Chin-Yu Sun

Orcid: 0000-0003-1034-8628

According to our database1, Chin-Yu Sun authored at least 20 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
M-Party: A Secure Dynamic Cache Partitioning by More Than Two Parties.
Proceedings of the 36th IEEE International System-on-Chip Conference, 2023

Note on "RAKS: robust authentication and key agreement scheme for satellite infrastructure".
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

Using Machine Learning for Efficient Smishing Detection.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

Applying the Diamond Model of Intrusion Analysis with Generative Pre-trained Transformer 3.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

Enhancing Cyber Threat Intelligence with Named Entity Recognition Using BERT-CRF.
Proceedings of the IEEE Global Communications Conference, 2023

2021
A New Attack for Self-Certified Digital Signatures for E-commerce Applications.
J. Inf. Sci. Eng., 2021

A novel privacy-preserving deep learning scheme without a cryptography component.
Comput. Electr. Eng., 2021

2019
A Novel Privacy-Preserving Deep Learning Scheme without Using Cryptography Component.
CoRR, 2019

2017
Notes on "Secure authentication scheme for IoT and cloud servers".
Pervasive Mob. Comput., 2017

2016
A secure authentication scheme with provable correctness for pay-TV systems.
Secur. Commun. Networks, 2016

A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing.
J. Inf. Hiding Multim. Signal Process., 2016

Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems.
Int. J. Netw. Secur., 2016

Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics".
Int. J. Netw. Secur., 2016

A Strong RSA-based and Certificateless-based Signature Scheme.
Int. J. Netw. Secur., 2016

2015
A dependable storage service system in cloud environment.
Secur. Commun. Networks, 2015

A Secure and Efficient Scheme for Digital Gift Certificates.
J. Inf. Hiding Multim. Signal Process., 2015

Novel and practical scheme based on secret sharing for laptop data protection.
IET Inf. Secur., 2015

2014
A Secure and Efficient Authentication Scheme for E-coupon Systems.
Wirel. Pers. Commun., 2014

Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications.
J. Inf. Hiding Multim. Signal Process., 2013


  Loading...