default search action
Lein Harn
Person information
- affiliation: University of Missouri-Kansas City, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j98]Ching-Fang Hsu, Zhe Xia, Tianshu Cheng, Lein Harn:
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G. Comput. J. 67(3): 840-850 (2024) - [j97]Ze Zhang, Chingfang Hsu, Man Ho Au, Lein Harn, Jianqun Cui, Zhe Xia, Zhuo Zhao:
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones. Comput. Networks 238: 110118 (2024) - [j96]Zhuo Zhao, Ching-Fang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang, Liu Liu:
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones. Cybersecur. 7(1): 50 (2024) - [j95]Liu Liu, Ching-Fang Hsu, Man Ho Au, Lein Harn, Jianqun Cui, Zhuo Zhao:
A revocable and comparable attribute-based signature scheme from lattices for IoMT. J. Syst. Archit. 154: 103222 (2024) - [j94]Shuchang Zeng, Ching-Fang Hsu, Lein Harn, Yi-Ning Liu, Yang Liu:
Efficient and Privacy-Preserving Skyline Queries Over Encrypted Data Under a Blockchain-Based Audit Architecture. IEEE Trans. Knowl. Data Eng. 36(9): 4603-4617 (2024) - 2023
- [j93]Chingfang Hsu, Lein Harn, Zhe Xia, Jianqun Cui, Jingxue Chen:
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks. Comput. J. 66(1): 208-220 (2023) - [j92]Lein Harn, Ching-Fang Hsu, Zhe Xia, Zixuan Li:
Multiple Blind Signature for e-Voting and e-Cash. Comput. J. 66(10): 2331-2338 (2023) - [j91]Ching-Fang Hsu, Zhe Xia, Lein Harn, Man Ho Au, Jianqun Cui, Zhuo Zhao:
Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities. Inf. Sci. 647: 119488 (2023) - [j90]Lein Harn, Chingfang Hsu, Zhe Xia, Hang Xu, Shuchang Zeng, Fengling Pang:
Simple and efficient threshold changeable secret sharing. J. Inf. Secur. Appl. 77: 103576 (2023) - [j89]Linyan Bai, Ching-Fang Hsu, Lein Harn, Jianqun Cui, Zhuo Zhao:
A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments. IEEE Trans. Dependable Secur. Comput. 20(4): 3535-3545 (2023) - [j88]Hang Xu, Ching-Fang Hsu, Lein Harn, Jianqun Cui, Zhuo Zhao, Ze Zhang:
Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things. IEEE Trans. Serv. Comput. 16(4): 3000-3013 (2023) - [j87]Ching-Fang Hsu, Lein Harn, Zhe Xia, Zhuo Zhao, Hang Xu:
Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT. Wirel. Pers. Commun. 129(4): 2403-2417 (2023) - [j86]Hongyu Wang, Ching-Fang Hsu, Lein Harn:
A Lightweight and Robust Stream Cipher Based on PI for Intelligent Transportation Systems. Wirel. Pers. Commun. 130(3): 1661-1675 (2023) - [c38]Fengling Pang, Chingfang Hsu, Man Ho Au, Lein Harn, Ze Zhang, Li Long:
Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments. TrustCom 2023: 849-856 - 2022
- [j85]Lein Harn, Chingfang Hsu, Zhe Xia:
A novel threshold changeable secret sharing scheme. Frontiers Comput. Sci. 16(1): 161807 (2022) - [j84]Wei Liu, Lein Harn, Jian Weng:
Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs). IET Commun. 16(1): 58-66 (2022) - [j83]Chingfang Hsu, Lein Harn, Zhe Xia, Linyan Bai, Ze Zhang:
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments. J. Cloud Comput. 11: 89 (2022) - [j82]Lein Harn, Chingfang Hsu, Zhe Xia:
General logic-operation-based lightweight group-key distribution schemes for Internet of Vehicles. Veh. Commun. 34: 100457 (2022) - 2021
- [j81]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Zhuo Zhao:
Non-interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks. IET Commun. 15(2): 328-336 (2021) - [j80]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Quanrun Li:
Design of ideal secret sharing based on new results on representable quadripartite matroids. J. Inf. Secur. Appl. 58: 102724 (2021) - [j79]Lein Harn, Zhe Xia, Chingfang Hsu:
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks. Peer-to-Peer Netw. Appl. 14(2): 722-728 (2021) - [j78]Yanan Liu, Yijun Cui, Lein Harn, Zheng Zhang, Hao Yan, Yuan Cheng, Shuo Qiu:
PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks. Secur. Commun. Networks 2021: 5532683:1-5532683:13 (2021) - [j77]Zhuo Zhao, Chingfang Hsu, Lein Harn, Qing Yang, Lulu Ke:
Lightweight Privacy-Preserving Data Sharing Scheme for Internet of Medical Things. Wirel. Commun. Mob. Comput. 2021: 8402138:1-8402138:13 (2021) - [j76]Lein Harn, Chingfang Hsu, Zhe Xia:
Lightweight and flexible key distribution schemes for secure group communications. Wirel. Networks 27(1): 129-136 (2021) - 2020
- [j75]Qi Cheng, Ching-Fang Hsu, Zhe Xia, Lein Harn:
Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN. IEEE Access 8: 71833-71839 (2020) - [j74]Zhangqing He, Wanbo Chen, Lingchao Zhang, Gaojun Chi, Qi Gao, Lein Harn:
A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test. IEEE Access 8: 181751-181762 (2020) - [j73]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang:
Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir's SS for 5G Networks. IEEE Access 8: 203965-203971 (2020) - [j72]Lein Harn, Chingfang Hsu, Zhe Xia:
Lightweight group key distribution schemes based on pre-shared pairwise keys. IET Commun. 14(13): 2162-2165 (2020) - [j71]Lein Harn, Zhe Xia, Ching-Fang Hsu, Yining Liu:
Secret sharing with secure secret reconstruction. Inf. Sci. 519: 1-8 (2020) - [j70]Ching-Fang Hsu, Lein Harn, Bing Zeng:
UMKESS: user-oriented multi-group key establishments using secret sharing. Wirel. Networks 26(1): 421-430 (2020)
2010 – 2019
- 2019
- [j69]Ashwag Albakri, Lein Harn:
Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks. IEEE Access 7: 31615-31623 (2019) - [j68]Ashwag Albakri, Lein Harn, Sejun Song:
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN). Secur. Commun. Networks 2019: 3950129:1-3950129:11 (2019) - [c37]Ashwag Albakri, Lein Harn, Mahesh Maddumala:
Polynomial-based Lightweight Key Management in a Permissioned Blockchain. CNS 2019: 1-9 - [c36]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - 2018
- [j67]Lein Harn, Ching-Fang Hsu, Bohan Li:
Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party. Mob. Networks Appl. 23(5): 1132-1140 (2018) - [j66]Ou Ruan, Yuanyuan Zhang, Mingwu Zhang, Jing Zhou, Lein Harn:
After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange. IEEE Syst. J. 12(2): 2017-2026 (2018) - [c35]Ashwag Albakri, Mahesh Maddumala, Lein Harn:
Hierarchical Polynomial-Based Key Management Scheme in Fog Computing. TrustCom/BigDataSE 2018: 1593-1597 - 2017
- [j65]Lein Harn, Ching-Fang Hsu:
A Practical Hybrid Group Key Establishment for Secure Group Communications. Comput. J. 60(11): 1582-1589 (2017) - [j64]Mingwu Zhang, Yudi Zhang, Hua Shen, Chunming Tang, Lein Harn:
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security. J. Inf. Sci. Eng. 33(4): 993-1006 (2017) - [j63]Lein Harn, Ching-Fang Hsu, Zhe Xia, Junwei Zhou:
How to Share Secret Efficiently over Networks. Secur. Commun. Networks 2017: 5437403:1-5437403:6 (2017) - [j62]Lein Harn, Ching-Fang Hsu:
A Novel Design of Membership Authentication and Group Key Establishment Protocol. Secur. Commun. Networks 2017: 8547876:1-8547876:7 (2017) - [j61]Ching-Fang Hsu, Lein Harn, Yi Mu, Maoyuan Zhang, Xuan Zhu:
Computation-efficient key establishment in wireless group communications. Wirel. Networks 23(1): 289-297 (2017) - [j60]Lein Harn, Ching-Fang Hsu:
(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial. Wirel. Pers. Commun. 95(2): 1495-1504 (2017) - [j59]Lein Harn, Ching-Fang Hsu:
A Novel Threshold Cryptography with Membership Authentication and Key Establishment. Wirel. Pers. Commun. 97(3): 3943-3950 (2017) - 2016
- [j58]Lein Harn, Feng Wang:
Threshold Signature Scheme without Using Polynomial Interpolation. Int. J. Netw. Secur. 18(4): 710-717 (2016) - [j57]Yanan Liu, Lein Harn, Lei Mao, Zhangliang Xiong:
Full-healing group-key distribution in online social networks. Int. J. Secur. Networks 11(1/2): 12-24 (2016) - [j56]Lein Harn, Ching-Fang Hsu, Mingwu Zhang, Tingting He, Maoyuan Zhang:
Realizing secret sharing with general access structure. Inf. Sci. 367-368: 209-220 (2016) - 2015
- [j55]Yanjun Liu, Lein Harn, Chin-Chen Chang:
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. Int. J. Commun. Syst. 28(7): 1282-1292 (2015) - [j54]Lein Harn, Ching-Fang Hsu:
Dynamic threshold secret reconstruction and its application to the threshold cryptography. Inf. Process. Lett. 115(11): 851-857 (2015) - [j53]Lein Harn, Changlu Lin, Yong Li:
Fair secret reconstruction in (t, n) secret sharing. J. Inf. Secur. Appl. 23: 1-7 (2015) - [j52]Qian Mao, Chin-Chen Chang, Lein Harn, Shih-Chang Chang:
An image-based key agreement protocol using the morphing technique. Multim. Tools Appl. 74(9): 3207-3229 (2015) - [j51]Lein Harn, Guang Gong:
Conference key establishment protocol using a multivariate polynomial and its applications. Secur. Commun. Networks 8(9): 1794-1800 (2015) - [j50]Ching-Fang Hsu, Shan Wu, Lein Harn:
New Results on Ideal Multipartite Secret Sharing and its Applications to Group Communications. Wirel. Pers. Commun. 82(1): 283-292 (2015) - 2014
- [j49]Lein Harn, Changlu Lin:
Efficient group Diffie-Hellman key agreement protocols. Comput. Electr. Eng. 40(6): 1972-1980 (2014) - [j48]Lein Harn:
Generalised cheater detection and identification. IET Inf. Secur. 8(3): 171-178 (2014) - [j47]Lein Harn:
Comments on 'fair (t, n) threshold secret sharing scheme'. IET Inf. Secur. 8(6): 303-304 (2014) - [j46]Yanjun Liu, Lein Harn, Chin-Chen Chang:
An authenticated group key distribution mechanism using theory of numbers. Int. J. Commun. Syst. 27(11): 3502-3512 (2014) - [j45]Lein Harn, Fuyou Miao:
Weighted Secret Sharing Based on the Chinese Remainder Theorem. Int. J. Netw. Secur. 16(6): 420-425 (2014) - [j44]Lein Harn, Fuyou Miao:
Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Inf. Process. Lett. 114(9): 504-509 (2014) - [j43]Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn, Shengyuan Zhang:
Secure universal designated verifier identity-based signcryption. Secur. Commun. Networks 7(2): 434-444 (2014) - [j42]Lein Harn:
Secure secret reconstruction and multi-secret sharing schemes with unconditional security. Secur. Commun. Networks 7(3): 567-573 (2014) - [j41]Lein Harn, Fuyou Miao, Chin-Chen Chang:
Verifiable secret sharing based on the Chinese remainder theorem. Secur. Commun. Networks 7(6): 950-957 (2014) - [j40]Feng Wang, Chin-Chen Chang, Lein Harn:
