Professor Hung-Min Sun (孫宏民), Ph.D.

  • Professor of Department of Computer Science
  • Vice Director of University Library
  • National Tsing Hua University, Taiwan
  • Office: Delta Building 624(台達624)
  • Phone: +886-3-5742968
  • Fax:+886-3-5723694
  • E-mail:hmsun at cs.nthu.edu.tw

Education

  • Ph.D., Department of Computer Science and Information Engineering, National Chiao Tung University, Sept. 1990 - January. 1995
  • M.S., Institute of Applied Mathematics, National Cheng Kung University, Sept. 1988 - June. 1990
  • B.S., Department of Applied Mathematics, National Chung Hsing University, Oct. 1984 - June. 1988

Professional Experiences

  • Professor, Aug. 2008 ~ present
  • Vice Director of University Library, Sept. 2012 ~ present
  • Director of Division of Intellectual Property and Technology Licensing, Operations Center for Industry Collaboration, Apr. 2011 ~ Aug. 2012
  • Associate Professor, Aug. 2002 - Jun. 2008
    • Department of Computer Science National Tsing Hua University
  • Associate Professor, Aug. 2000 - Jun. 2002
  • Assistant Professor, Aug. 1999 - Jun. 2000
    • Department of Computer Science and Information Engineering, National Cheng Kung University
  • Associate Professor, Aug. 1995 - Jun. 1999
    • Department of Information Management Chaoyang University of Technology
  • Associate Professor, Feb. 1995 - Jun. 1995
    • Department of Computer Science and Information Engineering, Chung Hua University
  • Visiting Professor, Computer Science Department, Jul. 2006 - Jan. 2007
    • The University of Auckland

Research Interests

  • Cryptography: Encryption/Decryption, Digital Signatures, Secure Network Protocols
  • Smart Phones (3G, 4G): Security and Privacy Issues in Smart Phones, Developing Applications on Android and iPhone
  • Cloud Computing: Security and Privacy Issues in Cloud Systems
  • Internet of Things (IoT): Applications, Security and Privacy Issues
  • Network Security: Intrusion Detection/Prevention System (IDS/IPS), System Security (O.S. Security), Shellcode, Buffer Overflow, Attacks, Secure Network Protocols
  • Wireless Network: WiMAX, Wireless LAN, Ad hoc Network, WiFi, Cellular, GSM, GPRS, Bluetooth , 802.11, 802.16, 802.21
  • Sensor Network: Key Distribution, Secure Data Aggregation, Secure Rounting Protocols
  • RFID: Applications, Security and Privacy Issues
  • Smart Grid: Security and Privacy Issues
  • Multimedia Security: E-book Security, Broadcast DTV, Digital Right Management, Watermarking, Data Hiding, Steganography
  • E-book
  • E-learning
  • Reverse Engineering (Disassembly)
  • Hacking Techniques and Countermeasures
  • Big Data Analysis
  • Digital Forensic
  • E-book
  • E-learning

