學術期刊論文
發表國際學術研討會論文/論文叢書
發表國內學術研討會論文/雜誌論述
一般性著述/雜誌
相關著作/編輯專書
建議讀物/資安秘笈/Case Study
散文集選

學術期刊論文

編號

1

名稱

C.T. Huang, L.C. Lin, C.H.Yang, and S.J. WANG, “Dynamic embedding strategy of VQ-based information hiding approach,” accepted in Journal of Visual Communication and Image Representation, Vol. 59, pp. 14-32, Feb. 2019. (SCI)

編號

2

名稱

C.T. Huang, M.Y. Tsai, L.C. Lin, W.J. Wang, and S.J. WANG, “VQ-based Data Hiding in IoT Networks Using Two-level Encoding with Adaptive Pixel Replacements,” Journal of Supercomputing, Vol. 74, Issue 9, pp. 4295-4314,Sept. 2018. (SCI)

編號

3

名稱

C.Y. Yang, C.T. Huang, Y.P. Wang, Y.W. Chen, and S.J. WANG, “File Changes with Security Proof Stored in Cloud Service Systems,” Personal and Ubiquitous Computing, Vol. 22, Issue 1, pp. 45-53, Feb. 2018. (SCI)

編號

4

名稱

C.T. Huang, C.H. Yang, W.J. Wang, S.R. Tsui, and S.J. WANG, “Raw Reversibility of Information Hiding on the Basis of VQ Systems,” Journal of Supercomputing, Vol. 74, Issue 8, pp. 3748–3777, Aug. 2018. (SCI)

編號

5

名稱

C.T. Huang, Y.H. Zhang, L.C. Lin, W.J. Wang, and S.J. WANG, “Mutual authentications to parties with QR-code applications in mobile systems,” International Journal of Information Security, Vol. 16, Issue 5, pp. 525–540, Oct. 2017. (SCI)

編號

6

名稱

W.J. Wang, C.T. Huang, S.R. Tsuei, and S.J. WANG, “A Greedy Steganographic SMVQ Approach of Greedy-USBIRDS Using Secret Bits for Image-block Repairing Based on Differences,” Multimedia Tools and Applications, Vol. 75, Issue 22, pp 14895–14916, Nov. 2016. (SCI)

編號

7

名稱

F.H. Hsu, M.H. Wu, S.C. Ou, and S.J. WANG, “Data Concealments with High Privacy in New Technology File System,” Journal of Supercomputing, Vol. 72, Issue 1, pp 120–140, Jan. 2016. (SCI)

編號

8

名稱

C.T. Huang, Y.T. Chang, and S.J. WANG, “Evidence Revelations at Memory Forensics in Conversations of Instant Messages,” Forensic Science Journal, Vol. 16, No. 1, pp. 59-67, Dec. 2015.

編號

9

名稱

Y.T. Chang, C.T. Huang, C.L. Huang, and S.J. WANG, “Data Hiding of High Compression Ratio in VQ Indices with Neighboring Correlations,” Multimedia Tools and Applications, Vol. 74, No. 5, pp. 1645-1666, 2015. (SCI)

編號

10

名稱

Y.T. Chang, K.C. Teng, Y.C. Tso, and S.J. WANG, “Jailbroken iPhone Forensics for the Investigations and Controversy to Digital Evidence,” Journal of Computers, Vol. 26, No. 2, July, 2015. (EI)

編號

11

名稱

F.H. Hsu, M.H. Wu, Y.W. Chang, and S.J. WANG, “Web Security in a Windows System as PrivacyDefender in Private Browsing Mode,” Multimedia Tools and Applications, Vol. 74, pp. 1667-1688. 2015. (SCI).

編號

12

名稱

W.J. Wang, C.T. Huang, and S.J. WANG, “VQ-encoded Images in Reversible Data Hiding of High Bit-compression-ratio,” Imaging Science Journal, Vol. 63. No. 1, pp. 24-33, 2015. (SCI)

編號

13

名稱

W.J. Wang, C.T. Huang, C.H. Yang, and S.J. WANG, “VQ-based Algorithms Extended to Non-embedded Watermarking for Multimedia Ownership Prevention Systems,” Peer-to-Peer Networking and Applications, Vol. 7, Issue 4, pp. 676-686, Dec. 2014. (SCI)

編號

14

名稱

F.H. Hsu, M.H. Wu, C.H. Yang, and S.J. WANG, “Visible Watermarking with Reversibility of Multimedia Images for Ownership Declarations,” Journal of Supercomputing, Oct., Vol. 70, Issue 1, pp. 247-268, 2014. (SCI)

編號

15

名稱

B.S. Ke, J.S. Lin, S.J. WANG, and H.K. Tso, “Private Browsing Evidence of Google History Investigations in Computer Forensics,” Journal of e-Business, http://jeb.cerps.org.tw/ , Vol. 16, No. 1, pp. 85-106, March, 2014. (TSSCI)

編號

16

名稱

F.H. Hsu, M.H. Wu, C.H. Yang, and S.J. WANG, “Image Reversibility in Data Embedding on the Basis of Blocking-Predictions,” Peer-to-Peer Networking and Applications, Vol. 7, Issue 4, pp. 723-736, Dec. 2014. (SCI)

編號

17

名稱

D.Y. Kao and S.J. WANG, “A Proactive Investigative Strategy on Advanced Persistent Threat of Hacker Alliance,” Police Science Quarterly, Vol. 45, No. 3, pp. 1-19, Nov. 2014.

編號

18

名稱

F.H. Hsu, M.H. Wu, and S.J WANG, “Reversible Data Hiding Using Side-match Predictions on Steganographic Images,” Multimedia Tools and Applications, Vol. 67, Issue 3, pp. 571-591, Dec. 2013. (SCI)

編號

19

名稱

S.R. Wu and S.J. WANG, “Forensics in Virtual Machine with Evidence Investigations of Image Files,” International Journal of Advanced Information Technologies, Vol. 7, No. 2, pp. 44-50, Dec. 2013.

編號

20

名稱

H.M. Sun, C.Y. Weng, S.J. WANG, and C.H. Yang, “Data Embedding in Image-media using Weight-function on Modulo Operations,” ACM Trans. on Embedded Computing Systems, Vol. 2, Issue 2, http://acmtecs.acm.org/index.htm Feb. 2013. (SCI)

編號

21

名稱

Y.T. Chang, C.T. Huang, and S.J. WANG, “Image Interpolating based Data Hiding in Conjunction with Pixel-Shifting of Histogram,” Journal of Supercomputing, Vol. 66, Issue 2, pp. 1093-1110, Nov. 2013. (SCI)

編號

22

名稱

W.J. Wang, C.T. Huang, C.M. Liu, P.C. Su, and S.J. WANG, “Data Embedding for Vector Quantization Image Processing on the Basis of Adjoining State-Codebook Mapping,” Information Sciences, Vol.. 246, pp. 69–82, 2013. (SCI)

編號

23

名稱

C.Y. Weng, C.I Fan, Y.H. Chang, and S.J. WANG, “An Image Authentication for Secret on the Basis of Steganographic Immunization to HVS,” accepted in Journal of Telecommunication SystemsPublication, 2013. (SCI)

編號

24

名稱

C.Y. Weng, Y.H. Zhang, and S.J. WANG, “Visible watermarking images in high quality of data hiding,” Journal of Supercomputing, Vol. 66, Issue 2, pp. 1033-1048, Nov., 2013. (SCI)

編號

25

名稱

F.H. Hsu, M.H. Wu, S.J. WANG, and C.L. Huang, “Reversibility of Image with balanced Fidelity and Capacity upon Pixels Differencing Expansion,” Journal of Supercomputing, Vol. 66, Issue 2, pp. 812-828, Nov. 2013. (SCI)

編號

26

名稱

C.W. Chen, S.J. WANG, and Y.R. Tsai, “Cost-Saving Key Agreement via Secret Sharing in Two-Party Communication Systems,” Journal of Convergence (JoC), http://www.ftrai.org/joc/ publication, 2013.

編號

27

名稱

H.C. Chen, S.J. WANG, and J.H. Wen, “Role-based Proactive Scheme in an Access Control Hierarchy,” Journal of Statistics & Management Systems, Vol. 10, No. 6, pp. 817-835, 2013. (EI)

編號

28

名稱

C.Y. Weng, S.J. WANG, Jonathan Liu, and D. Goyal, “Prediction-based Reversible Data Hiding Using Empirical Histograms in Images,” KSII Trans. on Internet and information systems, Vol. 6, No. 4, April, pp. 1248-1266, 2012. (SCI)

編號

29

名稱

W.J. Wang, C.T. Huang, S.W. Huang, and S.J. WANG, “Dual Hiding in QR Code Applications of Image Processing,” Journal of Information Management, Vol. 19, No. 4., pp. 769-784. 2012. (TSSCI, Taiwan Social Science Citation Index)

編號

30

名稱

C.T. Huang, W.J. Wang, C.H. Yang, and S.J. WANG, “A Scheme of Reversible Information Hiding Based on SMVQ,” Imaging Science Journal, Vol. 59, No. 5, 2012. (SCI)

編號

31

名稱

C.Y. Weng, H.K. Tso, and S.J. WANG, “Steganographic Data Hiding in Image Processing Using Predictive Differencing,” Opto-Electronics Review, Vol. 20, No. 2, pp. 126-133, 2012. (SCI)

編號

32

名稱

D.Y. Kao, J.J. Zeng, and S.J. WANG, “Applying an Iterative PDCA Management Process to the Forensic Analysis of Social Engineering Technique,” Journal of Advanced Technology and Management, Vol. 1, No. 1, May 2011

