default search action
Hung-Min Sun
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j92]Yeh-Cheng Chen, Hung-Min Sun, Ruey-Shun Chen, Jyh-haw Yeh, Xiaopeng Fan, I-Hsin Chou:
Intelligent radioactive waste process cloud-based system for nuclear power plant decommissioning. J. Ambient Intell. Humaniz. Comput. 15(3): 1801-1811 (2024) - [j91]Apoorv Saxena, Hung-Min Sun:
TokenDoc: Source Authentication With a Hybrid Approach of Smart Contract and RNN-Based Models With AES Encryption. IEEE Trans. Engineering Management 71: 12418-12432 (2024) - [j90]Qi-Xian Huang, Lin-Kuan Chiang, Min-Yi Chiu, Hung-Min Sun:
Focus-Shifting Attack: An Adversarial Attack That Retains Saliency Map Information and Manipulates Model Explanations. IEEE Trans. Reliab. 73(2): 808-819 (2024) - [i11]Hong-Sheng Huang, Zhe-Yi Jiang, Hsuan-Tung Cheng, Hung-Min Sun:
Hybrid Online Certificate Status Protocol with Certificate Revocation List for Smart Grid Public Key Infrastructure. CoRR abs/2401.10787 (2024) - [i10]Hong-Sheng Huang, Cheng-Che Chuang, Jhih-Zen Shih, Hsuan-Tung Chen, Hung-Min Sun:
An Enhanced Online Certificate Status Protocol for Public Key Infrastructure with Smart Grid and Energy Storage System. CoRR abs/2409.10929 (2024) - 2023
- [j89]Qi-Xian Huang, Guo-Shiang Lin, Hung-Min Sun:
Classification of Polyps in Endoscopic Images Using Self-Supervised Structured Learning. IEEE Access 11: 50025-50037 (2023) - [i9]Jia-Yi Jhan, Hung-Min Sun:
Enhancing Modbus TCP Protocol Security with eBPF Technology. CoRR abs/2312.05665 (2023) - 2022
- [j88]Qi-Xian Huang, Wai Leong Yap, Min-Yi Chiu, Hung-Min Sun:
Privacy-Preserving Deep Learning With Learnable Image Encryption on Medical Images. IEEE Access 10: 66345-66355 (2022) - [j87]Qi-Xian Huang, Ming-Chang Lu, Min-Yi Chiu, Yuan-Chia Tsai, Hung-Min Sun:
PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion. Sensors 22(5): 1882 (2022) - [c63]Xinxin Zhang, Li Xu, Zhenyu Xu, Hung-Min Sun, Chia-Wei Lee:
Information spreading in mobile social networks: identifying the influential nodes using FPSO algorithm. ICIT 2022: 41-46 - 2021
- [j86]Sibongakonke Kwanele Zungu, Qi-Xian Huang, Min-Yi Chiu, Hung-Min Sun:
Response and Surveillance System for Diarrhoea Based on a Patient Symptoms Using Machine Learning: A Study on Eswatini. IEEE Access 9: 152945-152959 (2021) - [j85]Chin-Yu Sun, Hsiao-Ling Wu, Hung-Min Sun, TingTing Hwang:
A New Attack for Self-Certified Digital Signatures for E-commerce Applications. J. Inf. Sci. Eng. 37(6): 1449-1466 (2021) - [j84]You-Ting Jiang, Hung-Min Sun:
A Blockchain-Based Vehicle Condition Recording System for Second-Hand Vehicle Market. Wirel. Commun. Mob. Comput. 2021: 6623251:1-6623251:10 (2021) - [c62]Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang, Hung-Min Sun:
PDF Malware Detection Using Visualization and Machine Learning. DBSec 2021: 209-220 - [c61]Ning Shen, Jyh-Haw Yeh, Hung-Min Sun, Chien-Ming Chen:
A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases. PRDC 2021: 133-142 - [c60]Qi-Xian Huang, Shu-Pei Shi, Guo-Shiang Lin, Day-Fann Shen, Hung-Min Sun:
A Co-Attention Method Based on Generative Adversarial Networks for Multi-view Images. SNPD 2021: 171-173 - 2020
- [j83]Jinhua Ma, Shih-Ya Lin, Xin Chen, Hung-Min Sun, Yeh-Cheng Chen, Huaxiong Wang:
