2013. (SCI)

No.

20

Article

F.H. Hsu, M.H. Wu, S.J. WANG, and C.L. Huang, “Reversibility of Image with balanced Fidelity and Capacity upon Pixels Differencing Expansion,” accepted in Journal of Supercomputing, 2013. (SCI)

No.

21

Article

W.J. Wang, C.T. Huang, C.H. Yang, and S.J. WANG, “VQ-based Algorithms Extended to Non-embedded Watermarking for Multimedia Ownership Prevention Systems,” accepted in Peer-to-Peer Networking and Applications, 2013. (SCI)

No.

22

Article

C.W. Chen, S.J. WANG, and Y.R. Tsai, “Cost-Saving Key Agreement via Secret Sharing in Two-Party Communication Systems,” Journal of Convergence (JoC), http://www.ftrai.org/joc/ publication, 2013.

No.

23

Article

C.Y. Weng, S.J. WANG, Jonathan Liu, and D. Goyal, “Prediction-based Reversible Data Hiding Using Empirical Histograms in Images,” KSII Trans. on Internet and information systems, Vol. 6, No. 4, April, pp. 1248-1266, 2012. (SCI)

No.

24

Article

W.J. Wang, C.T. Huang, S.W. Huang, and S.J. WANG, “Dual Hiding in QR Code Applications of Image Processing,” Journal of Information Management, Vol. 19, No. 4., pp. 769-784. 2012. (TSSCI, Taiwan Social Science Citation Index)

No.

25

Article

C.T. Huang, W.J. Wang, C.H. Yang, and S.J. WANG, “A Scheme of Reversible Information Hiding Based on SMVQ,” Imaging Science Journal, Vol. 59, No. 5, 2012. (SCI)

No.

26

Article

F.H. Hsu, M.H. Wu, and S.J WANG, “Reversible Data Hiding Using Side-match Predictions on Steganographic Images,” Multimedia Tools and Applications, accepted in Feb. 2012. (SCI)

No.

27

Article

C.Y. Weng, H.K. Tso, and S.J. WANG, “Steganographic Data Hiding in Image Processing Using Predictive Differencing,” Opto-Electronics Review, Vol. 20, No. 2, pp. 126-133, 2012. (SCI)

No.

28

Article

D.Y. Kao, J.J. Zeng, and S.J. WANG, “Applying an Iterative PDCA Management Process to the Forensic Analysis of Social Engineering Technique,” Journal of Advanced Technology and Management, Vol. 1, No. 1, May 2011

No.

29

Article

C.H. Yang, W.J. Wang, C.T. Huang, and S.J. Wang, “Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images,” accepted in Information Sciences, Vol. 181, Issue 11, June, pp. 2218–2230, 2011. (SCI)

No.

30

Article

W.J. Wang, C.T. Huang, and S.J. Wang, “VQ Applications in Steganographic Data Hiding upon Multimedia-images,” IEEE System Journals, Volume 5, Issue 4, pages 528 – 537, 2011. (SCI)

No.

31

Article

C.H. Yang, C.Y. Weng, H.K. Tso, and S.J. Wang, “A Data Hiding Scheme Using the Varieties of Pixel-value Differencing in Multimedia Images,” Journal of Systems and Software, Vol. 84, pp. 669–678, 2011. (SCI)

No.

32

Article

S.J. Wang, Y.R. Tsai, and C.C. Shen, “Verifiable Threshold Scheme in Multi-secret Sharing Distributions upon Extensions of ECC,” Wireless Personal Communications, Springer, Vol. 56, No. 1, pp. 173-182, Jan. 2011. (SCI)

No.

33

Article

C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Varied PVD+LSB Evading Detection Programs to Spatial Domain in Data Embedding Systems,” Journal of Systems and Software, Vol. 83, pp. 1635-1643, 2010. (SCI)

No.

34

Article

D.Y. Kao, S.J. Wang, and Frank F.Y. Huang “' SoTE: Strategy of Triple-E on Solving Trojan Defense of Cyber-crime Case,” The Computer Law & Security Review - The International Journal of Technology Law and Practice (Elsevier), www.elsevier.com/locate/clsr, Vol. 26, pp. 52-60, 2010. (SCI)

No.

35

Article

C.H. Yang and S.J. Wang, “Transforming LSB Substitution for Image-based Steganography in Matching Algorithms,” Journal of Information Science and Engineering, Vol. 26, pp. 1191-1212, 2010. (SCI)

No.

36

Article

S.J. Wang, Y.R. Tsai, C.C. Shen, and P.Y. Chen, “Hierarchical key derivation scheme for group-oriented communication systems, “ Int. Journal of Information Technology, Communications and Convergence, http://www.inderscience.com/ Inderscience Publishers, Vol. 1, No. 1, pp. 66-76, 2010.

No.

37

Article

C.T. Huang,, W.J. Wang, and S.J. Wang, “A Novel Data Hiding and Reversible Scheme Using SMN Blocks in VQ-Compressed Images,” Opto-Electronics Review, accepted in Aug. 2010. (SCI)

No.

38

Article

C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Capacity-raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations,” Fundamenta Informaticae, Vol. 98, pp. 321-336, 2010. (SCI)

No.

39

Article

C.H. Yang, C.Y. Weng, S.J. Wang�x, and H.M. Sun, “Grouping Strategies for Promoting Image Quality of Watermarking on the Basis of Vector Quantization,” Journal of Visual Communication and Image Representation, Vol. 21, No. 1, pp. 49-55, 2010. (SCI)

No.

40

Article

S.J. Wang and D.Y. Kao, "The IP Address and Time in Cyber-crime Investigation," Policing: An International Journal of Police Strategies & Management, Vol 32. Issue 2, 2009. (SCI).

No.

41

Article

C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Codebook-linked Watermarking Scheme on Digital Images in Steganography,” Fundamenta Informaticae, Vol. 92, pp. 397-409, 2009. (SCI)

No.

42

Article

S.J. Wang, D.Y. Kao, and Frank F.Y. Huang, “Procedure Guidance on Internet Forensics Coping with Copyright Arguments of Client-Server-based P2P Models,” International Journal Computer Standards & Interfaces, Vol. 31, pp. 795-800, 2009. (SCI)

No.

43

Article

S.J. Wang, Y.R. Tsai, P.Y. Chen, and C.C. Shen, “A Scheme of Image-based Signature Verification upon Secret Sharing for Shopping in E-commerce Systems,” Journal of Computers, Vol. 20, No. 2, 2009. (EI)

No.

44

Article

D.Y. Kao, Frank F.Y. Huang, and S.J. Wang, “'Persistence and Desistance: Examining the Impact of Reintegrative Shaming to Ethics in Taiwan Juvenile Hackers',” The Computer Law & Security Review - The International Journal of Technology Law and Practice (Elsevier), www.elsevier.com/locate/clsr, Vol. 25, Issue 5, September 2009, pp. 464-476, 2009. (SCI)

No.

45

Article

S.J. Wang�y, I.S. Lin, L.C. Lin, and W.Y. Chiang, “A Secret Sharing Authentication Scheme for Digital Images,” Journal of Computers, Vol. 20, No. 1, April, 2009. (EI)

No.

46

Article

S.J. Wang, J.Y. Lin, H.J. Ke, and S.W. Lin, “Visual-based Embedding Systems with Targeted Secret Disclosures and Applications,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 04, No. 1, pp. 44-53, 2009. (EI)

No.

47

Article

C.H. Yang, C.Y. Weng, S.J. Wang�x, and H.M. Sun, “Adaptive Data Hiding in Edged Areas of Images with Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security, Vol. 3, Issue 3. pp. 488-497, Sept. 2008. (SCI)

No.

48

Article

C.W Chen, S.J. Wang, and Y.R. Tsai, “TLPKA: Pairwise Key Agreement Based on the Geometrical Property of the Tangent Line in Ad Hoc Network Systems,” International Journal of Hybrid Information Technology, Vol. 2, No. 4, 2008. (EI).

No.

49

Article

H.C. Chen, S.J. Wang, and J.H. Wen, “A Cryptographic Key Assignment Scheme with Adaptable Time-token Constraint in a Hierarchy,” International Journal of Multimedia and Ubiquitous Computing, Vol. 3, No. 4, 2008. (EI)

No.

50

Article

S.J. Wang, Y.R. Tsai and P.Y. Chen, “Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System,” Journal of Computers, Vol. 19, No. 1, April, 2008. (EI)

No.

51

Article

C.H. Yang, S.J. Wang, C.Y. Weng, and H.M. Sun, “Information Hiding Technique Based on Blocked PVD,” Journal of Information Management, Vol. 15, No. 3, pp. 29-48, 2008. (TSSCI, Taiwan Social Science Citation Index)

No.

52

Article

S.J. Wang, Y.H. Chang, and J.S. Lin, “A Visual-based Authentication Scheme in Wireless Carry-on Laptop Systems,” Electronic Commerce Studies, Fall, 2008. (TSSCI, Taiwan Social Science Citation Index)

No.

53

Article

S.J. Wang, J.H. Huang, S.Y. Yao and C.L. Chan, “Digital Evidence Seizure in Remote Firewall-based Systems on Internet Forensics,” Journal of e-Business, Vol. 10, No. 1, pp. 235-254, March, 2008. (TSSCI, Taiwan Social Science Citation Index)

No.

54

Article

S.J. Wang, H.C. Wang, and L.C. Lin, “Genetic Algorithms Highlighting the Target Secret in Visual Cryptography,” Journal of Information Management, Vol. 15, No. 2, pp. 85-108, April 2008. (TSSCI, Taiwan Social Science Citation Index)

No.

55

Article

S.J. Wang, K.L. Lin, Y.H. Chang, W.Y. Chiang, and J.H. Huang, “Unveiling Controversy of Trojan Defense on Internet Forensics,” The Journal of Forensic Sciences, Vol. 65, 2008.

No.

56

Article

S.J. Wang, H.C. Shu, Y.H. Chang, J.H. Hwang, “Immigration E-records in Secure Hierarchical Management upon Forensic Information Demands,” The Journal of Forensic Sciences, Vol. 63, 2008.

No.

57

Article

S.J. Wang, Y.H. Chang, H.J. Ke, and W.S. Juang, “Digital Evidence Seizure in Network Intrusions against Cyber-crime on Internet Systems,” Journal of Computers, Jan. 2008. (EI)

No.

58

Article

S.J. Wang, Y.R. Tsai, and J.W. Chen, “Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks,” Journal of Communications, Vol. 03, Issue 01, pp. 20-26, 2008. (EI)

No.

59

Article

H.C. Chen, S.J. Wang, and J.H. Wen, “Packet Construction for Secure Conference Call Request in Ad Hoc Network Systems,” Information Sciences, Vol. 177, pp. 5598-5610, 2007. (SCI)

No.

60

Article

S.J. Wang, “Information Hiding at Oblivious Watermarking Scheme upon Alternative Threshold in Spatial Domains,” Journal of Discrete Mathematical Science & Cryptography, Vol. 10, No. 3, pp. 359-384, 2007, Taru publications, India. (EI)

No.

61

Article

H.C. Chen, S.J. Wang, and J.H. Wen, “Role-based Proactive Scheme in an Access Control Hierarchy,” Journal of Statistics & Management Systems, accepted in June, 2007. (EI)

No.