編號

33

名稱

C.H. Yang, W.J. Wang, C.T. Huang, and S.J. Wang, “Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images,” Information Sciences, Vol. 181, Issue 11, June, pp. 2218–2230, 2011. (SCI)

編號

34

名稱

W.J. Wang, C.T. Huang, and S.J. Wang, “VQ Applications in Steganographic Data Hiding upon Multimedia-images,” IEEE System Journals, Vol. 5, Issue 4, pp. 528 – 537, 2011. (SCI)

編號

35

名稱

C.H. Yang, C.Y. Weng, H.K. Tso, and S.J. Wang, “A Data Hiding Scheme Using the Varieties of Pixel-value Differencing in Multimedia Images,” Journal of Systems and Software, Vol. 84, pp. 669–678, 2011. (SCI)

編號

36

名稱

C.T. Huang,, W.J. Wang, and S.J. Wang, “A Novel Data Hiding and Reversible Scheme Using SMN Blocks in VQ-Compressed Images,” Opto-Electronics Review, Vol. 19, Issue 2, pp. 225-233, June, 2011. (SCI)

編號

37

名稱

S.J. Wang, Y.R. Tsai, and C.C. Shen, “Verifiable Threshold Scheme in Multi-secret Sharing Distributions upon Extensions of ECC,” Wireless Personal Communications, Springer, Vol. 56, No. 1, pp. 173-182, Jan. 2011. (SCI)

編號

38

名稱

C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Varied PVD+LSB Evading Detection Programs to Spatial Domain in Data Embedding Systems,” Journal of Systems and Software, Vol. 83, pp. 1635-1643, 2010. (SCI)

編號

39

名稱

D.Y. Kao, S.J. Wang, and Frank F.Y. Huang “' SoTE: Strategy of Triple-E on Solving Trojan Defense of Cyber-crime Case,” The Computer Law & Security Review - The International Journal of Technology Law and Practice (Elsevier), www.elsevier.com/locate/clsr, Vol. 26, pp. 52-60, 2010. (SCI)

編號

40

名稱

C.H. Yang and S.J. Wang, “Transforming LSB Substitution for Image-based Steganography in Matching Algorithms,” Journal of Information Science and Engineering, Vol. 26, pp. 1191-1212, 2010. (SCI)

編號

41

名稱

S.J. Wang, Y.R. Tsai, C.C. Shen, and P.Y. Chen, “Hierarchical key derivation scheme for group-oriented communication systems, “ Int. Journal of Information Technology, Communications and Convergence, http://www.inderscience.com/ Inderscience Publishers, Vol. 1, No. 1, pp. 66-76, 2010.

編號

42

名稱

C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Capacity-raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations,” Fundamenta Informaticae, Vol. 98, pp. 321-336, 2010. (SCI)

編號

43

名稱

C.H. Yang, C.Y. Weng, S.J. Wang�x, and H.M. Sun, “Grouping Strategies for Promoting Image Quality of Watermarking on the Basis of Vector Quantization,” Journal of Visual Communication and Image Representation, Vol. 21, No. 1, pp. 49-55, 2010. (SCI)

編號

44

名稱

S.J. Wang and D.Y. Kao, "The IP Address and Time in Cyber-crime Investigation," Policing: An International Journal of Police Strategies & Management, Vol. 32. Issue 2, pp. 194-208, 2009. (SCI).

編號

45

名稱

C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Codebook-linked Watermarking Scheme on Digital Images in Steganography,” Fundamenta Informaticae, Vol. 92, pp. 397-409, 2009. (SCI)

編號

46

名稱

S.J. Wang, D.Y. Kao, and Frank F.Y. Huang, “Procedure Guidance on Internet Forensics Coping with Copyright Arguments of Client-Server-based P2P Models,” International Journal Computer Standards & Interfaces, Vol. 31, pp. 795-800, 2009. (SCI)

編號

47

名稱

S.J. Wang, Y.R. Tsai, P.Y. Chen, and C.C. Shen, “A Scheme of Image-based Signature Verification upon Secret Sharing for Shopping in E-commerce Systems,” Journal of Computers, Vol. 20, No. 2, 2009. (EI)

編號

48

名稱

D.Y. Kao, Frank F.Y. Huang, and S.J. Wang, “'Persistence and Desistance: Examining the Impact of Reintegrative Shaming to Ethics in Taiwan Juvenile Hackers',” The Computer Law & Security Review - The International Journal of Technology Law and Practice (Elsevier), www.elsevier.com/locate/clsr, Vol. 25, Issue 5, September 2009, pp. 464-476, 2009. (SCI)

編號

49

名稱

S.J. Wang�y, I.S. Lin, L.C. Lin, and W.Y. Chiang, “A Secret Sharing Authentication Scheme for Digital Images,” Journal of Computers, Vol. 20, No. 1, April, 2009. (EI)

編號

50

名稱

S.J. Wang, J.Y. Lin, H.J. Ke, and S.W. Lin, “Visual-based Embedding Systems with Targeted Secret Disclosures and Applications,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 04, No. 1, pp. 44-53, 2009. (EI)

編號

51

名稱

C.H. Yang, C.Y. Weng, S.J. Wang�x, and H.M. Sun, “Adaptive Data Hiding in Edged Areas of Images with Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security, Vol. 3, Issue 3. pp. 488-497, Sept. 2008. (SCI)

編號

52

名稱

C.W Chen, S.J. Wang, and Y.R. Tsai, “TLPKA: Pairwise Key Agreement Based on the Geometrical Property of the Tangent Line in Ad Hoc Network Systems,” International Journal of Hybrid Information Technology, Vol. 2, No. 4, 2008. (EI).

編號

53

名稱

H.C. Chen, S.J. Wang, and J.H. Wen, “A Cryptographic Key Assignment Scheme with Adaptable Time-token Constraint in a Hierarchy,” International Journal of Multimedia and Ubiquitous Computing, Vol. 3, No. 4, 2008. (EI)

編號

54

名稱

S.J. Wang, Y.R. Tsai and P.Y. Chen, “Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System,” Journal of Computers, Vol. 19, No. 1, April, 2008. (EI)

編號

55

名稱

C.H. Yang, S.J. Wang, C.Y. Weng, and H.M. Sun, “Information Hiding Technique Based on Blocked PVD,” Journal of Information Management, Vol. 15, No. 3, pp. 29-48, 2008. (TSSCI, Taiwan Social Science Citation Index)

編號

56

名稱

S.J. Wang, Y.H. Chang, and J.S. Lin, “A Visual-based Authentication Scheme in Wireless Carry-on Laptop Systems,” Electronic Commerce Studies, Fall, 2008. (TSSCI, Taiwan Social Science Citation Index)

編號

57

名稱

S.J. Wang, J.H. Huang, S.Y. Yao and C.L. Chan, “Digital Evidence Seizure in Remote Firewall-based Systems on Internet Forensics,” Journal of e-Business, Vol. 10, No. 1, pp. 235-254, March, 2008. (TSSCI, Taiwan Social Science Citation Index)

編號

58

名稱

S.J. Wang, H.C. Wang, and L.C. Lin, “Genetic Algorithms Highlighting the Target Secret in Visual Cryptography,” Journal of Information Management, Vol. 15, No. 2, pp. 85-108, April 2008. (TSSCI, Taiwan Social Science Citation Index)

編號

59

名稱

S.J. Wang, K.L. Lin, Y.H. Chang, W.Y. Chiang, and J.H. Huang, “Unveiling Controversy of Trojan Defense on Internet Forensics,” The Journal of Forensic Sciences, Vol. 65, 2008.

編號

60

名稱

S.J. Wang, H.C. Shu, Y.H. Chang, J.H. Hwang, “Immigration E-records in Secure Hierarchical Management upon Forensic Information Demands,” The Journal of Forensic Sciences, Vol. 63, 2008.

編號

61

名稱

S.J. Wang, Y.H. Chang, H.J. Ke, and W.S. Juang, “Digital Evidence Seizure in Network Intrusions against Cyber-crime on Internet Systems,” Journal of Computers, Jan. 2008. (EI)

編號

62

名稱

S.J. Wang, Y.R. Tsai, and J.W. Chen, “Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks,” Journal of Communications, Vol. 03, Issue 01, pp. 20-26, 2008. (EI)

編號

63

名稱

H.C. Chen, S.J. Wang, and J.H. Wen, “Packet Construction for Secure Conference Call Request in Ad Hoc Network Systems,” Information Sciences, Vol. 177, pp. 5598-5610, 2007. (SCI)

編號

64

名稱

S.J. Wang, “Information Hiding at Oblivious Watermarking Scheme upon Alternative Threshold in Spatial Domains,” Journal of Discrete Mathematical Science & Cryptography, Vol. 10, No. 3, pp. 359-384, 2007, Taru publications, India. (EI)

編號

65

名稱

S.J. Wang and D.Y. Kao, "Internet Forensics on the Basis of Evidence Gathering with Peep Attacks," International Journal Computer Standards & Interfaces, Vol. 29, pp. 423-429, 2007. (SCI)

編號

66

名稱

S.J. Wang, H.J. Ke, J.H. Huang, and C.L. Chan, “Hash Cracking and Aftereffect on Authentication Procedures in Cyberspace,” IEEE Aerospace & Electronics Systems Magazine, Vol. 22, Issue 1, pp. 3-7, Jan. 2007. (SCI)

編號

67

名稱

H.C. Chen, S.J. Wang, and J.H. Wen, “A Key Distribution Scheme for Live Multi-session upon Generalized Group-Oriented Cryptography,” the Far East Journal of Mathematical Sciences, Vol. 26, Issue 2, pp. 359-391, 2007. (EI)

編號

68

名稱

S.J. Wang, J.Y. Lin, and J.H. Huang, “Internet Forensics with the Digital Evidence Investigations in Cyber-casino Scenarios,” Journal of Forensic Sciences, Vol. 62, pp. 99-116, 2007.

