差異處

這裏顯示兩個版本的差異處。

連向這個比對檢視

advisor:main [2017/09/07 17:03]
iswikiadmin 2017/9/7 modified
advisor:main [2019/01/25 01:16] (目前版本)
iswikiadmin [Research Projects]
行 2: 行 2:
 ======Professor Hung-Min Sun (孫宏民),​ Ph.D.====== ======Professor Hung-Min Sun (孫宏民),​ Ph.D.======
  
-  * Professor of Department of Computer Science +  * Department of Computer Science 
-  * Vice Director of University Library +  * National Tsing Hua University 
-  * National Tsing Hua University, Taiwan +  * 101 Kuang Fu Road, Section 2 
-  * Office: Delta Building 624(台達624) +  * Hsinchu City, Taiwan 30013 
-  * Phone: +886-3-5742968 +  * E-mail: hmsun@cs.nthu.edu.tw
-  * Fax:​+886-3-5723694 +
-  * E-mail:​hmsun ​at cs.nthu.edu.tw +
-===== Education =====+
  
-  * Ph.D., Department of Computer Science and Information Engineering,​ National Chiao Tung University, Sept. 1990 - January. 1995 +===== CURRENT POSITION ​=====
-  * M.S., Institute of Applied Mathematics,​ National Cheng Kung University, Sept. 1988 - June. 1990 +
-  * B.S., Department of Applied Mathematics,​ National Chung Hsing University, Oct. 1984 - June. 1988 +
-===== Professional Experiences ​=====+
  
-  * Professor, Aug. 2008 present +  * Director of TWISC@NTHU (2018~) 
-  * Vice Director of University LibrarySept. 2012 present +  * Director of Information Security Research CenterNTHU (2017/6~) 
-  * Director of Division of Intellectual Property ​and Technology Licensing, Operations Center for Industry Collaboration Apr. 2011 Aug. 2012 +  * Director ​and Professor, Institute ​of Information Systems ​and ApplicationsNTHU (2017/8/1~) 
-  * Associate ​Professor, ​Aug. 2002 - Jun. 2008 +  * Preliminary Director and Professor, ​Institute of Information Security, NTHU (2018/​9/​1~2019/​7/​31) 
-    * Department of Computer Science ​National Tsing Hua University ​+  Professor, ​Department of Computer Science, NTHU (2008/​08/​01~)  
 +  * Joint Research Fellows, The Research Center for Information Technology Innovation (CITI), ACADEMIA SINICA, Taiwan (2016/​04/​01~2018/​07/​31) 
 +  * Vice President of the Chinese Cryptology and Information Security Association
  
-  * Associate Professor, Aug. 2000 - Jun. 2002  +===== RESEARCH AREAS =====
-  * Assistant Professor, Aug. 1999 - Jun. 2000  +
-    * Department of Computer Science and Information Engineering,​ National Cheng Kung University  ​+
  
-  * Associate Professor, Aug. 1995 - Jun. 1999  +  * Information Security 
-    Department of Information Management Chaoyang University of Technology ​+  Fintech 
 +  * BlockChain 
 +  * Automatic Trading 
 +===== EDUCATION =====
  
-  * Associate Professor, Feb1995 - Jun1995 +  * Ph.D Computer Science and Information Engineering, ​National Chiao Tung University, 1995 
-    * Department of Computer Science and Information Engineering, ​Chung Hua University+===== PROFESSIONAL EXPERIENCE =====
  
-  * Visiting ​Professor, Computer Science ​DepartmentJul. 2006 Jan. 2007 +  * Professor, Computer Science, ​NTHU, 2008/8
-    * The University of Auckland+  Joint Research Fellows, ​The Research Center for Information Technology Innovation (CITI), ACADEMIA SINICA, 2016/4-  
 +  * Associate Professor, Computer Science, NTHU, 2002/​8-2008/​7 
 +  * Visiting Associate Professor, Computer Science, ​University of Auckland, 2006/7 - 2007/1 
 +  * Associate Professor, Computer Science and Information Engineering,​ National Cheng Kung University, 2000/​8-2002/​7 
 +  * Assistant Professor, Computer Science and Information Engineering,​ National Cheng Kung University, 1999/​8-2000/​7
  
-===== Research Interests ​===== +===== UNIVERSITY SERVICES ​=====
-  * **Cryptography**:​ Encryption/​Decryption,​ Digital Signatures, Secure Network Protocols +
-  * **Smart Phones (3G, 4G)**: Security and Privacy Issues in Smart Phones, Developing Applications on Android and iPhone +
-  * **Cloud Computing**:​ Security and Privacy Issues in Cloud Systems +
-  * **Internet of Things (IoT)**: Applications,​ Security and Privacy Issues +
-  * **Network Security**: Intrusion Detection/​Prevention System (IDS/IPS), System Security (O.S. Security), Shellcode, Buffer Overflow, Attacks, Secure Network Protocols +
-  * **Wireless Network**: WiMAX, Wireless LAN, Ad hoc Network, WiFi, Cellular, GSM, GPRS, Bluetooth , 802.11, 802.16, 802.21 +
-  * **Sensor Network**: Key Distribution,​ Secure Data Aggregation,​ Secure Rounting Protocols +
-  * **RFID**: Applications,​ Security and Privacy Issues +
-  * **Smart Grid**: Security and Privacy Issues +
-  * **Multimedia Security**: E-book Security, Broadcast DTV, Digital Right Management, Watermarking,​ Data Hiding, Steganography +
-  * **E-book** +
-  * **E-learning** +
-  * **Reverse Engineering (Disassembly)** +
-  ***Hacking Techniques and Countermeasures** +
-  ***Big Data Analysis** +
-  ***Digital Forensic** +
-  ***E-book** +
-  ***E-learning** +
-===== Publication ===== +
-==== Selected Journal Papers ==== +
-  - [J1] __Hung-Min Sun__ and T. Hwang, "On Double-One Matrices and Double-Zero Matrices,"​ //Linear and Multilinear Algebra//, Vol.31, pp. 47-55, 1992, London, Gordon and Breach Science Publishers. (SCI) +
-  - [J2] __Hung-Min Sun__ and T. Hwang, "Key Generation of Algebraic-Code Cryptosystems,"​ //Computers and Mathematics with Applications//,​ Vol. 27, No. 2, 1994, pp. 99-106. (SCI) +
-  - [J3] __Hung-Min Sun__ and S. P. Shieh, "On Dynamic Threshold Schemes,"​ //​Information Processing Letters//, Vol. 52, No. 4, 1994, pp. 201-206. (SCI) +
-  - [J4] __Hung-Min Sun__ and S. P. Shieh, "​Construction of Dynamic Threshold Schemes,"​ //IEE Electronics Letters//, Vol. 30, No. 24, 1994, pp. 2023-2025. (SCI) +
-  - [J5] __Hung-Min Sun__ and S. P. Shieh, "An Efficient Construction of Perfect Secret Sharing Schemes for Graph-Based Structures,"​ //Computers and Mathematics with Applications//,​ Vol. 31, No. 7, 1996, pp. 129-135. (SCI) +
-  - [J6] S. P. Shieh, W. H. Yang, and __Hung-Min Sun__, "An Authentication Protocol without Third Party,"​ //**IEEE Communications Letters**//,​ Vol. 1, No. 3, 1997, pp. 87-89. (SCI) +
-  - [J7] __Hung-Min Sun__, 1997 (November), "​Private-Key Cryptosystem Based on Burst-Error-Correcting Codes,"​ //IEE Electronics Letters//, Vol. 33, No. 24, pp. 2035-2036, London, IEE Press. (SCI) +
-  - [J8] __Hung-Min Sun__ and S. P. Shieh, 1997 (December), "​Optimal Information Dispersal for Increasing Reliability of a Distributed Service,"​ //**IEEE Transactions on Reliability**//,​ Vol. 46, No. 4, pp. 462-472, New York, IEEE Press. +
-  - [J9] __Hung-Min Sun__ and S. P. Shieh, 1998 (March), "​Secure Broadcasting in Large Networks,"​ //Computer Communications//,"​ Vol. 21, No. 3, pp. 279-283, New York, IPC Science and Technology Press. (SCI) +
-  - [J10] __Hung-Min Sun__ and S. P. Shieh, 1998 (October), "​Secret Sharing Schemes for Graph-Based Prohibited Structures,"​ //Computers and Mathematics with Applications//,​ Vol. 36, No. 7, pp. 131-140, New York, Pergamon Press. (SCI) +
-  - [J11] __Hung-Min Sun__, S. P. Shieh, and H. M. Sun, 1999 (January), "A Note on Breaking and Repairing a Secure Broadcasting in Large Networks,"​ //Computer Communications//,​ Vol. 22. No. 2, pp. 193-194, New York, IPC Science and Technology Press. (SCI) +
-  - [J12] __Hung-Min Sun__ and S. P. Shieh, 1999 (February), "​Recursive Constructions for Secret Sharing Schemes,"​ //Computers and Mathematics with Applications//,​ Vol. 37, No. 3, pp. 87-96, New York, Pergamon Press. (SCI) +
-  - [J13] __Hung-Min Sun__, 1999 (May), "​On-line Multiple Secret Sharing based on a One-way Function,"​ //Computer Communications//,​ Vol. 22, No. 8, pp. 745-748, New York, IPC Science and Technology Press. (SCI) +
-  - [J14] __Hung-Min Sun__, 1999 (May), "An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers,"​ //Computer Communications//,​ Vol. 22, No. 8, pp. 717-722, New York, IPC Science and Technology Press. (SCI) +
-  - [J15] __Hung-Min Sun__, 1999 (July), "New Construction of Perfect Secret Sharing Schemes for Graph-based Prohibited Structures,"​ //Computers & Electrical Engineering//,​ Vol. 25, No. 4, pp. 267-278, New York, Pergamon Press. (SCI) +
-  - [J16] __Hung-Min Sun__, 1999 (August), "​Comments on Improved Group Signature Scheme based on Discrete Logarithm Problem,"​ //IEE Electronics Letters//, Vol. 35, No. 16, pp. 1323-1324, London, IEE Press. (SCI) +
-  - [J17] __Hung-Min Sun__ and S. P. Shieh, 1999 (September),​ "​Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures,"​ //Journal of Information Science & Engineering//,​ Vol. 15, No. 5, pp. 679-690, Taipei, Institute of Information Science Academia Sinica Press. (SCI) +
-  - [J18] __Hung-Min Sun__, N. Y. Lee, and T. Hwang, 1999 (September),​ "​Threshold Proxy Signatures,"​ //IEE Proceedings - Computers and Digital Techniques//,​ Vol. 146, No. 5, pp. 259-263, London, IEE Press. (SCI) +
-  - [J19] __Hung-Min Sun__, B. J. Chen, and T. Hwang, 1999 (October), "​Cryptanalysis of Group Signature Scheme Using Self-Certified Public Keys," //IEE Electronics Letters//, Vol. 35, No. 22, pp. 1938-1939, London, IEE Press. (SCI) +
-  - [J20] __Hung-Min Sun__, 1999 (November), "On Private-key Encryption Using Product Codes,"​ //Computers & Electrical Engineering//,​ Vol. 25, No. 6, pp. 439-450, New York, Pergamon Press. (SCI) +
-  - [J21] __Hung-Min Sun__, 1999 (November), "​Security of a Broadcasting Cryptosystem in Computer Networks,"​ //IEE Electronics Letters//, Vol. 35, No. 24, pp. 2108-2109, London, IEE Press. (SCI) +
-  - [J22] __Hung-Min Sun__, 2000 (January), "​Further Cryptanalysis of the McEliece Public-Key Cryptosystem,"​ //**IEEE Communications Letters**//,​ Vol. 4, No. 1, pp. 18-19, New York, IEEE Press. (SCI) +
-  - [J23] __Hung-Min Sun__, 2000 (June), "On the Dealer’s Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank," //​**International Journal of Foundations of Computer Science**//,​ Vol. 11, No. 2, pp. 263-281, Singapore, World Scientific Press. (SCI) +
-  - [J24] S. P. Shieh, C. T. Lin, W. B. Yang, and __Hung-Min Sun__, 2000 (July), “Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems,” //**IEEE Trans. on Vehicular Technology**//,​ Vol. 49, No. 4, pp. 1464-1473, New York, IEEE Press. (SCI) +
-  - [J25] C. L. Lin, __Hung-Min Sun__ , and T. Hwang, 2000 (October), “Three-Party Encrypted Key Exchange: ​ Attacks and a Solution,​” //ACM Operating Systems Review//, Vol. 34, No. 4, pp. 12-20, New York, ACM Press. (EI) +
-  - [J26] __Hung-Min Sun__, 2000 (November), "An Efficient Remote User Authentication Scheme Using Smart Cards,"​ //IEEE Transactions on Consumer Electronics//,​ Vol. 46, No. 4, pp. 958-961, New York, IEEE Press. (SCI) +
-  - [J27] __Hung-Min Sun__, “Enhancing the Security of the McEliece Public-Key Cryptosystem,"​ //Journal of Information Science & Engineering//,​ Vol. 16, No. 6, pp. 799-812, Taipei, Institute of Information Science Academia Sinica Press. (SCI) +
-  - [J28] __Hung-Min Sun__, 2000 (November), "​Design of Time-Stamped Proxy Signatures with Traceable Receivers,"​ //IEE Proceedings - Computers and Digital Techniques//,​ Vol 147, No. 6, pp. 462-466, London, IEE Press. (SCI) +
-  - [J29] C. L. Lin, __Hung-Min Sun__, and T. Hwang, “Efficient and Practical DHEKE Protocols ,” //ACM Operating Systems Review//, Vol. 35, No. 1, pp. 41-47, 2001 (January), New York, ACM Press +
-  - [J30] __Hung-Min Sun__, 2001 (February) "​Cryptanalysis of a Public-Key Cryptosystem Based on Generalised Inverses of Matrices,"​ //**IEEE Communications Letters**//,​ Vol. 5, No. 2, pp. 61-63, New York, IEEE Press. (SCI) +
-  - [J31] C. L. Lin, __Hung-Min Sun__, and T. Hwang, 2001, "​Attacks and Solutions on Strong-Password Authentication,"​ //IEICE Transactions on Communications//,​ Vol.E84-B, No.9, pp.2622-2627,​ Tokyo, IEICE Press. (SCI) +
-  - [J32] H. T. Yeh, __Hung-Min Sun__, and T. Hwang, 2001 (November), "​Security Analysis of the Generalized Key Agreement and Password Authentication Protocol,"​ //**IEEE Communications Letters**//,​ Vol. 5, No. 11, pp. 462-463, New York, IEEE Press. (SCI) +
-  - [J33] C. L. Lin, __Hung-Min Sun__, M. Steiner, and T. Hwang, 2001 (December), "​Three-party Encrypted Key Exchange Without Server Public-Keys,"​ //**IEEE Communications Letters**//,​ Vol 5., No. 12, pp. 497-499, New York, IEEE Press. (SCI) +
-  - [J34] __Hung-Min Sun__, "​Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes,"​ //​Informatica//,​ Vol. 13, No. 1, pp. 105-110. (SCI) +
-  - [J35] B. T. Hsieh, __Hung-Min Sun__, and T. Hwang, 2002 (January), “Cryptanalysis of an Enhancement for the Simple Authentication Key Agreement Algorithm,​” //IEE Electronics Letters//, Vol. 38, No. 1, pp. 20-21, London, IEE Press. (SCI) +
-  - [J36] __Hung-Min Sun__, 2002 (January), “On the Security of a Variation of Cramer-Shoup’s Public Key Scheme,” //Journal of Information Science & Engineering//,​ Vol. 18, No 1, pp. 19-22, Taipei, Institute of Information Science Academia Sinica Press. (SCI) +
-  - [J37] __Hung-Min Sun__, W. C. Yang, and C. S. Laih, 2002 (January), “On the Design of RSA with Short Secret Exponent,​” //Journal of Information Science & Engineering//,​ Vol. 18, No. 1, pp. 1-18, Taipei, Institute of Information Science Academia Sinica Press. (SCI) **(This paper received the Annual //JISE// Best Paper Award in 2003, the only one out of 64 papers)** +
-  - [J38] __Hung-Min Sun__ and B. L. Chen, 2002 (March), "​Weighted Decomposition Construction for Perfect Secret Sharing Schemes,"​ //Computers and Mathematics with Applications//,​ Vol. 43, Iss. 6-7, pp. 877-887, New York, Pergamon Press. (SCI) +
-  - [J39] H. T. Yeh and __Hung-Min Sun__, 2002 (October), “Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attacks,” ACM Operating Systems Review, Vol. 36, No. 4, pp. 14-22, New York, ACM Press. (EI) +
-  - [J40] __Hung-Min Sun__, H. T. Yeh, and T. Hwang, 2003, “On the Linkability of Some Group Signature Schemes,” //​Informatica//,​ Vol. 14, Issue 1, pp. 85-94. (SCI) +
-  - [J41] B. T. Hsieh, __Hung-Min Sun__, and T. Hwang, “On the Security of Some Password Authentication Protocols,​” //​Informatica//,​ Vol. 14, No. 2, pp. 195-204, 2003. (SCI) +
-  - [J42] X. Yi, C. K. Siew, __Hung-Min Sun__, H. T. Yeh, C. L. Lin, and T. Hwang, 2003 (March), “Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications,​” //**IEEE Trans. on Vehicular Technology**//,​ Vol. 52, No. 2, pp. 465-468. (SCI) +
-  - [J43] __Hung-Min Sun__ and H. T. Yeh, 2003 (April), "​Further Cryptanalysis of a Password Authentication Scheme with Smart Cards,"​ //IEICE Transactions on Communications//,​ Vol.E86-B, No 4, pp. 1412-1415, Tokyo, IEICE Press. (SCI) +
-  - [J44] H. T. Yeh, __Hung-Min Sun__, and T. Hwang, 2003 (July-August),​ “Improved Authenticated Multiple-Key Agreement Protocol,​” //Computers and Mathematics with Applications//,​ Vol. 46, Issue 2-3, pp. 207-211, New York, Pergamon Press. (SCI)  +
-  - [J45] H. T. Yeh, __Hung-Min Sun__ and T. Hwang, 2003 (November), "​Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks,"​ //Journal of Information Science & Engineering//,​ Vol.19 No.6, pp.1059-1070,​ Taipei, Institute of Information Science Academia Sinica Press. (SCI)  +
-  - [J46] H. T. Yeh, __Hung-Min Sun__, C. T. Yang, B. C. Chen, and S. M. Tseng, 2003 (November) , "​Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks,"​ //IEICE Transactions on Communications//,​ Vol. E86-B, No. 11, pp. 3278-3282, Tokyo, IEICE Press. (SCI) +
-  - [J47] H. T. Yeh, __Hung-Min Sun__, and B. T. Hsieh, 2004 (January), “Security of a Remote User Authentication Scheme Using Smart Cards,” //IEICE Transactions on Communications//,​ Vol.E87-B No.1 pp.192-194, Tokyo, IEICE Press. (SCI) +
-  - [J48] __Hung-Min Sun__, B. C. Chen, and H. T. Yeh, 2004 (May), “On the Design of Time-Stamped Signatures,​” //**Journal of Computer and System Sciences (JCSS)**//, Vol. 68, No. 3, pp. 598-610. (SCI) +
-  - [J49] H. T. Yeh and __Hung-Min Sun__, 2004 (June), “Password-Based User Authentication and Key Distribution Protocols for Client-Server Applications,​” //Journal of Systems and Software//, Vol. 72, No. 1, pp. 97-103. (SCI) +
-  - [J50] B. T. Hsieh and __Hung-Min Sun__, 2004 (October), “An Improvement of a Deniable Authentication Protocol,​” //IEICE Transactions on Communications//,​ Vol.E87-B No.10 pp.3099-3101,​ Tokyo, IEICE Press. (SCI) +
-  - [J51] C. L. Lin, H.A. Wen, T. Hwang and __Hung-Min Sun__, 2004 (November), “Provably Secure Three-Party Password-Authenticated Key Exchange,​” //IEICE Transactions on Fundamentals of Electronics,​ Communications and Computer Sciences//, Vol. E87-A, No. 11, pp. 2990-3000, Tokyo, IEICE Press. (SCI) +
-  - [J52] __Hung-Min Sun__, B. T. Hsieh, and S. J. Hwang, 2005 (January), “Secure Email Protocols Providing Perfect Forward Secrecy,” //**IEEE Communications Letters**//,​ Vol. 9, No. 1, pp. 58-60, New York, IEEE Press. (SCI) +
-  - [J53] __Hung-Min Sun__, B.-C. Chen, T. Hwang, 2005, “Secure key agreement protocols for three-party against guessing attacks,” //Journal of Systems and Software//, Vol. 75, No. 1-2, pp. 63-68. (SCI) +
-  - [J54] __Hung-Min Sun__, B.-T. Hsieh, S.-M. Tseng, 2005, ”On the security of some proxy blind signature schemes,” //Journal of Systems and Software//, Vol. 74, No. 3, pp. 297-302. (SCI)   +
-  - [J55] H.T. Yeh and __Hung-Min Sun__, 2005 (May), “Password authenticated key exchange protocols among diverse network domains,” //Computers & Electrical Engineering//,​ Vol. 31, No. 3, pp. 175-189. (SCI) +
-  - [J56] __Hung-Min Sun__ and H.T. Yeh, 2006 (September),​ “Password-based authentication and key distribution protocols with perfect forward secrecy,” //**Journal of Computer and System Sciences (JCSS)**//, Vol. 70, No. 6, pp. 1002-1011, 2006. (SCI) +
-  - [J57] __Hung-Min Sun__, M.-E. Wu, W.-C. Ting, and M. Jason Hinek, 2007 (August), “Dual RSA and Its Security Analysis,​” //**IEEE Transactions on Information Theory**//, vol. 53, no. 8, pp. 2922-2933, 2007. (SCI) +
-  - [J58] Y. Chen, J.-S. Chou, and __Hung-Min Sun__, “A novel mutual authentication scheme based on quadratic residues for RFID systems,” //​**Computer Networks**//​ Vol. 52, No. 12, pp. 2373-2380, 2008. (SCI) +
-  - [J59] __H,.-M. Sun__, C.-M. Chen, and C.-Z. Shieh, 2008, “Flexible-Pay-Per-Channel:​ A New Model for Content Access Control in Pay-TV Broadcasting Systems,” //**IEEE Transactions on Multimedia**//,​ 2008, Vol. 10, No 6, pp. 1109-1120, 2008. (SCI)  +
-  - [J60] C.-H. Yang, C.-Y. Weng, S.-J. Wang, and __Hung-Min Sun__, 2008, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,” //**IEEE Transactions on Information Forensics and Security**//,​ Vol. 3, No. 3, pp. 488-497, 2008. (SCI) +
-  - [J61] __Hung-Min Sun__, C.-T. Yang, and M.-E. Wu, 2009 (March) “Short-Exponent RSA,” //IEICE Transactions on Fundamentals of Electronics//,​ Communications and Computer Sciences, Vol. E92-A, No.3, pp. 912-918, 2009. (SCI) +
-  - [J62] __Hung-Min Sun__ and W.-C. Ting, 2009, “A Gen2-based RFID Authentication Protocol for Security and Privacy,” //**IEEE Trans. on Mobile Computing**//,​ Vol. 8, No. 8, pp. 1052-1062, 2009. (SCI) +
-  - [J63] __Hung-Min Sun__, M.-E. Wu, and C.-T. Yang, “A Note on Factoring α-LSBS Moduli,” //IEICE Transactions on Fundamentals of Electronics//,​ Communications and Computer Sciences, Vol. E92-A, No. 8, pp. 2137-2138, 2009. (SCI) +
-  - [J64] __Hung-Min Sun__ and M.-C. Leu, “An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” //**IEEE Transactions on Multimedia**//,​ Vol. 11, No. 5, pp. 947-959, 2009. (SCI) +
-  - [J65] __Hung-Min Sun__, M.-E. Wu, and C.-T. Yang, "​Simple Backdoors on RSA Modulus by Using RSA Vulnerability,"​ //IEICE Transactions on Fundamentals of Electronics//,​ Communications and Computer Sciences, Vol. E92-A, No. 9, pp. 2326-2332, 2009. (SCI) +
-  - [J66] __Hung-Min Sun__, K.-H. Wang, and C.-M. Chen, 2009 (April-June) “On the Security of an Efficient Time-Bound Hierarchical Key Management,"​ //**IEEE Transactions on Dependable and Secure Computing**//,​ Vol. 6, No. 2, pp. 159-160, 2009. (SCI) +
-  - [J67] __Hung-Min Sun__, M.-E. Wu, M. J. Hinek, C.-T. Yang, and V. S. Tseng, “Trading Decryption for Speeding Encryption in Rebalanced-RSA,​” //Journal of Systems and Software//, Vol. 82, No. 9, pp. 1503-1512, 2009. (SCI) +
-  - [J68] __Hung-Min Sun__, K.-H. Wang, and W.-C. Ting, “On the Security of Secure Arithmetic Code,” //**IEEE Transactions on Information Forensics and Security**//,​Vol. 4, No. 4, pp. 781-789, 2009. (SCI) +
-  - [J69] __Hung-Min Sun__ and M.-C. Leu, “Low-Exponent Encryption for Video Protection Using Context-Key Control Hung-Min Sun,” //Journal of Information Assurance and Security//, Vol. 5, Iss. 1, pp. 595-602, 2010. (SCI) +
-  - [J70] C.-H. Yang, C.-Y. Weng, S.-J. Wang, __Hung-Min Sun__, “Grouping Strategies for Promoting Image Quality of Watermarking on the Basis of Vector Quantization,​” //Journal of Visual Communication and Image Representation//,​ Vol. 21, No. 1, pp. 49-55, 2010. (SCI) +
-  - [J71] C.-H. Yang, C.-Y. Weng, S.-J. Wang, Hung-Min Sun, “Varied PVD+ LSB Evading Detection Programs to Spatial Domain in Data Embedding Systems,” //Journal of Systems and Software//, Vol. 83, No. 10, pp 1635-1643, 2010. (SCI) +
-  - [J72] Hung-Min Sun, H. Wang, B.-H. Ku, and J. Pieprzyk, “Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time,” //**SIAM Journal on Discrete Mathematics**//,​ Vol. 24, No. 2, pp. 617-638, 2010. (SCI) +
-  - [J73] Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, __Hung-Min Sun__, and B.-Y. Yang, “SPATE: Smallgroup PKI-less Authenticated Trust Establishment,​” //**IEEE Transactions on Mobile Computing**//,​ Vol. 9, No. 12, pp. 1666-1681, 2010. (SCI), NSC 97-2745-P-001-001 +
-  - [J74] __Hung-Min Sun__, W.-C. Ting, and K.-H. Wang, “On the Security of Chien'​s Ultra-lightweight RFID Authentication Protocol,​” //**IEEE Transactions on Dependable and Secure Computing**//,​ Vol. 8, No. 2, pp. 315-317, 2011. (SCI) +
-  - [J75] __Hung-Min Sun__, C.-Y. Weng, C.-F. Lee, and C.-H. Yang, “Anti-forensics with Steganographic Data Embedding in Digital Images,” //**IEEE Journal on Selected Areas in Communications**//,​ Vol. 29, No. 7, pp. 1392-1403, 2011. (SCI) +
-  - [J76] __Hung-Min Sun__, Y. Chen, J.-S. Chou, Hung-Min Sun, and M.-H. Cho, "A novel electronic cash system with trustee-based anonymity revocation from pairing,"​ Electronic Commerce Research and Applications,​ Vol. 10, No. 6, pp. 673-682, 2011. (SCI, SSCI) +
-  - [J77] __Hung-Min Sun__, H. Wang, K.-H. Wang, and C.-M. Chen, “A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code”, Vol. 60. No. 6, pp. 813-823, 2011. (SCI) +
-  - [J78] __Hung-Min Sun__, Y.-H. Chen, and Y.-H. Lin, "​oPass:​ A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks,"​ //**IEEE Transactions on Information Forensics and Security**//,​ Vol. 7, No. 2, pp. 651-663, 2012. (SCI) +
-  - [J79] Y. Chen, J.-S. Chou, and __Hung-Min Sun__, " A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing,"​ by Chen, Chou, Sun and Cho (2011),"​ Electronic Commerce Research and Applications,​ Vol. 11, No. 4, pp. 443-444, 2012. (SCIE, SSCI) +
-  - [J80] __Hung-Min Sun__, C.-H. Chen, and Y.-F. Ku, "A novel acknowledgment-based approach against collude attacks in MANET,"​ Expert Systems with Applications,​ Vol. 39, No.9, pp. 7968-7975, 2012. (SCI) +
-  - [J81] Xinyi Huang, Cheng-Kang Chu, __Hung-Min Sun__, Jianying Zhou, Robert H. Deng, "​Enhanced authentication for commercial video services,"​ Security and Communication Networks, Vol. 5, No. 11, pp. 1248-1259, 2012. (SCI) +
-  - [J82] C.-M. Chen, Y.-H. Lin, and Y.-C. Lin, and __Hung-Min Sun__, “RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks,​” //**IEEE Transactions on Parallel and Distributed Systems**//,​ Vol. 23, No. 4, pp. 727-734, 2012. (SCI) +
-  - [J83] S.-Y. Chang, Y.-H. Lin, __Hung-Min Sun__, and M.-E. Wu, “Practical RSA Signature Scheme Based on Periodical Re-keying for Wireless Sensor Networks”,​ //**ACM Transactions on Sensor Networks**//,​ Vol. 8, No. 2, Article 13, p. 1-13, 2012. (SCIE) +
-  - [J84] __Hung-Min Sun__, C.-H. Chen, C.-W. Yeh, and Y.-H. Chen, "A Collaborative Routing Protocol against Routing Disruptions in MANETs,"​ //Personal and Ubiquitous Computing//,​ Vol. 17, No. 5, pp. 865-874, 2013. (SCI) +
-  - [J85] Y.-C. Chen, Y.-S. Yu, R.-S. Chen, I-H. Chou, __Hung-Min Sun__, K.-C. Yeh, "​Intelligent Radioactive Waste Management Platform for Radioactive Waste Storage,"​ //Nuclear Technology//,​ Vol. 182, No. 3, pp. 358-368, 2013. (SCI) +
-  - [J86] __Hung-Min Sun__, C.-Y. Weng, S.-J. Wang*, C.-H. Yang, “Data Embedding in Image-media using Weight-function on Modulo Operations,​” //**ACM Transactions on Embedded Computing Systems**//,​ Vol. 12, No. 2, Article 21, 2013. (SCIE)  +
-  - [J87] Yue-Hsun Lin, Shih-Ying Chang, and __Hung-Min Sun__, "​CDAMA:​ Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks,"​ //**IEEE Transactions on Knowledge and Data Engineering**//,​ Vol. 25, No. 7, pp. 1471-1483, 2013. (SCI) +
-  - [J88] C.-M. Chen, K.-H. Wang, T.-Y. Wu, J.-S. Pan, __Hung-Min Sun__, "A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices,"​ //**IEEE Transactions on Information Forensics and Security**//,​ Vol. 8, No. 8, pp. 1318-1330, 2013. (SCI) +
-  - [J89] P. Chao and __Hung-Min Sun__, "​Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study,"​ //​**Information Sciences**//,​ Vol. 245, pp.255-275, 2013. (SCI) +
-  - [J90] M.-E. Wu, C.-M. Chen, Y.-H. Lin, and __Hung-Min Sun__, "On the Improvement of Wiener Attack on RSA with Small Private-exponent,"​ //The Scientific World Journal//, Article ID 650537, 9 pages, 2014.  (SCI)   +
-  - [J91] C.-M. Chen, S.-M. Chen, X. Zheng, P.-Y. Chen, and __Hung-Min Sun__, "A Secure RFID Authentication Protocol Adopting Error Correction Code," //The Scientific World Journal//, Article ID 704623, 12 pages, 2014. (SCI) +
-  - [J92] C.-M. Chen, Y.-H. Chen, Y.-H. Lin, __Hung-Min Sun__, "​Eliminating Rouge Femtocells based on Distance Bounding Protocol and Geographic Information,"​ Expert Systems with Applications,​ Vol. 41, No. 2, pp. 426-433, 2014. (SCIE) +
-  - [J93] B.-Z. He, C.-M. Chen, Y.-P. Su, __Hung-Min Sun__, "A Defence Scheme Against Identity Theft Attack based on Multiple Social Networks,"​ //Expert Systems with Applications//,​ Vol. 41, No. 5, pp. 2345-2352, 2014. (SCIE)  +
-  - [J94] S.-M. Chen, M.-E. Wu, __Hung-Min Sun__, K.-H. Wang, "​CRFID:​ An RFID system with a cloud database as a back-end server,"​ //**Future Generation Computer Systems**//,​ Vol. 30, pp. 155-161, 2014. (SCIE)  +
-  - [J95] M.-E. Wu, R. Tso, __Hung-Min Sun__, "On the Improvement of Fermat Factorization Using a Continued Fraction Technique,"​ //**Future Generation Computer Systems**//,​ Vol. 30, pp. 162-168, 2014.  (SCIE)  +
-  - [J96] M.-E. Wu, S.-Y. Chang, C.-J. Lu, __Hung-Min Sun__, "A Communication-Efficient Private Matching Scheme in Client-Server Model,"​ //​**Information Sciences**//,​ Vol. 275, pp. 348-359, 2014. (SCI)  +
-  - [J97] Chien-Ming Chen, Shaui-Min Chen, Wei-Chih Ting, Chi-Yi Kao, __Hung-Min Sun__ (2015, Feb). An enhancement of return address stack for security. //Computer Standards & Interfaces//,​ Volume 38, pp.17–24. (SCIE)  +
-  - [J98] __Hung-Min Sun__, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang (2015, Nov). A provable authenticated group key agreement protocol for mobile environment. //​**Information Sciences**//,​ Volume 321, pp. 224–237. (SCI) +
-  - [J99] __Hung-Min Sun__, Shiuan-Tung Chen, Jyh-Haw Yeh, Chia-Yun Cheng (2016, Feb). A Shoulder Surfing Resistant Graphical Authentication System. //**IEEE Transactions on Dependable and Secure Computing**//,​ Issue 99. (Accepted). (SCIE) +
-  - [J100] Wei Wu, Chen-Li Huang, Shiian-Tung Chen, __Hung-Min Sun__ (2016, Jul). An Integration System of Communication App on Image Recognition. //Journal of Internet Technology//​. (Accepted). (SCI)  +
-  - [J101] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Ruey-Kai Sheu, __Hung-Min Sun__ (2016, Nov). Personal video delivery with rapid Raptor code decoder. //Personal and Ubiquitous Computing//,​ Volume 20, Issue 6, pp 915–931. (SCIE).  +
-  - [J102] Wei Wu, Jaime Alvarez, Chengcheng Liu, __Hung-Min Sun__ (2016, Dec). Bot Detection Using Unsupervised Machine Learning. Microsystem Technologies. (Accepted). (SCI) +
-  - [J103] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, __Hung-Min Sun__ (2017, Apr). Fast and low-complexity encoding of Raptor codes based on operation lists for known source block lengths. //​Multimedia Tools and Applications//,​ Vol. 76, No. 7, pp. 9219-9243. (SCIE) +
-==== Selected Conference Papers ==== +
-  - [C1] __Hung-Min Sun__ and T. Hwang, "On the Generation of Large Nonsingular Matrix Pairs and Permutation Matrices for Algebraic-Code Cryptosystems,"​ //​Proceedings of National Computer Symposium 1989//, pp. 796-801. +
-  - [C2] __Hung-Min Sun__ and T. Hwang, "​Public-Key ID-Based Cryptosystem,"​ //​Proceedings of 1991 **IEEE International Carnahan Conference on Security Technology**//,​ October 1-3, 1991, pp 142-144. +
-  - [C3] __Hung-Min Sun__ and T. Hwang, "An Efficient Probabilistic Public-Key block Encryption and Signature Scheme Based on ElGamal'​s Scheme,"​ //​Proceedings of 1991 IEEE International Carnahan Conference on Security Technology//,​ October 1-3, 1991, pp 45-148. +
-  - [C4] __Hung-Min Sun__ and T. Hwang, "​Group-Oriented Threshold Schemes,"​ //​Proceedings of the International Conference on Information Engineering//,​ 2-5, December 1991, pp. 485-493. +
-  - [C5] T. Hwang and __Hung-Min Sun__, "Key Management of the Threshold Schemes,"​ //​Proceedings of International Symposium on Communications//,​ December 9-13, 1991, pp. 602-605. +
-  - [C6] S. P. Shieh, C. C. Wang and __Hung-Min Sun__, "​Intrusion Detection in Computer Networks,"​ //​Proceedings of the Third Conference on Information Security//, A.2_4.1-A.2_4.11,​ 1993. +
-  - [C7] __Hung-Min Sun__ and S. P. Shieh, "A Secret Sharing Scheme for Hierarchical User Groups,"​ //​Proceedings of the 8th International Joint Workshop on Computer Communication//,​ G3.1.1-G3.1.4,​ December 12-14, 1993. +
-  - [C8] __Hung-Min Sun__ and S. P. Shieh, "​Optimal Information Dispersal for Reliable Communication in Computer Networks,"​ in //​Proceedings of the 1994 International Conference on Parallel and Distributed Systems (ICPADS'​94)//,​ pp. 460-464, December 19-21, 1994. (NSC-83-0404-E-009-106) +
-  - [C9] __Hung-Min Sun__ and S. P. Shieh, "On Constructing Secret Sharing Schemes,"​ //​Proceedings of the 1994 IEEE International Conference on Computer Communications,​ Networking for Global Communications **(INFOCOM'​94)**//,​ Toronto, pp. 1288-1292, 1994. (NSC-82-0408-E-009-290) +
-  - [C10] __Hung-Min Sun__ and S. P. Shieh, "​Security Analysis of Dynamic Threshold Schemes,"​ //​Proceedings of the Fourth National Conference on Information Security//, pp. 143-149, 1994. +
-  - [C11] __Hung-Min Sun__ and S. P. Shieh, "A Perfect Scheme for Secret Sharing between Two Parties,"​ //​Proceedings of the Fifth National Conference on Information Security//, pp. 136-141, 1995. +
-  - [C12] __Hung-Min Sun__ and S. P. Shieh, “Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes,” Third //**ACM Conference on Computer and Communications Security (ACM CCS'​96)**//,​ New Delhi, India, pp. 153-156, March 14-16, 1996. +
-  - [C13] __Hung-Min Sun__ and S. P. Shieh, " Secret Sharing in Graph-Based Prohibited Structures,"​ //**IEEE INFOCOM'​97**//,​ Kobe, Japan, April 9-13, 1997. +
-  - [C14] __Hung-Min Sun__ and G. Horng, "On the Security of Single Assignment Secret Sharing Schemes,"​ //​Proceedings of 1997 Information Security Conference//,​ pp. 43-47, May, 1997. +
-  - [C15] __Hung-Min Sun__ and S. P. Shieh, "On the Information Rate of Perfect Secret Sharing Schemes with Access Structures of Rank Three,"​ //​Proceedings of 1997 Information Security Conference//,​ pp. 48-54, May, 1997. +
-  - [C16] __Hung-Min Sun__, W.Y. Lin, and C.C. Chan, "The Study of Improving the Login Security,"​ //​Proceedings of National Computer Symposium 1997//, R.O.C., Vol. 2, pp. c159-c164, 1997. +
-  - [C17] __Hung-Min Sun__, S. P. Shieh, and H.M. Sun, "A Secure Broadcasting Cryptosystem in Large Computer Networks,"​ //​Proceedings of Eighth National Conference on Information Security//, May 15-16, pp. 369-378, 1998. +
-  - [C18] __Hung-Min Sun__, S. P. Shieh, and H.M. Sun, “On-line multiple secret sharing based on a one-way function,​” //​Proceedings of Eighth National Conference on Information Security//, May 15-16, pp. 331-336, 1998. +
-  - [C19] __Hung-Min Sun__, “On the Security of Cryptosystems based on Error-Correcting Codes,​” ​ //​Proceedings of Eighth National Conference on Information Security//, May 15-16, pp. 39-48, 1998. +
-  - [C20] __Hung-Min Sun__, and B. T. Shieh, “Remarks on Two Nonrepudiable Proxy Signature Schemes,” //Ninth National Conference on Information Security//, May 14-15, 1999. +
-  - [C21] __Hung-Min Sun__, N. Y. Lee, and T. Hwang, “Nonrepudiable Threshold Proxy Signatures,​” //Ninth National Conference on Information Security//, May 14-15, 1999. +
-  - [C22] __Hung-Min Sun__, and B. R. Ke, “Cryptanalysis of Chen’s Digital Signature Scheme with Message Recovery,​” //Ninth National Conference on Information Security//, May 14-15, 1999. +
-  - [C23] __Hung-Min Sun__, and H. M. Sun, “Cryptanalysis of the Wu-Dawson Public-Key Cryptosystem Based on Generalised Inverses of Matrices,​” //Ninth National Conference on Information Security//, May 14-15, 1999. +
-  - [C24] __Hung-Min Sun__, and B. J. Chen, “Unforgeable Time-Stamped Proxy Signatures with Traceable Receivers,​” //Ninth National Conference on Information Security//, May 14-15, 1999. +
-  - [C25] C. C. Chang, C. H. Wang, F. Y. Liou, and __Hung-Min Sun__, “Remarks on a Digital Signature Scheme Based on Error-Correcting Codes,” //Ninth National Conference on Information Security//, May 14-15, 1999. +
-  - [C26] __Hung-Min Sun__, and B. T. Shieh, “Improved Authenticated Key Agreement Scheme via Password Authentication,​” //National Computer Symposium 1999//. +
-  - [C27] __Hung-Min Sun__, “Convertible Proxy Signature Scheme,” //National Computer Symposium 1999//. +
-  - [C28] __Hung-Min Sun__, B. T. Hsieh, and S. J. Hwang, “Secure Email Protocols Providing Perfect Forward Secrecy,” //​Information Security Conference 2000//, May 5-6, 2000. +
-  - [C29] H. T. Yeh, __Hung-Min Sun__, and T. Hwang, “Efficient Three-Party Key Agreement Protocols Resistant to Password Guessing Attacks,” //​Information Security Conference 2000//, May 5-6, 2000. +
-  - [C30] H. A. Wen, __Hung-Min Sun__, and T. Hwang, “Optimal Key Exchange and Authentication Protocol Secure Against Dictionary and Replay Attacks,” //​Information Security Conference 2000//, May 5-6, 2000. +
-  - [C31] __Hung-Min Sun__, and G. Horng, “Improved Identification Scheme Based on Shamir’s Unbalanced RSA,” //​Information Security Conference 2000//, May 5-6, 2000. +
-  - [C32] B. C. Chen, __Hung-Min Sun__, and T. Hwang, “Four-Party Encryption Key Exchange,​”//​ 2000 International Computer Symposium (ICS2000)//,​ Dec. 6-8, 2000. +
-  - [C33] __Hung-Min Sun__, “On Proxy Multi-Signature Schemes,” //2000 International Computer Symposium (ICS2000)//,​ Dec. 6-8, 2000. +
-  - [C34] B. C. Chen, __Hung-Min Sun__, and T. Hwang, “An Improved Group Signature Scheme Using Proxy Provers,” //​Information Security Conference 2001//, May 4-5, 2001. +
-  - [C35] H. T. Yeh, __Hung-Min Sun__, and T. Hwang, “Improvement of Efficient Three-Party Key Agreement Protocols Resistant to Password Guessing Attacks,” //​Information Security Conference 2001//, May 4-5, 2001. +
-  - [C36] H. T. Yeh, __Hung-Min Sun__, and T. Hwang, “Improved Authenticated Multiple-Key Agreement Protocol,​” //​Information Security Conference 2001//, May 4-5, 2001. +
-  - [C37] __Hung-Min Sun__, “Cryptanalysis of Password Authentication Schemes with Smart Cards,” //​Information Security Conference 2001//, May 4-5, 2001. +
-  - [C38] __Hung-Min Sun__, “Cryptanalysis of a Digital Signature Scheme based on Factoring and Discrete Logarithms,​” //National Computer Symposium//,​ Dec. 20-21, 2001. +
-  - [C39] H. T. Yeh, __Hung-Min Sun__, and T. Hwang, “Cryptanalysis of Authenticated Key Agreement Protocols,​” //National Computer Symposium//,​ Dec. 20-21, 2001. +
-  - [C40] __Hung-Min Sun__, B. T. Hsieh, and C. T. Lin, “Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme,” //​Information Security Conference 2002//, pp. 151-154, 2002. +
-  - [C41] B. T. Hsieh, __Hung-Min Sun__, T. Hwang, and C. T. Lin, “An Improvement of Saeednia’s Identity-based Key Exchange Protocol,​” Information Security Conference 2002, pp. 41-43, 2002. +
-  - [C42] __Hung-Min Sun__, B. T. Hsieh, T. Hwang, and C. T. Lin, “Analysis of A Blind Signature Scheme Based on ElGamal Signature,​” //​Proceedings of 2002 Symposium on Digital Life and Internet Technologies//​. +
-  - [C43] B. T. Hsieh, H. T. Yeh, __Hung-Min Sun__ and C. T. Lin, “Crytanalysis of a fingerprint-based remote user authentication scheme using smart cards”, //2003 IEEE International Carnahan Conference on Security Technology//,​ 2003. +
-  - [C44] __Hung-Min Sun__ and B. T. Hsieh, “Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection”,​ //2003 IEEE International Carnahan Conference on Security Technology//,​ 2003. +
-  - [C45] B.C. Chen, __Hung-Min Sun__, and C. H. Chen, “A Fair and Secure Key Escrow Scheme,” //​Information Security Conference 2003//. +
-  - [C46] __Hung-Min Sun__ and C. T. Yang, “On the Security of A Publicly Verifiable Authenticated Encryption”,​ //​Information Security Conference 2003//. +
-  - [C47] H. T. Yeh and __Hung-Min Sun__, “Password-Based Authentication and Key Distribution Protocols with Perfect Forward Secrecy,” //​Information Security Conference 2003//. +
-  - [C48] __Hung-Min Sun__ and B. T. Hsieh, "On the Security of Some Proxy Blind Signature Schemes",​ //​Australasian Information Security Workshop (AISW 2004)// +
-  - [C49] __Hung-Min Sun__, B. T. Hsieh, and S.-M. Tseng, “Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol,​” //IEEE International Conference on e-Technology,​ e-Commerce, and e-Service//,​ pp. 563-566, 2004. +
-  - [C50] __Hung-Min Sun__, C.-T. Yang, and B.-T. Hsieh, “Cryptanalysis of a Threshold Proxy Signature Scheme,” //​Information Security Conference 2004//, pp. 360-365, 2004. +
-  - [C51] __Hung-Min Sun__ and B. T. Hsieh, “Remarks on Designing Proxy Signature Schemes,” Information Security Conference 2004, pp. 353-359, 2004.  +
-  - [C52] __Hung-Min Sun__ and M.-E. Wu, “Design of Rebalanced RSA-CRT for Fast Encryption,​” //​Information Security Conference 2005//, June 9-10, 2005. **(This paper received the best paper award, the only one out of 58 papers.)** +
-  - [C53] __Hung-Min Sun__, Y.-K. Peng, and C.-M. Chen, “A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks,” //​Information Security Conference 2005//, June 9-10, 2005. +
-  - [C54] __Hung-Min Sun__, K.-C. Yang, and K.-H. Wang, “Transferable DRM System for Two New Business Models,” //​Information Security Conference 2005//, June 9-10, 2005. +
-  - [C55] __Hung-Min Sun__, C.-F. Hung, and B.-H. Ku, “An Improved Identity-Based DRM System,” //​Information Security Conference 2005//, June 9-10, 2005. +
-  - [C56] __Hung-Min Sun__, C.-J. Hong, and C.-H. Chen, “A New Approach to Feature-Based Copyright Protection of Images,” //3rd International Conference on Information Technology: Research and Education, (ITRE 2005)//, June 27-30, 2005, IEEE Press. +
-  - [C57] S.-W. Chen, W.-C. Ting, __Hung-Min Sun__, Y. Hsu, “Modified AES for Wireless Sensor Networks,​” //2005 National Computer Symposium//,​ Dec 15-16, 2005. **(This paper received the best paper award.)** +
-  - [C58] __Hung-Min Sun__, C.-Z. Shieh, and C. M. Chen, “An Efficient and Flexible Key Distribution Scheme for Conditional Access System in Pay-TV Systems,” //​Information Security Conference 2006//, June, 2006. **(This paper received the best paper award, the only one out of 71 papers.)** +
-  - [C59] __Hung-Min Sun__, Y.-H. Chen, and K.-H. Wang, “An Image Data Hiding Scheme being Perfectly Imperceptible to Histogram Attacks,” //Image and Vision Computing New Zealand 2006 (IVCNZ 2006)//, November 27-29, 2006, New Zealand. +
-  - [C60] __Hung-Min Sun__, C.-F. Hung, and C.-M. Chen, “An Improved Digital Rights Management System Based on Smart Cards",​ //2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007)//, Feb. 21-23, 2007, Australia. +
-  - [C61] __Hung-Min Sun__, S.-P. Hsu, and C.-M. Chan, “Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks,​” //The IEEE 21st International Conference on Advanced Information Networking and Applications (IEEE AINA-07)//, May 21-23, 2007, Canada. +
-  - [C62] __Hung-Min Sun__, C.-Y. Weng, and S.-J. Wang, “Histogram-based Undetectable Fidelity Image in Steganography as MSB Controller,​” in //​Proceedings of the Second International Conference on Ubiquitous Information Management and Communication,​ ICUIMC'​08//,​ Jan 31-Feb. 2, 2008, Korea, ACM press. +
-  - [C63] __Hung-Min Sun__, Y.-H. Lin, S.-M. Chen, and Y.-C. Shen, “Secure and Fast Handover Scheme based on Pre-authentication Method for 802.16/​WiMAX Infrastructure Network,” In //​Proceeding of TENCON 2007-2007 IEEE Region 10 Conference//,​ pp. 1-4, 2007. +
-  - [C64] __Hung-Min Sun__, Y.-T. Tseng, and Y.-H. Lin, “Detecting the Code Injection by Hooking System Calls in Windows Kernel Mode,” //ICS 2007//. +
-  - [C65] __Hung-Min Sun__, C.-M. Chen, F.-Y. Chu, “An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks”,​ in //​Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007)//, pp. 495-500, 2007. +
-  - [C66] __Hung-Min Sun__, S.-Y. Chang, S.-M. Chen, and C.-C. Chiu, “An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX,” //IEEE APSCC 2008, in Proceeding of the 3rd IEEE Asia-Pacific Services Computing Conference//,​ pp. 199-204, 2008. +
-  - [C67] __Hung-Min Sun__, S.-M. Chen, Y.H. Chen, H.J. Chung, and I-H. Lin, “Secure and Efficient Handover Schemes for Heterogeneous Networks,​” //IEEE APSCC 2008, in Proceeding of the 3rd IEEE Asia-Pacific Services Computing Conference//,​ pp. 205-210, 2008. +
-  - [C68] __Hung-Min Sun__, Y.-H. Lin, Y.-C. Hsiao, and C.-M. Chen, “An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks,​”In //​Proceedings of IEEE International Conference on Embedded Software and Systems (ICESS 2008)//, pp. 19-26, July 2008. **(Acceptance rate: 21%)** +
-  - [C69] __Hung-Min Sun__, K. W. Wang, “Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack”, in //​Proceedings of The International Symposium on Electronic Commerce and Security (ISECS 2008)//, pp. 385-389, IEEE Computer Society Press, 2008. +
-  - [C70] __Hung-Min Sun__, S.-Y. Chang, Y.-H. Lin, and S.-Y. Chiou, “Efficient Authentication Schemes for Handover in Mobile WiMAX,” //ISDA 2008, In Proceeding of Eighth International Conference on Intelligent Systems Design and Applications//,​ 2008. +
-  - [C71] __Hung-Min Sun__ and K.-H. Wang, “Designing an Arithmetic Code for Multimedia Files Compression and Encryption,​” //Second International Workshop on Computer Science and Engineering (WCSE 2009)//, pp. 444-448, 2009, IEEE press. +
-  - [C72] __Hung-Min Sun__, S.Y. Chang, H.T. Chaio, “A Commitment-based scheme for securing Vandermonde codes against pollution attacks,” //2009 International Symposium on Intelligent Signal Processing and Communication Systems, (ISPAC 2009)//, pp. 591-594, IEEE press. +
-  - [C73] __Hung-Min Sun__, C.-T. Yang, M.-E. Wu, and V. S. Tseng, “A Multisignature-like Scheme Based on RSA with CRT-Exponents,​” //​Cryptology and Information Security Conference 2009 (CISC2009)//,​ **(This paper received the best paper award, the only one out of 62 papers.)** +
-  - [C74] __Hung-Min Sun__, K.-C. Lin, and Y.-H. Lin, “A Novel Monitoring System Against Shellcodes Through Microsoft Windows API Hooking,” //​Cryptology and Information Security Conference 2009 (CISC2009)//​. +
-  - [C75] Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, __Hung-Min Sun__, and B.-Y. Yang, “SPATE: Small-group PKI-less Authenticated Trust Establishment,​” //The 7th Annual International Conference on Mobile Systems, Applications and Services **(MobiSys '​09)**//,​ accepted, 2009. **(acceptance rate: 20%) (This paper received the best paper award, the only one out of 26 papers. The full version of this paper was hence invited to be published in IEEE Transactions on Mobile Computing (appear in 2010).) Remark: This work was an international collaboration work mainly by Information Security Lab (National Tsing Hua University) and CyLab (Carnegie Mellon University) under iCAST international collaboration project supported by NSC & SINICA. The first author and 5th author are my Ph.D. students.** +
-  - [C76] __Hung-Min Sun__, S.-Y. Chang, Y.-H. Hung, Y.-K. Tseng, H.-T. Chiao, "​Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem,"​ ISPAN 2009, pp.260-265, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 2009. +
-  - [C77] __Hung-Min Sun__ and M.-C. Leu, “A Real-Time Selective Video Encryption Using Context-Key Control,” //The Fifth International Conference on Information Assurance and Security (ISA-2009)//,​ pp. 114-117, 2009. +
-  - [C78] S.-Y. Chiou, S.-Y. Chang, and __Hung-Min Sun__, “Common Friends Discovery with Privacy and Authenticity,​” //The Fifth International Conference on Information Assurance and Security (ISA-2009)//,​ pp. 337-340, 2009. +
-  - [C79] __Hung-Min Sun__, Y.-H. Lin, C.-T. Yang, and M.-E. Wu, “A Pair-wise Key Establishment Scheme for Wireless Sensor Networks,​” //the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2009)//,​ to be held in Kyoto, Japan on September 12-14, 2009. +
-  - [C80] __Hung-Min Sun__, C.-W. Weng, S.-J. Wang, “A Scheme of Modulo-Based Capacity-Improvement upon EMD Systems,” in //​Proceeding of IEEE Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2009)//,​ pp. 365-368, 2009, IEEE press. +
-  - [C81] __Hung-Min Sun__, S.-Y. Chang, and H.-T. Chiao, “Polynomial Interpolation Codes for Reliable Multicast Data Distribution,​” //IEEE TENCON 2009//, Vols 1-4, pp. 2466-2471, 2009. +
-  - [C82] S.-Y. Chiou, S.-Y. Chang, G. Mezzour, A. Perrig, __Hung-Min Sun__, "A Trustable Reputation Scheme Based on Private Relationships,"​ ASONAM 2009, pp.19-24,// 2009 International Conference on Advances in Social Network Analysis and Mining//, 2009. +
-  - [C83]  H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, A. Perrig, __Hung-Min Sun__, B.-Y. Yang, H. Kikuchi, “A Study of User-Friendly Hash Comparison Schemes,"​ //**ACSAC 2009**//, pp.105-114, **//2009 Annual Computer Security Applications Conference, 2009. (Acceptance rate: 19%)// (Note that: This is an international cooperative work, mainly by NTHU Security Lab and CMU security lab. The 2nd author and 5th author are my Ph.D. students.)** +
-  - [C84] Y.-H. Chen, L.-W. Huang, Y.-H. Lin, S.-W. Huang, C.-H. Yeh, and __Hung-Min Sun__, “RDAP: Rapid Deployment Authentication Protocol between Mobile Devices and Femtocells,​” in //​Proceedings of the 2010 IEEE Region 10 Conference, TENCON2010, Fukuoka, Japan: IEEE, Nov. 2010//, pp. T4–4.2. +
-  - [C85] __Hung-Min Sun__, B.-H. Ku, C.-C. Wu, T.-Y. Lin, “ Improving VQ Index Compress with Modified Relative Index Table,” //2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (CDEE)//, pp. 221-225, 2010, IEEE press. +
-  - [C86] C.-M. Chen, H.-T. Chiao, S.-T. Chen, and __Hung-Min Sun__, “A New Business Model in Pay-TV broadcasting Systems and its Conditional Access System,” in //​Proceedings of the 2010 IEEE Region 10 Conference, TENCON2010//,​ Fukuoka, Japan: IEEE, Nov. 2010, pp. T4–4.3. +
-  - [C87] Y.-H. Lin, B.Z. He, Hung-Min Sun, and Y.-H. Chen, “CDS: Concealed Data Storing Scheme in Wireless Sensor Networks,​” //​International Computer Symposium (ICS 2010)//, Dec. 2010. +
-  - [C88] H.-T. Chiao, K.-M. Li, __Hung-Min Sun__, S.-Y., Chang, H.A. Hou, “Application-Layer FEC for file delivery over the WiMAX unicast networks,​” //2010 12th IEEE Internation Conference on Communication Technology (ICCT)//, pp. 685-688, 2010, IEEE press. +
-  - [C89] __Hung-Min Sun__, S.-Y. Chang, A.B. Tello, and Y.-H. Chen, “An Authentication Scheme Balancing Authenticity and Transmission for Wireless Sensor Networks,​” //​International Computer Symposium (ICS 2010)//, Dec. 2010. **(This paper received the best paper award.)** +
-  - [C90] __Hung-Min Sun__, C.-H. Chen, and P.-C. Li, “A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks,​” //2011 ICPP workshop on Applications of Wireless Ad Hoc and Sensor Networks//, 2011. +
-  - [C91] __Hung-Min Sun__, C.-S. Chen, C.-L. Chen, Y.-H. Chen, ”A Robust Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks,​” //2011 3rd World Congress in Applied Computing, Computer Science, and Computer Engineering,​ (ACC 2011)//, 2011. +
-  - [C92] __Hung-Min Sun__, C.-H. Chen, L.-C. Hsu, Y.-H. Chen, and Y.-H. Chen, “Reliable Data Transmission against Packet Dropping Misbehavior in Wireless Ad Hoc Networks,​” //2011 IET International Communication Conference on Wireless Mobile and Computing, CCWMC 2011//, 2011 +
-  - [C93] __Hung-Min Sun__, C.-H. Chen, C.-W. Yeh, Y.-H. Chen, “A Collaborative Routing Protocol against Routing Disruptions in MANETs, ” //WCC-11 ACSA//, 2011 +
-  - [C94] __Hung-Min Sun__, S.-M. Chen, and K.-H. Wang, “Cryptanalysis on the RFID ACTION Protocol, ” //The 2011 International Conference on Security and Management (SAM'​11)//,​ 2011 +
-  - [C95] P. Chao and __Hung-Min Sun__, "​Multi-agent based cloud utilization for IT OA assets dispatching process in SCM's view: An empirical study,"​ //**2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2012**//, pp. 80-87, 2012 +
-  - [C96] C.-M. Chen, T.-Y. Wu, B.-Z. He, __Hung-Min Sun__, "An Efficient Time-Bound Hierarchical Key Management Scheme without Tamper-Resistant Devices,"​ //2012 International Conference on Computing, Measurement,​ Control and Sensor Network (CMCSN 2012)//, pp. 285-288, 2012 +
-  - [C97] __Hung-Min Sun__, Y.-H. Chen, C.-C. Fang, and S.-Y. Chang, "​PassMap:​ A Map Based Graphical-Password Authentication System,"​ //ASIACCS 2012//, 2012 +
-  - [C98] S.-T. Chen, H.-T. Chiao, S.-Y. Chang, __Hung-Min Sun__, and C.-H. Ho, Efficient Encoding of Systematic Raptor Codes Based on Operation Lists for Known Block Lengths,"​ //**2013 IEEE Wireless Communications and Networking Conference (WCNC 2013)**//, pp. 4689-4694, 2013 +
-  - [C99] S.-T Chen, H.-T. Chiao, S.-Y. Chang, __Hung-Min Sun__, P.-S. Zeng, "An HD Streaming System for WiFi Multicast Channels Based on Application-Layer FEC. //2013 IEEE 17th International Symposium on Consumer Electronics (ISCE)//, Taiwan, 2013. +
-  - [C100] C.-Y. Weng, C.-H. Yang, C.-I Fan, K.-L. Liu and __Hung-Min Sun__, " Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality,"​ //The 8th Asia Joint Conference on Information Security (AsiaJCIS 2013)//, Seoul, Korea, 2013. +
-  - [C101] L.-P. Yuan, B.-Z. He, C.-S. Liu, and __Hung-Min Sun__, " A Secure and Flexible Data Aggregation Framework for Smart Grid," ​ //The 8th International Conference on Embedded and Multimedia Computing (EMC 2013)//, 2013. +
-  - [C102] Y.-C. Chen, R.-S. Chen, C.-P. Ye, __Hung-Min Sun__, "RFID Application on Manufacturing Process Control in Semiconductor Industry,"​ //The World Congress on Engineering 2013// (WCE 2013), London, U.K., 2013. +
-  - [C103] B.-Z. He, K.-L. Huang, __Hung-Min Sun__, R. Tso, “A Virtual Network Guard System Based on Cloud Computing Environments,​” //the 8th International Conference on Genetic and Evolutionary Computing// (ICGEC 2014) October, 18-20, 2014 in Nanchang, China. +
-  - [C104] Yeh-Cheng Chen, __Hung-Min Sun__, Ruey-Shun Chen (2014, Jan). Design and implementation of wearable RFID tag for real-time ubiquitous medical care. 2014 IEEE Topical Conference on Biomedical Wireless Technologies,​ Networks, and Sensing Systems (BioWireleSS),​ Newport Beach, CA, U.S.A.  +
-  - [C105] Yuan-Yuan Su, Yu-Tzu Chang, __Hung-Min Sun__ (2015, Sep). A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices. The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2015), Adelaide, Australia.  +
-  - [C106] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, __Hung-Min Sun__ (2015, Dec). Accelerating Raptor Code Decoding Using Group Parameters for IPTV Service Delivery. 2015 IEEE International Conference on Smart City/​SocialCom/​SustainCom (SmartCity),​ Chengdu, China. +
-  - [C107] Amir Rezapour, Shiuan-Tung Chen, __Hung-Min Sun__ (2015, Dec). Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers. 2015 IEEE International Conference on Smart City/​SocialCom/​SustainCom together with DataCom 2015 and SC2 2015, Chengdu, China. +
-  - [C108] Chen-Li Huang, Wei Wu, Shiuan-Tung Chen, __Hung-Min Sun__ (2016, May). An Integrated System of Communication APPs for Mobile Phone. IEEE 2016 International Conference on Applied System Innovation (ICASI 2016), Okinawa, Japan. +
-  - [C109] Ming-Zhe Wua,, Wei Wub, __Hung-Min Sun__ (2016, Jun). Component Based Android Malware Variants Classification using Machine Learning. The 6th International Conference on Engineering and Applied Sciences, Hong Kong. +
-  - [C110] Andrea E. Medina Paredes, Yuan-Yuan Su, Wei Wu, __Hung-Min Sun__ (2016, Jun). Using Unsupervised Machine Learning to Detect Peer-to-Peer Botnet Flows. International Conference on Advanced Technology Innovation (ICATI 2016), Bali, Indonesia. +
-  - [C111] Wei-Ling Chang, __Hung-Min Sun__, Wei Wu (2016, Aug). An Android BehaviorBased Malware Detection Method using Machine Learning. 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC 2016), Hong Kong. +
-  - [C112] Wei-Fa Liao, __Hung-Min Sun__, Wei Wu (2016, Aug). A Distributed and Autonomous Guard System Based on Cloud Environments. The 2nd IEEE International Conference on Big Data Intelligence and Computing (IEEE DataCom 2016), Auckland, New Zealand. +
-  - [C113] Wuxain Zhang, __Hung-Min Sun__ (2017, Jan). Instagram Spam Detection. The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Christchurch,​ New Zealand.  +
-  - [C114] Yuan-Yuan Su, __Hung-Min Sun__ (2017, May). Emotion-Based Classification and Indexing for Wallpaper and Textile. 2017 IEEE International Conference on Applied System Innovation, Sapporo, Japan.  +
-==== 專書論文 (Book Chapters) ==== +
-  - [B1] __Hung-Min Sun__, S.-P. Shieh, On Private-Key Cryptosystems Based on Product Codes, in **Information Security and Privacy - ACISP 1998, Lecture Notes in Computer Science**, Vol. 1438, **Springer-Verlag,​ Berlin**, pp. 68-79, 1998. +
-  - [B2] M. Michels, M. Stadler, and __Hung-Min Sun__, On the Security of some Variants of the RSA Signature Scheme, in **Computer Security – ESORICS’98**,​ J.J. Quisquater, Y. Deswarte, C. Meadows, D. Gollmann (Eds.), **Lecture Notes in Computer Science**, Vol. 1485, **Springer-Verlag**,​ Berlin, pp. 85-96, 1998. +
-  - [B3] __Hung-Min Sun__, Improving the Security of the McEliece Public-Key Cryptosystem,​ in Advances in Cryptology – ASIACRYPT’98,​ Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag,​ Berlin, pp. 200-213, 1998 +
-  - [B4] __Hung-Min Sun__, W. C. Yang, and C. S. Laih, On the design of RSA with short secret exponent, in **Advances in Cryptology – ASIACRYPT’99,​ Lecture Notes in Computer Science**, Vol. 1716, **Springer-Verlag**,​ Berlin, pp. 150-164, 1999 +
-  - [B5] __Hung-Min Sun__ and B. L. Chen, On the Decomposition Constructions for Perfect Secret Sharing Schemes, in **Information and Communications Security – ICICS’97, Lecture Notes in Computer Science**, Vol. 1334, **Springer-Verlag**,​ Berlin, pp. 50-60, 1997. +
-  - [B6] __Hung-Min Sun__ and C.-T. Yang, On the Design of RSA with Balanced Short Exponents and Its Application,​ in **Public Key Cryptography - PKC 2005, Lecture Notes in Computer Science**, Vol. 3386, **Springer-Verlag**,​ Berlin, pp. 199-215, 2005. +
-  - [B7] __Hung-Min Sun__, Y.-H. Lin, and M.-F. Wu, API Monitoring System for Defeating Worms and Exploits in MS-Windows System, in **Information Security and Privacy - ACISP 2006, Lecture Notes in Computer Science**, Vol. 4058, **Springer-Verlag**,​ Berlin, pp. 159-170, June 2006. +
-  - [B8] __Hung-Min Sun__, M.-E. Wu, and Y.-H. Chen, Estimating Prime-Factors of RSA Modulus N and Its Application on the Extension of the Wiener Attack, in **Applied Cryptography and Network Security - ACNS'​07,​ Lecture Notes in Computer Science, Springer-Verlag**,​ Vol. 4521, pp. 116-128, 2007.  **(Acceptance Ratio: 11.9%)** +
-  - [B9] __Hung-Min Sun__, M.-E. Wu, H. Wang, and J. Guo, On the Improvement of the BDF Attack on LSBS-RSA, in **Information Security and Privacy - ACISP 2008, Lecture Notes in Computer Science, 5107**, Editors: Yi Mu, Willy Susilo and Jennifer Seberry, **Springer-Verlag**,​ pp. 84-97, 2008. **(Acceptance rate: 29%)** +
-  - [B10] __Hung-Min Sun__, M.-E. Wu, R. Steinfeld, J. Guo, and H. Wang, Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits, in **Cryptology and Network Security - CANS 2008, Lecture Notes in Computer Science, 5339, Springer-Verlag**,​ pp. 49-63, 2008 +
-  - [B11] __Hung-Min Sun__, W.-H. Chang, S.-Y. Chang, Y.-H. Lin, DepenDNS: Dependable Mechanism against DNS Cache Poisoning, in **Cryptology and Network Security -CANS 2009, Lecture Notes in Computer Science 5888, Springer-Verlag**,​ pp. 174-188, 2009. (acceptance rate: 29%) +
-  - [B12] M.-Y. Hsu, Y.-H. Chen, S.-S. Chen, W. Tang, and __Hung-Min Sun__, "An IHD Authentication Protocol in **Smart Grid, Lecture Notes in Electrical Engineering (LNEE, Springer)** - SGSC 2012", Springer, 2012. +
-  - [B13] M.-E. Wu, R. Tso, __Hung-Min Sun__, "​Cryptanalysis of Exhaustive Search on Attacking RSA," NSS 2012, Network System Security, **Lecture Notes in Computer Science 7645, Springer 2012**, pp. 373-379, 2012. **(acceptance rate: 23%)** +
-  - [B14] M.-E. Wu, R. Tso, __Hung-Min Sun__, "On the Improvement of Fermat Factorization,"​ **NSS 2012, Network System Security, Lecture Notes in Computer Science 7645, Springer 2012, pp. 380-391, 2012. (acceptance rate: 23%)** +
-  - [B15] Lun-Pin Yuan, Bing-Zhe He, Chang-Shiun Liu, __Hung-Min Sun__, “A Secure and Flexible Data Aggregation Framework for Smart Grid. Advanced Technologies,​” //​**Embedded and Multimedia for Human-centric Computing**//,​ Netherlands:​ Springer. 2014: Vol. 60, pp. 681-690, 2014. +
-  - [B16] C.-M. Chen, M.-E. Wu, B.-Z. He, X. Zheng, C. Hsing, __Hung-Min Sun__, "A Methodology for Hook-Based Kernel Level Rootkits,"​ //**ISPEC 2014**//, Information Security Practice and Experience, //**Lecture Notes in Computer Science, Volume 8434, 2014, pp 119-128, Springer.**//​ +
-  - [B17] C.-R. Li, C.-Y. Kuan, B.-Z. He, W.-E. Wu, C.-Y. Weng, __Hung-Min Sun__, " A Security System based on Door Movement Detecting,"​ //**ECC 2014**//, Intelligent Data analysis and its Applications,​ Volume I, //​**Advances in Intelligent Systems and Computing, Volume 297, 2014, pp 155-163, Springer.**//​ +
-  - [B18] Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, __Hung-Min Sun__. A New Public Key Encryption with Equality Test. Network and System Security (8th International Conference, //**NSS 2014**// (ISBN: 978-3-319-11697-6). Switzerland:​ Springer International Publishing. Oct, 2014: Volume 8792 of the series Lecture Notes in Computer Science, pp 550-557.  +
-  - [B19] Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, __Hung-Min Sun__ . Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. Network and System Security (//**NSS 2016**//) (ISBN: 978-3-319-46297-4). Switzerland:​ Springer International Publishing. Sep, 2016: Lecture Notes in Computer Science 9955, pp 47-61.  +
-  - [B20] Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, __Hung-Min Sun__. A System of Shareable Keyword Search on Encrypted Data. Network and System Security (//**NSS 2016**//) (ISBN: 978-3-319-46297-4). Switzerland:​ Springer International Publishing. Sep, 2016: Lecture Notes in Computer Science 9955, pp. 283-299.  +
-  - [B21] Amir Rezapour, Wei Wu, __Hung-Min Sun__. Cloud-Based Storage Model with Strong User Privacy Assurance. //**DMBD 2016**//, Data Mining and Big Data (ISBN: 978-3-31940972-6). Switzerland:​ Springer International Publishing. Jun, 2016: Lecture Notes in Computer Science 9714, pp 373-378. MOST 104-3115-E-007-004.+
  
-==== 美國專利 (USA Patents) ==== +  ​Vice/Acting Director ​of University LibraryNational Tsing Hua University, 2012/–2017/7 
-  - **[P1]** Hung-Min Sun, Shih-Pu Hsu, and Chien-Ming Chen, “Mobile jamming attack method in wireless sensor network and method defending the same,” **US Patent 7,​907,​888**,​ March 15, 2011. +  * Director ​of Division of Intellectual Property ​and Technology LicensingOperations Center ​for Industry CollaborationNational Tsing Hua University2011/4 – 2012/9
-  - **[P2]** Muh-chyi Leu and Hung-Min Sun, “Authentication method employing elliptic curve cryptography,​” **US Patent 8,​117,​447**,​ Feb. 14, 2012. +
-  - **[P3]** Cheng-Kai Chen, Hung-Min Sun, Kang-Chiao Lin, Shih-Ying Chang, and Shuai-Min Chen,  “Apparatus,​ method, and computer readable medium thereof for generating and utilizing a feature code to monitor a program,” **US Patent 8,​127,​276**,​ Feb. 28, 2012. +
-  - **[P4]** Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, and Yue-Hsun Lin, “Method and system for handover authentication,​” **US Patent 8,​131,​296**,​ March 6, 2012. +
-  - **[P5]** Frank Chee-Da Tsai; Chien-Chien Chiu, I-Hung Lin, Hung-Min Sun, Shuai-Min Chen, Yao-Hsin Chen, Heng-Jeng Chung, “Mobile Station, Access Point, Gateway Apparatus, Base Station, and Handshake Method Thereof for Use in a Wireless Network Framework,​” **US Patent 8,​527,​768**,​ September 3, 2013. +
-  - **[P6]** Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, and Hung-Min Sun, “Method for sending and receiving an evaluation ​of reputation in a social network,” **US Patent 8,​312,​276**,​ November 13, 2012+
-  - **[P7]** Hung-Min Sun, Chun-Hao Yeh, Yao-Hsin Chen, “Captcha image authentication method and system,” **US Patent 8,​607,​331**,​ December 10, 2013. +
-  - **[P8]** Hung-Min Sun, Man-Ting Kuo, Yao-Hsin Chen, Shih-Ying Chang, “Verification method and system,” **US Patent 8,​774,​412**,​ July 8, 2014. +
-  - **[P9]** Shiuan-Tung Chen, Hsin-Ta Chiao, Hung-Min Sun, and Chia-Hsing Ho, “Apparatus and method for accelerating the encoding of raptor codes,” **US Patent 8,​839,​067**,​ Sep. 16, 2014. +
-  - **[P10]** Hung-Min Sun, Chi-Ming Li, “Authentication method and code setting method and authentication system for electronic apparatus,​” ​ **US Patent ​9,141,777**, Sep. 22, 2015. +
-  ​**[P11]** Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun, “Communication system, method and receiver applicable thereto,” **US Patent 9,​264,​181**,​ February 16, 2016. +
-  - **[P12]** Hung-Min Sun, Shiuan-Tung Chen, Ming-Sheng Yeh, “Multi-touch methods and devices,” **US Patent 9,​336,​376**,​ May 10, 2016. +
-  - [P13] Hung-Min Sun and Yue-Hsun Lin, “Pair-wise key pre-distribution method for wireless sensor network,” US Patent (pending), Application number: 11/599962, Publication number: US 20080044028/​A1. +
-  - [P14] Frank Chee-Da Tsai, Yi-Chung Shen, Jian-Chian Chiou, Hung-Min Sun, Shuai-Min Chen, Yue-Hsun Lin, and Ying-Chu Hsiao, “Key management system and method for wireless networks,​” US Patent (pending), Application number: 12/076930, Publication number: US 20090110196/​A1. +
-  - [P15] Hung-Min Sun and Shih-Ying Chang, “Light-overhead and flexible wireless sensor message authentication method,” US Patent (pending), Application number: 12/024199, Publication number: US 20090158045/​A1. +
-  - [P16] King-Hang Wang, Chin-Te Chen, Hung-Min Sun, and Yih-Sien Kao, “Systems and methods for key management,​” US Patent (pending), Application number: 12/236971, Publication number: US 20100074438/​A1. +
-  - [P17] Cheng-Kai Chen, Hung-Min Sun, Shih-Ying Chang, Yao-Hsin Chen, and Bing-Zhe He, “Network apparatus having a database, management method and tangible machine-readable medium for managing internet protocol connection rules of the database,​” US Patent (pending), Application number: 12/052499, Publication number: US 20090164617. +
-  - [P18] King-Hang Wang, Yung-Hsuan Chao, Hung-Min Sun, Yih-Sien Kao, and Wan-Shan Wu“User group assignment method ​for key management,” US Patent (pending)Application number: 12/196557, Publication number: US 20100050204. +
-  - [P19] Yih-Sien Kao, Muh-Chyi Leu, Hung-Min Sun, and King-Hang Wang, “DRM key management system using multi-dimensional grouping techniques,​” US Patent (pending), Application number: 12/202550, Publication number: US 20100054479.  +
-  - [P20] Frank Chee-Da Tsai, Jian-Chian Chiou, I-Hung Lin, Hung-Min Sun, Shih-Ying Chang, Chieh Hsing, and Chi-Yi Kao, “Apparatus and method for renewing a key, computer readable medium thereof and wireless network comprising the same,” US Patent (pending), Application number: 12/337015, Publication number: US 20100105357/​A1. +
-  - [P21] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, and Hung-Min Sun, “Network Reputation System And Its Controlling Method Thereof,” US Patent (pending), Application number: 12/411396, Publication number: US20100205430/​A1. +
-  - [P22] Chiao; Hsin-Ta; (Nantou County, TW) ; Sun; Hung-Min; (Hsinchu City, TW) ; Chang; Shih-Ying; (Nantou County, TW), " LAYER-AWARE FORWARD ERROR CORRECTION ENCODING AND DECODING METHOD, ENCODING APPARATUS, DECODING APPARATUS, AND SYSTEM THEREOF ," US Patent(pending),​ Application Number: 99139737, Publication number: US 20120131407/​A1. +
-  - [P23] Sun; Hung-Min; (Hsinchu, TW) ; Jeng; Jain-Ming; (Hsinchu, TW), " METHOD AND SYSTEM FOR PREVENTING DOMAIN NAME SYSTEM CACHE POISONING ATTACKS,"​ US Patent(pending),​ Application Number: 10010062, Publication number: US 20120180125/​A1.  ​+
  