62

Article

S.J. Wang and D.Y. Kao, "Internet Forensics on the Basis of Evidence Gathering with Peep Attacks," International Journal Computer Standards & Interfaces, Vol. 29, pp. 423-429, 2007. (SCI)

No.

63

Article

S.J. Wang, H.J. Ke, J.H. Huang, and C.L. Chan, “Hash Cracking and Aftereffect on Authentication Procedures in Cyberspace,” IEEE Aerospace & Electronics Systems Magazine, Vol. 22, Issue 1, pp. 3-7, Jan. 2007. (SCI)

No.

64

Article

H.C. Chen, S.J. Wang, and J.H. Wen, “A Key Distribution Scheme for Live Multi-session upon Generalized Group-Oriented Cryptography,” the Far East Journal of Mathematical Sciences, accepted in April 2007. (EI)

No.

65

Article

S.J. Wang, J.Y. Lin, and J.H. Huang, “Internet Forensics with the Digital Evidence Investigations in Cyber-casino Scenarios,” Journal of Forensic Sciences, Vol. 62, 2007.

No.

66

Article

S.J. Wang, Y.R. Tsai, L.S. Chiu, and I.S. Lin, “Mutually Identity Authentication in GSM-based Anonymous Communications,” Journal of Computers, Vol. 18, No. 2, pp. 33-46, July, 2007. (EI)

No.

67

Article

S.J. Wang, “Measures of Retaining Digital Evidence to Prosecute Computer-based Cyber-crime,” International Journal Computer Standards & Interfaces (SC&I), Vol. 29, No. 2. pp. 216-223, Jan., 2007. (SCI)

No.

68

Article

Y.R. Tsai and S.J. Wang, “Two-tier Authentication for Cluster and Individual Sets in Mobile Ad Hoc Networks,” Computer Networks, Vol. 51, pp. 883-900, 2007. (SCI)

No.

69

Article

S.J. Wang, “Key Management of Secret Sharing in Frequent Migrations for Job Environments,” Far East Journal of Applied Mathematics, Vol. 27, No. 2, 2007. (EI)

No.

70

Article

S.J. Wang and P.S. Hu, “Key Management for Pay-TV Broadcast Systems in Hierarchy,” Journal of Discrete Mathematical Science & Cryptography, Vol. 9, No. 3, pp. 449-496, Dec. 2006, Taru publications, India. (EI)

No.

71

Article

S.J. Wang, “Procedural Response and Digital Evidence Exposure in Information Security Incidents,” Journal of Discrete Mathematical Science & Cryptography, Vol. 9, No. 3, pp. 417-427, Dec. 2006, Taru publications, India. (EI)

No.

72

Article

J.H. Huang, S.J. Wang, A.C. Chiang and Y.L. Hwang, “Real-time Response against Abnormal Invasion in the case of Applications Using NetKeeper Systems,” The Journal of Forensic Sciences, Vol. 61. 2006.

No.

73

Article

S.J. Wang, “Fundamental Common Key Establishment in MANETs upon Geometric Mathematics,” Far East Journal of Mathematical Sciences, Vol. 23, Issue 1, pp. 127-135, Oct., 2006. (EI)

No.

74

Article

S.J. Wang and D.Y. Kao, "Invasions of Malware in Cyber-space and Countermeasures Improving Cyber-security," ACM Operating Systems Review (ACM OSR), Accepted in June, 2006. (EI)

No.

75

Article

S.J. Wang, C.C. Wu, and C.Y. Lin, “In View of Completeness and Proof Ability of Digital Photo Evidence upon Watermarking Authentication Schemes in Forensic Sciences,” Communications of the CCISA, Vol. 12, No. 2, April, 2006.

No.

76

Article

C.H. Yang and S.J. Wang, “Weighted Bipartite Graph for Locating Optimal LSB Substitution for Secret Embedding,” Journal of Discrete Mathematical Science & Cryptography, Vol. 9, No. 1, pp. 153-164, April, 2006, Taru publications, India. (EI)

No.

77

Article

S.J. Wang, H.J. Ke, J.H. Huang and S.H. Chen, “Evidence Ability Study Based upon Wartermarking KH-scheme in Digital Forensics,” The Journal of Forensic Sciences, March 2006.

No.

78

Article

S.J. Wang, C.H. Yen, I.S. Lin and H.H. Chen,“Authentication System on the Basis o f Visual-based Recognitions,” Journal of Computers, Vol. 16, No. 5, 2005. (EI)

No.

79

Article

C.H. Yang and S.J. Wang, “Accelerating VQ-based Codeword Search on the Basis of Partial Search Strategy,” International Journal Computer Standards & Interfaces, Vol 28, No. 2, pp. 231-240, 2005. (SCI)

No.

80

Article

S.J. Wang, Y.R. Tsai, and James Chen, “Node Communications in View of Security upon Ad Hoc Networks,” Communications of the CCISA, Vol. 11, No. 4, Oct., 2005.

No.

81

Article

J.H. Huang, H.J. Ke, S.J. Wang, and P. F. Chung, “Linux-based Firewall Mechanism of iptables in Information Security District Systems,” The Journal of Forensic Sciences, Vol. 59, pp. 63-80, Sept., 2005.

No.

82

Article

S.J. Wang, “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image,” Applied Mathematics and Computation, Vol. 164, pp. 99-116, May, 2005. (SCI)

No.

83

Article

S.J. Wang, “Vowel-consonant Addressing Mode on Hashing for English Letter-oriented Keys,” Journal of Discrete Mathematical Science & Cryptography, Vol. 8, No. 1, pp. 1-25, April, 2005, Taru publications, India. (EI)

No.

84

Article

S.J. Wang and C.H. Yang, “Hierarchy-oriented Searching Algorithms Using Alternative Duplicate Codewords for Vector Quantization Mechanism,” Applied Mathematics and Computation, Vol. 162, No. 2, pp. 559-576, March, 2005. (SCI)

No.

85

Article

S.J. Wang and C.M. Chuang, “Anonymous Message Communications with User Hierarchy in a Multicast System,” Applied Mathematics and Computation, Vol. 159, No. 1, pp. 95-112, Nov., 2004. (SCI)

No.

86

Article

S.J. Wang, “Anonymous Wireless Authentication on a Portable Cellular Mobile System,” IEEE Transactions on Computers, Vol. 53, No. 10, Oct., pp. 1317-1329, 2004.(SCI)

No.

87

Article

H.C. Chen, S.J. Wang, and J.H. Wen, “Models for Role-based Hierarchical Access Control Organizations,” Communications of the CCISA, Vol. 10, No. 4, Oct., 2004.

No.

88

Article

S.J. Wang, “Direct Construction of a Secret in Generalized Group Oriented Cryptography,” International Journal Computer Standards & Interfaces, Vol. 26, No. 5, pp. 455-460, Sept., 2004. (SCI)

No.

89

Article

S.J. Wang, “Threshold Verification Scheme to a Valid-signature Using Identity Only on Specialized Approval,” Applied Mathematics and Computation, Vol. 152, No. 2, pp. 373-383, May, 2004. (SCI)

No.

90

Article

S.J. Wang and H.J. Ke, “Curbing Gambling Activities on the Internet,” IEEE Aerospace and Electronic Systems Magazine, pp. 33-35, April, 2004. (SCI Extend)

No.

91

Article

S.J. Wang and Y.C. Kuo, “A Secure Mechanism for Fine Payment Acting on Internet Transaction,” Web Journal of Chinese Management Review (http://www.cmr.tuan.com), Vol. 7, No. 2, pp. 158-171, April, 2004, Hong Kong.

No.

92

Article

S.J. Wang, “The High Capacity in Embedding Logo implementing the Intellectual Property Using Tree-oriented Coding Mechanism,” Bulletin of the College of Engineering, National Taiwan University, pp. 119-126, Feb, 2004.

No.

93

Article

S.J. Wang, “Remote Table-based Log-in Authentication Upon Geometric Triangle,” to be appear in International Journal Computer Standards & Interfaces, Vol. 26, No. 2, pp. 85-92, 2004. (SCI)

No.

94

Article

S.J. Wang, H.J. Ke and W.C. Kuo, “A Parser Software Platform Setp-up Looking for Specified Web Sites,” The Journal of Forensic Sciences, Vol. 56, pp. 123-136, March 2004.

No.

95

Article

S.J. Wang and Y.R. Tsai, “Private Communications in Hierarchical Group-Mobile Radio Systems,” Journal of Discrete Mathematical Science & Cryptography, Vol. 7, No. 2, pp. 187-201, 2004, Taru publications, India. (EI)

No.

96

Article

S.J. Wang, H.J. Ke, and K.L. Ho, “Forensic Tools Study in Response to Information Crisis Incident,” Communications of the CCISA, Vol. 10, No. 1, Jan., 2004.

No.

97

Article

S.J. Wang, “Yet Another Log-in Authentication Using N-dimensional Construction Based on Circle Property,” IEEE Transactions on Consumer Electronics, Vol. 49, pp. 337-341, May, 2003. (SCI)

No.

98

Article

S.J. Wang and C.H. Yan, “Fast Access with Certificate Revocation List in PKI Mechanism,” Bulletin of the College of Engineering, National Taiwan University, Vol. 88, pp. 97-107, June, 2003.

No.

99

Article

S.J. Wang and C.S. Lin, “Prototype System Set-up for Required Real-time Query on Counterfeit Certificate Recognitions,” The Journal of Forensic Sciences, Vol. 55, pp. 41-55, March, 2003.

No.

100

Article

S.J. Wang and H.J. Ke, “Authentication and Watermarking in Information Hiding,” Communications of the CCISA, Vol. 9, No. 2, March, 2003.

No.

101

Article

S.J. Wang and C.K. Lu, “A Scheme of Non-sensible Document in Transit with Secret Hiding,” Journal of Information Management, Vol. 9, No. 2, pp. 169-182, Jan. 2003 (TSSCI, Taiwan Social Science Citation Index).

No.

102

Article

S.J. Wang, “Encryption Packet Broadcast Using Factorial Number Structure,” Journal of Computers, Vol. 14, No. 3, pp. 23-31, 2002.

No.

103

Article

S.J. Wang, H.J. Ke and C.Y. Yang, “Evidence Investigation for Intruders in Web Systems,” Communications of the CCISA, Vol. 8, No. 4, Sept., 2002.

No.

104

Article

S.J. Wang and D.Y. Kao, “Security Forensics and Empirical Strategies for Preventing from the Intrusion of Trojan Horse,” Journal of Information, Technology and Society, pp. 109-117, Dec. 2001.

No.

105

Article

K.S. Yang, D. Y. Kao and S.J. Wang, “A Model Analysis of Information Criminal Whereabouts --- In Case of Illegal Compact Disc on Sale,” The Journal of Forensic Sciences, Vol. 51, pp. 91-102, 2001.

No.

106

Article

D. Y. Kao and S.J. Wang, “The Planning and Management Strategy for Protecting the Hacker Intruding in Telephone Information Systems,” Police Science Quarterly, Vol. 31. No. 5, pp. 161-170, 2001.

No.

107

Article

S.J. Wang and Y.C. Lin, "A Scheme of Fast key Recover on Broadcast Network upon the Three-center-location of a Triangle," Journal of Computers, Vol. 12, No. 1, March, 2000.

No.

108

Article

C.H. Yan and S.J. Wang, “A New Strategy of Secure-control-card with Software implementation for Police Agency,” Police Science Quarterly, Vol. 30, No. 6, May, 2000.

No.