編號

69

名稱

S.J. Wang, Y.R. Tsai, L.S. Chiu, and I.S. Lin, “Mutually Identity Authentication in GSM-based Anonymous Communications,” Journal of Computers, Vol. 18, No. 2, pp. 33-46, July, 2007. (EI)

編號

70

名稱

S.J. Wang, “Measures of Retaining Digital Evidence to Prosecute Computer-based Cyber-crime,” International Journal Computer Standards & Interfaces (SC&I), Vol. 29, No. 2. pp. 216-223, Jan., 2007. (SCI)

編號

71

名稱

Y.R. Tsai and S.J. Wang, “Two-tier Authentication for Cluster and Individual Sets in Mobile Ad Hoc Networks,” Computer Networks, Vol. 51, pp. 883-900, 2007. (SCI)

編號

72

名稱

S.J. Wang, “Key Management of Secret Sharing in Frequent Migrations for Job Environments,” Far East Journal of Applied Mathematics, Vol. 27, No. 2, 2007. (EI)

編號

73

名稱

S.J. Wang and P.S. Hu, “Key Management for Pay-TV Broadcast Systems in Hierarchy,” Journal of Discrete Mathematical Science & Cryptography, Vol. 9, No. 3, pp. 449-496, Dec. 2006, Taru publications, India. (EI)

編號

74

名稱

S.J. Wang, “Procedural Response and Digital Evidence Exposure in Information Security Incidents,” Journal of Discrete Mathematical Science & Cryptography, Vol. 9, No. 3, pp. 417-427, Dec. 2006, Taru publications, India. (EI)

編號

75

名稱

J.H. Huang, S.J. Wang, A.C. Chiang and Y.L. Hwang, “Real-time Response against Abnormal Invasion in the case of Applications Using NetKeeper Systems,” The Journal of Forensic Sciences, Vol. 61. pp. 153-170, 2006.

編號

76

名稱

S.J. Wang, “Fundamental Common Key Establishment in MANETs upon Geometric Mathematics,” Far East Journal of Mathematical Sciences, Vol. 23, Issue 1, pp. 127-135, Oct., 2006. (EI)

編號

77

名稱

S.J. Wang and D.Y. Kao, "Invasions of Malware in Cyber-space and Countermeasures Improving Cyber-security," ACM Operating Systems Review (ACM OSR), Accepted in June, 2006. (EI)

編號

78

名稱

S.J. Wang, C.C. Wu, and C.Y. Lin, “In View of Completeness and Proof Ability of Digital Photo Evidence upon Watermarking Authentication Schemes in Forensic Sciences,” Communications of the CCISA, Vol. 12, No. 2, April, 2006.

編號

79

名稱

C.H. Yang and S.J. Wang, “Weighted Bipartite Graph for Locating Optimal LSB Substitution for Secret Embedding,” Journal of Discrete Mathematical Science & Cryptography, Vol. 9, No. 1, pp. 153-164, April, 2006, Taru publications, India. (EI)

編號

80

名稱

S.J. Wang, H.J. Ke, J.H. Huang and S.H. Chen, “Evidence Ability Study Based upon Wartermarking KH-scheme in Digital Forensics,” The Journal of Forensic Sciences, Vol. 60, pp. 115-134, March 2006.

編號

81

名稱

S.J. Wang, C.H. Yen, I.S. Lin and H.H. Chen, “Authentication System on the Basis o f Visual-based Recognitions,” Journal of Computers, Vol. 16, No. 5, 2005. (EI)

編號

82

名稱

C.H. Yang and S.J. Wang, “Accelerating VQ-based Codeword Search on the Basis of Partial Search Strategy,” International Journal Computer Standards & Interfaces, Vol 28, No. 2, pp. 231-240, 2005. (SCI)

編號

83

名稱

S.J. Wang, Y.R. Tsai, and James Chen, “Node Communications in View of Security upon Ad Hoc Networks,” Communications of the CCISA, Vol. 11, No. 4, Oct., 2005.

編號

84

名稱

J.H. Huang, H.J. Ke, S.J. Wang, and P. F. Chung, “Linux-based Firewall Mechanism of iptables in Information Security District Systems,” The Journal of Forensic Sciences, Vol. 59, pp. 63-80, Sept., 2005.

編號

85

名稱

S.J. Wang, “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image,” Applied Mathematics and Computation, Vol. 164, pp. 99-116, May, 2005. (SCI)

編號

86

名稱

S.J. Wang, “Vowel-consonant Addressing Mode on Hashing for English Letter-oriented Keys,” Journal of Discrete Mathematical Science & Cryptography, Vol. 8, No. 1, pp. 1-25, April, 2005, Taru publications, India. (EI)

編號

87

名稱

S.J. Wang and C.H. Yang, “Hierarchy-oriented Searching Algorithms Using Alternative Duplicate Codewords for Vector Quantization Mechanism,” Applied Mathematics and Computation, Vol. 162, No. 2, pp. 559-576, March, 2005. (SCI)

編號

88

名稱

S.J. Wang and C.M. Chuang, “Anonymous Message Communications with User Hierarchy in a Multicast System,” Applied Mathematics and Computation, Vol. 159, No. 1, pp. 95-112, Nov., 2004. (SCI)

編號

89

名稱

S.J. Wang, “Anonymous Wireless Authentication on a Portable Cellular Mobile System,” IEEE Transactions on Computers, Vol. 53, No. 10, Oct., pp. 1317-1329, 2004.(SCI)

編號

90

名稱

H.C. Chen, S.J. Wang, and J.H. Wen, “Models for Role-based Hierarchical Access Control Organizations,” Communications of the CCISA, Vol. 10, No. 4, Oct., 2004.

編號

91

名稱

S.J. Wang, “Direct Construction of a Secret in Generalized Group Oriented Cryptography,” International Journal Computer Standards & Interfaces, Vol. 26, No. 5, pp. 455-460, Sept., 2004. (SCI)

編號

92

名稱

S.J. Wang, “Threshold Verification Scheme to a Valid-signature Using Identity Only on Specialized Approval,” Applied Mathematics and Computation, Vol. 152, No. 2, pp. 373-383, May, 2004. (SCI)

編號

93

名稱

S.J. Wang and H.J. Ke, “Curbing Gambling Activities on the Internet,” IEEE Aerospace and Electronic Systems Magazine, pp. 33-35, April, 2004. (SCI)

編號

94

名稱

S.J. Wang and Y.C. Kuo, “A Secure Mechanism for Fine Payment Acting on Internet Transaction,” Web Journal of Chinese Management Review (http://www.cmr.tuan.com), Vol. 7, No. 2, pp. 158-171, April, 2004, Hong Kong.

編號

95

名稱

S.J. Wang, “The High Capacity in Embedding Logo implementing the Intellectual Property Using Tree-oriented Coding Mechanism,” Bulletin of the College of Engineering, National Taiwan University, pp. 119-126, Feb, 2004.

編號

96

名稱

S.J. Wang, “Remote Table-based Log-in Authentication Upon Geometric Triangle,” to be appear in International Journal Computer Standards & Interfaces, Vol. 26, No. 2, pp. 85-92, 2004. (SCI)

編號

97

名稱

S.J. Wang, H.J. Ke and W.C. Kuo, “A Parser Software Platform Setp-up Looking for Specified Web Sites,” The Journal of Forensic Sciences, Vol. 56, pp. 123-136, March 2004.

編號

98

名稱

S.J. Wang and Y.R. Tsai, “Private Communications in Hierarchical Group-Mobile Radio Systems,” Journal of Discrete Mathematical Science & Cryptography, Vol. 7, No. 2, pp. 187-201, 2004, Taru publications, India. (EI)

編號

99

名稱

S.J. Wang, H.J. Ke, and K.L. Ho, “Forensic Tools Study in Response to Information Crisis Incident,” Communications of the CCISA, Vol. 10, No. 1, Jan., 2004.

編號

100

名稱

S.J. Wang, “Yet Another Log-in Authentication Using N-dimensional Construction Based on Circle Property,” IEEE Transactions on Consumer Electronics, Vol. 49, pp. 337-341, May, 2003. (SCI)

編號

101

名稱

S.J. Wang and C.H. Yan, “Fast Access with Certificate Revocation List in PKI Mechanism,” Bulletin of the College of Engineering, National Taiwan University, Vol. 88, pp. 97-107, June, 2003.

編號

102

名稱

S.J. Wang and C.S. Lin, “Prototype System Set-up for Required Real-time Query on Counterfeit Certificate Recognitions,” The Journal of Forensic Sciences, Vol. 55, pp. 41-55, March, 2003.

編號

103

名稱

S.J. Wang and H.J. Ke, “Authentication and Watermarking in Information Hiding,” Communications of the CCISA, Vol. 9, No. 2, March, 2003.

編號

104

名稱

S.J. Wang and C.K. Lu, “A Scheme of Non-sensible Document in Transit with Secret Hiding,” Journal of Information Management, Vol. 9, No. 2, pp. 169-182, Jan. 2003 (TSSCI, Taiwan Social Science Citation Index).

編號

105

名稱

S.J. Wang, “Encryption Packet Broadcast Using Factorial Number Structure,” Journal of Computers, Vol. 14, No. 3, pp. 23-31, 2002.

編號

106

名稱

S.J. Wang, H.J. Ke and C.Y. Yang, “Evidence Investigation for Intruders in Web Systems,” Communications of the CCISA, Vol. 8, No. 4, Sept., 2002.

