Lein Harn - Publications

Affiliations: 
University of Missouri - Kansas City, USA 
Area:
Computer Science

137 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Cheng Q, Hsu C, Harn L. Lightweight Noninteractive Membership Authentication and Group Key Establishment for WSNs Mathematical Problems in Engineering. 2020: 1-9. DOI: 10.1155/2020/1452546  0.515
2020 Cheng Q, Hsu C, Xia Z, Harn L. Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN Ieee Access. 8: 71833-71839. DOI: 10.1109/Access.2020.2987978  0.482
2020 Harn L, Hsu C, Xia Z. Lightweight group key distribution schemes based on pre-shared pairwise keys Iet Communications. 14: 2162-2165. DOI: 10.1049/Iet-Com.2019.1345  0.53
2020 He Z, Chen W, Xu X, Harn L, Wan M. Reliable and efficient PUF-based cryptographic key generator using bit self-tests Electronics Letters. 56: 803-806. DOI: 10.1049/El.2020.0344  0.416
2020 Harn L, Xia Z, Hsu C, Liu Y. Secret sharing with secure secret reconstruction Information Sciences. 519: 1-8. DOI: 10.1016/J.Ins.2020.01.038  0.564
2020 Harn L, Hsu C, Xia Z. Lightweight and flexible key distribution schemes for secure group communications Wireless Networks. 1-8. DOI: 10.1007/S11276-020-02449-2  0.505
2020 Hsu C, Harn L, Zeng B. UMKESS: user-oriented multi-group key establishments using secret sharing Wireless Networks. 26: 421-430. DOI: 10.1007/S11276-018-1825-X  0.487
2019 Zhang M, Zhang S, Harn L. An efficient and adaptive data-hiding scheme based on secure random matrix. Plos One. 14: e0222892. PMID 31577802 DOI: 10.1371/Journal.Pone.0222892  0.557
2019 Albakri A, Harn L, Song S. Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN) Security and Communication Networks. 2019: 1-11. DOI: 10.1155/2019/3950129  0.479
2019 Albakri A, Harn L. Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks Ieee Access. 7: 31615-31623. DOI: 10.1109/Access.2019.2900390  0.535
2018 Ruan O, Zhang Y, Zhang M, Zhou J, Harn L. After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange Ieee Systems Journal. 12: 2017-2026. DOI: 10.1109/Jsyst.2017.2685524  0.571
2018 Chen X, Liu Y, Harn L, Li Y, Yao G. Threshold proxy re-signature: definition and new constructions Journal of the Chinese Institute of Engineers. 41: 141-148. DOI: 10.1080/02533839.2018.1437362  0.553
2018 Harn L, Hsu C, Li B. Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party Mobile Networks and Applications. 23: 1132-1140. DOI: 10.1007/S11036-016-0776-7  0.454
2017 Harn L, Hsu C. A Novel Design of Membership Authentication and Group Key Establishment Protocol Security and Communication Networks. 2017: 1-7. DOI: 10.1155/2017/8547876  0.457
2017 Harn L, Hsu C, Xia Z, Zhou J. How to Share Secret Efficiently over Networks Security and Communication Networks. 2017: 1-6. DOI: 10.1155/2017/5437403  0.572
2017 Harn L, Hsu C. A Practical Hybrid Group Key Establishment for Secure Group Communications The Computer Journal. 60: 1582-1589. DOI: 10.1093/Comjnl/Bxx003  0.379
2017 Harn L, Hsu C. A Novel Threshold Cryptography with Membership Authentication and Key Establishment Wireless Personal Communications. 97: 3943-3950. DOI: 10.1007/S11277-017-4708-Z  0.601
2017 Harn L, Hsu C. ( t , n ) Multi-Secret Sharing Scheme Based on Bivariate Polynomial Wireless Personal Communications. 95: 1495-1504. DOI: 10.1007/S11277-016-3862-Z  0.439
2016 Liu YN, Harn L, Mao L, Xiong Z. Full-healing group-key distribution in online social networks International Journal of Security and Networks. 11: 12-24. DOI: 10.1504/Ijsn.2016.075070  0.418
2016 Hsu CF, Harn L, He T, Zhang M. Efficient Group Key Transfer Protocol for WSNs Ieee Sensors Journal. 16: 4515-4520. DOI: 10.1109/Jsen.2016.2538292  0.519
2016 Harn L, Hsu CF, Ruan O, Zhang MY. Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks Ieee Sensors Journal. 16: 1779-1785. DOI: 10.1109/Jsen.2015.2504375  0.529
2016 Harn L, Hsu C, Zhang M, He T, Zhang M. Realizing secret sharing with general access structure Information Sciences. 367: 209-220. DOI: 10.1016/J.Ins.2016.06.006  0.514
2016 Hsu CF, Harn L, Mu Y, Zhang M, Zhu X. Computation-efficient key establishment in wireless group communications Wireless Networks. 1-9. DOI: 10.1007/S11276-016-1223-1  0.528
2016 Harn L, Wang F. Threshold signature scheme without using polynomial interpolation International Journal of Network Security. 18: 710-717.  0.499
2015 Harn L, Hsu CF. Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks Ieee Sensors Journal. 15: 5103-5108. DOI: 10.1109/Jsen.2015.2429582  0.501
2015 Harn L, Lin C, Li Y. Fair secret reconstruction in (t, n) secret sharing Journal of Information Security and Applications. 23: 1-7. DOI: 10.1016/j.jisa.2015.07.001  0.419
2015 Harn L, Hsu CF. Dynamic threshold secret reconstruction and its application to the threshold cryptography Information Processing Letters. 115: 851-857. DOI: 10.1016/J.Ipl.2015.06.014  0.457
2015 Hsu CF, Wu S, Harn L. New Results on Ideal Multipartite Secret Sharing and its Applications to Group Communications Wireless Personal Communications. 82: 283-292. DOI: 10.1007/S11277-014-2208-Y  0.458
2015 Harn L, Gong G. Conference key establishment protocol using a multivariate polynomial and its applications Security and Communication Networks. 8: 1794-1800. DOI: 10.1002/Sec.1143  0.512
2015 Liu Y, Harn L, Chang CC. A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets International Journal of Communication Systems. 28: 1282-1292. DOI: 10.1002/Dac.2760  0.537
2014 Harn L, Lin C. Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography Int'L J. of Communications, Network and System Sciences. 7: 22-29. DOI: 10.4236/Ijcns.2014.71003  0.567
2014 Liu YN, Mao L, Harn L, Wang Y. Group key distribution with full-healing property Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2014.6911852  0.432
2014 Harn L. Comments on 'Fair (t, n) threshold secret sharing scheme' Iet Information Security. 8: 303-304. DOI: 10.1049/Iet-Ifs.2013.0302  0.466
2014 Harn L. Generalised cheater detection and identification Iet Information Security. 8: 171-178. DOI: 10.1049/Iet-Ifs.2012.0381  0.36
2014 Harn L, Fuyou M. Multilevel threshold secret sharing based on the Chinese Remainder Theorem Information Processing Letters. 114: 504-509. DOI: 10.1016/J.Ipl.2014.04.006  0.555
2014 Harn L, Lin C. Efficient group Diffie-Hellman key agreement protocols Computers and Electrical Engineering. 40: 1972-1980. DOI: 10.1016/J.Compeleceng.2013.12.018  0.526
2014 Hsu CF, Harn L. Multipartite secret sharing based on CRT Wireless Personal Communications. 78: 271-282. DOI: 10.1007/S11277-014-1751-X  0.573
2014 Hsu CF, Harn L, Cui G. An ideal multi-secret sharing scheme based on connectivity of graphs Wireless Personal Communications. 77: 383-394. DOI: 10.1007/S11277-013-1511-3  0.537
2014 Wang F, Chang CC, Harn L. Simulatable and secure certificate-based threshold signature without pairings Security and Communication Networks. 7: 2094-2103. DOI: 10.1002/Sec.921  0.601
2014 Lin C, Tang F, Ke P, Harn L, Zhang S. Secure universal designated verifier identity-based signcryption Security and Communication Networks. 7: 434-444. DOI: 10.1002/Sec.820  0.529