109

Article

S.J. Wang and P. S. Hu, “A Dynamic Access Control Scheme with High Security Based on the Square Modular Technique in Hierarchy Structure,” Bulletin of the College of Engineering, National Taiwan University, Vol. 78, pp. 61-66, Feb. 2000.

No.

110

Article

D. Y. Kao and S.J. Wang, “The Behavior Analysis of Investigating Intruder Activities in Internet Networks,” The Journal of Forensic Sciences, Vol. 48, pp.57-70, 1999.

No.

111

Article

S.J. Wang and J.K. Jan, “A New Addressing Method for Letter-Oriented Keys, ” Journal of Systems & Software, Vol. 46. pp. 77-88, 1999. (SCI)

No.

112

Article

S.J. Wang, Y.R. Tsai and J.F. Chang, “A New Two-Way and Location-Secure Authentication Scheme Based on Secret Sharing, ” Journal of the Chinese Institute of Electrical Engineering, Vol. 6, No. 4, 1999. (EI)

No.

113

Article

S. J. Wang and J. F. Chang, “Smart-Card Based Secure Password Authentication Scheme,” Computers & Security, Vol. 15, No. 3, pp. 231-237, 1996. (SCI)

No.

114

Article

S. J. Wang and J. F. Chang, “A Hierarchical and Dynamic Group-Oriented Cryptographic Scheme,” IEICE Trans. Fundamentals, Vol. E79-A, No.1, pp. 76-85, January 1996. (SCI)

No.

115

Article

H. T. Liaw, S. J. Wang and C. L. Lei, “A Dynamic Cryptographic Key Assignment Scheme in a Tree Structure,” International Journal of Computers & Mathematics with Applications, Vol. 25, No. 6, pp. 109-114, 1993. (SCI)

No.

116

Article

H. T. Liaw, S. J. Wang and C. L. Lei, “Secure Dynamic User Hierarchy Scheme Based on the Knapsack Problem,” International Journal of Computer Systems Science & Engineering, Vol. 4, pp.210-216, 1993. (SCI)

No.

117

Article

J. K. Jan and S. J. Wang, “A Dynamic Access Control Scheme Based Upon the Knapsack Problem,” International Journal of Computers & Mathematics with Applications, Vol. 26, No. 12, pp. 75-86, 1993. (SCI)

No.

118

Article

J. K. Jan, C. C. Chang and S. J. Wang, “A New Dynamic Key-Lock-Pair Access Control Scheme,” Computers & Security, Vol. 10, No. 2, pp. 129-139, 1991. (SCI)

International Conferences/Proceedings

No.

1

Article

W.J. Wang, Y.H. Zhang, C.T. Huang, and S.J. WANG, “Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting,” IEEE-PROCEEDINGS, The 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2013), Oct., Beijing, China, 2013.

No.

2

Article

D.Y. Kao, C.Y. Peng, Frank F.Y. Huang, and S.J. WANG, “Privacy Breach Investigations of Incident Response to Personal Information Protection Act,” SPRINGER VERLAG PROCEEDINGS, The 7th International Symposium on Digital Forensics and Information Security (DFIS-13), Gwangju, Korea, Sept. 2013.

No.

3

Article

Y.T. Chang, M.J. Chung, C.T. Huang, and S.J. WANG, “Memory Forensics for Key Evidence Investigations in Case Illustrations,” IEEE-PROCEEDINGS, AsiaJCIS-2013, Seoul, Korea, July, 2013.

No.

4

Article

F.H. Hsu, M.H. Wu, and S.J. WANG, “Dual-watermarking by QR-code Applications in Image Processing,” IEEE-PROCEEDINGS, The 2012 International Workshop on Ubiquitous Information Processing and Management (UIPM 2012), https://sites.google.com/site/uicuipm2012/ Fukuoka, Japan, Sept. 2012.

No.

5

Article

C.W. Chen, S.J. WANG, Y.R. Tsai, and H.C. Chen, “Tree-Based Group Key Agreement for Mobile Ad Hoc Networks, IEEE-PROCEEDINGS, AsiaJCIS-2012, http://www.cs.dm.u-tokai.ac.jp/ASIAJCIS2012/ Tokyo, Japan, Aug. 2012.

No.

6

Article

Y.C. Tso, S.J. WANG, C.T. Huang, and W.J. Wang, “iphone Social Networking For Evidence Investigations Using iTunes Forensics,” presented in ACM-PROCEEDINGS, ACM ICUIMC (IMCOM) International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC-2012), Malyasia, Feb. 2012.

No.

7

Article

C.Y. Weng, C.I. Fan, and S.J. WANG, “Predictive Pixel Differencing Expansion in Data Reversibility Scheme,” presented in ACM-PROCEEDINGS, ACM ICUIMC (IMCOM) International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC-2012), Malyasia, Feb. 2012.

No.

8

Article

H.J. Ke, S.J. Wang , Jonathan Liu, and D. Goyal, “Hash-algorithms Output for Digital Evidence in Computer Forensics,” IEEE-PROCEEDINGS, The Second International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2011), SPAIN, 2011.

No.

9

Article

D.Y. Kao, S.J. Wang, and D. Goyal, “Medical Forensics and Investigations to Case Studies,” IEEE-PROCEEDINGS, ICPADS 2011, The 17the IEEE International conference on Parallel and Distributed Systems, TAIWAN, 2011.

No.

10

Article

M.H. Wu, F.H. Hsu, C.H. Yang, and S.J. Wang, “Reversible Watermarking Scheme with Visibility Using Randomize Distance,” IEEE-PROCEEDINGS, http://bit.kuas.edu.tw/~icgec11/index.html The Fifthe International Conference on Genetic and Evolutionary Computing, Aug. 2011.

No.

11

Article

C.T. Huang, W.J. Wang, S.J. Wang, and Jonathan, C.L. Liu, “A Secret Embedding Scheme by Means of Re-indexing VQ Codebook upon Image Processing,” SPRINGER VERLAG PROCEEDINGS, 2011 International Conference on Data Engineering and Internet Technology (DEIT 2011), March, 2011.

No.

12

Article

H.M. Sun, C.Y., Weng, C.H. Yang, S.J. Wang, “An EMD-oriented Hiding Scheme for Reversible Data Embedding in Images,” SPRINGER VERLAG PROCEEDINGS, 2011 International Conference on Data Engineering and Internet Technology (DEIT 2011), March, 2011.

No.

13

Article

S.J. Wang, C.Y. Weng, and Dushyant Goyal, “Multilevel Data Hiding for Embedding Reversibility upon Improving Histogram Shifting,” IEEE-PROCEEDINGS, ICS 2010 : The 2010 International Computer Symposium, Dec. 2010.

No.

14

Article

C.H. Yang, F.H. Hsu, M.H. Wu, and S.J. Wang, “Histogram-based Reversible Data Hiding Using Tictactoemidlet Predictions,” IEEE-PROCEEDINGS, 2010 Fourth International Conference on Genetic and Evolutionary Computing, Dec. 2010.

No.

15

Article

W.J. Wang, C.T. Hwang, and S.J. Wang, “Predictive Side-Match Vector Quantization for Secret Embeddingin Reversible Data Hiding,” IEEE-PROCEEDINGS, 2010 Fourth International Conference on Genetic and Evolutionary Computing, Dec. 2010.

No.

16

Article

S.J. Wang, Y.R. Tsai, and C.C. Shen, “Varied Oblivious Transfer Protocols Enabling Multi-receiver and Applications,” under reviewed in IEEE-PROCEEDINGS, the First International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2010), Fukuoka, Japan, Nov. 2010.

No.

17

Article

D.Y. Kao, S.J. Wang, and Frank F.Y. Huang, “An Interactive Process of MDFA Strategy in Countering Cyber Hacking Activity,” International Security Technology and Amanagement Conference, http://www.jastam.org.tw/istam2010, Sept. Taiwan, 2010.

No.

18

Article

S.J. Wang and Y.T. Chen, “Secret Embedding and Reconstruction for Authentications in Steganography upon Secret Sharing Systems", , IEEE-PROCEEDINGS, The 5th FutureTech 2010, Busan, Korea, May, 2010.

No.

19

Article

S.J. Wang and Y.T. Fan, “Intrusion Investigations with Data-hiding for Computer Log-file Forensics", IEEE-PROCEEDINGS, The 5th FutureTech 2010, Busan, Korea, May, 2010.

No.

20

Article

W.J. Wang, C.T. Huang, and S.J. Wang, “Reversible Data Hiding Using Neighboring Block in VQ-Compressed Images,” ACM-PROCEEDINGS, The 4th International Conference on Ubiquitous Information Management and Communication (ICUIMC-2010), presented in SKKU, Suwon, Korea, Jan. 2010.

No.

21

Article

D.Y. Kao, S.J. Wang, A. Sharma, and Frank F.Y. Huang, “A Case-Oriented Model of Digital Forensics on Infected Zombie Computers,” IEEE-PROCEEDINGS, 2009 The Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2009), Korea, Dec. 2009.

No.

22

Article

H.M. Sun, C.Y. Weng, and S.J. Wang, “A Scheme of Modulo-based Capacity-improvement upon EMD Systems,” IEEE-PROCEEDINGS, presented in Sept., Japan, 2009.

No.

23

Article

23. H.C. Chen, S.J. Wang, J.H. Wen, and C.W. Chen, “Temporal and Location-based RBAC Model,” IEEE-PROCEEDINGS, The 5th International Joint Conference on Networked Computing and Advanced Information Management (NCM-2009), http://www.aicit.org/ncm/ presented in Aug., Seoul, Korea, 2009.

No.

24

Article

24. C.W. Chen, S.J. Wang, Y.R. Tsai, and H.C. Chen, “A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN,” IEEE-PROCEEDINGS, The 5th International Joint Conference on Networked Computing and Advanced Information Management (NCM-2009), http://www.aicit.org/ncm/ presented in Aug., Seoul, Korea, 2009.

No.

25

Article

S.J. Wang, Y.R. Tsai, C.C. Shen, and P.Y. Chen, “Hierarchical Key Agreement Protocols in Group-user Systems,” IEEE-PROCEEDINGS, presented in Aug., China, 2009.

No.

26

Article

C.H. Yang, C.T. Huang, and S.J. Wang, “Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images,” IEEE-PROCEEDINGS, presented in Aug., China, 2009.

No.

27

Article

W.Y. Chiang, S.J. Wang, C.Y. Weng, and C.H. Yang, “Robustness-set in Watermarking Embedding Systems Using Codebook Classifications,” ACM-PROCEEDINGS, The Third International Conference on Ubiquitous Information Management and Communication (ICUIMC-2009), presented in SKKU, Suwon, Korea, Jan. 2009.

No.

28

Article

H.J. Ke, S.J. Wang, and W.Y. Chiang, “Watermarking Damage to Risk Multimedia in Intellectual Property Systems,” 2008 International Computer Symposium, Taiwan, Nov. 2008.

No.

29

Article

S.J. Wang, Y.R. Tsai, and J.J. Shen, “Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps,” presented in IEEE-PROCEEDINGS, 2008 The Third International Symposium on Smart Home (SH-2008), Sanya, Hainan Island, China, Dec. 2008.

No.

30

Article

D.Y. Kao, S.J. Wang, K. Mathur, S. Jain, Frank F.Y. Huang, “Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks,” IEEE-PROCEEDINGS, 2008 The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2008), Taiwan, Dec. 2008.