Publication

Selected Journal Papers

  1. [J1] Hung-Min Sun and T. Hwang, “On Double-One Matrices and Double-Zero Matrices,” Linear and Multilinear Algebra, Vol.31, pp. 47-55, 1992, London, Gordon and Breach Science Publishers. (SCI)
  2. [J2] Hung-Min Sun and T. Hwang, “Key Generation of Algebraic-Code Cryptosystems,” Computers and Mathematics with Applications, Vol. 27, No. 2, 1994, pp. 99-106. (SCI)
  3. [J3] Hung-Min Sun and S. P. Shieh, “On Dynamic Threshold Schemes,” Information Processing Letters, Vol. 52, No. 4, 1994, pp. 201-206. (SCI)
  4. [J4] Hung-Min Sun and S. P. Shieh, “Construction of Dynamic Threshold Schemes,” IEE Electronics Letters, Vol. 30, No. 24, 1994, pp. 2023-2025. (SCI)
  5. [J5] Hung-Min Sun and S. P. Shieh, “An Efficient Construction of Perfect Secret Sharing Schemes for Graph-Based Structures,” Computers and Mathematics with Applications, Vol. 31, No. 7, 1996, pp. 129-135. (SCI)
  6. [J6] S. P. Shieh, W. H. Yang, and Hung-Min Sun, “An Authentication Protocol without Third Party,” IEEE Communications Letters, Vol. 1, No. 3, 1997, pp. 87-89. (SCI)
  7. [J7] Hung-Min Sun, 1997 (November), “Private-Key Cryptosystem Based on Burst-Error-Correcting Codes,” IEE Electronics Letters, Vol. 33, No. 24, pp. 2035-2036, London, IEE Press. (SCI)
  8. [J8] Hung-Min Sun and S. P. Shieh, 1997 (December), “Optimal Information Dispersal for Increasing Reliability of a Distributed Service,” IEEE Transactions on Reliability, Vol. 46, No. 4, pp. 462-472, New York, IEEE Press. (SCI, Impact Factor: 1.288, Ranking: COMPUTER SCIENCE, SOFTWARE ENGINEERING: top 32/99=32.3%)
  9. [J9] Hung-Min Sun and S. P. Shieh, 1998 (March), “Secure Broadcasting in Large Networks,” Computer Communications,” Vol. 21, No. 3, pp. 279-283, New York, IPC Science and Technology Press. (SCI)
  10. [J10] Hung-Min Sun and S. P. Shieh, 1998 (October), “Secret Sharing Schemes for Graph-Based Prohibited Structures,” Computers and Mathematics with Applications, Vol. 36, No. 7, pp. 131-140, New York, Pergamon Press. (SCI)
  11. [J11] Hung-Min Sun, S. P. Shieh, and H. M. Sun, 1999 (January), “A Note on Breaking and Repairing a Secure Broadcasting in Large Networks,” Computer Communications, Vol. 22. No. 2, pp. 193-194, New York, IPC Science and Technology Press. (SCI)
  12. [J12] Hung-Min Sun and S. P. Shieh, 1999 (February), “Recursive Constructions for Secret Sharing Schemes,” Computers and Mathematics with Applications, Vol. 37, No. 3, pp. 87-96, New York, Pergamon Press. (SCI)
  13. [J13] Hung-Min Sun, 1999 (May), “On-line Multiple Secret Sharing based on a One-way Function,” Computer Communications, Vol. 22, No. 8, pp. 745-748, New York, IPC Science and Technology Press. (SCI)
  14. [J14] Hung-Min Sun, 1999 (May), “An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers,” Computer Communications, Vol. 22, No. 8, pp. 717-722, New York, IPC Science and Technology Press. (SCI)
  15. [J15] Hung-Min Sun, 1999 (July), “New Construction of Perfect Secret Sharing Schemes for Graph-based Prohibited Structures,” Computers & Electrical Engineering, Vol. 25, No. 4, pp. 267-278, New York, Pergamon Press. (SCI)
  16. [J16] Hung-Min Sun, 1999 (August), “Comments on Improved Group Signature Scheme based on Discrete Logarithm Problem,” IEE Electronics Letters, Vol. 35, No. 16, pp. 1323-1324, London, IEE Press. (SCI)
  17. [J17] Hung-Min Sun and S. P. Shieh, 1999 (September), “Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures,” Journal of Information Science & Engineering, Vol. 15, No. 5, pp. 679-690, Taipei, Institute of Information Science Academia Sinica Press. (SCI)
  18. [J18] Hung-Min Sun, N. Y. Lee, and T. Hwang, 1999 (September), “Threshold Proxy Signatures,” IEE Proceedings - Computers and Digital Techniques, Vol. 146, No. 5, pp. 259-263, London, IEE Press. (SCI)
  19. [J19] Hung-Min Sun, B. J. Chen, and T. Hwang, 1999 (October), “Cryptanalysis of Group Signature Scheme Using Self-Certified Public Keys,” IEE Electronics Letters, Vol. 35, No. 22, pp. 1938-1939, London, IEE Press. (SCI)
  20. [J20] Hung-Min Sun, 1999 (November), “On Private-key Encryption Using Product Codes,” Computers & Electrical Engineering, Vol. 25, No. 6, pp. 439-450, New York, Pergamon Press. (SCI)
  21. [J21] Hung-Min Sun, 1999 (November), “Security of a Broadcasting Cryptosystem in Computer Networks,” IEE Electronics Letters, Vol. 35, No. 24, pp. 2108-2109, London, IEE Press. (SCI)
  22. [J22] Hung-Min Sun, 2000 (January), “Further Cryptanalysis of the McEliece Public-Key Cryptosystem,” IEEE Communications Letters, Vol. 4, No. 1, pp. 18-19, New York, IEEE Press. (SCI)
  23. [J23] Hung-Min Sun, 2000 (June), “On the Dealer’s Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank,” International Journal of Foundations of Computer Science, Vol. 11, No. 2, pp. 263-281, Singapore, World Scientific Press. (SCI)
  24. [J24] S. P. Shieh, C. T. Lin, W. B. Yang, and Hung-Min Sun, 2000 (July), “Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems,” IEEE Trans. on Vehicular Technology, Vol. 49, No. 4, pp. 1464-1473, New York, IEEE Press. (SCI, Impact Factor: 1.485, Ranking: TELECOMMUNICATIONS: top 17/78=21.8%)
  25. [J25] C. L. Lin, Hung-Min Sun , and T. Hwang, 2000 (October), “Three-Party Encrypted Key Exchange: Attacks and a Solution,” ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20
  26. [J26] Hung-Min Sun, 2000 (November), “An Efficient Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 958-961
  27. [J27] Hung-Min Sun, “Enhancing the Security of the McEliece Public-Key Cryptosystem,” Journal of Information Science & Engineering, Vol. 16, No. 6, pp. 799-812, 2000 (November)
  28. [J28] Hung-Min Sun, 2000 (November), “Design of Time-Stamped Proxy Signatures with Traceable Receivers,” IEE Proceedings - Computers and Digital Techniques, Vol 147, No. 6, pp. 462-466, London, IEE Press. (SCI)
  29. [J29] C. L. Lin, Hung-Min Sun, and T. Hwang, “Efficient and Practical DHEKE Protocols ,” ACM Operating Systems Review, Vol. 35, No. 1, pp. 41-47, 2001 (January), New York, ACM Press
  30. [J30] Hung-Min Sun, 2001 (February) “Cryptanalysis of a Public-Key Cryptosystem Based on Generalised Inverses of Matrices,” IEEE Communications Letters, Vol. 5, No. 2, pp. 61-63, New York, IEEE Press. (SCI)
  31. [J31] C. L. Lin, Hung-Min Sun, and T. Hwang, 2001, “Attacks and Solutions on Strong-Password Authentication,” IEICE Transactions on Communications, Vol.E84-B, No.9, pp.2622-2627, Tokyo, IEICE Press. (SCI)
  32. [J32] H. T. Yeh, Hung-Min Sun, and T. Hwang, 2001 (November), “Security Analysis of the Generalized Key Agreement and Password Authentication Protocol,” IEEE Communications Letters, Vol. 5, No. 11, pp. 462-463, New York, IEEE Press. (SCI)
  33. [J33] C. L. Lin, Hung-Min Sun, M. Steiner, and T. Hwang, 2001 (December), “Three-party Encrypted Key Exchange Without Server Public-Keys,” IEEE Communications Letters, Vol 5., No. 12, pp. 497-499, New York, IEEE Press. (SCI)
  34. [J34] Hung-Min Sun, “Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes,” Informatica, Vol. 13, No. 1, pp. 105-110, 2002 (January)
  35. [J35] B. T. Hsieh, Hung-Min Sun, and T. Hwang, 2002 (January), “Cryptanalysis of an Enhancement for the Simple Authentication Key Agreement Algorithm,” IEE Electronics Letters, Vol. 38, No. 1, pp. 20-21, London, IEE Press. (SCI)
  36. [J36] Hung-Min Sun, 2002 (January), “On the Security of a Variation of Cramer-Shoup’s Public Key Scheme,” Journal of Information Science & Engineering, Vol. 18, No 1, pp. 19-22
  37. [J37] Hung-Min Sun, W. C. Yang, and C. S. Laih, 2002 (January), “On the Design of RSA with Short Secret Exponent,” Journal of Information Science & Engineering, Vol. 18, No. 1, pp. 1-18, Taipei, Institute of Information Science Academia Sinica Press. (SCI) (The Annual JISE Best Paper Award in 2003, the only one out of 64 papers)
  38. [J38] Hung-Min Sun and B. L. Chen, 2002 (March), “Weighted Decomposition Construction for Perfect Secret Sharing Schemes,” Computers and Mathematics with Applications, Vol. 43, Iss. 6-7, pp. 877-887, New York, Pergamon Press. (SCI)
  39. [J39] H. T. Yeh and Hung-Min Sun, 2002 (October), “Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attacks,” ACM Operating Systems Review, Vol. 36, No. 4, pp. 14-22
  40. [J40] Hung-Min Sun, H. T. Yeh, and T. Hwang, 2003, “On the Linkability of Some Group Signature Schemes,” Informatica, Vol. 14, Issue 1, pp. 85-94
  41. [J41] B. T. Hsieh, Hung-Min Sun, and T. Hwang, “On the Security of Some Password Authentication Protocols,” Informatica, Vol. 14, No. 2, pp. 195-204, 2003
  42. [J42] X. Yi, C. K. Siew, Hung-Min Sun, H. T. Yeh, C. L. Lin, and T. Hwang, 2003 (March), “Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications,” IEEE Trans. on Vehicular Technology, Vol. 52, No. 2, pp. 465-468. (SCI, Impact Factor: 1.485, Ranking: TELECOMMUNICATIONS: top 17/78=21.8%)
  43. [J43] Hung-Min Sun and H. T. Yeh, 2003 (April), “Further Cryptanalysis of a Password Authentication Scheme with Smart Cards,” IEICE Transactions on Communications, Vol.E86-B, No 4, pp. 1412-1415, Tokyo, IEICE Press. (SCI)
  44. [J44] H. T. Yeh, Hung-Min Sun, and T. Hwang, 2003 (July-August), “Improved Authenticated Multiple-Key Agreement Protocol,” Computers and Mathematics with Applications, Vol. 46, Issue 2-3, pp. 207-211, New York, Pergamon Press. (SCI)
  45. [J45] H. T. Yeh, Hung-Min Sun and T. Hwang, 2003 (November), “Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks,” Journal of Information Science & Engineering, Vol.19 No.6, pp.1059-1070, Taipei, Institute of Information Science Academia Sinica Press. (SCI)
  46. [J46] H. T. Yeh, Hung-Min Sun, C. T. Yang, B. C. Chen, and S. M. Tseng, 2003 (November) , “Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks,” IEICE Transactions on Communications, Vol. E86-B, No. 11, pp. 3278-3282, Tokyo, IEICE Press. (SCI)
  47. [J47] H. T. Yeh, Hung-Min Sun, and B. T. Hsieh, 2004 (January), “Security of a Remote User Authentication Scheme Using Smart Cards,” IEICE Transactions on Communications, Vol.E87-B No.1 pp.192-194, Tokyo, IEICE Press. (SCI)
  48. [J48] Hung-Min Sun, B. C. Chen, and H. T. Yeh, 2004 (May), “On the Design of Time-Stamped Signatures,” Journal of Computer and System Sciences (JCSS), Vol. 68, No. 3, pp. 598-610. (SCI, Rank A by HKUST CSE, Impact Factor: 1.631, Ranking: COMPUTER SCIENCE, THEORY & METHODS: top 22/97=22.7%)
  49. [J49] H. T. Yeh and Hung-Min Sun, 2004 (June), “Password-Based User Authentication and Key Distribution Protocols for Client-Server Applications,” Journal of Systems and Software, Vol. 72, No. 1, pp. 97-103. (SCI)
  50. [J50] B. T. Hsieh and Hung-Min Sun, 2004 (October), “An Improvement of a Deniable Authentication Protocol,” IEICE Transactions on Communications, Vol.E87-B No.10 pp.3099-3101, Tokyo, IEICE Press. (SCI)
  51. [J51] C. L. Lin, H.A. Wen, T. Hwang and Hung-Min Sun, 2004 (November), “Provably Secure Three-Party Password-Authenticated Key Exchange,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E87-A, No. 11, pp. 2990-3000, Tokyo, IEICE Press. (SCI)
  52. [J52] Hung-Min Sun, B. T. Hsieh, and S. J. Hwang, 2005 (January), “Secure Email Protocols Providing Perfect Forward Secrecy,” IEEE Communications Letters, Vol. 9, No. 1, pp. 58-60, New York, IEEE Press. (SCI)
  53. [J53] Hung-Min Sun, B.-C. Chen, T. Hwang, 2005, “Secure key agreement protocols for three-party against guessing attacks,” Journal of Systems and Software, Vol. 75, No. 1-2, pp. 63-68. (SCI)
  54. [J54] Hung-Min Sun, B.-T. Hsieh, S.-M. Tseng, 2005, ”On the security of some proxy blind signature schemes,” Journal of Systems and Software, Vol. 74, No. 3, pp. 297-302. (SCI, EI)
  55. [J55] H.T. Yeh and Hung-Min Sun, 2005 (May), “Password authenticated key exchange protocols among diverse network domains,” Computers & Electrical Engineering, Vol. 31, No. 3, pp. 175-189. (SCI)
  56. [J56] Hung-Min Sun and H.T. Yeh, 2006 (September), “Password-based authentication and key distribution protocols with perfect forward secrecy,” Journal of Computer and System Sciences (JCSS), Vol. 70, No. 6, pp. 1002-1011, 2006. (SCI, Rank A by HKUST CSE, Impact Factor: 1.631, Ranking: COMPUTER SCIENCE, THEORY & METHODS: top 22/97=22.7%)
  57. [J57] Hung-Min Sun, M.-E. Wu, W.-C. Ting, and M. Jason Hinek, 2007 (August), “Dual RSA and Its Security Analysis,” IEEE Transactions on Information Theory, vol. 53, no. 8, pp. 2922-2933, 2007. (SCI, Rank A by HKUST CSE, Impact Factor: 2.725, Ranking: ENGINEERING, ELECTRICAL & ELECTRONIC: top 13/247= 5.3%)
  58. [J58] Y. Chen, J.-S. Chou, and Hung-Min Sun, “A novel mutual authentication scheme based on quadratic residues for RFID systems,” Computer Networks Vol. 52, No. 12, pp. 2373-2380, 2008. (SCI, Impact Factor: 1.176, Ranking: TELECOMMUNICATIONS: top 22/78=28.2%)
  59. [J59] H,.-M. Sun, C.-M. Chen, and C.-Z. Shieh, 2008, “Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems,” IEEE Transactions on Multimedia, 2008, Vol. 10, No 6, pp. 1109-1120, 2008. (SCI, Rank A by HKUST CSE, Impact Factor: 1.684, Ranking: TELECOMMUNICATIONS: top 13/78=16.7%)
  60. [J60] C.-H. Yang, C.-Y. Weng, S.-J. Wang, and Hung-Min Sun, 2008, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp. 488-497, 2008. (SCI, Impact Factor: 1.725, Ranking: COMPUTER SCIENCE, THEORY & METHODS: top 21/97= 21.6%)
  61. [J61] Hung-Min Sun, C.-T. Yang, and M.-E. Wu, 2009 (March) “Short-Exponent RSA,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.3, pp. 912-918, 2009. (SCI, Impact Factor: 0.281)
  62. [J62] Hung-Min Sun and W.-C. Ting, 2009, “A Gen2-based RFID Authentication Protocol for Security and Privacy,” IEEE Trans. on Mobile Computing, Vol. 8, No. 8, pp. 1052-1062, 2009. (SCI, Rank A by HKUST CSE, Impact Factor: 2.376, Ranking: TELECOMMUNICATIONS: top 4/78 = 5.1%)
  63. [J63] Hung-Min Sun, M.-E. Wu, and C.-T. Yang, “A Note on Factoring α-LSBS Moduli,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 8, pp. 2137-2138, 2009. (SCI, Impact Factor: 0.281)
  64. [J64] Hung-Min Sun and M.-C. Leu, “An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 11, No. 5, pp. 947-959, 2009. (SCI, Rank A by HKUST CSE, Impact Factor: 1.684, Ranking: TELECOMMUNICATIONS: top 13/78=16.7%)
  65. [J65] Hung-Min Sun, M.-E. Wu, and C.-T. Yang, “Simple Backdoors on RSA Modulus by Using RSA Vulnerability,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 9, pp. 2326-2332, 2009. (SCI, Impact Factor: 0.281)
  66. [J66] Hung-Min Sun, K.-H. Wang, and C.-M. Chen, 2009 (April-June) “On the Security of an Efficient Time-Bound Hierarchical Key Management,” IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2, pp. 159-160, 2009. (SCI, Impact Factor: 1.409, Ranking: COMPUTER SCIENCE, SOFTWARE ENGINEERING : top 26/93 = 26.2%).
  67. [J67] Hung-Min Sun, M.-E. Wu, M. J. Hinek, C.-T. Yang, and V. S. Tseng, “Trading Decryption for Speeding Encryption in Rebalanced-RSA,” Journal of Systems and Software, Vol. 82, No. 9, pp. 1503-1512, 2009. (SCI, Impact Factor: 1.277)
  68. [J68] Hung-Min Sun, K.-H. Wang, and W.-C. Ting, “On the Security of Secure Arithmetic Code,” IEEE Transactions on Information Forensics and Security,Vol. 4, No. 4, pp. 781-789, 2009. (SCI, Impact Factor: 1.725, Ranking: COMPUTER SCIENCE, THEORY & METHODS: top 21/97= 21.6%)
  69. [J69] Hung-Min Sun and M.-C. Leu, “Low-Exponent Encryption for Video Protection Using Context-Key Control Hung-Min Sun,” Journal of Information Assurance and Security, Vol. 5, Iss. 1, pp. 595-602, 2010.
  70. [J70] C.-H. Yang, C.-Y. Weng, S.-J. Wang, Hung-Min Sun, “Grouping Strategies for Promoting Image Quality of Watermarking on the Basis of Vector Quantization,” Journal of Visual Communication and Image Representation, Vol. 21, No. 1, pp. 49-55, 2010.
  71. [J71] C.-H. Yang, C.-Y. Weng, S.-J. Wang, Hung-Min Sun, “Varied PVD+ LSB Evading Detection Programs to Spatial Domain in Data Embedding Systems,” Journal of Systems and Software, Vol. 83, No. 10, pp 1635-1643, 2010 (SCI, Impact Factor: 1.277)
  72. [J72] Hung-Min Sun, H. Wang, B.-H. Ku, and J. Pieprzyk, “Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time,” SIAM Journal on Discrete Mathematics, Vol. 24, No. 2, pp. 617-638, 2010. (SCI, Rank A by HKUST CSE, Impact Factor: 0.626, Ranking: MATHEMATICS, APPLIED: 151/236)
  73. [J73] Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, Hung-Min Sun, and B.-Y. Yang, “SPATE: Smallgroup PKI-less Authenticated Trust Establishment,” IEEE Transactions on Mobile Computing, Vol. 9, No. 12, pp. 1666-1681, 2010. (SCI, Rank A by HKUST CSE, Impact Factor: 2.376, Ranking: TELECOMMUNICATIONS: top 4/78 = 5.1%)
  74. [J74] Hung-Min Sun, W.-C. Ting, and K.-H. Wang, “On the Security of Chien's Ultra-lightweight RFID Authentication Protocol,” IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 2, pp. 315-317, 2011. (SCI, Impact Factor: 1.409, Ranking: COMPUTER SCIENCE, SOFTWARE ENGINEERING : top 26/93 = 26.2%)
  75. [J75] Hung-Min Sun, H. Wang, K.-H. Wang, and C.-M. Chen, “A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code”, Vol. 60. No. 6, pp. 813-823. (SCI, Rank A by HKUST CSE, Impact Factor: 1.604, Ranking: COMPUTER SCIENCE, HARDWARE & ARCHITECTURE: top 12/48= 25%)
  76. [J76] Hung-Min Sun and B.-H. Ku, “Lossless Index Coding for Image Vector Quantization Using Huffman Codes,” International Journal of Innovative Computing Information and Control, accepted, to appear in Vol.7, No.10, October 2011. (SCI, Impact Factor: 1.664, Ranking: AUTOMATION & CONTROL SYSTEMS: top 12/60= 20%)
  77. [J77] Hung-Min Sun, B.-Z. He, S.-Y. Chang, and C.-H. Cho, “Efficient Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS,” International Journal of Innovative Computing Information and Control, accepted in 2011. (SCI, Impact Factor: 1.664, Ranking: AUTOMATION & CONTROL SYSTEMS: top 12/60= 20%)
  78. [J78] S.-Y. Chang, Y.-H. Lin, Hung-Min Sun, and M.-E. Wu, “Practical RSA Signature Scheme Based on Periodical Re-keying for Wireless Sensor Networks”, accepted by ACM Transactions on Sensor Networks,accepted in 2010. (SCI, Rank A by HKUST CSE, Impact Factor: 2.282, Ranking: TELECOMMUNICATIONS: top 6/78 = 7.7%)
  79. [J79] Hung-Min Sun, C.-Y. Weng, S.-J. Wang*, C.-H. Yang, “Data Embedding in Image-media using Weight-function on Modulo Operations,” ACM Transactions on Embedded Computing Systems, accepted in 2011. (SCI, Rank A by HKUST CSE, Impact Factor: 1.053, Ranking: COMPUTER SCIENCE, SOFTWARE ENGINEERING: top 49/99)
  80. [J80] Hung-Min Sun, C.-Y. Weng, C.-F. Lee, and C.-H. Yang, “Anti-forensics with Steganographic Data Embedding in Digital Images,” IEEE Journal on Selected Areas in Communications, accepted in 2011. (SCI, Rank A by HKUST CSE, Impact Factor: 4.232, Ranking: TELECOMMUNICATIONS: top 1/78= 1.2 %)
  81. [J81] Hung-Min Sun, Y. Chen, J.-S. Chou, Hung-Min Sun, and M.-H. Cho, “A novel electronic cash system with trustee-based anonymity revocation from pairing,” Electronic Commerce Research and Applications, Vol. 10, No. 6, pp. 673-682, 2011. (SCI, SSCI)
  82. [J82] Y. Chen, J.-S. Chou, and Hung-Min Sun, ” A response to a critique of “A novel electronic cash system with trustee-based anonymity revocation from pairing,” by Chen, Chou, Sun and Cho (2011),” Electronic Commerce Research and Applications, Vol. 11, No. 4, pp. 443-444, 2012. (SCI, SSCI)
  83. [J83] Hung-Min Sun, C.-H. Chen, and Y.-F. Ku, “A novel acknowledgment-based approach against collude attacks in MANET,” Expert Systems with Applications, Vol. 39, No.9, pp. 7968-7975, 2012. (SCI)
  84. [J84] Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng, “Enhanced authentication for commercial video services,” Security and Communication Networks, Vol. 5, No. 11, pp. 1248-1259, 2012. (SCI)
  85. [J85] Hung-Min Sun, C.-H. Chen, C.-W. Yeh, and Y.-H. Chen, “A Collaborative Routing Protocol against Routing Disruptions in MANETs,” Personal and Ubiquitous Computing, April, 2012. (SCI)
  86. [J86] C.-M. Chen, Y.-H. Lin, and Y.-C. Lin, and Hung-Min Sun, “RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, accepted in 2011. (SCI, Rank A by HKUST CSE, Impact Factor: 1.571, Ranking: ENGINEERING, ELECTRICAL & ELECTRONIC: top 65/247=26.3%)
  87. [J87] S.-Y. Chang, Y.-H. Lin, Hung-Min Sun, and M.-E. Wu, “Practical RSA Signature Scheme Based on Periodical Re-keying for Wireless Sensor Networks,” ACM Transactions on Sensor Networks, Vol. 8, No 2, Article 13, 2012. (SCI)
  88. [J88] C.-M. Chen, Y.-H. Chen, Y.-H. Lin, Hung-Min Sun, “Eliminating Rouge Femtocells based on Distance Bounding Protocol and Geographic Information,” Expert Systems with Applications, accepted, 2013. (SCI)
  89. [J89] S.-M. Chen, M.-E. Wu, Hung-Min Sun, K.-H. Wang, “CRFID: An RFID system with a cloud database as a back-end server,” Future Generation Computer Systems, accepted, 2013. (SCI)
  90. [J90] M.-E. Wu, R. Tso, Hung-Min Sun, “On the improvement of Fermat factorization using a continued,” Future Generation Computer Systems, accepted, 2013. (SCI)
  91. [J91] P. Chao and Hung-Min Sun, “Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study,” Information Sciences, Vol. 245, pp.255-275, 2013. (SCI, Ranking: top 4.5%)
  92. [J92] Hung-Min Sun, C.-Y. Weng, S.-J. Wang, C.-H. Yang, “Data Embedding in Image-media using Weight-function on Modulo Operations,” ACM Transactions on Embedded Computing Systems, Vol. 12, No. 2, Article 21, 2013. (SCI)
  93. [J93] Yue-Hsun Lin, Shih-Ying Chang, and Hung-Min Sun, “CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks,” IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 7, pp. 1471-1483, 2013. (SCI)
  94. [J94] C.-M. Chen, K.-H. Wang, T.-Y. Wu, J.-S. Pan, Hung-Min Sun, “A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices,” IEEE Transactions on Information Forensics and Security, Vol. 8, No. 8, pp. 1318-1330, 2013. (SCI)

Selected Conference Papers

  1. [C1] Hung-Min Sun and T. Hwang, “On the Generation of Large Nonsingular Matrix Pairs and Permutation Matrices for Algebraic-Code Cryptosystems,” Proceedings of National Computer Symposium 1989, pp. 796-801.
  2. [C2] Hung-Min Sun and T. Hwang, “Public-Key ID-Based Cryptosystem,” Proceedings of 1991 IEEE International Carnahan Conference on Security Technology, October 1-3, 1991, pp 142-144.
  3. [C3] Hung-Min Sun and T. Hwang, “An Efficient Probabilistic Public-Key block Encryption and Signature Scheme Based on ElGamal's Scheme,” Proceedings of 1991 IEEE International Carnahan Conference on Security Technology, October 1-3, 1991, pp 45-148.
  4. [C4] Hung-Min Sun and T. Hwang, “Group-Oriented Threshold Schemes,” Proceedings of the International Conference on Information Engineering, 2-5, December 1991, pp. 485-493.
  5. [C5] T. Hwang and Hung-Min Sun, “Key Management of the Threshold Schemes,” Proceedings of International Symposium on Communications, December 9-13, 1991, pp. 602-605.
  6. [C6] S. P. Shieh, C. C. Wang and Hung-Min Sun, “Intrusion Detection in Computer Networks,” Proceedings of the Third Conference on Information Security, A.2_4.1-A.2_4.11, 1993.
  7. [C7] Hung-Min Sun and S. P. Shieh, “A Secret Sharing Scheme for Hierarchical User Groups,” Proceedings of the 8th International Joint Workshop on Computer Communication, G3.1.1-G3.1.4, December 12-14, 1993.
  8. [C8] Hung-Min Sun and S. P. Shieh, “Optimal Information Dispersal for Reliable Communication in Computer Networks,” in Proceedings of the 1994 International Conference on Parallel and Distributed Systems (ICPADS'94), pp. 460-464, December 19-21, 1994. (NSC-83-0404-E-009-106)
  9. [C9] Hung-Min Sun and S. P. Shieh, “On Constructing Secret Sharing Schemes,” Proceedings of the 1994 IEEE International Conference on Computer Communications, Networking for Global Communications (INFOCOM'94), Toronto, pp. 1288-1292, 1994. (NSC-82-0408-E-009-290)
  10. [C10] Hung-Min Sun and S. P. Shieh, “Security Analysis of Dynamic Threshold Schemes,” Proceedings of the Fourth National Conference on Information Security, pp. 143-149, 1994.
  11. [C11] Hung-Min Sun and S. P. Shieh, “A Perfect Scheme for Secret Sharing between Two Parties,” Proceedings of the Fifth National Conference on Information Security, pp. 136-141, 1995.
  12. [C12] Hung-Min Sun and S. P. Shieh, “Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes,” Third ACM Conference on Computer and Communications Security (ACM CCS'96), New Delhi, India, pp. 153-156, March 14-16, 1996.
  13. [C13] Hung-Min Sun and S. P. Shieh, ” Secret Sharing in Graph-Based Prohibited Structures,” IEEE INFOCOM'97, Kobe, Japan, April 9-13, 1997.
  14. [C14] Hung-Min Sun and G. Horng, “On the Security of Single Assignment Secret Sharing Schemes,” Proceedings of 1997 Information Security Conference, pp. 43-47, May, 1997.
  15. [C15] Hung-Min Sun and S. P. Shieh, “On the Information Rate of Perfect Secret Sharing Schemes with Access Structures of Rank Three,” Proceedings of 1997 Information Security Conference, pp. 48-54, May, 1997.
  16. [C16] Hung-Min Sun and B. L. Chen, “On the Decomposition Constructions for Perfect Secret Sharing Schemes,” ICICS’97, Lecture Notes in Computer Science, Vol. 1334, Springer-Verlag, Berlin, pp. 50-60, 1997.
  17. [C17] Hung-Min Sun, W.Y. Lin, and C.C. Chan, “The Study of Improving the Login Security,” Proceedings of National Computer Symposium 1997, R.O.C., Vol. 2, pp. c159-c164, 1997.
  18. [C18] Hung-Min Sun, S. P. Shieh, and H.M. Sun, “A Secure Broadcasting Cryptosystem in Large Computer Networks,” Proceedings of Eighth National Conference on Information Security, May 15-16, pp. 369-378, 1998.
  19. [C19] Hung-Min Sun, S. P. Shieh, and H.M. Sun, “On-line multiple secret sharing based on a one-way function,” Proceedings of Eighth National Conference on Information Security, May 15-16, pp. 331-336, 1998.
  20. [C20] Hung-Min Sun, “On the Security of Cryptosystems based on Error-Correcting Codes,” Proceedings of Eighth National Conference on Information Security, May 15-16, pp. 39-48, 1998.
  21. [C21] M. Michels, M. Stadler, and Hung-Min Sun, “On the Security of some Variants of the RSA Signature Scheme,” Computer Security – ESORICS’98, J.J. Quisquater, Y. Deswarte, C. Meadows, D. Gollmann (Eds.), Lecture Notes in Computer Science, Vol. 1485, Springer-Verlag, Berlin, pp. 85-96, 1998.
  22. [C22] Hung-Min Sun, “Improving the Security of the McEliece Public-Key Cryptosystem,” ASIACRYPT’98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, Berlin, pp. 200-213, 1998.
  23. [C23] Hung-Min Sun, and B. T. Shieh, “Remarks on Two Nonrepudiable Proxy Signature Schemes,” Ninth National Conference on Information Security, May 14-15, 1999.
  24. [C24] Hung-Min Sun, N. Y. Lee, and T. Hwang, “Nonrepudiable Threshold Proxy Signatures,” Ninth National Conference on Information Security, May 14-15, 1999.
  25. [C25] Hung-Min Sun, and B. R. Ke, “Cryptanalysis of Chen’s Digital Signature Scheme with Message Recovery,” Ninth National Conference on Information Security, May 14-15, 1999.
  26. [C26] Hung-Min Sun, and H. M. Sun, “Cryptanalysis of the Wu-Dawson Public-Key Cryptosystem Based on Generalised Inverses of Matrices,” Ninth National Conference on Information Security, May 14-15, 1999.
  27. [C27] Hung-Min Sun, and B. J. Chen, “Unforgeable Time-Stamped Proxy Signatures with Traceable Receivers,” Ninth National Conference on Information Security, May 14-15, 1999.
  28. [C28] C. C. Chang, C. H. Wang, F. Y. Liou, and Hung-Min Sun, “Remarks on a Digital Signature Scheme Based on Error-Correcting Codes,” Ninth National Conference on Information Security, May 14-15, 1999.
  29. [C29] Hung-Min Sun, W. C. Yang, and C. S. Laih, “On the design of RSA with short secret exponent,” ASIACRYPT’99, Lecture Notes in Computer Science, Vol. 1716, Springer-Verlag, Berlin, pp. 150-164, 1999.
  30. [C30] Hung-Min Sun, and B. T. Shieh, “Improved Authenticated Key Agreement Scheme via Password Authentication,” National Computer Symposium 1999.
  31. [C31] Hung-Min Sun, “Convertible Proxy Signature Scheme,” National Computer Symposium 1999.
  32. [C32] Hung-Min Sun, B. T. Hsieh, and S. J. Hwang, “Secure Email Protocols Providing Perfect Forward Secrecy,” Information Security Conference 2000, May 5-6, 2000.
  33. [C33] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Efficient Three-Party Key Agreement Protocols Resistant to Password Guessing Attacks,” Information Security Conference 2000, May 5-6, 2000.
  34. [C34] H. A. Wen, Hung-Min Sun, and T. Hwang, “Optimal Key Exchange and Authentication Protocol Secure Against Dictionary and Replay Attacks,” Information Security Conference 2000, May 5-6, 2000.
  35. [C35] Hung-Min Sun, and G. Horng, “Improved Identification Scheme Based on Shamir’s Unbalanced RSA,” Information Security Conference 2000, May 5-6, 2000.
  36. [C36] B. C. Chen, Hung-Min Sun, and T. Hwang, “Four-Party Encryption Key Exchange,” 2000 International Computer Symposium (ICS2000), Dec. 6-8, 2000.
  37. [C37] Hung-Min Sun, “On Proxy Multi-Signature Schemes,” 2000 International Computer Symposium (ICS2000), Dec. 6-8, 2000.
  38. [C38] B. C. Chen, Hung-Min Sun, and T. Hwang, “An Improved Group Signature Scheme Using Proxy Provers,” Information Security Conference 2001, May 4-5, 2001.
  39. [C39] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Improvement of Efficient Three-Party Key Agreement Protocols Resistant to Password Guessing Attacks,” Information Security Conference 2001, May 4-5, 2001.
  40. [C40] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Improved Authenticated Multiple-Key Agreement Protocol,” Information Security Conference 2001, May 4-5, 2001.
  41. [C41] Hung-Min Sun, “Cryptanalysis of Password Authentication Schemes with Smart Cards,” Information Security Conference 2001, May 4-5, 2001.
  42. [C42] Hung-Min Sun, “Cryptanalysis of a Digital Signature Scheme based on Factoring and Discrete Logarithms,” National Computer Symposium, Dec. 20-21, 2001.
  43. [C43] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Cryptanalysis of Authenticated Key Agreement Protocols,” National Computer Symposium, Dec. 20-21, 2001.
  44. [C44] Hung-Min Sun, B. T. Hsieh, and C. T. Lin, “Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme,” Information Security Conference 2002, pp. 151-154, 2002.
  45. [C45] B. T. Hsieh, Hung-Min Sun, T. Hwang, and C. T. Lin, “An Improvement of Saeednia’s Identity-based Key Exchange Protocol,” Information Security Conference 2002, pp. 41-43, 2002.
  46. [C46] Hung-Min Sun, B. T. Hsieh, T. Hwang, and C. T. Lin, “Analysis of A Blind Signature Scheme Based on ElGamal Signature,” Proceedings of 2002 Symposium on Digital Life and Internet Technologies.
  47. [C47] B. T. Hsieh, H. T. Yeh, Hung-Min Sun and C. T. Lin, “Crytanalysis of a fingerprint-based remote user authentication scheme using smart cards”, 2003 IEEE International Carnahan Conference on Security Technology, 2003.
  48. [C48] Hung-Min Sun and B. T. Hsieh, “Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection”, 2003 IEEE International Carnahan Conference on Security Technology, 2003.
  49. [C49] B.C. Chen, Hung-Min Sun, and C. H. Chen, “A Fair and Secure Key Escrow Scheme,” Information Security Conference 2003.
  50. [C50] Hung-Min Sun and C. T. Yang, “On the Security of A Publicly Verifiable Authenticated Encryption”, Information Security Conference 2003.
  51. [C51] H. T. Yeh and Hung-Min Sun, “Password-Based Authentication and Key Distribution Protocols with Perfect Forward Secrecy,” Information Security Conference 2003.
  52. [C52] Hung-Min Sun and B. T. Hsieh, “On the Security of Some Proxy Blind Signature Schemes”, Australasian Information Security Workshop (AISW 2004)
  53. [C53] Hung-Min Sun, B. T. Hsieh, and S.-M. Tseng, “Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol,” IEEE International Conference on e-Technology, e-Commerce, and e-Service, pp. 563-566, 2004.
  54. [C54] Hung-Min Sun, C.-T. Yang, and B.-T. Hsieh, “Cryptanalysis of a Threshold Proxy Signature Scheme,” Information Security Conference 2004, pp. 360-365, 2004.
  55. [C55] Hung-Min Sun and B. T. Hsieh, “Remarks on Designing Proxy Signature Schemes,” Information Security Conference 2004, pp. 353-359, 2004.
  56. [C56] Hung-Min Sun and C.-T. Yang, ”On the Design of RSA with Balanced Short Exponents and Its Application,” PKC 2005, Lecture Notes in Computer Science, Vol. 3386, Springer-Verlag, Berlin, pp. 199-215, 2005.
  57. [C57] Hung-Min Sun and M.-E. Wu, “Design of Rebalanced RSA-CRT for Fast Encryption,” Information Security Conference 2005, June 9-10, 2005. (This paper received the best paper award, the only one out of 58 papers.)
  58. [C58] Hung-Min Sun, Y.-K. Peng, and C.-M. Chen, “A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks,” Information Security Conference 2005, June 9-10, 2005.
  59. [C59] Hung-Min Sun, K.-C. Yang, and K.-H. Wang, “Transferable DRM System for Two New Business Models,” Information Security Conference 2005, June 9-10, 2005.
  60. [C60] Hung-Min Sun, C.-F. Hung, and B.-H. Ku, “An Improved Identity-Based DRM System,” Information Security Conference 2005, June 9-10, 2005.
  61. [C61] Hung-Min Sun, C.-J. Hong, and C.-H. Chen, “A New Approach to Feature-Based Copyright Protection of Images,” 3rd International Conference on Information Technology: Research and Education, (ITRE 2005), June 27-30, 2005, IEEE Press.
  62. [C62] S.-W. Chen, W.-C. Ting, Hung-Min Sun, Y. Hsu, “Modified AES for Wireless Sensor Networks,” 2005 National Computer Symposium, Dec 15-16, 2005. (This paper received the best paper award.)
  63. [C63] Hung-Min Sun, C.-Z. Shieh, and C. M. Chen, “An Efficient and Flexible Key Distribution Scheme for Conditional Access System in Pay-TV Systems,” Information Security Conference 2006, June, 2006. (This paper received the best paper award, the only one out of 71 papers.)
  64. [C64] Hung-Min Sun, Y.-H. Lin, and M.-F. Wu, “API Monitoring System for Defeating Worms and Exploits in MS-Windows System,” ACISP 2006, Lecture Notes in Computer Science, Vol. 4058, Springer-Verlag, Berlin, pp. 159-170, 2006.
  65. [C65] Hung-Min Sun, Y.-H. Chen, and K.-H. Wang, “An Image Data Hiding Scheme being Perfectly Imperceptible to Histogram Attacks,” Image and Vision Computing New Zealand 2006 (IVCNZ 2006), November 27-29, 2006, New Zealand.
  66. [C66] Hung-Min Sun, C.-F. Hung, and C.-M. Chen, “An Improved Digital Rights Management System Based on Smart Cards”, 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007), Feb. 21-23, 2007, Australia.
  67. [C67] Hung-Min Sun, S.-P. Hsu, and C.-M. Chan, “Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks,” The IEEE 21st International Conference on Advanced Information Networking and Applications (IEEE AINA-07), May 21-23, 2007, Canada.
  68. [C68] Hung-Min Sun, M.-E. Wu, and Y.-H. Chen, “Estimating Prime-Factors of RSA Modulus N and Its Application on the Extension of the Wiener Attack,” 5 th International Conference on Applied Cryptography and Network Security (ACNS'07), Lecture Notes in Computer Science 4521, Editors: J. Katz and M. Yung, Springer-Verlag, pp. 116-128, 2007. (acceptance rate: 11.9%)
  69. [C69] Hung-Min Sun, C.-Y. Weng, and S.-J. Wang, “Histogram-based Undetectable Fidelity Image in Steganography as MSB Controller,” in Proceedings of the Second International Conference on Ubiquitous Information Management and Communication, ICUIMC'08, Jan 31-Feb. 2, 2008, Korea, ACM press.
  70. [C70] Hung-Min Sun, Y.-H. Lin, S.-M. Chen, and Y.-C. Shen, “Secure and Fast Handover Scheme based on Pre-authentication Method for 802.16/WiMAX Infrastructure Network,” In Proceeding of TENCON 2007-2007 IEEE Region 10 Conference, pp. 1-4, 2007.
  71. [C71] Hung-Min Sun, Y.-T. Tseng, and Y.-H. Lin, “Detecting the Code Injection by Hooking System Calls in Windows Kernel Mode,” ICS 2007.
  72. [C72] Hung-Min Sun, C.-M. Chen, F.-Y. Chu, “An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks”, in Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), pp. 495-500, 2007.
  73. [C73] Hung-Min Sun, S.-Y. Chang, S.-M. Chen, and C.-C. Chiu, “An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX,” IEEE APSCC 2008, in Proceeding of the 3rd IEEE Asia-Pacific Services Computing Conference, pp. 199-204, 2008.
  74. [C74] Hung-Min Sun, S.-M. Chen, Y.H. Chen, H.J. Chung, and I-H. Lin, “Secure and Efficient Handover Schemes for Heterogeneous Networks,” IEEE APSCC 2008, in Proceeding of the 3rd IEEE Asia-Pacific Services Computing Conference, pp. 205-210, 2008.
  75. [C75] Hung-Min Sun, Y.-H. Lin, Y.-C. Hsiao, and C.-M. Chen, “An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks,”In Proceedings of IEEE International Conference on Embedded Software and Systems (ICESS 2008), pp. 19-26, July 2008. (Acceptance rate: 21%)
  76. [C76] Hung-Min Sun, M.-E. Wu, R. Steinfeld, J. Guo, and H. Wang, “Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits,” In Proceedings of Cryptology and Network Security (CANS 2008), Lecture Notes in Computer Science, 5339, Springer-Verlag, pp. 49-63, 2008.
  77. [C77] Hung-Min Sun, K. W. Wang, “Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack”, in Proceedings of The International Symposium on Electronic Commerce and Security (ISECS 2008), pp. 385-389, IEEE Computer Society Press, 2008.
  78. [C78] Hung-Min Sun, S.-Y. Chang, Y.-H. Lin, and S.-Y. Chiou, “Efficient Authentication Schemes for Handover in Mobile WiMAX,” ISDA 2008, In Proceeding of Eighth International Conference on Intelligent Systems Design and Applications, 2008.
  79. [C79] Hung-Min Sun, M.-E. Wu, H. Wang, and J. Guo, “On the Improvement of the BDF Attack on LSBS-RSA,” In Proceedings of Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Lecture Notes in Computer Science, 5107, Editors: Yi Mu, Willy Susilo and Jennifer Seberry, Springer-Verlag, pp. 84-97, 2008.(Acceptance rate: 29%)
  80. [C80] Hung-Min Sun and K.-H. Wang, “Designing an Arithmetic Code for Multimedia Files Compression and Encryption,” Second International Workshop on Computer Science and Engineering (WCSE 2009), pp. 444-448, 2009, IEEE press.
  81. [C81] Hung-Min Sun, S.Y. Chang, H.T. Chaio, “A Commitment-based scheme for securing Vandermonde codes against pollution attacks,” 2009 International Symposium on Intelligent Signal Processing and Communication Systems, (ISPAC 2009), pp. 591-594, IEEE press.
  82. [C82] Hung-Min Sun, C.-T. Yang, M.-E. Wu, and V. S. Tseng, “A Multisignature-like Scheme Based on RSA with CRT-Exponents,” Cryptology and Information Security Conference 2009 (CISC2009), (This paper received the best paper award, the only one out of 62 papers.)
  83. [C83] Hung-Min Sun, K.-C. Lin, and Y.-H. Lin, “A Novel Monitoring System Against Shellcodes Through Microsoft Windows API Hooking,” Cryptology and Information Security Conference 2009 (CISC2009).
  84. [C84] Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, Hung-Min Sun, and B.-Y. Yang, “SPATE: Small-group PKI-less Authenticated Trust Establishment,” The 7th Annual International Conference on Mobile Systems, Applications and Services (MobiSys '09), accepted, 2009. (acceptance rate: 20%) (This paper received the best paper award, the only one out of 26 papers. The full version of this paper was hence invited to be published in IEEE Transactions on Mobile Computing (appear in 2010).) Remark: This work was an international collaboration work mainly by Information Security Lab (National Tsing Hua University) and CyLab (Carnegie Mellon University) under iCAST international collaboration project supported by NSC & SINICA. The first author and 5th author are my Ph.D. students.
  85. [C85] Hung-Min Sun, S.-Y. Chang, Y.-H. Hung, Y.-K. Tseng, H.-T. Chiao, “Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem,” ISPAN 2009, pp.260-265, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 2009.
  86. [C86] Hung-Min Sun and M.-C. Leu, “A Real-Time Selective Video Encryption Using Context-Key Control,” The Fifth International Conference on Information Assurance and Security (ISA-2009), pp. 114-117, 2009.
  87. [C87] S.-Y. Chiou, S.-Y. Chang, and Hung-Min Sun, “Common Friends Discovery with Privacy and Authenticity,” The Fifth International Conference on Information Assurance and Security (ISA-2009), pp. 337-340, 2009.
  88. [C88] Hung-Min Sun, Y.-H. Lin, C.-T. Yang, and M.-E. Wu, “A Pair-wise Key Establishment Scheme for Wireless Sensor Networks,” the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2009), to be held in Kyoto, Japan on September 12-14, 2009.
  89. [C89] Hung-Min Sun, C.-W. Weng, S.-J. Wang, “A Scheme of Modulo-Based Capacity-Improvement upon EMD Systems,” in Proceeding of IEEE Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2009), pp. 365-368, 2009, IEEE press.
  90. [C90] Hung-Min Sun, W.-H. Chang, S.-Y. Chang, Y.-H. Lin, “DepenDNS: Dependable Mechanism against DNS Cache Poisoning,” CANS 2009, Lecture Notes in Computer Science 5888, Springer-Verlag, pp. 174-188, 2009. (acceptance rate: 29%)
  91. [C91] Hung-Min Sun, S.-Y. Chang, and H.-T. Chiao, “Polynomial Interpolation Codes for Reliable Multicast Data Distribution,” IEEE TENCON 2009, Vols 1-4, pp. 2466-2471, 2009.
  92. [C92] S.-Y. Chiou, S.-Y. Chang, G. Mezzour, A. Perrig, Hung-Min Sun, “A Trustable Reputation Scheme Based on Private Relationships,” ASONAM 2009, pp.19-24, 2009 International Conference on Advances in Social Network Analysis and Mining, 2009.
  93. [C93] H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, A. Perrig, Hung-Min Sun, B.-Y. Yang, H. Kikuchi, “A Study of User-Friendly Hash Comparison Schemes,” ACSAC 2009, pp.105-114, 2009 Annual Computer Security Applications Conference, 2009. (Acceptance rate: 19%) (Note that: This is an international cooperative work, mainly by NTHU Security Lab and CMU security lab. The 2nd author and 5th author are my Ph.D. students.)
  94. [C94] Y.-H. Chen, L.-W. Huang, Y.-H. Lin, S.-W. Huang, C.-H. Yeh, and Hung-Min Sun, “RDAP: Rapid Deployment Authentication Protocol between Mobile Devices and Femtocells,” in Proceedings of the 2010 IEEE Region 10 Conference, TENCON2010, Fukuoka, Japan: IEEE, Nov. 2010, pp. T4–4.2.
  95. [C95] Hung-Min Sun, B.-H. Ku, C.-C. Wu, T.-Y. Lin, “ Improving VQ Index Compress with Modified Relative Index Table,” 2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (CDEE), pp. 221-225, 2010, IEEE press.
  96. [C96] C.-M. Chen, H.-T. Chiao, S.-T. Chen, and Hung-Min Sun, “A New Business Model in Pay-TV broadcasting Systems and its Conditional Access System,” in Proceedings of the 2010 IEEE Region 10 Conference, TENCON2010, Fukuoka, Japan: IEEE, Nov. 2010, pp. T4–4.3.
  97. [C97] Y.-H. Lin, B.Z. He, Hung-Min Sun, and Y.-H. Chen, “CDS: Concealed Data Storing Scheme in Wireless Sensor Networks,” International Computer Symposium (ICS 2010), Dec. 2010.
  98. [C98] H.-T. Chiao, K.-M. Li, Hung-Min Sun, S.-Y., Chang, H.A. Hou, “Application-Layer FEC for file delivery over the WiMAX unicast networks,” 2010 12th IEEE Internation Conference on Communication Technology (ICCT), pp. 685-688, 2010, IEEE press.
  99. [C99] Hung-Min Sun, S.-Y. Chang, A.B. Tello, and Y.-H. Chen, “An Authentication Scheme Balancing Authenticity and Transmission for Wireless Sensor Networks,” International Computer Symposium (ICS 2010), Dec. 2010. (This paper received the best paper award.)
  100. [C100] Hung-Min Sun, C.-H. Chen, and P.-C. Li, “A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks,” 2011 ICPP workshop on Applications of Wireless Ad Hoc and Sensor Networks, 2011.
  101. [C101] Hung-Min Sun, C.-S. Chen, C.-L. Chen, Y.-H. Chen, ”A Robust Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks,” 2011 3rd World Congress in Applied Computing, Computer Science, and Computer Engineering, (ACC 2011), 2011.
  102. [C102] Hung-Min Sun, C.-H. Chen, L.-C. Hsu, Y.-H. Chen, and Y.-H. Chen, “Reliable Data Transmission against Packet Dropping Misbehavior in Wireless Ad Hoc Networks,” 2011 IET International Communication Conference on Wireless Mobile and Computing, CCWMC 2011, 2011
  103. [C103] Hung-Min Sun, C.-H. Chen, C.-W. Yeh, Y.-H. Chen, “A Collaborative Routing Protocol against Routing Disruptions in MANETs, ” WCC-11 ACSA, 2011
  104. [C104] Hung-Min Sun, S.-M. Chen, and K.-H. Wang, “Cryptanalysis on the RFID ACTION Protocol, ” The 2011 International Conference on Security and Management (SAM'11), 2011
  105. [C105] P. Chao and Hung-Min Sun, “Multi-agent based cloud utilization for IT OA assets dispatching process in SCM's view: An empirical study,” 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2012, pp. 80-87, 2012
  106. [C106] C.-M. Chen, T.-Y. Wu, B.-Z. He, Hung-Min Sun, “An Efficient Time-Bound Hierarchical Key Management Scheme without Tamper-Resistant Devices,” 2012 International Conference on Computing, Measurement, Control and Sensor Network (CMCSN 2012), pp. 285-288, 2012
  107. [C107] Hung-Min Sun, Y.-H. Chen, C.-C. Fang, and S.-Y. Chang, “PassMap: A Map Based Graphical-Password Authentication System,” ASIACCS 2012, 2012
  108. [C108] S.-T. Chen, H.-T. Chiao, S.-Y. Chang, Hung-Min Sun, and C.-H. Ho, Efficient Encoding of Systematic Raptor Codes Based on Operation Lists for Known Block Lengths,” 2013 IEEE Wireless Communications and Networking Conference (WCNC 2013), pp. 4689-4694, 2013
  109. [C109] C.-Y. Weng, C.-H. Yang, C.-I Fan, K.-L. Liu and Hung-Min Sun, ” Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality,” The 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), accepted, 2013
  110. [C110] L.-P. Yuan, B.-Z. He, C.-S. Liu, and Hung-Min Sun, ” A Secure and Flexible Data Aggregation Framework for Smart Grid,” The 8th International Conference on Embedded and Multimedia Computing (EMC 2013), accepted, 2013

專書論文 (Book Chapters)

  1. [B1] Hung-Min Sun, S.-P. Shieh, On Private-Key Cryptosystems Based on Product Codes, in Information Security and Privacy - ACISP 1998, Lecture Notes in Computer Science, Vol. 1438, Springer-Verlag, Berlin, pp. 68-79, 1998.
  2. [B2] M. Michels, M. Stadler, and Hung-Min Sun, On the Security of some Variants of the RSA Signature Scheme, in Computer Security – ESORICS’98, J.J. Quisquater, Y. Deswarte, C. Meadows, D. Gollmann (Eds.), Lecture Notes in Computer Science, Vol. 1485, Springer-Verlag, Berlin, pp. 85-96, 1998.
  3. [B3] Hung-Min Sun, Improving the Security of the McEliece Public-Key Cryptosystem, in Advances in Cryptology – ASIACRYPT’98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, Berlin, pp. 200-213, 1998
  4. [B4] Hung-Min Sun, W. C. Yang, and C. S. Laih, On the design of RSA with short secret exponent, in Advances in Cryptology – ASIACRYPT’99, Lecture Notes in Computer Science, Vol. 1716, Springer-Verlag, Berlin, pp. 150-164, 1999
  5. [B5] Hung-Min Sun and B. L. Chen, On the Decomposition Constructions for Perfect Secret Sharing Schemes, in Information and Communications Security – ICICS’97, Lecture Notes in Computer Science, Vol. 1334, Springer-Verlag, Berlin, pp. 50-60, 1997.
  6. [B6] Hung-Min Sun and C.-T. Yang, On the Design of RSA with Balanced Short Exponents and Its Application, in Public Key Cryptography - PKC 2005, Lecture Notes in Computer Science, Vol. 3386, Springer-Verlag, Berlin, pp. 199-215, 2005.
  7. [B7] Hung-Min Sun, Y.-H. Lin, and M.-F. Wu, API Monitoring System for Defeating Worms and Exploits in MS-Windows System, in Information Security and Privacy - ACISP 2006, Lecture Notes in Computer Science, Vol. 4058, Springer-Verlag, Berlin, pp. 159-170, June 2006.
  8. [B8] Hung-Min Sun, M.-E. Wu, and Y.-H. Chen, Estimating Prime-Factors of RSA Modulus N and Its Application on the Extension of the Wiener Attack, in Applied Cryptography and Network Security - ACNS'07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4521, pp. 116-128, 2007. (Acceptance Ratio: 11.9%)
  9. [B9] Hung-Min Sun, M.-E. Wu, H. Wang, and J. Guo, On the Improvement of the BDF Attack on LSBS-RSA, in Information Security and Privacy - ACISP 2008, Lecture Notes in Computer Science, 5107, Editors: Yi Mu, Willy Susilo and Jennifer Seberry, Springer-Verlag, pp. 84-97, 2008. (Acceptance rate: 29%)
  10. [B10] Hung-Min Sun, M.-E. Wu, R. Steinfeld, J. Guo, and H. Wang, Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits, in Cryptology and Network Security - CANS 2008, Lecture Notes in Computer Science, 5339, Springer-Verlag, pp. 49-63, 2008
  11. [B11] Hung-Min Sun, W.-H. Chang, S.-Y. Chang, Y.-H. Lin, DepenDNS: Dependable Mechanism against DNS Cache Poisoning, in Cryptology and Network Security -CANS 2009, Lecture Notes in Computer Science 5888, Springer-Verlag, pp. 174-188, 2009. (acceptance rate: 29%)
  12. [B12] M.-Y. Hsu, Y.-H. Chen, S.-S. Chen, W. Tang, and Hung-Min Sun, “An IHD Authentication Protocol in Smart Grid, Lecture Notes in Electrical Engineering (LNEE, Springer) - SGSC 2012”, Springer, 2012.
  13. [B13] M.-E. Wu, R. Tso, Hung-Min Sun, “Cryptanalysis of Exhaustive Search on Attacking RSA,” NSS 2012, Network System Security, Lecture Notes in Computer Science 7645, Springer 2012, pp. 373-379, 2012. (acceptance rate: 23%)
  14. [B14] M.-E. Wu, R. Tso, Hung-Min Sun, “On the Improvement of Fermat Factorization,” NSS 2012, Network System Security, Lecture Notes in Computer Science 7645, Springer 2012, pp. 380-391, 2012. (acceptance rate: 23%)

