Professor Hung-Min Sun (孫宏民), Ph.D.

  • Department of Computer Science
  • National Tsing Hua University
  • 101 Kuang Fu Road, Section 2
  • Hsinchu City, Taiwan 30013
  • E-mail: hmsun@cs.nthu.edu.tw

CURRENT POSITION

  • Director of TWISC@NTHU (2018~)
  • Director of Information Security Research Center, NTHU (2017/6~)
  • Director and Professor, Institute of Information Systems and Applications, NTHU (2017/8/1~)
  • Preliminary Director and Professor, Institute of Information Security, NTHU (2018/9/1~2019/7/31)
  • Professor, Department of Computer Science, NTHU (2008/08/01~)
  • Joint Research Fellows, The Research Center for Information Technology Innovation (CITI), ACADEMIA SINICA, Taiwan (2016/04/01~2018/07/31)
  • Vice President of the Chinese Cryptology and Information Security Association

RESEARCH AREAS

  • Information Security
  • Fintech
  • BlockChain
  • Automatic Trading

EDUCATION

  • Ph.D. Computer Science and Information Engineering, National Chiao Tung University, 1995

PROFESSIONAL EXPERIENCE

  • Professor, Computer Science, NTHU, 2008/8-
  • Joint Research Fellows, The Research Center for Information Technology Innovation (CITI), ACADEMIA SINICA, 2016/4-
  • Associate Professor, Computer Science, NTHU, 2002/8-2008/7
  • Visiting Associate Professor, Computer Science, University of Auckland, 2006/7 - 2007/1
  • Associate Professor, Computer Science and Information Engineering, National Cheng Kung University, 2000/8-2002/7
  • Assistant Professor, Computer Science and Information Engineering, National Cheng Kung University, 1999/8-2000/7

UNIVERSITY SERVICES

  • Vice/Acting Director of University Library, National Tsing Hua University, 2012/9 –2017/7
  • Director of Division of Intellectual Property and Technology Licensing, Operations Center for Industry Collaboration, National Tsing Hua University, 2011/4 – 2012/9

PROFESSIONAL SOCIETIES AND ACTIVITIES

  • Executive Council Member: Chinese Cryptology and Information Security Association, 2015-
  • The member of a council: Chinese Cryptology and Information Security Association, 2000-

PROFESSIONAL SERVICES

  • Topics Editor(s)-in-Chief of International Journal:
    1. Advances in Information Sciences and Service Sciences: An International Journal of Research and Innovation, 2011
    2. International Journal of Digital Content Technology and its Applications, 2010-2011
  • Editorial Board of International Journal:
    1. Journal of Information Science and Engineering (JISE), from 2011/8 to now. (SCI indexed)
    2. Journal of the Chinese Institute of Engineers (JCIE), 2015~now (SCI indexed)
    3. ISRN Communications and Networking, 2010~now
    4. International Journal of Security (IJS), 2010~now
    5. Advances in Information Sciences and Service Sciences: An International Journal of Research and Innovation (AISS), 2010~now
    6. International Journal of Intelligent Information Processing (IJIIP), 2010~now
    7. International Journal of Computer Science & Information Technology Applications (IJCSITA), 2011~now
    8. Recent Patents on Telecommunications, 2012~now
    9. International Journal of Digital Content and Applications (IJDCA), 2012~now
    10. International Journal of Computer Science and Artificial Intelligence (IJCSAI), 2012~now
    11. International Journal of Information and Computer Science (IJICS), 2012~ now
    12. Journal of Engineering Research (IER), 2012~now
    13. International Journal of Multimedia Technology, 2013~ now.
  • Track Chair:
    1. Track 8: Information and Cyber Security in I-SPAN 2014;
    2. CCBD 2015: Security, Privacy, Trust & Quality of Cloud Computing and Big Data
  • General Chair
    1. ACM AsiaCCS 2020
  • Program Chair
    1. IEEE PRDC 2018
  • Organizing Committee (Local Committee Members):
    1. AsiaCrypt2014
  • Steering Committee:
    1. AsiaJCIS 2016
    2. AsiaJCIS 2017
  • Publicity Chair:
    1. ACSA-11
    2. ACSA-12
    3. MIPS09
    4. STA 2012
    5. ISSDM2012
    6. ACSA 2012-Summer
    7. ICMIA 2012
    8. DFIS-13
    9. ICMIA2013
    10. DFIS-16
  • Program Committee Member:
    1. ICFN 2011
    2. IC4E 2011
    3. ICENT 2011
    4. ICMET 2011
    5. ICCDA 2011
    6. ICCRD 2011
    7. ICECT 2011
    8. ICMG 2011
    9. ICMBE 2011
    10. ICSAP 2011
    11. ICFCC 2011
    12. 2011 ICONI Workshop on Network Security
    13. WSN’2011
    14. IEEE ICIME 2011
    15. IEEE ICCSIT 2011
    16. SGH 2011
    17. ICACT 2012
    18. IEEE ISCAIE 2012
    19. ICISC 2012
    20. ICIWE 2012
    21. ICS2012
    22. ISSPA2012
    23. SAM'12
    24. ICMAE 2012
    25. ICHEP 2012
    26. ICECT 2012
    27. IEEE ICETEM 2012
    28. NSS 2012
    29. ICMEME 2013
    30. ICECT 2013
    31. ICISC 2013
    32. NSS 2013, ICIS 2013
    33. IEEE ISCI 2013
    34. SAM'13
    35. SAI 2013
    36. IEEE CloudCom 2014
    37. NSS 2014
    38. ISCAIE 2014
    39. PST2014
    40. ISIEA 2014
    41. ICATC 2014
    42. PST 2014
    43. SC2 2014
    44. ICISC 2014, ICCVE 2014
    45. WNCS 2014
    46. MobiApps 2014
    47. DPNoC 2014
    48. IEEE GLOBECOM 2014 CISS
    49. IEEE SCC 2014
    50. CLOUD COMPUTING 2015
    51. CPSS 2015
    52. FiCloud 2015
    53. IOV 2015
    54. ISPEC 2015
    55. PST 2015
    56. SAM’15
    57. SocialSec 2015
    58. TrustCom 2015
    59. ICCME-2015
    60. ICISSP 2015
    61. ICISC 2015
    62. ICICS 2015
    63. SOWN 2015
    64. SAPSE 2015 (IEEE COMPSAC 2015 Workshop)
    65. CENTRIC 2015
    66. ICCVE 2015
    67. ICISSP 2016
    68. DMBD 2016
    69. SAPSE 2016 (IEEE COMPSAC 2016 Workshop)
    70. SAM’2016
    71. FNC 2016
    72. MobiApps 2016
    73. IEACon 2016
    74. SECURWARE 2016
    75. WCNSSP 2016
    76. AMSM 2016
    77. ICSS 2016
    78. CLOUD COMPUTING 2016
    79. ISPEC 2016
    80. SpaCCS 2016
    81. NSS 2016
    82. IEEE TrustCom-16
    83. DPNoC 2016
    84. CS-2016
    85. IOV-2016, PST 2016(Security Track)
    86. NaNA-2017
    87. AINA 2017
    88. SAM’17
    89. DBMD 2017
    90. FiCloud 2017
    91. CloudComm 2017
    92. ICATI2017
    93. SAPSE 2017
    94. IEACon 2017
    95. ICAIS 2017
    96. ISTA-2017
    97. ICISSP 2018

AWARDS AND HONORS

  • Best Conference Paper Award, “Botnet Detection Using Unsupervised Machine Learning,” 2016 International Conference on Innovation, Communication and Engineering, 2016.
  • First Prize Paper Award, “An Integrated System of Communication APPs for Mobile Phone,” 2016 IEEE International Conference on Applied System Innovation, 2016.
  • Outstanding Research Award, 2015 WITC (World Congress on Information Technology Applications and Services), Feb., 2015.
  • Outstanding Professor Award of Electrical Engineering, The Chinese Institute of Electrical Engineering, 2014.
  • The Eighth Scientific Paper Award for Communication Technology, Far Eastern Y. Z. Hsu Science and Technology Memorial Foundation, 2010.
  • The Best Paper Award (1 out of 26) in MobiSys'09, 2009
  • The Best Paper Award in International Computer Symposium, 2010.
  • The Best Paper Award in Cryptology Information Security Conference 2009 (1 out of 62).
  • The Best Paper Award in Information Security Conference 2006 (1 out of 71).
  • The Advisor of Ph.D. Dissertation - Outstanding in Chinese Cryptography and Information Security Association, 2012.
  • The Advisor of Ph.D. Dissertation - Outstanding in Chinese Cryptography and Information Security Association, 2011.
  • The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2011.
  • The Best Paper Award in 2010 International Computer Symposium (ICS 2010).
  • The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2010.
  • Outstanding Paper Award in Computer Science, in Computer Society of the Republic of China, 2010.
  • The Best Paper Award in Cryptology & Information Security Conference 2009 (1 out of 62).
  • The Advisor of Ph.D. Dissertation Award - Outstanding in Institute of Information & Computing Machinery, 2009.
  • The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2009.
  • The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2008.
  • The Best Paper Award in Information Security Conference 2006 (the only one out of 71 papers).
  • The Best Paper Award in Information Security Conference 2005 (the only one out of 58 papers).
  • The Best Paper Award in 2005 National Computer Symposium.
  • Outstanding Paper Award in Computer Science, in Computer Society of the Republic of China, 2005.
  • The Annual JISE (Journal of Information Science & Engineering) Best Paper Award in 2003 (1 out of 64 papers).

