Folgen
HM Sun
HM Sun
Professor of Computer Science, National Tsing Hua University
Bestätigte E-Mail-Adresse bei cs.nthu.edu.tw
Titel
Zitiert von
Zitiert von
Jahr
An efficient remote use authentication scheme using smart cards
HM Sun
IEEE Transactions on Consumer Electronics 46 (4), 958-961, 2000
6982000
Adaptive data hiding in edge areas of images with spatial LSB domain systems
CH Yang, CY Weng, SJ Wang, HM Sun
IEEE Transactions on Information Forensics and Security 3 (3), 488-497, 2008
6032008
An efficient nonrepudiable threshold proxy signature scheme with known signers
HM Sun
Computer communications 22 (8), 717-722, 1999
2621999
Three-party encrypted key exchange: attacks and a solution
CL Lin, HM Sun, T Hwang
ACM SIGOPS Operating Systems Review 34 (4), 12-20, 2000
2572000
Threshold proxy signatures
HM Sun, NY Lee, T Hwang
IEE Proceedings-Computers and Digital Techniques 146 (5), 259-263, 1999
2271999
oPass: A user authentication protocol resistant to password stealing and password reuse attacks
HM Sun, YH Chen, YH Lin
IEEE transactions on information forensics and security 7 (2), 651-663, 2011
2202011
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
2122011
Three-party encrypted key exchange without server public-keys
CL Lin, HM Sun, M Steiner, T Hwang
IEEE Communications letters 5 (12), 497-499, 2001
1942001
Attacks and solutions on strong-password authentication
CL Lin, HM Sun, T Hwang
IEICE transactions on communications 84 (9), 2622-2627, 2001
1912001
A novel mutual authentication scheme based on quadratic residues for RFID systems
Y Chen, JS Chou, HM Sun
Computer Networks 52 (12), 2373-2380, 2008
1842008
On the security of Chien's ultralightweight RFID authentication protocol
HM Sun, WC Ting, KH Wang
IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009
1812009
Dual RSA and its security analysis
HM Sun, ME Wu, WC Ting, MJ Hinek
IEEE Transactions on Information Theory 53 (8), 2922-2933, 2007
1692007
On proxy (multi-) signature schemes
HM Sun
1522000
A shoulder surfing resistant graphical authentication system
HM Sun, ST Chen, JH Yeh, CY Cheng
IEEE Transactions on Dependable and Secure Computing 15 (2), 180-193, 2016
1452016
On the security of some proxy blind signature schemes
HM Sun, BT Hsieh, SM Tseng
Journal of systems and software 74 (3), 297-302, 2005
1372005
Secure key agreement protocols for three-party against guessing attacks
HM Sun, BC Chen, T Hwang
Journal of Systems and Software 75 (1-2), 63-68, 2005
1322005
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
1262009
A Gen2-based RFID authentication protocol for security and privacy
HM Sun, WC Ting
IEEE Transactions on Mobile Computing 8 (8), 1052-1062, 2008
1182008
A blockchain-based application system for product anti-counterfeiting
J Ma, SY Lin, X Chen, HM Sun, YC Chen, H Wang
IEEE Access 8, 77642-77652, 2020
1012020
An Android mutation malware detection based on deep learning using visualization of importance from codes
YS Yen, HM Sun
Microelectronics Reliability 93, 109-114, 2019
1012019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20