Communications of the CCISA Volume 25

Fast Proxy Authentication

Fast Proxy Authentication and Trusted Data Encryption Protocol Applied in 5G Environments

Hsin-Nan Kuo1 , Yu-Tse Shih2 , Er-Shuo Zhuang3 , Jheng-Jia Huang4 , and Chun-I Fan5*

Information Security Management

Building a Platform System for Information Security Log Management and Malware Analysis—an Example at the School Departments

Ching-Yu Yang1, Jia-Siang Guo2, Hsin-Te Wu

Deniable Blockchain Ledger

DBL: Deniable Blockchain Ledger

Hsuan-Hao Chen1†、Po-Wen Chi2


Vehicle Network Information

Constructing Vehicle Network Information Security Transmission System Based on Cloud Technology

Hsin-Te Wu

Automatic Web Security

Automatic Web Security Testing based on Artificial Intelligence

Sheng-Xiang Lin1 , Hsin-Hung Cho2*

Decentralized Privacy System

Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management*

Yunmin He1,2 , Yu-Chi Chen1* , Zhong-Yi Guo1 , Raylin Tso3 , and Shaozhen Ye2

Ontological Model Ransomware

Using Signature Analyses to Construct an Ontological Model of Ransomware

Hsiao-Chung Lin1, Ping Wang2* , Wei-Qian, Hong3

Cloud Security Evaluation Model

Education Cloud Security Evaluation Model

Pi-Ju Tsai1 , Chun-Hao Lin2 , Yin-Lam Ho2 , Vin-Nhan Ho2 , Po-Yuan Chang2 , Hsuan-Tzu Hung2 , Peng-Ting Chen3*