H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 40 Citations 7,355 191 World Ranking 4601 National Ranking 28

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Hung-Min Sun mainly focuses on Computer security, Authentication, Cryptography, Computer network and Password. His Computer security study frequently links to other fields, such as Internet privacy. His Authentication research incorporates elements of Security analysis, Forward secrecy and Protocol.

His Cryptography research is multidisciplinary, incorporating elements of Elliptic curve cryptography, Digital signature, Proxy signature, Public-key cryptography and Proxy. Hung-Min Sun works mostly in the field of Password, limiting it down to topics relating to Challenge–response authentication and, in certain cases, Smart card. Hung-Min Sun has included themes like Data security and Network security in his Message authentication code study.

His most cited work include:

  • An efficient remote use authentication scheme using smart cards (362 citations)
  • Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems (345 citations)
  • An Efficient Remote User Authentication Scheme Using Smart Cards (271 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Computer network, Cryptography, Public-key cryptography and Authentication are his primary areas of study. His work is connected to Password, S/KEY, Zero-knowledge password proof, Smart card and Encrypted key exchange, as a part of Computer security. His study connects Wireless network and Computer network.

His Cryptography research is multidisciplinary, relying on both Theoretical computer science, Key distribution and Digital signature. His research integrates issues of Cryptosystem and Arithmetic in his study of Public-key cryptography. His studies in Authentication integrate themes in fields like Forward secrecy, Key and Protocol.

He most often published in these fields:

  • Computer security (39.11%)
  • Computer network (31.73%)
  • Cryptography (22.51%)

What were the highlights of his more recent work (between 2014-2020)?

  • Computer security (39.11%)
  • Cloud computing (5.90%)
  • Computer network (31.73%)

In recent papers he was focusing on the following fields of study:

His main research concerns Computer security, Cloud computing, Computer network, Artificial intelligence and Encryption. Public-key cryptography and Password are subfields of Computer security in which his conducts study. Within one scientific family, Hung-Min Sun focuses on topics pertaining to Database under Cloud computing, and may sometimes address concerns connected to Plaintext, Cryptography, Cloud storage and Service.

His work carried out in the field of Cryptography brings together such families of science as Service provider, Client-side encryption and Access control. His study in the field of Guard, Virtual network, Server and Digital Video Broadcasting is also linked to topics like Video quality. The Ciphertext research Hung-Min Sun does as part of his general Encryption study is frequently linked to other disciplines of science, such as Range query, therefore creating a link between diverse domains of science.

Between 2014 and 2020, his most popular works were:

  • A Shoulder Surfing Resistant Graphical Authentication System (35 citations)
  • A provable authenticated group key agreement protocol for mobile environment (31 citations)
  • An Android mutation malware detection based on deep learning using visualization of importance from codes (27 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Hung-Min Sun spends much of his time researching Computer security, Artificial intelligence, Product, Data mining and Android. His Computer security study combines topics in areas such as Visualization and Botnet. His Android research incorporates elements of Alphanumeric, Shoulder surfing, Usability, Password policy and Web application.

His study looks at the intersection of Public-key cryptography and topics like Equivalence with Encryption. His Encryption study integrates concerns from other disciplines, such as Cryptography and Database. His Group Domain of Interpretation research is included under the broader classification of Computer network.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

An efficient remote use authentication scheme using smart cards

Hung-Min Sun.
IEEE Transactions on Consumer Electronics (2000)

677 Citations

Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems

Cheng-Hsing Yang;Chi-Yao Weng;Shiuh-Jeng Wang;Hung-Min Sun.
IEEE Transactions on Information Forensics and Security (2008)

540 Citations

An Efficient Remote User Authentication Scheme Using Smart Cards

Hung-Min Sun.
IEEE Transactions on Consumer Electronics (2000)

416 Citations

An efficient nonrepudiable threshold proxy signature scheme with known signers

Hung-Min Sun.
Computer Communications (1999)

259 Citations

Three-party encrypted key exchange: attacks and a solution

Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
Operating Systems Review (2000)

257 Citations

Threshold proxy signatures

H.-M. Sun;N.-Y. Lee;T. Hwang.
IEE Proceedings - Computers and Digital Techniques (1999)

225 Citations

Three-party encrypted key exchange without server public-keys

Chun-Li Lin;Hung-Min Sun;M. Steiner;T. Hwang.
IEEE Communications Letters (2001)

195 Citations

Attacks and Solutions on Strong-Password Authentication

Chun-Li Lin;Hung-Min Sun;Tzonelih Hwang.
IEICE Transactions on Communications (2001)

187 Citations

RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks

Chien-Ming Chen;Yue-Hsun Lin;Ya-Ching Lin;Hung-Min Sun.
IEEE Transactions on Parallel and Distributed Systems (2012)

182 Citations

A novel mutual authentication scheme based on quadratic residues for RFID systems

Yalin Chen;Jue-Sam Chou;Hung-Min Sun.
Computer Networks (2008)

181 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Hung-Min Sun

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 66

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 40

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 38

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 34

Min-Shiang Hwang

Min-Shiang Hwang

Asia University Taiwan

Publications: 34

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 23

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 23

Maode Ma

Maode Ma

Nanyang Technological University

Publications: 17

Debiao He

Debiao He

Wuhan University

Publications: 14

Jeng-Shyang Pan

Jeng-Shyang Pan

Shandong University of Science and Technology

Publications: 13

Feng Bao

Feng Bao

Huawei Technologies (China)

Publications: 12

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 12

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 12

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 12

Dong Hoon Lee

Dong Hoon Lee

Korea University

Publications: 11

Robert W. Lord

Robert W. Lord

Microsoft (United States)

Publications: 11

Something went wrong. Please try again later.