dblp.uni-trier.dewww.uni-trier.de

Lein Harn

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
37EELein Harn, Changlu Lin: Detection and identification of cheaters in ( t , n ) secret sharing scheme. Des. Codes Cryptography 52(1): 15-24 (2009)
2008
36EELein Harn, Jian Ren: Efficient identity-based RSA multisignatures. Computers & Security 27(1-2): 12-15 (2008)
35EEJian Ren, Lein Harn: Generalized Ring Signatures. IEEE Trans. Dependable Sec. Comput. 5(3): 155-163 (2008)
2006
34EEJian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai: A Hierarchical Key Management Approach for Secure Multicast. ARCS 2006: 422-434
33EEDarren Xu, Lein Harn, Mayur Narasimhan, Junzhou Luo: An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. COMPSAC (2) 2006: 309-314
32EEJian Ren, Lein Harn: Ring Signature Based on ElGamal Signature. WASA 2006: 445-456
31EEDijiang Huang, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory C. Beard, Lein Harn, Deep Medhi: New architecture for intra-domain network security issues. Commun. ACM 49(11): 64-72 (2006)
2005
30EEWen-Jung Hsin, Lein Harn: Simple certified e-check with a partial PKI solution. ACM Southeast Regional Conference (2) 2005: 185-190
29EEJian Wang, Lein Harn, Hideki Imai: Key Management for Multicast Fingerprinting. ICISS 2005: 191-204
28EEManish Mehta, Dijiang Huang, Lein Harn: RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks. IPCCC 2005: 193-197
27EEJian Wang, Zhengyou Xia, Lein Harn, Guihai Chen: Storage-Optimal Key Sharing with Authentication in Sensor Networks. ISPA Workshops 2005: 466-474
26 Wen-Jung Hsin, Lein Harn: The e-Traveler's Check. International Conference on Internet Computing 2005: 59-65
25EEChu-Hsing Lin, Ruei-Hau Hsu, Lein Harn: Improved DSA variant for batch verification. Applied Mathematics and Computation 169(1): 75-81 (2005)
2004
24EEDijiang Huang, Manish Mehta, Deep Medhi, Lein Harn: Location-aware key management scheme for wireless sensor networks. SASN 2004: 29-42
2003
23EELein Harn, Wen-Jung Hsin: On the security of wireless network access with enhancements. Workshop on Wireless Security 2003: 88-95
2001
22EEGuang Gong, Lein Harn, Huapeng Wu: The GH Public-Key Cryptosystem. Selected Areas in Cryptography 2001: 284-300
1999
21 Guang Gong, Lein Harn: Public-key cryptosystems based on cubic finite field extensions. IEEE Transactions on Information Theory 45(7): 2601-2605 (1999)
1995
20EEHung-Yu Lin, Lein Harn: Authentication Protocols for Personal Communication Systems. SIGCOMM 1995: 256-261
19EEHung-Yu Lin, Lein Harn: Fair Reconstruction of a Secret. Inf. Process. Lett. 55(1): 45-47 (1995)
1994
18EELein Harn, David Huang: A Protocol for Establishing Secure Communication Channels in a Large Network. IEEE Trans. Knowl. Data Eng. 6(1): 188-191 (1994)
1993
17 Lein Harn, Shoubao Yang: ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution. IEEE Journal on Selected Areas in Communications 11(5): 757-760 (1993)
1992
16EELein Harn, Hung-Yu Lin, Shoubao Yang: A Software Authentication System for the Prevention of Computer Viruses. ACM Conference on Computer Science 1992: 447-450
15 Lein Harn, Shoubao Yang: Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party. AUSCRYPT 1992: 133-142
14 Lein Harn, Shoubao Yang: Public-Key Cryptosystem Based on the Discrete Logarithm Problem. AUSCRYPT 1992: 469-476
13EELein Harn, Hung-Yu Lin: An l-Span Generalized Secret Sharing Scheme. CRYPTO 1992: 558-565
12EELein Harn, Hung-Yu Lin, Shoubao Yang: A software authentication system for information integrity. Computers & Security 11(8): 747-752 (1992)
1991
11 Hung-Yu Lin, Lein Harn: A Generalized Secret Sharing Scheme With Cheater Detection. ASIACRYPT 1991: 149-158
10 Chi-Sung Laih, Lein Harn: Generalized Threshold Cryptosystems. ASIACRYPT 1991: 159-166
9 Lein Harn, Hung-Yu Lin: On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. ASIACRYPT 1991: 312-320
8 Chi-Sung Laih, Sung-Ming Yen, Lein Harn: Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. ASIACRYPT 1991: 450-459
1990
7EELein Harn, Hung-Yu Lin: A cryptographic key generation scheme for multilevel data security. Computers & Security 9(6): 539-546 (1990)
6 Lein Harn, Thomas Kiesler: An Efficient Probabilistic Encryption Scheme. Inf. Process. Lett. 34(3): 123-129 (1990)
1989
5EEChi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang: Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. CRYPTO 1989: 286-298
4EELein Harn, David Huang, Chi-Sung Laih: Password Authentication Based On Public-Key Distribution Cryptosystem. ICDE 1989: 332-338
3 Lein Harn, Thomas Kiesler: Authenticated Group Key Distribution Scheme for a Large Distributed Network. IEEE Symposium on Security and Privacy 1989: 300-311
2 Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Chin-Hsing Chen: A New Scheme for ID-Based Cryptosystems and Signature. INFOCOM 1989: 998-1002
1EEChi-Sung Laih, Lein Harn, Jau-Yien Lee: On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. IEEE Trans. Software Eng. 15(9): 1135-1137 (1989)

Coauthor Index

1Cory C. Beard [31]
2Qing Cao [31]
3Chin-Hsing Chen [2]
4Guihai Chen [27]
5Guang Gong [21] [22]
6Wen-Jung Hsin [23] [26] [30]
7Ruei-Hau Hsu [25]
8David Huang [4] [18]
9Dijiang Huang [24] [28] [31]
10Tzonelih Hwang [5]
11Hideki Imai [29] [34]
12Thomas Kiesler [3] [6]
13Chi-Sung Laih [1] [2] [4] [5] [8] [10]
14Jau-Yien Lee [1] [2] [5]
15Changlu Lin [37]
16Chu-Hsing Lin [25]
17Hung-Yu Lin [7] [9] [11] [12] [13] [16] [19] [20]
18Junzhou Luo [33]
19Deep Medhi (D. Medhi) [24] [31]
20Manish Mehta [24] [28]
21Miodrag J. Mihaljevic [34]
22Mayur Narasimhan [33]
23Jian Ren [32] [35] [36]
24Marc J. Schniederjans [31]
25Amit Sinha [31]
26Jian Wang [27] [29] [34]
27Huapeng Wu [22]
28Zhengyou Xia [27]
29Darren Xu [33]
30Shoubao Yang [12] [14] [15] [16] [17]
31Sung-Ming Yen [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)