2009 |
37 | EE | Lein Harn,
Changlu Lin:
Detection and identification of cheaters in ( t , n ) secret sharing scheme.
Des. Codes Cryptography 52(1): 15-24 (2009) |
2008 |
36 | EE | Lein Harn,
Jian Ren:
Efficient identity-based RSA multisignatures.
Computers & Security 27(1-2): 12-15 (2008) |
35 | EE | Jian Ren,
Lein Harn:
Generalized Ring Signatures.
IEEE Trans. Dependable Sec. Comput. 5(3): 155-163 (2008) |
2006 |
34 | EE | Jian Wang,
Miodrag J. Mihaljevic,
Lein Harn,
Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast.
ARCS 2006: 422-434 |
33 | EE | Darren Xu,
Lein Harn,
Mayur Narasimhan,
Junzhou Luo:
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks.
COMPSAC (2) 2006: 309-314 |
32 | EE | Jian Ren,
Lein Harn:
Ring Signature Based on ElGamal Signature.
WASA 2006: 445-456 |
31 | EE | Dijiang Huang,
Qing Cao,
Amit Sinha,
Marc J. Schniederjans,
Cory C. Beard,
Lein Harn,
Deep Medhi:
New architecture for intra-domain network security issues.
Commun. ACM 49(11): 64-72 (2006) |
2005 |
30 | EE | Wen-Jung Hsin,
Lein Harn:
Simple certified e-check with a partial PKI solution.
ACM Southeast Regional Conference (2) 2005: 185-190 |
29 | EE | Jian Wang,
Lein Harn,
Hideki Imai:
Key Management for Multicast Fingerprinting.
ICISS 2005: 191-204 |
28 | EE | Manish Mehta,
Dijiang Huang,
Lein Harn:
RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks.
IPCCC 2005: 193-197 |
27 | EE | Jian Wang,
Zhengyou Xia,
Lein Harn,
Guihai Chen:
Storage-Optimal Key Sharing with Authentication in Sensor Networks.
ISPA Workshops 2005: 466-474 |
26 | | Wen-Jung Hsin,
Lein Harn:
The e-Traveler's Check.
International Conference on Internet Computing 2005: 59-65 |
25 | EE | Chu-Hsing Lin,
Ruei-Hau Hsu,
Lein Harn:
Improved DSA variant for batch verification.
Applied Mathematics and Computation 169(1): 75-81 (2005) |
2004 |
24 | EE | Dijiang Huang,
Manish Mehta,
Deep Medhi,
Lein Harn:
Location-aware key management scheme for wireless sensor networks.
SASN 2004: 29-42 |
2003 |
23 | EE | Lein Harn,
Wen-Jung Hsin:
On the security of wireless network access with enhancements.
Workshop on Wireless Security 2003: 88-95 |
2001 |
22 | EE | Guang Gong,
Lein Harn,
Huapeng Wu:
The GH Public-Key Cryptosystem.
Selected Areas in Cryptography 2001: 284-300 |
1999 |
21 | | Guang Gong,
Lein Harn:
Public-key cryptosystems based on cubic finite field extensions.
IEEE Transactions on Information Theory 45(7): 2601-2605 (1999) |
1995 |
20 | EE | Hung-Yu Lin,
Lein Harn:
Authentication Protocols for Personal Communication Systems.
SIGCOMM 1995: 256-261 |
19 | EE | Hung-Yu Lin,
Lein Harn:
Fair Reconstruction of a Secret.
Inf. Process. Lett. 55(1): 45-47 (1995) |
1994 |
18 | EE | Lein Harn,
David Huang:
A Protocol for Establishing Secure Communication Channels in a Large Network.
IEEE Trans. Knowl. Data Eng. 6(1): 188-191 (1994) |
1993 |
17 | | Lein Harn,
Shoubao Yang:
ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution.
IEEE Journal on Selected Areas in Communications 11(5): 757-760 (1993) |
1992 |
16 | EE | Lein Harn,
Hung-Yu Lin,
Shoubao Yang:
A Software Authentication System for the Prevention of Computer Viruses.
ACM Conference on Computer Science 1992: 447-450 |
15 | | Lein Harn,
Shoubao Yang:
Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party.
AUSCRYPT 1992: 133-142 |
14 | | Lein Harn,
Shoubao Yang:
Public-Key Cryptosystem Based on the Discrete Logarithm Problem.
AUSCRYPT 1992: 469-476 |
13 | EE | Lein Harn,
Hung-Yu Lin:
An l-Span Generalized Secret Sharing Scheme.
CRYPTO 1992: 558-565 |
12 | EE | Lein Harn,
Hung-Yu Lin,
Shoubao Yang:
A software authentication system for information integrity.
Computers & Security 11(8): 747-752 (1992) |
1991 |
11 | | Hung-Yu Lin,
Lein Harn:
A Generalized Secret Sharing Scheme With Cheater Detection.
ASIACRYPT 1991: 149-158 |
10 | | Chi-Sung Laih,
Lein Harn:
Generalized Threshold Cryptosystems.
ASIACRYPT 1991: 159-166 |
9 | | Lein Harn,
Hung-Yu Lin:
On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets.
ASIACRYPT 1991: 312-320 |
8 | | Chi-Sung Laih,
Sung-Ming Yen,
Lein Harn:
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
ASIACRYPT 1991: 450-459 |
1990 |
7 | EE | Lein Harn,
Hung-Yu Lin:
A cryptographic key generation scheme for multilevel data security.
Computers & Security 9(6): 539-546 (1990) |
6 | | Lein Harn,
Thomas Kiesler:
An Efficient Probabilistic Encryption Scheme.
Inf. Process. Lett. 34(3): 123-129 (1990) |
1989 |
5 | EE | Chi-Sung Laih,
Lein Harn,
Jau-Yien Lee,
Tzonelih Hwang:
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.
CRYPTO 1989: 286-298 |
4 | EE | Lein Harn,
David Huang,
Chi-Sung Laih:
Password Authentication Based On Public-Key Distribution Cryptosystem.
ICDE 1989: 332-338 |
3 | | Lein Harn,
Thomas Kiesler:
Authenticated Group Key Distribution Scheme for a Large Distributed Network.
IEEE Symposium on Security and Privacy 1989: 300-311 |
2 | | Chi-Sung Laih,
Jau-Yien Lee,
Lein Harn,
Chin-Hsing Chen:
A New Scheme for ID-Based Cryptosystems and Signature.
INFOCOM 1989: 998-1002 |
1 | EE | Chi-Sung Laih,
Lein Harn,
Jau-Yien Lee:
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial.
IEEE Trans. Software Eng. 15(9): 1135-1137 (1989) |