No.

31

Article

S.J. Wang, Y.R. Tsai, and P.Y. Chen , “Authentication Scheme in Peer-to-peer Based Live Stream Sharing Management Systems,” presented in IEEE-PROCEEDINGS, 2008 The International Conference on Intelligent Systems Design and Applications (ISDA), Taiwan, Nov. 2008.

No.

32

Article

C.H. Yang, S.C. Huang, C.T. Huang, and S.J. Wang, “Non-embedded Image Protection Approaches Based on Vector Quantization,” presented in IEEE-PROCEEDINGS, 2008 The International Conference on Intelligent Systems Design and Applications (ISDA), Taiwan, Nov. 2008.

No.

33

Article

S.J. Wang, I.S. Lin, Y.L. Hsieh, and C.Y. Wen, “Secret Sharing Systems with Authentication-based Steganography,” presented in IEEE-PROCEEDINGS, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Harbin, China, Aug. 2008.

No.

34

Article

D.Y. Kao, S.J. Wang,, Frank F.Y. Huang, S. Bhatia, and S. Gupta “Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks,” presented in LNCS-PROCEEDINGS, Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) in conjunction with ISI 2008, Lecture Notes in Computer Science (LNCS), published in Spring-Verlag, Taipei, Taiwan, June 2008.

No.

35

Article

H.C. Chen, S.J. Wang, J.H. Wen, and C.W. Chen, “Flexible Key Assignment for a Time-token Constraint in a Hierarchy,” IEEE-PROCEEDINGS, 2008 International Conference on Multimedia and Ubiquitous Engineering, presented in Busan l, Korea, April, 2008.

No.

36

Article

C.W Chen, S.J. Wang, and Y.R. Tsai, “Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems,” IEEE-PROCEEDINGS, 2008 International Conference on Multimedia and Ubiquitous Engineering, presented in Busan, Korea, April 2008.

No.

37

Article

H.M. Sun, C.Y. Weng and S.J. Wang, “Histogram-based Undetectable Fidelity Image in Steganography as MSB Controller,” ACM-Proceedings, The Second International Conference on Ubiquitous Information Management and Communication, presented in SKKU, Suwon, Korea, Jan. 2008.

No.

38

Article

S.J. Wang, Y.H. Chang, W.Y. Chiang, and W.S. Juang, “Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions,” IEEE-PROCEEDINGS, Forensics for Future Generation Communication Environments (F2GC) 2007, presented in Korea, Dec. 2007.

No.

39

Article

S.J. Wang, H.S. Chen, P.Y. Chen and Y.R. Tsai, “Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia,” IEEE-PROCEEDINGS, Future Generation Communication Networking (FGCN) 2007, presented in Korea, Dec. 2007.

No.

40

Article

S.J. Wang, Y.R. Tsai and P.Y. Chen, “Proactive (k, n) Threshold Secret Sharing Scheme with Variant k and n,” IEEE-PROCEEDINGS, 2007 International Conference on Intelligent Pervasive Computing, will be presented in Korea, Oct. 2007.

No.

41

Article

D.Y. Kao, F.F.Y. Huang, and S.J. Wang, “Maturity and Shame: Bringing Computer Ethics to Taiwan’s Juvenile Delinquents,” accepted in Australian and New Zealand Society criminology, the 20th Annual ANZSOC Conference, Adelaide, Australia, Sept. 2007.

No.

42

Article

C.H. Yang, S.J. Wang, and C.Y. Weng, “Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Steganography,” to present in IEEE-PROCEEDINGS, the third international Conference on Intelligent Information Hiding and Multimedia Signal Processing, Nov. 2007.

No.

43

Article

T.C. Wu, A. Perrig, W.S. Juang, M. Reiter, S.J. Wang, B.Y. Yang, C. Kuo, M. Luk, J. McCune, A. Studer, H.Y. Chen, C.W. Chen, X.Y. Chen, H.C. Chi, C.Y. Fu, Y.C. Lin, K. Tsay, and Z.R. Yang, “Remote authentication and ubiquitous trust establishment: scalable group key establishment," Proceedings of 2007 Second iCAST/CMU/TRUST Joint Conference on Security and Privacy Technologies, pp. 8-10, Taipei, Taiwan, June 2007.

No.

44

Article

S.J. Wang, J.Y. Lin, H.J. Ke, and Y.H. Chang “Targeted Secret Disclosures in Visual-based Watermarking Concealment Systems,” IEEE-PROCEEDINGS, International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), Seoul, Korea, April 2007.

No.

45

Article

S.J. Wang, Y.R. Tsai and J.W Chen, “A Countermeasure Against Frequent Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks,” IEEE-PROCEEDINGS, International Symposium on Wireless Pervasive Computing 2007, Puerto Rico, Feb. 2007.

No.

46

Article

D.Y. Kao, S.J. Wang, and F.F.Y. Huang, and Y.H. Chang “Inferring Social Network from Forensic Assessment Model of P2P Copyright Infringement,” The 3th Asia-Pacific International Conference on Knowledge management (KMAP2006), Hong Kong, Dec. 2006.

No.

47

Article

D.Y. Kao, S.J. Wang, and F.F.Y. Huang, “An Information Based Management on the Analysis of Internet Perpetrators,” The 3th Asia-Pacific International Conference on Knowledge management (KMAP2006), Hong Kong, Dec. 2006.

No.

48

Article

H.C.H. Ko, S.J. Wang, and I.S. Lin, “Flexible Key Management in Required Frequent Migrations upon Secret Sharing Scheme,” Proceedings of WISA 2006: The 7th International Workshop on Information Security Applications, Korea, Aug. 2006.

No.

49

Article

D.Y. Kao, S.J. Wang, and F.F.Y. Huang, "Digitized Forensic Investigation at P2P Copyright Controversy, Infringement," present in LNCS-PROCEEDINGS, International Conference on Intelligence and Security Informatics (IEEE ISI-2006), Lecture Notes in Computer Science (LNCS), published in Spring-Verlag, USA, May, 2006.

No.

50

Article

S.J. Wang, S. Chen and J.H. Hwang, “Survey of Cyber-security and a Fundamental of Geometric Common Key Agreement in MANETs,” to be presented in the IASTED International Conference on Networks and Communication Systems (NCS 2006), ISBN: 0-88986-590-6, March, Thailand, 2006. (ACTA Press)

No.

51

Article

S.J. Wang, H.J. Ke, and J.H. Hwang, “Concerns and Aftermath of Cracking Hash in Cyber-space,” International Forensic Science Symposium (IFS Symposium Taipei 2005), Nov., Taipei, Taiwan, 2005.

No.

52

Article

D.Y. Kao and S.J. Wang, "Evidences and Forensics at IP Address Clue in Cyber Crime," present in 17th Meeting of the International Association of Forensic Sciences, Hong-Kong, Aug. 2005.

No.

53

Article

S.J. Wang and C.H. Yang, "Gathering Digital Evidence in Response to Information Security Incidents," present in LNCS-PROCEEDINGS, International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Lecture Notes in Computer Science (LNCS), published in Spring-Verlag, Atlanta, Georgia, USA, May, 2005.

No.

54

Article

S.J. Wang, “Multicasting Secret Images using a Knapsack-like Cipher System,” to be presented in 17th International Conference on Computer Applications in Industry and Engineering (CAINE-2004), Orlando, Florida, USA, Nov. 2004. (INPEC)

No.

55

Article

Y.R. Tsai and S.J. Wang, “Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks,” presented in IEEE-PROCEEDINGS, IEEE VTC 2004-Fall with Wireless Technologies for Global Security, Sept. 2004, USA.

No.

56

Article

S.J. Wang and H.J. Ke, “Countermeasures in Curbing Gambling Activities on Internet in Taiwan,” presented in IEEE-PROCEEDINGS, IEEE Conference of 2003 International Carnahan Conference on Security Technology, Oct. 2003.

No.

57

Article

S.J. Wang and K.S. Yang, “Watermark Embedding Mechanism Using Modulus-based for Intellectual Property Protection on Image Data,” LNCS-PROCEEDINGS, E-Commerce and Web Technologies, Lecture Notes in Computer Science (LNCS), No. 2455, published by Springer-Verlag, 2002.

No.

58

Article

S.J. Wang, Patrick S. Chen and Y.C. Lin, “Log-in Authentication Based on Locating Centers of a Triangle,” presented in IEEE-PROCEEDINGS, IEEE TENCON 2002, held in Beijing of China in Sept. 2002.

No.

59

Article

S.J. Wang and C.H. Yang, “A Threshold-Verification Scheme to a Valid-signature Using the Identity Check,” Workshop Proceedings: The Seventh International Conference on Distributed Multimedia Systems with workshop on Cryptology and Network Security, Taiwan, Sept. 2001.

No.

60

Article

S.J. Wang and K.S. Yang, “A Scheme of High Capacity Embedding on Image Data Using Modulo Mechanism,” Proceedings of WISA 2001: The Second International Workshop on Information Security Applications, Seoul, Korea, Sept. 2001.

No.

61

Article

S.J. Wang and Y.H. Chang, “A Vowel-oriented Retrieval Scheme on Minimal Perfect Hashing Searching,” presented in Internal Computer Symposium (ICS-2000), held at Chi-Yi, National Cheng-Chung University, Dec. 6-8, 2000.

No.

62

Article

Wang, and J.F. Chang, “A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing,” LNCS-PROCEEDINGS, Database and Expert Systems Applications-DEXA’99, Lecture Notes in Computer Science (LNCS), No. 1677, published by Springer Verlag, 1999.

No.

63

Article

S. J. Wang and J. F. Chang, “An Efficient Access Control Scheme Based on Arithmetic Coding,” International Conference on Wireless Computer Communication: Emerging Business Opportunities (Infocom’94), Tata McGraw-Hill, New Delhi, India; 1995, 1995.

Academic Reports/Domestic Conferences

No.

1

Article

Y.T. Chang, C.T. Huang, and S.J. WANG, “VQ-Based Secret Embedding with High Compression Ratio,” presented in National Computer Symposium, Asia-University, Taiwan, Dec., 2013.

No.

2

Article

S.R. Wu and S.J. WANG, “Desktop Virtual Machine Operations in Evidence Investigations,” presented in National Computer Symposium, Asia-University, Taiwan, Dec., 2013.

No.

3

Article

Y.H. Zhang, S.R. Wu, and S.J. WANG, “Countermeasure of Information Warfare in Modern Network Security Accompanying with High-tech Developments,” 2013 7th Defense Forum on Regional Security (Second Part) and 5th Defense Net Assessment Forum 2013, National Defense University, Taipei, Dec. 2013.

No.

4

Article

D.Y. Kao and S.J. WANG, “Countermeasures of Preventing Hacking Crime in Views of Crime Habitats, Snowball Sampling Technique, and Social Networking Analysis,” 2013 Academic Forum in Crime Investigations, Taoyuan, Nov. 2013.

No.

5

Article

M.J. Chung and S.J. WANG, “Evidence Investigations in Forensics, in Case of Clouding Access with Data Synchronizations,” presented in TANET2013, National Chung Hsing University, Taichung, Oct., 2013.

No.

6

Article

S.R. Wu, C.C. Tsai, and S.J. WANG, “URL of Web Browsing in Forensics of Evidence Investigations,” presented in 2013 Symposium on Digital Life Technologies: Building a Safe, Secured and Sound (3S) Living Environment, DLT-2013, National Yunlin University of Science and Technology, June, 2013.

No.

7

Article

W.J. Wang, Y.H. Zhang, C.T. Huang, and S.J. WANG, “QR Code Applications and Authentications Based on Secret Sharing in Security Protections,” presented in Proceedings of the 23th National Conference on Information Security R.O.C., Taiwan, May, 2013.

No.

8

Article

M.J. Chung and S.J. WANG, “QR Code Forensics in the case of On-Line Game,” 2013 International Conference on Advanced Information Technologies, AIT-2013, April, Taichung, 2013.

No.

9

Article

S.R. Wu and S.J. WANG, “Virtual Forensics in Evidence Investigations,” 2013 International Conference on Advanced Information Technologies, AIT-2013, April, Taichung, 2013.

No.

10

Article

B.S. Ke, J.S. Lin, and S.J. WANG, “Forensic Analysis of Social Networking Application on iDevice with Delivered Message,” Proceedings of the 24th International Conference of Information Management (ICIM’2013), New Taipei, May, 2013.

No.

11

Article

Y.T. Chang, K.C. Deng, and S. J. WANG, “Line Forensics in Evidence Investigations for Illegal Activities,” Proceedings of the 24th International Conference of Information Management (ICIM’2013), New Taipei, May, 2013,

No.

12

Article

W.J. Kuo, J.S. Lin, and S.J. WANG, “Location-forensics in Smart-phone mobile systems,” presented in 2012 the 18th Conference of Information Management Research & Practice, R.O.C., National Taipei University of Technology, TAIWAN, Dec. 2012.

No.

13

Article

C.N. Chen, J.S. Lin, and S.J. WANG, “Prototype Detections of Malicious QR-code Scanning in Handed Smart-phone Systems,” presented in 2012 the 18th Conference of Information Management Research & Practice, R.O.C., National Taipei University of Technology, TAIWAN, Dec. 2012.

No.

14

Article

B.S. Ke, J.S. Lin, and S.J. WANG, “Forensics in Browsing of Privacy Mode and Evidence Investigations,” presented in 2012 Symposium on Digital Life Technologies: Building a Safe, Secured and Sound (3S) Living Environment, National Yunlin University of Science and Technology, Aug., 2012.

No.

15

Article

Y.C. Tso and S.J. WANG, “Mobile Forensics in Logical Digital Evidence Investigations upon iPhone Operations,” presented in Proceedings of the 22th National Conference on Information Security R.O.C., Taiwan, May, 2012.

No.

16

Article

C.W. Chen, S.J. WANG, and Y.R. Tsai, “Homomorphic One-Way Function Trees for Efficient Group Key Agreements,” presented in Proceedings of the 22th National Conference on Information Security R.O.C., Taiwan, May, 2012.

No.

17

Article

C.N. Chen, J.S. Lin, and S.J. WANG, “iPhone Forensics in QR Code Security,” presented in Proceedings of 2012 Conference in R.O.C. Military Academy, Taiwan, May, 2012.

No.

18

Article

C.N. Chen, J.S. Lin, H.C. Chang, and S.J. WANG, “iPhone Logical Acquisition to Digital Evidence in Case of XRY-operations,” presented in Proceedings of the 15th Information Management Conference in Central Police University, Taiwan, May, 2012.

No.

19

Article

B.S. Ke, J.S. Lin, and S.J. WANG, “Web Forensics by Using Google Keywords,” presented in The Second National Conference on Web Intelligence and Applications (NCWIA 2012), Taiwan, 2012.

No.

20

Article

C.T. Huang, Y.S. Hsu, Y.H. Chang, and S.J. WANG, “Key-map QR Code in Visual Cryptography with Undetectability,” presented in National Computer Symposium, National Chaiyi University, Taiwan, Dec., 2011.

No.

21

Article

C.Y. Weng, L.H. Ke, S.J. WANG and W.C. Tsai, “Video Watermarking for Copyright Protections,” presented in presented in 2011 the 17th Conference of Information Management Research & Practice, Chaiyi, Dec. 2011.

No.

22

Article

Y.C. Tso and S.J. WANG, “Crime Venue Investigations in iPhone Back-up Forensics,” presented in 2011 InternationalConference on University Basic computers Education and eLearning (iCube 2011), Tamkang Univ., Dec. 2011.

No.

23

Article

C.Y. Weng, Y.H. Chang, and S.J. WANG, “Integrated Framework in Cloud Computing Services in Case of Enforcement Information Systems,” presented in 2011 InternationalConference on University Basic computers Education and eLearning (iCube 2011), Tamkang Univ., Dec. 2011.

No.

24

Article

D.Y. Kao, A.S. Yin, and S.J. WANG, “Controversy in Wireless Network with Digital Forensics,” presented in 2011 InternationalConference on University Basic computers Education and eLearning (iCube 2011), Tamkang Univ.,, Dec. 2011.

No.

25

Article

W.J. Kuo and S.J. WANG, “The Study fo Mobiledit for Tool-Forensics,”2011 Forum of Digital Forensics and Tech-crime Investigations, Nov. 2011.

No.

26

Article

W.J. Kuo and S.J. WANG, “Memory Forensics in MSN Instant Message for Digital Evidence Investigations,” 2011, Cross-Strait, HONG-KONG, and MACAO, Conference of Police and Crime Issues, Hong-Kong, Oct. 2011.

No.

27

Article

Y.T. Chen and S.J. Wang, “The Forensic Investigation to a Web-site using Secret Sharing,” presented in Proceedings of the 21st National Conference on Information Security R.O.C., Taiwan, May, 2011.

No.

28

Article

Y.T. Fan and S.J. Wang, “Social Network Forensics upon Facebook Platform,” presented in Proceedings of the 21st National Conference on Information Security R.O.C., Taiwan, May, 2011.

No.

29

Article

Y.C. Tso and S.J. Wang, “Trend in Social Networking Forensics,” presented in The First National Conference on Web Intelligence and Applications (NCWIA 2011), Taiwan, 2011.

No.

30

Article

Y.T. Fan and S.J. Wang, “Effective Evidence in Quality Service Analysis,” presented in Conference of Electronic Commerce and Digital Life 2009 (ECDL 2011), Taipei, Taiwan, March 2011.

No.

31

Article

D.Y. Kao, Y.M. Ku, and S.J. Wang, “Digital Forensics in Mobile Evidence Investigations,” presented in 2011 Academic Forum in Criminal Police Study, Central Police University, Taiwan, March 2011.

No.

32

Article

C.Y. Weng, H.Y. Wu and S.J. Wang, “Reversible Data Hiding in Flexible Histogram Shifting,” presented in 2010 the 16th Conference of Information Management Research & Practice, National Yunlin University of Science and Technology, Taiwan, Dec. 2010.

No.

33

Article

S.W. Hwang, C.D. Hwang, and S.J. Wang, “Data Hiding in QR Code for High Capacity,” presented in TANET2010, National University of Tainan, OCT. 2010.

No.

34

Article

Y.T. Fan and S.J. Wang, “Evidence in Registry to Unveil Software Utilizations,” presented in 2010 International Conference on University Basic computers Education and eLearning (iCube 2010), Tamkang Univ., Dec. 2010.

No.

35

Article

D.Y. Kao, S.J. Wang and C.J. Tseng, “Evidence Analysis in PDCA-based Study for Internet Social Engineering,” presented in 2010 Academic Forum in Crime Investigations, Taiwan, Sept. 2010.

No.

36

Article

Y.T. Chen, S.J. Wang, and D.Y. Kao, “Data Hiding in Forensics for Web-site Investigations,” presented in 2010 Academic Forum in Crime Investigations, Taiwan, Sept. 2010.

No.

37

Article

Y.T. Chen, W.T. Fan, Y.M. Ku, and S.J. Wang, “Digital Forensics –Data in Memory Analysis,” Proceedings of the 21st International Conference of Information Management (ICIM’2010), Cheng-kung University, May, 2010.

No.

38

Article

Y.T. Fan and S.J. Wang, “RFID in the Applications to Information Security Order of Law Enforcement in Taiwan,” presented in 2010 International Conference on Advanced Information Technologies, AIT2010), April, Taichung, 2010.

No.

39

Article

D.Y. Kao, S.M. Liu, and S.J. Wang, “Evidence in Instant Message upon the Platform of PC and PDA,” presented in National Computer Symposium, National Taipei University, Taiwan, Nov., 2009.

No.

40

Article

D.Y. Kao, S.C. Wu, and S.J. Wang, “Evidence Analysis in Mobile Forensics,” presented in National Computer Symposium, National Taipei University, Taiwan, Nov., 2009.

No.

41

Article

S.J. Wang, H.Y. Chang, and J.S. Lin, “Hash-based Log-file Authentication for Investigation of Computer Forensics,” presented in Conference of Electronic Commerce and Digital Life 2009 (ECDL 2009), Taipei, Taiwan, March 2009.

No.

42

Article

S.J. Wang, L.C. Lin, and W.C. Chang, “Log-Forensics Detecting Intruders in Steganography,” 2008 the 14th Conference of Information Management Research & Practice, Soochow University, Taiwan, Dec., 2008.

No.

43

Article

S.J. Wang, and C.W. Wu, “T-Tool: Forensics Tool in Windows Systems for Investigations of Digital Evidence,” 2008 the 14th Conference of Information Management Research & Practice, Soochow University, Taiwan, Dec., 2008.

No.

44

Article

S.J. Wang and C.W. Chen, “Rootkit Debate in Trojan Defense in Compuer Forensics,” 2008 Symposium on Digital Life Technologies: Building a Safe, Secured and Sound (3S) Living Environment, National Cheng-kung University, June, 2008.

No.

45

Article

S.J. Wang, H.Y. Chang, and J.S. Lin, “Information Investigations in Network Forensics Using GUI Tools,” Proceedings of the 18th National Conference on Information Security R.O.C., Taiwan, May, 2008.

No.

46

Article

J.H. Huang, C.L. Chan and S.J. Wang, “Cyber-crime Investigations in the Utilizations of Forensic Tools,” Open Forum in Central Police University, May, Taiwan, 2008.

No.

47

Article

W.Y. Chiang, S.J. Wang, and J.S. Lin, “Ubiquitous-based RFID Establishing High-tech Society with High Security and Quality,” 2007 the 13th Conference of Information Management Research & Practice, Dec., 2007.

No.

48

Article

W.Y. Chiang, S.J. Wang, and J.S. Lin, “Fidelity Colour Multimedia Image with Adaptive Data Hiding on Projection Dimensions,” presented in National Computer Symposium, Taiwan, Dec., 2007.

No.

49

Article

S.J. Wang, H.H. Chen and T.Y. Lin, “Secure Transmission in Networks Using Visual Cryptography Systems,” TANET2007, National Taiwan University, Taiwan, Oct., 2007.

No.

50

Article

S.J. Wang, Y.H. Chang, and J.S. Lin, “Visual Authentications to User Log-in Mobile Computer Systems,” Proceedings of the 10th of Conference of Electronic Commence 2007, Taipei University, Taipei, Taiwan, Oct. 2007.

No.

51

Article

J.H. Hwang, S.J. Wang, and P.H. Hsieh, “Cookies Relevance to Digital Evidence and Preservation on Internet

No.

52

Article

Forensics,” to be presented in 2007 Symposium on Digital Life Technologies-Building a Safe, Secured and Sound (3S) Living, National Cheng-kung University, June, 2007.

