default search action
Da-Zhi Sun
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Changhao Li, Zhixin Ma, Dazhi Sun, Guoming Zhang, Jinming Wen:
Stochastic IHT With Stochastic Polyak Step-Size for Sparse Signal Recovery. IEEE Signal Process. Lett. 31: 2035-2039 (2024) - 2023
- [j36]Da-Zhi Sun, Yi-Na Gao, Yangguang Tian:
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices. Sensors 23(14): 6559 (2023) - 2021
- [j35]Da-Zhi Sun, Ji-Dong Zhong:
Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing. Secur. Commun. Networks 2021: 5598574:1-5598574:12 (2021) - [j34]Da-Zhi Sun:
Security and Privacy Analysis of Vinoth et al.'s Authenticated Key Agreement Scheme for Industrial IoT. Symmetry 13(10): 1952 (2021) - [c13]Mingxi Tan, Dazhi Sun, Xiaohong Li:
A Secure and Efficient Blockchain-based Key Management Scheme for LoRaWAN. WCNC 2021: 1-7 - 2020
- [j33]Xiang-Yu Guo, Da-Zhi Sun, Ying Yang:
An Improved Three-Factor Session Initiation Protocol Using Chebyshev Chaotic Map. IEEE Access 8: 111265-111277 (2020) - [j32]Da-Zhi Sun, Yi Mu:
On the Security of Symmetric Encryption Against Mass Surveillance. IEEE Access 8: 175625-175636 (2020)
2010 – 2019
- 2019
- [j31]Da-Zhi Sun, Ze-Guang Zhu, Guangquan Xu, Wei Guo:
One-round provably secure yoking-proof for RFID applications. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j30]Athmane Seghier, Jianxin Li, Dazhi Sun:
Advanced encryption standard based on key dependent S-Box cube. IET Inf. Secur. 13(6): 552-558 (2019) - [j29]Weiwei Liu, Da-Zhi Sun, Yangguang Tian:
Efficient oblivious transfer with membership verification. Int. J. Distributed Sens. Networks 15(9) (2019) - [j28]Da-Zhi Sun, Li Sun:
On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications. Sensors 19(5): 1158 (2019) - [j27]Da-Zhi Sun, Li Sun, Ying Yang:
On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy. Sensors 19(15): 3259 (2019) - [c12]Fanyu Shi, Jizeng Wei, Dazhi Sun, Guo Wei:
A Systematic Approach to Horizontal Clustering Analysis on Embedded RSA Implementation. ICPADS 2019: 901-906 - 2018
- [j26]Tian Li, Dazhi Sun, Peng Jing, Kaixi Yang:
Smart Card Data Mining of Public Transport Destination: A Literature Review. Inf. 9(1): 18 (2018) - [j25]Da-Zhi Sun, Yi Mu, Willy Susilo:
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 55-67 (2018) - [j24]Da-Zhi Sun, Yi Mu, Willy Susilo:
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 69 (2018) - [j23]Da-Zhi Sun, Yi Mu:
Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems. IEEE Wirel. Commun. Lett. 7(2): 254-257 (2018) - 2017
- [c11]Qingran Wang, Wei Guo, Dazhi Sun, Jizeng Wei:
A High Efficient Control Flow Authentication Method Basing on Loop Isolation. NCCET 2017: 96-103 - [c10]Da-Zhi Sun, Guangquan Xu:
One-Round Provably Secure Yoking-Proof for RFID Applications. TrustCom/BigDataSE/ICESS 2017: 315-322 - 2016
- [j22]Yu Sun, Xingxuan Kuang, Da-Zhi Sun:
The geographic concentration of China's e-business enterprises: where they gather and why. Electron. Mark. 26(1): 31-42 (2016) - [j21]Da-Zhi Sun, Ji-Dong Zhong:
Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol. Wirel. Pers. Commun. 91(3): 1085-1093 (2016) - [c9]Da-Zhi Sun, Xiao-Hong Li:
Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3. ICICS 2016: 403-417 - [c8]Zhongyuan Hao, Wei Guo, Jizeng Wei, Dazhi Sun:
Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing on FPGA Platform. Trustcom/BigDataSE/ISPA 2016: 584-589 - 2015
- [c7]Shaoguang Geng, Xiaohong Li, Zhiyong Feng, Da-Zhi Sun:
Web Application Architecture Security Evaluation Method Based on AADL. ICECCS 2015: 186-189 - [i2]Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2015: 37 (2015) - 2013
- [j20]Da-Zhi Sun, Zhen-Fu Cao:
On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity. Cryptologia 37(4): 345-355 (2013) - [j19]Da-Zhi Sun, Jin-Peng Huai, Zhen-Fu Cao:
A comment on "An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation". Inf. Sci. 223: 331-334 (2013) - [j18]Da-Zhi Sun, Jian-Xin Li, Zhiyong Feng, Zhen-Fu Cao, Guangquan Xu:
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquitous Comput. 17(5): 895-905 (2013) - [j17]Jianxin Li, Xudong Liu, Lu Liu, Dazhi Sun, Bo Li:
HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree. Telecommun. Syst. 52(2): 1353-1365 (2013) - [c6]Rui Xu, Guangquan Xu, Da-Zhi Sun, Xiaohong Li, Zhiyong Feng:
Improving KeyNote Trust Management Model Based on User Behavior for Social Learning. ICWL Workshops 2013: 96-103 - 2012
- [j16]Da-Zhi Sun, Jin-Peng Huai, Jian-Xin Li:
A note on asynchronous multi-exponentiation algorithm using binary representation. Inf. Process. Lett. 112(22): 876-879 (2012) - [j15]Da-Zhi Sun, Ji-Dong Zhong:
A hash-based RFID security protocol for strong privacy protection. IEEE Trans. Consumer Electron. 58(4): 1246-1252 (2012) - [i1]Da-Zhi Sun:
An error in "On a new formal proof model for RFID location privacy". IACR Cryptol. ePrint Arch. 2012: 31 (2012) - 2011
- [c5]Jingwei Hu, Wei Guo, Jizeng Wei, Yisong Chang, Dazhi Sun:
A Novel Architecture for Fast RSA Key Generation Based on RNS. PAAP 2011: 345-349 - 2010
- [j14]Peng Zeng, Kim-Kwang Raymond Choo, Da-Zhi Sun:
On the security of an enhanced novel access control protocol for wireless sensor networks. IEEE Trans. Consumer Electron. 56(2): 566-569 (2010) - [c4]Jianxin Li, Bo Li, Linlin Meng, Dazhi Sun:
HiTrust: A Hybrid Tree Based Trust Negotiation Service. AINA Workshops 2010: 854-859
2000 – 2009
- 2009
- [j13]Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Jian-Xin Li:
Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. Comput. Commun. 32(6): 1015-1017 (2009) - [j12]Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Jian-Xin Li, Jiawan Zhang, Zhiyong Feng:
Improvements of Juang 's Password-Authenticated Key Agreement Scheme Using Smart Cards. IEEE Trans. Ind. Electron. 56(6): 2284-2291 (2009) - [c3]Dazhi Sun, Lin Sun, Pranay K. Ravoola, Shuai Zhao:
A microscopic simulation-based decision support system to develop changeable message sign alternatives. ITSC 2009: 1-5 - 2008
- [j11]Da-Zhi Sun, Zhen-Fu Cao:
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme. Int. J. Netw. Secur. 6(1): 116-120 (2008) - [j10]Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Jiawan Zhang, Zhiyong Feng:
A new design of wearable token system for mobile device security. IEEE Trans. Consumer Electron. 54(4): 1784-1789 (2008) - 2007
- [j9]Da-Zhi Sun:
A note on Chang-Lai's modular square algorithm based on the generalized Chinese remainder theorem. Appl. Math. Comput. 188(1): 411-416 (2007) - [j8]Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Jiawan Zhang:
Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation algorithm. Appl. Math. Comput. 190(2): 1848-1854 (2007) - [j7]Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Zhen-Fu Cao:
An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks. IEEE Trans. Consumer Electron. 53(4): 1718-1723 (2007) - 2006
- [j6]Da-Zhi Sun, Zhen-Fu Cao, Yu Sun:
How to compute modular exponentiation with large operators based on the right-to-left binary algorithm. Appl. Math. Comput. 176(1): 280-292 (2006) - [j5]Dazhi Sun, Rahim F. Benekohal, S. Travis Waller:
Bi-level Programming Formulation and Heuristic Solution Approach for Dynamic Traffic Signal Optimization. Comput. Aided Civ. Infrastructure Eng. 21(5): 321-333 (2006) - 2005
- [j4]Da-Zhi Sun, Zhen-Fu Cao, Yu Sun:
Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme. Appl. Math. Comput. 164(3): 675-678 (2005) - [j3]Da-Zhi Sun, Zhen-Fu Cao, Yu Sun:
Remarks on a new key authentication scheme based on discrete logarithms. Appl. Math. Comput. 167(1): 572-575 (2005) - [j2]Da-Zhi Sun, Zhen-Fu Cao:
Improved public key authentication scheme for non-repudiation. Appl. Math. Comput. 168(2): 927-932 (2005) - [j1]Da-Zhi Sun, Ji-Dong Zhong, Yu Sun:
Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme. Appl. Math. Comput. 170(2): 1185-1193 (2005) - [c2]Da-Zhi Sun, Zhen-Fu Cao:
Improvement of Lee-Kim-Yoo's Remote User Authentication Scheme Using Smart Cards. FSKD (2) 2005: 596-599 - 2003
- [c1]Dazhi Sun, Rahim F. Benekohal, S. Travis Waller:
Multi-objective Traffic Signal Timing Optimization Using Non-dominated Sorting Genetic Algorithm II. GECCO 2003: 2420-2421
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint