Good working environment and harmonious atmosphere. IDSL is your second home.

Ph.D. Students

photo

Yo-Hsuan Chuang | Grade 8

photo

Ta-Chih Yang | Grade 8

photo

| Grade 5

Master Students

photo

| Grade 5

photo

| Grade 4

photo

Hsien-Hung Tseng | Grade 4

photo

| Grade 3

photo

| Grade 3

photo

| Grade 3

photo

| Grade 3

photo

| Grade

photo

| Grade 3

photo

| Grade 3

photo

| Grade

photo

| Grade

photo

| Grade

photo

| Grade

photo

| Grade

photo

| Grade

photo

| Grade

Alumni

Name Academic Year Degree Thesis
Yi-Fan Wang 102 Master RFID Multi-ownership Transfer Protocols in VMI Environments
Cheng-Tsung Liu 102 Master An Accountable Identity-based Billing Protocol for Cloud Environment
Chi-Kai You 102 Master Intelligent Auto-lock Scheme for Mobile Devices
Che-Wei Chuang 102 Master A Secure Group Data Access Protocol with Provable Data Possession for Cloud Environment
Alexander Yohan 102 Master Danger Theory-based Privacy Protection Model for Messaging Service in Social Networks
Chun-Yen Fan 102 Master Risk Assessment Mechanisms of Application Usage on Android Platform
102 Ph.D. Adaptive Anti-Collision Mechanism for RFID Tag Identification
Siao-Mei Chen 101 Master Grouping Proof Protocols based on Low-cost RFID Tags
Pei-Yun Liu 101 Master An Efficient Resource Allocation Framework for Cloud Federation
Chieh Wang 101 Master On design of a Secure RFID-based e-Health System for Outpatient Clinic Process and Emergency Care Process
Pei-chi Fan 101 Master Efficient Virtual Machine Provision Mechanism for Cloud Data Centers
Hsuan-Yu Chen 100 Master Security Analysis for RFID Authentication Protocols with Key Redundancy Mechanism on De-synchronization Attack
Wei-Hao Su 100 Master A Network Performance Study for Social Relationship-oriented MANET
Hsin-Lin Chiu 100 Master A Network Performance Study for Selfish MANET Environment
Hsin-Hsiang Huang 99 Master Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks
Hsuan-Liang Lu 99 Master Automatic Education Training System for E-mail Social Engineering Drill
Chang-Ming Huang 99 Master Simulation Implementation and Performance Evaluation on HASR Protocol
Shiou-Huei Ruan 99 Master Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators
Hsiao-Chien Tsai 99 Ph.D. On Design of Reputation Mechanisms to Detect Malicious Nodes in Mobile Ad Hoc Networks
Fang-Ling Liu 99 Master On the design of secure routing protocol to prevent cooperative black hole attack
Po-Jui Su 99 Master VCDC: An Efficient Trust Value Collection Mechanism for Trust Management in MANET
Enrico Winata 98 Master Octad Algorithm for RFID Tag Identification
Chia-Chun Lin 98 Master A Tree-based Anti-collision Protocol for RFID Tag Identification in Supply Chain Network
Meng-Chih Chiang 98 Master Hash-based Anonymous Secure Routing Protocol in Mobile\r\nAd Hoc Networks
Pei-Hwa Wu 98 Master A Cloaking Algorithm to Support Privacy-aware Location-based Services based on Road Networks
Kuo-Hui Yeh 98 Ph.D. On the Design of Authentication Mechanisms for RFID Systems
Wen-Hui Wu 98 Master A Fair Architecture for Service Negotiation with Brokerage Commission
Tsung-Hao Hsu 97 Master Collaborate based Misbehavior Detection System in Hybrid Vehicular Ad Hoc Networks
Yi-Xiang Hung 97 Master An enhanced dynamic ID-based remote user authentication scheme
Po-Hao Su 97 Master A Design of Extensible Event-driven Agent-based Simulation Infrastructure
Ya-Shiang Chen 96 Master Negotiation-capable Web Services Selection Mechanism
Huei-Sz Shie 96 Master A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations
Dong-Yuan Lin 96 Master Anti-robot Agent Mechanisms on Online Games ─ A Game Level Approach
Chu-Hsiang Yang 96 Master Security Enhancement and Performance Evaluation of Secure Communication Schemes on Vehicular Ad Hoc Networks
Zih- Li Yang 96 Master A Secure Mutual Authentication Protocol for Low-cost RFID System
Po-Kai Chan 95 Master Trading Timing Strategy Evaluation on Stock Market Using Genetic Algorithm
Hsiao-Chien Tsai 95 Master The Prevention of False Message Influence on Vehicular Ad Hoc Networks - An Event-based Reputation-centric Approach
Chien-Yang Yu 95 Master Dynamic Workload Partition on Parallel Medical Image Reconstruction Algorithm in Computational Grid Environments
Chao-Yang Shih 95 Master Adaptive Intelligence Architecture in Pervasive Computing
Shiou-Hung Chen 94 Master Bot Detection Models and Corresponding Game Security Processes in Computer Online Games
Chia-hao Wang 94 Master A Novel Evaluation and Selection Model for Web Services
Hsiao-Yi Kuo 94 Master Two Hops Neighbor-aware Routing Protocol in Mobile Ad Hoc Networks
Yu-Hsing Chen 93 Master ezBusiness - A Novel Mobile e-Business Architecture
An-Tsan Tsai 93 Master A Study of Applying Genetic Algorithm to Decide the Timing of Trading Stocks
Shun-Yuan Chung 93 Master The Computing Analysis of Medical Image Processing in Grid Environment
Kuo-Hui Yeh 93 Master Fault-Tolerant Broadcasting Algorithm for Wormhole-Routed 2D Torus Networks
Yu-Chen Cheng Master
Shao-Kang Lu Master
Ping-Hsien Lin Master
Chia-Yi Wu Master
Chun-Kai Wang Master NFC-based User Authentication Mechanisms for Personalized IPTV Services
Ting-Hsuan Tseng Master Location-based Authentication Protocols for Mobile User Environments
Master
Master
Master
Master
Master
Master
Master