Simulatable and secure certificate-based threshold signature without pairings. Secur. Commun. Networks 7(11): 2094-2103 (2014) - [j39]Ching-Fang Hsu, Lein Harn, Guohua Cui:
An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs. Wirel. Pers. Commun. 77(1): 383-394 (2014) - [j38]Ching-Fang Hsu, Lein Harn:
Multipartite Secret Sharing Based on CRT. Wirel. Pers. Commun. 78(1): 271-282 (2014) - [c34]Yanan Liu, Lei Mao, Lein Harn, Yi Wang:
Group key distribution with full-healing property. ICCCN 2014: 1-6 - 2013
- [j37]Lein Harn, Chin-Chen Chang, Hsiao-Ling Wu:
An Anonymous Multi-Receiver Encryption Based on RSA. Int. J. Netw. Secur. 15(4): 307-312 (2013) - [j36]Yan-Xiao Liu, Yuqing Zhang, Lein Harn, Yu-pu Hu:
Verifiable symmetric polynomial-based key distribution schemes. Secur. Commun. Networks 6(8): 1028-1034 (2013) - [j35]Lein Harn:
Group Authentication. IEEE Trans. Computers 62(9): 1893-1898 (2013) - [j34]Jian Ren, Lein Harn:
An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications. IEEE Trans. Wirel. Commun. 12(3): 1018-1025 (2013) - [i1]Lein Harn, Changlu Lin:
An efficient group authentication for group communications. CoRR abs/1306.1436 (2013) - 2012
- [j33]Yan-Xiao Liu, Lein Harn, Ching-Nung Yang, Yuqing Zhang:
Efficient (n, t, n) secret sharing schemes. J. Syst. Softw. 85(6): 1325-1332 (2012) - [j32]Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, Lein Harn:
$k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5): 799-810 (2012) - 2011
- [j31]Lein Harn, Chu-Hsing Lin:
Contract signature in e-commerce. Comput. Electr. Eng. 37(2): 169-173 (2011) - [j30]Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang:
Fully Deniable Message Authentication Protocols Preserving Confidentiality. Comput. J. 54(10): 1688-1699 (2011) - [j29]Chia-Yin Lee, Zhi-Hui Wang, Lein Harn, Chin-Chen Chang:
Secure Key Transfer Protocol Based on Secret Sharing for Group Communications. IEICE Trans. Inf. Syst. 94-D(11): 2069-2076 (2011) - [j28]Lein Harn, Jian Ren:
Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications. IEEE Trans. Wirel. Commun. 10(7): 2372-2379 (2011) - 2010
- [j27]Lein Harn, Wen-Jung Hsin, Changlu Lin:
Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families. Comput. J. 53(9): 1478-1484 (2010) - [j26]Habib F. Rashvand, Khaled Salah, José M. Alcaraz Calero, Lein Harn:
Distributed security for multi-agent systems - review and applications. IET Inf. Secur. 4(4): 188-201 (2010) - [j25]Lein Harn, Changlu Lin:
Strong (n, t, n) verifiable secret sharing scheme. Inf. Sci. 180(16): 3059-3064 (2010) - [j24]Lein Harn, Changlu Lin:
Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. Computers 59(6): 842-846 (2010) - [c33]Lein Harn, Chu-Hsing Lin, Che-Wei Hu:
Contract Signatures in E-Commerce Applications. BWCCA 2010: 384-388
2000 – 2009
- 2009
- [j23]Lein Harn, Changlu Lin:
Detection and identification of cheaters in ( t , n ) secret sharing scheme. Des. Codes Cryptogr. 52(1): 15-24 (2009) - [j22]Lein Harn, Jian Ren, Changlu Lin:
Efficient identity-based GQ multisignatures. Int. J. Inf. Sec. 8(3): 205-210 (2009) - [j21]Tong Zhou, Lein Harn:
Hybrid Trust Structure in Self-Organizing Networks. Int. J. Interdiscip. Telecommun. Netw. 1(2): 1-15 (2009) - [j20]Lein Harn, Jian Ren, Changlu Lin:
Design of DL-based certificateless digital signatures. J. Syst. Softw. 82(5): 789-793 (2009) - [c32]Changlu Lin, Lein Harn, Dingfeng Ye:
Ideal Perfect Multilevel Threshold Secret Sharing Scheme. IAS 2009: 118-121 - [c31]Changlu Lin, Lein Harn, Dingfeng Ye:
