Takip et
HM Sun
HM Sun
Professor of Computer Science, National Tsing Hua University
cs.nthu.edu.tw üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
An efficient remote use authentication scheme using smart cards
HM Sun
IEEE Transactions on Consumer Electronics 46 (4), 958-961, 2000
7012000
Adaptive data hiding in edge areas of images with spatial LSB domain systems
CH Yang, CY Weng, SJ Wang, HM Sun
IEEE Transactions on Information Forensics and Security 3 (3), 488-497, 2008
6062008
An efficient nonrepudiable threshold proxy signature scheme with known signers
HM Sun
Computer communications 22 (8), 717-722, 1999
2591999
Three-party encrypted key exchange: attacks and a solution
CL Lin, HM Sun, T Hwang
ACM SIGOPS Operating Systems Review 34 (4), 12-20, 2000
2582000
Threshold proxy signatures
HM Sun, NY Lee, T Hwang
IEE Proceedings-Computers and Digital Techniques 146 (5), 259-263, 1999
2251999
oPass: A user authentication protocol resistant to password stealing and password reuse attacks
HM Sun, YH Chen, YH Lin
IEEE transactions on information forensics and security 7 (2), 651-663, 2011
2132011
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
2112011
Three-party encrypted key exchange without server public-keys
CL Lin, HM Sun, M Steiner, T Hwang
IEEE Communications letters 5 (12), 497-499, 2001
1952001
Attacks and solutions on strong-password authentication
CL Lin, HM Sun, T Hwang
IEICE transactions on communications 84 (9), 2622-2627, 2001
1932001
A novel mutual authentication scheme based on quadratic residues for RFID systems
Y Chen, JS Chou, HM Sun
Computer Networks 52 (12), 2373-2380, 2008
1872008
On the security of Chien's ultralightweight RFID authentication protocol
HM Sun, WC Ting, KH Wang
IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009
1782009
Dual RSA and its security analysis
HM Sun, ME Wu, WC Ting, MJ Hinek
IEEE Transactions on Information Theory 53 (8), 2922-2933, 2007
1672007
On proxy (multi-) signature schemes
HM Sun
1522000
A shoulder surfing resistant graphical authentication system
HM Sun, ST Chen, JH Yeh, CY Cheng
IEEE Transactions on Dependable and Secure Computing 15 (2), 180-193, 2016
1432016
Secure key agreement protocols for three-party against guessing attacks
HM Sun, BC Chen, T Hwang
Journal of Systems and Software 75 (1-2), 63-68, 2005
1332005
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
1262009
On the security of some proxy blind signature schemes
HM Sun, BT Hsieh, SM Tseng
Journal of systems and software 74 (3), 297-302, 2005
1242005
A Gen2-based RFID authentication protocol for security and privacy
HM Sun, WC Ting
IEEE Transactions on Mobile Computing 8 (8), 1052-1062, 2008
1182008
An Android mutation malware detection based on deep learning using visualization of importance from codes
YS Yen, HM Sun
Microelectronics Reliability 93, 109-114, 2019
1012019
Security analysis of Shim's authenticated key agreement protocols from pairings
HM Sun, BT Hsieh
Cryptology EPrint Archive, 2003
1012003
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20