⍝ 重要著作: |
|
☄ 期刊論文 |
|
1. |
H.-M. Sun, B.-T. Hsieh, and H.-J. Hwang, “Secure E-mail protocols providing perfect forward secrecy,” IEEE Communications Letters, vol. 9, no. 1, pp. 58–60, January 2005. (SCI, EI) |
|
2. |
H.-M. Sun, B.-T. Hsieh, and Shin-Mu Tseng, "On the Security of Some Proxy Blind Signature Schemes," Journal of Systems and Software, Volume 74, Issue 3,Pages 297-302, 2005. (SCI, EI) |
|
3. |
B.-T. Hsieh and H.-M. Sun, "An Improvement of A Deniable Authentication Protocol," IEICE Transactions on Communications, Vol.E87-B No.10 pp.3099-3101, Oct. 2004. (SCI, EI) |
|
4. |
H.-T. Yeh, H.-M. Sun, and B.-T. Hsieh, "Security of a Remote User Authentication Scheme using Smart Cards," IEICE Transactions on Communications, Vol.E87-B No.1 pp.192-194 2004. (SCI, EI) |
|
5. |
B.-T. Hsieh, H.-M. Sun, and T. Hwang, "On the Security of Some Password Authentication Protocols," International Journal of Informatica, Vol. 14, Issue 2, pp. 195-204, 2003. (SCI, EI) |
|
6. |
B.-T. Hsieh, H.-M. Sun, and T. Hwang, "Cryptanalysis of Enhancement for Simple Authentication Key Agreement Algorithm," IEE Electronics Letters, Vol. 38, Issue 1, pp. 20-21, 2002. (SCI, EI) |
|
☄ 專書及會議論文 |
|
1. |
Hung-Min Sun, Cheng-Ta Yang, and Bin-Tsan Hsieh , "Cryptanalysis of a Threshold Proxy Signature Scheme," Information Security Conference 2004. |
|
2. |
Hung-Min Sun and Bin-Tsan Hsieh, "Remarks on Designing Proxy Signature Schemes," Information Security Conference 2004. |
|
3. |
Hung-Min Sun, Bin-Tsan Hsieh, and Shin-Mu Tseng, "Cryptanalysis of Aydos et al.’s ECC-Based Wireless Authentication," IEEE International Conference on e-Technology, e-Commerce, and e-Service(EEE-04), pp. 563-566, 2004. |
|
4. |
Hung-Min Sun, Bin-Tsan Hsieh, "On the Security of Some Proxy Blind Signature Schemes," Australasian Information Security Workshop (AISW 2004), 2004. |
|
5. |
Bin-Tsan Hsieh, Hung-Min Sun, "Key Compromise Impersonation Attack on Shim’s Key Agreement Protocol from Weil Pairing," Symposium on Digital Life and Internet Technologies, 2003. |
|
6. |
Bin-Tsan Hsieh, Hung-Min Sun, "Cryptanalysis of Lee et al.’s Strong Proxy Signature Scheme and Its Applications," Symposium on Digital Life and Internet Technologies, 2003. |
|
7. |
Hung-Min Sun and Bin-Tsan Hsieh, "Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection," International IEEE Carnahan Conference on Security Technology, pp. 474-476, 2003. |
|
8. |
Bin-Tsan Hsieh, Her-Tyan Yeh, Hung-Min Sun, and Chern-Tang Lin "Crytanalysis of a fingerprint-based remote user authentication scheme using smart cards," International IEEE Carnahan Conference on Security Technology, pp.349-350, 2003. |
|
9. |
Hung-Min Sun, Bin-Tsan Hsieh, Tzonelih Hwang, and C. T. Lin, "Analysis of A Blind Signature Scheme Based on ElGamal Signature," Symposium on Digital Life and Internet Technologies, 2002. |
|
10. |
Bin-Tsan Hsieh, Hung-Min Sun, Tzonelih Hwang, and C. T. Lin, “An Improvement of Saeednia’s Identity-based Key Exchange Protocol,” Information Security Conference 2002, pp. 41-43, 2002. |
|
11. |
Hung-Min Sun, Bin-Tsan Hsieh, and C. T. Lin, “Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme,” Information Security Conference 2002, pp. 151-154, 2002. |
|
12. |
Hung-Min Sun, Bin-Tsan Hsieh, and S. J. Hwang, “Secure Email Protocols Providing Perfect Forward Secrecy,” Information Security Conference 2000, May 5-6, 2000. |
|
13. |
Hung-Min Sun and Bin-Tsan Hsieh, “Remarks on Two Nonrepudiable Proxy Signature Schemes,” Proceedings of the Ninth National Conference on Information Security, pp. 241-246, May 14-15, 1999. |
|
14. |
Hung-Min Sun and Bin-Tsan Hsieh, “Improved Authenticated Key Agreement Scheme via Password Authentication,” National Computer Symposium 1999. |