dblp.uni-trier.dewww.uni-trier.de

Hung-Min Sun

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
48EEHung-Min Sun, King-Hang Wang, Chien-Ming Chen: On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. IEEE Trans. Dependable Sec. Comput. 6(2): 159-160 (2009)
2008
47EEHung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo: On the Improvement of the BDF Attack on LSBS-RSA. ACISP 2008: 84-97
46EEHung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang: Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. CANS 2008: 49-63
45EEHung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang: Histogram-based undetectable fidelity image in steganography as MSB controller. ICUIMC 2008: 566-569
44EEHung-Min Sun, King-Hang Wang: Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. ISECS 2008: 385-389
43EEYalin Chen, Jue-Sam Chou, Hung-Min Sun: A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 52(12): 2373-2380 (2008)
42EECheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun: Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security 3(3): 488-497 (2008)
2007
41EEHung-Min Sun, Mu-En Wu, Yao-Hsin Chen: Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. ACNS 2007: 116-128
40EEHung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen: Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. AINA Workshops (1) 2007: 457-462
39EEHung-Min Sun, Chien-Ming Chen, Feng-Ying Chu: An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks. ISCC 2007: 495-500
38EEHung-Min Sun, Mu-En Wu, Wei-Chi Ting, M. Jason Hinek: Dual RSA and Its Security Analysis. IEEE Transactions on Information Theory 53(8): 2922-2933 (2007)
2006
37EEHung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu: API Monitoring System for Defeating Worms and Exploits in MS-Windows System. ACISP 2006: 159-170
36EEHung-Min Sun, Her-Tyan Yeh: Password-based authentication and key distribution protocols with perfect forward secrecy. J. Comput. Syst. Sci. 72(6): 1002-1011 (2006)
2005
35EEHung-Min Sun, Chen-Jung Hong, Chiung-Hsun Chen: A new approach to feature-based copyright protection of images. ITRE 2005: 233-237
34EEHung-Min Sun, Cheng-Ta Yang: RSA with Balanced Short Exponents and Its Application to Entity Authentication. Public Key Cryptography 2005: 199-215
33EEHer-Tyan Yeh, Hung-Min Sun: Password authenticated key exchange protocols among diverse network domains. Computers & Electrical Engineering 31(3): 175-189 (2005)
32EEHung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng: On the security of some proxy blind signature schemes. Journal of Systems and Software 74(3): 297-302 (2005)
31EEHung-Min Sun, Bing-Chang Chen, Tzonelih Hwang: Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 75(1-2): 63-68 (2005)
2004
30EEHung-Min Sun, Bin-Tsan Hsieh: On the Security of Some Proxy Blind Signature Schemes. ACSW Frontiers 2004: 75-78
29EEHung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng: Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. EEE 2004: 565-568
28EEHung-Min Sun, Bing-Chang Chen, Her-Tyan Yeh: On the design of time-stamped signatures. J. Comput. Syst. Sci. 68(3): 598-610 (2004)
27EEHer-Tyan Yeh, Hung-Min Sun: Password-based user authentication and key distribution protocols for client-server applications. Journal of Systems and Software 72(1): 97-103 (2004)
2003
26EEHung-Min Sun, Her-Tyan Yeh, Tzonelih Hwang: On the Linkability of Some Group Signature Schemes. Informatica, Lith. Acad. Sci. 14(1): 85-94 (2003)
25EEBin-Tsan Hsieh, Hung-Min Sun, Tzonelih Hwang: On the Security of Some Password Authentication Protocols. Informatica, Lith. Acad. Sci. 14(2): 195-204 (2003)
24EEHer-Tyan Yeh, Hung-Min Sun, Tzonelih Hwang: Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks. J. Inf. Sci. Eng. 19(6): 1059-1070 (2003)
2002
23EEHung-Min Sun: Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes. Informatica, Lith. Acad. Sci. 13(1): 105-110 (2002)
22EEHung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih: On the Design of RSA With Short Secret Exponent. J. Inf. Sci. Eng. 18(1): 1-18 (2002)
21EEHung-Min Sun: On the Security of a Variation of Cramer-Shoup's Public Key Scheme. J. Inf. Sci. Eng. 18(1): 19-22 (2002)
20EEHer-Tyan Yeh, Hung-Min Sun: Simple authenticated key agreement protocol resistant to password guessing attacks. Operating Systems Review 36(4): 14-22 (2002)
2001
19 Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang: Efficient and Practical DHEKE Protocols. Operating Systems Review 35(1): 41-47 (2001)
2000
18 Hung-Min Sun: On the Dealer's Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank. Int. J. Found. Comput. Sci. 11(2): 263-281 (2000)
17EEHung-Min Sun: Enhancing the Security of the McEliece Public-Key Cryptosystem. J. Inf. Sci. Eng. 16(6): 799-812 (2000)
16 Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang: Three-party Encrypted Key Exchange: Attacks and A Solution. Operating Systems Review 34(4): 12-20 (2000)
1999
15 Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih: On the Design of RSA with Short Secret Exponent. ASIACRYPT 1999: 150-164
14 Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun: A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. Computer Communications 22(2): 193-194 (1999)
13EEHung-Min Sun: An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications 22(8): 717-722 (1999)
12EEHung-Min Sun: On-line multiple secret sharing based on a one-way function. Computer Communications 22(8): 745-748 (1999)
11EEHung-Min Sun, Shiuh-Pyng Shieh: Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures. J. Inf. Sci. Eng. 15(5): 679-689 (1999)
1998
10EEHung-Min Sun, Shiuh-Pyng Shieh: On Private-Key Cryptosystems Based on Product Codes. ACISP 1998: 68-79
9EEHung-Min Sun: Improving the Security of the McEliece Public-Key Cryptosystem. ASIACRYPT 1998: 200-213
8EEMarkus Michels, Markus Stadler, Hung-Min Sun: On the Security of Some Variants of the RSA Signature Scheme. ESORICS 1998: 85-96
7EEHung-Min Sun, Shiuh-Pyng Shieh: Secure broadcasting in large networks. Computer Communications 21(3): 279-283 (1998)
1997
6 Hung-Min Sun, Bor-Liang Chen: On the decomposition constructions for perfect secret sharing schemes. ICICS 1997: 50-60
5 Hung-Min Sun, Shiuh-Pyng Shieh: Secret Sharing in Graph-Based Prohibited Structures. INFOCOM 1997: 718-724
1996
4EEHung-Min Sun, Shiuh-Pyng Shieh: Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. ACM Conference on Computer and Communications Security 1996: 153-156
1994
3 Hung-Min Sun, Shiuh-Pyng Shieh: Optimal Information Dispersal for Reliable Communication in Computer Networks. ICPADS 1994: 460-465
2 Shiuh-Pyng Shieh, Hung-Min Sun: On Constructing Secret Sharing Schemes. INFOCOM 1994: 1288-1292
1 Hung-Min Sun, Shiuh-Pyng Shieh: On Dynamic Threshold Schemes. Inf. Process. Lett. 52(4): 201-206 (1994)

Coauthor Index

1Bing-Chang Chen [28] [31]
2Bor-Liang Chen [6]
3Chien-Ming Chen [39] [40] [48]
4Chiung-Hsun Chen [35]
5Yalin Chen [43]
6Yao-Hsin Chen [41]
7Jue-Sam Chou [43]
8Feng-Ying Chu [39]
9Jian Guo [46] [47]
10M. Jason Hinek [38]
11Chen-Jung Hong [35]
12Bin-Tsan Hsieh [25] [29] [30] [32]
13Shih-Pu Hsu [40]
14Tzonelih Hwang [16] [19] [24] [25] [26] [31]
15Chi-Sung Laih [15] [22]
16Chun-Li Lin [16] [19]
17Yue-Hsun Lin [37]
18Markus Michels [8]
19Shiuh-Pyng Shieh (Shiuh-Pyng Winston Shieh) [1] [2] [3] [4] [5] [7] [10] [11] [14]
20Markus Stadler [8]
21Ron Steinfeld [46]
22Hsin-Min Sun [14]
23Wei-Chi Ting [38]
24Vincent S. Tseng (Vincent Shin-Mu Tseng, Shin-Mu Tseng) [29] [32]
25Huaxiong Wang [46] [47]
26King-Hang Wang [44] [48]
27Shiuh-Jeng Wang [42] [45]
28Chi-Yao Weng [42] [45]
29Ming-Fung Wu [37]
30Mu-En Wu [38] [41] [46] [47]
31Cheng-Hsing Yang [42]
32Cheng-Ta Yang [34]
33Wu-Chuan Yang [15] [22]
34Her-Tyan Yeh [20] [24] [26] [27] [28] [33] [36]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)