Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("SUN, Hung-Min")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 23 of 23

  • Page / 1
Export

Selection :

  • and

Cryptanalysis of a public-key cryptosystem based on generalized inverses of matricesSUN, Hung-Min.IEEE communications letters. 2001, Vol 5, Num 2, pp 61-63, issn 1089-7798Article

Simple authenticated key agreement protocol resisiant to password guessing attacksYEH, Her-Tyan; SUN, Hung-Min.Operating systems review. 2002, Vol 36, Num 4, pp 14-22, issn 0163-5980Article

A Gen2-Based RFID Authentication Protocol for Security and PrivacySUN, Hung-Min; TING, Wei-Chih.IEEE transactions on mobile computing. 2009, Vol 8, Num 8, pp 1052-1062, issn 1536-1233, 11 p.Article

An Efficient Authentication Scheme for Access Control in Mobile Pay-TV SystemsSUN, Hung-Min; LEU, Muh-Chyi.IEEE transactions on multimedia. 2009, Vol 11, Num 5, pp 947-959, issn 1520-9210, 13 p.Article

A novel mutual authentication scheme based on quadratic residues for RFID systemsYALIN CHEN; CHOU, Jue-Sam; SUN, Hung-Min et al.Computer networks (1999). 2008, Vol 52, Num 12, pp 2373-2380, issn 1389-1286, 8 p.Article

Security analysis of the generalized key agreement and password authentication protocolYEH, Her-Tyan; SUN, Hung-Min; HWANG, Tzonelih et al.IEEE communications letters. 2001, Vol 5, Num 11, pp 462-463, issn 1089-7798Article

An improvement of a deniable authentication protocolHSIEH, Bin-Tsan; SUN, Hung-Min.IEICE transactions on communications. 2004, Vol 87, Num 10, pp 3099-3101, issn 0916-8516, 3 p.Article

Three-party encrypted key exchange : Attacks and A solutionLIN, Chun-Li; SUN, Hung-Min; TZONELIH HWANG et al.Operating systems review. 2000, Vol 34, Num 4, pp 12-20, issn 0163-5980Article

RSA with balanced short exponents and its application to entity authenticationSUN, Hung-Min; YANG, Cheng-Ta.Lecture notes in computer science. 2005, pp 199-215, issn 0302-9743, isbn 3-540-24454-9, 17 p.Conference Paper

Efficient and practical DHEKE protocolsLIN, Chun-Li; SUN, Hung-Min; HWANG, Tzonelih et al.Operating systems review. 2001, Vol 35, Num 1, pp 41-47, issn 0163-5980Article

Flexible-Pay-Per-Channel : A New Model for Content Access Control in Pay-TV Broadcasting SystemsSUN, Hung-Min; CHEN, Chien-Ming; SHIEH, Cheng-Zong et al.IEEE transactions on multimedia. 2008, Vol 10, Num 6, pp 1109-1120, issn 1520-9210, 12 p.Article

Three-party encrypted key exchange without server public-keysLIN, Chun-Li; SUN, Hung-Min; STEINER, Michael et al.IEEE communications letters. 2001, Vol 5, Num 12, pp 497-499, issn 1089-7798Article

DECOMPOSITION CONSTRUCTION FOR SECRET SHARING SCHEMES WITH GRAPH ACCESS STRUCTURES IN POLYNOMIAL TIMESUN, Hung-Min; HUAXIONG WANG; KU, Bying-He et al.SIAM journal on discrete mathematics (Print). 2011, Vol 24, Num 2, pp 617-638, issn 0895-4801, 22 p.Article

Secure E-mail protocols providing perfect forward secrecySUN, Hung-Min; HSIEH, Bin-Tsan; HWANG, Hsin-Jia et al.IEEE communications letters. 2005, Vol 9, Num 1, pp 58-60, issn 1089-7798, 3 p.Article

A collaborative routing protocol against routing disruptions in MANETs : Advanced Security Technologies and Applications for Ubiquitous ComputingSUN, Hung-Min; CHEN, Chiung-Hsun; YEH, Chih-Wen et al.Personal and ubiquitous computing (Print). 2013, Vol 17, Num 5, pp 865-874, issn 1617-4909, 10 p.Article

Dual RSA and its security analysisSUN, Hung-Min; WU, Mu-En; TING, Wei-Chi et al.IEEE transactions on information theory. 2007, Vol 53, Num 8, pp 2922-2933, issn 0018-9448, 12 p.Article

Digital multisignature schemes for authenticating delegates in mobile code systemsSHIEH, Shiuh-Pyng; LIN, Chern-Tang; YANG, Wei-Bon et al.IEEE transactions on vehicular technology. 2000, Vol 49, Num 4, pp 1464-1473, issn 0018-9545Article

A defence scheme against Identity Theft Attack based on multiple social networksHE, Bing-Zhe; CHEN, Chien-Ming; SU, Yi-Ping et al.Expert systems with applications. 2014, Vol 41, Num 5, pp 2345-2352, issn 0957-4174, 8 p.Article

Eliminating rouge femtocells based on distance bounding protocol and geographic informationCHEN, Chien-Ming; CHEN, Yao-Hsin; LIN, Yue-Hsun et al.Expert systems with applications. 2014, Vol 41, Num 2, pp 426-433, issn 0957-4174, 8 p.Article

SPATE: Small-Group PKI-Less Authenticated Trust EstablishmentLIN, Yue-Hsun; STUDER, Ahren; PERRIG, Adrian et al.IEEE transactions on mobile computing. 2010, Vol 9, Num 12, pp 1666-1681, issn 1536-1233, 16 p.Conference Paper

A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile DevicesCHEN, Chien-Ming; WANG, King-Hang; WU, Tsu-Yang et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1318-1330, issn 1556-6013, 13 p.Article

API monitoring system for defeating worms and exploits in MS-windows systemSUN, Hung-Min; LIN, Yue-Hsun; WU, Ming-Fung et al.Lecture notes in computer science. 2006, pp 159-170, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Security of Park-Lim key agreement schemes for VSAT satellite communicationsXUN YI; CHEE KHEONG SIEW; SUN, Hung-Min et al.IEEE transactions on vehicular technology. 2003, Vol 52, Num 2, pp 465-468, issn 0018-9545, 4 p.Article

  • Page / 1