-==== 中華民國專利 ​==== +===== PROFESSIONAL SOCIETIES AND ACTIVITIES ===== 
-  ​- [PC1] 孫宏民, 陳孟彰, 林宸堂, “數位影像版權之保護與驗證方法,​” 中華民國專利,**證書號:​199742**, 公告/​公開日:​ 2004/​03/​21 + 
-  - [PC2] 孫宏民, 楊政達, 林宸堂, “以短亂數為基礎之使用者身份驗證方法,​” ​**中華民國專利,證書號:I296175**公告/​公開日:​ 2008/04/21 +  * **Executive Council Member**: Chinese Cryptology and Information Security Association2015- 
-  ​- [PC3] 陳政愷, 孫宏民, 林港喬, 張仕穎, 陳帥名, “產生及利用一特徵碼以監測一程式之裝置、方法、應用程式及其電腦可讀取媒體,​” ​**中華民國專利,證書號:​I335531**, 公告日: 2011/01/01 +  * **The member of a council**: Chinese Cryptology and Information Security Association2000- 
-  - [PC4] 孫宏民, 張仕穎, “輕量及彈性無線感測器訊息認證方法,​” **中華民國專利,證書號I341095**, 公告日: 2011/04/21 + 
-  [PC5] 孫宏民, 徐士卜, 陳建銘, “無線感測網路上移動式阻斷服務攻擊方法及其防禦方法” **中華民國專利,證書號I346491**公告日: ​2011/08/01 +===== PROFESSIONAL SERVICES ===== 
-  [PC6] 蔡其達沈誼中, 邱簡謙, 孫宏民, 陳帥名, 林岳勳, 蕭英助, “無線網路之預先安全認證與金鑰交換系統與方法” **中華民國專利,證書號:​ I351207**, 公告日: ​2011/10/21 + 
-  ​- [PC7] 呂沐錡, 孫宏民, “基於橢圓曲線密碼學之認證方法” ​**中華民國專利,證書號I357251**, 公告日: 2012/01/21 +  ​* Topics Editor(s)-in-Chief of International Journal
-  [PC8]孫宏民,​ 林岳勳, “無線感測器網路中之對稱式金鑰部署方法,​” 中華民國專利(pending),公開號:​ 200807998公告/公開日: 2008/02/01 +    Advances in Information Sciences and Service SciencesAn International Journal of Research and Innovation, 2011 
-  [PC9]蔡其達邱簡謙, 林益宏, 孫宏民, 張仕穎, 邢傑, 高啟益, “金鑰更新裝置、方法及其電腦程式產品及包含前述裝置之無線網路系統” 中華民國專利(pending),公開號:​ 201018165公告/​公開 日: 2010/05/01 +    International Journal of Digital Content Technology and its Applications2010-2011 
-  [PC10]王景行,​ 陳錦德, 孫宏民, 高億憲, “金鑰管理系統與方法” 中華民國專利(pending),公開號:​ 201014249公告/​公開日: ​2010/04/01 + 
-  [PC11]高億憲,​ 呂沐錡, 孫宏民, 王景行, “使用多維分組技術之DRM密匙管理系統” 中華民國專利(pending),公開號:​ 201011589公告/​公開日: ​2010/03/16 +  * Editorial Board of International Journal
-  [PC12]王景行,​ 趙永軒, 孫宏民, 高億憲, 吳宛珊, “用於密鑰管理之使用者群分配方法” 中華民國專利(pending),公開號:​ 201010322公告/​公開日: ​2010/03/01 +    Journal of Information Science and Engineering ​(JISE), from 2011/8 to now. (SCI indexed) 
-  [PC13]邱錫彥孫宏民張仕穎林岳勳, “交遞驗證方法與系統” 中華民國專利(pending),公開號:​ 201010361公告/​公開日:​ 2010/03/01 +    Journal of the Chinese Institute of Engineers (JCIE)2015~now ​(SCI indexed) 
-  [PC14]孫宏民林岳勳, 張仕穎, “行動隨意網路下安全資料聚合之方法” 中華民國專利(pending),公開號:​ 201006197公告/​公開日:​ 2010/02/01 +    - ISRN Communications and Networking, 2010~now 
-  - [PC15]孫宏民林岳勳張仕穎, “安全加密資料之比較方法” 中華民國專利(pending),公開號201004261, 公告/​公開日2010/01/16 +    International Journal of Security ​(IJS), 2010~now 
-  - [PC16]陳政愷孫宏民, 張仕穎, 陳耀鑫, 何秉哲“具有一資料庫之網路裝置及用於該資料庫之網路協定連線規則之管理方法與電腦可讀取紀錄媒體,​” 中華民國專利(pending),公開號:​ 200928770, 公 告/​公開日:​ 2009/07/01 +    Advances in Information Sciences and Service Sciences: An International Journal of Research and Innovation ​(AISS), 2010~now 
-  [PC17]邱錫彥,​ 張仕穎, 玫柔 佳婷,​ 培瑞 安卓,​ 孫宏民, “網路評價系統及其控制方法” 中華民國專利(pending),公開號:​ 201031169, 公開日: 2010/08/16 +    International Journal of Intelligent Information Processing ​(IJIIP), 2010~now 
-  [PC18]蔡其達,​ 邱簡謙, 林益宏, 孫宏民, 陳帥名, 陳耀鑫, 鍾恒正“無線網路架構之行動台、存取台、閘道裝置、基地台及其握手方法” 中華民國專利(pending),公開號:​ 201023590 , 公開日: 2010/06/16 +    International Journal of Computer Science & Information Technology Applications (IJCSITA)2011~now 
-==== Technical Report ​==== +    - Recent Patents on Telecommunications2012~now 
-  - [T1] Hung-Min Sun, M. J. Hinek, and M.-E. Wu, 「On the Design of Rebalanced RSA,」 //Centre for Applied Cryptographic Research, CACR 2005-35//, 2005.+    - International Journal of Digital Content and Applications (IJDCA)2012~now 
 +    - International Journal of Computer Science and Artificial Intelligence ​(IJCSAI), 2012~now 
 +    International Journal of Information and Computer Science (IJICS)2012~ now 
 +    - Journal of Engineering Research ​(IER), 2012~now 
 +    - International Journal of Multimedia Technology, 2013~ now. 
 + 
 +  ​* Track Chair: 
 +    ​Track 8: Information and Cyber Security in I-SPAN 2014; 
 +    - CCBD 2015: SecurityPrivacyTrust & Quality of Cloud Computing and Big Data  
 + 
 +  * General Chair 
 +    - ACM AsiaCCS 2020 
 + 
 +  * Program Chair 
 +    - IEEE PRDC 2018 
 + 
 +  * Organizing Committee ​(Local Committee Members): 
 +    - AsiaCrypt2014 
 + 
 +  * Steering Committee: 
 +    - AsiaJCIS 2016 
 +    - AsiaJCIS 2017 
 + 
 +  * Publicity Chair: 
 +    - ACSA-11 
 +    - ACSA-12 
 +    - MIPS09 
 +    - STA 2012 
 +    - ISSDM2012 
 +    - ACSA 2012-Summer 
 +    - ICMIA 2012 
 +    - DFIS-13 
 +    - ICMIA2013 
 +    - DFIS-16 
 + 
 +  ​* Program Committee Member: 
 +    ​ICFN 2011 
 +    - IC4E 2011 
 +    - ICENT 2011 
 +    - ICMET 2011 
 +    - ICCDA 2011 
 +    - ICCRD 2011 
 +    - ICECT 2011 
 +    - ICMG 2011 
 +    - ICMBE 2011 
 +    - ICSAP 2011 
 +    - ICFCC 2011 
 +    - 2011 ICONI Workshop on Network Security 
 +    - WSN’2011 
 +    - IEEE ICIME 2011 
 +    - IEEE ICCSIT 2011 
 +    - SGH 2011 
 +    - ICACT 2012 
 +    - IEEE ISCAIE 2012 
 +    - ICISC 2012 
 +    - ICIWE 2012 
 +    - ICS2012 
 +    - ISSPA2012  
 +    - SAM'​12 
 +    - ICMAE 2012 
 +    - ICHEP 2012 
 +    - ICECT 2012 
 +    - IEEE ICETEM 2012 
 +    - NSS 2012 
 +    - ICMEME 2013 
 +    - ICECT 2013 
 +    - ICISC 2013 
 +    - NSS 2013ICIS 2013 
 +    - IEEE ISCI 2013 
 +    - SAM'​13 
 +    - SAI 2013 
 +    - IEEE CloudCom 2014 
 +    - NSS 2014 
 +    - ISCAIE 2014 
 +    - PST2014 
 +    - ISIEA 2014 
 +    - ICATC 2014 
 +    - PST 2014 
 +    - SC2 2014 
 +    - ICISC 2014ICCVE 2014 
 +    - WNCS 2014 
 +    - MobiApps 2014 
 +    - DPNoC 2014 
 +    - IEEE GLOBECOM 2014 CISS 
 +    - IEEE SCC 2014 
 +    - CLOUD COMPUTING 2015 
 +    - CPSS 2015 
 +    - FiCloud 2015 
 +    - IOV 2015 
 +    - ISPEC 2015 
 +    - PST 2015 
 +    - SAM’15 
 +    - SocialSec 2015 
 +    - TrustCom 2015 
 +    - ICCME-2015 
 +    - ICISSP 2015 
 +    - ICISC 2015 
 +    - ICICS 2015 
 +    - SOWN 2015 
 +    - SAPSE 2015 (IEEE COMPSAC 2015 Workshop
 +    CENTRIC 2015 
 +    - ICCVE 2015 
 +    - ICISSP 2016 
 +    - DMBD 2016 
 +    - SAPSE 2016 (IEEE COMPSAC 2016 Workshop) 
 +    - SAM’2016 
 +    - FNC 2016 
 +    - MobiApps 2016 
 +    - IEACon 2016 
 +    - SECURWARE 2016 
 +    - WCNSSP 2016 
 +    - AMSM 2016 
 +    - ICSS 2016 
 +    - CLOUD COMPUTING 2016 
 +    - ISPEC 2016 
 +    - SpaCCS 2016 
 +    - NSS 2016 
 +    - IEEE TrustCom-16 
 +    DPNoC 2016 
 +    - CS-2016 
 +    - IOV-2016PST 2016(Security Track) 
 +    - NaNA-2017 
 +    - AINA 2017 
 +    - SAM’17 
 +    - DBMD 2017 
 +    - FiCloud 2017 
 +    - CloudComm 2017 
 +    - ICATI2017 
 +    - SAPSE 2017 
 +    - IEACon 2017 
 +    - ICAIS 2017 
 +    - ISTA-2017 
 +    - ICISSP 2018 
 + 
 + 
 +   
 +   
 + 
 + 
 + 
 + 
 +===== AWARDS AND HONORS =====
  
-===== Award ===== 
   * Best Conference Paper Award, “Botnet Detection Using Unsupervised Machine Learning,​” 2016 International Conference on Innovation, Communication and Engineering,​ 2016.   * Best Conference Paper Award, “Botnet Detection Using Unsupervised Machine Learning,​” 2016 International Conference on Innovation, Communication and Engineering,​ 2016.
   * First Prize Paper Award, “An Integrated System of Communication APPs for Mobile Phone,” 2016 IEEE International Conference on Applied System Innovation, 2016.   * First Prize Paper Award, “An Integrated System of Communication APPs for Mobile Phone,” 2016 IEEE International Conference on Applied System Innovation, 2016.
   * Outstanding Research Award, 2015 WITC (World Congress on Information Technology Applications and Services), Feb., 2015.   * Outstanding Research Award, 2015 WITC (World Congress on Information Technology Applications and Services), Feb., 2015.
   * Outstanding Professor Award of Electrical Engineering,​ The Chinese Institute of Electrical Engineering,​ 2014.   * Outstanding Professor Award of Electrical Engineering,​ The Chinese Institute of Electrical Engineering,​ 2014.
 +  * The Eighth Scientific Paper Award for Communication Technology, Far Eastern Y. Z. Hsu Science and Technology Memorial Foundation, 2010. 
 +  * The Best Paper Award (1 out of 26) in MobiSys'​09,​ 2009
 +  * The Best Paper Award in International Computer Symposium, 2010. 
 +  * The Best Paper Award in Cryptology Information Security Conference 2009 (1 out of 62).
 +  * The Best Paper Award in Information Security Conference 2006 (1 out of 71).
   * The Advisor of Ph.D. Dissertation - Outstanding in Chinese Cryptography and Information Security Association,​ 2012.   * The Advisor of Ph.D. Dissertation - Outstanding in Chinese Cryptography and Information Security Association,​ 2012.
   * The Advisor of Ph.D. Dissertation - Outstanding in Chinese Cryptography and Information Security Association,​ 2011.   * The Advisor of Ph.D. Dissertation - Outstanding in Chinese Cryptography and Information Security Association,​ 2011.
   * The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2011.   * The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2011.
-  * Y. Z. Hsu Scientific Paper Award (有庠科技論文獎),​ Far Eastern Y. Z. Hsu Science and Technology Memorial Foundation, 2010.  
-  * The Best Paper Award (1 out of 26) in MobiSys '09 (acceptance ratio: 20%). The extended version of this paper was hence invited to be published in IEEE Transactions on Mobile Computing (appeared in 2010). 
   * The Best Paper Award in 2010 International Computer Symposium (ICS 2010).   * The Best Paper Award in 2010 International Computer Symposium (ICS 2010).
   * The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2010.   * The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery, 2010.
行 367: 行 229:
   * The Annual JISE (Journal of Information Science & Engineering) Best Paper Award in 2003 (1 out of 64 papers).   * The Annual JISE (Journal of Information Science & Engineering) Best Paper Award in 2003 (1 out of 64 papers).
  
-===== Professional Activities ​=====+===== PUBLICATIONS ​===== 
 +==== Journal Papers ​====
  
-  * Topics Editor(s)-in-Chief of International Journal +  ​- [J1] Hung-Min Sun and T. Hwang, "On Double-One Matrices and Double-Zero Matrices,"​ Linear and Multilinear Algebra, Vol.31, 1992, pp. 47-55. (SCI)  
-    Advances ​in Information Sciences and Service ​Sciences: An International ​Journal of Research and Innovation, 2011 +  - [J2] Hung-Min Sun and T. Hwang, "Key Generation of Algebraic-Code Cryptosystems,"​ Computers and Mathematics with Applications,​ Vol. 27, No. 2, 1994, pp. 99-106. (SCI) 
-    International ​Journal of Digital Content ​Technology and its Applications, ​2010-2011+  - [J3] Hung-Min Sunand S. P. Shieh, "On Dynamic Threshold Schemes,"​ Information Processing Letters, Vol. 52, No. 4, 1994, pp. 201-206. ​(SCI 
 +  ​[J4] Hung-Min Sun* and S. P. Shieh, "​Construction of Dynamic Threshold Schemes,"​ IEE Electronics Letters, Vol. 30, No. 24, 1994, pp. 2023-2025. (SCI) 
 +  - [J5] Hung-Min Sun* and S. P. Shieh, "An Efficient Construction of Perfect Secret Sharing Schemes for Graph-Based Structures,"​ Computers and Mathematics with Applications,​ Vol. 31, No. 7, 1996, pp. 129-135. (SCI) 
 +  - [J6] S. P. Shieh, W. H. Yang, and Hung-Min Sun, "An Authentication Protocol without Third Party,"​ IEEE Communications Letters, Vol. 1, No. 3, 1997, pp. 87-89. (SCI) 
 +  - [J7] Hung-Min Sun*, 1997 (November), "​Private-Key Cryptosystem Based on Burst-Error-Correcting Codes,"​ IEE Electronics Letters, Vol. 33, No. 24, pp. 2035-2036, London, IEE Press. (SCI) 
 +  - [J8] Hung-Min Sun and S. P. Shieh, 1997 (December), "​Optimal Information Dispersal for Increasing Reliability of a Distributed Service,"​ IEEE Transactions on Reliability,​ Vol. 46, No. 4, pp. 462-472, New York, IEEE Press. (SCI) 
 +  - [J9] Hung-Min Sun* and S. P. Shieh, 1998 (March), "​Secure Broadcasting ​in Large Networks,"​ Computer Communications,​ Vol. 21, No. 3, pp. 279-283, New York, IPC Science and Technology Press. (SCI) 
 +  - [J10] Hung-Min Sun* and S. P. Shieh, 1998 (October), "​Secret Sharing Schemes for Graph-Based Prohibited Structures,"​ Computers and Mathematics with Applications,​ Vol. 36, No. 7, pp. 131-140, New York, Pergamon Press. (SCI) 
 +  - [J11] Hung-Min Sun*, S. P. Shieh, and H. M. Sun, 1999 (January), "A Note on Breaking and Repairing a Secure Broadcasting in Large Networks,"​ Computer Communications,​ Vol. 22. No. 2, pp. 193-194, New York, IPC Science and Technology Press. (SCI) 
 +  - [J12] Hung-Min Sun* and S. P. Shieh, 1999 (February), "​Recursive Constructions for Secret Sharing Schemes,"​ Computers and Mathematics with Applications,​ Vol. 37, No. 3, pp. 87-96, New York, Pergamon Press. (SCI) 
 +  - [J13] Hung-Min Sun*, 1999 (May), "​On-line Multiple Secret Sharing based on a One-way Function,"​ Computer Communications,​ Vol. 22, No. 8, pp. 745-748, New York, IPC Science and Technology Press. (SCI)  
 +  - [J14] Hung-Min Sun*, 1999 (May), "An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers,"​ Computer Communications,​ Vol. 22, No. 8, pp. 717-722, New York, IPC Science and Technology Press. (SCI) 
 +  - [J15] Hung-Min Sun*, 1999 (July), "New Construction ​of Perfect Secret Sharing Schemes for Graph-based Prohibited Structures,"​ Computers & Electrical Engineering,​ Vol. 25, No. 4, pp. 267-278, New York, Pergamon Press. (SCI) 
 +  - [J16] Hung-Min Sun*, 1999 (August), "​Comments on Improved Group Signature Scheme based on Discrete Logarithm Problem,"​ IEE Electronics Letters, Vol. 35, No. 16, pp. 1323-1324, London, IEE Press. (SCI) 
 +  - [J17] Hung-Min Sun* and S. P. Shieh, 1999 (September),​ "​Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures,"​ Journal of Information Science & Engineering,​ Vol. 15, No. 5, pp. 679-690, Taipei, Institute of Information Science Academia Sinica Press. (SCI) 
 +  - [J18] Hung-Min Sun*, N. Y. Lee, and T. Hwang, 1999 (September),​ "​Threshold Proxy Signatures,"​ IEE Proceedings - Computers and Digital Techniques, Vol. 146, No. 5, pp. 259-263, London, IEE Press. (SCI) 
 +  - [J19] Hung-Min Sun*, B. J. Chen, and T. Hwang, 1999 (October), "​Cryptanalysis of Group Signature Scheme Using Self-Certified Public Keys," IEE Electronics Letters, Vol. 35, No. 22, pp. 1938-1939, London, IEE Press. (SCI) 
 +  - [J20] Hung-Min Sun*, 1999 (November), "On Private-key Encryption Using Product Codes,"​ Computers & Electrical Engineering,​ Vol. 25, No. 6, pp. 439-450, New York, Pergamon Press. (SCI)  
 +  - [J21] Hung-Min Sun*, 1999 (November), "​Security of a Broadcasting Cryptosystem in Computer Networks,"​ IEE Electronics Letters, Vol. 35, No. 24, pp. 2108-2109, London, IEE Press. (SCI) 
 +  - [J22] Hung-Min Sun*, 2000 (January), "​Further Cryptanalysis of the McEliece Public-Key Cryptosystem,"​ IEEE Communications Letters, Vol. 4, No. 1, pp. 18-19, New York, IEEE Press. (SCI) 
 +  - [J23] Hung-Min Sun*, 2000 (June), "On the Dealer’s Randomness Required in Perfect Secret Sharing Schemes with Access Structures of Constant Rank," ​International Journal ​of Foundations of Computer Science, Vol. 11, No. 2, pp. 263-281, Singapore, World Scientific Press. (SCI) 
 +  [J24] S. P. Shieh, C. T. Lin, W. B. Yang, and Hung-Min Sun, 2000 (July), “Digital Multisignature Schemes for Authenticating Delegates ​in Mobile Code Systems,” IEEE Transactions on Vehicular Technology, Vol. 49, No. 4, pp. 1464-1473, New York, IEEE Press. (SCI) 
 +  - [J25] C. L. Lin, Hung-Min Sun*, and T. Hwang, 2000 (October), “Three-Party Encrypted Key Exchange: ​ Attacks and a Solution,​” ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20, New York, ACM Press. (EI) 
 +  - [J26] Hung-Min Sun*, 2000 (November) "An Efficient Remote User Authentication Scheme Using Smart Cards,"​ IEEE Transactions on Consumer Electronics,​ Vol. 46, No. 4, pp. 958-961, New York, IEEE Press. (SCI) 
 +  - [J27] Hung-Min Sun*, 2000 (November), “Enhancing the Security of the McEliece Public-Key Cryptosystem,"​ Journal of Information ​Science & Engineering,​ Vol. 16, No. 6, pp. 799-812, Taipei, Institute of Information Science Academia Sinica Press. (SCI) 
 +  - [J28] Hung-Min Sun*, 2000 (November), "​Design of Time-Stamped Proxy Signatures with Traceable Receivers,"​ IEE Proceedings - Computers and Digital Techniques, Vol 147, No. 6, pp. 462-466, London, IEE Press. (SCI) 
 +  - [J29] C. L. Lin, Hung-Min Sun*, and T. Hwang, 2001 (January), “Efficient and Practical DHEKE Protocols ,” ACM Operating Systems Review, Vol. 35, No. 1, pp. 41-47, New York, ACM Press. (EI) 
 +  - [J30] Hung-Min Sun*, 2001 (February) "​Cryptanalysis of a Public-Key Cryptosystem Based on Generalised Inverses of Matrices,"​ IEEE Communications Letters, Vol. 5, No. 2, pp. 61-63, New York, IEEE Press. (SCI) 
 +  - [J31] C. L. Lin, Hung-Min Sun*, and T. Hwang, 2001, "​Attacks and Solutions on Strong-Password Authentication,"​ IEICE Transactions on Communications,​ Vol.E84-B, No.9, pp.2622-2627,​ Tokyo, IEICE Press. (SCI) 
 +  - [J32] H. T. Yeh, Hung-Min Sun*, and T. Hwang, 2001 (November), "​Security Analysis of the Generalized Key Agreement and Password Authentication Protocol,"​ IEEE Communications Letters, Vol. 5, No. 11, pp. 462-463, New York, IEEE Press. (SCI) 
 +  - [J33] C. L. Lin, Hung-Min Sun*, M. Steiner, and T. Hwang, 2001 (December), "​Three-party Encrypted Key Exchange Without Server Public-Keys,"​ IEEE Communications Letters, Vol 5., No. 12, pp. 497-499, New York, IEEE Press. (SCI)  
 +  - [J34] Hung-Min Sun*, 2002 (January), "​Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes,"​ Informatica,​ Vol. 13, No. 1, pp. 105-110. (SCI) 
 +  - [J35] B. T. Hsieh, Hung-Min Sun*, and T. Hwang, 2002 (January), “Cryptanalysis of an Enhancement for the Simple Authentication Key Agreement Algorithm,​” IEE Electronics Letters, Vol. 38, No. 1, pp. 20-21, London, IEE Press. ​ (SCI) 
 +  - [J36] Hung-Min Sun*, 2002 (January), “On the Security of a Variation of Cramer-Shoup’s Public Key Scheme,” Journal of Information Science & Engineering,​ Vol. 18, No 1, pp. 19-22, Taipei, Institute of Information Science Academia Sinica Press. (SCI) 
 +  - [J37] Hung-Min Sun*, W. C. Yang, and C. S. Laih, 2002 (January), “On the Design of RSA with Short Secret Exponent,​” Journal of Information Science & Engineering,​ Vol. 18, No. 1, pp. 1-18, Taipei, Institute of Information Science Academia Sinica Press. (SCI) (This paper received the Annual JISE Best Paper Award in 2003, the only one out of 64 papers) 
 +  - [J38] Hung-Min Sun* and B. L. Chen, 2002 (March), "​Weighted Decomposition Construction for Perfect Secret Sharing Schemes,"​ Computers and Mathematics with Applications,​ Vol. 43, Iss. 6-7, pp. 877-887, New York, Pergamon Press. (SCI) 
 +  - [J39] H. T. Yeh and Hung-Min Sun*, 2002 (October), “Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attacks,” ACM Operating Systems Review, Vol. 36, No. 4, pp. 14-22, New York, ACM Press. (EI) 
 +  - [J40] Hung-Min Sun*, H. T. Yeh, and T. Hwang, 2003, “On the Linkability of Some Group Signature Schemes,” Informatica,​ Vol. 14, Issue 1, pp. 85-94. (SCI) 
 +  - [J41] B. T. Hsieh, Hung-Min Sun*, and T. Hwang, 2003, “On the Security of Some Password Authentication Protocols,​” Informatica,​ Vol. 14, No. 2, pp. 195-204. (SCI) 
 +  - [J42] X. Yi, C. K. Siew, Hung-Min Sun*, H. T. Yeh, C. L. Lin, and T. Hwang, 2003 (March), “Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications,​” IEEE Transactions on Vehicular Technology, Vol. 52, No. 2, pp. 465-468. (SCI) 
 +  - [J43] Hung-Min Sun* and H. T. Yeh, 2003 (April), "​Further Cryptanalysis of a Password Authentication Scheme with Smart Cards,"​ IEICE Transactions on Communications,​ Vol.E86-B, No 4, pp. 1412-1415, Tokyo, IEICE Press. (SCI) 
 +  - [J44] H. T. Yeh, Hung-Min Sun*, and T. Hwang, 2003 (July-August),​ “Improved Authenticated Multiple-Key Agreement Protocol,​” Computers and Mathematics with Applications,​ Vol. 46, Issue 2-3, pp. 207-211, New York, Pergamon Press. (SCI) 
 +  - [J45] H. T. Yeh, Hung-Min Sun* and T. Hwang, 2003 (November), "​Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks,"​ Journal of Information Science & Engineering,​ Vol.19 No.6, pp.1059-1070,​ Taipei, Institute of Information Science Academia Sinica Press. (SCI)  
 +  - [J46] H. T. Yeh, Hung-Min Sun*, C. T. Yang, B. C. Chen, and S. M. Tseng, 2003 (November) , “Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks, IEICE Transactions on Communications,​ Vol. E86-B, No. 11, Nov. 2003, pp. 3278-3282, Tokyo, IEICE Press. (SCI) 
 +  - [J47] H. T. Yeh, Hung-Min Sun*, and B. T. Hsieh, 2004 (January), “Security of a Remote User Authentication Scheme Using Smart Cards,” IEICE Transactions on Communications,​ Vol.E87-B No.1 pp.192-194, Tokyo, IEICE Press. (SCI) 
 +  - [J48] Hung-Min Sun*, B. C. Chen, and H. T. Yeh, 2004 (May), “On the Design of Time-Stamped Signatures,​” Journal of Computer and System ​Sciences ​(JCSS), Vol. 68, No. 3, pp. 598-610. (SCI) 
 +  - [J49] H. T. Yeh and Hung-Min Sun, 2004 (June), “Password-Based User Authentication and Key Distribution Protocols for Client-Server Applications,​” Journal of Systems and Software, Vol. 72, Issue 1, pp. 97-103. (SCI) 
 +  - [J50] B. T. Hsieh and Hung-Min Sun*, “An Improvement of a Deniable Authentication Protocol,​” IEICE Transactions on Communications,​ Vol.E87-B No.10 pp.3099-3101,​ 2004 (October), Tokyo, IEICE Press. (SCI) 
 +  - [J51] C. L. Lin, H.A. Wen, T. Hwang and Hung-Min Sun, “Provably Secure Three-Party Password-Authenticated Key Exchange,​” IEICE Transactions on Fundamentals of Electronics,​ Communications and Computer ​Sciences, Vol. E87-A, No. 11, pp. 2990-3000, 2004 (November), Tokyo, IEICE Press. (SCI) 
 +  - [J52] Hung-Min Sun*, B. T. Hsieh, and S. J. Hwang, “Secure Email Protocols Providing Perfect Forward Secrecy,” IEEE Communications Letters, Vol 9., No. 1, pp. 58-60, 2005 (January), New York, IEEE Press. (SCI) 
 +  - [J53] Hung-Min Sun*, Bing-Chang Chen, Tzonelih HwangSecure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 75 (1-2): 63-68 (2005) (SCI) 
 +  - [J54] Hung-Min Sun*, B.-T. Hsieh, S.-M. Tseng, ”On the security of some proxy blind signature schemes,” Journal of Systems and Software 74(3): 297-302 (2005) (SCI) 
 +  - [J55] H.T. Yeh and Hung-Min Sun*, “Password authenticated key exchange protocols among diverse network domains,” Computers & Electrical Engineering 31 (3): 175-189 MAY 2005  (SCI)  
 +  - [J56] Hung-Min Sun* and H.T. Yeh, “Password-based authentication and key distribution protocols with perfect forward secrecy,” Journal of Computer and System Sciences (JCSS), Vol. 70, No. 6, pp. 1002-1011, September, 2006. (SCI) 
 +  - [J57] Hung-Min Sun*, M.-E. Wu, W.-C. Ting, and M. J. Hinek, “Dual RSA and Its Security Analysis,​” IEEE Transactions on Information Theory, vol. 53, no. 8, pp. 2922-2933, 2007. (SCI) 
 +  - [J58] Y. Chen, J.-S. Chou, and Hung-Min Sun, “A novel mutual authentication scheme based on quadratic residues for RFID systems,” Computer Networks, Vol. 52, No. 12, pp. 2373-2380, 2008. (SCI) 
 +  - [J59] Hung-Min Sun*, C.-M. Chen, and C.-Z. Shieh, “Flexible-Pay-Per-Channel:​ A New Model for Content Access Control in Pay-TV Broadcasting Systems,” IEEE Transactions on Multimedia, 2008, Vol. 10, No 6, pp. 1109-1120, 2008. (SCI)  
 +  - [J60] C.-H. Yang, C.-Y. Weng, S.-J. Wang, and Hung-Min Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp. 488-497, 2008. (SCI)  
 +  - [J61] Hung-Min Sun*, C.-T. Yang, and M.-E. Wu, "​Short-Exponent RSA," IEICE Transactions on Fundamentals of Electronics,​ Communications and Computer Sciences, Vol. E92-A, No. 3, pp. 912-918, 2009. (SCI) 
 +  - [J62] Hung-Min Sun* and W.-C. Ting, “A Gen2-based RFID Authentication Protocol for Security and Privacy,” IEEE Transactions on Mobile Computing, Vol. 8, No. 8, pp. 1052-1062, 2009. (SCI) 
 +  - [J63] Hung-Min Sun*, M.-E. Wu, and C.-T. Yang, "A Note on Factoring alpha-LSBS Moduli,"​ IEICE Transactions on Fundamentals of Electronics,​ Communications and Computer Sciences, Vol. E92-A, No. 8, pp. 2137-2138, 2009. (SCI)  
 +  - [J64] Hung-Min Sun* and M.-C. Leu, “An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 11, No. 5, pp. 947-959, 2009. (SCI) 
 +  - [J65] Hung-Min Sun*, Mu-En Wu, and Cheng-Ta Yang, "​Simple Backdoors on RSA Modulus by Using RSA Vulnerability,"​ IEICE Transactions on Fundamentals of Electronics,​ Communications and Computer Sciences, Vol. E92-A, No. 9, pp. 2326-2332, 2009. (SCI) 
 +  - [J66] Hung-Min Sun*, K.-H. Wang, and C.-M. Chen, “On the Security of an Efficient Time-Bound Hierarchical Key Management,"​ IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2, pp. 159-160, 2009. (SCI). 
 +  - [J67] Hung-Min Sun*, M.-E. Wu, M. J. Hinek, C.-T. Yang, and V. S. Tseng, "​Trading Decryption for Speeding Encryption in Rebalanced-RSA," ​Journal of Systems and Software, Vol. 82, No. 9, pp. 1503-1512, 2009. (SCI) 
 +  - [J68] Hung-Min Sun*, K.-H. Wang, and W.-C. Ting, “On the Security of Secure Arithmetic Code,” IEEE Transactions on Information Forensics and Security, Vol. 4, No. 4, pp. 781-789, 2009. (SCI) 
 +  - [J69] Hung-Min Sun* and M.-C. Leu, Low-Exponent Encryption for Video Protection Using Context-Key Control,​”Journal of Information Assurance and Security, Vol. 5, Iss. 1, pp. 595-602, 2010. 
 +  - [J70] C.-H. Yang, C.-Y. Weng, S.-J. Wang, Hung-Min Sun, “Grouping Strategies for Promoting Image Quality of Watermarking on the Basis of Vector Quantization,​”Journal of Visual Communication and Image Representation,​ Vol. 21, No. 1, pp. 49-55, 2010. (SCI) 
 +  - [J71] C.-H. Yang, C.-Y. Weng, S.-J. Wang, Hung-Min Sun,​“Varied PVD+ LSB Evading Detection Programs to Spatial Domain in Data Embedding Systems, Journal of Systems and Software, Vol. 83, No. 10, pp 1635-1643, 2010. (SCI) 
 +  - [J72] Hung-Min Sun*, H. Wang, B.-H. Ku, and J. Pieprzyk, “Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time,” SIAM Journal on Discrete Mathematics,​ Vol. 24, No. 2, pp. 617-638, 2010. (SCI). 
 +  - [J73] Y.-H. Lin, A. Studer, Y.-H. Chen, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, Hung-Min Sun, and B.-Y. Yang, “SPATE: Smallgroup PKI-less Authenticated Trust Establishment,​”IEEE Transactions on Mobile Computing, Vol. 9, No. 12, pp. 1666-1681, 2010. (SCI) 
 +  - [J74] Hung-Min Sun*, W.-C. Ting, and K.-H. Wang, “On the Security of Chien'​s Ultra-lightweight RFID Authentication Protocol,​”IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 2, pp. 315-317, 2011. (SCI), NSC 97-2745-P-001-001 
 +  - [J75] Hung-Min Sun*, C.-Y. Weng, C.-F. Lee, and C.-H. Yang, “Anti-forensics with Steganographic Data Embedding in Digital Images,” IEEE Journal on Selected Areas in Communications,​ Vol. 29, No. 7, pp. 1392-1403, 2011. (SCI) 
 +  - [J76] Y. Chen, J.-S. Chou, Hung-Min Sun, and M.-H. Cho, "A novel electronic cash system with trustee-based anonymity revocation from pairing,"​ Electronic Commerce ​Research and Applications,​ Vol. 10, No. 6, pp. 673-682, 2011. (SCI, SSCI) 
 +  [J77] Hung-Min Sun*, H. Wang, K.-H. Wang, and C.-M. Chen, “A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code,” IEEE Transactions on Computers, Vol. 60, No. 6, pp 813-823, 2011. (SCI) 
 +  - [J78] Hung-Min Sun*, Y.-H. Chen, and Y.-H. Lin, "​oPass:​ A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks,"​ IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 651-663, 2012. (SCI) 
 +  - [J79] Y. Chen, J.-S. Chou, and Hung-Min Sun, " A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing,"​ by Chen, Chou, Sun and Cho (2011),"​ Electronic Commerce Research and Applications,​ Vol. 11, No. 4, pp. 443-444, 2012. (SCIE, SSCI) 
 +  - [J80] Hung-Min Sun*, C.-H. Chen, and Y.-F. Ku, "A novel acknowledgment-based approach against collude attacks in MANET,"​ Expert Systems with Applications,​ Vol. 39, No.9, pp. 7968-7975, 2012. (SCI) 
 +  - [J81] Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng, "​Enhanced authentication for commercial video services,"​ Security and Communication Networks, Vol. 5, No. 11, pp. 1248-1259, 2012. (SCIE) 
 +  - [J82] C.-M. Chen, Y.-H. Lin, Y.-C. Lin, and Hung-Min Sun*, “RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks,​” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 4, pp. 727-734, 2012. (SCI) 
 +  - [J83] Shih-Ying Chang, Yue-Hsun Lin, Hung-Min Sun*, and Mu-En Wu, “Practical RSA Signature Scheme Based on Periodical Re-keying for Wireless Sensor Networks,​” ACM Transactions on Sensor Networks, Vol. 8, No. 2, Article 13, p. 1-13, 2012. (SCIE) 
 +  - [J84] Hung-Min Sun*, C.-H. Chen, C.-W. Yeh, and Y.-H. Chen, "A Collaborative Routing Protocol against Routing Disruptions in MANETs,"​ Personal and Ubiquitous Computing, Vol. 17, No. 5, pp. 865-874, 2013. (SCI) 
 +  - [J85] Y.-C. Chen, Y.-S. Yu, R.-S. Chen, I-H. Chou, Hung-Min Sun*, K.-C. Yeh, "​Intelligent Radioactive Waste Management Platform for Radioactive Waste Storage,"​ Nuclear Technology, Vol. 182, No. 3, pp. 358-368, 2013. (SCI).  
 +  - [J86] Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang, Cheng-Hsing Yang, “Data Embedding in Image-media using Weight-function on Modulo Operations,​” ACM Transactions on Embedded Computing Systems, Vol. 12, No. 2, Article 21, 2013. (SCIE)  
 +  - [J87] Y.-H. Lin, S.-Y. Chang, and Hung-Min Sun*, "​CDAMA:​ Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks,"​ IEEE Transactions on Knowledge and Data Engineering,​ Vol. 25, No. 7, pp. 1471-1483, 2013. (SCI)  
 +  - [J88] C.-M. Chen, K.-H. Wang, T.-Y. Wu, J.-S. Pan, Hung-Min Sun*, "A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices,"​ IEEE Transactions on Information Forensics and Security, Vol. 8, No. 8, pp. 1318-1330, 2013. (SCI)  
 +  - [J89] Pei-Chi Chao and Hung-Min Sun*, "​Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study,"​ Information Sciences,"​ Vol. 245, pp. 255-275, 2013. (SCI)  
 +  - [J90] M.-E. Wu, C.-M. Chen, Y.-H. Lin, and Hung-Min Sun*, "On the Improvement of Wiener Attack on RSA with Small Private-exponent,"​ The Scientific World Journal, Article ID 650537, 9 pages, 2014.  (SCI) 
 +  - [J91] C.-M. Chen, S.-M. Chen, X. Zheng, P.-Y. Chen, and Hung-Min Sun*, "A Secure RFID Authentication Protocol Adopting Error Correction Code," The Scientific World Journal, Article ID 704623, 12 pages, 2014. (SCI) 
 +  - [J92] C.-M. Chen, Y.-H. Chen, Y.-H. Lin, Hung-Min Sun*, "​Eliminating Rouge Femtocells based on Distance Bounding Protocol and Geographic Information,"​ Expert Systems with Applications,​ Vol. 41, No. 2, pp. 426-433, 2014. (SCIE)  
 +  - [J93] B.-Z. He, C.-M. Chen, Y.-P. Su, Hung-Min Sun*, "A Defence Scheme Against Identity Theft Attack based on Multiple Social Networks,"​ Expert Systems with Applications,​ Vol. 41, No. 5, pp. 2345-2352, 2014. (SCIE)  
 +  - [J94] S.-M. Chen, M.-E. Wu, Hung-Min Sun*, K.-H. Wang, "​CRFID:​ An RFID system with a cloud database as a back-end server,"​ Future Generation Computer Systems, Vol. 30, pp. 155-161, 2014. (SCIE)  
 +  - [J95] M.-E. Wu, R. Tso, Hung-Min Sun*, "On the Improvement ​of Fermat Factorization Using a Continued Fraction Technique,"​ Future Generation Computer Systems, Vol. 30, pp. 162-168, 2014.  (SCIE)  
 +  - [J96] M.-E. Wu, S.-Y. Chang, C.-J. Lu, Hung-Min Sun*, "A Communication-Efficient Private Matching Scheme in Client-Server Model,"​ Information Sciences, Vol. 275, pp. 348-359, 2014. (SCI)  
 +  - [J97] Chien-Ming Chen, Shaui-Min Chen, Wei-Chih Ting, Chi-Yi Kao, Hung-Min Sun* (2015, Feb). An enhancement of return address stack for security. Computer Standards & Interfaces, Volume 38, pp.17–24. (SCIE)  
 +  - [J98] Hung-Min Sun*, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang (2015, Nov). A provable authenticated group key agreement protocol for mobile environment. Information Sciences, Volume 321, pp. 224–237. (SCI)  
 +  - [J99] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Ruey-Kai Sheu, Hung-Min Sun*, Personal video delivery with rapid Raptor code decoder. Personal and Ubiquitous Computing 20(6): 915-931 (2016) (SCI, IF: 2.395, Ranking: 48/146, Q2) 
 +  - [J100] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun*, Fast and low-complexity encoding of Raptor codes based on operation lists for known source block lengths. Multimedia Tools and Applications 76 (7) : 9219-9243 (2017), (SCI, IF=1.53, Ranking: 45/104, Q2) 
 +  - [J101] Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun*, A shareable keyword search over encrypted data in cloud computing. The Journal of Supercomputing 74(3): 1001-1023 (2018), (SCI, IF=1.326, Ranking: 52/104, Q2). 
 +  - [J102] Wei Wu, Chen-Li Huang, Shiian-Tung Chen, Hung-Min Sun*. An Integration System of Communication App on Image Recognition. Journal of Internet ​Technology. (2016, Jul, accepted). (SCI, IF=1.930, Ranking: 39/89, Q2). 
 +  - [J103] Yuan-Yuan Su, Hung-Min Sun*, Emotion-Based Classification ​and Indexing for Wallpaper and Textile, Applied Science, accepted, June 28, 2017. (SCI, IF=1.679, Ranking: 75/148, Q3). MOST 103-2221-E-007-073-MY3 and MOST 104-2221-E-007 -071 -MY3 
 +  - [J104] Yuan-Yuan Su, Hung-Min Sun*, Emotion-based color transfer of images using adjustable color combinations,​ Soft Computing, accepted, First Online: 13 September 2017. (SCI, IF=2.472, Ranking: 33/105, Q2). MOST-104-2221-E-007-071-MY3. 
 +  - [J105] Wei Wu, Jaime Alvarez, Chengcheng Liu, Hung-Min Sun*. Bot Detection Using Unsupervised Machine Learning. Microsystem Technologies. (2016, Dec, accepted). (SCI, IF=1.195, Ranking: 172/262, Q3). 
 +  - [J106] Yining Liu, Shih-Chi Wang, Yang Yang, Yeh-Cheng Chen, Hung-Min Sun*, An Automatic UI Interaction Script Generator for Android ​Applications ​Using Activity Call Graph Analysis. EURASIA Journal of MathematicsScience and Technology Education. (2018, Feb. accepted). (SCI, IF=0.903, Ranking: 147/235, Q3)  
 +  ​[J107] Hung-Min Sun*, Shiuan-Tung Chen, Jyh-Haw Yeh, Chia-Yun Cheng, A Shoulder Surfing Resistant Graphical Authentication System. IEEE Transactions on Dependable and Secure Computing, 15 (2): 180-193 (2018) (SCI, IF=2.926, Ranking: 12/106, Q1, Impact Factor前15% 校訂傑出期刊).
  
-  * Editorial Board of International Journals +==== Book Chapters ====
-    - Journal of the Chinese Institute of Engineers (JCIE), 2015~now (SCI indexed) +
-    - International Journal of Multimedia Technology, 2013~now. +
-    - Journal of Engineering Research (IER), 2012~now +
-    - International Journal of Information and Computer Science (IJICS), 2012~now +
-    - International Journal of Computer Science and Artificial Intelligence (IJCSAI), 2012~now +
-    - International Journal of Digital Content and Applications (IJDCA), 2012~now +
-    - Recent Patents on Telecommunications,​ 2012~now +
-    - International Journal of Computer Science & Information Technology Applications (IJCSITA), 2011~now +
-    - International Journal of Intelligent Information Processing (IJIIP), 2010~now +
-    - Advances in Information Sciences and Service Sciences: An International Journal of Research and Innovation (AISS), 2010~now +
-    - International Journal of Security (IJS), 2010~now +
-    - ISRN Communications and Networking, 2010~now +
-    - Journal of Information Science and Engineering (JISE), from 2011/8~now (SCI indexed)+
  
-  * Honor Chair: Honor Chair for international conferences +  ​- [B1] Hung-Min Sun*, S.-P. Shieh, On Private-Key Cryptosystems Based on Product Codes, in Information Security and Privacy - ACISP 1998, Lecture Notes in Computer Science, Vol. 1438, Springer-Verlag,​ Berlin, pp. 68-79, 1998. 
-    2009 International Conference ​on Computer and Automation Engineering +  - [B2] M. Michels, M. Stadler, and Hung-Min Sun, On the Security of some Variants of the RSA Signature Scheme, in Computer Security – ESORICS’98,​ J.J. Quisquater, Y. Deswarte, C. Meadows, D. Gollmann (Eds.), Lecture Notes in Computer Science, Vol. 1485, Springer-Verlag,​ Berlin, pp. 85-96, 1998. 
-    - 2009 International Conference ​on Computer ​Research ​and Development +  - [B3] Hung-Min Sun*, Improving the Security of the McEliece Public-Key Cryptosystem,​ in Advances in Cryptology – ASIACRYPT’98,​ Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag,​ Berlin, pp. 200-213, 1998. 
-    2009 International Conference on Telecom Technology ​and Applications+  - [B4] Hung-Min Sun*, W. C. Yang, and C. S. Laih, On the design of RSA with short secret exponent, in Advances in Cryptology – ASIACRYPT’99,​ Lecture Notes in Computer Science, Vol. 1716, Springer-Verlag,​ Berlin, pp. 150-164, 1999. 
 +  - [B5] Hung-Min Sun* and B. L. Chen, On the Decomposition Constructions ​for Perfect Secret Sharing Schemes, in Information and Communications Security – ICICS’97, Lecture Notes in Computer Science, Vol. 1334, Springer-Verlag,​ Berlin, pp. 50-60, 1997. 
 +  [B6] Hung-Min Sun* and C.-T. Yang, On the Design of RSA with Balanced Short Exponents and Its Application,​ in Public Key Cryptography - PKC 2005, Lecture Notes in Computer Science, Vol. 3386, Springer-Verlag,​ Berlin, pp. 199-215, 2005. 
 +  - [B7] Hung-Min Sun*, Y.-H. Lin, and M.-F. Wu, API Monitoring System for Defeating Worms and Exploits in MS-Windows System, in Information Security and Privacy - ACISP 2006, Lecture Notes in Computer Science, Vol. 4058, Springer-Verlag,​ Berlin, pp. 159-170, June 2006.  
 +  - [B8] Hung-Min Sun*, M.-E. Wu, and Y.-H. Chen, Estimating Prime-Factors of RSA Modulus N and Its Application ​on the Extension of the Wiener Attack, in Applied Cryptography and Network Security - ACNS'​07,​ Lecture Notes in Computer ​Science, Springer-Verlag,​ Vol. 4521, pp. 116-128, 2007.  
 +  - [B9] Hung-Min Sun*, M.-E. Wu, H. Wang, and J. Guo, On the Improvement of the BDF Attack on LSBS-RSA, in Information Security and Privacy - ACISP 2008, Lecture Notes in Computer Science, 5107, Editors: Yi Mu, Willy Susilo and Jennifer Seberry, Springer-Verlag,​ pp. 84-97, 2008.  
 +  [B10] Hung-Min Sun*, M.-E. Wu, R. Steinfeld, J. Guo, and H. Wang, Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits, in Cryptology and Network Security - CANS 2008, Lecture Notes in Computer Science, 5339, Springer-Verlag,​ pp. 49-63, 2008. 
 +  - [B11] Hung-Min Sun*, W.-H. Chang, S.-Y. Chang, Y.-H. Lin, DepenDNS: Dependable Mechanism against DNS Cache Poisoning, in Cryptology and Network Security -CANS 2009, Lecture Notes in Computer Science 5888, Springer-Verlag,​ pp. 174-188, 2009. 
 +  - [B12] M.-Y. Hsu, Y.-H. Chen, S.-S. Chen, W. Tang, and Hung-Min Sun, "An IHD Authentication Protocol in Smart Grid, Lecture Notes in Electrical Engineering (LNEE, Springer) - SGSC 2012", Springer, 2012. 
 +  - [B13] M.-E. Wu, R. Tso, Hung-Min Sun*, "​Cryptanalysis of Exhaustive Search ​on Attacking RSA," NSS 2012, Network System Security, Lecture Notes in Computer ​Science 7645, Springer 2012, pp. 373-379, 2012.. 
 +  - [B14] M.-E. Wu, R. Tso, Hung-Min Sun*, "On the Improvement of Fermat Factorization,"​ NSS 2012, Network System Security, Lecture Notes in Computer Science 7645, Springer 2012, pp. 380-391, 2012. 
 +  - [B15] Lun-Pin Yuan, Bing-Zhe He, Chang-Shiun Liu, Hung-Min Sun*, “A Secure ​and Flexible Data Aggregation Framework for Smart Grid. Advanced Technologies,​” Embedded and Multimedia for Human-centric Computing, Netherlands:​ Springer. 2014: Vol. 60, pp. 681-690, 2014. 
 +  [B16] C.-M. Chen, M.-E. Wu, B.-Z. He, X. Zheng, C. Hsing, Hung-Min Sun*, "A Methodology for Hook-Based Kernel Level Rootkits,"​ ISPEC 2014, Information Security Practice and Experience, Lecture Notes in Computer Science, Volume 8434, 2014, pp 119-128, Springer. 
 +  - [B17] C.-R. Li, C.-Y. Kuan, B.-Z. He, W.-E. Wu, C.-Y. Weng, Hung-Min Sun*, " A Security System based on Door Movement Detecting,"​ ECC 2014, Intelligent Data analysis and its Applications,​ Volume I, Advances in Intelligent Systems and Computing, Volume 297, 2014, pp 155-163, Springer.  
 +  - [B18] Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun. A New Public Key Encryption with Equality Test. Network and System Security (8th International Conference, NSS 2014 (ISBN: 978-3-319-11697-6). Switzerland:​ Springer International Publishing. Oct, 2014: Volume 8792 of the series Lecture Notes in Computer Science, pp 550-557.  
 +  - [B19] Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun* . Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. Network and System Security (NSS 2016) (ISBN: 978-3-319-46297-4). Switzerland:​ Springer International Publishing. Sep, 2016: Lecture Notes in Computer Science 9955, pp 47-61.  
 +  - [B20] Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun*. A System of Shareable Keyword Search ​on Encrypted Data. Network ​and System Security (NSS 2016) (ISBN: 978-3-319-46297-4). Switzerland:​ Springer International Publishing. Sep, 2016: Lecture Notes in Computer Science 9955, pp. 283-299.  
 +  - [B21] Amir Rezapour, Wei Wu, Hung-Min Sun*. Cloud-Based Storage Model with Strong User Privacy Assurance. DMBD 2016, Data Mining and Big Data (ISBN: 978-3-31940972-6). Switzerland:​ Springer International Publishing. Jun, 2016: Lecture Notes in Computer Science 9714, pp 373-378. MOST 104-3115-E-007-004.
  
-  * Workshop Co-Chairs 
-    - The 5th International Conference on Future Information Technology (FutureTech 2010) 
  
-  * Organizing Committee +==== Conference Papers ==== 
-    The 3th Joint Workshop on Information Security (JWIS 2008) + 
-    - The 4th Joint Workshop on Information Security (JWIS 2009) +  ​[C1] Hung-Min Sun and T. Hwang, "On the Generation of Large Nonsingular Matrix Pairs and Permutation Matrices for Algebraic-Code Cryptosystems,"​ Proceedings of National Computer Symposium 1989, pp. 796-801. 
-    - The 5th Joint Workshop ​on Information Security (JWIS 2010)+  - [C2] Hung-Min Sun and T. Hwang, "​Public-Key ID-Based Cryptosystem,"​ Proceedings of 1991 IEEE International Carnahan Conference on Security Technology, October 1-3, 1991, pp 142-144. 
 +  - [C3] Hung-Min Sun and T. Hwang, "An Efficient Probabilistic Public-Key block Encryption and Signature Scheme Based on ElGamal'​s Scheme,"​ Proceedings of 1991 IEEE  International Carnahan Conference on Security Technology, October 1-3, 1991, pp 45-148. 
 +  - [C4] Hung-Min Sun and T. Hwang, "​Group-Oriented Threshold Schemes,"​ Proceedings of  the International Conference on Information Engineering,​ 2-5, December 1991, pp. 485-493. 
 +  - [C5] T. Hwang and Hung-Min Sun, "Key Management of the Threshold Schemes,"​ Proceedings of International Symposium on Communications,​ December 9-13, 1991, pp. 602-605. 
 +  - [C6] S. P. Shieh, C. C. Wang and Hung-Min Sun, "​Intrusion Detection in Computer Networks,"​ Proceedings of the Third Conference on Information Security, A.2_4.1-A.2_4.11,​ 1993. 
 +  - [C7] Hung-Min Sun and S. P. Shieh, "A Secret Sharing Scheme for Hierarchical User Groups,"​ Proceedings of the 8th International ​Joint Workshop on Computer Communication,​ G3.1.1-G3.1.4,​ December 12-14, 1993. 
 +  - [C8] Hung-Min Sun and S. P. Shieh, "​Optimal ​Information ​Dispersal for Reliable Communication in Computer Networks,"​ in Proceedings of the 1994 International Conference on Parallel and Distributed Systems (ICPADS'​94),​ pp. 460-464, December 19-21, 1994. (NSC-83-0404-E-009-106) 
 +  - [C9] Hung-Min Sun and S. P. Shieh, "On Constructing Secret Sharing Schemes,"​ Proceedings of the 1994 IEEE International Conference on Computer Communications,​ Networking for Global Communications (IEEE INFOCOM'​94),​ Toronto, pp. 1288-1292, 1994. (NSC-82-0408-E-009-290) 
 +  - [C10] Hung-Min Sun and S. P. Shieh, "​Security Analysis of Dynamic Threshold Schemes,"​ Proceedings of the Fourth National Conference on Information Security, pp. 143-149, 1994. 
 +  - [C11] Hung-Min Sun and S. P. Shieh, "A Perfect Scheme for Secret Sharing between Two Parties,"​ Proceedings of the Fifth National Conference on Information Security, pp. 136-141, 1995. 
 +  - [C12] Hung-Min Sun and S. P. Shieh, “Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes,” Third ACM Conference on Computer and Communications ​Security (ACM CCS’96), New Delhi, India, pp. 153-156, March 14-16, 1996. 
 +  - [C13] Hung-Min Sun and S. P. Shieh, "​Secret Sharing in Graph-Based Prohibited Structures,"​ IEEE INFOCOM'​97,​ Kobe, Japan, April 9-13, 1997. 
 +  - [C14] Hung-Min Sun and G. Horng, "On the Security of Single Assignment Secret Sharing Schemes,"​ Proceedings of 1997 Information Security Conference, pp. 43-47, May, 1997. 
 +  - [C15] Hung-Min Sun and S. P. Shieh, "On the Information Rate of Perfect Secret Sharing Schemes with Access Structures of Rank Three,"​ Proceedings of 1997 Information Security Conference, pp. 48-54, May, 1997. 
 +  - [C16] Hung-Min Sun, W.Y. Lin, and C.C. Chan, "The Study of Improving the Login Security,"​ Proceedings of National Computer Symposium 1997, R.O.C., Vol. 2, pp. c159-c164, 1997. 
 +  - [C17] Hung-Min Sun, S. P. Shieh, and H.M. Sun, "A Secure Broadcasting Cryptosystem in Large Computer Networks,"​ Proceedings of Eighth National Conference on Information Security, May 15-16, pp. 369-378, 1998. 
 +  - [C18] Hung-Min Sun, S. P. Shieh, and H.M. Sun, “On-line multiple secret sharing based on a one-way function,​” Proceedings of Eighth National Conference on Information Security, May 15-16, pp. 331-336, 1998. 
 +  - [C19] Hung-Min Sun, “On the Security of Cryptosystems based on Error-Correcting Codes,​” ​ Proceedings of Eighth National Conference on Information Security, May 15-16, pp. 39-48, 1998. 
 +  - [C20] Hung-Min Sun, and B. T. Shieh, “Remarks on Two Nonrepudiable Proxy Signature Schemes,” Ninth National Conference on Information Security, May 14-15, 1999. 
 +  - [C21] Hung-Min Sun, N. Y. Lee, and T. Hwang, “Nonrepudiable Threshold Proxy Signatures,​” Ninth National Conference on Information Security, May 14-15, 1999. 
 +  - [C22] Hung-Min Sun, and B. R. Ke, “Cryptanalysis of Chen’s Digital Signature Scheme with Message Recovery,​” Ninth National Conference on Information Security, May 14-15, 1999. 
 +  - [C23] Hung-Min Sun, and H. M. Sun, “Cryptanalysis of the Wu-Dawson Public-Key Cryptosystem Based on Generalised Inverses of Matrices,​” Ninth National Conference on Information Security, May 14-15, 1999. 
 +  - [C24] Hung-Min Sun, and B. J. Chen, “Unforgeable Time-Stamped Proxy Signatures with Traceable Receivers,​” Ninth National Conference on Information Security, May 14-15, 1999. 
 +  - [C25] C. C. Chang, C. H. Wang, F. Y. Liou, and Hung-Min Sun, “Remarks on a Digital Signature Scheme Based on Error-Correcting Codes,” Ninth National Conference on Information Security, May 14-15, 1999. 
 +  - [C26] Hung-Min Sun, and B. T. Shieh, “Improved Authenticated Key Agreement Scheme via Password Authentication,​” National Computer Symposium 1999. 
 +  - [C27] Hung-Min Sun, “Convertible Proxy Signature Scheme,” National Computer Symposium 1999. 
 +  - [C28] Hung-Min Sun, B. T. Hsieh, and S. J. Hwang, “Secure Email Protocols Providing Perfect Forward Secrecy,” Information Security Conference 2000, May 5-6, 2000. 
 +  - [C29] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Efficient Three-Party Key Agreement Protocols Resistant to Password Guessing Attacks,” Information Security Conference 2000, May 5-6, 2000. 
 +  - [C30] H. A. Wen, Hung-Min Sun, and T. Hwang, “Optimal Key Exchange and Authentication Protocol Secure Against Dictionary and Replay Attacks,” Information Security Conference 2000, May 5-6, 2000. 
 +  - [C31] Hung-Min Sun, and G. Horng, “Improved Identification Scheme Based on Shamir’s Unbalanced RSA,” Information Security Conference 2000, May 5-6, 2000. 
 +  - [C32] B. C. Chen, Hung-Min Sun, and T. Hwang, “Four-Party Encryption Key Exchange,​” 2000 International Computer Symposium (ICS2000), Dec. 6-8, 2000. 
 +  - [C33] Hung-Min Sun, “On Proxy Multi-Signature Schemes,” 2000 International Computer Symposium (ICS2000), Dec. 6-8, 2000. 
 +  - [C34] B. C. Chen, Hung-Min Sun, and T. Hwang, “An Improved Group Signature Scheme Using Proxy Provers,” Information Security Conference 2001, May 4-5, 2001. 
 +  - [C35] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Improvement of Efficient Three-Party Key Agreement Protocols Resistant to Password Guessing Attacks,” Information Security Conference 2001, May 4-5, 2001. 
 +  - [C36] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Improved Authenticated Multiple-Key Agreement Protocol,​” Information Security Conference 2001, May 4-5, 2001. 
 +  - [C37] Hung-Min Sun, “Cryptanalysis of Password Authentication Schemes with Smart Cards,” Information Security Conference 2001, May 4-5, 2001. 
 +  - [C38] Hung-Min Sun, “Cryptanalysis of a Digital Signature Scheme based on Factoring and Discrete Logarithms,​” National Computer Symposium, Dec. 20-21, 2001. 
 +  - [C39] H. T. Yeh, Hung-Min Sun, and T. Hwang, “Cryptanalysis of Authenticated Key Agreement Protocols,​” National Computer Symposium, Dec. 20-21, 2001. 
 +  - [C40] Hung-Min Sun, B. T. Hsieh, and C. T. Lin, “Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme,” Information Security Conference 2002, pp. 151-154, 2002. 
 +  - [C41] B. T. Hsieh, Hung-Min Sun, T. Hwang, and C. T. Lin, “An Improvement of Saeednia’s Identity-based Key Exchange Protocol,​” Information Security Conference 2002, pp. 41-43, 2002. 
 +  - [C42] Hung-Min Sun, B. T. Hsieh, T. Hwang, and C. T. Lin, “Analysis of A Blind Signature Scheme Based on ElGamal Signature,​” Proceedings of 2002 Symposium on Digital Life and Internet Technologies. 
 +  - [C43] B. T. Hsieh, H. T. Yeh, Hung-Min Sun and C. T. Lin, “Crytanalysis of a fingerprint-based remote user authentication scheme using smart cards”, 2003 IEEE International Carnahan Conference on Security Technology, 2003. 
 +  - [C44] Hung-Min Sun and B. T. Hsieh, “Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection”,​ 2003 IEEE International Carnahan Conference on Security Technology, 2003. 
 +  - [C45] B.C. Chen, Hung-Min Sun, and C. H. Chen, “A Fair and Secure Key Escrow Scheme,” Information Security Conference 2003. 
 +  - [C46] Hung-Min Sun and C. T. Yang, “On the Security of A Publicly Verifiable Authenticated Encryption”,​ Information Security Conference 2003. 
 +  - [C47] H. T. Yeh and Hung-Min Sun, “Password-Based Authentication and Key Distribution Protocols with Perfect Forward Secrecy,” Information Security Conference 2003. 
 +  - [C48] Hung-Min Sun and B. T. Hsieh, "On the Security of Some Proxy Blind Signature Schemes",​ Australasian Information Security Workshop (AISW 2004). 
 +  - [C49] Hung-Min Sun, B. T. Hsieh, and Shin-Mu Tseng, “Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol,​” IEEE International Conference on e-Technology,​ e-Commerce, and e-Service, pp. 563-566. 
 +  - [C50] Hung-Min Sun, C.-T. Yang, and B.-T. Hsieh, “Cryptanalysis of a Threshold Proxy Signature Scheme,” Information Security Conference 2004, pp. 360-365, 2004. 
 +  - [C51] Hung-Min Sun and B. T. Hsieh, “Remarks on Designing Proxy Signature Schemes,” Information Security Conference 2004, pp. 353-359, 2004. 
 +  - [C52] Hung-Min Sun and M.-E. Wu, “Design of Rebalanced RSA-CRT for Fast Encryption,​” Information Security Conference 2005, June 9-10, 2005. (This paper received the best paper award, the only one out of 58 papers.) 
 +  - [C53] Hung-Min Sun, Y.-K. Peng, and C.-M. Chen, “A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks,” Information Security Conference 2005, June 9-10, 2005. 
 +  - [C54] Hung-Min Sun, K.-C. Yang, and K.-H. Wang, “Transferable DRM System for Two New Business Models,” Information Security Conference 2005, June 9-10, 2005. 
 +  - [C55] Hung-Min Sun, C.-F. Hung, and B.-H. Ku, “An Improved Identity-Based DRM System,” Information Security Conference 2005, June 9-10, 2005. 
 +  - [C56] Hung-Min Sun, C.-J. Hong, and C.-H. Chen, “A New Approach to Feature-Based Copyright Protection of Images,” 3rd International Conference on Information Technology: Research and Education, (ITRE 2005), June 27-30, 2005, IEEE Press. 
 +  - [C57] Shen-Wei Chen, Wei-Chi Ting, Hung-Min Sun, Yarsun Hsu, “Modified AES for Wireless Sensor Networks,​” 2005 National Computer Symposium, Dec 15-16, 2005. (This paper received the best paper award) 
 +  - [C58] Hung-Min Sun, C.-Z. Shieh, and C. M. Chen, “An Efficient and Flexible Key Distribution Scheme for Conditional Access System in Pay-TV Systems,” Information Security Conference 2006, June, 2006. (This paper received the best paper award, the only one out of 71 papers.) 
 +  - [C59] Hung-Min Sun, Y.-H. Chen, and K.-H. Wang, “An Image Data Hiding Scheme being Perfectly Imperceptible to Histogram Attacks,” Image and Vision Computing New Zealand 2006 (IVCNZ 2006), November 27-29, 2006, New Zealand. 
 +  - [C60] Hung-Min Sun, C.-F. Hung, and C.-M. Chen, “An Improved Digital Rights Management System Based on Smart Cards,” 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007), Feb. 21-23, 2007, Australia. 
 +  - [C61] Hung-Min Sun,  S.-P. Hsu, and C.-M. Chan, “Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks,​” The IEEE 21st International Conference on Advanced Information Networking and Applications (IEEE AINA-07), May 21-23, 2007, Canada. 
 +  - [C62] Hung-Min Sun, C.-Y. Weng, and S.-J. Wang, “Histogram-based Undetectable Fidelity Image in Steganography as MSB Controller,​” in Proceedings of the Second International Conference on Ubiquitous Information Management and Communication,​ ICUIMC'​08,​ Jan 31-Feb. 2, 2008, Korea, ACM press.  
 +  - [C63] Hung-Min Sun, Y.-H. Lin, S.-M. Chen, and Y.-C. Shen, “Secure and Fast Handover Scheme based on Pre-authentication Method for 802.16/​WiMAX Infrastructure Network,” In Proceeding of TENCON 2007-2007 IEEE Region 10 Conference, pp. 1-4, 2007. 
 +  - [C64] Hung-Min Sun, Y.-T. Tseng, and Y.-H. Lin, “Detecting the Code Injection by Hooking System Calls in Windows Kernel Mode,” ICS 2007. 
 +  - [C65] Hung-Min Sun, C.-M. Chen, F.-Y. Chu, “An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks”,​ in Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), pp. 495-500, 2007. 
 +  [C66] Hung-Min Sun, S.-Y. Chang, S.-M. Chen, and C.-C. Chiu, “An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX,” IEEE APSCC 2008, in Proceeding of the 3rd IEEE Asia-Pacific Services Computing Conference, pp. 199-204, 2008. 
 +  - [C67] Hung-Min Sun, S.-M. Chen, Y.H. Chen, H.J. Chung, and I-H. Lin, “Secure and Efficient Handover Schemes for Heterogeneous Networks,​” IEEE APSCC 2008, in Proceeding of the 3rd IEEE Asia-Pacific Services Computing Conference, pp. 205-210, 2008. 
 +  - [C68] Hung-Min Sun, Y.-H. Lin, Y.-C. Hsiao, and C.-M. Chen, “An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks,​”In Proceedings of IEEE International Conference on Embedded Software and Systems (ICESS 2008), pp. 19-26, July 2008. (Acceptance rate: 21%) 
 +  - [C69] Hung-Min Sun, K. W. Wang, “Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack”, in Proceedings of The International Symposium on Electronic Commerce and Security (ISECS 2008), pp. 385-389, IEEE Computer Society Press, 2008. 
 +  - [C70] Hung-Min Sun, S.-Y. Chang, Y.-H. Lin, and S.-Y. Chiou, “Efficient Authentication Schemes for Handover in Mobile WiMAX,” ISDA 2008, In Proceeding of Eighth International Conference on Intelligent Systems Design and Applications,​ 2008. 
 +  - [C71] Hung-Min Sun and K.-H. Wang, “Designing an Arithmetic Code for Multimedia Files Compression and Encryption,​” Second International ​Workshop on Computer Science and Engineering (WCSE 2009), pp. 444-448, 2009, IEEE press. 
 +  - [C72] Hung-Min Sun, S.Y. Chang, H.T. Chaio, “A Commitment-based Scheme for Securing Vandermonde Codes against Pollution Attacks,” 2009 International Symposium on Intelligent Signal Processing and Communication Systems, (ISPAC 2009), pp. 591-594, IEEE press. 
 +  - [C73] Hung-Min Sun, C.-T. Yang, M.-E. Wu, and V. S. Tseng, “A Multisignature-like Scheme Based on RSA with CRT-Exponents,​” Cryptology and Information Security ​Conference 2009 (CISC2009), (This paper received the best paper award, the only one out of 62 papers.) 
 +  - [C74] Hung-Min Sun, K.-C. Lin, and Y.-H. Lin, “A Novel Monitoring System Against Shellcodes Through Microsoft Windows API Hooking,” Cryptology and Information Security Conference ​2009 (CISC2009). 
 +  - [C75] Y.-H. Lin, A. Studer, H.-C. Hsiao, J. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, Hung-Min Sun, and B.-Y. Yang, “SPATE: Small-group PKI-less Authenticated Trust Establishment,​” ​The 7th Annual International Conference on Mobile Systems, Applications and Services (MobiSys '09), pp. 1-14, 2009. (by ACM SIGMOBILE and the USENIX Association,​ acceptance ratio: 20%) (This paper received the best paper award) 
 +  - [C76] Hung-Min Sun, S.-Y. Chang, Y.-H. Hung, Y.-K. Tseng, H.-T. Chiao, "​Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem,"​ ISPAN 2009, pp.260-265, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 2009. 
 +  - [C77] Hung-Min Sun and M.-C. Leu, “A Real-Time Selective Video Encryption Using Context-Key Control,” The Fifth International Conference ​on Information ​Assurance and Security (ISA-2009), pp. 114-117, 2009. 
 +  - [C78] S.-Y. Chiou, S.-Y. Chang, and Hung-Min Sun, “Common Friends Discovery with Privacy and Authenticity,​” The Fifth International Conference on Information Assurance and Security (ISA-2009), pp. 337-340, 2009. 
 +  - [C79] Hung-Min Sun, Y.-H. Lin, C.-T. Yang, and M.-E. Wu, “A Pair-wise Key Establishment Scheme for Wireless Sensor Networks,​” in Proceeding of IEEE Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2009),​ pp. 1152-1155, 2009. 
 +  - [C80] Hung-Min Sun, C.-W. Weng, S.-J. Wang, “A Scheme of Modulo-Based Capacity-Improvement upon EMD Systems,” in Proceeding of IEEE Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2009),​ pp. 365-368, 2009, IEEE press. 
 +  - [C81] Hung-Min Sun, S.-Y. Chang, and H.-T. Chiao, “Polynomial Interpolation Codes for Reliable Multicast Data Distribution,​” IEEE TENCON 2009, Vols 1-4, pp. 2466-2471, 2009. 
 +  - [C82] S.-Y. Chiou, S.-Y. Chang, G. Mezzour, A. Perrig, Hung-Min Sun, "A Trustable Reputation Scheme Based on Private Relationships,"​ ASONAM 2009, pp.19-24, 2009 International Conference on Advances in Social Network Analysis and Mining, 2009. 
 +  - [C83] H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, A. Perrig, Hung-Min Sun, B.-Y. Yang, H. Kikuchi, “A Study of User-Friendly Hash Comparison Schemes,"​ ACSAC 2009, pp.105-114, 2009 Annual Computer Security Applications Conference, 2009. (Acceptance rate: 19%)  
 +  - [C84] Y.-H. Chen, L.-W. Huang, Y.-H. Lin, S.-W. Huang, C.-H. Yeh, and Hung-Min Sun, “RDAP: Rapid Deployment Authentication Protocol between Mobile Devices and Femtocells,​” in Proceedings of the 2010 IEEE Region 10 Conference, TENCON2010, Fukuoka, Japan: IEEE, Nov. 2010, pp. T4–4.2. 
 +  - [C85] Hung-Min Sun, B.-H. Ku, C.-C. Wu, T.-Y. Lin, “ Improving VQ Index Compress with Modified Relative Index Table,” 2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (CDEE), pp. 221-225, 2010, IEEE press. 
 +  - [C86] C.-M. Chen, H.-T. Chiao, S.-T. Chen, and Hung-Min Sun, “A New Business Model in Pay-TV broadcasting Systems and its Conditional Access System,” in Proceedings of the 2010 IEEE Region 10 Conference, TENCON2010, Fukuoka, Japan: IEEE, Nov. 2010, pp. T4–4.3. 
 +  - [C87] Y.-H. Lin, B.Z. He, Hung-Min Sun, and Y.-H. Chen, “CDS: Concealed Data Storing Scheme in Wireless Sensor Networks,​” International Computer Symposium (ICS 2010), Dec. 2010. 
 +  - [C88] H.-T. Chiao, K.-M. Li, Hung-Min Sun, S.-Y., Chang, H.A. Hou, “Application-Layer FEC for file delivery over the WiMAX unicast networks,​” 2010 12th IEEE Internation Conference on Communication Technology (ICCT), pp. 685-688, 2010, IEEE press. 
 +  - [C89] Hung-Min Sun, S.-Y. Chang, A.B. Tello, and Y.-H. Chen, “An Authentication Scheme Balancing Authenticity and Transmission for Wireless Sensor Networks,​” International Computer Symposium (ICS 2010), Dec. 2010. (This paper received the best paper award.) 
 +  - [C90] Hung-Min Sun, C.-H. Chen, and P.-C. Li, “A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks,​” 2011 ICPP workshop on Applications of Wireless Ad Hoc and Sensor Networks, 2011. 
 +  - [C91] Hung-Min Sun, C.-S. Chen, C.-L. Chen, Y.-H. Chen, ”A Robust Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks,​” 2011 3rd World Congress in Applied Computing, Computer Science, and Computer Engineering,​ (ACC 2011), 2011. 
 +  - [C92] Hung-Min Sun, C.-H. Chen, L.-C. Hsu, Y.-H. Chen, and Y.-H. Chen, “Reliable Data Transmission against Packet Dropping Misbehavior in Wireless Ad Hoc Networks,​” 2011 IET International Communication Conference on Wireless Mobile and Computing, CCWMC 2011, 2011. 
 +  - [C93] Hung-Min Sun, C.-H. Chen, C.-W. Yeh, Y.-H. Chen, “A Collaborative Routing Protocol against Routing Disruptions in MANETs, ” WCC-11 ACSA, 2011. 
 +  - [C94] Hung-Min Sun*, S.-M. Chen, and K.-H. Wang, “Cryptanalysis on the RFID ACTION Protocol, ” The 2011 International Conference on Security and Management (SAM'​11),​ 2011. 
 +  - [C95] P. Chao and Hung-Min Sun*, "​Multi-agent based cloud utilization for IT OA assets dispatching process in SCM's view: An empirical study,"​ 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2012, pp. 80-87, 2012. 
 +  - [C96] C.-M. Chen, T.-Y. Wu, B.-Z. He, Hung-Min Sun, "An Efficient Time-Bound Hierarchical Key Management Scheme without Tamper-Resistant Devices,"​ 2012 International Conference on Computing, Measurement,​ Control and Sensor Network (CMCSN 2012), pp. 285-288, 2012.  
 +  - [C97] Hung-Min Sun*, Y.-H. Chen, C.-C. Fang, and S.-Y. Chang, "​PassMap:​ A Map Based Graphical-Password Authentication System,"​ ASIACCS 2012, 2012. 
 +  - [C98] S.-T. Chen, H.-T. Chiao, S.-Y. Chang, Hung-Min Sun, and C.-H. Ho, Efficient Encoding of Systematic Raptor Codes Based on Operation Lists for Known Block Lengths,"​ 2013 IEEE Wireless Communications and Networking Conference (WCNC 2013), pp. 4689-4694, 2013.   
 +  - [C99] S.-T Chen, H.-T. Chiao, S.-Y. Chang, Hung-Min Sun, P.-S. Zeng, "An HD Streaming System for WiFi Multicast Channels Based on Application-Layer FEC. 2013 IEEE 17th International Symposium on Consumer Electronics (ISCE), Taiwan, 2013. 
 +  - [C100] C.-Y. Weng, C.-H. Yang, C.-I Fan, K.-L. Liu and Hung-Min Sun*, " Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality,"​ The 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), Seoul, Korea, 2013. 
 +  - [C101] L.-P. Yuan, B.-Z. He, C.-S. Liu, and Hung-Min Sun*, " A Secure and Flexible Data Aggregation Framework for Smart Grid," The 8th International Conference on Embedded and Multimedia Computing (EMC 2013), 2013. 
 +  - [C102] Y.-C. Chen, R.-S. Chen, C.-P. Ye, Hung-Min Sun, "RFID Application on Manufacturing Process Control in Semiconductor Industry,"​ The World Congress on Engineering 2013 (WCE 2013), London, U.K., 2013. 
 +  - [C103] B.-Z. He, K.-L. Huang, Hung-Min Sun*, R. Tso, “A Virtual Network Guard System Based on Cloud Computing Environments,​” the 8th International Conference on Genetic and Evolutionary Computing (ICGEC 2014) October, 18-20, 2014 in Nanchang, China. 
 +  - [C104] Yeh-Cheng Chen, Hung-Min Sun, Ruey-Shun Chen (2014, Jan). Design and implementation of wearable RFID tag for real-time ubiquitous medical care. 2014 IEEE Topical Conference on Biomedical Wireless Technologies,​ Networks, and Sensing Systems (BioWireleSS),​ Newport Beach, CA, U.S.A.  
 +  - [C105] Yuan-Yuan Su, Yu-Tzu Chang, Hung-Min Sun* (2015, Sep). A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices. The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2015), Adelaide, Australia.  
 +  - [C106] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun* (2015, Dec). Accelerating Raptor Code Decoding Using Group Parameters for IPTV Service Delivery. 2015 IEEE International Conference on Smart City/​SocialCom/​SustainCom (SmartCity),​ Chengdu, China.  
 +  - [C107] Amir Rezapour, Shiuan-Tung Chen, Hung-Min Sun* (2015, Dec). Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers. 2015 IEEE International Conference on Smart City/​SocialCom/​SustainCom together with DataCom 2015 and SC2 2015, Chengdu, China. 
 +  - [C108] Chen-Li Huang, Wei Wu, Shiuan-Tung Chen, Hung-Min Sun* (2016, May). An Integrated System of Communication APPs for Mobile Phone. IEEE 2016 International Conference on Applied System Innovation (ICASI 2016), Okinawa, Japan.  
 +  - [C109] Ming-Zhe Wua,, Wei Wub, Hung-Min Sun* (2016, Jun). Component Based Android Malware Variants Classification using Machine Learning. The 6th International Conference on Engineering and Applied Sciences, Hong Kong.  
 +  - [C110] Andrea E. Medina Paredes, Yuan-Yuan Su, Wei Wu, Hung-Min Sun* (2016, Jun). Using Unsupervised Machine Learning to Detect Peer-to-Peer Botnet Flows. International Conference on Advanced Technology Innovation (ICATI 2016), Bali, Indonesia. 
 +  - [C111] Wei-Ling Chang, Hung-Min Sun*, Wei Wu (2016, Aug). An Android BehaviorBased Malware Detection Method using Machine Learning. 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC 2016), Hong Kong. 
 +  - [C112] Wei-Fa Liao, Hung-Min Sun*, Wei Wu (2016, Aug). A Distributed and Autonomous Guard System Based on Cloud Environments. The 2nd IEEE International Conference on Big Data Intelligence and Computing (IEEE DataCom 2016), Auckland, New Zealand. 
 +  - [C113] Yeh-cheng Chen, C. N. Chu, Hung Min Sun, Ruey-Shun Chen, Mengru Tu, S.C. Lin, Using Case-based Reasoning Method to Design a Return Merchandise Authorization System for Supply Chain Management in Internet of Thing”, 2017 17th IEEE International Conference on Communication Technology (ICCT 2017). 
 +  - [C114] Yeh-cheng Chen, C. N. Chu, Hung Min Sun, Jyh-haw Yeh, Ruey-Shun Chen, Chorng-Shiuh Koong, Development of an Intelligent Equipment Lock Management System with RFID Technology, 2017 18th IEEE The International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2017). 
 +  - [C115] Wuxain Zhang, Hung-Min Sun* (2017, Jan). Instagram Spam Detection. The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Christchurch,​ New Zealand.  
 +  - [C116] Yuan-Yuan Su, Hung-Min Sun* (2017, May). Emotion-Based Classification and Indexing for Wallpaper and Textile. 2017 IEEE International Conference on Applied System Innovation, Sapporo, Japan.  
 +  - [C117] Yining Liu, Shih-Chi Wang, Yang Yang, Yeh-Cheng Chen, Hung-Min Sun*, Automatic UI Interaction Script Generator for Android Applications Using Activity Call Graph Analysis, The 2017 International Conference on Innovation, Communication and Engineering (ICICE 2017), Nov. 5-11, 2017. 
 +  - [C118] Yi-Wen Chen, Hung-Min Sun*: An Approach for Reducing the Traffic within Cloud Environments Based on Customized Linux Kernel. IEEE International Conference on Cloud Computing Technology and Science, pp. 227-230, CloudCom 2017, Hong Kong, December 11-14, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-0692-6 
 +  - [C119] Nicole Weatherburne,​ Hung-Min Sun*, “A Method for Exploring Bipolar Disorder Behaviours on Twitter,” 2018 HKICEPS, Hong Kong International Conference on Education, Psychology and Society, Hong Kong, January 22-24, 2018.  
 +  - [C120] Yuan-Hao Chan, Hung-Min Sun*, “Visual Cryptography for 3-Dimentinal Polygon Model,” 2018 HKICEAS, Hong Kong International Conference on Engineering and Applied Science, Hong Kong, January 24-26, 2018. 
 +  - [C121] Phezulu Dlamini, Hung-Min Sun*, “Mining Textual Relationships from Social Media Data for Users’ E-Learning Experiences,​” Eurasian Conference on Educational Innovation (ECEI 2018), Macau, January 26-29, 2018.  
 + 
 +==== Patents (USA) ==== 
 + 
 +  - [P1] Hung-Min Sun, Shih-Pu Hsu, and Chien-Ming Chen, “Mobile jamming attack method in wireless sensor network and method defending the same,” US Patent 7,907,888, Patent Period: March 15, 2011 ~ Oct. 31, 2028. 
 +  - [P2] Muh-chyi Leu and Hung-Min Sun, “Authentication method employing elliptic curve cryptography,​” US Patent 8,117,447, Patent Period: Feb. 14, 2012 ~ August 31, 2032. 
 +  - [P3] Cheng-Kai Chen, Hung-Min Sun, Kang-Chiao Lin, Shih-Ying Chang, and Shuai-Min Chen,  “Apparatus,​ method, and computer readable medium thereof for generating and utilizing a feature code to monitor a program,” US Patent 8,127,276, Patent Period: Feb. 28, 2012 ~ August 31, 2032. 
 +  - [P4] Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, and Yue-Hsun Lin, “Method and system for handover authentication,​” US Patent 8,131,296, Patent Period: March 6, 2012 ~ Sep. 30, 2032. 
 +  - [P5] Frank Chee-Da Tsai; Chien-Chien Chiu, I-Hung Lin, Hung-Min Sun, Shuai-Min Chen, Yao-Hsin Chen, Heng-Jeng Chung, “Mobile Station, Access Point, Gateway Apparatus, Base Station, and Handshake Method Thereof for Use in a Wireless Network Framework,​” US Patent 8,527,768, Patent Period: September 3, 2013 ~ March 31, 2034. 
 +  - [P6] Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, and Hung-Min Sun, “Method for sending and receiving an evaluation of reputation in a social network,” US Patent 8,312,276, Patent Period: November 13, 2012 ~ May 31, 2033. 
 +  - [P7] Hung-Min Sun, Chun-Hao Yeh, Yao-Hsin Chen, “Captcha image authentication method and system,” US Patent 8,607,331, Patent Period: December 10, 2013 ~ June 30, 2034. 
 +  - [P8] Hung-Min Sun, Man-Ting Kuo, Yao-Hsin Chen, Shih-Ying Chang, “Verification method and system,​”US Patent 8,774,412, Patent Period: July 8, 2014 ~ Jan. 31, 2035.  
 +  - [P9] Shiuan-Tung Chen, Hsin-Ta Chiao, Hung-Min Sun, and Chia-Hsing Ho, “Apparatus and method for accelerating the encoding of raptor codes,” US Patent 8,839,067, Patent Period: Sep. 16, 2014 ~ March 31, 2035. 
 +  - [P10] Hung-Min Sun, Chi-Ming Li, “Authentication method and code setting method and authentication system for electronic apparatus,​” ​ US Patent 9,141,777, Patent Period: Sep. 22, 2015 ~ March 31, 2036. 
 +  - [P11] Shiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun, “Communication system, method and receiver applicable thereto,” US Patent 9,264,181, Patent Period: February 16, 2016 ~ Aug. 31, 2036. 
 +  - [P12] Hung-Min Sun, Shiuan-Tung Chen, Ming-Sheng Yeh, “Multi-touch methods and devices,” US Patent 9,336,376, Patent Period: May 10, 2016 ~ Nov. 30, 2036. 
 + 
 + 
 +==== 中華民國專利 ==== 
 + 
 +  - [PC1] 孫宏民, 陳孟彰, 林宸堂, “數位影像版權之保護與驗證方法,​” 中華民國專利,證書號:​199742,​ 專利年限:​ 2004/​03/​21至2019/​12/​19. 
 +  - [PC2] 孫宏民, 楊政達, 林宸堂, “以短亂數為基礎之使用者身份驗證方法,​” 中華民國專利,證書號:​I296175,​ 專利年限:​ 2008/​04/​21至2022/​12/​03. 
 +  - [PC3] 陳政愷, 孫宏民, 林港喬, 張仕穎, 陳帥名, “產生及利用一特徵碼以監測一程式之裝置、方法、應用程式及其電腦可讀取媒體,​” 中華民國專利,證書號:​I335531,​ 專利年限:​ 2011/​01/​01至2026/​12/​12. 
 +  - [PC4] 孫宏民, 張仕穎, “輕量及彈性無線感測器訊息認證方法,​” 中華民國專利,證書號:​ I341095, 專利年限:​ 2011/​04/​21至2027/​12/​11 
 +  - [PC5] 孫宏民, 徐士卜, 陳建銘 , “無線感測網路上移動式阻斷服務攻擊方法及其防禦方法,​” 中華民國專利,證書號:​ I346491, 專利年限:​ 2011/​08/​01至 2027/​11/​19. 
 +  - [PC6] 蔡其達, 沈誼中, 邱簡謙, 孫宏民, 陳帥名, 林岳勳, 蕭英助, “無線網路之預先安全認證與金鑰交換系統與方法,​” 中華民國專利,證書號:​ I351207, 專利年限:​ 2011/​10/​21至 2027/​10/​28. 
 +  - [PC7] 呂沐錡, 孫宏民, “基於橢圓曲線密碼學之認證方法,​” 中華民國專利,證書號:​ I357251, 專利年限:​ 2012/​01/​21至2028/​02/​14. 
 +  - [PC8] 邱錫彥, 孫宏民, 張仕穎, 林岳勳, “交遞驗證方法與系統” 中華民國專利,證書號:​ I351207, 專利年限:​ 2013/​03/​21至2028/​12/​14. 
 +  - [PC9] 邱錫彥, 張仕穎, 玫柔 佳婷,​ 培瑞 安卓,​ 孫宏民, “網路評價系統及其控制方法” 中華民國專利,證書號:​ I396428, 專利年限:​ 2013/​05/​11至2029/​07/​07. 
 +  - [PC10] 孫宏民, 林岳勳, 張仕穎, “行動隨意網路下安全資料聚合之方法” 中華民國專利,證書號:​ I396424, 專利年限:​ 2013/​05/​11至2028/​07/​22. 
 +  - [PC11] 蔡其達, 邱簡謙, 林益宏, 孫宏民, 陳帥名, 陳耀鑫, 鍾恒正, “無線網路架構之行動台、存取台、閘道裝置、基地台及其握手方法” 中華民國專利,證書號:​ I410105, 專利年限: ​ 2013/​09/​21至2028/​11/​30. 
 +  - [PC12] 孫宏民, 郭嫚婷, 陳耀鑫, 張仕穎, “驗證方法與系統” 中華民國專利,證書號:​ I430217, 專利年限:​ 2014/​03/​11至2031/​08/​07. 
 +  - [PC13] 孫宏民, 葉鈞豪, 陳耀鑫, “應用圖形稽碼機制之認證方法與系統” 中華民國專利,證書號:​ I460606, 專利年限:​ 2014/​11/​11至2031/​07/​14. 
 +  - [PC14] 孫宏民, 李啟銘, “電子裝置之認證方法及密碼設定方法及認證系統” 中華民國專利,證書號:​ I476626, 專利年限:​ 2015/03/11 至2032/​08/​23.  
 +  - [PC15] 陳宣同, 焦信達, 孫宏民, 何家興, “猛禽碼之編碼加速裝置與方法”,​ 中華民國專利,證書號:​ I485992, 專利年限:​ 2015/05/21 至2032/​08/​30.  
 +  - [PC16] 孫宏民, 陳宣同, 葉明昇, “多點觸碰方法與裝置”,​ 中華民國專利,證書號:​ I501101, 專利年限:​ 2015/09/21 至2033/​04/​18.  
 +  - [PC17] 孫宏民, 李佑聰, “網路認證系統及其方法”,​ 中華民國專利,證書號:​ I514189, 專利年限:​ 2015/09/21 至2033/​04/​18.  
 +  - [PC18] 孫宏民, 陳宣同, 葉明昇, “多點觸碰方法與裝置”,​ 中華民國專利,證書號:​ I501101, 專利年限:​ 2015/09/21 至2033/​04/​18.  
 +  - [PC19] 陳宣同, 焦信達, 張仕穎, 孫宏民, “通訊系統、其方法與其接收端,​” 中華民國專利,證書號:​ I519143, 專利年限:​ 2016/​01/​21 ​ 至2019/​01/​20. ​  
 +  - [PC20] 孫宏民, 鍾乙瑄, 廖哲輝, “具有時戳驗證的免憑證公開金鑰管理方法”,​ 中華民國專利,證書號:​ I593267, 專利年限:​ 2017/​07/​21 ​ 至2035/​12/​16 .
  
-  * Publicity Chair 
-    - 2013 International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA) 
-    - 2013 The 7th International Symposium on Digital Forensics and Information Security (DFIS) 
-    - 2012 International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA) 
-    - The 2012 Summer FTRA International Symposium on Advances in Cryptography,​ Security and Applications for Future Computing (ACSA) 
-    - 2012 6th Int'l Conference on New Trends in Information Science, Service Science and Data Mining (ISSDM) 
-    - 2012 The 9th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA) 
-    - 2012 International Workshop on Advances in Cryptography,​ Security and Applications for Future Computing (ACSA) 
-    - 2011 International Workshop on Advances in Cryptography,​ Security and Applications for Future Computing (ACSA) 
-    - 2009 The Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MIPS) 
-    - 2009 International Workshop on Advances in Cryptography,​ Security and Applications for Future Computing (ACSA) 
-    - 2009 International Conference on Electronic Computer Technology (ICECT) 
-    - 2009 International Conference on Computer Modeling and Simulation (ICCMS) 
-    - 11th Information Security Conference (ISC08) 
  
-  * Program Committee Member 
-    - 2018 ICISSP 
-    - 2017 NaNA 
-    - 2017 AINA 
-    - 2017 SAM 
-    - 2017 DBMD 
-    - 2017 FiCloud 
-    - 2017 CloudComm 
-    - 2017 ICATI 
-    - 2017 SAPSE 
-    - 2017 IEACon 
-    - 2017 ICAIS 
-    - 2017 ISTA 
-    - 2016 ICISSP ​ 
-    - 2016 DMBD 
-    - 2016 SAPSE (IEEE COMPSAC Workshop) 
-    - 2016 SAM 
-    - 2016 FNC 
-    - 2016 MobiApps 
-    - 2016 IEACon 
-    - 2016 SECURWARE 
-    - 2016 WCNSSP 
-    - 2016 AMSM 
-    - 2016 ICSS 
-    - 2016 CLOUD COMPUTING 
-    - 2016 ISPEC 
-    - 2016 SpaCCS 
-    - 2016 NSS 
-    - 2016 IEEE TrustCom 
-    - 2016 DPNoC 
-    - 2016 CS 
-    - 2016 IOV, PST(Security Track) 
-    - 2015 CLOUD COMPUTING ​ 
-    - 2015 CPSS 
-    - 2015 FiCloud 
-    - 2015 IOV 
-    - 2015 ISPEC 
-    - 2015 PST 
-    - 2015 SAM 
-    - 2015 SocialSec 
-    - 2015 TrustCom 
-    - 2015 ICCME 
-    - 2015 ICISSP 
-    - 2015 ICISC 
-    - 2015 ICICS 
-    - 2015 SOWN 
-    - 2015 SAPSE (IEEE COMPSAC Workshop) 
-    - 2015 CENTRIC 
-    - 2015 ICCVE 
-    - 2014 IEEE CloudCom ​ 
-    - 2014 NSS 
-    - 2014 ISCAIE 
-    - 2014 PST 
-    - 2014 ISIEA 
-    - 2014 ICATC 
-    - 2014 PST 
-    - 2014 SC2 
-    - 2014 ICISC 
-    - 2014 ICCVE 
-    - 2014 WNCS 
-    - 2014 MobiApps 
-    - 2014 DPNoC 
-    - 2014 IEEE GLOBECOM CISS 
-    - 2014 IEEE SCC 
-    - 2014 International Conference on Information Security Practice and Experience 
-    - 2013 IEEE Global Telecommunications Conference ​ 
-    - 2013 IEEE International Conference on Cloud Computing Technology and Science 
-    - 2013 SAM 
-    - 2013 IEEE ISCI 
-    - 2013 ICIS  
-    - 2013 NSS 
-    - 2013 ICISC 
-    - 2013 ICECT 
-    - 2012 NSS  
-    - 2012 IEEE ICETEM 
-    - 2012 ICECT 
-    - 2012 ICHEP 
-    - 2012 ICMAE 
-    - 2012 SAM 
-    - 2012 ISSPA 
-    - 2012 ICS 
-    - 2012 ICIWE 
-    - 2012 International Conference on Information Security and Cryptology (ICISC 2012 
-    - 2012 IEEE ISCAIE 
-    - 2012 ICACT 
-    - 2011 SGH 
-    - 2011 IEEE ICCSIT 
-    - 2011 IEEE ICIME  
-    - 2011 WSN 
-    - 2011 ICONI Workshop on Network Security 
-    - 2011 ICFCC 
-    - 2011 ICSAP 
-    - 2011 ICMBE 
-    - 2011 ICMG 
-    - 2011 ICECT 
-    - 2011 ICCRD 
-    - 2011 ICCDA 
-    - 2011 ICMET 
-    - 2011 ICENT 
-    - 2011 IC4E 
-    - 2011 ICFN; 
-    - 2010 ICONI Workshop on Network Security 
-    - 6th International Symposium on Wireless Sensor Network Technologies and Applications for Smart Space (WTA 2010) 
-    - 2010 The 2nd International Conference on Future Ntworks (ICFN 2010) 
-    - 2010 the 2nd International Conference on Information and Multimedia Technology (ICIMT 2010) 
-    - 2010 The 3rd IEEE International Conference on Computer Science and Information Technology (IEEE ICCSIT 2010) 
-    - 2010 The 2nd International Conference on Future Computer and Communication (ICFCC 2010) 
-    - 2010 International Conference on e-Education,​ e-Business, e-Management and e-Learning (IC4E 2010) 
-    - 2010 IEEE International Conference on Advanced Management Science (IEEE ICAMS 2010) 
-    - 2010 International Conference on Educational and Network Technology (ICENT 2010) 
-    - 2010 International Conference on Mechanical and Electrical Technology (ICMET 2010) 
-    - 2010 International Conference on Computer Design and Applications (ICCDA 2010) 
-    - 2010 International Conference on Computer Research and Development (ICCRD 2010) 
-    - 3rd International Conference on Contemporary Computing (IC3 –2010) 
-    - The 2010 International Conference on Signal Acquisition and Processing (ICSAP 2010) 
-    - The 2nd International Conference on Electronic Computer Technology (ICECT 2010) 
-    - 2010 International Conference on Instructional and Computer Technology (ICICT 2010) 
-    - 2010 International Workshop on Ubiquitous Body Sensor Networks (UBSN 2010) 
-    - 2009 International Workshop on Security Virtual Computing Environment 
-    - International Conference on Signal Acquisition and Processing 2009 (ICSAP 2009) 
-    - 2009 International Conference on Future Computer and Communication 
-    - 1st International Workshop on Security Engineering Environment 2009 
-    - 2nd IEEE International Conference on Computer Science and Information Technology 2009 
-    - 2009 International Conference on Information Management and Engineering 
-    - 2009 International Conference on Mechanical and Electrical Technology 
-    - 2008, 2009, 2010 The 3nd, 4th, 5th, International Symposium on Smart Home (SH'​08,​ SH’09, SH’2010) 
-    - 2009 International Conference on Information and Multimedia Technology (ICIMT 2009) 
-    - 2008 Information Security Conference (ISC 2008), Special Session on AES Subcommittee 
-    - 2008 Workshop of Information Security 
  
-  * International Advised Boards 
-    - The 2nd International Conference on Digital Image Processing (ICDIP 2010) 
-    - The 2010 International Conference On Bioinformatics and Biomedical Technology (ICBBT 2010) 
-    - 2010 The 2nd International Conference on Computer Engineering and Technology (ICCET 2010) 
-    - 2010 The 2nd IEEE International Conference on Information management and engineering (IEEE ICIME 2010) 
-    - The 2nd International Conference on Applied Physics and Mathematics (ICAPM 2010) 
-    - The Second International Workshop for Asian Public Key Infrastructures (IWAP 2002) 
-===== Research Projects ===== 
-==== 主持、參與大型計畫與產學合作 ==== 
-    - 過去本人主持、參與大型研究計畫與產學合作,包括台達電、國科會、中科院、工研院、資策會、經濟部科專、昱捷微系統、洲際城等單位,將理論研究與實務做密切的連結,並擔任中華民國資訊安全學會產學合作委員會主任委員,促進資訊安全產業界與學界合作。近十年共執行50多個研究計畫,​總金額超過三千萬,亦曾擔任清華大學產學合作營運總中心智財技轉組組長之工作,協助校方教師及研究人員進行專利申請及技術移轉之工作。 
-    - 擔任教育部委託之教育學術網路系統安全保證及反駭客控制技術研發中心計畫總主持人(2011/​1~2011/​12),協助本校計算機通訊中心之教育網路及其他學校之教育網路對於BOTNET偵測與防制駭客入侵有相當大的績效。 
-    - 參加iCAST (http://​www.icast.org.tw/​),​ (The International Collaboration for Advancing Security Technology)跨國性資安合作計畫(2007~2009):​ Investigation on Advanced Remote Authentication Technologies (TWISC, Project 312) 
-    - 擔任台達/​清大聯合研究中心電子書整合型計畫之總計畫主持人(2010/​8~2011/​7),計畫名稱:​ 數位學習與閱讀 - 電子書之角色行為分析與應用。(第一期) 
-    - 擔任台達/​清大聯合研究中心電子書整合型計畫之總計畫主持人(2011/​11~2012/​12),計畫名稱:​ 數位學習與閱讀 -電子書之角色行為分析與應用。(第二期) 
-    - 擔任台達/​清大聯合研究中心電子書整合型計畫之總計畫主持人(2013/​03~2014/​02),計畫名稱:​ 數位學習與閱讀。(第三期) 
-    - 擔任台達/​清大聯合研究中心雲端運算(DCoud)計畫-Security分項主持人(2011/​8~2014/​7),計畫名稱:​資訊安全技術。 
-    - 與中科院國防科技合作計畫,包括無線網路WiMAX之安全問題研究。這是非常實務之研究計畫,與我國國防中有關電腦網路安全方面之攻擊與防禦發展有相當大的助益。 
-    - 與資策會進行研究計畫,包括Femtocell Security網路安全技術研究、行動異質多網安全技術先期研究、MCBCS尚可有效管理與認證群組金鑰之研究、Heterogeneous Broadband Wireless Security技術研究、UMA 安全相關技術之研究等,這些計畫皆是發展產業界目前迫切需要發展之技術,也讓我們能夠了解及發掘一些實務問題,並以我們資訊安全上的專業知識來解決問題。 
-    - 與工研院進行研究計畫,包括高鐵高畫質Application-Layer FEC技術、架構於ISO 27001標準之隱私保護資料庫細項、高鐵Application-Layer FEC技術、DVB-Mobile/​3GPP E-MBMS Raptor Code、專利要旨表及專利內容整理、接收機與Smartcard之整合/​加密軟體程式開發、數位電視廣播之DRM系統設計之研究、智慧型電網資料聚集加密機制研究、高鐵Android平台AL-FEC技術等,這些計畫皆是產業界目前迫切需要發展之技術,也讓我們能夠了解及發掘一些實務問題,並以專業知識來研究解決問題。 
advisor/main.1504775008.txt.gz · 上一次變更: 2017/09/07 17:03 由 iswikiadmin
CC Attribution-Noncommercial-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0