Shi-Cho Cha
Orcid: 0000-0002-2739-9512Affiliations:
- National Taiwan University of Science and Technology, Department of of Information Management, Taipei, Taiwan (PhD 2003)
According to our database1,
Shi-Cho Cha
authored at least 38 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Developing a Security Testbed for International Organization for Standardization 15118-2.
Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024
Protecting In-Vehicle Communication with Dynamic Access Control for Next-Generation Vehicles.
Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024
2023
IEEE Internet Things J., July, 2023
IEEE Trans. Cloud Comput., 2023
Special Issue Editorial "Blockchain-Enabled Technology for IoT Security, Privacy and Trust".
Symmetry, 2023
Comput. Ind. Eng., 2023
2022
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
2021
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021
2020
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining.
IEEE Trans. Emerg. Top. Comput. Intell., 2020
2019
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges.
IEEE Internet Things J., 2019
On Design and Implementation a Federated Chat Service Framework in Social Network Applications.
Proceedings of the IEEE International Conference on Agents, 2019
2018
IEEE Access, 2018
A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.
Sensors, 2017
On Design and Implementation a Smart Contract-Based Investigation Report Management Framework for Smartphone Applications.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Privacy-aware and blockchain connected gateways for users to access legacy IoT devices.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017
2016
Is there a tradeoff between privacy and security in BLE-based IoT applications: Using a smart vehicle of a major Taiwanese brand as example.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
A Framework for Major Stakeholders in Android Application Industry to Manage Privacy Policies of Android Applications.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016
2014
Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014
Proceedings of the Radio Frequency Identification System Security, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2012
Int. J. Inf. Priv. Secur. Integr., 2012
Efficient Consistency Achievement of Federated Identity and Access Management Based on a Novel Self-Adaptable Approach.
IEICE Trans. Inf. Syst., 2012
On Design of Secure APIs for IoT Applications - Using Taiwan Uniform e-Invoices as Examples.
Proceedings of the Radio Frequency Identification System Security, 2012
2010
Proceedings of the Security Informatics, 2010
Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy.
IEICE Trans. Inf. Syst., 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
2009
Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
RiskPatrol: A risk management system considering the integration risk management with business continuity processes.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
2005
Proceedings of the Mobile Information Systems II, 2005
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005
2003
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003
Proceedings of the Agents and Peer-to-Peer Computing, Second International Workshop, 2003