Hung-Min Sun

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Focus-Shifting Attack: An Adversarial Attack That Retains Saliency Map Information and Manipulates Model Explanations.
IEEE Trans. Reliab., June, 2024

Intelligent radioactive waste process cloud-based system for nuclear power plant decommissioning.
J. Ambient Intell. Humaniz. Comput., March, 2024

TokenDoc: Source Authentication With a Hybrid Approach of Smart Contract and RNN-Based Models With AES Encryption.
IEEE Trans. Engineering Management, 2024

An Enhanced Online Certificate Status Protocol for Public Key Infrastructure with Smart Grid and Energy Storage System.
CoRR, 2024

Hybrid Online Certificate Status Protocol with Certificate Revocation List for Smart Grid Public Key Infrastructure.
CoRR, 2024

2023
Enhancing Modbus TCP Protocol Security with eBPF Technology.
CoRR, 2023

Classification of Polyps in Endoscopic Images Using Self-Supervised Structured Learning.
IEEE Access, 2023

2022
PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion.
Sensors, 2022

Privacy-Preserving Deep Learning With Learnable Image Encryption on Medical Images.
IEEE Access, 2022

Information spreading in mobile social networks: identifying the influential nodes using FPSO algorithm.
Proceedings of the 2022 10th International Conference on Information Technology: IoT and Smart City, 2022

2021
A Blockchain-Based Vehicle Condition Recording System for Second-Hand Vehicle Market.
Wirel. Commun. Mob. Comput., 2021

A New Attack for Self-Certified Digital Signatures for E-commerce Applications.
J. Inf. Sci. Eng., 2021

Response and Surveillance System for Diarrhoea Based on a Patient Symptoms Using Machine Learning: A Study on Eswatini.
IEEE Access, 2021

A Co-Attention Method Based on Generative Adversarial Networks for Multi-view Images.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021

A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

PDF Malware Detection Using Visualization and Machine Learning.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
DeepBot: a time-based botnet detection with deep learning.
Soft Comput., 2020

Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020

A Blockchain-Based Application System for Product Anti-Counterfeiting.
IEEE Access, 2020

2019
Emotion-based color transfer of images using adjustable color combinations.
Soft Comput., 2019

Using RFID technology to develop an intelligent equipment lock management system.
Int. J. Comput. Sci. Eng., 2019

A Flexible Framework for Malicious Open XML Document Detection based on APT Attacks.
Proceedings of the IEEE INFOCOM 2019, 2019

2018
Integrity Coded Databases - Protecting Data Integrity for Outsourced Databases.
Dataset, November, 2018

A shareable keyword search over encrypted data in cloud computing.
J. Supercomput., 2018

A Shoulder Surfing Resistant Graphical Authentication System.
IEEE Trans. Dependable Secur. Comput., 2018

RFID-based bonded warehouse for Science Park.
Int. J. Radio Freq. Identif. Technol. Appl., 2018

A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

2017
Fast and low-complexity encoding of Raptor codes based on operation lists for known source block lengths.
Multim. Tools Appl., 2017

Instagram Spam Detection.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

A Process for Exploring Employees' Relationships via Social Network and Sentiment Analysis.
Proceedings of the Data Mining and Big Data - Second International Conference, 2017

An Approach for Reducing the Traffic within Cloud Environments Based on Customized Linux Kernel.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

2016
Personal video delivery with rapid Raptor code decoder.
Pers. Ubiquitous Comput., 2016

A System of Shareable Keyword Search on Encrypted Data.
Proceedings of the Network and System Security - 10th International Conference, 2016

Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Network and System Security - 10th International Conference, 2016

Cloud-Based Storage Model with Strong User Privacy Assurance.
Proceedings of the Data Mining and Big Data, First International Conference, 2016

A Distributed and Autonomous Guard System Based on Cloud Environments.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
A provable authenticated group key agreement protocol for mobile environment.
Inf. Sci., 2015

An enhancement of return address stack for security.
Comput. Stand. Interfaces, 2015

Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Accelerating Raptor Code Decoding Using Group Parameters for IPTV Service Delivery.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID.
J. Inf. Hiding Multim. Signal Process., 2014

A communication-efficient private matching scheme in Client-Server model.
Inf. Sci., 2014

On the improvement of Fermat factorization using a continued fraction technique.
Future Gener. Comput. Syst., 2014

CRFID: An RFID system with a cloud database as a back-end server.
Future Gener. Comput. Syst., 2014

A defence scheme against Identity Theft Attack based on multiple social networks.
Expert Syst. Appl., 2014

Eliminating rouge femtocells based on distance bounding protocol and geographic information.
Expert Syst. Appl., 2014

A New Public Key Encryption with Equality Test.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Methodology for Hook-Based Kernel Level Rootkits.
Proceedings of the Information Security Practice and Experience, 2014

A Virtual Network Guard System Based on Cloud Computing Environments.
Proceedings of the Genetic and Evolutionary Computing, 2014

A Security System Based on Door Movement Detecting.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

2013
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks.
IEEE Trans. Knowl. Data Eng., 2013

A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2013

Data embedding in image-media using weight-function on modulo operations.
ACM Trans. Embed. Comput. Syst., 2013

A collaborative routing protocol against routing disruptions in MANETs.
Pers. Ubiquitous Comput., 2013

SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN.
J. Inf. Hiding Multim. Signal Process., 2013

Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study.
Inf. Sci., 2013

Efficient encoding of systematic Raptor codes based on operation lists for known block lengths.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An HD streaming system for WiFi multicast channels based on application-layer FEC.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013

A Secure and Flexible Data Aggregation Framework for Smart Grid.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Practical RSA signature scheme based on periodical rekeying for wireless sensor networks.
ACM Trans. Sens. Networks, 2012

oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks.
IEEE Trans. Inf. Forensics Secur., 2012

Enhanced authentication for commercial video services.
Secur. Commun. Networks, 2012

A novel acknowledgment-based approach against collude attacks in MANET.
Expert Syst. Appl., 2012

A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
Electron. Commer. Res. Appl., 2012

On the Improvement of Fermat Factorization.
Proceedings of the Network and System Security - 6th International Conference, 2012

Cryptanalysis of Exhaustive Search on Attacking RSA.
Proceedings of the Network and System Security - 6th International Conference, 2012

Multi-agent based cloud utilization for IT OA assets dispatching process in SCM's view: An empirical study.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

PassMap: a map based graphical-password authentication system.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
On the Security of Chien's Ultralightweight RFID Authentication Protocol.
IEEE Trans. Dependable Secur. Comput., 2011

A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code.
IEEE Trans. Computers, 2011

Anti-Forensics with Steganographic Data Embedding in Digital Images.
IEEE J. Sel. Areas Commun., 2011

A novel electronic cash system with trustee-based anonymity revocation from pairing.
Electron. Commer. Res. Appl., 2011

A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks.
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time.
SIAM J. Discret. Math., 2010

Grouping strategies for promoting image quality of watermarking on the basis of vector quantization.
J. Vis. Commun. Image Represent., 2010

Varied PVD + LSB evading detection programs to spatial domain in data embedding systems.
J. Syst. Softw., 2010

2009
An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems.
IEEE Trans. Multim., 2009

A Gen2-Based RFID Authentication Protocol for Security and Privacy.
IEEE Trans. Mob. Comput., 2009

On the security of the secure arithmetic code.
IEEE Trans. Inf. Forensics Secur., 2009

On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme.
IEEE Trans. Dependable Secur. Comput., 2009

Trading decryption for speeding encryption in Rebalanced-RSA.
J. Syst. Softw., 2009

Short-Exponent RSA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Simple Backdoors on RSA Modulus by Using RSA Vulnerability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A Note on Factoring alpha-LSBS Moduli.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

An Efficient Secure Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2009

A Novel ID-based Electronic Cash System from Pairings.
IACR Cryptol. ePrint Arch., 2009

Codebook-linked Watermarking Scheme for Digital Images.
Fundam. Informaticae, 2009

SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

A Pair-wise Key Establishment for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Scheme of Modulo-Based Capacity-improvement upon EMD Systems.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

DepenDNS: Dependable Mechanism against DNS Cache Poisoning.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

A Trustable Reputation Scheme Based on Private Relationships.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

A Real-Time Selective Video Encryption Using Context-Key Control.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Common Friends Discovery with Privacy and Authenticity.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems.
IEEE Trans. Multim., 2008

Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems.
IEEE Trans. Inf. Forensics Secur., 2008

Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
IACR Cryptol. ePrint Arch., 2008

Comments on two password based protocols.
IACR Cryptol. ePrint Arch., 2008

A novel mutual authentication scheme based on quadratic residues for RFID systems.
Comput. Networks, 2008

Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Efficient Authentication Schemes for Handover in Mobile WiMAX.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Histogram-based undetectable fidelity image in steganography as MSB controller.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2008

Secure and Efficient Handover Schemes for Heterogeneous Networks.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

On the Improvement of the BDF Attack on LSBS-RSA.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Dual RSA and Its Security Analysis.
IEEE Trans. Inf. Theory, 2007

An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Password-based authentication and key distribution protocols with perfect forward secrecy.
J. Comput. Syst. Sci., 2006

API Monitoring System for Defeating Worms and Exploits in MS-Windows System.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
On the security of some proxy blind signature schemes.
J. Syst. Softw., 2005

Secure key agreement protocols for three-party against guessing attacks.
J. Syst. Softw., 2005

Secure E-mail protocols providing perfect forward secrecy.
IEEE Commun. Lett., 2005

An Approach Towards Rebalanced RSA-CRT with Short Public Exponent.
IACR Cryptol. ePrint Arch., 2005

Password authenticated key exchange protocols among diverse network domains.
Comput. Electr. Eng., 2005

RSA with Balanced Short Exponents and Its Application to Entity Authentication.
Proceedings of the Public Key Cryptography, 2005

A new approach to feature-based copyright protection of images.
Proceedings of the ITRE 2005, 2005

2004
Password-based user authentication and key distribution protocols for client-server applications.
J. Syst. Softw., 2004

On the design of time-stamped signatures.
J. Comput. Syst. Sci., 2004

Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

On the Security of Some Proxy Blind Signature Schemes.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

2003
Security of Park-Lim key agreement schemes for VSAT satellite communications.
IEEE Trans. Veh. Technol., 2003

Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks.
J. Inf. Sci. Eng., 2003

On the Linkability of Some Group Signature Schemes.
Informatica, 2003

On the Security of Some Password Authentication Protocols.
Informatica, 2003

Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings.
IACR Cryptol. ePrint Arch., 2003

On the Security of Some Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2003

2002
Simple authenticated key agreement protocol resistant to password guessing attacks.
ACM SIGOPS Oper. Syst. Rev., 2002

On the Design of RSA With Short Secret Exponent.
J. Inf. Sci. Eng., 2002

On the Security of a Variation of Cramer-Shoup's Public Key Scheme.
J. Inf. Sci. Eng., 2002

Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes.
Informatica, 2002

2001
Efficient and Practical DHEKE Protocols.
ACM SIGOPS Oper. Syst. Rev., 2001

Security analysis of the generalized key agreement and password authentication protocol.
IEEE Commun. Lett., 2001

Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices.
IEEE Commun. Lett., 2001

Three-party encrypted key exchange without server public-keys.
IEEE Commun. Lett., 2001

2000
Digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Veh. Technol., 2000

An efficient remote use authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2000

Three-party Encrypted Key Exchange: Attacks and A Solution.
ACM SIGOPS Oper. Syst. Rev., 2000

Enhancing the Security of the McEliece Public-Key Cryptosystem.
J. Inf. Sci. Eng., 2000

On the Dealer's Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank.
Int. J. Found. Comput. Sci., 2000

Further cryptanalysis of the McEliece public-key cryptosystem.
IEEE Commun. Lett., 2000

1999
Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures.
J. Inf. Sci. Eng., 1999

A Note on Breaking and Repairing a Secure Broadcasting in Large Networks.
Comput. Commun., 1999

On-line multiple secret sharing based on a one-way function.
Comput. Commun., 1999

An efficient nonrepudiable threshold proxy signature scheme with known signers.
Comput. Commun., 1999

1998
Secure broadcasting in large networks.
Comput. Commun., 1998

On the Security of Some Variants of the RSA Signature Scheme.
Proceedings of the Computer Security, 1998

Improving the Security of the McEliece Public-Key Cryptosystem.
Proceedings of the Advances in Cryptology, 1998

On Private-Key Cryptosystems Based on Product Codes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
An authentication protocol without trusted third party.
IEEE Commun. Lett., 1997

Secret Sharing in Graph-Based Prohibited Structures.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

On the decomposition constructions for perfect secret sharing schemes.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
Proceedings of the CCS '96, 1996

1994
On Dynamic Threshold Schemes.
Inf. Process. Lett., 1994

On Constructing Secret Sharing Schemes.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

Optimal Information Dispersal for Reliable Communication in Computer Networks.
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994


  Loading...