Basic Search / Search Result

  • Search Result: 7results Search Strategy: "Department of Computer Science and Information Engineering".edept (Phrase) and ekeyword.raw="Zero Trust Architecture"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Strategies for Taiwan's Financial Industry to Introduce Zero Trust Architecture
    • Department of Information Management /111/ Master
    • Author: CHUN-LIANG LIU Advisor: Nai-Wei Lo
    • In recent years, with the increase in cloud computing and digital applications in enterprises, and …
    • Clicks: 864Downloads: 17
    • Full text public date 2033/08/03 (Internet public)
    • Full text public date 2033/08/03 (National library)

    2

    Implemented Zero Trust Network on P4 with QoS
    • Department of Computer Science and Information Engineering /112/ Master
    • Author: Pin-Hsuan Lee Advisor: Shan-Hsiang Shen
    • HTTP attacks are application layer denial of service on web servers, with the goal of exhausting th…
    • Clicks: 363Downloads: 0
    • Full text public date 2027/07/15 (Intranet public)
    • Full text public date 2027/07/15 (Internet public)
    • Full text public date 2027/07/15 (National library)

    3

    Constructing a Dynamic Trust Assessment Mechanism Combining Zero Knowledge Proof with Unsupervised Learning
    • A.I. Cross-disciplinary Tech /112/ Master
    • Author: CHI-YANG CHANG Advisor: Nai-Wei Lo Chih-Chieh Chang
    • With the rapid development of IoT technology, connected devices have increasingly become targets of…
    • Clicks: 538Downloads: 10
    • Full text public date 2026/08/20 (Internet public)
    • Full text public date 2026/08/20 (National library)

    4

    An enhanced token-based authentication scheme using OAuth for Zero Trust Architecture

    5

    On Risk Provision for SDP-based Zero Trust Architecture

    6

    NFS Authorization Mechanism with P4 to Achieve Zero Trust Architecture
    • Department of Computer Science and Information Engineering /112/ Master
    • Author: Yu-Ting Wang Advisor: Shan-Hsiang Shen
    • Current network security is insufficient for organizations to achieve zero concept where network m…
    • Clicks: 424Downloads: 0
    • Full text public date 2029/08/19 (Intranet public)
    • Full text public date 2034/08/19 (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    7

    A Framework for Real-Time Anomaly Behavior Detection Across Institutions Based on Long Short Term Memory Models and Zero Knowledge Proof
    • A.I. Cross-disciplinary Tech /112/ Master
    • Author: Zi-Xun Cai Advisor: Nai-Wei Lo Chih-Chieh Chang
    • As emerging attack techniques evolve, traditional defense methods relying on static authentication …
    • Clicks: 441Downloads: 8
    • Full text public date 2026/08/21 (Internet public)
    • Full text public date 2026/08/21 (National library)
    1