| An efficient remote use authentication scheme using smart cards HM Sun IEEE Transactions on Consumer Electronics 46 (4), 958-961, 2000 | 707 | 2000 |
| Adaptive data hiding in edge areas of images with spatial LSB domain systems CH Yang, CY Weng, SJ Wang, HM Sun IEEE Transactions on Information Forensics and Security 3 (3), 488-497, 2008 | 620 | 2008 |
| Three-party encrypted key exchange: attacks and a solution CL Lin, HM Sun, T Hwang ACM SIGOPS Operating Systems Review 34 (4), 12-20, 2000 | 260 | 2000 |
| An efficient nonrepudiable threshold proxy signature scheme with known signers HM Sun Computer communications 22 (8), 717-722, 1999 | 258 | 1999 |
| Threshold proxy signatures HM Sun, NY Lee, T Hwang IEE Proceedings-Computers and Digital Techniques 146 (5), 259-263, 1999 | 224 | 1999 |
| oPass: A user authentication protocol resistant to password stealing and password reuse attacks HM Sun, YH Chen, YH Lin IEEE transactions on information forensics and security 7 (2), 651-663, 2011 | 220 | 2011 |
| RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks CM Chen, YH Lin, YC Lin, HM Sun IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011 | 218 | 2011 |
| Attacks and solutions on strong-password authentication CL Lin, HM Sun, T Hwang IEICE transactions on communications 84 (9), 2622-2627, 2001 | 196 | 2001 |
| Three-party encrypted key exchange without server public-keys CL Lin, HM Sun, M Steiner, T Hwang IEEE Communications letters 5 (12), 497-499, 2001 | 195 | 2001 |
| A novel mutual authentication scheme based on quadratic residues for RFID systems Y Chen, JS Chou, HM Sun Computer Networks 52 (12), 2373-2380, 2008 | 185 | 2008 |
| On the security of Chien's ultralightweight RFID authentication protocol HM Sun, WC Ting, KH Wang IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009 | 178 | 2009 |
| Dual RSA and its security analysis HM Sun, ME Wu, WC Ting, MJ Hinek IEEE Transactions on Information Theory 53 (8), 2922-2933, 2007 | 168 | 2007 |
| A shoulder surfing resistant graphical authentication system HM Sun, ST Chen, JH Yeh, CY Cheng IEEE Transactions on Dependable and Secure Computing 15 (2), 180-193, 2016 | 153 | 2016 |
| On proxy (multi-) signature schemes HM Sun | 151 | 2000 |
| Secure key agreement protocols for three-party against guessing attacks HM Sun, BC Chen, T Hwang Journal of Systems and Software 75 (1-2), 63-68, 2005 | 132 | 2005 |
| Spate: small-group pki-less authenticated trust establishment YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 128 | 2009 |
| On the security of some proxy blind signature schemes HM Sun, BT Hsieh, SM Tseng Journal of systems and software 74 (3), 297-302, 2005 | 125 | 2005 |
| A blockchain-based application system for product anti-counterfeiting J Ma, SY Lin, X Chen, HM Sun, YC Chen, H Wang IEEE Access 8, 77642-77652, 2020 | 124 | 2020 |
| A Gen2-based RFID authentication protocol for security and privacy HM Sun, WC Ting IEEE Transactions on Mobile Computing 8 (8), 1052-1062, 2008 | 117 | 2008 |
| An Android mutation malware detection based on deep learning using visualization of importance from codes YS Yen, HM Sun Microelectronics Reliability 93, 109-114, 2019 | 104 | 2019 |