No.

53

Article

W.Y. Chiang, S.J. Wang, and J.S. Lin, “Intelligent Information on Secret Sharing Functions in Law Enforcement Systems,” to be presented in Proceedings of the 17th National Conference on Information Security R.O.C., Taiwan, June, 2007.

No.

54

Article

S.J. Wang, I.S. Lin, and J.S. Lin, “Visual Two-way BAN-Logic Authentication in User Identity Systems,” Conference of Electronic Commerce and Digital Life 2007 (ECDL 2007), Shih Chien University, Taipei, Taiwan, March 2007.

No.

55

Article

S.J. Wang, D.Y. Lin, and J.S. Lin, “PRT Authentication in a Secure RFID System Curbing Hybrid Frequent Attacks,” Conference of Electronic Commernce and Digital Life 2007 (ECDL 2007), Shih Chien University, Taipei, Taiwan, March 2007.

No.

56

Article

S.J. Wang and S.Y. Yao, “Trusted Forensic Reports on the Basis Cross-verification in Tool Utilizations,” Conference of Electronic Commerce and Digital Life 2007 (ECDL 2007), Shih Chien University, Taipei, Taiwan, March 2007.

No.

57

Article

S.J. Wang, J.Y. Lin, and J.S. Lin, “Integrity Evidence for Chain of Custody in Signature Payload Embedding Systems,” 2006 the 12th Conference of Information Management Research & Practice, National Formosa University, Taiwan, Dec., 2006.

No.

58

Article

S.J. Wang, Y.H. Chang, and J.S. Lin, “Evidence Gathering to SSL-VPN-conncected Network Systems in Forensics,” Taiwan Conference Business and Information 2006, TBI2006), National Taipei Univ., Taipei, Taiwan, Nov. 2006.

No.

59

Article

S.J. Wang, C.H. Ko, and J.S. Lin, “Evidence Gathering to Copyright Controversy with Information Broadcast in Cyberspace,” Taiwan Conference Business and Information 2006, TBI2006), National Taipei Univ., Taipei, Taiwan, Nov. 2006.

No.

60

Article

S.J. Wang, I.S. Lin, and J.S. Lin, “Evidence Gathering to Social Engineering of Phishing Fraud in Cyberspace,” Taiwan Conference Business and Information 2006, TBI2006), National Taipei Univ., Taipei, Taiwan, Nov. 2006.

No.

61

Article

D.Y. Kao, S.J. Wang, and F.F.Y. Huang, “Cyber-crime in Computer-based Systems Increases the Need for Digital Forensic Analysis,” the Conference of Crime Investigation and Forensic Sciences, Taiwan, Nov. 2006.

No.

62

Article

S.J. Wang, C.C. Wu, and J.Y. Lin, “A Half-tone Scheme Embedding Digital Evidence Proof Ability in Forensic Sciences,” presented in Proceedings of the 16th National Conference on Information Security R.O.C., Taiwan, June, 2006.

No.

63

Article

S.J. Wang, H.C. Wang, and L.C. Lin, “Genetic Algorithms Highlighting the Stacked Secret in Visual Cryptography,” 2006 Symposium on Digital Life Technologies-Building a Safe, Secured and Sound (3S) Living, National Cheng-kung University, June, 2006.

No.

64

Article

S.J. Wang, S.H. Chen, H.J. Ke, J.H. Hwang, and Y.H. Chang, “Integrated Forensic Tools Operating in Information Security Incidents,” Conference of Electronic Commerce and Digital Life 2006 (ECDL 2006), National Taipei Univ., Taiwan, Feb., 2006.

No.

65

Article

S.Y. Yao and S.J. Wang, “Improved Remote Forensics on the Internet Systems,” 2005 the 11th Conference of Information Management Research & Practice, Shih Chien University, Taiwan, Dec., 2005.

No.

66

Article

S.J. Wang and D.Y. Kao, “Cybercrime Myths in the Justice Systems,” Proceedings of the 15th National Conference on Information Security R.O.C., National Sun Yat-Sen University, Taiwan, June, 2005.

No.

67

Article

S.J. Wang, H.J. Ke, S.H. Chen and C.H. Yang, “Proof Ability of Digital Photo Evidence in an Embedding System,” 2005 Symposium on Digital Life and Internet Technologies, National Cheng-kung University, June, 2005.

No.

68

Article

S.J. Wang, C.H. Kuo and C.H. Yang, “Visual Authentication Scheme to Multiple-Identify User in Computer-based Systems,” Proceedings of the 16th International Conference of Information Management (ICIM’2005), Fu Jen Catholic University, May, 2005.

No.

69

Article

S.J. Wang and D.Y. Kao, “Strategies to Combat the Invasion of Cyberspace from Within,” the Conference of Crime Investigation and Forensic Sciences, Taiwan, Nov. 2004.

No.

70

Article

S.J. Wang, S.C. Chen, H.W. Hwang, and J.H. Wen, “Adaptive Hierarchical Access Model in a Role-base System,” Proceedings of the 14th National Conference on Information Security R.O.C., National Taiwan University of Science and Technology, Taipei, June, 2004.

No.

71

Article

S.J. Wang,, C.H. Yang, Y.R. Liao, and C.H. Kuo, “Intellectual Rights Embedding Systems using VQ Coding,“ Proceedings of the 15th International Conference of Information Management, Chung-Yuan Christian University, Taipei, May, 2004.

No.

72

Article

S.J. Wang and H.J. Ke, “Chaotic Watermark against Intellectual Property on Secure Information Hiding,” 2003 Symposium on Digital YLife and Internet Technologies, National Cheng-kung University, Oct. 2003.

No.

73

Article

S.J. Wang, H.J. Ke, and W.J. Kuo, “Web Parser Design for Specified Web-site Search,” 2003 Symposium on Digital Life and Internet Technologies, National Cheng-kung University, Oct. 2003.

No.

74

Article

S.J. Wang and S.T. Yeh, “Fast Similar Image Search Based on the Partial Space Computing,” Proceedings of the 14th International Conference of Information Management, National Chung-Cheng University, Sept., 2003.

No.

75

Article

S.J. Wang and C.H. Lin, “Digital Audit Table on E-payment Systems,” Proceedings of the 14th International Conference of Information Management, National Chung-Cheng University, Sept., 2003.

No.

76

Article

S.J. Wang, H.J. Ke and C.H. Yen, “User Identification Scheme upon the Visual Cryptography,” Proceedings of the 13th National Conference on Information Security R.O.C., Cheng-Gung University, Aug. 2003.

No.

77

Article

C.Y. Yang and S.J. Wang, “Data Access Mode and User Authentication in a Enhanced CA system,” The 8th Conference of Information Management Research & Practice, Kaoshiung, Taiwan, Nov. 2002.

No.

78

Article

S.J. Wang , C.H. Lin and J.S. Lin, “Digital Evidence Investigation on E-payment Systems,” The Management of E-Commerce 2002, Taichung, Taiwan, Nov. 2002.

No.

79

Article

C.Y. Yang and S.J. Wang, “High-tech Countermeasures against Cybercrime,” The 6th Information Management and Law Enforcement Conference, Central Police University, Taoyuan, Taiwan, May, 2002.

No.

80

Article

S.J. Wang and H.F. Shih, “Fast Spatial Image Search System with Compact Space Utilization,” Proceedings of the 13th International Conference of Information Management (ICIM’2002), Taipei, May, 2002.

No.

81

Article

S.C. Chen, J.H. Wen and S.J. Wang, “A New Identity-Based and Generalized Group-Oriented Cryptographic Scheme,” Proceedings of the Twelfth National Conference on Information Security R.O.C., Taichung, May, 2002.

No.

82

Article

S.J. Wang and I.S. Lin, “High Capacity for Data Embedding Using Quadtree Coding,” Proceedings of the 12th National Conference on Information Security R.O.C., Taichung, May, 2002.

No.

83

Article

H.J. Ke, C.H. Lin and S.J. Wang, “Intellectual Rights Dispute from On-line Game,” Workshop of Relialbe Information System and Environment, National Chaio-Tung University, Taiwan, Dec. 2001.

No.

84

Article

S.J. Wang and C.S. Lin, “Efficient Image Search System Using Block-oriented extraction,” presented in CSIM2000, The 7th Conference of Information Management Research & Practice, Taipei, Taiwan, Dec. 2001.

No.

85

Article

S.J. Wang and D.Y. Kao, “Cybertrace for Digital Evidence,” Communications of the CCISA, Vol. 8, No. 1, Dec. 2001.

No.

86

Article

D.Y. Kao and S.J. W, “Some Cyber-crime Problems Related to the Law Protection, Violation, Enforcement and Information Forensics in the Information Society,” Information Security Newsletter, Vol. 7, No. 3, 2001.

No.

87

Article

S.J. Wang and D.Y. Kao, “The Bearing Duty of Network Malicious Programs Writing,”, Information Security Newsletter, Vol. 7, No. 1, 2000.

No.

88

Article

S.J. Wang and Y.C. Kuo, “A Secure Mechanism for a Small Amount of Fine Payment Acting on Internet Transaction,” presented in CSIM2000, The 6th Conference of Information Management Research & Practice, National Chaio-Tung University, Taiwan, Dec., 2000.

No.

89

Article

S.J. Wang and P.S. Hu, “The Scheme of Secure Pay-TV System with Cryptographic Key Management,” presented in TANET2000, National Chung-Kung University, Oct, 2000.

No.

90

Article

S.J. Wang and D.Y. Kao, “The Study of Source Investigation to Network Intruders with Torrential DoS attack,” Information and Education, Aug., 2000.

No.

91

Article

S.J. Wang and D.Y. Kao, “The Development and Jeopardy of Constraining Network Intrusion and Hacker Behavior,” Information Security Newsletter, Vol. 5, No. 3, pp. 97-106,1999.

No.

92

Article

D.Y. Kao and S.J. Wang, “The Study of Network Worms and Internet besieging Mechanism,” Communications of the Institute of Information and Computing Machinery, Vol. 2, No. 3, pp. 57-64,1999.

No.

93

Article

S. J. Wang, Y. R. Tsai and J. F. Chang, ‘A Group-Call Cryptographic Multicasting Scheme in Multilevel Trunked Mobile Radio Systems,’ Proceedings of the 9th National Conference on Information Security R.O.C., pp. 361-37, 1999.

General Magazines/Talks

No.

1

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXXII) -Cloud Forensics in Storage Evidence Investigations,” , PCuSER, Dec., 2013.

No.

2

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXXI) -iOS Forensics in Case of Evidence in FACEBOOK of Social Networking,” , PCuSER, Nov., 2013.

No.

3

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXX) -iOS Forensics in Case of Evidence Investigation with APP of Social Networking,” , PCuSER, Oct., 2013.

No.

4

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXIX) -Forensics in Smart-phone and Evidence seizure in Security Managements,” , PCuSER, Sept., 2013.

No.

5

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXVIII) -Cloud Computing Services with Digital Forensics,” , PCuSER, Aug., 2013.

No.

6

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXVII) -Hot Mobiles vs. Records in Forensics,” , PCuSER, July, 2013.

No.

7

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXVI) -iOS Forensics with Evidence Investigations,” , PCuSER, June, 2013.

No.

8

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXV) -Digital Forensics in Virtual Machine,” , PCuSER, May, 2013.

No.

9

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXIV) -App-LINE Forensics in iPHONE Systems,” , PCuSER, April, 2013.