編號

107

名稱

S.J. Wang and D.Y. Kao, “Security Forensics and Empirical Strategies for Preventing from the Intrusion of Trojan Horse,” Journal of Information, Technology and Society, pp. 109-117, Dec. 2001.

編號

108

名稱

K.S. Yang, D. Y. Kao and S.J. Wang, “A Model Analysis of Information Criminal Whereabouts --- In Case of Illegal Compact Disc on Sale,” The Journal of Forensic Sciences, Vol. 51, pp. 91-102, 2001.

編號

109

名稱

D. Y. Kao and S.J. Wang, “The Planning and Management Strategy for Protecting the Hacker Intruding in Telephone Information Systems,” Police Science Quarterly, Vol. 31. No. 5, pp. 161-170, 2001.

編號

110

名稱

S.J. Wang and Y.C. Lin, "A Scheme of Fast key Recover on Broadcast Network upon the Three-center-location of a Triangle," Journal of Computers, Vol. 12, No. 1, March, 2000.

編號

111

名稱

C.H. Yan and S.J. Wang, “A New Strategy of Secure-control-card with Software implementation for Police Agency,” Police Science Quarterly, Vol. 30, No. 6, May, 2000.

編號

112

名稱

S.J. Wang and P. S. Hu, “A Dynamic Access Control Scheme with High Security Based on the Square Modular Technique in Hierarchy Structure,” Bulletin of the College of Engineering, National Taiwan University, Vol. 78, pp. 61-66, Feb. 2000.

編號

113

名稱

D. Y. Kao and S.J. Wang, “The Behavior Analysis of Investigating Intruder Activities in Internet Networks,” The Journal of Forensic Sciences, Vol. 48, pp.57-70, 1999.

編號

114

名稱

S.J. Wang and J.K. Jan, “A New Addressing Method for Letter-Oriented Keys,” Journal of Systems & Software, Vol. 46. pp. 77-88, 1999. (SCI)

編號

115

名稱

S.J. Wang, Y.R. Tsai and J.F. Chang, “A New Two-Way and Location-Secure Authentication Scheme Based on Secret Sharing, ” Journal of the Chinese Institute of Electrical Engineering, Vol. 6, No. 4, 1999. (EI)

編號

116

名稱

S. J. Wang and J. F. Chang, “Smart-Card Based Secure Password Authentication Scheme,” Computers & Security, Vol. 15, No. 3, pp. 231-237, 1996. (SCI)

編號

117

名稱

S. J. Wang and J. F. Chang, “A Hierarchical and Dynamic Group-Oriented Cryptographic Scheme,” IEICE Trans. Fundamentals, Vol. E79-A, No.1, pp. 76-85, January 1996. (SCI)

編號

118

名稱

H. T. Liaw, S. J. Wang and C. L. Lei, “A Dynamic Cryptographic Key Assignment Scheme in a Tree Structure,” International Journal of Computers & Mathematics with Applications, Vol. 25, No. 6, pp. 109-114, 1993. (SCI)

編號

119

名稱

H. T. Liaw, S. J. Wang and C. L. Lei, “Secure Dynamic User Hierarchy Scheme Based on the Knapsack Problem,” International Journal of Computer Systems Science & Engineering, Vol. 4, pp.210-216, 1993. (SCI)

編號

120

名稱

J. K. Jan and S. J. Wang, “A Dynamic Access Control Scheme Based Upon the Knapsack Problem,” International Journal of Computers & Mathematics with Applications, Vol. 26, No. 12, pp. 75-86, 1993. (SCI)

編號

121

名稱

J. K. Jan, C. C. Chang and S. J. Wang, “A New Dynamic Key-Lock-Pair Access Control Scheme,” Computers & Security, Vol. 10, No. 2, pp. 129-139, 1991. (SCI)

發表國際學術研討會論文/論文叢書

編號

1

名稱

S.C. Hsu, C.T. Huang, C.Y. Weng, and S.J. WANG, “A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing,” IEEE-PROCEEDINGS, 2019 The 4th International Conference on Computer and Communication Systems, SINGAPORE, Feb., 2019.

編號

2

名稱

C.T. Huang, C.Y. Yang, C.Y. Weng, Y.W. Chen, and S.J. WANG, “Secure Protocol for Identity-based Provable Data Possession in Cloud Storage, IEEE-PROCEEDINGS, 2019 The 4th International Conference on Computer and Communication Systems, SINGAPORE, Feb., 2019.

編號

3

名稱

Y. L. Wan, J.C. Chang, R.J. Chen, and S.J. WANG, “Feature-Selection-Based Ransomware Detection with Machine Learning of Data Analysis,” IEEE-PROCEEDINGS, 2018 The 3rd International Conference on Computer and Communication Systems, https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=8463216, Nagoya, Japan, April 27-30, 2018.

編號

4

名稱

C.T. Huang, D.E. Sun, Y.L. Chen, and S.J. WANG, “VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance, LNCS-PROCEEDINGS, The 12th Pacific Asia Workshop on Intelligence and Secrity Informatics (PAISI 2017), Lecture Notes in Computer Science (LNCS), published in Spring-Verlag, Jeju Island, Korea, MAY, 2017.

編號

5

名稱

C.T. Huang, C.L. Wu, J.C. Chang, Y.L. Wan, and S.J. WANG, “Reversible SMVQ Image Hiding Using Adaptive Search Order Coding,” IEEE-PROCEEDINGS, The International Conference on Digital Image Computing: Techniques and Applications (DICTA) http://dicta2016.dictaconference.org/index.html Gold Coast, Australia, Nov. 30-Dec. 02, 2016.

編號

6

名稱

C.Y.Weng, Sheng-Jie Wang, and S.J. WANG, “A Lossless Data Hiding Strategy Based on Two-dimensional Side-match Predictions,” SPRINGER VERLAG PROCEEDINGS, Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015. Springer Proceedings Lecture Notes in Computer Science (LNCS, Vol. 9357), AsiaARES 2015, ISBN 978-3-319-24314-6, pp. 235-242, Daejeon, Korea, October 4–7, 2015.

編號

7

名稱

C.Y. Weng, Y.L. Chen, H.M. Sun, and S.J. WANG, “Efficient Lossless Data Hiding Scheme Using Pixel Value Ordering and Prediction Error Shifting,” The 8th International Symposium on Digital Forensics and Information Security (DFIS-14), Guam, USA, Dec. 2014.

編號

8

名稱

W.J. Wang, C.T. Huang, S.R. Tsuei, and S.J. WANG, “Steganographic Greedy Algorithms for Data Hiding Based on Differences under SMVQ,” presented in SPRINGER VERLAG PROCEEDINGS, the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), Taipei, TAIWAN, Oct., 2014.

編號

9

名稱

D.Y. Kao, M.J. Chung, and S.J. WANG, “Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics,” Proceedings of the International Computer Symposium (ICS) 2014, TAIWAN, Dec. 2014.

編號

10

名稱

Y.T. Chang, M.H. Wu, and S.J. WANG, “Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy,” SPRINGER VERLAG PROCEEDINGS, ICT-EurAsia 2014, Proceedings. Springer 2014 Lecture Notes in Computer Science (LNCS, Vol. 8407) AsiaARES 2014, ISBN 978-3-642-55031-7, pp. 633-642, Bali, Indonesia, 2014.

編號

11

名稱

W.J. Wang, Y.H. Zhang, C.T. Huang, and S.J. WANG, “Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting,” IEEE-PROCEEDINGS, The 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2013), Oct., Beijing, China, 2013.

編號

12

名稱

D.Y. Kao, C.Y. Peng, Frank F.Y. Huang, and S.J. WANG, “Privacy Breach Investigations of Incident Response to Personal Information Protection Act,” SPRINGER VERLAG PROCEEDINGS (Lecture Notes in Electrical Engineering, LNEE Vol. 276, Springer-Verlag Berlin Heidelberg 2014), The 7th International Symposium on Digital Forensics and Information Security (DFIS-13), Gwangju, Korea, Sept. 2013.

編號

13

名稱

Y.T. Chang, M.J. Chung, C.T. Huang, and S.J. WANG, “Memory Forensics for Key Evidence Investigations in Case Illustrations,” IEEE-PROCEEDINGS, AsiaJCIS-2013, Seoul, Korea, July, 2013.

編號

14

名稱

F.H. Hsu, M.H. Wu, and S.J. WANG, “Dual-watermarking by QR-code Applications in Image Processing,” IEEE-PROCEEDINGS, The 2012 International Workshop on Ubiquitous Information Processing and Management (UIPM 2012), https://sites.google.com/site/uicuipm2012/ Fukuoka, Japan, Sept. 2012.

編號

15

名稱

C.W. Chen, S.J. WANG, Y.R. Tsai, and H.C. Chen, “Tree-Based Group Key Agreement for Mobile Ad Hoc Networks, IEEE-PROCEEDINGS, AsiaJCIS-2012, http://www.cs.dm.u-tokai.ac.jp/ASIAJCIS2012/ Tokyo, Japan, Aug. 2012.

編號

16

名稱

Y.C. Tso, S.J. WANG, C.T. Huang, and W.J. Wang, “iphone Social Networking For Evidence Investigations Using iTunes Forensics,” presented in ACM-PROCEEDINGS, ACM ICUIMC (IMCOM) International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC-2012), Malyasia, Feb. 2012.

編號

17

名稱

C.Y. Weng, C.I. Fan, and S.J. WANG, “Predictive Pixel Differencing Expansion in Data Reversibility Scheme,” presented in ACM-PROCEEDINGS, ACM ICUIMC (IMCOM) International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC-2012), Malyasia, Feb. 2012.

