עקוב אחר
HM Sun
HM Sun
Professor of Computer Science, National Tsing Hua University
כתובת אימייל מאומתת בדומיין cs.nthu.edu.tw
כותרת
צוטט על ידי
צוטט על ידי
שנה
An efficient remote use authentication scheme using smart cards
HM Sun
IEEE Transactions on Consumer Electronics 46 (4), 958-961, 2000
6972000
Adaptive data hiding in edge areas of images with spatial LSB domain systems
CH Yang, CY Weng, SJ Wang, HM Sun
IEEE Transactions on Information Forensics and Security 3 (3), 488-497, 2008
6042008
An efficient nonrepudiable threshold proxy signature scheme with known signers
HM Sun
Computer communications 22 (8), 717-722, 1999
2611999
Three-party encrypted key exchange: attacks and a solution
CL Lin, HM Sun, T Hwang
ACM SIGOPS Operating Systems Review 34 (4), 12-20, 2000
2572000
Threshold proxy signatures
HM Sun, NY Lee, T Hwang
IEE Proceedings-Computers and Digital Techniques 146 (5), 259-263, 1999
2271999
oPass: A user authentication protocol resistant to password stealing and password reuse attacks
HM Sun, YH Chen, YH Lin
IEEE transactions on information forensics and security 7 (2), 651-663, 2011
2192011
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
2122011
Three-party encrypted key exchange without server public-keys
CL Lin, HM Sun, M Steiner, T Hwang
IEEE Communications letters 5 (12), 497-499, 2001
1942001
Attacks and solutions on strong-password authentication
CL Lin, HM Sun, T Hwang
IEICE transactions on communications 84 (9), 2622-2627, 2001
1912001
A novel mutual authentication scheme based on quadratic residues for RFID systems
Y Chen, JS Chou, HM Sun
Computer Networks 52 (12), 2373-2380, 2008
1862008
On the security of Chien's ultralightweight RFID authentication protocol
HM Sun, WC Ting, KH Wang
IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009
1802009
Dual RSA and its security analysis
HM Sun, ME Wu, WC Ting, MJ Hinek
IEEE Transactions on Information Theory 53 (8), 2922-2933, 2007
1632007
On proxy (multi-) signature schemes
HM Sun
1512000
A shoulder surfing resistant graphical authentication system
HM Sun, ST Chen, JH Yeh, CY Cheng
IEEE Transactions on Dependable and Secure Computing 15 (2), 180-193, 2016
1422016
On the security of some proxy blind signature schemes
HM Sun, BT Hsieh, SM Tseng
Journal of systems and software 74 (3), 297-302, 2005
1372005
Secure key agreement protocols for three-party against guessing attacks
HM Sun, BC Chen, T Hwang
Journal of Systems and Software 75 (1-2), 63-68, 2005
1322005
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
1262009
A Gen2-based RFID authentication protocol for security and privacy
HM Sun, WC Ting
IEEE Transactions on Mobile Computing 8 (8), 1052-1062, 2008
1182008
Security analysis of Shim's authenticated key agreement protocols from pairings
HM Sun, BT Hsieh
Cryptology EPrint Archive, 2003
1002003
CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks
YH Lin, SY Chang, HM Sun
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1471-1483, 2012
992012
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20