Information-theoretically Secure Strong Verifiable Secret Sharing. SECRYPT 2009: 233-238 - 2008
- [j19]Lein Harn, Jian Ren:
Efficient identity-based RSA multisignatures. Comput. Secur. 27(1-2): 12-15 (2008) - [j18]Lein Harn, Jian Ren:
Design of Fully Deniable Authentication Service for E-mail Applications. IEEE Commun. Lett. 12(3): 219-221 (2008) - [j17]Jian Ren, Lein Harn:
Generalized Ring Signatures. IEEE Trans. Dependable Secur. Comput. 5(3): 155-163 (2008) - [c30]Qingyu Xu, Mingxing He, Lein Harn:
An Improved Time-Bound Hierarchical Key Assignment Scheme. APSCC 2008: 1489-1494 - 2007
- [c29]Tong Zhou, Lein Harn:
Security in User-Assisted Communications. WTS 2007: 1-10 - 2006
- [j16]Dijiang Huang, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory C. Beard, Lein Harn, Deep Medhi:
New architecture for intra-domain network security issues. Commun. ACM 49(11): 64-72 (2006) - [c28]Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast. ARCS 2006: 422-434 - [c27]Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Luo:
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. COMPSAC (2) 2006: 309-314 - [c26]Jian Ren, Lein Harn:
Ring Signature Based on ElGamal Signature. WASA 2006: 445-456 - 2005
- [j15]Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn:
Improved DSA variant for batch verification. Appl. Math. Comput. 169(1): 75-81 (2005) - [c25]Wen-Jung Hsin, Lein Harn:
Simple certified e-check with a partial PKI solution. ACM Southeast Regional Conference (2) 2005: 185-190 - [c24]Wen-Jung Hsin, Lein Harn:
The e-Traveler's Check. International Conference on Internet Computing 2005: 59-65 - [c23]Jian Wang, Lein Harn, Hideki Imai:
Key Management for Multicast Fingerprinting. ICISS 2005: 191-204 - [c22]Manish Mehta, Dijiang Huang, Lein Harn:
RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks. IPCCC 2005: 193-197 - [c21]Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen:
Storage-Optimal Key Sharing with Authentication in Sensor Networks. ISPA Workshops 2005: 466-474 - 2004
- [j14]Lein Harn, Manish Mehta, Wen-Jung Hsin:
Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA). IEEE Commun. Lett. 8(3): 198-200 (2004) - [c20]Dijiang Huang, Manish Mehta, Deep Medhi, Lein Harn:
Location-aware key management scheme for wireless sensor networks. SASN 2004: 29-42 - 2003
- [c19]Lein Harn, Wen-Jung Hsin:
On the security of wireless network access with enhancements. Workshop on Wireless Security 2003: 88-95 - 2001
- [c18]Guang Gong, Lein Harn, Huapeng Wu:
The GH Public-Key Cryptosystem. Selected Areas in Cryptography 2001: 284-300
1990 – 1999
- 1999
- [j13]Hung-Yu Lin, Lein Harn:
Authentication protocols with nonrepudiation services in personal communication systems. IEEE Commun. Lett. 3(8): 236-238 (1999) - [j12]Guang Gong, Lein Harn:
Public-key cryptosystems based on cubic finite field extensions. IEEE Trans. Inf. Theory 45(7): 2601-2605 (1999) - 1995
- [j11]Hung-Yu Lin, Lein Harn:
Fair Reconstruction of a Secret. Inf. Process. Lett. 55(1): 45-47 (1995) - [c17]Hung-Yu Lin, Lein Harn:
Authentication Protocols for Personal Communication Systems. SIGCOMM 1995: 256-261 - 1994
- [j10]Lein Harn, David Huang:
A Protocol for Establishing Secure Communication Channels in a Large Network. IEEE Trans. Knowl. Data Eng. 6(1): 188-191 (1994) - 1993
- [j9]Lein Harn, Shoubao Yang:
ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution. IEEE J. Sel. Areas Commun. 11(5): 757-760 (1993) - [j8]Lein Harn, Hung-Yu Lin:
Key management for decentralized computer network services. IEEE Trans. Commun. 41(12): 1777-1779 (1993) - 1992
- [j7]Lein Harn, Hung-Yu Lin, Shoubao Yang:
A software authentication system for information integrity. Comput. Secur. 11(8): 747-752 (1992) - [c16]Lein Harn, Hung-Yu Lin, Shoubao Yang:
A Software Authentication System for the Prevention of Computer Viruses. ACM Conference on Computer Science 1992: 447-450 - [c15]Lein Harn, Shoubao Yang:
Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party. AUSCRYPT 1992: 133-142 - [c14]Lein Harn, Shoubao Yang:
Public-Key Cryptosystem Based on the Discrete Logarithm Problem. AUSCRYPT 1992: 469-476 - [c13]Lein Harn, Hung-Yu Lin:
An l-Span Generalized Secret Sharing Scheme. CRYPTO 1992: 558-565 - 1991
- [c12]Hung-Yu Lin, Lein Harn:
A Generalized Secret Sharing Scheme With Cheater Detection. ASIACRYPT 1991: 149-158 - [c11]Chi-Sung Laih, Lein Harn:
Generalized Threshold Cryptosystems. ASIACRYPT 1991: 159-166 - [c10]Lein Harn, Hung-Yu Lin:
On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. ASIACRYPT 1991: 312-320 - [c9]Chi-Sung Laih, Sung-Ming Yen, Lein Harn:
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. ASIACRYPT 1991: 450-459 - 1990
- [j6]Lein Harn, Hung-Yu Lin:
A cryptographic key generation scheme for multilevel data security. Comput. Secur. 9(6): 539-546 (1990) - [j5]Lein Harn, Thomas Kiesler:
An Efficient Probabilistic Encryption Scheme. Inf. Process. Lett. 34(3): 123-129 (1990) - [c8]Elizabeth A. Unger, Lein Harn, Vijay Kumar:
Entropy as a measure of database information. ACSAC 1990: 80-87
1980 – 1989
- 1989
- [j4]Chi-Sung Laih, Jau-Yien Lee, Lein Harn:
A new threshold scheme and its application in designing the conference key distribution cryptosystem. Inf. Process. Lett. 32(3): 95-99 (1989) - [j3]Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Yan-Kuin Su:
Linearly shift knapsack public-key cryptosystem. IEEE J. Sel. Areas Commun. 7(4): 534-539 (1989) - [j2]Chi-Sung Laih, Lein Harn, Jau-Yien Lee:
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. IEEE Trans. Software Eng. 15(9): 1135-1137 (1989) - [c7]Lein Harn, Yaw-Ruey Chien, Thomas Kiesler:
An extended cryptographic key generation scheme for multilevel data security. ACSAC 1989: 254-262 - [c6]Lein Harn, Thomas Kiesler:
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem. ACSAC 1989: 263-270 - [c5]Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang:
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. CRYPTO 1989: 286-298 - [c4]Lein Harn, David Huang, Chi-Sung Laih:
Password Authentication Based On Public-Key Distribution Cryptosystem. ICDE 1989: 332-338 - [c3]Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Chin-Hsing Chen:
A New Scheme for ID-Based Cryptosystems and Signature. INFOCOM 1989: 998-1002 - [c2]Lein Harn, Thomas Kiesler:
Authenticated Group Key Distribution Scheme for a Large Distributed Network. S&P 1989: 300-309 - 1988
- [j1]Erl-Huei Lu, Lein Harn, Jau-Yien Lee, Wen-Yih Hwang:
A programmable VLSI architecture for computing multiplication and polynomial evaluation modulo a positive integer. IEEE J. Solid State Circuits 23(1): 204-207 (1988) - [c1]Erl-Huei Lu, Wen-Yie Hwang, Lein Harn, Jau-Yien Lee:
A conference key distribution system based on the Lagrange interpolating polynomial. INFOCOM 1988: 1092-1094
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint