Hung-Min Sun

According to our database1, Hung-Min Sun
  • authored at least 138 papers between 1994 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A shareable keyword search over encrypted data in cloud computing.
The Journal of Supercomputing, 2018

A Shoulder Surfing Resistant Graphical Authentication System.
IEEE Trans. Dependable Sec. Comput., 2018

2017
Fast and low-complexity encoding of Raptor codes based on operation lists for known source block lengths.
Multimedia Tools Appl., 2017

Instagram Spam Detection.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

A Process for Exploring Employees' Relationships via Social Network and Sentiment Analysis.
Proceedings of the Data Mining and Big Data - Second International Conference, 2017

An Approach for Reducing the Traffic within Cloud Environments Based on Customized Linux Kernel.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

2016
Personal video delivery with rapid Raptor code decoder.
Personal and Ubiquitous Computing, 2016

A System of Shareable Keyword Search on Encrypted Data.
Proceedings of the Network and System Security - 10th International Conference, 2016

Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Network and System Security - 10th International Conference, 2016

Cloud-Based Storage Model with Strong User Privacy Assurance.
Proceedings of the Data Mining and Big Data, First International Conference, 2016

A Distributed and Autonomous Guard System Based on Cloud Environments.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
A provable authenticated group key agreement protocol for mobile environment.
Inf. Sci., 2015

An enhancement of return address stack for security.
Computer Standards & Interfaces, 2015

Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Accelerating Raptor Code Decoding Using Group Parameters for IPTV Service Delivery.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
A communication-efficient private matching scheme in Client-Server model.
Inf. Sci., 2014

On the improvement of Fermat factorization using a continued fraction technique.
Future Generation Comp. Syst., 2014

CRFID: An RFID system with a cloud database as a back-end server.
Future Generation Comp. Syst., 2014

A defence scheme against Identity Theft Attack based on multiple social networks.
Expert Syst. Appl., 2014

Eliminating rouge femtocells based on distance bounding protocol and geographic information.
Expert Syst. Appl., 2014

A New Public Key Encryption with Equality Test.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Methodology for Hook-Based Kernel Level Rootkits.
Proceedings of the Information Security Practice and Experience, 2014

A Virtual Network Guard System Based on Cloud Computing Environments.
Proceedings of the Genetic and Evolutionary Computing, 2014

2013
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks.
IEEE Trans. Knowl. Data Eng., 2013

A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices.
IEEE Trans. Information Forensics and Security, 2013

Data embedding in image-media using weight-function on modulo operations.
ACM Trans. Embedded Comput. Syst., 2013

A collaborative routing protocol against routing disruptions in MANETs.
Personal and Ubiquitous Computing, 2013

Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study.
Inf. Sci., 2013

Efficient encoding of systematic Raptor codes based on operation lists for known block lengths.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Secure and Flexible Data Aggregation Framework for Smart Grid.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

Practical RSA signature scheme based on periodical rekeying for wireless sensor networks.
TOSN, 2012

oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks.
IEEE Trans. Information Forensics and Security, 2012

Enhanced authentication for commercial video services.
Security and Communication Networks, 2012

A novel acknowledgment-based approach against collude attacks in MANET.
Expert Syst. Appl., 2012

A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
Electronic Commerce Research and Applications, 2012

On the Improvement of Fermat Factorization.
Proceedings of the Network and System Security - 6th International Conference, 2012

Cryptanalysis of Exhaustive Search on Attacking RSA.
Proceedings of the Network and System Security - 6th International Conference, 2012

Multi-agent based cloud utilization for IT OA assets dispatching process in SCM's view: An empirical study.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

PassMap: a map based graphical-password authentication system.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
On the Security of Chien's Ultralightweight RFID Authentication Protocol.
IEEE Trans. Dependable Sec. Comput., 2011

A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code.
IEEE Trans. Computers, 2011

Anti-Forensics with Steganographic Data Embedding in Digital Images.
IEEE Journal on Selected Areas in Communications, 2011

A novel electronic cash system with trustee-based anonymity revocation from pairing.
Electronic Commerce Research and Applications, 2011

A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks.
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time.
SIAM J. Discrete Math., 2010

Grouping strategies for promoting image quality of watermarking on the basis of vector quantization.
J. Visual Communication and Image Representation, 2010

Varied PVD + LSB evading detection programs to spatial domain in data embedding systems.
Journal of Systems and Software, 2010

2009
An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems.
IEEE Trans. Multimedia, 2009

A Gen2-Based RFID Authentication Protocol for Security and Privacy.
IEEE Trans. Mob. Comput., 2009

On the security of the secure arithmetic code.
IEEE Trans. Information Forensics and Security, 2009

On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme.
IEEE Trans. Dependable Sec. Comput., 2009

Trading decryption for speeding encryption in Rebalanced-RSA.
Journal of Systems and Software, 2009

Short-Exponent RSA.
IEICE Transactions, 2009

Simple Backdoors on RSA Modulus by Using RSA Vulnerability.
IEICE Transactions, 2009

A Note on Factoring alpha-LSBS Moduli.
IEICE Transactions, 2009

An Efficient Secure Oblivious Transfer.
IACR Cryptology ePrint Archive, 2009

A Novel ID-based Electronic Cash System from Pairings.
IACR Cryptology ePrint Archive, 2009

Codebook-linked Watermarking Scheme for Digital Images.
Fundam. Inform., 2009

SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

A Pair-wise Key Establishment for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Scheme of Modulo-Based Capacity-improvement upon EMD Systems.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

DepenDNS: Dependable Mechanism against DNS Cache Poisoning.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

A Trustable Reputation Scheme Based on Private Relationships.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

A Real-Time Selective Video Encryption Using Context-Key Control.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Common Friends Discovery with Privacy and Authenticity.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems.
IEEE Trans. Multimedia, 2008

Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems.
IEEE Trans. Information Forensics and Security, 2008

Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
IACR Cryptology ePrint Archive, 2008

On the Security of Chien's Ultralightweight RFID Authentication Protocol.
IACR Cryptology ePrint Archive, 2008

Comments on two password based protocols.
IACR Cryptology ePrint Archive, 2008

A novel mutual authentication scheme based on quadratic residues for RFID systems.
Computer Networks, 2008

Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Efficient Authentication Schemes for Handover in Mobile WiMAX.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Histogram-based undetectable fidelity image in steganography as MSB controller.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2008

Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Secure and Efficient Handover Schemes for Heterogeneous Networks.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

On the Improvement of the BDF Attack on LSBS-RSA.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Dual RSA and Its Security Analysis.
IEEE Trans. Information Theory, 2007

An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Password-based authentication and key distribution protocols with perfect forward secrecy.
J. Comput. Syst. Sci., 2006

API Monitoring System for Defeating Worms and Exploits in MS-Windows System.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
On the security of some proxy blind signature schemes.
Journal of Systems and Software, 2005

Secure key agreement protocols for three-party against guessing attacks.
Journal of Systems and Software, 2005

Secure E-mail protocols providing perfect forward secrecy.
IEEE Communications Letters, 2005

An Approach Towards Rebalanced RSA-CRT with Short Public Exponent.
IACR Cryptology ePrint Archive, 2005

Password authenticated key exchange protocols among diverse network domains.
Computers & Electrical Engineering, 2005

RSA with Balanced Short Exponents and Its Application to Entity Authentication.
Proceedings of the Public Key Cryptography, 2005

A new approach to feature-based copyright protection of images.
Proceedings of the ITRE 2005, 2005

2004
Password-based user authentication and key distribution protocols for client-server applications.
Journal of Systems and Software, 2004

On the design of time-stamped signatures.
J. Comput. Syst. Sci., 2004

Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

On the Security of Some Proxy Blind Signature Schemes.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

2003
Security of Park-Lim key agreement schemes for VSAT satellite communications.
IEEE Trans. Vehicular Technology, 2003

Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks.
J. Inf. Sci. Eng., 2003

On the Linkability of Some Group Signature Schemes.
Informatica, Lith. Acad. Sci., 2003

On the Security of Some Password Authentication Protocols.
Informatica, Lith. Acad. Sci., 2003

Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings.
IACR Cryptology ePrint Archive, 2003

On the Security of Some Proxy Signature Schemes.
IACR Cryptology ePrint Archive, 2003

2002
Simple authenticated key agreement protocol resistant to password guessing attacks.
Operating Systems Review, 2002

On the Design of RSA With Short Secret Exponent.
J. Inf. Sci. Eng., 2002

On the Security of a Variation of Cramer-Shoup's Public Key Scheme.
J. Inf. Sci. Eng., 2002

Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes.
Informatica, Lith. Acad. Sci., 2002

2001
Efficient and Practical DHEKE Protocols.
Operating Systems Review, 2001

Security analysis of the generalized key agreement and password authentication protocol.
IEEE Communications Letters, 2001

Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices.
IEEE Communications Letters, 2001

Three-party encrypted key exchange without server public-keys.
IEEE Communications Letters, 2001

2000
Digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Vehicular Technology, 2000

An efficient remote use authentication scheme using smart cards.
IEEE Trans. Consumer Electronics, 2000

Three-party Encrypted Key Exchange: Attacks and A Solution.
Operating Systems Review, 2000

Enhancing the Security of the McEliece Public-Key Cryptosystem.
J. Inf. Sci. Eng., 2000

On the Dealer's Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank.
Int. J. Found. Comput. Sci., 2000

Further cryptanalysis of the McEliece public-key cryptosystem.
IEEE Communications Letters, 2000

1999
Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures.
J. Inf. Sci. Eng., 1999

A Note on Breaking and Repairing a Secure Broadcasting in Large Networks.
Computer Communications, 1999

On-line multiple secret sharing based on a one-way function.
Computer Communications, 1999

An efficient nonrepudiable threshold proxy signature scheme with known signers.
Computer Communications, 1999

On the Design of RSA with Short Secret Exponent.
Proceedings of the Advances in Cryptology, 1999

1998
Secure broadcasting in large networks.
Computer Communications, 1998

On the Security of Some Variants of the RSA Signature Scheme.
Proceedings of the Computer Security, 1998

Improving the Security of the McEliece Public-Key Cryptosystem.
Proceedings of the Advances in Cryptology, 1998

On Private-Key Cryptosystems Based on Product Codes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
An authentication protocol without trusted third party.
IEEE Communications Letters, 1997

Secret Sharing in Graph-Based Prohibited Structures.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

On the decomposition constructions for perfect secret sharing schemes.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
Proceedings of the CCS '96, 1996

1994
On Dynamic Threshold Schemes.
Inf. Process. Lett., 1994

On Constructing Secret Sharing Schemes.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

Optimal Information Dispersal for Reliable Communication in Computer Networks.
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994


  Loading...