No.

10

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXIII) -Quick Response vs. Quick Risk, with QR Forensics,” , PCuSER, March, 2013.

No.

11

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXII) -Identity Investigations in FACEBOOK Forensics,” , PCuSER, Feb., 2013.

No.

12

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXXI) -GPS Forensics in Social Networking Communications,” , PCuSER, Jan., 2013.

No.

13

Article

13. S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXX) - Wireless Access in Forensic Investigations,” , PCuSER, Dec., 2012.

No.

14

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXIX) - Forensics to Random Code in Browser,” , PCuSER, Nov., 2012.

No.

15

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXIII) -Jailbreak in iPhone Forensics,” , PCuSER, Oct., 2012.

No.

16

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXII) -Magic Keywords in Google Forensics,” , PCuSER, Sept., 2012.

No.

17

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXXI) -Check-in AT Face-book Forensic,” PCuSER, Aug., 2012.

No.

18

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVXXX) -Connect Truth with Evidence-Spy in Mobile Forensics,” , PCuSER, July, 2012.

No.

19

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXIX) -Your knowledge-Mobile Forensics with Development of Trends,” , PCuSER, June, 2012.

No.

20

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXVIII) -FBY:Forensics By Yourself,” , PCuSER, May, 2012.

No.

21

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXVII) -Forensics to Clouding Computing,” , PCuSER, April, 2012.

No.

22

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXVI) -The Third Party Tool-operations for iPhone Forensics,” , PCuSER, March, 2012.

No.

23

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXV) -Evidence Seizures for Skype Communicaitons,” , PCuSER, Feb., 2012.

No.

24

Article

S.J. WANG, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXIV) -iPhone Forensics using iTUNES,” , PCuSER, Jan., 2012.

No.

25

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXIII) -Forensics for Instant Message Packages,” , PCuSER, Dec., 2011.

No.

26

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXII) -Forensics to Facebook platform against cyber-crime,” , PCuSER, Nov., 2011.

No.

27

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXI) -Anti-Forensics in case of Multimedia-images – PART II,” , PCuSER, Oct., 2011.

No.

28

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LXI) -Anti-Forensics in case of Multimedia-images – PART I,” , PCuSER, Sept., 2011.

No.

29

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVII) -Digital Evidence Investigations in Mobile Systems,” , PCuSER, Aug., 2011.

No.

30

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LX) -Inspections to Evidence Under a variety of Forensic-tools,” , PCuSER, July, 2011.

No.

31

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LIX) -Digital Forensics in Mobiel Android System,” , PCuSER, June, 2011.

No.

32

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVIII) -Social Networking Forensics,” , PCuSER, May, 2011.

No.

33

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (LVI) -Social Engineering and Evidence in Cyber-crime venues,” , PCuSER, March, 2011.

No.

34

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (VL) -WINDOWS-Registry for Software Evidence in Forensics,” , PCuSER, Feb., 2011.

No.

35

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IVL) -Network Forensics against Wireless Intrustions,” , PCuSER, Jan., 2011.

No.

36

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXXXIII) -Steganography and Forensics,” , PCuSER, Dec., 2010.

No.

37

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXXXII) -Evidence Seizure from Metadata in Computer Forensics,” , PCuSER, Nov., 2010.

No.

38

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXXXI) -Forensics v.s. Anti-forensics,” , PCuSER, Oct., 2010.

No.

39

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXXX) -Digital Evidence in On-time Games,” , PCuSER, Sept., 2010.

No.

40

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IXXXXX) -Cloud Computing and Forensics,” , PCuSER, Aug., 2010.

No.

41

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXVIII) -Inner-steganography in Evidence Investigations,” , PCuSER, July, 2010.

No.

42

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXVII) -Pirated Mobile Investigations in Forensics,” , PCuSER, June, 2010.

No.

43

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXVI) -Evidence in Programming upon Forensics,” , PCuSER, May, 2010.

No.

44

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXV) -Bar-codes in the Applications of Forensics,” , PCuSER, April, 2010.

No.

45

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXIV) -Windows Family- Log-file Forensics,” , PCuSER, March, 2010.

No.

46

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXIII) -The Custody Chain to the Watermarking Evidence,” , PCuSER, Feb., 2010.

No.

47

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXII) -Evidence Reservation in DD Image Files,” , PCuSER, Jan., 2010.

No.

48

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXXI) -Mobile Forensics in Cope with Network Comunictions,” , PCuSER, Dec., 2009.

No.

49

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXX) -Watermarking embedding and Camera-forensics,” , PCuSER, Nov., 2009.

No.

50

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IXXXX) -Key door in digital forensics –Image File,” , PCuSER, Oct., 2009.

No.

51

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXVIII) -Memory Forensics,” , PCuSER, Sept., 2009.

No.

52

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXVII) -Evidence in PDA and Forensic Procedures in Cyber-crime,” , PCuSER, Aug., 2009.

No.

53

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXVI) -Evidence Investigations in Mobile handset with Digital Forensics,” , PCuSER, July, 2009.

No.

54

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXV) -Myths: Show Forensic Power to Vista in Window Systems,” , PCuSER, June, 2009.

No.

55

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IVXXX) -Countering: Steganography vs. Forensic Analysis,” , PCuSER, May, 2009.

No.

56

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXIII) -Evidence Investigations in Unix/Linux System Using the Power of TCT,” , PCuSER, April, 2009.

No.

57

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXII) -On-line Message and Forensics in Cyber-crime,” , PCuSER, March, 2009.

No.

58

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXXI) -New Generation USB: U-Key Applied to Information Security and Forensics,” PCuSER, Feb., 2009.

No.

59

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXX) -Remote Forensics in a Toolkit Operatoin -Helix 2.0,” , PCuSER, Jan, 2009.

No.

60

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IXXX) - Evidence Spider Spreading in Computer Forensics,” , PCuSER, Dec., 2008.

No.

61

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (VIIIXX) -Digital Evidence Investigations in P2P Network Systems,” , PCuSER, Nov., 2008.

No.

62

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (VIIXX) -Perspectives to PDA Forensics,” , PCuSER, Oct., 2008.

No.

63

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (VIXX) -Leading Tool in Forensics: Encase Studies,” , PCuSER, Sept., 2008.

No.

64

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (VXX) -Visual-table Maker in Forensic Analysis against Cyber-criminals,” , PCuSER, Aug, 2008.

No.

65

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IVXX) -Rootkit Utilization against Trojan Controversy on Computer Forensics,” , PCuSER, July, 2008.

No.

66

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXIII) -Watch out Conversation Evidence on Internet Forensics,” , PCuSER, June, 2008.

No.

67

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXII) -Audit to Trace the Key-Evidence in Computer Forensics,” , PCuSER, May, 2008.

No.

68

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XXI) -Accessible Digital Evidence Whereever the Investigation is required: Remote Forensics,” , PCuSER, April, 2008.

No.

69

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XX) -Helix of Live-CD,” , PCuSER, March, 2008.

No.

70

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IXX) -Digital Forensics in Open Systems with the Operations of TCT-ware,” , PCuSER, Feb., 2008.

No.

71

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XVIII) -Encase Guide and Enforcement Studies,” , PCuSER, Jan., 2008.

No.

72

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XVII) -FTK Guide and Enforcement Studies,” , PCuSER, Dec., 2007.

No.

73

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XVI) -Remote Forensics to lock the Suspicion in Network Systems,” , PCuSER, Nov., 2007.

No.

74

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XV) -Cyber-trail against Trojan Injection on Internet Forensics,” , PCuSER,Oct., 2007.

No.

75

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IXV) -Evidence Seizure at Cross-site Script (XSS) on Internet Forensics,” , PCuSER, Sept., 2007.

No.

76

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “State of the Art of Cryptography, Ever, Current and Future: Applications and Trend in Modern Computers & Communications (IV) -Key-stroke with Crypto-Forensics,” , PCuSER, Aug., 2007.

No.

77

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XIII) -Internet Forensics on Audit Records and Cyber-trails,” , PCuSER, July, 2007.

No.

78

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Security and Coding World (I) -Code History in Oriental and West,” Benesse, http://www.benesse.com.tw/, Editing Reviews, June, 2007.

No.

79

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XII) -VPN on Internet Forensics,” , PCuSER, June, 2007.

No.

80

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (XI) -Categories and Software Developments in Information Forensics,” , PCuSER, May, 2007.

No.

81

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (X) -Firewall Systems on Internet Forensics,” , PCuSER, April, 2007.

No.

82

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IX) -Cookies on the Internet Forensics,” , PCuSER, March, 2007.

No.

83

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (VIII) -Trust it of Cross-verification Forensic Tools,” , PCuSER, Feb., 2007.

No.

84

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Steganography of Multimedia for Privacy on the Internet (XI) -Genetic Connections to Visual Cryptography,” iThome,Vol. 23, PC home Publication Group, http://service.pchome.com.tw/, Oct., 2006.

No.

85

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (XI) -Benefits on the Internet and Tricks at Web-site Visits,” iThome,Vol. 22, PC home Publication Group, http://service.pchome.com.tw/, July, 2006.

No.

86

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Web Surveillance and Management on the Cyberspace (V) -Secure Web-mail Sytems Coping with the User-friendly Trends,” CONNECTIMES, The Instit ute for Information Industry, Jan., 2006.

No.

87

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (VII) -Countermeatures against the Attacks of BotNets in the Cyberspace,” CONNECTIMES, The Instit ute for Information Industry, Jan., 2006.

No.

88

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Steganography of Multimedia for Privacy on the Internet (X) -Text-based Information Hiding with Secret Transmissions,” CONNECTIMES, The Instit ute for Information Industry, Dec., 2005.

No.

89

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Web Surveillance and Management on the Cyberspace (IV) -Secure Email in Authentication and Privacy Requirements,” CONNECTIMES, The Instit ute for Information Industry, Nov., 2005.

No.

90

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Steganography of Multimedia for Privacy on the Internet (IX) - Explore the Secret behind the Multimedia Systems,” CONNECTIMES, The Instit ute for Information Industry, Oct., 2005.

No.

91

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (VI) -Where the Genuine Evidence is in a Digitized System,” CONNECTIMES, The Institute for Information Industry, Sep., 2005.

No.

92

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “State of the Art of Cryptography, Ever, Current and Future: Applications and Trend in Modern Computers & Communications (III) -Code-breaking in Communication Systems,” CONNECTIMES, The Institute for Information Industry, Aug., 2005.

No.

93

Article

S.J. Wang, (Information Cryptology and Construction Lab.),“Steganography of Multimedia for Privacy on the Internet (VIII)-The Discovery of Genetics on Visual Cryptography,” CONNECTIMES, The Institute for Information Industry, to appear in June, 2005.

No.

94

Article

S.J. Wang, (Information Cryptology and Construction Lab.),“Web Surveillance and Management on the Cyberspace (III)- The Risk Perspectives and Enhancements of Data Accessing to Clients in Network Systems,” CONNECTIMES, The Institute for Information Industry, May, 2005.

No.

95

Article

S.J. Wang, (Information Cryptology and Construction Lab.),“Digital Evidence and Forensics on the Computers and Network Systems (V)- Portable Live-CD Linux Systems on Computer Forensics,” CONNECTIMES, The Institute for Information Industry, April, 2005.

No.

96

Article

S.J. Wang, (Information Cryptology and Construction Lab.),“Steganography of Multimedia for Privacy on the Internet (VII)-The Applications of Visual Cryptography on Gray-Images” CONNECTIMES, The Institute for Information Industry, March, 2005.

No.

97

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (IV)- Authentication of Digital Evidence on Digital Photo-pictures,” CONNECTIMES, The Institute for Information Industry, Feb., 2005.

No.

98

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “State of the Art of Cryptography, Ever, Current and Future: Applications and Trend in Modern Computers & Communications (II) - Amazing Quantum in the Applications of Cryptography,” CONNECTIMES, The Institute for Information Industry, Jan., 2005.

No.

99

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “State of the Art of Cryptography, Ever, Current and Future: Applications and Trend in Modern Computers & Communications (I) -Art of Cipher in the War,” CONNECTIMES, The Institute for Information Industry, Dec., 2004.

No.

100

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Steganography of Multimedia for Privacy on the Internet (VI)-Watermarking and Intellectual Rights on Multimedia,” CONNECTIMES, The Institute for Information Industry, Nov., 2004.

No.

101

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Steganography of Multimedia for Privacy on the Internet (V)- Secure Concerns on a Variety of Colours in Visual Cryptography, CONNECTIMES, The Institute for Information Industry, Oct., 2004.

No.

102

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Wireless Communications on Security Demands, Authentication and Personal Privacy (II)-Ad Hoc Wireless Mobile Security, ”CONNECTIMES, The Institute for Information Industry, Aug., 2004.

No.

103

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Web Surveillance and Management on the Cyberspace (II)-SPAM at IP Spoofing,” CONNECTIMES, The Institute for Information Industry, July, 2004.

No.

104

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Wireless Communications on Security Demands, Authentication and Personal Privacy (I)-Sensor Networks come in the Wake of Network Sensors,” CONNECTIMES, The Institute for Information Industry, June, 2004.

No.

105

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Steganography of Multimedia for Privacy on the Internet (IV)-Decrypt Secert using Human Visual System,,” CONNECTIMES, The Institute for Information Industry, May, 2004.

No.

106

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Steganography of Multimedia for Privacy on the Internet (III)-Show up the Cybercrime on Steganography” CONNECTIMES, The Institute for Information Industry, April, 2004.

No.

107

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Steganography of Multimedia for Privacy on the Internet (II) --The Ways of Embedding Privacy into Multimedia?” CONNECTIMES, The Institute for Information Industry, March, 2004.

No.

108

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Web Surveillance and Management on the Cyberspace (I)-The Solutions against SPAM,” CONNECTIMES, The Institute for Information Industry, Feb., 2004.

No.

109

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Steganography of Multimedia for Privacy on the Internet (I)-Steganography and Information Hiding,” CONNECTIMES, The Institute for Information Industry, Jan., 2004.

No.

110

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (III)-John the Ripper,” Info.Com, The Institute for Information Industry, Dec., 2003.

No.

111

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (X)-Virtual Society on the Internet,” CONNECTIMES, The Institute for Information Industry, Nov., 2003.

No.

112

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (IX)-Cyber-identification,” CONNECTIMES, The Institute for Information Industry, Oct., 2003.

No.

113

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (II)-Intrusion and Incident Response,” Information Security, The Institute for Information Industry, Sept., 2003.

No.

114

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (VIII)- Cyber-community,” CONNECTIMES, The Institute for Information Industry, Sept., 2003.

No.

115

Article

S.J. Wang, (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (VII)-On-line Game behind Cyber-crime ,” CONNECTIMES, The Institute for Information Industry, Aug., 2003.

No.

116

Article

S. J. Wang (Information Cryptology and Construction Lab.), “PKI on the Internet(III)-Applications,” Information Security, The Institute for Information Industry, Aug., 2003.

No.

117

Article

S.J. Wang (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (VI)- Trick on the on-line Game,” CONNECTIMES, The Institute for Information Industry, July, 2003.

No.

118

Article

S.J. Wang (Information Cryptology and Construction Lab.), “PKI on the Internet(II)-Guideline,” Information Security, The Institute for Information Industry, June, 2003.

No.

119

Article

S.J. Wang (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (V)- Cyber-contraband,” CONNECTIMES, The Institute for Information Industry, June, 2003.

No.

120

Article

S.J. Wang (Information Cryptology and Construction Lab.), “PKI on the Internet(I)- Concept,” Information Security, The Institute for Information Industry, May, 2003.

No.

121

Article

S.J. Wang (Information Cryptology and Construction Lab.), “Digital Evidence and Forensics on the Computers and Network Systems (I)- Honey Pot,” Information Security, The Institute for Information Industry, April. 2003.

No.

122

Article

S.J. Wang (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (IV)-Cyber-pornography,” CONNECTIMES, The Institute for Information Industry, May, 2003.

No.

123

Article

S.J. Wang (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (III-2)-Forum on Intellectual Property Protection,” Info.Com, The Institute for Information Industry, Feb. 2003.

No.

124

Article

S.J. Wang (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (III-1)- Cyber-rumor,” Information Security, The Institute for Information Industry, Jan. 2003.

No.

125

Article

S.J. Wang (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (II)- Cyber-fraud and Cyber-intimidation,” Information Security, The Institute for Information Industry, Dec. 2002.

No.

126

Article

S.J. Wang (Information Cryptology and Construction Lab.), “High-tech Cyber-crime on the Computers and Internet (Ⅰ)- Money Laundering and Internet Gambling,” Information Security, The Institute for Information Industry, Nov. 2002.

Textbooks

No.

1

Topic

S.J. WANG, C.H. Lin, and R.L. Tso, Digital Forensics and Security in Applications of Computer and Mobile Systems (EU31309), s DrMaster book Inc., ISBN: 978-986-201-760-9,July, 2013.

No.

2

Topic

ICCL, - Digital Clues in Lives for Keeping Trace with Forensics, SCIENCE BOOK, scheduled for publication in 2014.

No.

3

Topic

ICCL, - Numbers, Cryptology and Forensics, SCIENCE BOOK, Scheduled for publication in 2014.

No.

4

Topic

S.J. WANG, C.H. Yang, and J.S. Lee, The Security in Computer, Network and Mobile-Service in Practice- Applying to High-tech Society (EU31215) , DrMaster book Inc., ISBN: 978-986-201-634-3, Sept., 2012.

No.

5

Topic

S.J. WANG, C.Y. Weng, and C.C. Lin, Digital Image Processing and Applications (EU31214), DrMaster book Inc., ISBN: 978-986-201-632-9, Aug., 2012.

No.

6

Topic

Book Chapter- Shiuh-Jeng WANG, Chen-Hsing Yang, and Yu-Ting Chen, Chapter 15: Polynomial-based image sharing, in the book of Visual Cryptography and Secret Image Sharing, Publisher: CRC Press/Taylor & Francis, ISBN-13: 9781439837214, Aug, 2011.

No.

7

Topic

S.J. Wang, C.H. Yang, C.L. Lei, and ICCL-FROG (Information Cryptology and Construction Lab. –Forensic Research development task force Group), Computer and Network Security in Practice- Applying to High-Tech Society, ISBN: 978-986-201-254-3, DrMaster book Inc. Aug., 2009.

No.

8

Topic

S.J. Wang, H.M. Sun, C.Y. Weng, and S.P. Hwang, “Steganalysis in Computer Forensics,”, Science and Technology Information Center, National Applied Research Laboratories,, scheduled in Sept., 2009.

No.

9

Topic

S.J Wang, C.H. Lin and ICCL-FROG (Information Cryptology and Construction Lab. –Forensic Research development task force Group), Forensics and Security in Computer Systems, ISBN: 978-986-201-196-6, DrMaster book Inc., March. 2009.

No.

10

Topic

S.J. Wang, Y.H. Chang, C.W. Chen and T.Y. Lin, “Visual Security Applications in Authentication safeguarding User Identities,” Science and Technology Information Center, National Applied Research Laboratories, Dec., 2007.

No.

11

Topic

H.J. Ke, S.J. Wang, J.H. Hwang, and C.L. Chan, “Warfare in Digital Evidence Investigations Reflecting Origination” , Science and Technology Information Center, National Applied Research Laboratories, Dec., 2007.

No.

12

Topic

S.J Wang, U.H. Ke, and ICCL-FROG (Information Cryptology and Construction Lab. –Forensic Research development task force Group), Computer Forensics and Digital Evidence - State of the Art in the Anti-cyber-crime with Security Tactics、 Computer Crime Prevention 、Authentication and Re-construction of Venue, ISBN: 978-986-201-004-4, DrMaster book Inc., June, 2007.

No.

13

Topic

S.J Wang, J.S. Ke, and ICCL (Information Cryptology and Construction Lab.), Information Multimedia Security--- Steganography and Watermarking, ISBN: 978-957-527-980-6, DrMaster book Inc., July, 2007.

No.

14

Topic

S.J Wang, D.Y. Kao, and ICCL(Information Cryptology and Construction Lab.), Information Security---State of the Art on Internet Security and Digital Forensics, ISBN: 978-957-527-946-2, DrMaster book Inc., Jan., 2007.

No.

15

Topic

C.H. Yang, S.J. Wang and I.S. Lin, “Trends and Managements in Information Multimedia Security,” Science and Technology Information Center, National Applied Research Laboratories, Dec., 2006.

No.

16

Topic

S.J. Wang, Y.H. Chang, J.H. Huang and D.Y. Kao, “Forensic Lab. Countermeasures in Anti-high-tech Crimes,” Science and Technology Information Center, National Applied Research Laboratories, Nov., 2006.

No.

17

Topic

S.J. Wang, J.Y. Lin, D.Y. Kao and C.H. Ke, “Evidence Discrimination under Intelligent Property in P2P Client-server Systems”, Science and Technology Information Center, National Applied Research Laboratories, July 2006.

No.

18

Topic

S.J. Wang, H.J. Ke, and ICCL(Information Cryptology and Construction Lab.), Information and Network Security---Eyes of Secret –State of the Art on Internet Security and Digital Forensics, ISBN: 957-527-890-9, DrMaster book Inc, March, 2006.

No.

19

Topic

S.J. Wang, D.Y. Kao, C.T. Wu and A.C. Chiang, “Information Security in Evidence and Forensic Science,” Special Issue (I) in Information and Communications Forum, ISBN: 957-619-130-0, Science and Technology Information Center, National Applied Research Laboratories, Dec. 2005.

No.

20

Topic

S.J. Wang, H.J. Ke, and ICCL (Information Cryptology and Construction Lab.), Cryptography and Network Security-development, theory & applications, ISBN: 957-527-690-6, DrMaster book Inc, May, 2004.

No.

21

Topic

D.Y. Kao, S.J Wang, and ICCL (Information Cryptology and Construction Lab.), Information Security, ISBN: 957-527-605-1, DrMaster book Inc., June, 2003.

No.

22

Topic

S.J. Wang (Editor), Information & Communication Security Series (Vol. IV): System Security, STIC-RSR-091-10, ISBN: 957-619-077-0, Science and Technology Information Center, National Science Council, ROC Dec. 2002.

No.

23

Topic

S.J. Wang, Police Technology: Network besieged Mechanism and Information Security, ISBN: 957-112-418-4, Wu-Nan Book Inc., Taiwan, March, 2001.

Life and Literature

codes in lives

either AT BLOG https://hera.secforensics.org/life-rainbow/

More AT http://blog.xuite.net/icclsjwang/wretch