Hung-Min Sun mainly focuses on Computer security, Authentication, Cryptography, Computer network and Password. His Computer security study frequently links to other fields, such as Internet privacy. His Authentication research incorporates elements of Security analysis, Forward secrecy and Protocol.
His Cryptography research is multidisciplinary, incorporating elements of Elliptic curve cryptography, Digital signature, Proxy signature, Public-key cryptography and Proxy. Hung-Min Sun works mostly in the field of Password, limiting it down to topics relating to Challenge–response authentication and, in certain cases, Smart card. Hung-Min Sun has included themes like Data security and Network security in his Message authentication code study.
Computer security, Computer network, Cryptography, Public-key cryptography and Authentication are his primary areas of study. His work is connected to Password, S/KEY, Zero-knowledge password proof, Smart card and Encrypted key exchange, as a part of Computer security. His study connects Wireless network and Computer network.
His Cryptography research is multidisciplinary, relying on both Theoretical computer science, Key distribution and Digital signature. His research integrates issues of Cryptosystem and Arithmetic in his study of Public-key cryptography. His studies in Authentication integrate themes in fields like Forward secrecy, Key and Protocol.
His main research concerns Computer security, Cloud computing, Computer network, Artificial intelligence and Encryption. Public-key cryptography and Password are subfields of Computer security in which his conducts study. Within one scientific family, Hung-Min Sun focuses on topics pertaining to Database under Cloud computing, and may sometimes address concerns connected to Plaintext, Cryptography, Cloud storage and Service.
His work carried out in the field of Cryptography brings together such families of science as Service provider, Client-side encryption and Access control. His study in the field of Guard, Virtual network, Server and Digital Video Broadcasting is also linked to topics like Video quality. The Ciphertext research Hung-Min Sun does as part of his general Encryption study is frequently linked to other disciplines of science, such as Range query, therefore creating a link between diverse domains of science.
Hung-Min Sun spends much of his time researching Computer security, Artificial intelligence, Product, Data mining and Android. His Computer security study combines topics in areas such as Visualization and Botnet. His Android research incorporates elements of Alphanumeric, Shoulder surfing, Usability, Password policy and Web application.
His study looks at the intersection of Public-key cryptography and topics like Equivalence with Encryption. His Encryption study integrates concerns from other disciplines, such as Cryptography and Database. His Group Domain of Interpretation research is included under the broader classification of Computer network.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
An efficient remote use authentication scheme using smart cards
Hung-Min Sun.
IEEE Transactions on Consumer Electronics (2000)
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
Cheng-Hsing Yang;Chi-Yao Weng;Shiuh-Jeng Wang;Hung-Min Sun.
IEEE Transactions on Information Forensics and Security (2008)
An Efficient Remote User Authentication Scheme Using Smart Cards
Hung-Min Sun.
IEEE Transactions on Consumer Electronics (2000)
An efficient nonrepudiable threshold proxy signature scheme with known signers
Hung-Min Sun.
Computer Communications (1999)
Three-party encrypted key exchange: attacks and a solution
Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
Operating Systems Review (2000)
Threshold proxy signatures
H.-M. Sun;N.-Y. Lee;T. Hwang.
IEE Proceedings - Computers and Digital Techniques (1999)
Three-party encrypted key exchange without server public-keys
Chun-Li Lin;Hung-Min Sun;Hung-Min Sun;M. Steiner;M. Steiner;T. Hwang.
IEEE Communications Letters (2001)
Attacks and Solutions on Strong-Password Authentication
Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
IEICE Transactions on Communications (2001)
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
Chien-Ming Chen;Yue-Hsun Lin;Ya-Ching Lin;Hung-Min Sun.
IEEE Transactions on Parallel and Distributed Systems (2012)
A novel mutual authentication scheme based on quadratic residues for RFID systems
Yalin Chen;Jue-Sam Chou;Hung-Min Sun.
Computer Networks (2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
National Cheng Kung University
ETH Zurich
Nanyang Technological University
Wuhan University
National Taiwan University
National Yang Ming Chiao Tung University
The University of Texas at San Antonio
Google (United States)
Commonwealth Scientific and Industrial Research Organisation
Fujian Normal University
University of California, San Diego
Royal Institute of Technology
National University of Ireland, Galway
Chinese Academy of Sciences
University of Lille
King Abdullah University of Science and Technology
University of Waterloo
Rothamsted Research
University of New Mexico
University of Florida
University of Vienna
Pennsylvania State University
Cornell University
Sarah Cannon Research Institute
University of California, San Diego
University of Amsterdam