A Blockchain-Based Application System for Product Anti-Counterfeiting. IEEE Access 8: 77642-77652 (2020) - [j82]Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu, Kim-Kwang Raymond Choo:
Secure search for encrypted personal health records from big data NoSQL databases in cloud. Computing 102(6): 1521-1545 (2020) - [j81]Wan-Chen Shi, Hung-Min Sun:
DeepBot: a time-based botnet detection with deep learning. Soft Comput. 24(21): 16605-16616 (2020) - [e1]Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020. ACM 2020, ISBN 978-1-4503-6750-9 [contents]
2010 – 2019
- 2019
- [j80]Yeh-Cheng Chen, Ruey-Shun Chen, Hung-Min Sun, S. Felix Wu:
Using RFID technology to develop an intelligent equipment lock management system. Int. J. Comput. Sci. Eng. 20(2): 157-165 (2019) - [j79]Yuan-Yuan Su, Hung-Min Sun:
Emotion-based color transfer of images using adjustable color combinations. Soft Comput. 23(3): 1007-1020 (2019) - [c59]Hung-Min Sun, Chi-En Shen, Chi-Yao Weng:
A Flexible Framework for Malicious Open XML Document Detection based on APT Attacks. INFOCOM Workshops 2019: 2005-2006 - 2018
- [j78]Yeh-Cheng Chen, C. N. Chu, Ruey-Shun Chen, Hung Min Sun, P. H. Ju:
RFID-based bonded warehouse for Science Park. Int. J. Radio Freq. Identif. Technol. Appl. 5(1): 1-23 (2018) - [j77]Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh, Chia-Yun Cheng:
A Shoulder Surfing Resistant Graphical Authentication System. IEEE Trans. Dependable Secur. Comput. 15(2): 180-193 (2018) - [j76]Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun:
A shareable keyword search over encrypted data in cloud computing. J. Supercomput. 74(3): 1001-1023 (2018) - [c58]Jyh-haw Yeh, Srisarguru Sridhar, Gaby G. Dagher, Hung-Min Sun, Ning Shen, Kathleen Dakota White:
A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption. PRDC 2018: 34-43 - [d1]Jyh-haw Yeh, Hung-Min Sun, Ujwal Karki, Daniel Kondratyuk, Ning Shen:
Integrity Coded Databases - Protecting Data Integrity for Outsourced Databases. IEEE DataPort, 2018 - 2017
- [j75]Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun:
Fast and low-complexity encoding of Raptor codes based on operation lists for known source block lengths. Multim. Tools Appl. 76(7): 9219-9243 (2017) - [c57]Yi-Wen Chen, Hung-Min Sun:
An Approach for Reducing the Traffic within Cloud Environments Based on Customized Linux Kernel. CloudCom 2017: 227-230 - [c56]Jeydels Barahona, Hung-Min Sun:
A Process for Exploring Employees' Relationships via Social Network and Sentiment Analysis. DMBD 2017: 3-8 - [c55]Wuxain Zhang, Hung-Min Sun:
Instagram Spam Detection. PRDC 2017: 227-228 - 2016
- [j74]Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Ruey-Kai Sheu, Hung-Min Sun:
Personal video delivery with rapid Raptor code decoder. Pers. Ubiquitous Comput. 20(6): 915-931 (2016) - [c54]Wei-Fa Liao, Hung-Min Sun, Wei Wu:
A Distributed and Autonomous Guard System Based on Cloud Environments. DASC/PiCom/DataCom/CyberSciTech 2016: 917-920 - [c53]Amir Rezapour, Wei Wu, Hung-Min Sun:
Cloud-Based Storage Model with Strong User Privacy Assurance. DMBD 2016: 373-378 - [c52]Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun:
Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. NSS 2016: 47-61 - [c51]Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun:
A System of Shareable Keyword Search on Encrypted Data. NSS 2016: 283-299 - 2015
