Shi-Cho Cha

Orcid: 0000-0002-2739-9512

Affiliations:
  • National Taiwan University of Science and Technology, Department of of Information Management, Taipei, Taiwan (PhD 2003)


According to our database1, Shi-Cho Cha authored at least 38 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Developing a Security Testbed for International Organization for Standardization 15118-2.
Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024

Protecting In-Vehicle Communication with Dynamic Access Control for Next-Generation Vehicles.
Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024

2023
Trusting Computing as a Service for Blockchain Applications.
IEEE Internet Things J., July, 2023

Enhancing OAuth With Blockchain Technologies for Data Portability.
IEEE Trans. Cloud Comput., 2023

Special Issue Editorial "Blockchain-Enabled Technology for IoT Security, Privacy and Trust".
Symmetry, 2023

A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2.
Comput. Ind. Eng., 2023

2022
An Evolutionary Risk-based Access Control Framework for Enterprise File Systems.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

2021
A Security Risk Management Framework for Permissioned Blockchain Applications.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

2020
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

bleRPC: A plug-and-play RPC framework over BLE.
Comput. Commun., 2020

2019
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges.
IEEE Internet Things J., 2019

On Design and Implementation a Federated Chat Service Framework in Social Network Applications.
Proceedings of the IEEE International Conference on Agents, 2019

2018
A Data-Driven Security Risk Assessment Scheme for Personal Data Protection.
IEEE Access, 2018

A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices.
IEEE Access, 2018

A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things.
IEEE Access, 2018

A Blockchain-Based Privacy Preserving Ticketing Service.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.
Sensors, 2017

On Design and Implementation a Smart Contract-Based Investigation Report Management Framework for Smartphone Applications.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Privacy-aware and blockchain connected gateways for users to access legacy IoT devices.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

2016
Is there a tradeoff between privacy and security in BLE-based IoT applications: Using a smart vehicle of a major Taiwanese brand as example.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

A Framework for Major Stakeholders in Android Application Industry to Manage Privacy Policies of Android Applications.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016

2014
Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

On Privacy-Preserving E-Invoicing in Physical Channels via NFC.
Proceedings of the Radio Frequency Identification System Security, 2014

Motivations, Deployment, and Assessment of Taiwan's E-Invoicing System: An Overview.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2012
On considering enforcement while establishing RFID privacy policies.
Int. J. Inf. Priv. Secur. Integr., 2012

Efficient Consistency Achievement of Federated Identity and Access Management Based on a Novel Self-Adaptable Approach.
IEICE Trans. Inf. Syst., 2012

On Design of Secure APIs for IoT Applications - Using Taiwan Uniform e-Invoices as Examples.
Proceedings of the Radio Frequency Identification System Security, 2012

2010
Duplicate Work Reduction in Business Continuity and Risk Management Processes.
Proceedings of the Security Informatics, 2010

Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy.
IEICE Trans. Inf. Syst., 2010

On Generating RFID Privacy Policies in Consideration of Openness and Enforcement.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2009
Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
RiskPatrol: A risk management system considering the integration risk management with business continuity processes.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

2005
Take Risks into Consideration while Job Dispatching.
Proceedings of the Mobile Information Systems II, 2005

Robalo: A Risk-Oriented Job Dispatching Mechanism for Workforce Management System.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

2003
On Derived Data Services in the Cyberspace.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003

From P3P to Data Licenses.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

A Passport-Like Service over an Agent-Based Peer-to-Peer Network.
Proceedings of the Agents and Peer-to-Peer Computing, Second International Workshop, 2003


  Loading...