Professor Shiun-Jeng WANG

Central Police University

“ACADEMIC PAPERS”
1. Y.T. Chang, C.T. Huang, and S.J. WANG, “Memory Forensics for Evidence Seizure of Instant Messages,” revised in Journal of Forensic Sciences, 2014. (SCI)
2. W.J. Wang, C.T. Huang, S.R. Tsui, C.H. Yang, and S.J. WANG, “Fully Reversible Data Hiding Using Vector Quantization Transformation,” 2014.
3. Y. T. Chang, C.T. Huang, and S.J. WANG, “Evidence in Forensics with VQ Watermarking of Data Hiding Systems,” 2014.
4. Y.T. Chang, C.T. Huang, C.L. Huang, and S.J. WANG, “Data Hiding of High Compression Ratio in VQ Indices with Neighboring Correlations,” accepted in Multimedia Tools and Applications, 2014. (SCI)
5. D.Y. Kao and S.J. WANG, “A Proactive Investigative Strategy on Advanced Persistent Threat of Hacker Alliance,” revised in Police Science Quarterly, 2014.
6. W.J. Wang, C.T. Huang, A. Rajpurohit, and S.J. WANG, “Secret in Video Embedding for Key Evidence in Forensics,” 2014.
7. Y.T. Chang, K.C. Teng, Y.C. Tso, and S.J. WANG, “Jailbroken iPhone Forensics for the Investigations and Controversy to Digital Evidence,” 2014.
8. F.H. Hsu, M.H. Wu, C.Y. Weng, and S.J. WANG, “Medical Images with Reversible Data Hiding By Means of Histogram-shifting Strategy,” 2014.
9. W.J. Wang, C.T. Huang, Y.H. Zhang, and S.J. WANG, “QR-code Authentication in Visual Image Processing,” 2014.
10. F.H. Hsu, M.H. Wu, Y.W. Chang, and S.J. WANG, “Web Security in a Windows System As PrivacyDefender in Private Browsing Mode,” accepted in Multimedia Tools and Applications, 2014. (SCI)
11. F.H. Hsu, M.H. Wu, C.H. Yang, and S.J. WANG, “Visible Watermarking with Reversibility of Multimedia Images for Ownership Declarations,” accepted in Journal of Supercomputing, 2014. (SCI)
12. W.J. Wang, C.T. Huang, M.Y. Tsai, and S.J. WANG, “Two-Level Encoding in VQ-based Data Hiding Using Toral Automorphism with Adaptive Pixel Replacements,” 2014.
13. W.J. Wang, C.T. Huang, and S.J. WANG, “Steganographic Greedy Algorithms for Data Hiding Based on Differences under SMVQ,” 2014.
14. W.J. Wang, C.T. Huang, and S.J. WANG, “VQ-encoded Images in Reversible Data Hiding of High Bit-compression-ratio,” revised in Imaging Science Journal, 2014. (SCI)
15. B.S. Ke, J.S. Lin, S.J. WANG, and H.K. Tso, “Private Browsing Evidence of Google History Investigations in Computer Forensics,” Journal of e-Business, http://jeb.cerps.org.tw/ , Vol. 16, No. 1, pp. 85-106, March, 2014. (TSSCI)
16. S.R. Wu and S.J. WANG, “Forensics in Virtual Machine with Evidence Investigations of Image Files,” The Journal of Chaoyang University of Technology, publication, 2014.
17. H.M. Sun, C.Y. Weng, S.J. WANG, and C.H. Yang, “Data Embedding in Image-media using Weight-function on Modulo Operations,” ACM Trans. on Embedded Computing Systems, http://acmtecs.acm.org/index.htm Feb. 2013. (SCI)
18. Y.T. Chang and S.J. WANG, “Memory Forensics for Key Evidence Investigation in Case Illustrations,” 2013.
19. C.Y. Weng, Y.H. Chang, and S.J. WANG, “Visual Watermarking in Video in Forensics of Evidence Investigations.” 2013.
20. W.J. Wang, C.T. Huang, Y.H. Chang, and S.J. WANG, “QR-code Authentication in Visual Image Processing,” 2013.
21. F.H. Hsu, M.H. Wu, and S.J. WANG, “A Kernel-based Solution to Guarantee Evidence in Forensics of User Privacy in Private Browsing, 2013.
22. F.H. Hsu, M.H. Wu, S.J. WANG, and C.L. Huang, “Reversibility of Image with balanced Fidelity and Capacity upon Pixels Differencing Expansion,” 2013. (SCI)
23. F.H. Hsu, M.H. Wu, C.H. Yang, S.J. WANG, and C.L. Huang, “Image Reversibility in Data Embedding on the Basis of Blocking-Predictions,” 2013. (SCI)
24. F.H. Hsu, M.H. Wu, C.H. Yang, and S.J. WANG, “Reversible Watermarking-Payload Embedding with Adaptive Pixels in Spatial Domains,” 2013.
25. W.J. Wang, C.T. Huang, and S.J. WANG, “Greedy-USBIRDS: A Greedy Steganographic Algorithm Using Secret Bits for Image-Block Repairing Based on Differences under SMVQ,” 2013.
26. W.J. Wang, C.T. Huang, and S.J. WANG, “VQ-encoded Images in Reversible Data Hiding of High Bit-compression-ratio,” 2013.
27. W.J. Wang, C.T. Huang, M.Y. Tsai, and S.J. WANG, “Steganographic Image of VQ-transformation Using Two-Level Encoding with Varied LSB Replacements,” 2013.
28. W.J. Wang, C.T. Huang, C.H. Yang, and S.J. WANG, “VQ-based Algorithms Extended to Non-embedded Watermarking for Multimedia Ownership Prevention Systems,” publication in 2013. (SCI)
29. W.J. Wang, C.T. Huang, C.M. Liu, P.C. Su, and S.J. WANG, “Data Embedding for Vector Quantization Image Processing on the Basis of Adjoining State-Codebook Mapping,” 2013. (SCI)
30. C.Y. Weng, C.I Fan, Y.H. Chang, and S.J. WANG, “An Image Authentication for Secret on the Basis of Steganographic Immunization to HVS,” accepted in 2013. (SCI)
31. C.W. Chen, S.J. WANG, and Y.R. Tsai, “Cost-Savin?g Key Agreement via Secret Sharing in Two-Party Communication Systems,” Journal of Convergence (JoC), http://www.ftrai.org/joc/ publication, 2013.
32. H.M. Sun, C.Y. Weng, S.J. WANG, and C.H. Yang, “Data Embedding in Image-media using Weight-function on Modulo Operations,” ACM Trans. on Embedded Computing Systems, http://acmtecs.acm.org/index.htm Feb. 2013. (SCI)
33. C.Y. Weng, S.J. WANG, Jonathan Liu, and D. Goyal, “Prediction-based Reversible Data Hiding Using Empirical Histograms in Images,” KSII Trans. on Internet and information systems, Vol. 6, No. 4, April, pp. 1248-1266, 2012. (SCI)
34. W.J. Wang, C.T. Huang, S.W. Huang, and S.J. WANG, “Dual Hiding in QR Code Applications of Image Processing,” Journal of Information Management, Vol. 19, No. 4., pp. 769-784. 2012. (TSSCI, Taiwan Social Science Citation Index)
35. C.T. Huang, W.J. Wang, C.H. Yang, and S.J. WANG, “A Scheme of Reversible Information Hiding Based on SMVQ,” Imaging Science Journal, Vol. 59, No. 5, 2012. (SCI)
36. F.H. Hsu, M.H. Wu, C.H. Yang, and S.J. WANG, “Reversible Data Hiding Based on Block-predictions,” Digital Signal Processing, revised in Jan. 2012. (SCI)
37. F.H. Hsu, M.H. Wu, and S.J WANG, “Reversible Data Hiding Using Side-match Predictions on Steganographic Images,” Multimedia Tools and Applications, accepted in Feb. 2012. (SCI)
38. C.Y. Weng, H.K. Tso, and S.J. WANG, “Steganographic Data Hiding in Image Processing Using Predictive Differencing,” Opto-Electronics Review, Vol. 20, No. 2, pp. 126-133, 2012. (SCI)
39. D.Y. Kao, J.J. Zeng, and S.J. WANG, “Applying an Iterative PDCA Management Process to the Forensic Analysis of Social Engineering Technique,” Journal of Advanced Technology and Management, Vol. 1, No. 1, May 2011
40. C.H. Yang, W.J. Wang, C.T. Huang, and S.J. Wang, “Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images,” accepted inInformation Sciences, Vol. 181, Issue 11, June, pp. 2218–2230, 2011. (SCI)
41. W.J. Wang, C.T. Huang, and S.J. Wang, “VQ Applications in Steganographic Data Hiding upon Multimedia-images,” IEEE System Journals, Volume 5, Issue 4, pages 528 – 537, 2011. (SCI)
42. C.H. Yang, C.Y. Weng, H.K. Tso, and S.J. Wang, “A Data Hiding Scheme Using the Varieties of Pixel-value Differencing in Multimedia Images,” Journal of Systems and Software, Vol. 84, pp. 669–678, 2011. (SCI)
