ICCL English‎ > ‎

About ICCL

Information security articles

LAB Host

Professor Shiun-Jeng WANG

Central Police University 
Dept. of Information Management


        In any social group, there will always be a handful of people with bad intentions. In the present scenario, the number of the global Internet users has already crossed one hundred million mark and even if the percentage of the population which performs illegal activities, also known as 'Hackers' is under one percent, the number is alarmingly high. To prevent hackers from invading and insure internet safety, we established Information Cryptology & Construction Lab in December, 1988. . 
   This laboratory is located in Information building of the Central Police University. At present, there are twenty members in this laboratory, and all members are passionate for research in the areas such Information security, Information concealment and brisk searching. Under the leadership Professor Shiuh Jeng Wang, we get to study the latest method which apply to data constructs and Internet security. We try to make the Internet more safer to use and enhance the searching speed of every application software.


        Because the changing of information technology, it is more and more important to protect the data and hide information. No matter in software or communication, the security issue must be strengthened; in order to prevent it for this reason, studying the knowledge of cryptography becomes an important subject. Due to this reason, we established the ICCL in December of the 87th year of the Republic of China.

      Just because we realize the demand for the security in the future, we are devoted to looking for the way that can be improved through on current technology, and making the new developing method complete. Through the two directions, we expect that we can offer more safe and perfect encryption to solve information safety problem. 


        This lab is dedicated in the development of data-transmitting mechanism on the Internet, strengthening the data-transmitting procedure to avoid many kinds of security threats and to establish a connection with trust and security. Besides, it also helps the policeman in developing operations for acquiring digital evidence with effectiveness, transparency, and justice.
       Based on these targets, the future developing directions should be to develop more secure crypto logical systems and to pursue research in computer forensics for its procedure and application.

"Laboratory Publications"

顯示 11 個項目
Book TitleAuthorDate Of PublicationLink
Book TitleAuthorDate Of PublicationLink
科技犯罪安全之數位鑑識:證據力與行動智慧應用 王旭正、林祝興、左瑞麟 2013年7月15日 科技犯罪安全之數位鑑識:證據力與行動智慧應用 
電腦、網路與行動服務安全實務 王旭正、楊中皇、李榮三 2012年9月28日 電腦、網路與行動服務安全實務 
數位影像處理與應用 王旭正、翁麒耀、林家禎 2012年8月13日 數位影像處理與應用 
電腦與網路安全實務 王旭正、楊中皇、雷欽隆、ICCL資訊密碼暨建構實驗室, Shiuh-Jeng Wang、Chung-Huang Yang、Chin-Laung Lei、ICCL 2009年8月31日 電腦與網路安全實務 
數位科技安全與鑑識-高科技犯罪預防與數位證據偵蒐 王旭正、林祝興、ICCL資訊密碼暨建構實驗室, Shiuh-Jeng Wang、Chu-Hsing Lin、ICCL 2009年3月12日 數位科技安全與鑑識-高科技犯罪預防與數位證據偵蒐 
資訊媒體安全─偽裝學與數位浮水印 王旭正、柯建萱、ICCL資訊密碼暨建構實驗室 2007年7月24日 資訊媒體安全─偽裝學與數位浮水印 
電腦鑑識與數位證據-資安技術、科技犯罪的預防、鑑定與現場重建 王旭正、柯永瀚 2007年6月16日 電腦鑑識與數位證據-資安技術、科技犯罪的預防、鑑定與現場重建 
資訊安全:網際網路安全與數位鑑識科學 王旭正 2007年1月1日 資訊安全:網際網路安全與數位鑑識科學 
資訊與網路安全: 秘密通訊與數位鑑識新技法 王旭正,柯宏叡,ICCL-資訊密碼暨建構實驗室 2006年3月28日 資訊與網路安全: 秘密通訊與數位鑑識新技法 
密碼學與網路安全-理論、實務與應用 王旭正、柯宏叡、ICCL-資訊密碼暨建構實驗室 2004年5月27日 密碼學與網路安全-理論、實務與應用 
資訊安全 高大宇,王旭正,資訊密碼暨建構實驗室 2003年6月30日 資訊安全 
顯示 11 個項目