編號

18

名稱

H.J. Ke, S.J. Wang , Jonathan Liu, and D. Goyal, “Hash-algorithms Output for Digital Evidence in Computer Forensics,” IEEE-PROCEEDINGS, The Second International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2011), SPAIN, 2011.

編號

19

名稱

D.Y. Kao, S.J. Wang, and D. Goyal, “Medical Forensics and Investigations to Case Studies,” IEEE-PROCEEDINGS, ICPADS 2011, The 17the IEEE International conference on Parallel and Distributed Systems, TAIWAN, 2011.

編號

20

名稱

M.H. Wu, F.H. Hsu, C.H. Yang, and S.J. Wang, “Reversible Watermarking Scheme with Visibility Using Randomize Distance,” IEEE-PROCEEDINGS, http://bit.kuas.edu.tw/~icgec11/index.html The Fifthe International Conference on Genetic and Evolutionary Computing, Aug. 2011.

編號

21

名稱

C.T. Huang, W.J. Wang, S.J. Wang, and Jonathan, C.L. Liu, “A Secret Embedding Scheme by Means of Re-indexing VQ Codebook upon Image Processing,” SPRINGER VERLAG PROCEEDINGS, 2011 International Conference on Data Engineering and Internet Technology (DEIT 2011), March, 2011.

編號

22

名稱

H.M. Sun, C.Y., Weng, C.H. Yang, S.J. Wang, “An EMD-oriented Hiding Scheme for Reversible Data Embedding in Images,” SPRINGER VERLAG PROCEEDINGS, 2011 International Conference on Data Engineering and Internet Technology (DEIT 2011), March, 2011.

編號

23

名稱

S.J. Wang, C.Y. Weng, and Dushyant Goyal, “Multilevel Data Hiding for Embedding Reversibility upon Improving Histogram Shifting,” IEEE-PROCEEDINGS, ICS 2010 : The 2010 International Computer Symposium, Dec. 2010.

編號

24

名稱

C.H. Yang, F.H. Hsu, M.H. Wu, and S.J. Wang, “Histogram-based Reversible Data Hiding Using Tictactoemidlet Predictions,” IEEE-PROCEEDINGS, 2010 Fourth International Conference on Genetic and Evolutionary Computing, Dec. 2010.

編號

25

名稱

W.J. Wang, C.T. Hwang, and S.J. Wang, “Predictive Side-Match Vector Quantization for Secret Embeddingin Reversible Data Hiding,” IEEE-PROCEEDINGS, 2010 Fourth International Conference on Genetic and Evolutionary Computing, Dec. 2010.

編號

26

名稱

S.J. Wang, Y.R. Tsai, and C.C. Shen, “Varied Oblivious Transfer Protocols Enabling Multi-receiver and Applications,” under reviewed in IEEE-PROCEEDINGS, the First International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2010), Fukuoka, Japan, Nov. 2010.

編號

27

名稱

D.Y. Kao, S.J. Wang, and Frank F.Y. Huang, “An Interactive Process of MDFA Strategy in Countering Cyber Hacking Activity,” International Security Technology and Amanagement Conference, http://www.jastam.org.tw/istam2010, Sept. Taiwan, 2010.

編號

28

名稱

S.J. Wang and Y.T. Chen, “Secret Embedding and Reconstruction for Authentications in Steganography upon Secret Sharing Systems", , IEEE-PROCEEDINGS, The 5th FutureTech 2010, Busan, Korea, May, 2010.

編號

29

名稱

S.J. Wang and Y.T. Fan, “Intrusion Investigations with Data-hiding for Computer Log-file Forensics", IEEE-PROCEEDINGS, The 5th FutureTech 2010, Busan, Korea, May, 2010.

編號

30

名稱

W.J. Wang, C.T. Huang, and S.J. Wang, “Reversible Data Hiding Using Neighboring Block in VQ-Compressed Images,” ACM-PROCEEDINGS, The 4th International Conference on Ubiquitous Information Management and Communication (ICUIMC-2010), presented in SKKU, Suwon, Korea, Jan. 2010.

編號

31

名稱

D.Y. Kao, S.J. Wang, A. Sharma, and Frank F.Y. Huang, “A Case-Oriented Model of Digital Forensics on Infected Zombie Computers,” IEEE-PROCEEDINGS, 2009 The Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2009), Korea, Dec. 2009.

編號

32

名稱

H.M. Sun, C.Y. Weng, and S.J. Wang, “A Scheme of Modulo-based Capacity-improvement upon EMD Systems,” IEEE-PROCEEDINGS, presented in Sept., Japan, 2009.

編號

33

名稱

H.C. Chen, S.J. Wang, J.H. Wen, and C.W. Chen, “Temporal and Location-based RBAC Model,” IEEE-PROCEEDINGS, The 5th International Joint Conference on Networked Computing and Advanced Information Management (NCM-2009), http://www.aicit.org/ncm/ presented in Aug., Seoul, Korea, 2009.

編號

34

名稱

C.W. Chen, S.J. Wang, Y.R. Tsai, and H.C. Chen, “A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN,” IEEE-PROCEEDINGS, The 5th International Joint Conference on Networked Computing and Advanced Information Management (NCM-2009), http://www.aicit.org/ncm/ presented in Aug., Seoul, Korea, 2009.

編號

35

名稱

S.J. Wang, Y.R. Tsai, C.C. Shen, and P.Y. Chen, “Hierarchical Key Agreement Protocols in Group-user Systems,” IEEE-PROCEEDINGS, presented in Aug., China, 2009.

編號

36

名稱

C.H. Yang, C.T. Huang, and S.J. Wang, “Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images,” IEEE-PROCEEDINGS, presented in Aug., China, 2009.

編號

37

名稱

W.Y. Chiang, S.J. Wang, C.Y. Weng, and C.H. Yang, “Robustness-set in Watermarking Embedding Systems Using Codebook Classifications,” ACM-PROCEEDINGS, The Third International Conference on Ubiquitous Information Management and Communication (ICUIMC-2009), presented in SKKU, Suwon, Korea, Jan. 2009.

編號

38

名稱

H.J. Ke, S.J. Wang, and W.Y. Chiang, “Watermarking Damage to Risk Multimedia in Intellectual Property Systems,” 2008 International Computer Symposium, Taiwan, Nov. 2008.

編號

39

名稱

S.J. Wang, Y.R. Tsai, and J.J. Shen, “Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps,” presented in IEEE-PROCEEDINGS, 2008 The Third International Symposium on Smart Home (SH-2008), Sanya, Hainan Island, China, Dec. 2008.

編號

40

名稱

D.Y. Kao, S.J. Wang, K. Mathur, S. Jain, Frank F.Y. Huang, “Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks,” IEEE-PROCEEDINGS, 2008 The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2008), Taiwan, Dec. 2008.

編號

41

名稱

S.J. Wang, Y.R. Tsai, and P.Y. Chen , “Authentication Scheme in Peer-to-peer Based Live Stream Sharing Management Systems,” presented in IEEE-PROCEEDINGS, 2008 The International Conference on Intelligent Systems Design and Applications (ISDA), Taiwan, Nov. 2008.

編號

42

名稱

C.H. Yang, S.C. Huang, C.T. Huang, and S.J. Wang, “Non-embedded Image Protection Approaches Based on Vector Quantization,” presented in IEEE-PROCEEDINGS, 2008 The International Conference on Intelligent Systems Design and Applications (ISDA), Taiwan, Nov. 2008.

編號

43

名稱

S.J. Wang, I.S. Lin, Y.L. Hsieh, and C.Y. Wen, “Secret Sharing Systems with Authentication-based Steganography,” presented in IEEE-PROCEEDINGS, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Harbin, China, Aug. 2008.

編號

44

名稱

D.Y. Kao, S.J. Wang,, Frank F.Y. Huang, S. Bhatia, and S. Gupta “Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks,” presented in LNCS-PROCEEDINGS, Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) in conjunction with ISI 2008, Lecture Notes in Computer Science (LNCS), published in Spring-Verlag, Taipei, Taiwan, June 2008.

編號

45

名稱

H.C. Chen, S.J. Wang, J.H. Wen, and C.W. Chen, “Flexible Key Assignment for a Time-token Constraint in a Hierarchy,” IEEE-PROCEEDINGS, 2008 International Conference on Multimedia and Ubiquitous Engineering, presented in Busan l, Korea, April, 2008.

編號

46

名稱

C.W Chen, S.J. Wang, and Y.R. Tsai, “Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems,” IEEE-PROCEEDINGS, 2008 International Conference on Multimedia and Ubiquitous Engineering, presented in Busan, Korea, April 2008.

編號

47

名稱

H.M. Sun, C.Y. Weng and S.J. Wang, “Histogram-based Undetectable Fidelity Image in Steganography as MSB Controller,” ACM-Proceedings, The Second International Conference on Ubiquitous Information Management and Communication, presented in SKKU, Suwon, Korea, Jan. 2008.

編號

48

名稱

S.J. Wang, Y.H. Chang, W.Y. Chiang, and W.S. Juang, “Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions,” IEEE-PROCEEDINGS, Forensics for Future Generation Communication Environments (F2GC) 2007, presented in Korea, Dec. 2007.

編號

49

名稱

S.J. Wang, H.S. Chen, P.Y. Chen and Y.R. Tsai, “Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia,” IEEE-PROCEEDINGS, Future Generation Communication Networking (FGCN) 2007, presented in Korea, Dec. 2007.