PUBLICATIONS

Journal Papers

  1. [J1] Hung-Min Sun and T. Hwang, “On Double-One Matrices and Double-Zero Matrices,” Linear and Multilinear Algebra, Vol.31, 1992, pp. 47-55. (SCI)
  2. [J2] Hung-Min Sun and T. Hwang, “Key Generation of Algebraic-Code Cryptosystems,” Computers and Mathematics with Applications, Vol. 27, No. 2, 1994, pp. 99-106. (SCI)
  3. [J3] Hung-Min Sun* and S. P. Shieh, “On Dynamic Threshold Schemes,” Information Processing Letters, Vol. 52, No. 4, 1994, pp. 201-206. (SCI)
  4. [J4] Hung-Min Sun* and S. P. Shieh, “Construction of Dynamic Threshold Schemes,” IEE Electronics Letters, Vol. 30, No. 24, 1994, pp. 2023-2025. (SCI)
  5. [J5] Hung-Min Sun* and S. P. Shieh, “An Efficient Construction of Perfect Secret Sharing Schemes for Graph-Based Structures,” Computers and Mathematics with Applications, Vol. 31, No. 7, 1996, pp. 129-135. (SCI)
  6. [J6] S. P. Shieh, W. H. Yang, and Hung-Min Sun, “An Authentication Protocol without Third Party,” IEEE Communications Letters, Vol. 1, No. 3, 1997, pp. 87-89. (SCI)
  7. [J7] Hung-Min Sun*, 1997 (November), “Private-Key Cryptosystem Based on Burst-Error-Correcting Codes,” IEE Electronics Letters, Vol. 33, No. 24, pp. 2035-2036, London, IEE Press. (SCI)
  8. [J8] Hung-Min Sun and S. P. Shieh, 1997 (December), “Optimal Information Dispersal for Increasing Reliability of a Distributed Service,” IEEE Transactions on Reliability, Vol. 46, No. 4, pp. 462-472, New York, IEEE Press. (SCI)
  9. [J9] Hung-Min Sun* and S. P. Shieh, 1998 (March), “Secure Broadcasting in Large Networks,” Computer Communications, Vol. 21, No. 3, pp. 279-283, New York, IPC Science and Technology Press. (SCI)
  10. [J10] Hung-Min Sun* and S. P. Shieh, 1998 (October), “Secret Sharing Schemes for Graph-Based Prohibited Structures,” Computers and Mathematics with Applications, Vol. 36, No. 7, pp. 131-140, New York, Pergamon Press. (SCI)
  11. [J11] Hung-Min Sun*, S. P. Shieh, and H. M. Sun, 1999 (January), “A Note on Breaking and Repairing a Secure Broadcasting in Large Networks,” Computer Communications, Vol. 22. No. 2, pp. 193-194, New York, IPC Science and Technology Press. (SCI)
  12. [J12] Hung-Min Sun* and S. P. Shieh, 1999 (February), “Recursive Constructions for Secret Sharing Schemes,” Computers and Mathematics with Applications, Vol. 37, No. 3, pp. 87-96, New York, Pergamon Press. (SCI)
  13. [J13] Hung-Min Sun*, 1999 (May), “On-line Multiple Secret Sharing based on a One-way Function,” Computer Communications, Vol. 22, No. 8, pp. 745-748, New York, IPC Science and Technology Press. (SCI)
  14. [J14] Hung-Min Sun*, 1999 (May), “An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers,” Computer Communications, Vol. 22, No. 8, pp. 717-722, New York, IPC Science and Technology Press. (SCI)
  15. [J15] Hung-Min Sun*, 1999 (July), “New Construction of Perfect Secret Sharing Schemes for Graph-based Prohibited Structures,” Computers & Electrical Engineering, Vol. 25, No. 4, pp. 267-278, New York, Pergamon Press. (SCI)
  16. [J16] Hung-Min Sun*, 1999 (August), “Comments on Improved Group Signature Scheme based on Discrete Logarithm Problem,” IEE Electronics Letters, Vol. 35, No. 16, pp. 1323-1324, London, IEE Press. (SCI)
  17. [J17] Hung-Min Sun* and S. P. Shieh, 1999 (September), “Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures,” Journal of Information Science & Engineering, Vol. 15, No. 5, pp. 679-690, Taipei, Institute of Information Science Academia Sinica Press. (SCI)
  18. [J18] Hung-Min Sun*, N. Y. Lee, and T. Hwang, 1999 (September), “Threshold Proxy Signatures,” IEE Proceedings - Computers and Digital Techniques, Vol. 146, No. 5, pp. 259-263, London, IEE Press. (SCI)
  19. [J19] Hung-Min Sun*, B. J. Chen, and T. Hwang, 1999 (October), “Cryptanalysis of Group Signature Scheme Using Self-Certified Public Keys,” IEE Electronics Letters, Vol. 35, No. 22, pp. 1938-1939, London, IEE Press. (SCI)
  20. [J20] Hung-Min Sun*, 1999 (November), “On Private-key Encryption Using Product Codes,” Computers & Electrical Engineering, Vol. 25, No. 6, pp. 439-450, New York, Pergamon Press. (SCI)
  21. [J21] Hung-Min Sun*, 1999 (November), “Security of a Broadcasting Cryptosystem in Computer Networks,” IEE Electronics Letters, Vol. 35, No. 24, pp. 2108-2109, London, IEE Press. (SCI)
  22. [J22] Hung-Min Sun*, 2000 (January), “Further Cryptanalysis of the McEliece Public-Key Cryptosystem,” IEEE Communications Letters, Vol. 4, No. 1, pp. 18-19, New York, IEEE Press. (SCI)
  23. [J23] Hung-Min Sun*, 2000 (June), “On the Dealer’s Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank,” International Journal of Foundations of Computer Science, Vol. 11, No. 2, pp. 263-281, Singapore, World Scientific Press. (SCI)
  24. [J24] S. P. Shieh, C. T. Lin, W. B. Yang, and Hung-Min Sun, 2000 (July), “Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems,” IEEE Transactions on Vehicular Technology, Vol. 49, No. 4, pp. 1464-1473, New York, IEEE Press. (SCI)
  25. [J25] C. L. Lin, Hung-Min Sun*, and T. Hwang, 2000 (October), “Three-Party Encrypted Key Exchange: Attacks and a Solution,” ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20, New York, ACM Press. (EI)
  26. [J26] Hung-Min Sun*, 2000 (November) “An Efficient Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 958-961, New York, IEEE Press. (SCI)
  27. [J27] Hung-Min Sun*, 2000 (November), “Enhancing the Security of the McEliece Public-Key Cryptosystem,” Journal of Information Science & Engineering, Vol. 16, No. 6, pp. 799-812, Taipei, Institute of Information Science Academia Sinica Press. (SCI)
  28. [J28] Hung-Min Sun*, 2000 (November), “Design of Time-Stamped Proxy Signatures with Traceable Receivers,” IEE Proceedings - Computers and Digital Techniques, Vol 147, No. 6, pp. 462-466, London, IEE Press. (SCI)
  29. [J29] C. L. Lin, Hung-Min Sun*, and T. Hwang, 2001 (January), “Efficient and Practical DHEKE Protocols ,” ACM Operating Systems Review, Vol. 35, No. 1, pp. 41-47, New York, ACM Press. (EI)
  30. [J30] Hung-Min Sun*, 2001 (February) “Cryptanalysis of a Public-Key Cryptosystem Based on Generalised Inverses of Matrices,” IEEE Communications Letters, Vol. 5, No. 2, pp. 61-63, New York, IEEE Press. (SCI)
  31. [J31] C. L. Lin, Hung-Min Sun*, and T. Hwang, 2001, “Attacks and Solutions on Strong-Password Authentication,” IEICE Transactions on Communications, Vol.E84-B, No.9, pp.2622-2627, Tokyo, IEICE Press. (SCI)
  32. [J32] H. T. Yeh, Hung-Min Sun*, and T. Hwang, 2001 (November), “Security Analysis of the Generalized Key Agreement and Password Authentication Protocol,” IEEE Communications Letters, Vol. 5, No. 11, pp. 462-463, New York, IEEE Press. (SCI)
  33. [J33] C. L. Lin, Hung-Min Sun*, M. Steiner, and T. Hwang, 2001 (December), “Three-party Encrypted Key Exchange Without Server Public-Keys,” IEEE Communications Letters, Vol 5., No. 12, pp. 497-499, New York, IEEE Press. (SCI)
  34. [J34] Hung-Min Sun*, 2002 (January), “Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes,” Informatica, Vol. 13, No. 1, pp. 105-110. (SCI)
  35. [J35] B. T. Hsieh, Hung-Min Sun*, and T. Hwang, 2002 (January), “Cryptanalysis of an Enhancement for the Simple Authentication Key Agreement Algorithm,” IEE Electronics Letters, Vol. 38, No. 1, pp. 20-21, London, IEE Press. (SCI)
  36. [J36] Hung-Min Sun*, 2002 (January), “On the Security of a Variation of Cramer-Shoup’s Public Key Scheme,” Journal of Information Science & Engineering, Vol. 18, No 1, pp. 19-22, Taipei, Institute of Information Science Academia Sinica Press. (SCI)
  37. [J37] Hung-Min Sun*, W. C. Yang, and C. S. Laih, 2002 (January), “On the Design of RSA with Short Secret Exponent,” Journal of Information Science & Engineering, Vol. 18, No. 1, pp. 1-18, Taipei, Institute of Information Science Academia Sinica Press. (SCI) (This paper received the Annual JISE Best Paper Award in 2003, the only one out of 64 papers)
  38. [J38] Hung-Min Sun* and B. L. Chen, 2002 (March), “Weighted Decomposition Construction for Perfect Secret Sharing Schemes,” Computers and Mathematics with Applications, Vol. 43, Iss. 6-7, pp. 877-887, New York, Pergamon Press. (SCI)
  39. [J39] H. T. Yeh and Hung-Min Sun*, 2002 (October), “Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attacks,” ACM Operating Systems Review, Vol. 36, No. 4, pp. 14-22, New York, ACM Press. (EI)
  40. [J40] Hung-Min Sun*, H. T. Yeh, and T. Hwang, 2003, “On the Linkability of Some Group Signature Schemes,” Informatica, Vol. 14, Issue 1, pp. 85-94. (SCI)
  41. [J41] B. T. Hsieh, Hung-Min Sun*, and T. Hwang, 2003, “On the Security of Some Password Authentication Protocols,” Informatica, Vol. 14, No. 2, pp. 195-204. (SCI)
  42. [J42] X. Yi, C. K. Siew, Hung-Min Sun*, H. T. Yeh, C. L. Lin, and T. Hwang, 2003 (March), “Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications,” IEEE Transactions on Vehicular Technology, Vol. 52, No. 2, pp. 465-468. (SCI)
  43. [J43] Hung-Min Sun* and H. T. Yeh, 2003 (April), “Further Cryptanalysis of a Password Authentication Scheme with Smart Cards,” IEICE Transactions on Communications, Vol.E86-B, No 4, pp. 1412-1415, Tokyo, IEICE Press. (SCI)
  44. [J44] H. T. Yeh, Hung-Min Sun*, and T. Hwang, 2003 (July-August), “Improved Authenticated Multiple-Key Agreement Protocol,” Computers and Mathematics with Applications, Vol. 46, Issue 2-3, pp. 207-211, New York, Pergamon Press. (SCI)
  45. [J45] H. T. Yeh, Hung-Min Sun* and T. Hwang, 2003 (November), “Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks,” Journal of Information Science & Engineering, Vol.19 No.6, pp.1059-1070, Taipei, Institute of Information Science Academia Sinica Press. (SCI)
  46. [J46] H. T. Yeh, Hung-Min Sun*, C. T. Yang, B. C. Chen, and S. M. Tseng, 2003 (November) , “Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks, IEICE Transactions on Communications, Vol. E86-B, No. 11, Nov. 2003, pp. 3278-3282, Tokyo, IEICE Press. (SCI)
  47. [J47] H. T. Yeh, Hung-Min Sun*, and B. T. Hsieh, 2004 (January), “Security of a Remote User Authentication Scheme Using Smart Cards,” IEICE Transactions on Communications, Vol.E87-B No.1 pp.192-194, Tokyo, IEICE Press. (SCI)
  48. [J48] Hung-Min Sun*, B. C. Chen, and H. T. Yeh, 2004 (May), “On the Design of Time-Stamped Signatures,” Journal of Computer and System Sciences (JCSS), Vol. 68, No. 3, pp. 598-610. (SCI)
  49. [J49] H. T. Yeh and Hung-Min Sun, 2004 (June), “Password-Based User Authentication and Key Distribution Protocols for Client-Server Applications,” Journal of Systems and Software, Vol. 72, Issue 1, pp. 97-103. (SCI)
  50. [J50] B. T. Hsieh and Hung-Min Sun*, “An Improvement of a Deniable Authentication Protocol,” IEICE Transactions on Communications, Vol.E87-B No.10 pp.3099-3101, 2004 (October), Tokyo, IEICE Press. (SCI)
  51. [J51] C. L. Lin, H.A. Wen, T. Hwang and Hung-Min Sun, “Provably Secure Three-Party Password-Authenticated Key Exchange,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E87-A, No. 11, pp. 2990-3000, 2004 (November), Tokyo, IEICE Press. (SCI)
  52. [J52] Hung-Min Sun*, B. T. Hsieh, and S. J. Hwang, “Secure Email Protocols Providing Perfect Forward Secrecy,” IEEE Communications Letters, Vol 9., No. 1, pp. 58-60, 2005 (January), New York, IEEE Press. (SCI)
  53. [J53] Hung-Min Sun*, Bing-Chang Chen, Tzonelih Hwang: Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 75 (1-2): 63-68 (2005) (SCI)
  54. [J54] Hung-Min Sun*, B.-T. Hsieh, S.-M. Tseng, ”On the security of some proxy blind signature schemes,” Journal of Systems and Software 74(3): 297-302 (2005) (SCI)