43. S.J. Wang, Y.R. Tsai, and C.C. Shen, “Verifiable Threshold Scheme in Multi-secret Sharing Distributions upon Extensions of ECC,” Wireless Personal Communications, Springer, Vol. 56, No. 1, pp. 173-182, Jan. 2011. (SCI)
44. C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Varied PVD+LSB Evading Detection Programs to Spatial Domain in Data Embedding Systems,” Journal of Systems and Software, Vol. 83, pp. 1635-1643, 2010. (SCI)
45. D.Y. Kao, S.J. Wang, and Frank F.Y. Huang “’ SoTE: Strategy of Triple-E on Solving Trojan Defense of Cyber-crime Case,” The Computer Law & Security Review – The International Journal of Technology Law and Practice (Elsevier), www.elsevier.com/locate/clsr, Vol. 26, pp. 52-60, 2010. (SCI)
46. C.H. Yang and S.J. Wang, “Transforming LSB Substitution for Image-based Steganography in Matching Algorithms,” Journal of Information Science and Engineering, Vol. 26, pp. 1191-1212, 2010. (SCI)
47. S.J. Wang, Y.R. Tsai, C.C. Shen, and P.Y. Chen, “Hierarchical key derivation scheme for group-oriented communication systems, “ Int. Journal of Information Technology, Communications and Convergence, http://www.inderscience.com/ Inderscience Publishers, Vol. 1, No. 1, pp. 66-76, 2010.
48. C.T. Huang,, W.J. Wang, and S.J. Wang, “A Novel Data Hiding and Reversible Scheme Using SMN Blocks in VQ-Compressed Images,” Opto-Electronics Review, accepted in Aug. 2010. (SCI)
49. C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Capacity-raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations,” Fundamenta Informaticae, Vol. 98, pp. 321-336, 2010. (SCI)
50. C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Grouping Strategies for Promoting Image Quality of Watermarking on the Basis of Vector Quantization,” Journal of Visual Communication and Image Representation, Vol. 21, No. 1, pp. 49-55, 2010. (SCI)
51. S.J. Wang and D.Y. Kao, “The IP Address and Time in Cyber-crime Investigation,” Policing: An International Journal of Police Strategies & Management, Vol 32. Issue 2, 2009. (SCI).
52. C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Codebook-linked Watermarking Scheme on Digital Images in Steganography,” Fundamenta Informaticae, Vol. 92, pp. 397-409, 2009. (SCI)
53. S.J. Wang, D.Y. Kao, and Frank F.Y. Huang, “Procedure Guidance on Internet Forensics Coping with Copyright Arguments of Client-Server-based P2P Models,”International Journal Computer Standards & Interfaces, Vol. 31, pp. 795-800, 2009. (SCI)
54. S.J. Wang, Y.R. Tsai, P.Y. Chen, and C.C. Shen, “A Scheme of Image-based Signature Verification upon Secret Sharing for Shopping in E-commerce Systems,” Journal of Computers, Vol. 20, No. 2, 2009. (EI)
55. D.Y. Kao, Frank F.Y. Huang, and S.J. Wang, “’Persistence and Desistance: Examining the Impact of Reintegrative Shaming to Ethics in Taiwan Juvenile Hackers’,” The Computer Law & Security Review – The International Journal of Technology Law and Practice (Elsevier), www.elsevier.com/locate/clsr, Vol. 25, Issue 5, September 2009, pp. 464-476, 2009. (SCI)
56. S.J. Wang, I.S. Lin, L.C. Lin, and W.Y. Chiang, “A Secret Sharing Authentication Scheme for Digital Images,” Journal of Computers, Vol. 20, No. 1, April, 2009. (EI)
57. S.J. Wang, J.Y. Lin, H.J. Ke, and S.W. Lin, “Visual-based Embedding Systems with Targeted Secret Disclosures and Applications,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 04, No. 1, pp. 44-53, 2009. (EI)
58. C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Adaptive Data Hiding in Edged Areas of Images with Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security, Vol. 3, Issue 3. pp. 488-497, Sept. 2008. (SCI)
59. C.W Chen, S.J. Wang, and Y.R. Tsai, “TLPKA: Pairwise Key Agreement Based on the Geometrical Property of the Tangent Line in Ad Hoc Network Systems,”International Journal of Hybrid Information Technology, Vol. 2, No. 4, 2008. (EI).
