D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 40 Citations 7,353 272 World Ranking 5774 National Ranking 44

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Hung-Min Sun mainly focuses on Computer security, Authentication, Cryptography, Computer network and Password. His Computer security study frequently links to other fields, such as Internet privacy. His Authentication research incorporates elements of Security analysis, Forward secrecy and Protocol.

His Cryptography research is multidisciplinary, incorporating elements of Elliptic curve cryptography, Digital signature, Proxy signature, Public-key cryptography and Proxy. Hung-Min Sun works mostly in the field of Password, limiting it down to topics relating to Challenge–response authentication and, in certain cases, Smart card. Hung-Min Sun has included themes like Data security and Network security in his Message authentication code study.

His most cited work include:

  • An efficient remote use authentication scheme using smart cards (362 citations)
  • Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems (345 citations)
  • An Efficient Remote User Authentication Scheme Using Smart Cards (271 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Computer network, Cryptography, Public-key cryptography and Authentication are his primary areas of study. His work is connected to Password, S/KEY, Zero-knowledge password proof, Smart card and Encrypted key exchange, as a part of Computer security. His study connects Wireless network and Computer network.

His Cryptography research is multidisciplinary, relying on both Theoretical computer science, Key distribution and Digital signature. His research integrates issues of Cryptosystem and Arithmetic in his study of Public-key cryptography. His studies in Authentication integrate themes in fields like Forward secrecy, Key and Protocol.

He most often published in these fields:

  • Computer security (39.11%)
  • Computer network (31.73%)
  • Cryptography (22.51%)

What were the highlights of his more recent work (between 2014-2020)?

  • Computer security (39.11%)
  • Cloud computing (5.90%)
  • Computer network (31.73%)

In recent papers he was focusing on the following fields of study:

His main research concerns Computer security, Cloud computing, Computer network, Artificial intelligence and Encryption. Public-key cryptography and Password are subfields of Computer security in which his conducts study. Within one scientific family, Hung-Min Sun focuses on topics pertaining to Database under Cloud computing, and may sometimes address concerns connected to Plaintext, Cryptography, Cloud storage and Service.

His work carried out in the field of Cryptography brings together such families of science as Service provider, Client-side encryption and Access control. His study in the field of Guard, Virtual network, Server and Digital Video Broadcasting is also linked to topics like Video quality. The Ciphertext research Hung-Min Sun does as part of his general Encryption study is frequently linked to other disciplines of science, such as Range query, therefore creating a link between diverse domains of science.

Between 2014 and 2020, his most popular works were:

  • A Shoulder Surfing Resistant Graphical Authentication System (35 citations)
  • A provable authenticated group key agreement protocol for mobile environment (31 citations)
  • An Android mutation malware detection based on deep learning using visualization of importance from codes (27 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Hung-Min Sun spends much of his time researching Computer security, Artificial intelligence, Product, Data mining and Android. His Computer security study combines topics in areas such as Visualization and Botnet. His Android research incorporates elements of Alphanumeric, Shoulder surfing, Usability, Password policy and Web application.

His study looks at the intersection of Public-key cryptography and topics like Equivalence with Encryption. His Encryption study integrates concerns from other disciplines, such as Cryptography and Database. His Group Domain of Interpretation research is included under the broader classification of Computer network.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

An efficient remote use authentication scheme using smart cards

Hung-Min Sun.
IEEE Transactions on Consumer Electronics (2000)

686 Citations

Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems

Cheng-Hsing Yang;Chi-Yao Weng;Shiuh-Jeng Wang;Hung-Min Sun.
IEEE Transactions on Information Forensics and Security (2008)

558 Citations

An Efficient Remote User Authentication Scheme Using Smart Cards

Hung-Min Sun.
IEEE Transactions on Consumer Electronics (2000)

419 Citations

An efficient nonrepudiable threshold proxy signature scheme with known signers

Hung-Min Sun.
Computer Communications (1999)

261 Citations

Three-party encrypted key exchange: attacks and a solution

Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
Operating Systems Review (2000)

258 Citations

Threshold proxy signatures

H.-M. Sun;N.-Y. Lee;T. Hwang.
IEE Proceedings - Computers and Digital Techniques (1999)

227 Citations

Three-party encrypted key exchange without server public-keys

Chun-Li Lin;Hung-Min Sun;Hung-Min Sun;M. Steiner;M. Steiner;T. Hwang.
IEEE Communications Letters (2001)

194 Citations

Attacks and Solutions on Strong-Password Authentication

Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
IEICE Transactions on Communications (2001)

189 Citations

RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks

Chien-Ming Chen;Yue-Hsun Lin;Ya-Ching Lin;Hung-Min Sun.
IEEE Transactions on Parallel and Distributed Systems (2012)

187 Citations

A novel mutual authentication scheme based on quadratic residues for RFID systems

Yalin Chen;Jue-Sam Chou;Hung-Min Sun.
Computer Networks (2008)

185 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Hung-Min Sun

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 66

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 40

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 38

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 34

Min-Shiang Hwang

Min-Shiang Hwang

Asia University Taiwan

Publications: 34

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 23

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 23

Maode Ma

Maode Ma

Qatar University

Publications: 17

Debiao He

Debiao He

Wuhan University

Publications: 14

Jeng-Shyang Pan

Jeng-Shyang Pan

Shandong University of Science and Technology

Publications: 13

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 12

SK Hafizul Islam

SK Hafizul Islam

Indian Institute of Information Technology, Kalyani

Publications: 12

Feng Bao

Feng Bao

Huawei Technologies (China)

Publications: 12

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 12

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 12

Robert W. Lord

Robert W. Lord

IBM (United States)

Publications: 11

Trending Scientists

Alex C. Snoeren

Alex C. Snoeren

University of California, San Diego

Anders Björner

Anders Björner

Royal Institute of Technology

Sean B. Leen

Sean B. Leen

National University of Ireland, Galway

Li Zhang

Li Zhang

Chinese Academy of Sciences

Jean-Paul Amoureux

Jean-Paul Amoureux

University of Lille

Jorge Gascon

Jorge Gascon

King Abdullah University of Science and Technology

Michael Power

Michael Power

University of Waterloo

Olga Sayanova

Olga Sayanova

Rothamsted Research

Yan Guo

Yan Guo

University of New Mexico

Marieta Barrow Heaton

Marieta Barrow Heaton

University of Florida

Christiane Spiel

Christiane Spiel

University of Vienna

Michael N. Hallquist

Michael N. Hallquist

Pennsylvania State University

Eamonn Martin Quigley

Eamonn Martin Quigley

Cornell University

John D. Hainsworth

John D. Hainsworth

Sarah Cannon Research Institute

S. S. C. Yen

S. S. C. Yen

University of California, San Diego

Geert R. D'Haens

Geert R. D'Haens

University of Amsterdam

Something went wrong. Please try again later.