An efficient remote use authentication scheme using smart cards HM Sun IEEE Transactions on Consumer Electronics 46 (4), 958-961, 2000 | 698 | 2000 |
Adaptive data hiding in edge areas of images with spatial LSB domain systems CH Yang, CY Weng, SJ Wang, HM Sun IEEE Transactions on Information Forensics and Security 3 (3), 488-497, 2008 | 603 | 2008 |
An efficient nonrepudiable threshold proxy signature scheme with known signers HM Sun Computer communications 22 (8), 717-722, 1999 | 262 | 1999 |
Three-party encrypted key exchange: attacks and a solution CL Lin, HM Sun, T Hwang ACM SIGOPS Operating Systems Review 34 (4), 12-20, 2000 | 257 | 2000 |
Threshold proxy signatures HM Sun, NY Lee, T Hwang IEE Proceedings-Computers and Digital Techniques 146 (5), 259-263, 1999 | 227 | 1999 |
oPass: A user authentication protocol resistant to password stealing and password reuse attacks HM Sun, YH Chen, YH Lin IEEE transactions on information forensics and security 7 (2), 651-663, 2011 | 220 | 2011 |
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks CM Chen, YH Lin, YC Lin, HM Sun IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011 | 212 | 2011 |
Three-party encrypted key exchange without server public-keys CL Lin, HM Sun, M Steiner, T Hwang IEEE Communications letters 5 (12), 497-499, 2001 | 194 | 2001 |
Attacks and solutions on strong-password authentication CL Lin, HM Sun, T Hwang IEICE transactions on communications 84 (9), 2622-2627, 2001 | 191 | 2001 |
A novel mutual authentication scheme based on quadratic residues for RFID systems Y Chen, JS Chou, HM Sun Computer Networks 52 (12), 2373-2380, 2008 | 184 | 2008 |
On the security of Chien's ultralightweight RFID authentication protocol HM Sun, WC Ting, KH Wang IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009 | 181 | 2009 |
Dual RSA and its security analysis HM Sun, ME Wu, WC Ting, MJ Hinek IEEE Transactions on Information Theory 53 (8), 2922-2933, 2007 | 169 | 2007 |
On proxy (multi-) signature schemes HM Sun | 152 | 2000 |
A shoulder surfing resistant graphical authentication system HM Sun, ST Chen, JH Yeh, CY Cheng IEEE Transactions on Dependable and Secure Computing 15 (2), 180-193, 2016 | 145 | 2016 |
On the security of some proxy blind signature schemes HM Sun, BT Hsieh, SM Tseng Journal of systems and software 74 (3), 297-302, 2005 | 137 | 2005 |
Secure key agreement protocols for three-party against guessing attacks HM Sun, BC Chen, T Hwang Journal of Systems and Software 75 (1-2), 63-68, 2005 | 132 | 2005 |
Spate: small-group pki-less authenticated trust establishment YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 126 | 2009 |
A Gen2-based RFID authentication protocol for security and privacy HM Sun, WC Ting IEEE Transactions on Mobile Computing 8 (8), 1052-1062, 2008 | 118 | 2008 |
A blockchain-based application system for product anti-counterfeiting J Ma, SY Lin, X Chen, HM Sun, YC Chen, H Wang IEEE Access 8, 77642-77652, 2020 | 101 | 2020 |
An Android mutation malware detection based on deep learning using visualization of importance from codes YS Yen, HM Sun Microelectronics Reliability 93, 109-114, 2019 | 101 | 2019 |