Da-Zhi Sun
Orcid: 0009-0009-6434-7912
According to our database1,
Da-Zhi Sun
authored at least 52 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Signal Process. Lett., 2024
2023
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices.
Sensors, July, 2023
2021
Security and Privacy Analysis of Vinoth et al.'s Authenticated Key Agreement Scheme for Industrial IoT.
Symmetry, 2021
Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing.
Secur. Commun. Networks, 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
2020
IEEE Access, 2020
2019
On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy.
Sensors, 2019
On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications.
Sensors, 2019
Int. J. Distributed Sens. Networks, 2019
IET Inf. Secur., 2019
Concurr. Comput. Pract. Exp., 2019
A Systematic Approach to Horizontal Clustering Analysis on Embedded RSA Implementation.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
2018
IEEE Wirel. Commun. Lett., 2018
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure.
Pers. Ubiquitous Comput., 2018
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure.
Pers. Ubiquitous Comput., 2018
Inf., 2018
2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Computer Engineering and Technology - 21st CCF Conference, 2017
2016
Wirel. Pers. Commun., 2016
The geographic concentration of China's e-business enterprises: where they gather and why.
Electron. Mark., 2016
Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing on FPGA Platform.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
2015
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015
2013
HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree.
Telecommun. Syst., 2013
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks.
Pers. Ubiquitous Comput., 2013
A comment on "An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation".
Inf. Sci., 2013
On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity.
Cryptologia, 2013
Proceedings of the Advances in Web-Based Learning - ICWL 2013 Workshops, 2013
2012
IEEE Trans. Consumer Electron., 2012
Inf. Process. Lett., 2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the Fourth International Symposium on Parallel Architectures, 2011
2010
On the security of an enhanced novel access control protocol for wireless sensor networks.
IEEE Trans. Consumer Electron., 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
Improvements of Juang 's Password-Authenticated Key Agreement Scheme Using Smart Cards.
IEEE Trans. Ind. Electron., 2009
Comput. Commun., 2009
A microscopic simulation-based decision support system to develop changeable message sign alternatives.
Proceedings of the 12th International IEEE Conference on Intelligent Transportation Systems, 2009
2008
IEEE Trans. Consumer Electron., 2008
Int. J. Netw. Secur., 2008
2007
IEEE Trans. Consumer Electron., 2007
Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation algorithm.
Appl. Math. Comput., 2007
A note on Chang-Lai's modular square algorithm based on the generalized Chinese remainder theorem.
Appl. Math. Comput., 2007
2006
Bi-level Programming Formulation and Heuristic Solution Approach for Dynamic Traffic Signal Optimization.
Comput. Aided Civ. Infrastructure Eng., 2006
How to compute modular exponentiation with large operators based on the right-to-left binary algorithm.
Appl. Math. Comput., 2006
2005
Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005
2003
Multi-objective Traffic Signal Timing Optimization Using Non-dominated Sorting Genetic Algorithm II.
Proceedings of the Genetic and Evolutionary Computation, 2003