关注
HM Sun
HM Sun
Professor of Computer Science, National Tsing Hua University
在 cs.nthu.edu.tw 的电子邮件经过验证
标题
引用次数
引用次数
年份
An efficient remote use authentication scheme using smart cards
HM Sun
IEEE Transactions on Consumer Electronics 46 (4), 958-961, 2000
6942000
Adaptive data hiding in edge areas of images with spatial LSB domain systems
CH Yang, CY Weng, SJ Wang, HM Sun
IEEE Transactions on Information Forensics and Security 3 (3), 488-497, 2008
5932008
An efficient nonrepudiable threshold proxy signature scheme with known signers
HM Sun
Computer communications 22 (8), 717-722, 1999
2611999
Three-party encrypted key exchange: attacks and a solution
CL Lin, HM Sun, T Hwang
ACM SIGOPS Operating Systems Review 34 (4), 12-20, 2000
2552000
Threshold proxy signatures
HM Sun, NY Lee, T Hwang
IEE Proceedings-Computers and Digital Techniques 146 (5), 259-263, 1999
2251999
oPass: A user authentication protocol resistant to password stealing and password reuse attacks
HM Sun, YH Chen, YH Lin
IEEE transactions on information forensics and security 7 (2), 651-663, 2011
2172011
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
2102011
Three-party encrypted key exchange without server public-keys
CL Lin, HM Sun, M Steiner, T Hwang
IEEE Communications letters 5 (12), 497-499, 2001
1932001
Attacks and solutions on strong-password authentication
CL Lin, HM Sun, T Hwang
IEICE transactions on communications 84 (9), 2622-2627, 2001
1922001
A novel mutual authentication scheme based on quadratic residues for RFID systems
Y Chen, JS Chou, HM Sun
Computer Networks 52 (12), 2373-2380, 2008
1832008
On the security of Chien's ultralightweight RFID authentication protocol
HM Sun, WC Ting, KH Wang
IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009
1792009
Dual RSA and its security analysis
HM Sun, ME Wu, WC Ting, MJ Hinek
IEEE Transactions on Information Theory 53 (8), 2922-2933, 2007
1632007
On proxy (multi-) signature schemes
HM Sun
1512000
On the security of some proxy blind signature schemes
HM Sun, BT Hsieh, SM Tseng
Journal of systems and software 74 (3), 297-302, 2005
1382005
A shoulder surfing resistant graphical authentication system
HM Sun, ST Chen, JH Yeh, CY Cheng
IEEE Transactions on Dependable and Secure Computing 15 (2), 180-193, 2016
1312016
Secure key agreement protocols for three-party against guessing attacks
HM Sun, BC Chen, T Hwang
Journal of Systems and Software 75 (1-2), 63-68, 2005
1302005
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
1262009
A Gen2-based RFID authentication protocol for security and privacy
HM Sun, WC Ting
IEEE Transactions on Mobile Computing 8 (8), 1052-1062, 2008
1172008
CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks
YH Lin, SY Chang, HM Sun
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1471-1483, 2012
1002012
Security analysis of Shim's authenticated key agreement protocols from pairings
HM Sun, BT Hsieh
Cryptology EPrint Archive, 2003
992003
系统目前无法执行此操作,请稍后再试。
文章 1–20