Dr. Hung-Min Sun

Professor
National Tsing Hua University, Taiwan


Highest Degree
Ph.D. in Computer Science and Information Engineering from National Chiao Tung University, Taiwan

Share this Profile

Biography

Dr. Hung-Min Sun is currently working as Vice Director of University Library, and Professor of Department of Computer Science at National Tsing Hua University. He has completed his Ph.D. in Computer Science and Information Engineering from National Chiao Tung University, Taiwan. Previously he was appointed as Associate Professor at Chung Hua University and Chaoyang University of Technology, Assistant Professor and Associate Professor at National Cheng Kung University, and Visiting Professor at The University of Auckland. His area of research interest focuses on Network Security, Internet of Things, Cloud Computing, Wireless Sensor Networks, and Cryptography. Dr. Hung-Min received honors includes Outstanding Research Award, 2015 WITC (World Congress on Information Technology Applications and Services), The Best Paper Award in International Computer Symposium, The Best Paper Award in Information Security Conference, and The Advisor of Master Thesis Award - Outstanding in Institute of Information & Computing Machinery. He is editor in chief in Advances in Information Sciences and Service Sciences: An International Journal of Research and Innovation, and International Journal of Digital Content Technology and its Applications and member of editorial board in number of international journals. He has published 95 research articles in journals as well as 106 conference papers, 16 book chapters, and 16 patents contributed as author/co-author. He successfully completed number of research projects.

Area of Interest:

Computer Sciences
Network Security
Internet of Things
Cloud Computing
Wireless Sensor Network

Selected Publications

  1. Wu, M.E., S.Y. Chang, C.J. Lu and H.M. Sun, 2014. A communication-efficient private matching scheme in Client-Server model. Inform. Sci., 275: 348-359.
    CrossRef  |  Direct Link  |  

  2. Wu, M.E., R. Tso and H.M. Sun, 2014. On the improvement of Fermat factorization using a continued fraction technique. Future Gener. Comput. Syst., 30: 162-168.
    CrossRef  |  Direct Link  |  

  3. Wu, M.E., C.M. Chen, Y.H. Lin and H.M. Sun, 2014. On the improvement of wiener attack on RSA with small private exponent. Scient. World J. 10.1155/2014/650537.
    CrossRef  |  Direct Link  |  

  4. He, B.Z., C.M. Chen, Y.P. Su and H.M. Sun, 2014. A defence scheme against identity theft attack based on multiple social networks. Expert Syst. Applic., 41: 2345-2352.
    CrossRef  |  Direct Link  |  

  5. Chen, S.M., M.E. Wu, H.M. Sun and K.H. Wang, 2014. CRFID: An RFID system with a cloud database as a back-end server. Future Gener. Comput. Syst., 30: 155-161.
    CrossRef  |  Direct Link  |  

  6. Chen, C.M., Y.H. Chen, Y.H. Lin and H.M. Sun, 2014. Eliminating rouge femtocells based on distance bounding protocol and geographic information. Expert Syst. Applic., 41: 426-433.
    CrossRef  |  Direct Link  |  

  7. Chen, C.M., S.M. Chen, X. Zheng, P.Y. Chen and H.M. Sun, 2014. A secure RFID authentication protocol adopting error correction code. Scient. World J. 10.1155/2014/704623.
    CrossRef  |  Direct Link  |  

  8. Sun, H.M., C.Y. Weng, S.J. Wang and C.H. Yang, 2013. Data embedding in image-media using weight-function on modulo operations. ACM Trans. Embedded Comput. Syst., Vol. 12, No. 2. 10.1145/2423636.2423639.
    CrossRef  |  Direct Link  |  

  9. Sun, H.M., C.H. Chen, C.W. Yeh and Y.H. Chen, 2013. A collaborative routing protocol against routing disruptions in MANETs. Personal Ubiquitous Comput., 17: 865-874.
    CrossRef  |  Direct Link  |  

  10. Lin, Y.H., S.Y. Chang and H.M. Sun, 2013. CDAMA: Concealed data aggregation scheme for multiple applications in wireless sensor networks. IEEE Trans. Knowledge Data Eng., 25: 1471-1483.
    CrossRef  |  Direct Link  |  

  11. Chen, Y.C., Y.S. Yu, R.S. Chen, I.H. Chou, H.M. Sun and K.C. Yeh, 2013. Intelligent radioactive waste management platform for radioactive waste storage facilities. Nuclear Technol., 182: 358-368.
    Direct Link  |  

  12. Chen, C.M., K.H. Wang, T.Y. Wu, J.S. Pan and H.M. Sun, 2013. A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Trans. Inform. Forensics Secur., 8: 1318-1330.
    CrossRef  |  Direct Link  |  

  13. Chao, P.C. and H.M. Sun, 2013. Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study. Inform. Sci., 245: 255-275.
    CrossRef  |  Direct Link  |  

  14. Sun, H.M., Y.H. Chen and Y.H. Lin, 2012. oPass: A user authentication protocol resistant to password stealing and password reuse attacks. IEEE Trans. Inform. Forensics Secur., 7: 651-663.
    CrossRef  |  Direct Link  |  

  15. Sun, H.M., C.H. Chen and Y.F. Ku, 2012. A novel acknowledgment-based approach against collude attacks in MANET. Expert Syst. Applic., 39: 7968-7975.
    CrossRef  |  Direct Link  |  

  16. Huang, X., C.K. Chu, H.M. Sun, J. Zhou and R.H. Deng, 2012. Enhanced authentication for commercial video services. Secur. Commun. Networks, 5: 1248-1259.
    CrossRef  |  Direct Link  |  

  17. Chen, Y., J.S. Chou, H.M. Sun and M.S. Cho, 2012. A response to a critique of A novel electronic cash system with trustee-based anonymity revocation from pairing, by Chen, Chou, Sun and Cho (2011). Electron. Commerce Res. Applic., 11: 443-444.
    CrossRef  |  Direct Link  |  

  18. Chen, C.M., Y.H. Lin, Y.C. Lin and H.M. Sun, 2012. RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst., 23: 727-734.
    CrossRef  |  Direct Link  |  

  19. Sun, H.M., H. Wang, K.H. Wang and C.M. Chen, 2011. A native apis protection mechanism in the kernel mode against malicious code. IEEE Trans. Comput., 60: 813-823.
    CrossRef  |  Direct Link  |  

  20. Sun, H.M., C.Y. Weng, C.F. Lee and C.H. Yang, 2011. Anti-forensics with steganographic data embedding in digital images. IEEE J. Sel. Areas Commun., 29: 1392-1403.
    CrossRef  |  Direct Link  |  

  21. Chen, Y., J.S. Chou, H.M. Sun and M.H. Cho, 2011. A novel electronic cash system with trustee-based anonymity revocation from pairing. Electron. Commerce Res. Applic., 10: 673-682.
    CrossRef  |  Direct Link  |  

  22. Yang, C.H., C.Y. Weng, S.J. Wang and H.M. Sun, 2010. Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. J. Syst. Software, 83: 1635-1643.
    CrossRef  |  Direct Link  |  

  23. Yang, C.H., C.Y. Weng, S.J. Wang and H.M. Sun, 2010. Grouping strategies for promoting image quality of watermarking on the basis of vector quantization. J. Visual Commun. Image Representation, 21: 49-55.
    CrossRef  |  Direct Link  |  

  24. Sun, H.M., H. Wang, B.H. Ku and J. Pieprzyk, 2010. Decomposition construction for secret sharing schemes with graph access structures in polynomial time. SIAM J. Discrete Math., 24: 617-638.
    CrossRef  |  Direct Link  |  

  25. Sun, H.M. and M.C. Leu, 2010. Low-exponent encryption for video protection using context-key control. J. Inform. Assurance Secur., 5: 595-602.
    Direct Link  |  

  26. Lin, Y.H., A. Studer, Y.H. Chen, H.C. Hsiao and J. McCune et al., 2010. SPATE: Small-group PKI-less authenticated trust establishment. IEEE Trans. Mobile Comput., 9: 1666-1681.
    CrossRef  |  Direct Link  |  

  27. Sun, H.M., W.C. Ting and K.H. Wang, 2009. On the security of Chien's ultralightweight RFID authentication protocol. IEEE Trans. Dependable Secure Comput., 8: 315-317.
    CrossRef  |  Direct Link  |  

  28. Sun, H.M., M.E. Wu, M.J. Hinek, C.T. Yang and V.S. Tseng, 2009. Trading decryption for speeding encryption in Rebalanced-RSA. J. Syst. Software, 82: 1503-1512.
    CrossRef  |  Direct Link  |  

  29. Sun, H.M., M.E. Wu and C.T. Yang, 2009. Simple backdoors on RSA modulus by using RSA vulnerability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E92-A: 2326-2332.
    Direct Link  |  

  30. Sun, H.M., M.E. Wu and C.T. Yang, 2009. A note on factoring α-LSBS moduli. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E92-A: 2137-2138.
    CrossRef  |  Direct Link  |  

  31. Sun, H.M., K.H. Wang and W.C. Ting, 2009. On the security of the secure arithmetic code. IEEE Trans. Inform. Forensics Secur., 4: 781-789.
    CrossRef  |  Direct Link  |  

  32. Sun, H.M., K.H. Wang and C.M. Chen, 2009. On the security of an efficient time-bound hierarchical key management scheme. IEEE Trans. Dependable Secure Comput., 6: 159-160.
    CrossRef  |  Direct Link  |  

  33. Sun, H.M., C.T. Yang and M.E. Wu, 2009. Short-exponent RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E92-A: 912-918.
    Direct Link  |  

  34. Sun, H.M. and W.C. Ting, 2009. A Gen2-based RFID authentication protocol for security and privacy. IEEE Trans. Mobile Comput., 8: 1052-1062.
    CrossRef  |  Direct Link  |  

  35. Sun, H.M. and M.C. Leu, 2009. An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans. Multimedia, 11: 947-959.
    CrossRef  |  Direct Link  |  

  36. Yang, C.H., C.Y. Weng, S.J. Wang and H.M. Sun, 2008. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inform. Forensics Secur., 3: 488-497.
    CrossRef  |  Direct Link  |  

  37. Sun, H.M., C.M. Chen and C.Z. Shieh, 2008. Flexible-pay-per-channel: A new model for content access control in pay-TV broadcasting systems. IEEE Trans. Multimedia, 10: 1109-1120.
    CrossRef  |  Direct Link  |  

  38. Chen, Y., J.S. Chou and H.M. Sun, 2008. A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput. Networks, 52: 2373-2380.
    CrossRef  |  Direct Link  |  

  39. Sun, H.M., M.E. Wu, W.C. Ting and M.J. Hinek, 2007. Dual RSA and its security analysis. IEEE Trans. Inform. Theory, 53: 2922-2933.
    CrossRef  |  Direct Link  |  

  40. Sun, H.M. and H.T. Yeh, 2006. Password-based authentication and key distribution protocols with perfect forward secrecy. J. Comput. Sys. Sci., 72: 1002-1011.
    CrossRef  |  Direct Link  |  

  41. Yeh, H.T. and H.M. Sun, 2005. Password authenticated key exchange protocols among diverse network domains. Comput. Electr. Eng., 31: 175-189.
    CrossRef  |  Direct Link  |  

  42. Sun, H.M., B.T. Hsieh and S.M. Tseng, 2005. On the security of some proxy blind signature schemes. J. Syst. Software, 74: 297-302.
    CrossRef  |  Direct Link  |  

  43. Sun, H.M., B.T. Hsieh and H.J. Hwang, 2005. Secure e-mail protocols providing perfect forward secrecy. IEEE Commun. Lett., 9: 58-60.
    CrossRef  |  Direct Link  |  

  44. Sun, H.M., B.C. Chen and T. Hwang, 2005. Secure key agreement protocols for three-party against guessing attacks. J. Syst. Software, 75: 63-68.
    CrossRef  |  Direct Link  |  

  45. Yeh, H.T., H.M. Sun and B.T. Hsieh, 2004. Security of a remote user authentication scheme using smart cards. IEICE Trans. Commun., E87-B: 192-194.
    Direct Link  |  

  46. Yeh, H.T. and H.M. Sun, 2004. Password-based user authentication and key distribution protocols for client-server applications. J. Syst. Software, 72: 97-103.
    CrossRef  |  Direct Link  |  

  47. Sun, H.M., B.C. Chen and H.T. Yeh, 2004. On the design of time-stamped signatures. J. Comput. Syst. Sci., 68: 598-610.
    CrossRef  |  Direct Link  |  

  48. Lin, C.L., H.A. Wen, T. Hwang and H.M. Sun, 2004. Provably secure three-party password-authenticated key exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E87-A: 2990-3000.
    Direct Link  |  

  49. Hsieh, B.T. and H.M. Sun, 2004. An improvement of a deniable authentication protocol. IEICE Trans. Commun., E87-B: 3099-3101.
    Direct Link  |  

  50. Yi, X., C.K. Siew, H.M. Sun, H.T. Yeh, C.L. Lin and T. Hwang, 2003. Security of park-lim key agreement schemes for VSAT satellite communications. IEEE Trans. Veh. Technol., 52: 465-468.
    CrossRef  |  Direct Link  |  

  51. Yeh, H.T., H.M. Sun, C.T. Yang, B.C. Chen and S.M. Tseng, 2003. Improvement of password authenticated key exchange based on RSA for imbalanced wireless networks. IEICE Trans. Commun., E86-B: 3278-3282.
    Direct Link  |  

  52. Yeh, H.T., H.M. Sun and T. Hwang, 2003. Improved authenticated multiple-key agreement protocol. Comput. Math. Applic., 46: 207-211.
    CrossRef  |  Direct Link  |  

  53. Yeh, H.T., H.M. Sun and T. Hwang, 2003. Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. J. Inform. Sci. Eng., 19: 1059-1070.
    Direct Link  |  

  54. Sun, H.M., H.T. Yeh and T. Hwang, 2003. On the linkability of some group signature schemes. Informatica, 14: 85-94.
    Direct Link  |  

  55. Sun, H.M. and H.T. Yeh, 2003. Further cryptanalysis of a password authentication scheme with smart cards. IEICE Trans. Commun., E86-B: 1412-1415.
    Direct Link  |  

  56. Hsieh, B.T., H.M. Sun and T. Hwang, 2003. On the security of some password authentication protocols. Informatica, 14: 195-204.
    Direct Link  |  

  57. Yeh, H.T. and H.M. Sun, 2002. Simple authenticated key agreement protocol resistant to password guessing attacks. ACM SIGOPS Operat. Syst. Rev., 36: 14-22.
    CrossRef  |  Direct Link  |  

  58. Sun, H.M., W.C. Yang and C.S. Laih, 2002. On the design of RSA with short secret exponent. J. Inform. Sci. Eng., 18: 1-18.
    Direct Link  |  

  59. Sun, H.M., 2002. On the security of a variation of Cramer-Shoup's public key scheme. J. Inform. Sci. Eng., 18: 19-22.
    Direct Link  |  

  60. Sun, H.M., 2002. Improving the information rate of a private-key cryptosystem based on product codes. Informatica, 13: 105-110.
    Direct Link  |  

  61. Sun, H.M. and B.L. Chen, 2002. Weighted decomposition construction for perfect secret sharing schemes. Comput. Math. Applic., 43: 877-887.
    CrossRef  |  Direct Link  |  

  62. Hsieh, B.T., H.M. Sun and T. Hwang, 2002. Cryptanalysis of enhancement for simple authentication key agreement algorithm. Electron. Lett., 38: 20-21.
    CrossRef  |  Direct Link  |  

  63. Yeh, H.T., H.M. Sun and T. Hwang, 2001. Security analysis of the generalized key agreement and password authentication protocol. IEEE Commun. Lett., 5: 462-463.
    CrossRef  |  Direct Link  |  

  64. Sun, H.M., 2001. Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices. IEEE Commun. Lett., 5: 61-63.
    CrossRef  |  Direct Link  |  

  65. Lin, C.L., H.M. Sun, M. Steiner and T. Hwang, 2001. Three-party encrypted key exchange without server public-keys. IEEE Commun. Lett., 5: 497-499.
    CrossRef  |  Direct Link  |  

  66. Lin, C.L., H.M. Sun and T. Hwang, 2001. Efficient and practical DHEKE protocols. ACM SIGOPS Operat. Syst. Rev., 35: 41-47.
    CrossRef  |  Direct Link  |  

  67. Lin, C.L., H.M. Sun and T. Hwang, 2001. Attacks and solutions on strong-password authentication. IEICE Trans. Commun., E84-B: 2622-2627.
    Direct Link  |