An efficient remote use authentication scheme using smart cards HM Sun IEEE Transactions on Consumer Electronics 46 (4), 958-961, 2000 | 694 | 2000 |
Adaptive data hiding in edge areas of images with spatial LSB domain systems CH Yang, CY Weng, SJ Wang, HM Sun IEEE Transactions on Information Forensics and Security 3 (3), 488-497, 2008 | 593 | 2008 |
An efficient nonrepudiable threshold proxy signature scheme with known signers HM Sun Computer communications 22 (8), 717-722, 1999 | 261 | 1999 |
Three-party encrypted key exchange: attacks and a solution CL Lin, HM Sun, T Hwang ACM SIGOPS Operating Systems Review 34 (4), 12-20, 2000 | 255 | 2000 |
Threshold proxy signatures HM Sun, NY Lee, T Hwang IEE Proceedings-Computers and Digital Techniques 146 (5), 259-263, 1999 | 225 | 1999 |
oPass: A user authentication protocol resistant to password stealing and password reuse attacks HM Sun, YH Chen, YH Lin IEEE transactions on information forensics and security 7 (2), 651-663, 2011 | 217 | 2011 |
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks CM Chen, YH Lin, YC Lin, HM Sun IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011 | 210 | 2011 |
Three-party encrypted key exchange without server public-keys CL Lin, HM Sun, M Steiner, T Hwang IEEE Communications letters 5 (12), 497-499, 2001 | 193 | 2001 |
Attacks and solutions on strong-password authentication CL Lin, HM Sun, T Hwang IEICE transactions on communications 84 (9), 2622-2627, 2001 | 192 | 2001 |
A novel mutual authentication scheme based on quadratic residues for RFID systems Y Chen, JS Chou, HM Sun Computer Networks 52 (12), 2373-2380, 2008 | 183 | 2008 |
On the security of Chien's ultralightweight RFID authentication protocol HM Sun, WC Ting, KH Wang IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009 | 179 | 2009 |
Dual RSA and its security analysis HM Sun, ME Wu, WC Ting, MJ Hinek IEEE Transactions on Information Theory 53 (8), 2922-2933, 2007 | 163 | 2007 |
On proxy (multi-) signature schemes HM Sun | 151 | 2000 |
On the security of some proxy blind signature schemes HM Sun, BT Hsieh, SM Tseng Journal of systems and software 74 (3), 297-302, 2005 | 138 | 2005 |
A shoulder surfing resistant graphical authentication system HM Sun, ST Chen, JH Yeh, CY Cheng IEEE Transactions on Dependable and Secure Computing 15 (2), 180-193, 2016 | 131 | 2016 |
Secure key agreement protocols for three-party against guessing attacks HM Sun, BC Chen, T Hwang Journal of Systems and Software 75 (1-2), 63-68, 2005 | 130 | 2005 |
Spate: small-group pki-less authenticated trust establishment YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 126 | 2009 |
A Gen2-based RFID authentication protocol for security and privacy HM Sun, WC Ting IEEE Transactions on Mobile Computing 8 (8), 1052-1062, 2008 | 117 | 2008 |
CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks YH Lin, SY Chang, HM Sun IEEE Transactions on Knowledge and Data Engineering 25 (7), 1471-1483, 2012 | 100 | 2012 |
Security analysis of Shim's authenticated key agreement protocols from pairings HM Sun, BT Hsieh Cryptology EPrint Archive, 2003 | 99 | 2003 |