Communications of the CCISA Volume 25

Vehicle Network Information

Constructing Vehicle Network Information Security Transmission System Based on Cloud Technology

Hsin-Te Wu

Fast Proxy Authentication

Fast Proxy Authentication and Trusted Data Encryption Protocol Applied in 5G Environments

Hsin-Nan Kuo1 , Yu-Tse Shih2 , Er-Shuo Zhuang3 , Jheng-Jia Huang4 , and Chun-I Fan5*

Information Security Management

Building a Platform System for Information Security Log Management and Malware Analysis—an Example at the School Departments

Ching-Yu Yang1, Jia-Siang Guo2, Hsin-Te Wu

Deniable Blockchain Ledger

DBL: Deniable Blockchain Ledger

Hsuan-Hao Chen1†、Po-Wen Chi2

International Forensic Standards

Research on the Construction of the Mobile Forensics Standard Operating Procedure (DEFSOP-MF) and the Integration of International Forensic Standards

I-Long Lin1,2†* Yingren Chen1

security fuzz testing

Security Fuzz Testing Framework for Bluetooth Low Energy Protocols

Sheng-Xiang Lin1 , Hsin-Hung Cho2 , Chi-Yuan Chen3*, Yu-Chieh Li4

intrusion detection system

A Hybrid Classification Algorithm for Intrusion Detection System

Ze-Hong Chen1, a , Yi-Lin Chen1,b, Wei-Yan Chang1,c , and Chun-Wei Tsai2,d*

Wearable health monitoring

Survey on A Smart Health Monitoring System Based on Context Awareness Sensing

Schalk Wilhelm Pienaar1 , Reza Malekian1,2*