Year |
Citation |
Score |
2020 |
Cheng Q, Hsu C, Harn L. Lightweight Noninteractive Membership Authentication and Group Key Establishment for WSNs Mathematical Problems in Engineering. 2020: 1-9. DOI: 10.1155/2020/1452546 |
0.515 |
|
2020 |
Cheng Q, Hsu C, Xia Z, Harn L. Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN Ieee Access. 8: 71833-71839. DOI: 10.1109/Access.2020.2987978 |
0.482 |
|
2020 |
Harn L, Hsu C, Xia Z. Lightweight group key distribution schemes based on pre-shared pairwise keys Iet Communications. 14: 2162-2165. DOI: 10.1049/Iet-Com.2019.1345 |
0.53 |
|
2020 |
He Z, Chen W, Xu X, Harn L, Wan M. Reliable and efficient PUF-based cryptographic key generator using bit self-tests Electronics Letters. 56: 803-806. DOI: 10.1049/El.2020.0344 |
0.416 |
|
2020 |
Harn L, Xia Z, Hsu C, Liu Y. Secret sharing with secure secret reconstruction Information Sciences. 519: 1-8. DOI: 10.1016/J.Ins.2020.01.038 |
0.564 |
|
2020 |
Harn L, Hsu C, Xia Z. Lightweight and flexible key distribution schemes for secure group communications Wireless Networks. 1-8. DOI: 10.1007/S11276-020-02449-2 |
0.505 |
|
2020 |
Hsu C, Harn L, Zeng B. UMKESS: user-oriented multi-group key establishments using secret sharing Wireless Networks. 26: 421-430. DOI: 10.1007/S11276-018-1825-X |
0.487 |
|
2019 |
Zhang M, Zhang S, Harn L. An efficient and adaptive data-hiding scheme based on secure random matrix. Plos One. 14: e0222892. PMID 31577802 DOI: 10.1371/Journal.Pone.0222892 |
0.557 |
|
2019 |
Albakri A, Harn L, Song S. Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN) Security and Communication Networks. 2019: 1-11. DOI: 10.1155/2019/3950129 |
0.479 |
|
2019 |
Albakri A, Harn L. Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks Ieee Access. 7: 31615-31623. DOI: 10.1109/Access.2019.2900390 |
0.535 |
|
2018 |
Ruan O, Zhang Y, Zhang M, Zhou J, Harn L. After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange Ieee Systems Journal. 12: 2017-2026. DOI: 10.1109/Jsyst.2017.2685524 |
0.571 |
|
2018 |
Chen X, Liu Y, Harn L, Li Y, Yao G. Threshold proxy re-signature: definition and new constructions Journal of the Chinese Institute of Engineers. 41: 141-148. DOI: 10.1080/02533839.2018.1437362 |
0.553 |
|
2018 |
Harn L, Hsu C, Li B. Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party Mobile Networks and Applications. 23: 1132-1140. DOI: 10.1007/S11036-016-0776-7 |
0.454 |
|
2017 |
Harn L, Hsu C. A Novel Design of Membership Authentication and Group Key Establishment Protocol Security and Communication Networks. 2017: 1-7. DOI: 10.1155/2017/8547876 |
0.457 |
|
2017 |
Harn L, Hsu C, Xia Z, Zhou J. How to Share Secret Efficiently over Networks Security and Communication Networks. 2017: 1-6. DOI: 10.1155/2017/5437403 |
0.572 |
|
2017 |
Harn L, Hsu C. A Practical Hybrid Group Key Establishment for Secure Group Communications The Computer Journal. 60: 1582-1589. DOI: 10.1093/Comjnl/Bxx003 |
0.379 |
|
2017 |
Harn L, Hsu C. A Novel Threshold Cryptography with Membership Authentication and Key Establishment Wireless Personal Communications. 97: 3943-3950. DOI: 10.1007/S11277-017-4708-Z |
0.601 |
|
2017 |
Harn L, Hsu C. ( t , n ) Multi-Secret Sharing Scheme Based on Bivariate Polynomial Wireless Personal Communications. 95: 1495-1504. DOI: 10.1007/S11277-016-3862-Z |
0.439 |
|
2016 |
Liu YN, Harn L, Mao L, Xiong Z. Full-healing group-key distribution in online social networks International Journal of Security and Networks. 11: 12-24. DOI: 10.1504/Ijsn.2016.075070 |
0.418 |
|
2016 |
Hsu CF, Harn L, He T, Zhang M. Efficient Group Key Transfer Protocol for WSNs Ieee Sensors Journal. 16: 4515-4520. DOI: 10.1109/Jsen.2016.2538292 |
0.519 |
|
2016 |
Harn L, Hsu CF, Ruan O, Zhang MY. Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks Ieee Sensors Journal. 16: 1779-1785. DOI: 10.1109/Jsen.2015.2504375 |
0.529 |
|
2016 |
Harn L, Hsu C, Zhang M, He T, Zhang M. Realizing secret sharing with general access structure Information Sciences. 367: 209-220. DOI: 10.1016/J.Ins.2016.06.006 |
0.514 |
|
2016 |
Hsu CF, Harn L, Mu Y, Zhang M, Zhu X. Computation-efficient key establishment in wireless group communications Wireless Networks. 1-9. DOI: 10.1007/S11276-016-1223-1 |
0.528 |
|
2016 |
Harn L, Wang F. Threshold signature scheme without using polynomial interpolation International Journal of Network Security. 18: 710-717. |
0.499 |
|
2015 |
Harn L, Hsu CF. Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks Ieee Sensors Journal. 15: 5103-5108. DOI: 10.1109/Jsen.2015.2429582 |
0.501 |
|
2015 |
Harn L, Lin C, Li Y. Fair secret reconstruction in (t, n) secret sharing Journal of Information Security and Applications. 23: 1-7. DOI: 10.1016/j.jisa.2015.07.001 |
0.419 |
|
2015 |
Harn L, Hsu CF. Dynamic threshold secret reconstruction and its application to the threshold cryptography Information Processing Letters. 115: 851-857. DOI: 10.1016/J.Ipl.2015.06.014 |
0.457 |
|
2015 |
Hsu CF, Wu S, Harn L. New Results on Ideal Multipartite Secret Sharing and its Applications to Group Communications Wireless Personal Communications. 82: 283-292. DOI: 10.1007/S11277-014-2208-Y |
0.458 |
|
2015 |
Harn L, Gong G. Conference key establishment protocol using a multivariate polynomial and its applications Security and Communication Networks. 8: 1794-1800. DOI: 10.1002/Sec.1143 |
0.512 |
|
2015 |
Liu Y, Harn L, Chang CC. A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets International Journal of Communication Systems. 28: 1282-1292. DOI: 10.1002/Dac.2760 |
0.537 |
|
2014 |
Harn L, Lin C. Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography Int'L J. of Communications, Network and System Sciences. 7: 22-29. DOI: 10.4236/Ijcns.2014.71003 |
0.567 |
|
2014 |
Liu YN, Mao L, Harn L, Wang Y. Group key distribution with full-healing property Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2014.6911852 |
0.432 |
|
2014 |
Harn L. Comments on 'Fair (t, n) threshold secret sharing scheme' Iet Information Security. 8: 303-304. DOI: 10.1049/Iet-Ifs.2013.0302 |
0.466 |
|
2014 |
Harn L. Generalised cheater detection and identification Iet Information Security. 8: 171-178. DOI: 10.1049/Iet-Ifs.2012.0381 |
0.36 |
|
2014 |
Harn L, Fuyou M. Multilevel threshold secret sharing based on the Chinese Remainder Theorem Information Processing Letters. 114: 504-509. DOI: 10.1016/J.Ipl.2014.04.006 |
0.555 |
|
2014 |
Harn L, Lin C. Efficient group Diffie-Hellman key agreement protocols Computers and Electrical Engineering. 40: 1972-1980. DOI: 10.1016/J.Compeleceng.2013.12.018 |
0.526 |
|
2014 |
Hsu CF, Harn L. Multipartite secret sharing based on CRT Wireless Personal Communications. 78: 271-282. DOI: 10.1007/S11277-014-1751-X |
0.573 |
|
2014 |
Hsu CF, Harn L, Cui G. An ideal multi-secret sharing scheme based on connectivity of graphs Wireless Personal Communications. 77: 383-394. DOI: 10.1007/S11277-013-1511-3 |
0.537 |
|
2014 |
Wang F, Chang CC, Harn L. Simulatable and secure certificate-based threshold signature without pairings Security and Communication Networks. 7: 2094-2103. DOI: 10.1002/Sec.921 |
0.601 |
|
2014 |
Lin C, Tang F, Ke P, Harn L, Zhang S. Secure universal designated verifier identity-based signcryption Security and Communication Networks. 7: 434-444. DOI: 10.1002/Sec.820 |
0.529 |
|
2014 |
Harn L, Fuyou M, Chang CC. Verifiable secret sharing based on the Chinese remainder theorem Security and Communication Networks. 7: 950-957. DOI: 10.1002/Sec.807 |
0.543 |
|
2014 |
Harn L. Secure secret reconstruction and multi-secret sharing schemes with unconditional security Security and Communication Networks. 7: 567-573. DOI: 10.1002/Sec.758 |
0.593 |
|
2014 |
Liu Y, Harn L, Chang CC. An authenticated group key distribution mechanism using theory of numbers International Journal of Communication Systems. 27: 3502-3512. DOI: 10.1002/Dac.2569 |
0.538 |
|
2014 |
Harn L, Fuyou M. Weighted secret sharing based on the chinese remainder theorem International Journal of Network Security. 16: 420-426. |
0.38 |
|
2014 |
Chang CC, Harn L, Cheng TF. Notes on "Polynomial-based Key Management for Secure Intra-Group and Inter-Group Communication", International Journal of Network Security. 16: 143-148. |
0.476 |
|
2013 |
Harn L, Lin C. An Efficient Group Authentication For Group Communications International Journal of Network Security & Its Applications. 5: 9-16. DOI: 10.5121/Ijnsa.2013.5302 |
0.416 |
|
2013 |
Ren J, Harn L. An efficient threshold anonymous authentication scheme for privacy-preserving communications Ieee Transactions On Wireless Communications. 12: 1018-1025. DOI: 10.1109/Twc.2012.12.112120 |
0.509 |
|
2013 |
Harn L. Group authentication Ieee Transactions On Computers. 62: 1893-1898. DOI: 10.1109/Tc.2012.251 |
0.537 |
|
2013 |
Liu Yx, Zhang Yq, Harn L, Hu Yp. Verifiable symmetric polynomial-based key distribution schemes Security and Communication Networks. 6: 1028-1034. DOI: 10.1002/Sec.671 |
0.51 |
|
2013 |
Harn L, Chang CC, Wu HL. An anonymous multi-receiver encryption based on RSA International Journal of Network Security. 15: 307-312. |
0.477 |
|
2012 |
Lin C, Harn L. Unconditionally secure verifiable secret sharing scheme Advances in Information Sciences and Service Sciences. 4: 514-518. DOI: 10.4156/Aiss.Vol4.Issue17.59 |
0.577 |
|
2012 |
Liu C, Lin C, Harn L, Chen S. Security analysis of remote password authentication schemes for multiserver architecture using neural networks Advanced Science Letters. 7: 680-683. DOI: 10.1166/asl.2012.2709 |
0.409 |
|
2012 |
Yang CN, Shih HW, Wu CC, Harn L. K out of n region incrementing scheme in visual cryptography Ieee Transactions On Circuits and Systems For Video Technology. 22: 799-810. DOI: 10.1109/Tcsvt.2011.2180952 |
0.415 |
|
2012 |
Lin C, Harn L. Unconditionally secure multi-secret sharing scheme Csae 2012 - Proceedings, 2012 Ieee International Conference On Computer Science and Automation Engineering. 1: 169-172. DOI: 10.1109/CSAE.2012.6272572 |
0.524 |
|
2012 |
Yang CN, Ouyang JF, Harn L. Steganography and authentication in image sharing without parity bits Optics Communications. 285: 1725-1735. DOI: 10.1016/J.Optcom.2011.12.003 |
0.391 |
|
2012 |
Liu YX, Harn L, Yang CN, Zhang YQ. Efficient (n, t, n) secret sharing schemes Journal of Systems and Software. 85: 1325-1332. DOI: 10.1016/J.Jss.2012.01.027 |
0.454 |
|
2012 |
Liu C, Lin C, Harn L, Chen S. Weakness a remote password authentication schemes for multiserver architecture using neural networks Information. 15: 4965-4970. |
0.397 |
|
2011 |
Lee CY, Wang ZH, Harn L, Chang CC. Secure key transfer protocol based on secret sharing for group communications Ieice Transactions On Information and Systems. 2069-2076. DOI: 10.1587/Transinf.E94.D.2069 |
0.512 |
|
2011 |
Harn L, Ren J. Generalized digital certificate for user authentication and key establishment for secure communications Ieee Transactions On Wireless Communications. 10: 2372-2379. DOI: 10.1109/Twc.2011.042211.101913 |
0.462 |
|
2011 |
Harn L, Lee CY, Lin C, Chang CC. Fully deniable message authentication protocols preserving confidentiality Computer Journal. 54: 1688-1699. DOI: 10.1093/Comjnl/Bxr081 |
0.5 |
|
2011 |
Harn L, Lin CH. Contract signature in e-commerce Computers and Electrical Engineering. 37: 169-173. DOI: 10.1016/J.Compeleceng.2011.02.001 |
0.523 |
|
2011 |
Yang CN, Shih HW, Chu YY, Harn L. New region incrementing visual cryptography scheme Proceedings of the 2011 International Conference On Image Processing, Computer Vision, and Pattern Recognition, Ipcv 2011. 1: 323-329. |
0.316 |
|
2010 |
Harn L, Lin C. Authenticated group key transfer protocol based on secret sharing Ieee Transactions On Computers. 59: 842-846. DOI: 10.1109/TC.2010.40 |
0.439 |
|
2010 |
Harn L, Hsin WJ, Lin C. Efficient on-line/off-line signature schemes based on multiple-collision trapdoor hash families Computer Journal. 53: 1478-1484. DOI: 10.1093/Comjnl/Bxp044 |
0.445 |
|
2010 |
Rashvand HF, Harn L, Park JH, Salah K. Editorial: Multi-agent & distributed information security Iet Information Security. 4: 185-187. DOI: 10.1049/Iet-Ifs.2010.9128 |
0.355 |
|
2010 |
Rashvand HF, Salah K, Calero JMA, Harn L. Distributed security for multi-agent systems-Review and applications Iet Information Security. 4: 188-201. DOI: 10.1049/Iet-Ifs.2010.0041 |
0.386 |
|
2010 |
Harn L, Lin C. Strong (n, t, n) verifiable secret sharing scheme Information Sciences. 180: 3059-3064. DOI: 10.1016/J.Ins.2010.04.016 |
0.457 |
|
2009 |
Lin C, Harn L, Ye D. Ideal perfect multilevel threshold secret sharing scheme 5th International Conference On Information Assurance and Security, Ias 2009. 2: 118-121. DOI: 10.1109/IAS.2009.279 |
0.505 |
|
2009 |
Harn L, Ren J, Lin C. Design of DL-based certificateless digital signatures Journal of Systems and Software. 82: 789-793. DOI: 10.1016/J.Jss.2008.11.844 |
0.555 |
|
2009 |
Harn L, Lin C. Detection and identification of cheaters in (t, n) secret sharing scheme Designs, Codes, and Cryptography. 52: 15-24. DOI: 10.1007/S10623-008-9265-8 |
0.503 |
|
2009 |
Harn L, Ren J, Lin C. Efficient identity-based GQ multisignatures International Journal of Information Security. 8: 205-210. DOI: 10.1007/S10207-008-0072-Z |
0.608 |
|
2009 |
Lin C, Harn L, Ye D. Information-theoretically secure strong verifiable secret sharing Icete 2009 - International Joint Conference On E-Business and Telecommunications. 233-238. |
0.457 |
|
2008 |
Ren J, Harn L. Generalized ring signatures Ieee Transactions On Dependable and Secure Computing. 5: 155-163. DOI: 10.1109/Tdsc.2008.22 |
0.48 |
|
2008 |
Ren J, Harn L, Li T. How to leak a secret from multiple sources Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2008.4753202 |
0.371 |
|
2008 |
Harn L, Ren J. Design of fully deniable authentication service for E-mail applications Ieee Communications Letters. 12: 219-221. DOI: 10.1109/Lcomm.2008.071793 |
0.404 |
|
2008 |
Qingyu X, Mingxing H, Harn L. An improved time-bound hierarchical key assignment scheme Proceedings of the 3rd Ieee Asia-Pacific Services Computing Conference, Apscc 2008. 1489-1494. DOI: 10.1109/APSCC.2008.167 |
0.47 |
|
2008 |
Harn L, Ren J. Efficient identity-based RSA multisignatures Computers and Security. 27: 12-15. DOI: 10.1016/J.Cose.2008.03.003 |
0.598 |
|
2007 |
Zhou T, Harn L. Security in user-assisted communications 2007 Wireless Telecommunications Symposium, Wts 2007. DOI: 10.1109/WTS.2007.4563301 |
0.323 |
|
2007 |
Jian R, Harn L, Tongtong L. A novel provably secure anonymous communication (PSAC) scheme Wasa 2007 - the 2nd International Conference On Wireless Algorithms, Systems and Applications. 275-280. DOI: 10.1109/WASA.2007.137 |
0.459 |
|
2007 |
Ren J, Harn L. Generalized anonymous information sharing Proceedings - Safe 2007: Workshop On Signal Processing Applications For Public Security and Forensics. |
0.403 |
|
2006 |
Darren X, Harn L, Narasimhan M, Junzhou L. An improved free-roaming mobile agent security protocol against colluded truncation attacks Proceedings - International Computer Software and Applications Conference. 2: 309-314. DOI: 10.1109/COMPSAC.2006.111 |
0.33 |
|
2006 |
Ren J, Harn L. Ring signature based on ElGamal signature Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4138: 445-456. |
0.393 |
|
2006 |
Wang J, Mihaljevic MJ, Harn L, Imai H. A hierarchical key management approach for secure multicast Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3894: 422-434. |
0.417 |
|
2005 |
Hsin W, Harn L. Simple certified e-check with a partial PKI solution Proceedings of the Annual Southeast Conference. 2: 2185-2190. DOI: 10.1145/1167253.1167296 |
0.304 |
|
2005 |
Mehta M, Harn L. Efficient one-time proxy signatures Iee Proceedings: Communications. 152: 129-133. DOI: 10.1049/ip-com:20045251 |
0.527 |
|
2005 |
Harn L, Hsin WJ, Mehta M. Authenticated Diffie-Hellman key agreement protocol using a single cryptographic assumption Iee Proceedings: Communications. 152: 404-410. DOI: 10.1049/ip-com:20041041 |
0.426 |
|
2005 |
Wang J, Xia ZY, Harn L. Storage-optimal key sharing with authentication in sensor networks Iet Conference Publications. 134. DOI: 10.1049/cp:20051549 |
0.341 |
|
2005 |
Lin CH, Hsu RH, Harn L. Improved DSA variant for batch verification Applied Mathematics and Computation. 169: 75-81. DOI: 10.1016/J.Amc.2004.10.041 |
0.54 |
|
2005 |
Hsin WJ, Harn L. The e-traveler's check Proceedings of the 2005 International Conference On Internet Computing, Icomp'05. 59-65. |
0.362 |
|
2005 |
Mehta M, Huang D, Harn L. RINK-RKP: A scheme for key predistribution and shared-key discovery in sensor networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 193-197. |
0.46 |
|
2004 |
Harn L, Mehta M. Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA) Ieee Communications Letters. 8: 198-200. DOI: 10.1109/Lcomm.2004.825705 |
0.443 |
|
2004 |
Harn L, Lin CY, Wu TC. Structured multisignature algorithms Iee Proceedings: Computers and Digital Techniques. 151: 231-234. DOI: 10.1049/ip-cdt:20040247 |
0.344 |
|
2001 |
Harn L, Lin HY. A non-repudiation metering scheme Ieee Communications Letters. 5: 486-487. DOI: 10.1109/4234.974494 |
0.524 |
|
2001 |
Harn L, Lin HY. Authenticated key agreement without using one-way hash functions Electronics Letters. 37: 629-630. DOI: 10.1049/El:20010441 |
0.486 |
|
2000 |
Harn L, Lin HY, Gong G. Bounded-to-unbounded poker game Electronics Letters. 36: 214-215. DOI: 10.1049/El:20000239 |
0.372 |
|
2000 |
Qi M, Harn L. Some new proxy signature schemes based on discrete logarithms Tien Tzu Hsueh Pao/Acta Electronica Sinica. 28: 114-115. |
0.465 |
|
1999 |
Lin HY, Harn L. Authentication protocols with nonrepudiation services in personal communication systems Ieee Communications Letters. 3: 236-238. DOI: 10.1109/4234.781006 |
0.37 |
|
1999 |
Gong G, Harn L. Public-key cryptosystems based on cubic finite field extensions Ieee Transactions On Information Theory. 45: 2601-2605. DOI: 10.1109/18.796413 |
0.481 |
|
1999 |
Harn L. Digital multisignature with distinguished signing authorities Electronics Letters. 35: 294-295. DOI: 10.1049/El:19990166 |
0.552 |
|
1998 |
Harn L. Batch verifying multiple RSA digital signatures Electronics Letters. 34: 1219-1220. DOI: 10.1049/El:19980833 |
0.522 |
|
1998 |
Harn L. Batch verifying multiple DSA-type digital signatures Electronics Letters. 34: 870-871. DOI: 10.1049/El:19980620 |
0.485 |
|
1997 |
Harn L. Digital signature for Diffie-Hellman public keys without using a one-way function Electronics Letters. 33: 125-126. DOI: 10.1049/El:19970071 |
0.588 |
|
1995 |
Harn L. Efficient sharing (broadcasting) of multiple secrets Iee Proceedings: Computers and Digital Techniques. 142: 237-240. DOI: 10.1049/ip-cdt:19951874 |
0.48 |
|
1995 |
Harn L. Cryptanalysis of the blind signatures based on the discrete logarithm problem Electronics Letters. 31: 1136. DOI: 10.1049/El:19950815 |
0.469 |
|
1995 |
Harn L. Modified key agreement protocol based on the digital signature standard Electronics Letters. 31: 448-449. DOI: 10.1049/El:19950298 |
0.59 |
|
1995 |
Harn L. DSA type secure interactive batch verification protocols Electronics Letters. 31: 257-258. DOI: 10.1049/El:19950203 |
0.443 |
|
1995 |
Harn L. Comment on "Multistage secret sharing based on one-way function" Electronics Letters. 31: 262-262. DOI: 10.1049/El:19950201 |
0.423 |
|
1995 |
Lee WB, Chang C, Harn L. Comment on “Digital signature with (t,n) shared verification based on discrete logarithms” [and reply] Electronics Letters. 31: 176-177. DOI: 10.1049/El:19950161 |
0.563 |
|
1995 |
Lin HY, Harn L. Fair reconstruction of a secret Information Processing Letters. 55: 45-47. DOI: 10.1016/0020-0190(95)00045-E |
0.458 |
|
1994 |
Harn L, Lin H, Xu Y. Cryptography for PC/workstation security Acm Sigice Bulletin. 20: 21-26. DOI: 10.1145/181823.181830 |
0.438 |
|
1994 |
Harn L, Huang D. Correspondence: A Protocol for Establishing Secure Communication Channels in a Large Network Ieee Transactions On Knowledge and Data Engineering. 6: 188-191. DOI: 10.1109/69.273037 |
0.472 |
|
1994 |
Harn L. Group-oriented (t, n) threshold digital signature scheme and digital multisignature Iee Proceedings: Computers and Digital Techniques. 141: 307-313. DOI: 10.1049/ip-cdt:19941293 |
0.442 |
|
1994 |
Harn L. Public-key cryptosystem design based on factoring and discrete logarithms Iee Proceedings: Computers and Digital Techniques. 141: 193-195. DOI: 10.1049/ip-cdt:19941040 |
0.42 |
|
1994 |
Harn L, Lin HY, Yang S. Threshold cryptosystem with multiple secret sharing policies Iee Proceedings: Computers and Digital Techniques. 141: 142-144. DOI: 10.1049/ip-cdt:19941003 |
0.309 |
|
1994 |
Harn L, Xu Y. Design of generalised ElGamal type digital signature schemes based on discrete logarithm Electronics Letters. 30: 2025-2026. DOI: 10.1049/El:19941398 |
0.5 |
|
1994 |
Harn L. New digital signature scheme based on discrete logarithm Electronics Letters. 30: 396-398. DOI: 10.1049/El:19940317 |
0.553 |
|
1993 |
Harn L, Yang S. ID-based cryptographic schemes for user identification, digital signature, and key distribution Ieee Journal On Selected Areas in Communications. 11: 757-760. DOI: 10.1109/49.223877 |
0.585 |
|
1993 |
Harn L, Lin HY. Key Management for Decentralized Computer Network Services Ieee Transactions On Communications. 41: 1777-1779. DOI: 10.1109/26.250825 |
0.377 |
|
1993 |
Harn L. Digital signature with (t, n) shared verification based on discrete logarithms Electronics Letters. 29: 2094-2095. DOI: 10.1049/El:19931399 |
0.474 |
|
1992 |
Laih CS, Lee JY, Chen CH, Harn L. A new scheme for id-based cryptosystems and signatures Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series a/Chung-Kuo Kung Ch'Eng Hsuch K'An. 15: 605-610. DOI: 10.1080/02533839.1992.9677452 |
0.52 |
|
1992 |
Harn L, Wang DC. Cryptanalysis and modification of digital signature scheme based on error-correcting code Electronics Letters. 28: 157-159. DOI: 10.1049/El:19920098 |
0.507 |
|
1992 |
Harn L, Lin HY, Yang S. A software authentication system for information integrity Computers and Security. 11: 747-752. DOI: 10.1016/0167-4048(92)90130-J |
0.301 |
|
1992 |
Harn L, Lin HY. Integration of user authentication and access control Iee Proceedings E: Computers and Digital Techniques. 139: 139-143. |
0.405 |
|
1990 |
Kiesler T, Harn L. RSA blocking and multisignature schemes with no bit expansion Electronics Letters. 26: 1490-1491. DOI: 10.1049/El:19900957 |
0.417 |
|
1990 |
Harn L, Lin HY. Noninteractive oblivious transfer Electronics Letters. 26: 635-636. DOI: 10.1049/El:19900416 |
0.303 |
|
1990 |
Harn L, Lin HY. A cryptographic key generation scheme for multilevel data security Computers and Security. 9: 539-546. DOI: 10.1016/0167-4048(90)90132-D |
0.574 |
|
1990 |
Harn L, Kiesler T. An efficient probabilistic encryption scheme Information Processing Letters. 34: 123-129. DOI: 10.1016/0020-0190(90)90090-K |
0.526 |
|
1989 |
Laih C-, Lee J-, Harn L, Su Y-. Linearly shift knapsack public-key cryptosystem Ieee Journal On Selected Areas in Communications. 7: 534-539. DOI: 10.1109/49.17717 |
0.451 |
|
1989 |
Laih CS, Harn L, Lee JY. On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial Ieee Transactions On Software Engineering. 15: 1135-1137. DOI: 10.1109/32.31371 |
0.32 |
|
1989 |
Harn L, Kiesler T. 2-Bit, chained, probabilistic encryption scheme Electronics Letters. 25: 1432-1433. DOI: 10.1049/El:19890956 |
0.539 |
|
1989 |
Harn L, Kiesler T. Erratum: Improved Rabin's scheme with high efficiency Electronics Letters. 25: 1016. DOI: 10.1049/El:19890679 |
0.447 |
|
1989 |
Harn L, Kiesler T. New scheme for digital multisignatures Electronics Letters. 25: 1002-1003. DOI: 10.1049/El:19890670 |
0.563 |
|
1989 |
Harn L, Kiesler T. Improved Rabin's scheme with high efficiency Electronics Letters. 25: 726-728. DOI: 10.1049/El:19890492 |
0.585 |
|
1989 |
Harn L, Kiesler T. Public-key encryption algorithm incorporating error detection Electronics Letters. 25: 389-390. DOI: 10.1049/El:19890268 |
0.461 |
|
1989 |
Harn L, Huang D, Laih CS. Password authentication using public-key cryptography Computers and Mathematics With Applications. 18: 1001-1017. DOI: 10.1016/0898-1221(89)90028-X |
0.571 |
|
1989 |
Laih CS, Lee JY, Harn L. A new threshold scheme and its application in designing the conference key distribution cryptosystem Information Processing Letters. 32: 95-99. DOI: 10.1016/0020-0190(89)90008-2 |
0.54 |
|
1988 |
Lu EH, Harn L, Lee JY, Hwang WY. A Programmable VLSI Architecture for Computing Multiplication and Polynomial Evaluation Modulo a Positive Integer Ieee Journal of Solid-State Circuits. 23: 204-207. DOI: 10.1109/4.280 |
0.303 |
|
Show low-probability matches. |