The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hung-Min Sun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu
    API Monitoring System for Defeating Worms and Exploits in MS-Windows System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:159-170 [Conf]
  2. Hung-Min Sun, Shiuh-Pyng Shieh
    On Private-Key Cryptosystems Based on Product Codes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:68-79 [Conf]
  3. Hung-Min Sun, Bin-Tsan Hsieh
    On the Security of Some Proxy Blind Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:75-78 [Conf]
  4. Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen
    Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:457-462 [Conf]
  5. Hung-Min Sun
    Improving the Security of the McEliece Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:200-213 [Conf]
  6. Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih
    On the Design of RSA with Short Secret Exponent. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:150-164 [Conf]
  7. Hung-Min Sun, Shiuh-Pyng Shieh
    Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:153-156 [Conf]
  8. Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng
    Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:565-568 [Conf]
  9. Markus Michels, Markus Stadler, Hung-Min Sun
    On the Security of Some Variants of the RSA Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:85-96 [Conf]
  10. Hung-Min Sun, Bor-Liang Chen
    On the decomposition constructions for perfect secret sharing schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:50-60 [Conf]
  11. Hung-Min Sun, Shiuh-Pyng Shieh
    Optimal Information Dispersal for Reliable Communication in Computer Networks. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1994, pp:460-465 [Conf]
  12. Shiuh-Pyng Shieh, Hung-Min Sun
    On Constructing Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1994, pp:1288-1292 [Conf]
  13. Hung-Min Sun, Shiuh-Pyng Shieh
    Secret Sharing in Graph-Based Prohibited Structures. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:718-724 [Conf]
  14. Hung-Min Sun, Cheng-Ta Yang
    RSA with Balanced Short Exponents and Its Application to Entity Authentication. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:199-215 [Conf]
  15. Hung-Min Sun
    An efficient nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:717-722 [Journal]
  16. Hung-Min Sun
    On-line multiple secret sharing based on a one-way function. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:745-748 [Journal]
  17. Hung-Min Sun, Shiuh-Pyng Shieh
    Secure broadcasting in large networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:3, pp:279-283 [Journal]
  18. Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun
    A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:2, pp:193-194 [Journal]
  19. Hung-Min Sun
    On the Dealer's Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2000, v:11, n:2, pp:263-281 [Journal]
  20. Bin-Tsan Hsieh, Hung-Min Sun, Tzonelih Hwang
    On the Security of Some Password Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:2, pp:195-204 [Journal]
  21. Hung-Min Sun
    Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2002, v:13, n:1, pp:105-110 [Journal]
  22. Hung-Min Sun, Her-Tyan Yeh, Tzonelih Hwang
    On the Linkability of Some Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:1, pp:85-94 [Journal]
  23. Hung-Min Sun, Shiuh-Pyng Shieh
    On Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:52, n:4, pp:201-206 [Journal]
  24. Hung-Min Sun, Bing-Chang Chen, Her-Tyan Yeh
    On the design of time-stamped signatures. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2004, v:68, n:3, pp:598-610 [Journal]
  25. Hung-Min Sun, Her-Tyan Yeh
    Password-based authentication and key distribution protocols with perfect forward secrecy. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:6, pp:1002-1011 [Journal]
  26. Hung-Min Sun
    Enhancing the Security of the McEliece Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2000, v:16, n:6, pp:799-812 [Journal]
  27. Hung-Min Sun
    On the Security of a Variation of Cramer-Shoup's Public Key Scheme. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:1, pp:19-22 [Journal]
  28. Hung-Min Sun, Shiuh-Pyng Shieh
    Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:5, pp:679-689 [Journal]
  29. Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih
    On the Design of RSA With Short Secret Exponent. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:1, pp:1-18 [Journal]
  30. Her-Tyan Yeh, Hung-Min Sun, Tzonelih Hwang
    Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2003, v:19, n:6, pp:1059-1070 [Journal]
  31. Hung-Min Sun, Bing-Chang Chen, Tzonelih Hwang
    Secure key agreement protocols for three-party against guessing attacks. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:63-68 [Journal]
  32. Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng
    On the security of some proxy blind signature schemes. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:74, n:3, pp:297-302 [Journal]
  33. Her-Tyan Yeh, Hung-Min Sun
    Password-based user authentication and key distribution protocols for client-server applications. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:72, n:1, pp:97-103 [Journal]
  34. Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang
    Three-party Encrypted Key Exchange: Attacks and A Solution. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2000, v:34, n:4, pp:12-20 [Journal]
  35. Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang
    Efficient and Practical DHEKE Protocols. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2001, v:35, n:1, pp:41-47 [Journal]
  36. Her-Tyan Yeh, Hung-Min Sun
    Simple authenticated key agreement protocol resistant to password guessing attacks. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:14-22 [Journal]
  37. Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen
    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:116-128 [Conf]
  38. Her-Tyan Yeh, Hung-Min Sun
    Password authenticated key exchange protocols among diverse network domains. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2005, v:31, n:3, pp:175-189 [Journal]

  39. On the Improvement of the BDF Attack on LSBS-RSA. [Citation Graph (, )][DBLP]


  40. A Study of User-Friendly Hash Comparison Schemes. [Citation Graph (, )][DBLP]


  41. DepenDNS: Dependable Mechanism against DNS Cache Poisoning. [Citation Graph (, )][DBLP]


  42. Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. [Citation Graph (, )][DBLP]


  43. An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  44. Efficient Authentication Schemes for Handover in Mobile WiMAX. [Citation Graph (, )][DBLP]


  45. Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem. [Citation Graph (, )][DBLP]


  46. SPATE: small-group PKI-less authenticated trust establishment. [Citation Graph (, )][DBLP]


  47. A new approach to feature-based copyright protection of images. [Citation Graph (, )][DBLP]


  48. Histogram-based undetectable fidelity image in steganography as MSB controller. [Citation Graph (, )][DBLP]


  49. A Real-Time Selective Video Encryption Using Context-Key Control. [Citation Graph (, )][DBLP]


  50. Common Friends Discovery with Privacy and Authenticity. [Citation Graph (, )][DBLP]


  51. Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. [Citation Graph (, )][DBLP]


  52. Secure and Efficient Handover Schemes for Heterogeneous Networks. [Citation Graph (, )][DBLP]


  53. An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX. [Citation Graph (, )][DBLP]


  54. A Trustable Reputation Scheme Based on Private Relationships. [Citation Graph (, )][DBLP]


  55. A novel mutual authentication scheme based on quadratic residues for RFID systems. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.287secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002