編號

50

名稱

S.J. Wang, Y.R. Tsai and P.Y. Chen, “Proactive (k, n) Threshold Secret Sharing Scheme with Variant k and n,” IEEE-PROCEEDINGS, 2007 International Conference on Intelligent Pervasive Computing, will be presented in Korea, Oct. 2007.

編號

51

名稱

D.Y. Kao, F.F.Y. Huang, and S.J. Wang, “Maturity and Shame: Bringing Computer Ethics to Taiwan’s Juvenile Delinquents,” accepted in Australian and New Zealand Society criminology, the 20th Annual ANZSOC Conference, Adelaide, Australia, Sept. 2007.

編號

52

名稱

C.H. Yang, S.J. Wang, and C.Y. Weng, “Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Steganography,” to present in IEEE-PROCEEDINGS, the third international Conference on Intelligent Information Hiding and Multimedia Signal Processing, Nov. 2007.

編號

53

名稱

T.C. Wu, A. Perrig, W.S. Juang, M. Reiter, S.J. Wang, B.Y. Yang, C. Kuo, M. Luk, J. McCune, A. Studer, H.Y. Chen, C.W. Chen, X.Y. Chen, H.C. Chi, C.Y. Fu, Y.C. Lin, K. Tsay, and Z.R. Yang, “Remote authentication and ubiquitous trust establishment: scalable group key establishment," Proceedings of 2007 Second iCAST/CMU/TRUST Joint Conference on Security and Privacy Technologies, pp. 8-10, Taipei, Taiwan, June 2007.

編號

54

名稱

S.J. Wang, J.Y. Lin, H.J. Ke, and Y.H. Chang “Targeted Secret Disclosures in Visual-based Watermarking Concealment Systems,” IEEE-PROCEEDINGS, International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), Seoul, Korea, April 2007.

編號

55

名稱

S.J. Wang, Y.R. Tsai and J.W Chen, “A Countermeasure Against Frequent Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks,” IEEE-PROCEEDINGS, International Symposium on Wireless Pervasive Computing 2007, Puerto Rico, Feb. 2007.

編號

56

名稱

D.Y. Kao, S.J. Wang, and F.F.Y. Huang, and Y.H. Chang “Inferring Social Network from Forensic Assessment Model of P2P Copyright Infringement,” The 3th Asia-Pacific International Conference on Knowledge management (KMAP2006), Hong Kong, Dec. 2006.

編號

57

名稱

D.Y. Kao, S.J. Wang, and F.F.Y. Huang, “An Information Based Management on the Analysis of Internet Perpetrators,” The 3th Asia-Pacific International Conference on Knowledge management (KMAP2006), Hong Kong, Dec. 2006.

編號

58

名稱

H.C.H. Ko, S.J. Wang, and I.S. Lin, “Flexible Key Management in Required Frequent Migrations upon Secret Sharing Scheme,” Proceedings of WISA 2006: The 7th International Workshop on Information Security Applications, Korea, Aug. 2006.

編號

59

名稱

D.Y. Kao, S.J. Wang, and F.F.Y. Huang, "Digitized Forensic Investigation at P2P Copyright Controversy, Infringement," present in LNCS-PROCEEDINGS, International Conference on Intelligence and Security Informatics (IEEE ISI-2006), Lecture Notes in Computer Science (LNCS), published in Spring-Verlag, USA, May, 2006.

編號

60

名稱

S.J. Wang, S. Chen and J.H. Hwang, “Survey of Cyber-security and a Fundamental of Geometric Common Key Agreement in MANETs,” to be presented in the IASTED International Conference on Networks and Communication Systems (NCS 2006), ISBN: 0-88986-590-6, March, Thailand, 2006. (ACTA Press)

編號

61

名稱

S.J. Wang, H.J. Ke, and J.H. Hwang, “Concerns and Aftermath of Cracking Hash in Cyber-space,” International Forensic Science Symposium (IFS Symposium Taipei 2005), Nov., Taipei, Taiwan, 2005.

編號

62

名稱

D.Y. Kao and S.J. Wang, "Evidences and Forensics at IP Address Clue in Cyber Crime," present in 17th Meeting of the International Association of Forensic Sciences, Hong-Kong, Aug. 2005.

編號

63

名稱

S.J. Wang and C.H. Yang, "Gathering Digital Evidence in Response to Information Security Incidents," present in LNCS-PROCEEDINGS, International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Lecture Notes in Computer Science (LNCS), published in Spring-Verlag, Atlanta, Georgia, USA, May, 2005.

編號

64

名稱

S.J. Wang, “Multicasting Secret Images using a Knapsack-like Cipher System,” to be presented in 17th International Conference on Computer Applications in Industry and Engineering (CAINE-2004), Orlando, Florida, USA, Nov. 2004. (INPEC)

編號

65

名稱

Y.R. Tsai and S.J. Wang, “Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks,” presented in IEEE-PROCEEDINGS, IEEE VTC 2004-Fall with Wireless Technologies for Global Security, Sept. 2004, USA.

編號

66

名稱

S.J. Wang and H.J. Ke, “Countermeasures in Curbing Gambling Activities on Internet in Taiwan,” presented in IEEE-PROCEEDINGS, IEEE Conference of 2003 International Carnahan Conference on Security Technology, Oct. 2003.

編號

67

名稱

S.J. Wang and K.S. Yang, “Watermark Embedding Mechanism Using Modulus-based for Intellectual Property Protection on Image Data,” LNCS-PROCEEDINGS, E-Commerce and Web Technologies, Lecture Notes in Computer Science (LNCS), No. 2455, published by Springer-Verlag, 2002.

編號

68

名稱

S.J. Wang, Patrick S. Chen and Y.C. Lin, “Log-in Authentication Based on Locating Centers of a Triangle,” presented in IEEE-PROCEEDINGS, IEEE TENCON 2002, held in Beijing of China in Sept. 2002.

編號

69

名稱

S.J. Wang and C.H. Yang, “A Threshold-Verification Scheme to a Valid-signature Using the Identity Check,” Workshop Proceedings: The Seventh International Conference on Distributed Multimedia Systems with workshop on Cryptology and Network Security, Taiwan, Sept. 2001.

編號

70

名稱

S.J. Wang and K.S. Yang, “A Scheme of High Capacity Embedding on Image Data Using Modulo Mechanism,” Proceedings of WISA 2001: The Second International Workshop on Information Security Applications, Seoul, Korea, Sept. 2001.

編號

71

名稱

S.J. Wang and Y.H. Chang, “A Vowel-oriented Retrieval Scheme on Minimal Perfect Hashing Searching,” presented in Internal Computer Symposium (ICS-2000), held at Chi-Yi, National Cheng-Chung University, Dec. 6-8, 2000.

編號

72

名稱

Wang, and J.F. Chang, “A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing,” LNCS-PROCEEDINGS, Database and Expert Systems Applications-DEXA’99, Lecture Notes in Computer Science (LNCS), No. 1677, published by Springer Verlag, 1999.

編號

73

名稱

S. J. Wang and J. F. Chang, “An Efficient Access Control Scheme Based on Arithmetic Coding,” International Conference on Wireless Computer Communication: Emerging Business Opportunities (Infocom’94), Tata McGraw-Hill, New Delhi, India; 1995, 1995.

發表國內學術研討會論文/雜誌論述書

編號

1

名稱

“An Enhanced Scheme in Mobile Payments for Cloud Computing Services”, TANET 2018, National Central University, 2018.

編號

2

名稱

“智慧型手機-手錶之協作數位跡證研究,” 民生電子研討會 (http://www.tacenet.org.tw/ ), National Dong Hwa University (NDWU), Nov. 2016.

編號

3

名稱

“Identifying Forensics in Remote Access with Window Systems Exploring Evidence Using Function Operations,” 民生電子研討會 (http://www.tacenet.org.tw/ ), National Dong Hwa University (NDWU), Nov. 2016.

編號

4

名稱

“Rooted Forensics in Evidence Study Using Commercial Tools,” TANET (Taiwan Academic Network Conference) 2016, National Dong Hwa University (NDWU), Oct. 2016.

編號

5

名稱

“A Procedure Study and Construction in Digital Forensics Environments and Developments,” TANET (Taiwan Academic Network Conference) 2016, National Dong Hwa University (NDWU), Oct. 2016.

編號

6

名稱

“Traffic Forensics in Android Systems Enabling Social Communications of U-way, TANET (Taiwan Academic Network Conference) 2016, National Dong Hwa University (NDWU), Oct. 2016.

編號

7

名稱

“Image Forensics in Analyzing Malicious Code with Information Security,” 2016 智慧科技與應用統計研討會, Chinese Culture Universtiy, May, 2016.

編號

8

名稱

“Forensics Study In Carry-on Mobile with Traffic Event Investigations,” 2016 智慧科技與應用統計研討會, Chinese Culture Universtiy, May, 2016.

編號

9

名稱

“智慧型手機之資料竊取鑑識與證據萃取研究,” 民生電子研討會 ( http://www.tacenet.org.tw/ ), Taichung, Nov. 2015.

編號

10

名稱

“Remote Log-in Security Testing in the Case of iOS-Jailbreaking,” IMP2015第二十一屆資訊管理暨實務研討會, Taichung, Nov. 2015.

編號

11

名稱

“應用中間邊緣偵測預測法的高安全性VQ資訊隱藏技術,” IMP2015第二十一屆資訊管理暨實務研討會, Taichung, Nov. 2015.

編號

12

名稱

“鄰近索引值相似基礎之VQ資訊隱藏研究,”TANET (Taiwan Academic Network Conference) 2015, National Chi Nan University (NCNU), Oct. 2015.

