HM Sun
Cited by
Cited by
An efficient remote use authentication scheme using smart cards
HM Sun
IEEE Transactions on Consumer Electronics 46 (4), 958-961, 2000
Adaptive data hiding in edge areas of images with spatial LSB domain systems
CH Yang, CY Weng, SJ Wang, HM Sun
IEEE Transactions on Information Forensics and Security 3 (3), 488-497, 2008
An efficient nonrepudiable threshold proxy signature scheme with known signers
HM Sun
Computer communications 22 (8), 717-722, 1999
Three-party encrypted key exchange: attacks and a solution
CL Lin, HM Sun, T Hwang
ACM SIGOPS Operating Systems Review 34 (4), 12-20, 2000
Threshold proxy signatures
HM Sun, NY Lee, T Hwang
IEE Proceedings-Computers and Digital Techniques 146 (5), 259-263, 1999
oPass: A user authentication protocol resistant to password stealing and password reuse attacks
HM Sun, YH Chen, YH Lin
IEEE transactions on information forensics and security 7 (2), 651-663, 2011
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
Three-party encrypted key exchange without server public-keys
CL Lin, HM Sun, M Steiner, T Hwang
IEEE Communications letters 5 (12), 497-499, 2001
Attacks and solutions on strong-password authentication
CL Lin, HM Sun, T Hwang
IEICE transactions on communications 84 (9), 2622-2627, 2001
A novel mutual authentication scheme based on quadratic residues for RFID systems
Y Chen, JS Chou, HM Sun
Computer Networks 52 (12), 2373-2380, 2008
On the security of Chien's ultralightweight RFID authentication protocol
HM Sun, WC Ting, KH Wang
IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009
Dual RSA and its security analysis
HM Sun, ME Wu, WC Ting, MJ Hinek
IEEE Transactions on Information Theory 53 (8), 2922-2933, 2007
On proxy (multi-) signature schemes
HM Sun
On the security of some proxy blind signature schemes
HM Sun, BT Hsieh, SM Tseng
Journal of systems and software 74 (3), 297-302, 2005
A shoulder surfing resistant graphical authentication system
HM Sun, ST Chen, JH Yeh, CY Cheng
IEEE Transactions on Dependable and Secure Computing 15 (2), 180-193, 2016
Secure key agreement protocols for three-party against guessing attacks
HM Sun, BC Chen, T Hwang
Journal of Systems and Software 75 (1-2), 63-68, 2005
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
A Gen2-based RFID authentication protocol for security and privacy
HM Sun, WC Ting
IEEE Transactions on Mobile Computing 8 (8), 1052-1062, 2008
CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks
YH Lin, SY Chang, HM Sun
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1471-1483, 2012
Security analysis of Shim's authenticated key agreement protocols from pairings
HM Sun, BT Hsieh
Cryptology EPrint Archive, 2003
The system can't perform the operation now. Try again later.
Articles 1–20