  55. [J55] H.T. Yeh and Hung-Min Sun*, “Password authenticated key exchange protocols among diverse network domains,” Computers & Electrical Engineering 31 (3): 175-189 MAY 2005 (SCI)
  56. [J56] Hung-Min Sun* and H.T. Yeh, “Password-based authentication and key distribution protocols with perfect forward secrecy,” Journal of Computer and System Sciences (JCSS), Vol. 70, No. 6, pp. 1002-1011, September, 2006. (SCI)
  57. [J57] Hung-Min Sun*, M.-E. Wu, W.-C. Ting, and M. J. Hinek, “Dual RSA and Its Security Analysis,” IEEE Transactions on Information Theory, vol. 53, no. 8, pp. 2922-2933, 2007. (SCI)
  58. [J58] Y. Chen, J.-S. Chou, and Hung-Min Sun, “A novel mutual authentication scheme based on quadratic residues for RFID systems,” Computer Networks, Vol. 52, No. 12, pp. 2373-2380, 2008. (SCI)
  59. [J59] Hung-Min Sun*, C.-M. Chen, and C.-Z. Shieh, “Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems,” IEEE Transactions on Multimedia, 2008, Vol. 10, No 6, pp. 1109-1120, 2008. (SCI)
  60. [J60] C.-H. Yang, C.-Y. Weng, S.-J. Wang, and Hung-Min Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp. 488-497, 2008. (SCI)
  61. [J61] Hung-Min Sun*, C.-T. Yang, and M.-E. Wu, “Short-Exponent RSA,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 3, pp. 912-918, 2009. (SCI)
  62. [J62] Hung-Min Sun* and W.-C. Ting, “A Gen2-based RFID Authentication Protocol for Security and Privacy,” IEEE Transactions on Mobile Computing, Vol. 8, No. 8, pp. 1052-1062, 2009. (SCI)
  63. [J63] Hung-Min Sun*, M.-E. Wu, and C.-T. Yang, “A Note on Factoring alpha-LSBS Moduli,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 8, pp. 2137-2138, 2009. (SCI)
  64. [J64] Hung-Min Sun* and M.-C. Leu, “An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 11, No. 5, pp. 947-959, 2009. (SCI)
  65. [J65] Hung-Min Sun*, Mu-En Wu, and Cheng-Ta Yang, “Simple Backdoors on RSA Modulus by Using RSA Vulnerability,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 9, pp. 2326-2332, 2009. (SCI)
  66. [J66] Hung-Min Sun*, K.-H. Wang, and C.-M. Chen, “On the Security of an Efficient Time-Bound Hierarchical Key Management,” IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2, pp. 159-160, 2009. (SCI).
  67. [J67] Hung-Min Sun*, M.-E. Wu, M. J. Hinek, C.-T. Yang, and V. S. Tseng, “Trading Decryption for Speeding Encryption in Rebalanced-RSA,” Journal of Systems and Software, Vol. 82, No. 9, pp. 1503-1512, 2009. (SCI)
  68. [J68] Hung-Min Sun*, K.-H. Wang, and W.-C. Ting, “On the Security of Secure Arithmetic Code,” IEEE Transactions on Information Forensics and Security, Vol. 4, No. 4, pp. 781-789, 2009. (SCI)
  69. [J69] Hung-Min Sun* and M.-C. Leu, Low-Exponent Encryption for Video Protection Using Context-Key Control,”Journal of Information Assurance and Security, Vol. 5, Iss. 1, pp. 595-602, 2010.
  70. [J70] C.-H. Yang, C.-Y. Weng, S.-J. Wang, Hung-Min Sun, “Grouping Strategies for Promoting Image Quality of Watermarking on the Basis of Vector Quantization,”Journal of Visual Communication and Image Representation, Vol. 21, No. 1, pp. 49-55, 2010. (SCI)
  71. [J71] C.-H. Yang, C.-Y. Weng, S.-J. Wang, Hung-Min Sun,“Varied PVD+ LSB Evading Detection Programs to Spatial Domain in Data Embedding Systems, Journal of Systems and Software, Vol. 83, No. 10, pp 1635-1643, 2010. (SCI)
  72. [J72] Hung-Min Sun*, H. Wang, B.-H. Ku, and J. Pieprzyk, “Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time,” SIAM Journal on Discrete Mathematics, Vol. 24, No. 2, pp. 617-638, 2010. (SCI).
  73. [J73] Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, Hung-Min Sun, and B.-Y. Yang, “SPATE: Smallgroup PKI-less Authenticated Trust Establishment,”IEEE Transactions on Mobile Computing, Vol. 9, No. 12, pp. 1666-1681, 2010. (SCI)
  74. [J74] Hung-Min Sun*, W.-C. Ting, and K.-H. Wang, “On the Security of Chien's Ultra-lightweight RFID Authentication Protocol,”IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 2, pp. 315-317, 2011. (SCI), NSC 97-2745-P-001-001
  75. [J75] Hung-Min Sun*, C.-Y. Weng, C.-F. Lee, and C.-H. Yang, “Anti-forensics with Steganographic Data Embedding in Digital Images,” IEEE Journal on Selected Areas in Communications, Vol. 29, No. 7, pp. 1392-1403, 2011. (SCI)
  76. [J76] Y. Chen, J.-S. Chou, Hung-Min Sun, and M.-H. Cho, “A novel electronic cash system with trustee-based anonymity revocation from pairing,” Electronic Commerce Research and Applications, Vol. 10, No. 6, pp. 673-682, 2011. (SCI, SSCI)
  77. [J77] Hung-Min Sun*, H. Wang, K.-H. Wang, and C.-M. Chen, “A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code,” IEEE Transactions on Computers, Vol. 60, No. 6, pp 813-823, 2011. (SCI)
  78. [J78] Hung-Min Sun*, Y.-H. Chen, and Y.-H. Lin, “oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks,” IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 651-663, 2012. (SCI)
  79. [J79] Y. Chen, J.-S. Chou, and Hung-Min Sun, ” A response to a critique of “A novel electronic cash system with trustee-based anonymity revocation from pairing,” by Chen, Chou, Sun and Cho (2011),” Electronic Commerce Research and Applications, Vol. 11, No. 4, pp. 443-444, 2012. (SCIE, SSCI)
  80. [J80] Hung-Min Sun*, C.-H. Chen, and Y.-F. Ku, “A novel acknowledgment-based approach against collude attacks in MANET,” Expert Systems with Applications, Vol. 39, No.9, pp. 7968-7975, 2012. (SCI)
  81. [J81] Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng, “Enhanced authentication for commercial video services,” Security and Communication Networks, Vol. 5, No. 11, pp. 1248-1259, 2012. (SCIE)
  82. [J82] C.-M. Chen, Y.-H. Lin, Y.-C. Lin, and Hung-Min Sun*, “RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 4, pp. 727-734, 2012. (SCI)
  83. [J83] Shih-Ying Chang, Yue-Hsun Lin, Hung-Min Sun*, and Mu-En Wu, “Practical RSA Signature Scheme Based on Periodical Re-keying for Wireless Sensor Networks,” ACM Transactions on Sensor Networks, Vol. 8, No. 2, Article 13, p. 1-13, 2012. (SCIE)
  84. [J84] Hung-Min Sun*, C.-H. Chen, C.-W. Yeh, and Y.-H. Chen, “A Collaborative Routing Protocol against Routing Disruptions in MANETs,” Personal and Ubiquitous Computing, Vol. 17, No. 5, pp. 865-874, 2013. (SCI)
  85. [J85] Y.-C. Chen, Y.-S. Yu, R.-S. Chen, I-H. Chou, Hung-Min Sun*, K.-C. Yeh, “Intelligent Radioactive Waste Management Platform for Radioactive Waste Storage,” Nuclear Technology, Vol. 182, No. 3, pp. 358-368, 2013. (SCI).
  86. [J86] Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang, Cheng-Hsing Yang, “Data Embedding in Image-media using Weight-function on Modulo Operations,” ACM Transactions on Embedded Computing Systems, Vol. 12, No. 2, Article 21, 2013. (SCIE)
  87. [J87] Y.-H. Lin, S.-Y. Chang, and Hung-Min Sun*, “CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks,” IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 7, pp. 1471-1483, 2013. (SCI)
  88. [J88] C.-M. Chen, K.-H. Wang, T.-Y. Wu, J.-S. Pan, Hung-Min Sun*, “A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices,” IEEE Transactions on Information Forensics and Security, Vol. 8, No. 8, pp. 1318-1330, 2013. (SCI)
  89. [J89] Pei-Chi Chao and Hung-Min Sun*, “Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study,” Information Sciences,” Vol. 245, pp. 255-275, 2013. (SCI)
  90. [J90] M.-E. Wu, C.-M. Chen, Y.-H. Lin, and Hung-Min Sun*, “On the Improvement of Wiener Attack on RSA with Small Private-exponent,” The Scientific World Journal, Article ID 650537, 9 pages, 2014. (SCI)
  91. [J91] C.-M. Chen, S.-M. Chen, X. Zheng, P.-Y. Chen, and Hung-Min Sun*, “A Secure RFID Authentication Protocol Adopting Error Correction Code,” The Scientific World Journal, Article ID 704623, 12 pages, 2014. (SCI)
  92. [J92] C.-M. Chen, Y.-H. Chen, Y.-H. Lin, Hung-Min Sun*, “Eliminating Rouge Femtocells based on Distance Bounding Protocol and Geographic Information,” Expert Systems with Applications, Vol. 41, No. 2, pp. 426-433, 2014. (SCIE)
  93. [J93] B.-Z. He, C.-M. Chen, Y.-P. Su, Hung-Min Sun*, “A Defence Scheme Against Identity Theft Attack based on Multiple Social Networks,” Expert Systems with Applications, Vol. 41, No. 5, pp. 2345-2352, 2014. (SCIE)
  94. [J94] S.-M. Chen, M.-E. Wu, Hung-Min Sun*, K.-H. Wang, “CRFID: An RFID system with a cloud database as a back-end server,” Future Generation Computer Systems, Vol. 30, pp. 155-161, 2014. (SCIE)
  95. [J95] M.-E. Wu, R. Tso, Hung-Min Sun*, “On the Improvement of Fermat Factorization Using a Continued Fraction Technique,” Future Generation Computer Systems, Vol. 30, pp. 162-168, 2014. (SCIE)
  96. [J96] M.-E. Wu, S.-Y. Chang, C.-J. Lu, Hung-Min Sun*, “A Communication-Efficient Private Matching Scheme in Client-Server Model,” Information Sciences, Vol. 275, pp. 348-359, 2014. (SCI)
  97. [J97] Chien-Ming Chen, Shaui-Min Chen, Wei-Chih Ting, Chi-Yi Kao, Hung-Min Sun* (2015, Feb). An enhancement of return address stack for security. Computer Standards & Interfaces, Volume 38, pp.17–24. (SCIE)
  98. [J98] Hung-Min Sun*, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang (2015, Nov). A provable authenticated group key agreement protocol for mobile environment. Information Sciences, Volume 321, pp. 224–237. (SCI)
  99. [J99] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Ruey-Kai Sheu, Hung-Min Sun*, Personal video delivery with rapid Raptor code decoder. Personal and Ubiquitous Computing 20(6): 915-931 (2016) (SCI, IF: 2.395, Ranking: 48/146, Q2)
  100. [J100] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun*, Fast and low-complexity encoding of Raptor codes based on operation lists for known source block lengths. Multimedia Tools and Applications 76 (7) : 9219-9243 (2017), (SCI, IF=1.53, Ranking: 45/104, Q2)
  101. [J101] Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun*, A shareable keyword search over encrypted data in cloud computing. The Journal of Supercomputing 74(3): 1001-1023 (2018), (SCI, IF=1.326, Ranking: 52/104, Q2).
  102. [J102] Wei Wu, Chen-Li Huang, Shiian-Tung Chen, Hung-Min Sun*. An Integration System of Communication App on Image Recognition. Journal of Internet Technology. (2016, Jul, accepted). (SCI, IF=1.930, Ranking: 39/89, Q2).
  103. [J103] Yuan-Yuan Su, Hung-Min Sun*, Emotion-Based Classification and Indexing for Wallpaper and Textile, Applied Science, accepted, June 28, 2017. (SCI, IF=1.679, Ranking: 75/148, Q3). MOST 103-2221-E-007-073-MY3 and MOST 104-2221-E-007 -071 -MY3
  104. [J104] Yuan-Yuan Su, Hung-Min Sun*, Emotion-based color transfer of images using adjustable color combinations, Soft Computing, accepted, First Online: 13 September 2017. (SCI, IF=2.472, Ranking: 33/105, Q2). MOST-104-2221-E-007-071-MY3.
  105. [J105] Wei Wu, Jaime Alvarez, Chengcheng Liu, Hung-Min Sun*. Bot Detection Using Unsupervised Machine Learning. Microsystem Technologies. (2016, Dec, accepted). (SCI, IF=1.195, Ranking: 172/262, Q3).
  106. [J106] Yining Liu, Shih-Chi Wang, Yang Yang, Yeh-Cheng Chen, Hung-Min Sun*, An Automatic UI Interaction Script Generator for Android Applications Using Activity Call Graph Analysis. EURASIA Journal of Mathematics, Science and Technology Education. (2018, Feb. accepted). (SCI, IF=0.903, Ranking: 147/235, Q3)
  107. [J107] Hung-Min Sun*, Shiuan-Tung Chen, Jyh-Haw Yeh, Chia-Yun Cheng, A Shoulder Surfing Resistant Graphical Authentication System. IEEE Transactions on Dependable and Secure Computing, 15 (2): 180-193 (2018) (SCI, IF=2.926, Ranking: 12/106, Q1, Impact Factor前15% 校訂傑出期刊).

Book Chapters

  1. [B1] Hung-Min Sun*, S.-P. Shieh, On Private-Key Cryptosystems Based on Product Codes, in Information Security and Privacy - ACISP 1998, Lecture Notes in Computer Science, Vol. 1438, Springer-Verlag, Berlin, pp. 68-79, 1998.
  2. [B2] M. Michels, M. Stadler, and Hung-Min Sun, On the Security of some Variants of the RSA Signature Scheme, in Computer Security – ESORICS’98, J.J. Quisquater, Y. Deswarte, C. Meadows, D. Gollmann (Eds.), Lecture Notes in Computer Science, Vol. 1485, Springer-Verlag, Berlin, pp. 85-96, 1998.
  3. [B3] Hung-Min Sun*, Improving the Security of the McEliece Public-Key Cryptosystem, in Advances in Cryptology – ASIACRYPT’98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, Berlin, pp. 200-213, 1998.
  4. [B4] Hung-Min Sun*, W. C. Yang, and C. S. Laih, On the design of RSA with short secret exponent, in Advances in Cryptology – ASIACRYPT’99, Lecture Notes in Computer Science, Vol. 1716, Springer-Verlag, Berlin, pp. 150-164, 1999.
  5. [B5] Hung-Min Sun* and B. L. Chen, On the Decomposition Constructions for Perfect Secret Sharing Schemes, in Information and Communications Security – ICICS’97, Lecture Notes in Computer Science, Vol. 1334, Springer-Verlag, Berlin, pp. 50-60, 1997.
  6. [B6] Hung-Min Sun* and C.-T. Yang, On the Design of RSA with Balanced Short Exponents and Its Application, in Public Key Cryptography - PKC 2005, Lecture Notes in Computer Science, Vol. 3386, Springer-Verlag, Berlin, pp. 199-215, 2005.
  7. [B7] Hung-Min Sun*, Y.-H. Lin, and M.-F. Wu, API Monitoring System for Defeating Worms and Exploits in MS-Windows System, in Information Security and Privacy - ACISP 2006, Lecture Notes in Computer Science, Vol. 4058, Springer-Verlag, Berlin, pp. 159-170, June 2006.
  8. [B8] Hung-Min Sun*, M.-E. Wu, and Y.-H. Chen, Estimating Prime-Factors of RSA Modulus N and Its Application on the Extension of the Wiener Attack, in Applied Cryptography and Network Security - ACNS'07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4521, pp. 116-128, 2007.
  9. [B9] Hung-Min Sun*, M.-E. Wu, H. Wang, and J. Guo, On the Improvement of the BDF Attack on LSBS-RSA, in Information Security and Privacy - ACISP 2008, Lecture Notes in Computer Science, 5107, Editors: Yi Mu, Willy Susilo and Jennifer Seberry, Springer-Verlag, pp. 84-97, 2008.
  10. [B10] Hung-Min Sun*, M.-E. Wu, R. Steinfeld, J. Guo, and H. Wang, Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits, in Cryptology and Network Security - CANS 2008, Lecture Notes in Computer Science, 5339, Springer-Verlag, pp. 49-63, 2008.
  11. [B11] Hung-Min Sun*, W.-H. Chang, S.-Y. Chang, Y.-H. Lin, DepenDNS: Dependable Mechanism against DNS Cache Poisoning, in Cryptology and Network Security -CANS 2009, Lecture Notes in Computer Science 5888, Springer-Verlag, pp. 174-188, 2009.
  12. [B12] M.-Y. Hsu, Y.-H. Chen, S.-S. Chen, W. Tang, and Hung-Min Sun, “An IHD Authentication Protocol in Smart Grid, Lecture Notes in Electrical Engineering (LNEE, Springer) - SGSC 2012”, Springer, 2012.
  13. [B13] M.-E. Wu, R. Tso, Hung-Min Sun*, “Cryptanalysis of Exhaustive Search on Attacking RSA,” NSS 2012, Network System Security, Lecture Notes in Computer Science 7645, Springer 2012, pp. 373-379, 2012..
  14. [B14] M.-E. Wu, R. Tso, Hung-Min Sun*, “On the Improvement of Fermat Factorization,” NSS 2012, Network System Security, Lecture Notes in Computer Science 7645, Springer 2012, pp. 380-391, 2012.
  15. [B15] Lun-Pin Yuan, Bing-Zhe He, Chang-Shiun Liu, Hung-Min Sun*, “A Secure and Flexible Data Aggregation Framework for Smart Grid. Advanced Technologies,” Embedded and Multimedia for Human-centric Computing, Netherlands: Springer. 2014: Vol. 60, pp. 681-690, 2014.
  16. [B16] C.-M. Chen, M.-E. Wu, B.-Z. He, X. Zheng, C. Hsing, Hung-Min Sun*, “A Methodology for Hook-Based Kernel Level Rootkits,” ISPEC 2014, Information Security Practice and Experience, Lecture Notes in Computer Science, Volume 8434, 2014, pp 119-128, Springer.
  17. [B17] C.-R. Li, C.-Y. Kuan, B.-Z. He, W.-E. Wu, C.-Y. Weng, Hung-Min Sun*, ” A Security System based on Door Movement Detecting,” ECC 2014, Intelligent Data analysis and its Applications, Volume I, Advances in Intelligent Systems and Computing, Volume 297, 2014, pp 155-163, Springer.
  18. [B18] Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun. A New Public Key Encryption with Equality Test. Network and System Security (8th International Conference, NSS 2014 (ISBN: 978-3-319-11697-6). Switzerland: Springer International Publishing. Oct, 2014: Volume 8792 of the series Lecture Notes in Computer Science, pp 550-557.
  19. [B19] Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun* . Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. Network and System Security (NSS 2016) (ISBN: 978-3-319-46297-4). Switzerland: Springer International Publishing. Sep, 2016: Lecture Notes in Computer Science 9955, pp 47-61.
  20. [B20] Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun*. A System of Shareable Keyword Search on Encrypted Data. Network and System Security (NSS 2016) (ISBN: 978-3-319-46297-4). Switzerland: Springer International Publishing. Sep, 2016: Lecture Notes in Computer Science 9955, pp. 283-299.
  21. [B21] Amir Rezapour, Wei Wu, Hung-Min Sun*. Cloud-Based Storage Model with Strong User Privacy Assurance. DMBD 2016, Data Mining and Big Data (ISBN: 978-3-31940972-6). Switzerland: Springer International Publishing. Jun, 2016: Lecture Notes in Computer Science 9714, pp 373-378. MOST 104-3115-E-007-004.

Conference Papers

  1. [C1] Hung-Min Sun and T. Hwang, “On the Generation of Large Nonsingular Matrix Pairs and Permutation Matrices for Algebraic-Code Cryptosystems,” Proceedings of National Computer Symposium 1989, pp. 796-801.
  2. [C2] Hung-Min Sun and T. Hwang, “Public-Key ID-Based Cryptosystem,” Proceedings of 1991 IEEE International Carnahan Conference on Security Technology, October 1-3, 1991, pp 142-144.
  3. [C3] Hung-Min Sun and T. Hwang, “An Efficient Probabilistic Public-Key block Encryption and Signature Scheme Based on ElGamal's Scheme,” Proceedings of 1991 IEEE International Carnahan Conference on Security Technology, October 1-3, 1991, pp 45-148.
  4. [C4] Hung-Min Sun and T. Hwang, “Group-Oriented Threshold Schemes,” Proceedings of the International Conference on Information Engineering, 2-5, December 1991, pp. 485-493.
  5. [C5] T. Hwang and Hung-Min Sun, “Key Management of the Threshold Schemes,” Proceedings of International Symposium on Communications, December 9-13, 1991, pp. 602-605.
  6. [C6] S. P. Shieh, C. C. Wang and Hung-Min Sun, “Intrusion Detection in Computer Networks,” Proceedings of the Third Conference on Information Security, A.2_4.1-A.2_4.11, 1993.
  7. [C7] Hung-Min Sun and S. P. Shieh, “A Secret Sharing Scheme for Hierarchical User Groups,” Proceedings of the 8th International Joint Workshop on Computer Communication, G3.1.1-G3.1.4, December 12-14, 1993.
  8. [C8] Hung-Min Sun and S. P. Shieh, “Optimal Information Dispersal for Reliable Communication in Computer Networks,” in Proceedings of the 1994 International Conference on Parallel and Distributed Systems (ICPADS'94), pp. 460-464, December 19-21, 1994. (NSC-83-0404-E-009-106)
  9. [C9] Hung-Min Sun and S. P. Shieh, “On Constructing Secret Sharing Schemes,” Proceedings of the 1994 IEEE International Conference on Computer Communications, Networking for Global Communications (IEEE INFOCOM'94), Toronto, pp. 1288-1292, 1994. (NSC-82-0408-E-009-290)
  10. [C10] Hung-Min Sun and S. P. Shieh, “Security Analysis of Dynamic Threshold Schemes,” Proceedings of the Fourth National Conference on Information Security, pp. 143-149, 1994.
  11. [C11] Hung-Min Sun and S. P. Shieh, “A Perfect Scheme for Secret Sharing between Two Parties,” Proceedings of the Fifth National Conference on Information Security, pp. 136-141, 1995.
  12. [C12] Hung-Min Sun and S. P. Shieh, “Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes,” Third ACM Conference on Computer and Communications Security (ACM CCS’96), New Delhi, India, pp. 153-156, March 14-16, 1996.
  13. [C13] Hung-Min Sun and S. P. Shieh, “Secret Sharing in Graph-Based Prohibited Structures,” IEEE INFOCOM'97, Kobe, Japan, April 9-13, 1997.
  14. [C14] Hung-Min Sun and G. Horng, “On the Security of Single Assignment Secret Sharing Schemes,” Proceedings of 1997 Information Security Conference, pp. 43-47, May, 1997.
  15. [C15] Hung-Min Sun and S. P. Shieh, “On the Information Rate of Perfect Secret Sharing Schemes with Access Structures of Rank Three,” Proceedings of 1997 Information Security Conference, pp. 48-54, May, 1997.
  16. [C16] Hung-Min Sun, W.Y. Lin, and C.C. Chan, “The Study of Improving the Login Security,” Proceedings of National Computer Symposium 1997, R.O.C., Vol. 2, pp. c159-c164, 1997.
  17. [C17] Hung-Min Sun, S. P. Shieh, and H.M. Sun, “A Secure Broadcasting Cryptosystem in Large Computer Networks,” Proceedings of Eighth National Conference on Information Security, May 15-16, pp. 369-378, 1998.
  18. [C18] Hung-Min Sun, S. P. Shieh, and H.M. Sun, “On-line multiple secret sharing based on a one-way function,” Proceedings of Eighth National Conference on Information Security, May 15-16, pp. 331-336, 1998.
  19. [C19] Hung-Min Sun, “On the Security of Cryptosystems based on Error-Correcting Codes,” Proceedings of Eighth National Conference on Information Security, May 15-16, pp. 39-48, 1998.
  20. [C20] Hung-Min Sun, and B. T. Shieh, “Remarks on Two Nonrepudiable Proxy Signature Schemes,” Ninth National Conference on Information Security, May 14-15, 1999.
  21. [C21] Hung-Min Sun, N. Y. Lee, and T. Hwang, “Nonrepudiable Threshold Proxy Signatures,” Ninth National Conference on Information Security, May 14-15, 1999.
  22. [C22] Hung-Min Sun, and B. R. Ke, “Cryptanalysis of Chen’s Digital Signature Scheme with Message Recovery,” Ninth National Conference on Information Security, May 14-15, 1999.
  23. [C23] Hung-Min Sun, and H. M. Sun, “Cryptanalysis of the Wu-Dawson Public-Key Cryptosystem Based on Generalised Inverses of Matrices,” Ninth National Conference on Information Security, May 14-15, 1999.
  24. [C24] Hung-Min Sun, and B. J. Chen, “Unforgeable Time-Stamped Proxy Signatures with Traceable Receivers,” Ninth National Conference on Information Security, May 14-15, 1999.
  25. [C25] C. C. Chang, C. H. Wang, F. Y. Liou, and Hung-Min Sun, “Remarks on a Digital Signature Scheme Based on Error-Correcting Codes,” Ninth National Conference on Information Security, May 14-15, 1999.
  26. [C26] Hung-Min Sun, and B. T. Shieh, “Improved Authenticated Key Agreement Scheme via Password Authentication,” National Computer Symposium 1999.
  27. [C27] Hung-Min Sun, “Convertible Proxy Signature Scheme,” National Computer Symposium 1999.
  28. [C28] Hung-Min Sun, B. T. Hsieh, and S. J. Hwang, “Secure Email Protocols Providing Perfect Forward Secrecy,” Information Security Conference 2000, May 5-6, 2000.
  29. [C29] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Efficient Three-Party Key Agreement Protocols Resistant to Password Guessing Attacks,” Information Security Conference 2000, May 5-6, 2000.
  30. [C30] H. A. Wen, Hung-Min Sun, and T. Hwang, “Optimal Key Exchange and Authentication Protocol Secure Against Dictionary and Replay Attacks,” Information Security Conference 2000, May 5-6, 2000.
  31. [C31] Hung-Min Sun, and G. Horng, “Improved Identification Scheme Based on Shamir’s Unbalanced RSA,” Information Security Conference 2000, May 5-6, 2000.
  32. [C32] B. C. Chen, Hung-Min Sun, and T. Hwang, “Four-Party Encryption Key Exchange,” 2000 International Computer Symposium (ICS2000), Dec. 6-8, 2000.
  33. [C33] Hung-Min Sun, “On Proxy Multi-Signature Schemes,” 2000 International Computer Symposium (ICS2000), Dec. 6-8, 2000.
  34. [C34] B. C. Chen, Hung-Min Sun, and T. Hwang, “An Improved Group Signature Scheme Using Proxy Provers,” Information Security Conference 2001, May 4-5, 2001.
  35. [C35] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Improvement of Efficient Three-Party Key Agreement Protocols Resistant to Password Guessing Attacks,” Information Security Conference 2001, May 4-5, 2001.
  36. [C36] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Improved Authenticated Multiple-Key Agreement Protocol,” Information Security Conference 2001, May 4-5, 2001.
  37. [C37] Hung-Min Sun, “Cryptanalysis of Password Authentication Schemes with Smart Cards,” Information Security Conference 2001, May 4-5, 2001.
  38. [C38] Hung-Min Sun, “Cryptanalysis of a Digital Signature Scheme based on Factoring and Discrete Logarithms,” National Computer Symposium, Dec. 20-21, 2001.
  39. [C39] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Cryptanalysis of Authenticated Key Agreement Protocols,” National Computer Symposium, Dec. 20-21, 2001.
  40. [C40] Hung-Min Sun, B. T. Hsieh, and C. T. Lin, “Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme,” Information Security Conference 2002, pp. 151-154, 2002.
  41. [C41] B. T. Hsieh, Hung-Min Sun, T. Hwang, and C. T. Lin, “An Improvement of Saeednia’s Identity-based Key Exchange Protocol,” Information Security Conference 2002, pp. 41-43, 2002.
  42. [C42] Hung-Min Sun, B. T. Hsieh, T. Hwang, and C. T. Lin, “Analysis of A Blind Signature Scheme Based on ElGamal Signature,” Proceedings of 2002 Symposium on Digital Life and Internet Technologies.
  43. [C43] B. T. Hsieh, H. T. Yeh, Hung-Min Sun and C. T. Lin, “Crytanalysis of a fingerprint-based remote user authentication scheme using smart cards”, 2003 IEEE International Carnahan Conference on Security Technology, 2003.
  44. [C44] Hung-Min Sun and B. T. Hsieh, “Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection”, 2003 IEEE International Carnahan Conference on Security Technology, 2003.
  45. [C45] B.C. Chen, Hung-Min Sun, and C. H. Chen, “A Fair and Secure Key Escrow Scheme,” Information Security Conference 2003.
  46. [C46] Hung-Min Sun and C. T. Yang, “On the Security of A Publicly Verifiable Authenticated Encryption”, Information Security Conference 2003.
  47. [C47] H. T. Yeh and Hung-Min Sun, “Password-Based Authentication and Key Distribution Protocols with Perfect Forward Secrecy,” Information Security Conference 2003.
  48. [C48] Hung-Min Sun and B. T. Hsieh, “On the Security of Some Proxy Blind Signature Schemes”, Australasian Information Security Workshop (AISW 2004).
  49. [C49] Hung-Min Sun, B. T. Hsieh, and Shin-Mu Tseng, “Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol,” IEEE International Conference on e-Technology, e-Commerce, and e-Service, pp. 563-566.
  50. [C50] Hung-Min Sun, C.-T. Yang, and B.-T. Hsieh, “Cryptanalysis of a Threshold Proxy Signature Scheme,” Information Security Conference 2004, pp. 360-365, 2004.
  51. [C51] Hung-Min Sun and B. T. Hsieh, “Remarks on Designing Proxy Signature Schemes,” Information Security Conference 2004, pp. 353-359, 2004.
  52. [C52] Hung-Min Sun and M.-E. Wu, “Design of Rebalanced RSA-CRT for Fast Encryption,” Information Security Conference 2005, June 9-10, 2005. (This paper received the best paper award, the only one out of 58 papers.)
  53. [C53] Hung-Min Sun, Y.-K. Peng, and C.-M. Chen, “A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks,” Information Security Conference 2005, June 9-10, 2005.
  54. [C54] Hung-Min Sun, K.-C. Yang, and K.-H. Wang, “Transferable DRM System for Two New Business Models,” Information Security Conference 2005, June 9-10, 2005.
  55. [C55] Hung-Min Sun, C.-F. Hung, and B.-H. Ku, “An Improved Identity-Based DRM System,” Information Security Conference 2005, June 9-10, 2005.
  56. [C56] Hung-Min Sun, C.-J. Hong, and C.-H. Chen, “A New Approach to Feature-Based Copyright Protection of Images,” 3rd International Conference on Information Technology: Research and Education, (ITRE 2005), June 27-30, 2005, IEEE Press.
  57. [C57] Shen-Wei Chen, Wei-Chi Ting, Hung-Min Sun, Yarsun Hsu, “Modified AES for Wireless Sensor Networks,” 2005 National Computer Symposium, Dec 15-16, 2005. (This paper received the best paper award)
  58. [C58] Hung-Min Sun, C.-Z. Shieh, and C. M. Chen, “An Efficient and Flexible Key Distribution Scheme for Conditional Access System in Pay-TV Systems,” Information Security Conference 2006, June, 2006. (This paper received the best paper award, the only one out of 71 papers.)
  59. [C59] Hung-Min Sun, Y.-H. Chen, and K.-H. Wang, “An Image Data Hiding Scheme being Perfectly Imperceptible to Histogram Attacks,” Image and Vision Computing New Zealand 2006 (IVCNZ 2006), November 27-29, 2006, New Zealand.
  60. [C60] Hung-Min Sun, C.-F. Hung, and C.-M. Chen, “An Improved Digital Rights Management System Based on Smart Cards,” 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007), Feb. 21-23, 2007, Australia.
  61. [C61] Hung-Min Sun, S.-P. Hsu, and C.-M. Chan, “Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks,” The IEEE 21st International Conference on Advanced Information Networking and Applications (IEEE AINA-07), May 21-23, 2007, Canada.
  62. [C62] Hung-Min Sun, C.-Y. Weng, and S.-J. Wang, “Histogram-based Undetectable Fidelity Image in Steganography as MSB Controller,” in Proceedings of the Second International Conference on Ubiquitous Information Management and Communication, ICUIMC'08, Jan 31-Feb. 2, 2008, Korea, ACM press.
  63. [C63] Hung-Min Sun, Y.-H. Lin, S.-M. Chen, and Y.-C. Shen, “Secure and Fast Handover Scheme based on Pre-authentication Method for 802.16/WiMAX Infrastructure Network,” In Proceeding of TENCON 2007-2007 IEEE Region 10 Conference, pp. 1-4, 2007.
  64. [C64] Hung-Min Sun, Y.-T. Tseng, and Y.-H. Lin, “Detecting the Code Injection by Hooking System Calls in Windows Kernel Mode,” ICS 2007.
  65. [C65] Hung-Min Sun, C.-M. Chen, F.-Y. Chu, “An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks”, in Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), pp. 495-500, 2007.
  66. [C66] Hung-Min Sun, S.-Y. Chang, S.-M. Chen, and C.-C. Chiu, “An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX,” IEEE APSCC 2008, in Proceeding of the 3rd IEEE Asia-Pacific Services Computing Conference, pp. 199-204, 2008.
  67. [C67] Hung-Min Sun, S.-M. Chen, Y.H. Chen, H.J. Chung, and I-H. Lin, “Secure and Efficient Handover Schemes for Heterogeneous Networks,” IEEE APSCC 2008, in Proceeding of the 3rd IEEE Asia-Pacific Services Computing Conference, pp. 205-210, 2008.
  68. [C68] Hung-Min Sun, Y.-H. Lin, Y.-C. Hsiao, and C.-M. Chen, “An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks,”In Proceedings of IEEE International Conference on Embedded Software and Systems (ICESS 2008), pp. 19-26, July 2008. (Acceptance rate: 21%)
  69. [C69] Hung-Min Sun, K. W. Wang, “Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack”, in Proceedings of The International Symposium on Electronic Commerce and Security (ISECS 2008), pp. 385-389, IEEE Computer Society Press, 2008.
  70. [C70] Hung-Min Sun, S.-Y. Chang, Y.-H. Lin, and S.-Y. Chiou, “Efficient Authentication Schemes for Handover in Mobile WiMAX,” ISDA 2008, In Proceeding of Eighth International Conference on Intelligent Systems Design and Applications, 2008.
  71. [C71] Hung-Min Sun and K.-H. Wang, “Designing an Arithmetic Code for Multimedia Files Compression and Encryption,” Second International Workshop on Computer Science and Engineering (WCSE 2009), pp. 444-448, 2009, IEEE press.
  72. [C72] Hung-Min Sun, S.Y. Chang, H.T. Chaio, “A Commitment-based Scheme for Securing Vandermonde Codes against Pollution Attacks,” 2009 International Symposium on Intelligent Signal Processing and Communication Systems, (ISPAC 2009), pp. 591-594, IEEE press.
  73. [C73] Hung-Min Sun, C.-T. Yang, M.-E. Wu, and V. S. Tseng, “A Multisignature-like Scheme Based on RSA with CRT-Exponents,” Cryptology and Information Security Conference 2009 (CISC2009), (This paper received the best paper award, the only one out of 62 papers.)
  74. [C74] Hung-Min Sun, K.-C. Lin, and Y.-H. Lin, “A Novel Monitoring System Against Shellcodes Through Microsoft Windows API Hooking,” Cryptology and Information Security Conference 2009 (CISC2009).
  75. [C75] Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, Hung-Min Sun, and B.-Y. Yang, “SPATE: Small-group PKI-less Authenticated Trust Establishment,” The 7th Annual International Conference on Mobile Systems, Applications and Services (MobiSys '09), pp. 1-14, 2009. (by ACM SIGMOBILE and the USENIX Association, acceptance ratio: 20%) (This paper received the best paper award)
  76. [C76] Hung-Min Sun, S.-Y. Chang, Y.-H. Hung, Y.-K. Tseng, H.-T. Chiao, “Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem,” ISPAN 2009, pp.260-265, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 2009.
  77. [C77] Hung-Min Sun and M.-C. Leu, “A Real-Time Selective Video Encryption Using Context-Key Control,” The Fifth International Conference on Information Assurance and Security (ISA-2009), pp. 114-117, 2009.
  78. [C78] S.-Y. Chiou, S.-Y. Chang, and Hung-Min Sun, “Common Friends Discovery with Privacy and Authenticity,” The Fifth International Conference on Information Assurance and Security (ISA-2009), pp. 337-340, 2009.
  79. [C79] Hung-Min Sun, Y.-H. Lin, C.-T. Yang, and M.-E. Wu, “A Pair-wise Key Establishment Scheme for Wireless Sensor Networks,” in Proceeding of IEEE Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2009), pp. 1152-1155, 2009.
  80. [C80] Hung-Min Sun, C.-W. Weng, S.-J. Wang, “A Scheme of Modulo-Based Capacity-Improvement upon EMD Systems,” in Proceeding of IEEE Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2009), pp. 365-368, 2009, IEEE press.
  81. [C81] Hung-Min Sun, S.-Y. Chang, and H.-T. Chiao, “Polynomial Interpolation Codes for Reliable Multicast Data Distribution,” IEEE TENCON 2009, Vols 1-4, pp. 2466-2471, 2009.
  82. [C82] S.-Y. Chiou, S.-Y. Chang, G. Mezzour, A. Perrig, Hung-Min Sun, “A Trustable Reputation Scheme Based on Private Relationships,” ASONAM 2009, pp.19-24, 2009 International Conference on Advances in Social Network Analysis and Mining, 2009.
  83. [C83] H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, A. Perrig, Hung-Min Sun, B.-Y. Yang, H. Kikuchi, “A Study of User-Friendly Hash Comparison Schemes,” ACSAC 2009, pp.105-114, 2009 Annual Computer Security Applications Conference, 2009. (Acceptance rate: 19%)
  84. [C84] Y.-H. Chen, L.-W. Huang, Y.-H. Lin, S.-W. Huang, C.-H. Yeh, and Hung-Min Sun, “RDAP: Rapid Deployment Authentication Protocol between Mobile Devices and Femtocells,” in Proceedings of the 2010 IEEE Region 10 Conference, TENCON2010, Fukuoka, Japan: IEEE, Nov. 2010, pp. T4–4.2.
  85. [C85] Hung-Min Sun, B.-H. Ku, C.-C. Wu, T.-Y. Lin, “ Improving VQ Index Compress with Modified Relative Index Table,” 2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (CDEE), pp. 221-225, 2010, IEEE press.
  86. [C86] C.-M. Chen, H.-T. Chiao, S.-T. Chen, and Hung-Min Sun, “A New Business Model in Pay-TV broadcasting Systems and its Conditional Access System,” in Proceedings of the 2010 IEEE Region 10 Conference, TENCON2010, Fukuoka, Japan: IEEE, Nov. 2010, pp. T4–4.3.
  87. [C87] Y.-H. Lin, B.Z. He, Hung-Min Sun, and Y.-H. Chen, “CDS: Concealed Data Storing Scheme in Wireless Sensor Networks,” International Computer Symposium (ICS 2010), Dec. 2010.
  88. [C88] H.-T. Chiao, K.-M. Li, Hung-Min Sun, S.-Y., Chang, H.A. Hou, “Application-Layer FEC for file delivery over the WiMAX unicast networks,” 2010 12th IEEE Internation Conference on Communication Technology (ICCT), pp. 685-688, 2010, IEEE press.
  89. [C89] Hung-Min Sun, S.-Y. Chang, A.B. Tello, and Y.-H. Chen, “An Authentication Scheme Balancing Authenticity and Transmission for Wireless Sensor Networks,” International Computer Symposium (ICS 2010), Dec. 2010. (This paper received the best paper award.)
  90. [C90] Hung-Min Sun, C.-H. Chen, and P.-C. Li, “A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks,” 2011 ICPP workshop on Applications of Wireless Ad Hoc and Sensor Networks, 2011.
  91. [C91] Hung-Min Sun, C.-S. Chen, C.-L. Chen, Y.-H. Chen, ”A Robust Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks,” 2011 3rd World Congress in Applied Computing, Computer Science, and Computer Engineering, (ACC 2011), 2011.
  92. [C92] Hung-Min Sun, C.-H. Chen, L.-C. Hsu, Y.-H. Chen, and Y.-H. Chen, “Reliable Data Transmission against Packet Dropping Misbehavior in Wireless Ad Hoc Networks,” 2011 IET International Communication Conference on Wireless Mobile and Computing, CCWMC 2011, 2011.
  93. [C93] Hung-Min Sun, C.-H. Chen, C.-W. Yeh, Y.-H. Chen, “A Collaborative Routing Protocol against Routing Disruptions in MANETs, ” WCC-11 ACSA, 2011.
  94. [C94] Hung-Min Sun*, S.-M. Chen, and K.-H. Wang, “Cryptanalysis on the RFID ACTION Protocol, ” The 2011 International Conference on Security and Management (SAM'11), 2011.
  95. [C95] P. Chao and Hung-Min Sun*, “Multi-agent based cloud utilization for IT OA assets dispatching process in SCM's view: An empirical study,” 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2012, pp. 80-87, 2012.
  96. [C96] C.-M. Chen, T.-Y. Wu, B.-Z. He, Hung-Min Sun, “An Efficient Time-Bound Hierarchical Key Management Scheme without Tamper-Resistant Devices,” 2012 International Conference on Computing, Measurement, Control and Sensor Network (CMCSN 2012), pp. 285-288, 2012.
  97. [C97] Hung-Min Sun*, Y.-H. Chen, C.-C. Fang, and S.-Y. Chang, “PassMap: A Map Based Graphical-Password Authentication System,” ASIACCS 2012, 2012.
  98. [C98] S.-T. Chen, H.-T. Chiao, S.-Y. Chang, Hung-Min Sun, and C.-H. Ho, Efficient Encoding of Systematic Raptor Codes Based on Operation Lists for Known Block Lengths,” 2013 IEEE Wireless Communications and Networking Conference (WCNC 2013), pp. 4689-4694, 2013.
  99. [C99] S.-T Chen, H.-T. Chiao, S.-Y. Chang, Hung-Min Sun, P.-S. Zeng, “An HD Streaming System for WiFi Multicast Channels Based on Application-Layer FEC. 2013 IEEE 17th International Symposium on Consumer Electronics (ISCE), Taiwan, 2013.
  100. [C100] C.-Y. Weng, C.-H. Yang, C.-I Fan, K.-L. Liu and Hung-Min Sun*, ” Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality,” The 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), Seoul, Korea, 2013.
  101. [C101] L.-P. Yuan, B.-Z. He, C.-S. Liu, and Hung-Min Sun*, ” A Secure and Flexible Data Aggregation Framework for Smart Grid,” The 8th International Conference on Embedded and Multimedia Computing (EMC 2013), 2013.
  102. [C102] Y.-C. Chen, R.-S. Chen, C.-P. Ye, Hung-Min Sun, “RFID Application on Manufacturing Process Control in Semiconductor Industry,” The World Congress on Engineering 2013 (WCE 2013), London, U.K., 2013.
  103. [C103] B.-Z. He, K.-L. Huang, Hung-Min Sun*, R. Tso, “A Virtual Network Guard System Based on Cloud Computing Environments,” the 8th International Conference on Genetic and Evolutionary Computing (ICGEC 2014) October, 18-20, 2014 in Nanchang, China.
  104. [C104] Yeh-Cheng Chen, Hung-Min Sun, Ruey-Shun Chen (2014, Jan). Design and implementation of wearable RFID tag for real-time ubiquitous medical care. 2014 IEEE Topical Conference on Biomedical Wireless Technologies, Networks, and Sensing Systems (BioWireleSS), Newport Beach, CA, U.S.A.
  105. [C105] Yuan-Yuan Su, Yu-Tzu Chang, Hung-Min Sun* (2015, Sep). A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices. The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2015), Adelaide, Australia.
  106. [C106] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun* (2015, Dec). Accelerating Raptor Code Decoding Using Group Parameters for IPTV Service Delivery. 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), Chengdu, China.
  107. [C107] Amir Rezapour, Shiuan-Tung Chen, Hung-Min Sun* (2015, Dec). Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers. 2015 IEEE International Conference on Smart City/SocialCom/SustainCom together with DataCom 2015 and SC2 2015, Chengdu, China.
  108. [C108] Chen-Li Huang, Wei Wu, Shiuan-Tung Chen, Hung-Min Sun* (2016, May). An Integrated System of Communication APPs for Mobile Phone. IEEE 2016 International Conference on Applied System Innovation (ICASI 2016), Okinawa, Japan.
  109. [C109] Ming-Zhe Wua,, Wei Wub, Hung-Min Sun* (2016, Jun). Component Based Android Malware Variants Classification using Machine Learning. The 6th International Conference on Engineering and Applied Sciences, Hong Kong.
  110. [C110] Andrea E. Medina Paredes, Yuan-Yuan Su, Wei Wu, Hung-Min Sun* (2016, Jun). Using Unsupervised Machine Learning to Detect Peer-to-Peer Botnet Flows. International Conference on Advanced Technology Innovation (ICATI 2016), Bali, Indonesia.
  111. [C111] Wei-Ling Chang, Hung-Min Sun*, Wei Wu (2016, Aug). An Android BehaviorBased Malware Detection Method using Machine Learning. 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC 2016), Hong Kong.
  112. [C112] Wei-Fa Liao, Hung-Min Sun*, Wei Wu (2016, Aug). A Distributed and Autonomous Guard System Based on Cloud Environments. The 2nd IEEE International Conference on Big Data Intelligence and Computing (IEEE DataCom 2016), Auckland, New Zealand.
  113. [C113] Yeh-cheng Chen, C. N. Chu, Hung Min Sun, Ruey-Shun Chen, Mengru Tu, S.C. Lin, Using Case-based Reasoning Method to Design a Return Merchandise Authorization System for Supply Chain Management in Internet of Thing”, 2017 17th IEEE International Conference on Communication Technology (ICCT 2017).
  114. [C114] Yeh-cheng Chen, C. N. Chu, Hung Min Sun, Jyh-haw Yeh, Ruey-Shun Chen, Chorng-Shiuh Koong, Development of an Intelligent Equipment Lock Management System with RFID Technology, 2017 18th IEEE The International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2017).
  115. [C115] Wuxain Zhang, Hung-Min Sun* (2017, Jan). Instagram Spam Detection. The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Christchurch, New Zealand.
  116. [C116] Yuan-Yuan Su, Hung-Min Sun* (2017, May). Emotion-Based Classification and Indexing for Wallpaper and Textile. 2017 IEEE International Conference on Applied System Innovation, Sapporo, Japan.
  117. [C117] Yining Liu, Shih-Chi Wang, Yang Yang, Yeh-Cheng Chen, Hung-Min Sun*, Automatic UI Interaction Script Generator for Android Applications Using Activity Call Graph Analysis, The 2017 International Conference on Innovation, Communication and Engineering (ICICE 2017), Nov. 5-11, 2017.
  118. [C118] Yi-Wen Chen, Hung-Min Sun*: An Approach for Reducing the Traffic within Cloud Environments Based on Customized Linux Kernel. IEEE International Conference on Cloud Computing Technology and Science, pp. 227-230, CloudCom 2017, Hong Kong, December 11-14, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-0692-6
  119. [C119] Nicole Weatherburne, Hung-Min Sun*, “A Method for Exploring Bipolar Disorder Behaviours on Twitter,” 2018 HKICEPS, Hong Kong International Conference on Education, Psychology and Society, Hong Kong, January 22-24, 2018.
  120. [C120] Yuan-Hao Chan, Hung-Min Sun*, “Visual Cryptography for 3-Dimentinal Polygon Model,” 2018 HKICEAS, Hong Kong International Conference on Engineering and Applied Science, Hong Kong, January 24-26, 2018.
  121. [C121] Phezulu Dlamini, Hung-Min Sun*, “Mining Textual Relationships from Social Media Data for Users’ E-Learning Experiences,” Eurasian Conference on Educational Innovation (ECEI 2018), Macau, January 26-29, 2018.

Patents (USA)

  1. [P1] Hung-Min Sun, Shih-Pu Hsu, and Chien-Ming Chen, “Mobile jamming attack method in wireless sensor network and method defending the same,” US Patent 7,907,888, Patent Period: March 15, 2011 ~ Oct. 31, 2028.
  2. [P2] Muh-chyi Leu and Hung-Min Sun, “Authentication method employing elliptic curve cryptography,” US Patent 8,117,447, Patent Period: Feb. 14, 2012 ~ August 31, 2032.
  3. [P3] Cheng-Kai Chen, Hung-Min Sun, Kang-Chiao Lin, Shih-Ying Chang, and Shuai-Min Chen, “Apparatus, method, and computer readable medium thereof for generating and utilizing a feature code to monitor a program,” US Patent 8,127,276, Patent Period: Feb. 28, 2012 ~ August 31, 2032.
  4. [P4] Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, and Yue-Hsun Lin, “Method and system for handover authentication,” US Patent 8,131,296, Patent Period: March 6, 2012 ~ Sep. 30, 2032.
  5. [P5] Frank Chee-Da Tsai; Chien-Chien Chiu, I-Hung Lin, Hung-Min Sun, Shuai-Min Chen, Yao-Hsin Chen, Heng-Jeng Chung, “Mobile Station, Access Point, Gateway Apparatus, Base Station, and Handshake Method Thereof for Use in a Wireless Network Framework,” US Patent 8,527,768, Patent Period: September 3, 2013 ~ March 31, 2034.
  6. [P6] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, and Hung-Min Sun, “Method for sending and receiving an evaluation of reputation in a social network,” US Patent 8,312,276, Patent Period: November 13, 2012 ~ May 31, 2033.
  7. [P7] Hung-Min Sun, Chun-Hao Yeh, Yao-Hsin Chen, “Captcha image authentication method and system,” US Patent 8,607,331, Patent Period: December 10, 2013 ~ June 30, 2034.
  8. [P8] Hung-Min Sun, Man-Ting Kuo, Yao-Hsin Chen, Shih-Ying Chang, “Verification method and system,”US Patent 8,774,412, Patent Period: July 8, 2014 ~ Jan. 31, 2035.
  9. [P9] Shiuan-Tung Chen, Hsin-Ta Chiao, Hung-Min Sun, and Chia-Hsing Ho, “Apparatus and method for accelerating the encoding of raptor codes,” US Patent 8,839,067, Patent Period: Sep. 16, 2014 ~ March 31, 2035.
  10. [P10] Hung-Min Sun, Chi-Ming Li, “Authentication method and code setting method and authentication system for electronic apparatus,” US Patent 9,141,777, Patent Period: Sep. 22, 2015 ~ March 31, 2036.
  11. [P11] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun, “Communication system, method and receiver applicable thereto,” US Patent 9,264,181, Patent Period: February 16, 2016 ~ Aug. 31, 2036.
  12. [P12] Hung-Min Sun, Shiuan-Tung Chen, Ming-Sheng Yeh, “Multi-touch methods and devices,” US Patent 9,336,376, Patent Period: May 10, 2016 ~ Nov. 30, 2036.

中華民國專利

  1. [PC1] 孫宏民, 陳孟彰, 林宸堂, “數位影像版權之保護與驗證方法,” 中華民國專利,證書號:199742, 專利年限: 2004/03/21至2019/12/19.
  2. [PC2] 孫宏民, 楊政達, 林宸堂, “以短亂數為基礎之使用者身份驗證方法,” 中華民國專利,證書號:I296175, 專利年限: 2008/04/21至2022/12/03.
  3. [PC3] 陳政愷, 孫宏民, 林港喬, 張仕穎, 陳帥名, “產生及利用一特徵碼以監測一程式之裝置、方法、應用程式及其電腦可讀取媒體,” 中華民國專利,證書號:I335531, 專利年限: 2011/01/01至2026/12/12.
  4. [PC4] 孫宏民, 張仕穎, “輕量及彈性無線感測器訊息認證方法,” 中華民國專利,證書號: I341095, 專利年限: 2011/04/21至2027/12/11
  5. [PC5] 孫宏民, 徐士卜, 陳建銘 , “無線感測網路上移動式阻斷服務攻擊方法及其防禦方法,” 中華民國專利,證書號: I346491, 專利年限: 2011/08/01至 2027/11/19.
  6. [PC6] 蔡其達, 沈誼中, 邱簡謙, 孫宏民, 陳帥名, 林岳勳, 蕭英助, “無線網路之預先安全認證與金鑰交換系統與方法,” 中華民國專利,證書號: I351207, 專利年限: 2011/10/21至 2027/10/28.
  7. [PC7] 呂沐錡, 孫宏民, “基於橢圓曲線密碼學之認證方法,” 中華民國專利,證書號: I357251, 專利年限: 2012/01/21至2028/02/14.
  8. [PC8] 邱錫彥, 孫宏民, 張仕穎, 林岳勳, “交遞驗證方法與系統” 中華民國專利,證書號: I351207, 專利年限: 2013/03/21至2028/12/14.
  9. [PC9] 邱錫彥, 張仕穎, 玫柔 佳婷, 培瑞 安卓, 孫宏民, “網路評價系統及其控制方法” 中華民國專利,證書號: I396428, 專利年限: 2013/05/11至2029/07/07.
  10. [PC10] 孫宏民, 林岳勳, 張仕穎, “行動隨意網路下安全資料聚合之方法” 中華民國專利,證書號: I396424, 專利年限: 2013/05/11至2028/07/22.
  11. [PC11] 蔡其達, 邱簡謙, 林益宏, 孫宏民, 陳帥名, 陳耀鑫, 鍾恒正, “無線網路架構之行動台、存取台、閘道裝置、基地台及其握手方法” 中華民國專利,證書號: I410105, 專利年限: 2013/09/21至2028/11/30.
  12. [PC12] 孫宏民, 郭嫚婷, 陳耀鑫, 張仕穎, “驗證方法與系統” 中華民國專利,證書號: I430217, 專利年限: 2014/03/11至2031/08/07.
  13. [PC13] 孫宏民, 葉鈞豪, 陳耀鑫, “應用圖形稽碼機制之認證方法與系統” 中華民國專利,證書號: I460606, 專利年限: 2014/11/11至2031/07/14.
  14. [PC14] 孫宏民, 李啟銘, “電子裝置之認證方法及密碼設定方法及認證系統” 中華民國專利,證書號: I476626, 專利年限: 2015/03/11 至2032/08/23.
  15. [PC15] 陳宣同, 焦信達, 孫宏民, 何家興, “猛禽碼之編碼加速裝置與方法”, 中華民國專利,證書號: I485992, 專利年限: 2015/05/21 至2032/08/30.
  16. [PC16] 孫宏民, 陳宣同, 葉明昇, “多點觸碰方法與裝置”, 中華民國專利,證書號: I501101, 專利年限: 2015/09/21 至2033/04/18.
  17. [PC17] 孫宏民, 李佑聰, “網路認證系統及其方法”, 中華民國專利,證書號: I514189, 專利年限: 2015/09/21 至2033/04/18.
  18. [PC18] 孫宏民, 陳宣同, 葉明昇, “多點觸碰方法與裝置”, 中華民國專利,證書號: I501101, 專利年限: 2015/09/21 至2033/04/18.
  19. [PC19] 陳宣同, 焦信達, 張仕穎, 孫宏民, “通訊系統、其方法與其接收端,” 中華民國專利,證書號: I519143, 專利年限: 2016/01/21 至2019/01/20.
  20. [PC20] 孫宏民, 鍾乙瑄, 廖哲輝, “具有時戳驗證的免憑證公開金鑰管理方法”, 中華民國專利,證書號: I593267, 專利年限: 2017/07/21 至2035/12/16 .
advisor/main.txt · 上一次變更: 2019/01/25 01:16 由 iswikiadmin
CC Attribution-Noncommercial-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0