美國專利 (USA Patents)

  1. [P1] Hung-Min Sun, Shih-Pu Hsu, and Chien-Ming Chen, “Mobile jamming attack method in wireless sensor network and method defending the same,” US Patent 7,907,888, March 15, 2011.
  2. [P2] Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, and Yue-Hsun Lin, “Method and system for handover authentication,” US Patent 8,131,296, March 6, 2012. (ITRI)
  3. [P3] Cheng-Kai Chen, Hung-Min Sun, Kang-Chiao Lin, Shih-Ying Chang, and Shuai-Min Chen, “Apparatus, method, and computer readable medium thereof for generating and utilizing a feature code to monitor a program,” US Patent 8,127,276, Feb. 28, 2012. (ITRI)
  4. [P4] Muh-chyi Leu and Hung-Min Sun, “Authentication method employing elliptic curve cryptography,” US Patent 8,117,447, Feb. 14, 2012. (ITRI)
  5. [P5] Hung-Min Sun and Yue-Hsun Lin, “Pair-wise key pre-distribution method for wireless sensor network,” US Patent (pending), Application number: 11/599962, Publication number: US 20080044028/A1.
  6. [P6] Frank Chee-Da Tsai, Yi-Chung Shen, Jian-Chian Chiou, Hung-Min Sun, Shuai-Min Chen, Yue-Hsun Lin, and Ying-Chu Hsiao, “Key management system and method for wireless networks,” US Patent (pending), Application number: 12/076930, Publication number: US 20090110196/A1.
  7. [P7] Hung-Min Sun and Shih-Ying Chang, “Light-overhead and flexible wireless sensor message authentication method,” US Patent (pending), Application number: 12/024199, Publication number: US 20090158045/A1.
  8. [P8] King-Hang Wang, Chin-Te Chen, Hung-Min Sun, and Yih-Sien Kao, “Systems and methods for key management,” US Patent (pending), Application number: 12/236971, Publication number: US 20100074438/A1.
  9. [P9] Cheng-Kai Chen, Hung-Min Sun, Shih-Ying Chang, Yao-Hsin Chen, and Bing-Zhe He, “Network apparatus having a database, management method and tangible machine-readable medium for managing internet protocol connection rules of the database,” US Patent (pending), Application number: 12/052499, Publication number: US 20090164617.
  10. [P10] King-Hang Wang, Yung-Hsuan Chao, Hung-Min Sun, Yih-Sien Kao, and Wan-Shan Wu, “User group assignment method for key management,” US Patent (pending), Application number: 12/196557, Publication number: US 20100050204.
  11. [P11] Yih-Sien Kao, Muh-Chyi Leu, Hung-Min Sun, and King-Hang Wang, “DRM key management system using multi-dimensional grouping techniques,” US Patent (pending), Application number: 12/202550, Publication number: US 20100054479.
  12. [P12] Frank Chee-Da Tsai, Jian-Chian Chiou, I-Hung Lin, Hung-Min Sun, Shih-Ying Chang, Chieh Hsing, and Chi-Yi Kao, “Apparatus and method for renewing a key, computer readable medium thereof and wireless network comprising the same,” US Patent (pending), Application number: 12/337015, Publication number: US 20100105357/A1.
  13. [P13] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, and Hung-Min Sun, “Network Reputation System And Its Controlling Method Thereof,” US Patent (pending), Application number: 12/411396, Publication number: US20100205430/A1.
  14. [P14] Frank Chee-Da Tsai; Chien-Chien Chiu, I-Hung Lin, Hung-Min Sun, Shuai-Min Chen, Yao-Hsin Chen, Heng-Jeng Chung, “Mobile Station, Access Point, Gateway Apparatus, Base Station, and Handshake Method Thereof for Use in a Wireless Network Framework,” US Patent (pending), Application number: 12/361361, Publication number: US 20100138661/A1.
  15. [P15] Chiao; Hsin-Ta; (Nantou County, TW) ; Sun; Hung-Min; (Hsinchu City, TW) ; Chang; Shih-Ying; (Nantou County, TW), ” LAYER-AWARE FORWARD ERROR CORRECTION ENCODING AND DECODING METHOD, ENCODING APPARATUS, DECODING APPARATUS, AND SYSTEM THEREOF ,” US Patent(pending), Application Number: 99139737, Publication number: US 20120131407/A1.
  16. [P16] Sun; Hung-Min; (Hsinchu, TW) ; Jeng; Jain-Ming; (Hsinchu, TW), ” METHOD AND SYSTEM FOR PREVENTING DOMAIN NAME SYSTEM CACHE POISONING ATTACKS,” US Patent(pending), Application Number: 10010062, Publication number: US 20120180125/A1.

中華民國專利

  1. [PC1] 孫宏民, 陳孟彰, 林宸堂, “數位影像版權之保護與驗證方法,” 中華民國專利,證書號:199742, 公告/公開日: 2004/03/21
  2. [PC2] 孫宏民, 楊政達, 林宸堂, “以短亂數為基礎之使用者身份驗證方法,” 中華民國專利,證書號:I296175, 公告/公開日: 2008/04/21
  3. [PC3] 陳政愷, 孫宏民, 林港喬, 張仕穎, 陳帥名, “產生及利用一特徵碼以監測一程式之裝置、方法、應用程式及其電腦可讀取媒體,” 中華民國專利,證書號:I335531, 公告日: 2011/01/01
  4. [PC4] 孫宏民, 張仕穎, “輕量及彈性無線感測器訊息認證方法,” 中華民國專利,證書號: I341095, 公告日: 2011/04/21
  5. [PC5] 孫宏民, 徐士卜, 陳建銘, “無線感測網路上移動式阻斷服務攻擊方法及其防禦方法” 中華民國專利,證書號: I346491, 公告日: 2011/08/01
  6. [PC6] 蔡其達, 沈誼中, 邱簡謙, 孫宏民, 陳帥名, 林岳勳, 蕭英助, “無線網路之預先安全認證與金鑰交換系統與方法” 中華民國專利,證書號: I351207, 公告日: 2011/10/21
  7. [PC7] 呂沐錡, 孫宏民, “基於橢圓曲線密碼學之認證方法” 中華民國專利,證書號: I357251, 公告日: 2012/01/21
  8. [PC8]孫宏民, 林岳勳, “無線感測器網路中之對稱式金鑰部署方法,” 中華民國專利(pending),公開號: 200807998, 公告/公開日: 2008/02/01
  9. [PC9]蔡其達, 邱簡謙, 林益宏, 孫宏民, 張仕穎, 邢傑, 高啟益, “金鑰更新裝置、方法及其電腦程式產品及包含前述裝置之無線網路系統” 中華民國專利(pending),公開號: 201018165, 公告/公開 日: 2010/05/01
  10. [PC10]王景行, 陳錦德, 孫宏民, 高億憲, “金鑰管理系統與方法” 中華民國專利(pending),公開號: 201014249, 公告/公開日: 2010/04/01
  11. [PC11]高億憲, 呂沐錡, 孫宏民, 王景行, “使用多維分組技術之DRM密匙管理系統” 中華民國專利(pending),公開號: 201011589, 公告/公開日: 2010/03/16
  12. [PC12]王景行, 趙永軒, 孫宏民, 高億憲, 吳宛珊, “用於密鑰管理之使用者群分配方法” 中華民國專利(pending),公開號: 201010322, 公告/公開日: 2010/03/01
  13. [PC13]邱錫彥, 孫宏民, 張仕穎, 林岳勳, “交遞驗證方法與系統” 中華民國專利(pending),公開號: 201010361, 公告/公開日: 2010/03/01
  14. [PC14]孫宏民, 林岳勳, 張仕穎, “行動隨意網路下安全資料聚合之方法” 中華民國專利(pending),公開號: 201006197, 公告/公開日: 2010/02/01
  15. [PC15]孫宏民, 林岳勳, 張仕穎, “安全加密資料之比較方法” 中華民國專利(pending),公開號: 201004261, 公告/公開日: 2010/01/16
  16. [PC16]陳政愷, 孫宏民, 張仕穎, 陳耀鑫, 何秉哲, “具有一資料庫之網路裝置及用於該資料庫之網路協定連線規則之管理方法與電腦可讀取紀錄媒體,” 中華民國專利(pending),公開號: 200928770, 公 告/公開日: 2009/07/01
  17. [PC17]邱錫彥, 張仕穎, 玫柔 佳婷, 培瑞 安卓, 孫宏民, “網路評價系統及其控制方法” 中華民國專利(pending),公開號: 201031169, 公開日: 2010/08/16
  18. [PC18]蔡其達, 邱簡謙, 林益宏, 孫宏民, 陳帥名, 陳耀鑫, 鍾恒正, “無線網路架構之行動台、存取台、閘道裝置、基地台及其握手方法” 中華民國專利(pending),公開號: 201023590 , 公開日: 2010/06/16

Technical Report

  1. [T1] Hung-Min Sun, M. J. Hinek, and M.-E. Wu, 「On the Design of Rebalanced RSA,」 Centre for Applied Cryptographic Research, CACR 2005-35, 2005.

Award

  • Y. Z. Hsu Scientific Paper Award (有庠科技論文獎), Far Eastern Y. Z. Hsu Science and Technology Memorial Foundation, 2010.
  • The Best Paper Award (1 out of 26) in MobiSys '09 (acceptance ratio: 20%). The extended version of this paper was hence invited to be published in IEEE Transactions on Mobile Computing (appeared in 2010).
  • The Advisor of Ph.D. Dissertation - Outstanding in Chinese Cryptography and Information Security Association, 2012.
  • The Advisor of Ph.D. Dissertation - Outstanding in Chinese Cryptography and Information Security Association, 2011.
  • The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2011.
  • The Best Paper Award in 2010 International Computer Symposium (ICS 2010).
  • The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2010.
  • Outstanding Paper Award in Computer Science, in Computer Society of the Republic of China, 2010.
  • The Best Paper Award in Cryptology & Information Security Conference 2009 (1 out of 62).
  • The Advisor of Ph.D. Dissertation Award - Outstanding in Institute of Information & Computing Machinery, 2009.
  • The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2009.
  • The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2008.
  • The Best Paper Award in Information Security Conference 2006 (the only one out of 71 papers).
  • The Best Paper Award in Information Security Conference 2005 (the only one out of 58 papers).
  • The Best Paper Award in 2005 National Computer Symposium.
  • Outstanding Paper Award in Computer Science, in Computer Society of the Republic of China, 2005.
  • The Annual JISE (Journal of Information Science & Engineering) Best Paper Award in 2003 (1 out of 64 papers).

Professional Activities

  • Topics Editor(s)-in-Chief of International Journal
    1. Advances in Information Sciences and Service Sciences: An International Journal of Research and Innovation, 2011
    2. International Journal of Digital Content Technology and its Applications, 2010-2011
  • Editorial Board of International Journals
    1. Journal of Engineering Research (IER), 2012~now.
    2. International journal of information and computer science(IJICS), 2012~now
    3. International Journal of Computer Science and Artificial Intelligence(IJCSAI), 2012~now
    4. International Journal of Digital Content and Applications (IJDCA), 2012~now
    5. Recent Patents on Telecommunications, 2012~now
    6. International Journal of Computer Science & Information Technology Applications (IJCSITA), 2011~now
    7. International Journal of Intelligent Information Processing(IJIIP), 2010~now
    8. Advances in Information Sciences and Service Sciences: An International Journal of Research and Innovation(AISS), 2010~now
    9. International Journal of Security(IJS), 2010~now
    10. ISRN Communications and Networking, 2010~now
    11. Journal of Information Science and Engineering (JISE), 2011/8/1 ~ 2014/7/31 (Institute of Information, Science Academia Sinica Press)
  • Honor Chair: Honor Chair for international conferences
    1. 2009 International Conference on Computer and Automation Engineering
    2. 2009 International Conference on Computer Research and Development
    3. 2009 International Conference on Telecom Technology and Applications
  • Workshop Co-Chairs
    1. The 5th International Conference on Future Information Technology (FutureTech 2010)
  • Organizing Committee
    1. The 3th Joint Workshop on Information Security (JWIS 2008)
    2. The 4th Joint Workshop on Information Security (JWIS 2009)
    3. The 5th Joint Workshop on Information Security (JWIS 2010)
  • Publicity Chair
    1. 2013 International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA)
    2. 2013 The 7th International Symposium on Digital Forensics and Information Security (DFIS)
    3. 2012 International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA)
    4. The 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA)
    5. 2012 6th Int'l Conference on New Trends in Information Science, Service Science and Data Mining (ISSDM)
    6. 2012 The 9th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA)
    7. 2012 International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA)
    8. 2011 International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA)
    9. 2009 The Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MIPS)
    10. 2009 International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA)
    11. 2009 International Conference on Electronic Computer Technology (ICECT)
    12. 2009 International Conference on Computer Modeling and Simulation (ICCMS)
    13. 11th Information Security Conference (ISC08)
  • Program Committee Member
    1. 2014 International Conference on Information Security Practice and Experience
    2. 2013 IEEE Global Telecommunications Conference
    3. 2013 IEEE International Conference on Cloud Computing Technology and Science
    4. 2013 SAM
    5. 2013 IEEE ISCI
    6. 2013 ICIS
    7. 2013 NSS
    8. 2013 ICISC
    9. 2013 ICECT
    10. 2012 NSS
    11. 2012 IEEE ICETEM
    12. 2012 ICECT
    13. 2012 ICHEP
    14. 2012 ICMAE
    15. 2012 SAM
    16. 2012 ISSPA
    17. 2012 ICS
    18. 2012 ICIWE
    19. 2012 International Conference on Information Security and Cryptology (ICISC 2012
    20. 2012 IEEE ISCAIE
    21. 2012 ICACT
    22. 2011 SGH
    23. 2011 IEEE ICCSIT
    24. 2011 IEEE ICIME
    25. 2011 WSN
    26. 2011 ICONI Workshop on Network Security
    27. 2011 ICFCC
    28. 2011 ICSAP
    29. 2011 ICMBE
    30. 2011 ICMG
    31. 2011 ICECT
    32. 2011 ICCRD
    33. 2011 ICCDA
    34. 2011 ICMET
    35. 2011 ICENT
    36. 2011 IC4E
    37. 2011 ICFN;
    38. 2010 ICONI Workshop on Network Security
    39. 6th International Symposium on Wireless Sensor Network Technologies and Applications for Smart Space (WTA 2010)
    40. 2010 The 2nd International Conference on Future Ntworks (ICFN 2010)
    41. 2010 the 2nd International Conference on Information and Multimedia Technology (ICIMT 2010)
    42. 2010 The 3rd IEEE International Conference on Computer Science and Information Technology (IEEE ICCSIT 2010)
    43. 2010 The 2nd International Conference on Future Computer and Communication (ICFCC 2010)
    44. 2010 International Conference on e-Education, e-Business, e-Management and e-Learning (IC4E 2010)
    45. 2010 IEEE International Conference on Advanced Management Science (IEEE ICAMS 2010)
    46. 2010 International Conference on Educational and Network Technology (ICENT 2010)
    47. 2010 International Conference on Mechanical and Electrical Technology (ICMET 2010)
    48. 2010 International Conference on Computer Design and Applications (ICCDA 2010)
    49. 2010 International Conference on Computer Research and Development (ICCRD 2010)
    50. 3rd International Conference on Contemporary Computing (IC3 –2010)
    51. The 2010 International Conference on Signal Acquisition and Processing (ICSAP 2010)
    52. The 2nd International Conference on Electronic Computer Technology (ICECT 2010)
    53. 2010 International Conference on Instructional and Computer Technology (ICICT 2010)
    54. 2010 International Workshop on Ubiquitous Body Sensor Networks (UBSN 2010)
    55. 2009 International Workshop on Security Virtual Computing Environment
    56. International Conference on Signal Acquisition and Processing 2009 (ICSAP 2009)
    57. 2009 International Conference on Future Computer and Communication
    58. 1st International Workshop on Security Engineering Environment 2009
    59. 2nd IEEE International Conference on Computer Science and Information Technology 2009
    60. 2009 International Conference on Information Management and Engineering
    61. 2009 International Conference on Mechanical and Electrical Technology
    62. 2008, 2009, 2010 The 3nd, 4th, 5th, International Symposium on Smart Home (SH'08, SH’09, SH’2010)
    63. 2009 International Conference on Information and Multimedia Technology (ICIMT 2009)
    64. 2008 Information Security Conference (ISC 2008), Special Session on AES Subcommittee
    65. 2008 Workshop of Information Security
  • International Advised Boards
    1. The 2nd International Conference on Digital Image Processing (ICDIP 2010)
    2. The 2010 International Conference On Bioinformatics and Biomedical Technology (ICBBT 2010)
    3. 2010 The 2nd International Conference on Computer Engineering and Technology (ICCET 2010)
    4. 2010 The 2nd IEEE International Conference on Information management and engineering (IEEE ICIME 2010)
    5. The 2nd International Conference on Applied Physics and Mathematics (ICAPM 2010)
    6. The Second International Workshop for Asian Public Key Infrastructures (IWAP 2002)

Research Projects

主持、參與大型計畫與產學合作

  1. 過去本人主持、參與大型研究計畫與產學合作,包括台達電、國科會、中科院、工研院、資策會、經濟部科專、昱捷微系統、洲際城等單位,將理論研究與實務做密切的連結,並擔任中華民國資訊安全學會產學合作委員會主任委員,促進資訊安全產業界與學界合作。近十年共執行50多個研究計畫,總金額超過三千萬,亦曾擔任清華大學產學合作營運總中心智財技轉組組長之工作,協助校方教師及研究人員進行專利申請及技術移轉之工作。
  2. 擔任教育部委託之教育學術網路系統安全保證及反駭客控制技術研發中心計畫總主持人(2011/1~2011/12),協助本校計算機通訊中心之教育網路及其他學校之教育網路對於BOTNET偵測與防制駭客入侵有相當大的績效。
  3. 參加iCAST (http://www.icast.org.tw/), (The International Collaboration for Advancing Security Technology)跨國性資安合作計畫(2007~2009): Investigation on Advanced Remote Authentication Technologies (TWISC, Project 312)
  4. 擔任台達/清大聯合研究中心電子書整合型計畫之總計畫主持人(2010/8~2011/7),計畫名稱: 數位學習與閱讀 - 電子書之角色行為分析與應用。(第一期)
  5. 擔任台達/清大聯合研究中心電子書整合型計畫之總計畫主持人(2011/11~2012/12),計畫名稱: 數位學習與閱讀 -電子書之角色行為分析與應用。(第二期)
  6. 擔任台達/清大聯合研究中心電子書整合型計畫之總計畫主持人(2013/03~2014/02),計畫名稱: 數位學習與閱讀。(第三期)
  7. 擔任台達/清大聯合研究中心雲端運算(DCoud)計畫-Security分項主持人(2011/8~2014/7),計畫名稱:資訊安全技術。
  8. 與中科院國防科技合作計畫,包括無線網路WiMAX之安全問題研究。這是非常實務之研究計畫,與我國國防中有關電腦網路安全方面之攻擊與防禦發展有相當大的助益。
  9. 與資策會進行研究計畫,包括Femtocell Security網路安全技術研究、行動異質多網安全技術先期研究、MCBCS尚可有效管理與認證群組金鑰之研究、Heterogeneous Broadband Wireless Security技術研究、UMA 安全相關技術之研究等,這些計畫皆是發展產業界目前迫切需要發展之技術,也讓我們能夠了解及發掘一些實務問題,並以我們資訊安全上的專業知識來解決問題。
  10. 與工研院進行研究計畫,包括高鐵高畫質Application-Layer FEC技術、架構於ISO 27001標準之隱私保護資料庫細項、高鐵Application-Layer FEC技術、DVB-Mobile/3GPP E-MBMS Raptor Code、專利要旨表及專利內容整理、接收機與Smartcard之整合/加密軟體程式開發、數位電視廣播之DRM系統設計之研究、智慧型電網資料聚集加密機制研究、高鐵Android平台AL-FEC技術等,這些計畫皆是產業界目前迫切需要發展之技術,也讓我們能夠了解及發掘一些實務問題,並以專業知識來研究解決問題。
advisor/main.txt · 上一次變更: 2013/11/13 14:49 由 iswikiadmin
CC Attribution-Noncommercial-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0