- [j73]Chien-Ming Chen, Shuai-Min Chen, Wei-Chih Ting, Chi-Yi Kao, Hung-Min Sun:
An enhancement of return address stack for security. Comput. Stand. Interfaces 38: 17-24 (2015) - [j72]Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang:
A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321: 224-237 (2015) - [c50]Yuan-Yuan Su, Yu-Tzu Chang, Hung-Min Sun:
A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices. IIH-MSP 2015: 207-210 - [c49]Amir Rezapour, Shiuan-Tung Chen, Hung-Min Sun:
Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers. SmartCity 2015: 975-981 - [c48]Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun:
Accelerating Raptor Code Decoding Using Group Parameters for IPTV Service Delivery. SmartCity 2015: 1003-1009 - 2014
- [j71]Chien-Ming Chen, Yao-Hsin Chen, Yue-Hsun Lin, Hung-Min Sun:
Eliminating rouge femtocells based on distance bounding protocol and geographic information. Expert Syst. Appl. 41(2): 426-433 (2014) - [j70]Bing-Zhe He, Chien-Ming Chen, Yi-Ping Su, Hung-Min Sun:
A defence scheme against Identity Theft Attack based on multiple social networks. Expert Syst. Appl. 41(5): 2345-2352 (2014) - [j69]Shuai-Min Chen, Mu-En Wu, Hung-Min Sun, King-Hang Wang:
CRFID: An RFID system with a cloud database as a back-end server. Future Gener. Comput. Syst. 30: 155-161 (2014) - [j68]Mu-En Wu, Raylin Tso, Hung-Min Sun:
On the improvement of Fermat factorization using a continued fraction technique. Future Gener. Comput. Syst. 30: 162-168 (2014) - [j67]Mu-En Wu, Shih-Ying Chang, Chi-Jen Lu, Hung-Min Sun:
A communication-efficient private matching scheme in Client-Server model. Inf. Sci. 275: 348-359 (2014) - [j66]Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Lijun Yan, Huaxiong Wang, Hung-Min Sun:
Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID. J. Inf. Hiding Multim. Signal Process. 5(4): 642-648 (2014) - [c47]Ci-Rong Li, Chie-Yang Kuan, Bing-Zhe He, Wu-En Wu, Chi-Yao Weng, Hung-Min Sun:
A Security System Based on Door Movement Detecting. ECC (1) 2014: 155-163 - [c46]Bing-Zhe He, Kuan-Ling Huang, Hung-Min Sun, Raylin Tso:
A Virtual Network Guard System Based on Cloud Computing Environments. ICGEC 2014: 361-370 - [c45]Chien-Ming Chen, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun:
A Methodology for Hook-Based Kernel Level Rootkits. ISPEC 2014: 119-128 - [c44]Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun:
A New Public Key Encryption with Equality Test. NSS 2014: 550-557 - 2013
- [j65]Peichi Chao, Hung-Min Sun:
Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study. Inf. Sci. 245: 255-275 (2013) - [j64]Chien-Ming Chen, Yue-Hsun Lin, Yao-Hsin Chen, Hung-Min Sun:
SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN. J. Inf. Hiding Multim. Signal Process. 4(1): 57-72 (2013) - [j63]Hung-Min Sun, Chiung-Hsun Chen, Chih-Wen Yeh, Yao-Hsin Chen:
A collaborative routing protocol against routing disruptions in MANETs. Pers. Ubiquitous Comput. 17(5): 865-874 (2013) - [j62]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang, Cheng-Hsing Yang:
Data embedding in image-media using weight-function on modulo operations. ACM Trans. Embed. Comput. Syst. 12(2): 21:1-21:12 (2013) - [j61]Chien-Ming Chen, King-Hang Wang, Tsu-Yang Wu, Jeng-Shyang Pan, Hung-Min Sun:
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices. IEEE Trans. Inf. Forensics Secur. 8(8): 1318-1330 (2013) - [j60]Yue-Hsun Lin, Shih-Ying Chang, Hung-Min Sun:
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks. IEEE Trans. Knowl. Data Eng. 25(7): 1471-1483 (2013) - [c43]Chi-Yao Weng, Cheng-Hsing Yang, Chun-I Fan, Kuan-Liang Liu, Hung-Min Sun:
Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality. AsiaJCIS 2013: 102-107 - [c42]Lun-Pin Yuan, Bing-Zhe He, Chang-Shiun Liu, Hung-Min Sun:
A Secure and Flexible Data Aggregation Framework for Smart Grid. EMC/HumanCom 2013: 681-690 - [c41]Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun, Pei-Shan Zeng:
An HD streaming system for WiFi multicast channels based on application-layer FEC. ISCE 2013: 85-86 - [c40]Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun, Chia-Hsing Ho:
Efficient encoding of systematic Raptor codes based on operation lists for known block lengths. WCNC 2013: 4689-4694 - 2012
- [j59]Yalin Chen, Jue-Sam Chou, Hung-Min Sun, Ming-Sun Cho:
A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011). Electron. Commer. Res. Appl. 11(4): 443-444 (2012) - [j58]Hung-Min Sun, Chiung-Hsun Chen, Yu-Fang Ku:
A novel acknowledgment-based approach against collude attacks in MANET. Expert Syst. Appl. 39(9): 7968-7975 (2012) - [j57]Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng:
Enhanced authentication for commercial video services. Secur. Commun. Networks 5(11): 1248-1259 (2012) - [j56]Hung-Min Sun, Yao-Hsin Chen, Yue-Hsun Lin:
oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks. IEEE Trans. Inf. Forensics Secur. 7(2): 651-663 (2012) - [j55]Shih-Ying Chang, Yue-Hsun Lin, Hung-Min Sun, Mu-En Wu:
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks. ACM Trans. Sens. Networks 8(2): 13:1-13:13 (2012) - [j54]Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Min Sun:
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(4): 727-734 (2012) - [c39]Hung-Min Sun, Yao-Hsin Chen, Chiung-Cheng Fang, Shih-Ying Chang:
PassMap: a map based graphical-password authentication system. AsiaCCS 2012: 99-100 - [c38]Peichi Chao, Hung-Min Sun:
Multi-agent based cloud utilization for IT OA assets dispatching process in SCM's view: An empirical study. CSCWD 2012: 80-87 - [c37]Mu-En Wu, Raylin Tso, Hung-Min Sun:
Cryptanalysis of Exhaustive Search on Attacking RSA. NSS 2012: 373-379 - [c36]Mu-En Wu, Raylin Tso, Hung-Min Sun:
On the Improvement of Fermat Factorization. NSS 2012: 380-391 - 2011
- [j53]Yalin Chen, Jue-Sam Chou, Hung-Min Sun, Ming-Hsun Cho:
A novel electronic cash system with trustee-based anonymity revocation from pairing. Electron. Commer. Res. Appl. 10(6): 673-682 (2011) - [j52]Hung-Min Sun, Chi-Yao Weng, Chin-Feng Lee, Cheng-Hsing Yang:
Anti-Forensics with Steganographic Data Embedding in Digital Images. IEEE J. Sel. Areas Commun. 29(7): 1392-1403 (2011) - [j51]Hung-Min Sun, Hsun Wang, King-Hang Wang, Chien-Ming Chen:
A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code. IEEE Trans. Computers 60(6): 813-823 (2011) - [j50]Hung-Min Sun, Wei-Chih Ting, King-Hang Wang:
On the Security of Chien's Ultralightweight RFID Authentication Protocol. IEEE Trans. Dependable Secur. Comput. 8(2): 315-317 (2011) - [c35]Hung-Min Sun, Chiung-Hsun Chen, Po-Chi Li:
A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks. ICPP Workshops 2011: 101-107 - 2010
- [j49]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. J. Syst. Softw. 83(10): 1635-1643 (2010) - [j48]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization. J. Vis. Commun. Image Represent. 21(1): 49-55 (2010) - [j47]Hung-Min Sun, Huaxiong Wang, Bying-He Ku, Josef Pieprzyk:
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time. SIAM J. Discret. Math. 24(2): 617-638 (2010) - [j46]Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao, Eric Li-Hsiang Kuo, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Adrian Perrig, Bo-Yin Yang, Hung-Min Sun, Phen-Lan Lin, Jason Lee:
SPATE: Small-Group PKI-Less Authenticated Trust Establishment. IEEE Trans. Mob. Comput. 9(12): 1666-1681 (2010)
2000 – 2009
- 2009
- [j45]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Codebook-linked Watermarking Scheme for Digital Images. Fundam. Informaticae 92(4): 397-409 (2009) - [j44]Hung-Min Sun, Cheng-Ta Yang, Mu-En Wu:
Short-Exponent RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(3): 912-918 (2009) - [j43]Hung-Min Sun, Mu-En Wu, Cheng-Ta Yang:
A Note on Factoring alpha-LSBS Moduli. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 2137-2138 (2009) - [j42]Hung-Min Sun, Mu-En Wu, Cheng-Ta Yang:
Simple Backdoors on RSA Modulus by Using RSA Vulnerability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(9): 2326-2332 (2009) - [j41]Hung-Min Sun, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, Vincent S. Tseng:
Trading decryption for speeding encryption in Rebalanced-RSA. J. Syst. Softw. 82(9): 1503-1512 (2009) - [j40]Hung-Min Sun, King-Hang Wang, Chien-Ming Chen:
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. IEEE Trans. Dependable Secur. Comput. 6(2): 159-160 (2009) - [j39]Hung-Min Sun, King-Hang Wang, Wei-Chih Ting:
On the security of the secure arithmetic code. IEEE Trans. Inf. Forensics Secur. 4(4): 781-789 (2009) - [j38]Hung-Min Sun, Wei-Chih Ting:
A Gen2-Based RFID Authentication Protocol for Security and Privacy. IEEE Trans. Mob. Comput. 8(8): 1052-1062 (2009) - [j37]Hung-Min Sun, Muh-Chyi Leu:
An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems. IEEE Trans. Multim. 11(5): 947-959 (2009) - [c34]Hung-Min Sun, Muh-Chyi Leu:
A Real-Time Selective Video Encryption Using Context-Key Control. IAS 2009: 114-117 - [c33]Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun:
Common Friends Discovery with Privacy and Authenticity. IAS 2009: 337-340 - [c32]Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
A Study of User-Friendly Hash Comparison Schemes. ACSAC 2009: 105-114 - [c31]Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun:
A Trustable Reputation Scheme Based on Private Relationships. ASONAM 2009: 19-24 - [c30]Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin:
DepenDNS: Dependable Mechanism against DNS Cache Poisoning. CANS 2009: 174-188 - [c29]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems. IIH-MSP 2009: 365-368 - [c28]Hung-Min Sun, Cheng-Ta Yang, Yue-Hsun Lin, Mu-En Wu:
A Pair-wise Key Establishment for Wireless Sensor Networks. IIH-MSP 2009: 1152-1155 - [c27]Hung-Min Sun, Shih-Ying Chang, Yu-Hsiang Hung, Yu-Kai Tseng, Hsin-Ta Chiao:
Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem. ISPAN 2009: 260-265 - [c26]Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
SPATE: small-group PKI-less authenticated trust establishment. MobiSys 2009: 1-14 - [i8]Jue-Sam Chou, Yalin Chen, Ming-Hsun Cho, Hung-Min Sun:
A Novel ID-based Electronic Cash System from Pairings. IACR Cryptol. ePrint Arch. 2009: 339 (2009) - [i7]Hung-Min Sun, Yalin Chen, Jue-Sam Chou:
An Efficient Secure Oblivious Transfer. IACR Cryptol. ePrint Arch. 2009: 521 (2009) - 2008
- [j36]Yalin Chen, Jue-Sam Chou, Hung-Min Sun:
A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput. Networks 52(12): 2373-2380 (2008) - [j35]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Trans. Inf. Forensics Secur. 3(3): 488-497 (2008) - [j34]Hung-Min Sun, Chien-Ming Chen, Cheng-Zong Shieh:
Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems. IEEE Trans. Multim. 10(6): 1109-1120 (2008) - [c25]Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo:
On the Improvement of the BDF Attack on LSBS-RSA. ACISP 2008: 84-97 - [c24]Hung-Min Sun, Shih-Ying Chang, Shuai-Min Chen, Chien-Chien Chiu:
An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX. APSCC 2008: 199-204 - [c23]Hung-Min Sun, Shuai-Min Chen, Yao-Hsin Chen, Heng-Jeng Chung, I-Hung Lin:
Secure and Efficient Handover Schemes for Heterogeneous Networks. APSCC 2008: 205-210 - [c22]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. CANS 2008: 49-63 - [c21]Hung-Min Sun, Yue-Hsun Lin, Ying-Chu Hsiao, Chien-Ming Chen:
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks. ICESS 2008: 19-26 - [c20]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:
Histogram-based undetectable fidelity image in steganography as MSB controller. ICUIMC 2008: 566-569 - [c19]Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin, Shin-Yan Chiou:
Efficient Authentication Schemes for Handover in Mobile WiMAX. ISDA (3) 2008: 235-240 - [c18]Hung-Min Sun, King-Hang Wang:
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. ISECS 2008: 385-389 - [i6]Hung-Min Sun, Wei-Chih Ting, King-Hang Wang:
On the Security of Chien's Ultralightweight RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2008: 83 (2008) - [i5]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. IACR Cryptol. ePrint Arch. 2008: 296 (2008) - [i4]Yalin Chen, Hung-Min Sun, Chun-Hui Huang, Jue-Sam Chou:
Comments on two password based protocols. IACR Cryptol. ePrint Arch. 2008: 400 (2008) - 2007
- [j33]Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, M. Jason Hinek:
Dual RSA and Its Security Analysis. IEEE Trans. Inf. Theory 53(8): 2922-2933 (2007) - [c17]Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen:
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. ACNS 2007: 116-128 - [c16]Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen:
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. AINA Workshops (1) 2007: 457-462 - [c15]Hung-Min Sun, Chien-Ming Chen, Feng-Ying Chu:
An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks. ISCC 2007: 495-500 - 2006
- [j32]Hung-Min Sun, Her-Tyan Yeh:
Password-based authentication and key distribution protocols with perfect forward secrecy. J. Comput. Syst. Sci. 72(6): 1002-1011 (2006) - [c14]Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu:
API Monitoring System for Defeating Worms and Exploits in MS-Windows System. ACISP 2006: 159-170 - 2005
- [j31]Her-Tyan Yeh, Hung-Min Sun:
Password authenticated key exchange protocols among diverse network domains. Comput. Electr. Eng. 31(3): 175-189 (2005) - [j30]Hung-Min Sun, Bin-Tsan Hsieh, Hsin-Jia Hwang:
Secure E-mail protocols providing perfect forward secrecy. IEEE Commun. Lett. 9(1): 58-60 (2005) - [j29]Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng:
On the security of some proxy blind signature schemes. J. Syst. Softw. 74(3): 297-302 (2005) - [j28]Hung-Min Sun, Bing-Chang Chen, Tzonelih Hwang:
Secure key agreement protocols for three-party against guessing attacks. J. Syst. Softw. 75(1-2): 63-68 (2005) - [c13]Hung-Min Sun, Chen-Jung Hong, Chiung-Hsun Chen:
A new approach to feature-based copyright protection of images. ITRE 2005: 233-237 - [c12]Hung-Min Sun, Cheng-Ta Yang:
RSA with Balanced Short Exponents and Its Application to Entity Authentication. Public Key Cryptography 2005: 199-215 - [i3]Hung-Min Sun, Mu-En Wu:
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent. IACR Cryptol. ePrint Arch. 2005: 53 (2005) - 2004
- [j27]Hung-Min Sun, Bing-Chang Chen, Her-Tyan Yeh:
On the design of time-stamped signatures. J. Comput. Syst. Sci. 68(3): 598-610 (2004) - [j26]Her-Tyan Yeh, Hung-Min Sun:
Password-based user authentication and key distribution protocols for client-server applications. J. Syst. Softw. 72(1): 97-103 (2004) - [c11]Hung-Min Sun, Bin-Tsan Hsieh:
On the Security of Some Proxy Blind Signature Schemes. ACSW 2004: 75-78 - [c10]Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng:
Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. EEE 2004: 565-568 - 2003
- [j25]Hung-Min Sun, Her-Tyan Yeh, Tzonelih Hwang:
On the Linkability of Some Group Signature Schemes. Informatica 14(1): 85-94 (2003) - [j24]Bin-Tsan Hsieh, Hung-Min Sun, Tzonelih Hwang:
On the Security of Some Password Authentication Protocols. Informatica 14(2): 195-204 (2003) - [j23]Her-Tyan Yeh, Hung-Min Sun, Tzonelih Hwang:
Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks. J. Inf. Sci. Eng. 19(6): 1059-1070 (2003) - [j22]Xun Yi, Chee Kheong Siew, Hung-Min Sun, Her-Tyan Yeh, Chun-Li Lin, Tzonelih Hwang:
Security of Park-Lim key agreement schemes for VSAT satellite communications. IEEE Trans. Veh. Technol. 52(2): 465-468 (2003) - [i2]Hung-Min Sun, Bin-Tsan Hsieh:
On the Security of Some Proxy Signature Schemes. IACR Cryptol. ePrint Arch. 2003: 68 (2003) - [i1]Hung-Min Sun, Bin-Tsan Hsieh:
Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings. IACR Cryptol. ePrint Arch. 2003: 113 (2003) - 2002
- [j21]Hung-Min Sun:
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes. Informatica 13(1): 105-110 (2002) - [j20]Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih:
On the Design of RSA With Short Secret Exponent. J. Inf. Sci. Eng. 18(1): 1-18 (2002) - [j19]Hung-Min Sun:
On the Security of a Variation of Cramer-Shoup's Public Key Scheme. J. Inf. Sci. Eng. 18(1): 19-22 (2002) - [j18]Her-Tyan Yeh, Hung-Min Sun:
Simple authenticated key agreement protocol resistant to password guessing attacks. ACM SIGOPS Oper. Syst. Rev. 36(4): 14-22 (2002) - 2001
- [j17]Hung-Min Sun:
Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices. IEEE Commun. Lett. 5(2): 61-63 (2001) - [j16]Her-Tyan Yeh, Hung-Min Sun, Tzonelih Hwang:
Security analysis of the generalized key agreement and password authentication protocol. IEEE Commun. Lett. 5(11): 462-463 (2001) - [j15]Chun-Li Lin, Hung-Min Sun, Michael Steiner, Tzonelih Hwang:
Three-party encrypted key exchange without server public-keys. IEEE Commun. Lett. 5(12): 497-499 (2001) - [j14]Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang:
Efficient and Practical DHEKE Protocols. ACM SIGOPS Oper. Syst. Rev. 35(1): 41-47 (2001) - 2000
- [j13]Hung-Min Sun:
Further cryptanalysis of the McEliece public-key cryptosystem. IEEE Commun. Lett. 4(1): 18-19 (2000) - [j12]Hung-Min Sun:
On the Dealer's Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank. Int. J. Found. Comput. Sci. 11(2): 263-281 (2000) - [j11]Hung-Min Sun:
Enhancing the Security of the McEliece Public-Key Cryptosystem. J. Inf. Sci. Eng. 16(6): 799-812 (2000) - [j10]Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang:
Three-party Encrypted Key Exchange: Attacks and A Solution. ACM SIGOPS Oper. Syst. Rev. 34(4): 12-20 (2000) - [j9]Hung-Min Sun:
An efficient remote use authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46(4): 958-961 (2000) - [j8]Shiuh-Pyng Shieh, Chern-Tang Lin, Wei-Bon Yang, Hung-Min Sun:
Digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Trans. Veh. Technol. 49(4): 1464-1473 (2000)
1990 – 1999
- 1999
- [j7]Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun:
A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. Comput. Commun. 22(2): 193-194 (1999) - [j6]Hung-Min Sun:
An efficient nonrepudiable threshold proxy signature scheme with known signers. Comput. Commun. 22(8): 717-722 (1999) - [j5]Hung-Min Sun:
On-line multiple secret sharing based on a one-way function. Comput. Commun. 22(8): 745-748 (1999) - [j4]Hung-Min Sun, Shiuh-Pyng Shieh:
Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures. J. Inf. Sci. Eng. 15(5): 679-689 (1999) - [c9]Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih:
On the Design of RSA with Short Secret Exponent. ASIACRYPT 1999: 150-164 - 1998
- [j3]Hung-Min Sun, Shiuh-Pyng Shieh:
Secure broadcasting in large networks. Comput. Commun. 21(3): 279-283 (1998) - [c8]Hung-Min Sun, Shiuh-Pyng Shieh:
On Private-Key Cryptosystems Based on Product Codes. ACISP 1998: 68-79 - [c7]Hung-Min Sun:
Improving the Security of the McEliece Public-Key Cryptosystem. ASIACRYPT 1998: 200-213 - [c6]Markus Michels, Markus Stadler, Hung-Min Sun:
On the Security of Some Variants of the RSA Signature Scheme. ESORICS 1998: 85-96 - 1997
- [j2]Shiuh-Pyng Shieh, Wen-Her Yang, Hung-Min Sun:
An authentication protocol without trusted third party. IEEE Commun. Lett. 1(3): 87-89 (1997) - [c5]Hung-Min Sun, Bor-Liang Chen:
On the decomposition constructions for perfect secret sharing schemes. ICICS 1997: 50-60 - [c4]Hung-Min Sun, Shiuh-Pyng Shieh:
Secret Sharing in Graph-Based Prohibited Structures. INFOCOM 1997: 718-724 - 1996
- [c3]Hung-Min Sun, Shiuh-Pyng Shieh:
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. CCS 1996: 153-156 - 1994
- [j1]Hung-Min Sun, Shiuh-Pyng Shieh:
On Dynamic Threshold Schemes. Inf. Process. Lett. 52(4): 201-206 (1994) - [c2]Hung-Min Sun, Shiuh-Pyng Shieh:
Optimal Information Dispersal for Reliable Communication in Computer Networks. ICPADS 1994: 460-465 - [c1]Shiuh-Pyng Shieh, Hung-Min Sun:
On Constructing Secret Sharing Schemes. INFOCOM 1994: 1288-1292
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint