Search the dblp DataBase
Hung-Min Sun :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hung-Min Sun , Yue-Hsun Lin , Ming-Fung Wu API Monitoring System for Defeating Worms and Exploits in MS-Windows System. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:159-170 [Conf ] Hung-Min Sun , Shiuh-Pyng Shieh On Private-Key Cryptosystems Based on Product Codes. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:68-79 [Conf ] Hung-Min Sun , Bin-Tsan Hsieh On the Security of Some Proxy Blind Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2004, pp:75-78 [Conf ] Hung-Min Sun , Shih-Pu Hsu , Chien-Ming Chen Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:457-462 [Conf ] Hung-Min Sun Improving the Security of the McEliece Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:200-213 [Conf ] Hung-Min Sun , Wu-Chuan Yang , Chi-Sung Laih On the Design of RSA with Short Secret Exponent. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:150-164 [Conf ] Hung-Min Sun , Shiuh-Pyng Shieh Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:153-156 [Conf ] Hung-Min Sun , Bin-Tsan Hsieh , Shin-Mu Tseng Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. [Citation Graph (0, 0)][DBLP ] EEE, 2004, pp:565-568 [Conf ] Markus Michels , Markus Stadler , Hung-Min Sun On the Security of Some Variants of the RSA Signature Scheme. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:85-96 [Conf ] Hung-Min Sun , Bor-Liang Chen On the decomposition constructions for perfect secret sharing schemes. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:50-60 [Conf ] Hung-Min Sun , Shiuh-Pyng Shieh Optimal Information Dispersal for Reliable Communication in Computer Networks. [Citation Graph (0, 0)][DBLP ] ICPADS, 1994, pp:460-465 [Conf ] Shiuh-Pyng Shieh , Hung-Min Sun On Constructing Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1994, pp:1288-1292 [Conf ] Hung-Min Sun , Shiuh-Pyng Shieh Secret Sharing in Graph-Based Prohibited Structures. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1997, pp:718-724 [Conf ] Hung-Min Sun , Cheng-Ta Yang RSA with Balanced Short Exponents and Its Application to Entity Authentication. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:199-215 [Conf ] Hung-Min Sun An efficient nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:8, pp:717-722 [Journal ] Hung-Min Sun On-line multiple secret sharing based on a one-way function. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:8, pp:745-748 [Journal ] Hung-Min Sun , Shiuh-Pyng Shieh Secure broadcasting in large networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:3, pp:279-283 [Journal ] Hung-Min Sun , Shiuh-Pyng Shieh , Hsin-Min Sun A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:2, pp:193-194 [Journal ] Hung-Min Sun On the Dealer's Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2000, v:11, n:2, pp:263-281 [Journal ] Bin-Tsan Hsieh , Hung-Min Sun , Tzonelih Hwang On the Security of Some Password Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2003, v:14, n:2, pp:195-204 [Journal ] Hung-Min Sun Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2002, v:13, n:1, pp:105-110 [Journal ] Hung-Min Sun , Her-Tyan Yeh , Tzonelih Hwang On the Linkability of Some Group Signature Schemes. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2003, v:14, n:1, pp:85-94 [Journal ] Hung-Min Sun , Shiuh-Pyng Shieh On Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1994, v:52, n:4, pp:201-206 [Journal ] Hung-Min Sun , Bing-Chang Chen , Her-Tyan Yeh On the design of time-stamped signatures. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2004, v:68, n:3, pp:598-610 [Journal ] Hung-Min Sun , Her-Tyan Yeh Password-based authentication and key distribution protocols with perfect forward secrecy. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2006, v:72, n:6, pp:1002-1011 [Journal ] Hung-Min Sun Enhancing the Security of the McEliece Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2000, v:16, n:6, pp:799-812 [Journal ] Hung-Min Sun On the Security of a Variation of Cramer-Shoup's Public Key Scheme. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:1, pp:19-22 [Journal ] Hung-Min Sun , Shiuh-Pyng Shieh Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1999, v:15, n:5, pp:679-689 [Journal ] Hung-Min Sun , Wu-Chuan Yang , Chi-Sung Laih On the Design of RSA With Short Secret Exponent. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:1, pp:1-18 [Journal ] Her-Tyan Yeh , Hung-Min Sun , Tzonelih Hwang Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2003, v:19, n:6, pp:1059-1070 [Journal ] Hung-Min Sun , Bing-Chang Chen , Tzonelih Hwang Secure key agreement protocols for three-party against guessing attacks. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2005, v:75, n:1-2, pp:63-68 [Journal ] Hung-Min Sun , Bin-Tsan Hsieh , Shin-Mu Tseng On the security of some proxy blind signature schemes. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2005, v:74, n:3, pp:297-302 [Journal ] Her-Tyan Yeh , Hung-Min Sun Password-based user authentication and key distribution protocols for client-server applications. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2004, v:72, n:1, pp:97-103 [Journal ] Chun-Li Lin , Hung-Min Sun , Tzonelih Hwang Three-party Encrypted Key Exchange: Attacks and A Solution. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:4, pp:12-20 [Journal ] Chun-Li Lin , Hung-Min Sun , Tzonelih Hwang Efficient and Practical DHEKE Protocols. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2001, v:35, n:1, pp:41-47 [Journal ] Her-Tyan Yeh , Hung-Min Sun Simple authenticated key agreement protocol resistant to password guessing attacks. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2002, v:36, n:4, pp:14-22 [Journal ] Hung-Min Sun , Mu-En Wu , Yao-Hsin Chen Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:116-128 [Conf ] Her-Tyan Yeh , Hung-Min Sun Password authenticated key exchange protocols among diverse network domains. [Citation Graph (0, 0)][DBLP ] Computers & Electrical Engineering, 2005, v:31, n:3, pp:175-189 [Journal ] On the Improvement of the BDF Attack on LSBS-RSA. [Citation Graph (, )][DBLP ] A Study of User-Friendly Hash Comparison Schemes. [Citation Graph (, )][DBLP ] DepenDNS: Dependable Mechanism against DNS Cache Poisoning. [Citation Graph (, )][DBLP ] Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. [Citation Graph (, )][DBLP ] An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Efficient Authentication Schemes for Handover in Mobile WiMAX. [Citation Graph (, )][DBLP ] Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem. [Citation Graph (, )][DBLP ] SPATE: small-group PKI-less authenticated trust establishment. [Citation Graph (, )][DBLP ] A new approach to feature-based copyright protection of images. [Citation Graph (, )][DBLP ] Histogram-based undetectable fidelity image in steganography as MSB controller. [Citation Graph (, )][DBLP ] A Real-Time Selective Video Encryption Using Context-Key Control. [Citation Graph (, )][DBLP ] Common Friends Discovery with Privacy and Authenticity. [Citation Graph (, )][DBLP ] Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. [Citation Graph (, )][DBLP ] Secure and Efficient Handover Schemes for Heterogeneous Networks. [Citation Graph (, )][DBLP ] An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX. [Citation Graph (, )][DBLP ] A Trustable Reputation Scheme Based on Private Relationships. [Citation Graph (, )][DBLP ] A novel mutual authentication scheme based on quadratic residues for RFID systems. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.287secs