60. H.C. Chen, S.J. Wang, and J.H. Wen, “A Cryptographic Key Assignment Scheme with Adaptable Time-token Constraint in a Hierarchy,” International Journal of Multimedia and Ubiquitous Computing, Vol. 3, No. 4, 2008. (EI)
61. S.J. Wang, Y.R. Tsai and P.Y. Chen, “Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System,” Journal of Computers, Vol. 19, No. 1, April, 2008. (EI)
62. C.H. Yang, S.J. Wang, C.Y. Weng, and H.M. Sun, “Information Hiding Technique Based on Blocked PVD,” Journal of Information Management, Vol. 15, No. 3, pp. 29-48, 2008. (TSSCI, Taiwan Social Science Citation Index)
63. S.J. Wang, Y.H. Chang, and J.S. Lin, “A Visual-based Authentication Scheme in Wireless Carry-on Laptop Systems,” Electronic Commerce Studies, Fall, 2008. (TSSCI,Taiwan Social Science Citation Index)
64. S.J. Wang, J.H. Huang, S.Y. Yao and C.L. Chan, “Digital Evidence Seizure in Remote Firewall-based Systems on Internet Forensics,” Journal of e-Business, Vol. 10, No. 1, pp. 235-254, March, 2008. (TSSCI, Taiwan Social Science Citation Index)
65. S.J. Wang, H.C. Wang, and L.C. Lin, “Genetic Algorithms Highlighting the Target Secret in Visual Cryptography,” Journal of Information Management, Vol. 15, No. 2, pp. 85-108, April 2008. (TSSCI, Taiwan Social Science Citation Index)
66. S.J. Wang, K.L. Lin, Y.H. Chang, W.Y. Chiang, and J.H. Huang, “Unveiling Controversy of Trojan Defense on Internet Forensics,” The Journal of Forensic Sciences, Vol. 65, 2008.
67. S.J. Wang, H.C. Shu, Y.H. Chang, J.H. Hwang, “Immigration E-records in Secure Hierarchical Management upon Forensic Information Demands,” The Journal of Forensic Sciences, Vol. 63, 2008.
68. S.J. Wang, Y.H. Chang, H.J. Ke, and W.S. Juang, “Digital Evidence Seizure in Network Intrusions against Cyber-crime on Internet Systems,” Journal of Computers, Jan. 2008. (EI)
69. S.J. Wang, Y.R. Tsai, and J.W. Chen, “Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks,” Journal of Communications, Vol. 03, Issue 01, pp. 20-26, 2008. (EI)
70. H.C. Chen, S.J. Wang, and J.H. Wen, “Packet Construction for Secure Conference Call Request in Ad Hoc Network Systems,” Information Sciences, Vol. 177, pp. 5598-5610, 2007. (SCI)
71. S.J. Wang, “Information Hiding at Oblivious Watermarking Scheme upon Alternative Threshold in Spatial Domains,” Journal of Discrete Mathematical Science & Cryptography, Vol. 10, No. 3, pp. 359-384, 2007, Taru publications, India. (EI)
72. H.C. Chen, S.J. Wang, and J.H. Wen, “Role-based Proactive Scheme in an Access Control Hierarchy,” Journal of Statistics & Management Systems, accepted in June, 2007. (EI)
73. S.J. Wang and D.Y. Kao, “Internet Forensics on the Basis of Evidence Gathering with Peep Attacks,” International Journal Computer Standards & Interfaces, Vol. 29, pp. 423-429, 2007. (SCI)
74. S.J. Wang, H.J. Ke, J.H. Huang, and C.L. Chan, “Hash Cracking and Aftereffect on Authentication Procedures in Cyberspace,” IEEE Aerospace & Electronics Systems Magazine, Vol. 22, Issue 1, pp. 3-7, Jan. 2007. (SCI)
75. H.C. Chen, S.J. Wang, and J.H. Wen, “A Key Distribution Scheme for Live Multi-session upon Generalized Group-Oriented Cryptography,” the Far East Journal of Mathematical Sciences, accepted in April 2007. (EI)
76. S.J. Wang, J.Y. Lin, and J.H. Huang, “Internet Forensics with the Digital Evidence Investigations in Cyber-casino Scenarios,” Journal of Forensic Sciences, Vol. 62, 2007.
77. S.J. Wang, Y.R. Tsai, L.S. Chiu, and I.S. Lin, “Mutually Identity Authentication in GSM-based Anonymous Communications,” Journal of Computers, Vol. 18, No. 2, pp. 33-46, July, 2007. (EI)
78. S.J. Wang, “Measures of Retaining Digital Evidence to Prosecute Computer-based Cyber-crime,” International Journal Computer Standards & Interfaces (SC&I), Vol. 29, No. 2. pp. 216-223, Jan., 2007. (SCI)
79. Y.R. Tsai and S.J. Wang, “Two-tier Authentication for Cluster and Individual Sets in Mobile Ad Hoc Networks,” Computer Networks, Vol. 51, pp. 883-900, 2007. (SCI)
80. S.J. Wang, “Key Management of Secret Sharing in Frequent Migrations for Job Environments,” Far East Journal of Applied Mathematics, Vol. 27, No. 2, 2007. (EI)
81. S.J. Wang and P.S. Hu, “Key Management for Pay-TV Broadcast Systems in Hierarchy,” Journal of Discrete Mathematical Science & Cryptography, Vol. 9, No. 3, pp. 449-496, Dec. 2006, Taru publications, India. (EI)
82. S.J. Wang, “Procedural Response and Digital Evidence Exposure in Information Security Incidents,” Journal of Discrete Mathematical Science & Cryptography, Vol. 9, No. 3, pp. 417-427, Dec. 2006, Taru publications, India. (EI)
83. J.H. Huang, S.J. Wang, A.C. Chiang and Y.L. Hwang, “Real-time Response against Abnormal Invasion in the case of Applications Using NetKeeper Systems,” The Journal of Forensic Sciences, Vol. 61. 2006.
84. S.J. Wang, “Fundamental Common Key Establishment in MANETs upon Geometric Mathematics,” Far East Journal of Mathematical Sciences, Vol. 23, Issue 1, pp. 127-135, Oct., 2006. (EI)
85. S.J. Wang and D.Y. Kao, “Invasions of Malware in Cyber-space and Countermeasures Improving Cyber-security,” ACM Operating Systems Review (ACM OSR), Accepted in June, 2006. (EI)
86. S.J. Wang, C.C. Wu, and C.Y. Lin, “In View of Completeness and Proof Ability of Digital Photo Evidence upon Watermarking Authentication Schemes in Forensic Sciences,” Communications of the CCISA, Vol. 12, No. 2, April, 2006.
87. C.H. Yang and S.J. Wang, “Weighted Bipartite Graph for Locating Optimal LSB Substitution for Secret Embedding,” Journal of Discrete Mathematical Science & Cryptography, Vol. 9, No. 1, pp. 153-164, April, 2006, Taru publications, India. (EI)
88. S.J. Wang, H.J. Ke, J.H. Huang and S.H. Chen, “Evidence Ability Study Based upon Wartermarking KH-scheme in Digital Forensics,” The Journal of Forensic Sciences,March 2006.
89. S.J. Wang, C.H. Yen, I.S. Lin and H.H. Chen,“Authentication System on the Basis o f Visual-based Recognitions,” Journal of Computers, Vol. 16, No. 5, 2005. (EI)
90. C.H. Yang and S.J. Wang, “Accelerating VQ-based Codeword Search on the Basis of Partial Search Strategy,” International Journal Computer Standards & Interfaces, Vol 28, No. 2, pp. 231-240, 2005. (SCI)
91. S.J. Wang, Y.R. Tsai, and James Chen, “Node Communications in View of Security upon Ad Hoc Networks,” Communications of the CCISA, Vol. 11, No. 4, Oct., 2005.