編號

13

名稱

“JAILBREAK-IPHONE 數位證據留存鑑識之研究,” TANET (Taiwan Academic Network Conference) 2015, National Chi Nan University (NCNU), Oct. 2015.

編號

14

名稱

“A Behavior-based Malware Detection Method on Smartphones,” TANET (Taiwan Academic Network Conference) 2015, National Chi Nan University (NCNU), Oct. 2015.

編號

15

名稱

“反鑑識數位證據調查與有效證據萃取研究,” TANET (Taiwan Academic Network Conference) 2015, National Chi Nan University (NCNU), Oct. 2015.

編號

16

名稱

“雲端儲存服務之數位證據追蹤與分析研究,”第 26 屆國際資訊管理學術研討會, Taipei, 2015.

編號

17

名稱

“WhatsApp即時通訊軟體之行動手機鑑識研究,” 2014年數位鑑識與科技偵查研討會, Nov., 2014.

編號

18

名稱

“VQ-Based Secret Embedding with High Compression Ratio,” presented in National Computer Symposium, Asia-University, Taiwan, Dec., 2013.

編號

19

名稱

“Desktop Virtual Machine Operations in Evidence Investigations,” presented in National Computer Symposium, Asia-University, Taiwan, Dec., 2013.

編號

20

名稱

“Countermeasure of Information Warfare in Modern Network Security Accompanying with High-tech Developments,” 2013 國防淨評估論壇, 國防大學Taipei, Dec. 2013.

編號

21

名稱

“Countermeasures of Preventing Hacking Crime in Views of Crime Habitats, Snowball Sampling Technique, and Social Networking Analysis,” 2013年刑事警察學術研究與交流研討會, Taoyuan, Nov. 2013.

編號

22

名稱

“Evidence Investigations in Forensics, in Case of Clouding Access with Data Synchronizations,” presented in TANET 2013, 國立中興大學, Taichung, Oct., 2013.

編號

23

名稱

“URL of Web Browsing in Forensics of Evidence Investigations,” presented in 2013 數位生活科技研討會 (2013 Symposium on Digital Life Technologies: Building a Safe, Secured and Sound (3S) Living Environment, DLT-2013數位生活科技研討會), 國立雲林科技大學, June, 2013.

編號

24

名稱

“QR Code Applications and Authentications Based on Secret Sharing in Security Protections,” presented in Proceedings of the 23th National Conference on Information Security R.O.C., Taiwan, May, 2013.

編號

25

名稱

“QR Code Forensics in the case of On-Line Game,” 2013資訊科技國際研討會 (2013 International Conference on Advanced Information Technologies, AIT2013), April, Taichung, 2013.

編號

26

名稱

“Virtual Forensics in Evidence Investigations,” 2013資訊科技國際研討會 (2013 International Conference on Advanced Information Technologies, AIT2013), April, Taichung, 2013.

編號

27

名稱

“Forensic Analysis of Social Networking Application on iDevice with Delivered Message,” 第二十四屆國際資訊管理學術研討會(ICIM’2013), New Taipei, May, 2013

編號

28

名稱

“Line Forensics in Evidence Investigations for Illegal Activities,” 第二十四屆國際資訊管理學術研討會(ICIM’2013), New Taipei, May, 2013.

編號

29

名稱

“行動手機定位偽造之鑑識研究,”presented in 2012年第十八屆資訊管理暨實務研討會 R.O.C., 國立台北科技大學, TAIWAN, Dec. 2012.

編號

30

名稱

“Prototype Detections of Malicious QR-code Scanning in Handed Smart-phone Systems,” presented in 2012年第十八屆資訊管理暨實務研討會 R.O.C., 國立台北科技大學, TAIWAN, Dec. 2012.

編號

31

名稱

“Forensics in Browsing of Privacy Mode and Evidence Investigations,” presented in 2012 數位生活科技研討會 (2012 Symposium on Digital Life Technologies: Building a Safe, Secured and Sound (3S) Living Environment), 國立雲林科技大學, Aug., 2012.

編號

32

名稱

“Mobile Forensics in Logical Digital Evidence Investigations upon iPhone Operations,” presented in Proceedings of the 22th National Conference on Information Security R.O.C., Taiwan, May, 2012.

編號

33

名稱

“Homomorphic One-Way Function Trees for Efficient Group Key Agreements,” presented in Proceedings of the 22th National Conference on Information Security R.O.C., Taiwan, May, 2012.

編號

34

名稱

“iPhone Forensics in QR Code Security,” presented in Proceedings of 2012 Conference in R.O.C. Military Academy, Taiwan, May, 2012.

編號

35

名稱

“iPhone Logical Acquisition to Digital Evidence in Case of XRY-operations,” presented in Proceedings of the 15th Information Management Conference in Central Police University, Taiwan, May, 2012.

編號

36

名稱

“Web Forensics by Using Google Keywords,” presented in The Second National Conference on Web Intelligence and Applications (NCWIA 2012) 第二屆網路智能與應用研討會, Taiwan, 2012.

編號

37

名稱

“Key-map QR Code in Visual Cryptography with Undetectability,” presented in National Computer Symposium, National Chaiyi University, Taiwan, Dec., 2011.

編號

38

名稱

“動態影像上之可視型浮水印保護機制,” presented in 2011年第十七屆資訊管理暨實務研討會 R.O.C., Chaiyi, Dec. 2011.

編號

39

名稱

“Crime Venue Investigations in iPhone Back-up Forensics,” presented in 2011 InternationalConference on University Basic computers Education and eLearning (iCube 2011), 淡江大學, Dec. 2011.

編號

40

名稱

“Integrated Framework in Cloud Computing Services in Case of Enforcement Information Systems,” presented in 2011 InternationalConference on University Basic computers Education and eLearning (iCube 2011), 淡江大學, Dec. 2011.

編號

41

名稱

“Controversy in Wireless Network with Digital Forensics,” presented in 2011 InternationalConference on University Basic computers Education and eLearning (iCube 2011), 淡江大學, Dec. 2011.

編號

42

名稱

“Mobiledit手機鑑識軟體之研究,” 2011年第二屆數位鑑識與科技偵查研討會, Nov. 2011.

編號

43

名稱

“Memory Forensics in MSN Instant Message for Digital Evidence Investigations,” 第六屆海峽兩岸暨香港.澳門警學研討會, Hong-Kang, Oct. 2011.

編號

44

名稱

“真假網站的視覺安全與鑑識分析,” presented in Proceedings of the 21st National Conference on Information Security R.O.C., Taiwan, May, 2011.

編號

45

名稱

“Social Network Forensics upon Facebook Platform,” presented in Proceedings of the 21st National Conference on Information Security R.O.C., Taiwan, May, 2011.

編號

46

名稱

“數位鑑識之社會網路分析與趨勢,” presented in The First National Conference on Web Intelligence and Applications (NCWIA 2011) 第一屆網路智能與應用研討會, Taiwan, 2011.

編號

47

名稱

“有效證據存取於品質管理循環分析組織的研究,” presented in 電子商務與數位生活研討會(ECDL 2011), Taipei, Taiwan, March 2011.

編號

48

名稱

“行動鑑識之數位證據蒐證研究/Digital Forensics in Mobile Evidence Investigations,” presented in 2011年刑事警察學術研究與交流研討會, Central Police University, Taiwan, March 2011.

編號

49

名稱

“彈性位移法於可逆式資訊偽裝之運用研究,” presented in 2010年第十六屆資訊管理暨實務研討會 R.O.C., 國立雲林科技大學, Taiwan, Dec. 2010.

編號

50

名稱

“QR code 雙重型態的高隱匿性資訊隱藏技術,” presented in TANET2010, 國立臺南大學, OCT. 2010.

編號

51

名稱

“Evidence in Registry to Unveil Software Utilizations,” presented in 2010 InternationalConference on University Basic computers Education and eLearning (iCube 2010), 淡江大學, Dec. 2010.

編號

52

名稱

“PDCA管理循環-以社交工程資安演練的紀錄分析為例,” presented in 2010年犯罪偵查學術與實務研討會, Taiwan, Sept. 2010.

編號

53

名稱

“釣魚網站的資訊隱藏與鑑識分析,” presented in 2010年犯罪偵查學術與實務研討會, Taiwan, Sept. 2010.

編號

54

名稱

“縱覽-鑑識流程之Memory證據檢驗與分析,” 第二十一屆國際資訊管理學術研討會(ICIM’2010), 成功大學, May, 2010.

編號

55

名稱

“RFID於治安資訊科技稽核之應用,” presented in 2010資訊科技國際研討會 (2010 International Conference on Advanced Information Technologies, AIT2010), April, Taichung, 2010.

編號

56

名稱

“PC及PDA操作平台之即時通訊之證據關聯分析研究,” presented in National Computer Symposium, National Taipei University, Taiwan, Nov., 2009.

編號

57

名稱

“電腦鑑識之手持行動通訊鑑識程序研究,” presented in National Computer Symposium, National Taipei University, Taiwan, Nov., 2009.

編號

58

名稱

“Hash-based Log-file Authentication for Investigation of Computer Forensics,” presented in 2009電子商務與數位生活研討會(ECDL 2009), Taipei, Taiwan, March 2009.

編號

59

名稱

“Log-Forensics Detecting Intruders in Steganography,” presented in 2008年第十四屆資訊管理暨實務研討會 R.O.C., 東吳大學, Taiwan, Dec., 2008.

編號

60

名稱

“T-Tool: Forensics Tool in Windows Systems for Investigations of Digital Evidence,” presented in 2008年第十四屆資訊管理暨實務研討會 R.O.C., 東吳大學, Taiwan, Dec., 2008.

編號

61

名稱

“Rootkit事件於木馬抗辯之數位鑑識研究,” presented in 2008 數位生活科技研討會 (2008 Symposium on Digital Life Technologies: Building a Safe, Secured and Sound (3S) Living Environment), 國立成功大學, June, 2008.

編號

62

名稱

“Information Investigations in Network Foresnics Using GUI Tools,” presented in Proceedings of the 18th National Conference on Information Security R.O.C., Taiwan, May, 2008.

編號

63

名稱

“電腦鑑識工具應用於犯罪偵查之研究,” presented in中央警察大學通識教育中心研討會, May, 2008.

編號

64

名稱

“Ubiquituous-based RFID建置之社會安全優質生活環境研究,” presented in 2007年第十三屆資訊管理暨實務研討會 R.O.C., Taiwan, Dec., 2007.

編號

65

名稱

“Fidelity Colour Multimedia Image with Adaptive Data Hiding on Projection Dimensions,” presented in National Computer Symposium, Taiwan, Dec., 2007.

編號

66

名稱

“網路傳輸之視覺偽裝機制研究,” presented in TANET2007, National Taiwan University, Taiwan, Oct., 2007.

編號

67

名稱

“行動電腦之視覺化身分鑑定研究,” presented in第十屆電子商務研討會, 2007, 台北大學, Taipei, Taiwan, Oct.. 2007.

編號

68

名稱

“Cookies Relevance to Digital Evidence and Preservation on Internet

編號

69

名稱

Forensics,” presented in 2007 數位生活科技研討會 (2007 Symposium on Digital Life Technologies: Building a Safe, Secured and Sound (3S) Living Environment), 國立成功大學, June, 2007.

編號

70

名稱

“Intelligent Information on Secret Sharing Functions in Law Enforcement Systems,” presented in Proceedings of the 17th National Conference on Information Security R.O.C., Taiwan, June, 2007.

編號

71

名稱

“BAN-Logic評量之視覺化身份雙向鑑定機制研究,” presented in 2007電子商務與數位生活研討會(ECDL 2007), Taipei, Taiwan, March 2007.

編號

72

名稱

“PRT Authentication in a Secure RFID System Curbing Hybrid Frequent Attacks,” presented in 2007電子商務與數位生活研討會(ECDL 2007), Taipei, Taiwan, March 2007.

編號

73

名稱

“具公信力基礎之數位鑑識交叉檢驗模式研究,” presented in 2007電子商務與數位生活研討會(ECDL 2007), Taipei, Taiwan, March 2007.

編號

74

名稱

“Integrity Evidence for Chain of Custody in Signature Payload Embedding Systems,” presented in 2006年第十二屆資訊管理暨實務研討會 R.O.C., 虎尾科技大學, Taiwan, Dec., 2006.

編號

75

名稱

“SSL-VPN架構電腦鑑識系統之數位證據蒐證,” presented in 台灣商管與資訊研討會 2006 (Taiwan Conference Business and Information 2006, TBI2006), 台北大學, Taipei, Taiwan, Nov. 2006.

編號

76

名稱

“網路智慧財產權犯罪與數位證據線索蒐集,” presented in 台灣商管與資訊研討會 2006(Taiwan Conference Business and Information 2006, TBI2006), 台北大學, Taipei, Taiwan, Nov. 2006.

編號

77

名稱

“社交工程式網路釣魚之數位鑑識與證據保存研究,” presented in 台灣商管與資訊研討會 2006(Taiwan Conference Business and Information 2006, TBI2006), 台北大學, Taipei, Taiwan, Nov. 2006.

編號

78

名稱

“Cyber-crime in Computer-based Systems Increases the Need for Digital Forensic Analysis,” presented in the Conference of Crime Investigation and Forensic Sciences, Taiwan, Nov. 2006.

編號

79

名稱

“半色調技術之數位相片證據力確立鑑定機制研究,” presented in Proceedings of the 16th National Conference on Information Security R.O.C., Taiwan, June, 2006.

編號

80

名稱

“基因演算法於視覺安全關鍵訊息判讀性研究,” to be presented in 2006 數位生活科技研討會 (2006 Symposium on Digital Life Technologies-Building a Safe, Secured and Sound (3S) Living), 國立成功大學, June, 2006.

編號

81

名稱

“資安事件之電腦鑑識即時應變工具使用研究,” EC2006電子商務與數位生活研討會 R.O.C, 國立台北大學, Taiwan, Feb., 2006.

編號

82

名稱

“改良式遠端網路的數位證據蒐集,” 2005年第十一屆資訊管理暨實務研討會 R.O.C.,實踐大學, Taiwan, Dec., 2005.

編號

83

名稱

“Cybercrime Myths in the Justice Systems,” Proceedings of the 15th National Conference on Information Security R.O.C., 國立中山大學, Taiwan, June, 2005.

編號

84

名稱

“具證明力數位相片之資訊嵌入鑑定機制,”2005 數位生活與網際網路科技研討會, 國立成功大學, June, 2005.

編號

85

名稱

“視覺化多重性身份鑑定機制研究,” 第十六屆國際資訊管理學術研討會(ICIM’2005), 輔仁大學, May, 2005.

編號

86

名稱

“Strategies to Combat the Invasion of Cyberspace from Within,” the Conference of Crime Investigation and Forensic Sciences, Taiwan, Nov. 2004.

編號

87

名稱

“植基於角色基礎之可調整的階層式存取架構,” Proceedings of the 14th National Conference on Information Security R.O.C., 國立台灣科技大學, Taipei, June, 2004.

編號

88

名稱

“以向量編碼法實現智慧財產資料機密安全之研究,” 第十五屆國際資訊管理學術研討會(ICIM’2004), 中原大學, Taipei, May, 2004.

編號

89

名稱

“Chaotic Watermark against Intellectual Property on Secure Information Hiding,” 2003 數位生活與網際網路科技研討會,國立成功大學, Oct. 2003.

編號

90

名稱

“搜尋引擎特定網頁搜尋剖析器的應用—以非法網站的追蹤偵查為例,” 2003 數位生活與網際網路科技研討會, 國立成功大學, Oct. 2003.

編號

91

名稱

“計算式空間關係導向的近似影像物件快速搜尋,” 第十四屆國際資訊管理學術研討會(ICIM’2003), 國立中正大學, Sept., 2003.

編號

92

名稱

“數位證據稽核表於電子付費系統之建置作業研究,” 第十四屆國際資訊管理學術研討會(ICIM’2003), 國立中正大學, Sept., 2003.

編號

93

名稱

“疊合視覺影像登入伺服器認証機制,” Proceedings of the 13th National Conference on Information Security R.O.C., 長庚大學, Aug. 2003.

編號

94

名稱

“可攜性之使用端認證於加強式CA系統存取模式研究”第八屆資訊管理研究暨實務研討會, Kaoshiung, Taiwan , Nov. 2002.

編號

95

名稱

“網上電子現金交易之數位證據偵蒐研究,” presented in 2002年電子商務經營管理研討會, Taichung, Taiwan, Nov. 2002.

編號

96

名稱

“結合資訊技術之電腦犯罪偵查模式,” 第六屆資訊管理暨警政資訊實務研討會, May, 2002.

編號

97

名稱

“緊緻性影像資料庫儲存之快速搜尋,” 第十三屆國際資訊管理學術研討會(ICIM’2002), Taipei, May, 2002.

編號

98

名稱

“A New Identity-Based and Generalized Group-Oriented Cryptographic Scheme,” Proceedings of the Twelfth National Conference on Information Security R.O.C., Taichung, May, 2002.

編號

99

名稱

“高隱蔽率於資訊隱藏之樹狀編碼技術,” Proceedings of the 12th National Conference on Information Security R.O.C., Taichung, May, 2002.

編號

100

名稱

“從網路遊戲所延伸之智慧財產權問題,” 資訊系統可信賴作業體制研討會, 交通大學, Taiwan, Dec. 2001.

編號

101

名稱

“區塊特徵值擷取導向之影像搜尋系統之研究,” 第七屆資訊管理研究暨實務研討會, Taipei, Taiwan, Dec. 2001.

編號

102

名稱

“數位證據之線索追蹤,” Communications of the CCISA, Vol. 8, No. 1, Dec. 2001.

編號

103

名稱

“資訊時代之享法、觸法、執法與鑑識的關連性問題與研究,” Information Security Newsletter, Vol. 7, No. 3, 2001.

編號

104

名稱

“網路惡意程式的行為問題研究”,Information Security Newsletter, Vol. 7, No. 1, 2000.

編號

105

名稱

“網際網路電子罰款零用付費機制之研究,” presented in CSIM2000, the 6th Conference of Information Management Research & Practice, National Chaio-Tung University, Dec. 2, 2000.

編號

106

名稱

“有線付費電視之網路使用群安全收視策略研究,” presented in TANET2000, National Chung-Kung University, Oct, 2000.

編號

107

名稱

“網路駭客之拒絕服務型式攻擊的來源追查與防制,” 資訊與教育, Aug., 2000.

編號

108

名稱

“規範駭客行為於網路安全之隱憂與未來發展”,Information Security Newsletter, Vol. 5, No. 3, pp. 97-106,1999.

編號

109

名稱

“網路病毒傳輸與偵防機制略研究,”Communications of the Institute of Information and Computing Machinery, Vol. 2, No. 3, pp. 57-64,1999.

編號

110

名稱

‘A Group-Call Cryptographic Multicasting Scheme in Multilevel Trunked Mobile Radio Systems,’ Proceedings of the Ninth National Conference on Information Security R.O.C., pp. 361-37, 1999.

一般性著述/雜誌

LINKING – I

LINKING -II

相關著作/編輯專書

LINKING