92. J.H. Huang, H.J. Ke, S.J. Wang, and P. F. Chung, “Linux-based Firewall Mechanism of iptables in Information Security District Systems,” The Journal of Forensic Sciences, Vol. 59, pp. 63-80, Sept., 2005.
93. S.J. Wang, “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image,” Applied Mathematics and Computation, Vol. 164, pp. 99-116,May, 2005. (SCI)
94. S.J. Wang, “Vowel-consonant Addressing Mode on Hashing for English Letter-oriented Keys,” Journal of Discrete Mathematical Science & Cryptography, Vol. 8, No. 1, pp. 1-25, April, 2005, Taru publications, India. (EI)
95. S.J. Wang and C.H. Yang, “Hierarchy-oriented Searching Algorithms Using Alternative Duplicate Codewords for Vector Quantization Mechanism,” Applied Mathematics and Computation, Vol. 162, No. 2, pp. 559-576, March, 2005. (SCI)
96. S.J. Wang and C.M. Chuang, “Anonymous Message Communications with User Hierarchy in a Multicast System,” Applied Mathematics and Computation, Vol. 159, No. 1, pp. 95-112, Nov., 2004. (SCI)
97. S.J. Wang, “Anonymous Wireless Authentication on a Portable Cellular Mobile System,” IEEE Transactions on Computers, Vol. 53, No. 10, Oct., pp. 1317-1329, 2004.(SCI)
98. H.C. Chen, S.J. Wang, and J.H. Wen, “Models for Role-based Hierarchical Access Control Organizations,” Communications of the CCISA, Vol. 10, No. 4, Oct., 2004.
99. S.J. Wang, “Direct Construction of a Secret in Generalized Group Oriented Cryptography,” International Journal Computer Standards & Interfaces, Vol. 26, No. 5, pp. 455-460, Sept., 2004. (SCI)
100. S.J. Wang, “Threshold Verification Scheme to a Valid-signature Using Identity Only on Specialized Approval,” Applied Mathematics and Computation, Vol. 152, No. 2, pp. 373-383, May, 2004. (SCI)
101. S.J. Wang and H.J. Ke, “Curbing Gambling Activities on the Internet,” IEEE Aerospace and Electronic Systems Magazine, pp. 33-35, April, 2004. (SCI Extend)
102. S.J. Wang and Y.C. Kuo, “A Secure Mechanism for Fine Payment Acting on Internet Transaction,” Web Journal of Chinese Management Review(http://www.cmr.tuan.com), Vol. 7, No. 2, pp. 158-171, April, 2004, Hong Kong.
103. S.J. Wang, “The High Capacity in Embedding Logo implementing the Intellectual Property Using Tree-oriented Coding Mechanism,” Bulletin of the College of Engineering, National Taiwan University, pp. 119-126, Feb, 2004.
104. S.J. Wang, “Remote Table-based Log-in Authentication Upon Geometric Triangle,” to be appear in International Journal Computer Standards & Interfaces, Vol. 26, No. 2, pp. 85-92, 2004. (SCI)
105. S.J. Wang, H.J. Ke and W.C. Kuo, “A Parser Software Platform Setp-up Looking for Specified Web Sites,” The Journal of Forensic Sciences, Vol. 56, pp. 123-136, March 2004.
106. S.J. Wang and Y.R. Tsai, “Private Communications in Hierarchical Group-Mobile Radio Systems,” Journal of Discrete Mathematical Science & Cryptography, Vol. 7, No. 2, pp. 187-201, 2004, Taru publications, India. (EI)
107. S.J. Wang, H.J. Ke, and K.L. Ho, “Forensic Tools Study in Response to Information Crisis Incident,” Communications of the CCISA, Vol. 10, No. 1, Jan., 2004.
108. S.J. Wang, “Yet Another Log-in Authentication Using N-dimensional Construction Based on Circle Property,” IEEE Transactions on Consumer Electronics, Vol. 49, pp. 337-341, May, 2003. (SCI)
109. S.J. Wang and C.H. Yan, “Fast Access with Certificate Revocation List in PKI Mechanism,” Bulletin of the College of Engineering, National Taiwan University, Vol. 88, pp. 97-107, June, 2003.
110. S.J. Wang and C.S. Lin, “Prototype System Set-up for Required Real-time Query on Counterfeit Certificate Recognitions,” The Journal of Forensic Sciences, Vol. 55, pp. 41-55, March, 2003.
111. S.J. Wang and H.J. Ke, “Authentication and Watermarking in Information Hiding,” Communications of the CCISA, Vol. 9, No. 2, March, 2003.
112. S.J. Wang and C.K. Lu, “A Scheme of Non-sensible Document in Transit with Secret Hiding,” Journal of Information Management, Vol. 9, No. 2, pp. 169-182, Jan. 2003 (TSSCI, Taiwan Social Science Citation Index).
113. S.J. Wang, “Encryption Packet Broadcast Using Factorial Number Structure,” Journal of Computers, Vol. 14, No. 3, pp. 23-31, 2002.
114. S.J. Wang, H.J. Ke and C.Y. Yang, “Evidence Investigation for Intruders in Web Systems,” Communications of the CCISA, Vol. 8, No. 4, Sept., 2002.
115. S.J. Wang and D.Y. Kao, “Security Forensics and Empirical Strategies for Preventing from the Intrusion of Trojan Horse,” Journal of Information, Technology and Society, pp. 109-117, Dec. 2001.
116. K.S. Yang, D. Y. Kao and S.J. Wang, “A Model Analysis of Information Criminal Whereabouts — In Case of Illegal Compact Disc on Sale,” The Journal of Forensic Sciences, Vol. 51, pp. 91-102, 2001.
117. D. Y. Kao and S.J. Wang, “The Planning and Management Strategy for Protecting the Hacker Intruding in Telephone Information Systems,” Police Science Quarterly, Vol. 31. No. 5, pp. 161-170, 2001.
118. S.J. Wang and Y.C. Lin, “A Scheme of Fast key Recover on Broadcast Network upon the Three-center-location of a Triangle,” Journal of Computers, Vol. 12, No. 1, March, 2000.
119. C.H. Yan and S.J. Wang, “A New Strategy of Secure-control-card with Software implementation for Police Agency,” Police Science Quarterly, Vol. 30, No. 6, May, 2000.
120. S.J. Wang and P. S. Hu, “A Dynamic Access Control Scheme with High Security Based on the Square Modular Technique in Hierarchy Structure,” Bulletin of the College of Engineering, National Taiwan University, Vol. 78, pp. 61-66, Feb. 2000.
121. D. Y. Kao and S.J. Wang, “The Behavior Analysis of Investigating Intruder Activities in Internet Networks,” The Journal of Forensic Sciences, Vol. 48, pp.57-70, 1999.
122. S.J. Wang and J.K. Jan, “A New Addressing Method for Letter-Oriented Keys, ” Journal of Systems & Software, Vol. 46. pp. 77-88, 1999. (SCI)
123. S.J. Wang, Y.R. Tsai and J.F. Chang, “A New Two-Way and Location-Secure Authentication Scheme Based on Secret Sharing, ” Journal of the Chinese Institute of Electrical Engineering, Vol. 6, No. 4, 1999. (EI)
124. S. J. Wang and J. F. Chang, “Smart-Card Based Secure Password Authentication Scheme,” Computers & Security, Vol. 15, No. 3, pp. 231-237, 1996. (SCI)
125. S. J. Wang and J. F. Chang, “A Hierarchical and Dynamic Group-Oriented Cryptographic Scheme,” IEICE Trans. Fundamentals, Vol. E79-A, No.1, pp. 76-85, January 1996. (SCI)
126. H. T. Liaw, S. J. Wang and C. L. Lei, “A Dynamic Cryptographic Key Assignment Scheme in a Tree Structure,” International Journal of Computers & Mathematics with Applications, Vol. 25, No. 6, pp. 109-114, 1993. (SCI)
127. H. T. Liaw, S. J. Wang and C. L. Lei, “Secure Dynamic User Hierarchy Scheme Based on the Knapsack Problem,” International Journal of Computer Systems Science &Engineering, Vol. 4, pp.210-216, 1993. (SCI)
128. J. K. Jan and S. J. Wang, “A Dynamic Access Control Scheme Based Upon the Knapsack Problem,” International Journal of Computers & Mathematics with Applications, Vol. 26, No. 12, pp. 75-86, 1993. (SCI)
129. J. K. Jan, C. C. Chang and S. J. Wang, “A New Dynamic Key-Lock-Pair Access Control Scheme,” Computers & Security, Vol. 10, No. 2, pp. 129-139, 1991. (SCI)