2014 Harn L, Fuyou M, Chang CC. Verifiable secret sharing based on the Chinese remainder theorem Security and Communication Networks. 7: 950-957. DOI: 10.1002/Sec.807  0.543
2014 Harn L. Secure secret reconstruction and multi-secret sharing schemes with unconditional security Security and Communication Networks. 7: 567-573. DOI: 10.1002/Sec.758  0.593
2014 Liu Y, Harn L, Chang CC. An authenticated group key distribution mechanism using theory of numbers International Journal of Communication Systems. 27: 3502-3512. DOI: 10.1002/Dac.2569  0.538
2014 Harn L, Fuyou M. Weighted secret sharing based on the chinese remainder theorem International Journal of Network Security. 16: 420-426.  0.38
2014 Chang CC, Harn L, Cheng TF. Notes on "Polynomial-based Key Management for Secure Intra-Group and Inter-Group Communication", International Journal of Network Security. 16: 143-148.  0.476
2013 Harn L, Lin C. An Efficient Group Authentication For Group Communications International Journal of Network Security & Its Applications. 5: 9-16. DOI: 10.5121/Ijnsa.2013.5302  0.416
2013 Ren J, Harn L. An efficient threshold anonymous authentication scheme for privacy-preserving communications Ieee Transactions On Wireless Communications. 12: 1018-1025. DOI: 10.1109/Twc.2012.12.112120  0.509
2013 Harn L. Group authentication Ieee Transactions On Computers. 62: 1893-1898. DOI: 10.1109/Tc.2012.251  0.537
2013 Liu Yx, Zhang Yq, Harn L, Hu Yp. Verifiable symmetric polynomial-based key distribution schemes Security and Communication Networks. 6: 1028-1034. DOI: 10.1002/Sec.671  0.51
2013 Harn L, Chang CC, Wu HL. An anonymous multi-receiver encryption based on RSA International Journal of Network Security. 15: 307-312.  0.477
2012 Lin C, Harn L. Unconditionally secure verifiable secret sharing scheme Advances in Information Sciences and Service Sciences. 4: 514-518. DOI: 10.4156/Aiss.Vol4.Issue17.59  0.577
2012 Liu C, Lin C, Harn L, Chen S. Security analysis of remote password authentication schemes for multiserver architecture using neural networks Advanced Science Letters. 7: 680-683. DOI: 10.1166/asl.2012.2709  0.409
2012 Yang CN, Shih HW, Wu CC, Harn L. K out of n region incrementing scheme in visual cryptography Ieee Transactions On Circuits and Systems For Video Technology. 22: 799-810. DOI: 10.1109/Tcsvt.2011.2180952  0.415
2012 Lin C, Harn L. Unconditionally secure multi-secret sharing scheme Csae 2012 - Proceedings, 2012 Ieee International Conference On Computer Science and Automation Engineering. 1: 169-172. DOI: 10.1109/CSAE.2012.6272572  0.524
2012 Yang CN, Ouyang JF, Harn L. Steganography and authentication in image sharing without parity bits Optics Communications. 285: 1725-1735. DOI: 10.1016/J.Optcom.2011.12.003  0.391
2012 Liu YX, Harn L, Yang CN, Zhang YQ. Efficient (n, t, n) secret sharing schemes Journal of Systems and Software. 85: 1325-1332. DOI: 10.1016/J.Jss.2012.01.027  0.454
2012 Liu C, Lin C, Harn L, Chen S. Weakness a remote password authentication schemes for multiserver architecture using neural networks Information. 15: 4965-4970.  0.397
2011 Lee CY, Wang ZH, Harn L, Chang CC. Secure key transfer protocol based on secret sharing for group communications Ieice Transactions On Information and Systems. 2069-2076. DOI: 10.1587/Transinf.E94.D.2069  0.512
2011 Harn L, Ren J. Generalized digital certificate for user authentication and key establishment for secure communications Ieee Transactions On Wireless Communications. 10: 2372-2379. DOI: 10.1109/Twc.2011.042211.101913  0.462
2011 Harn L, Lee CY, Lin C, Chang CC. Fully deniable message authentication protocols preserving confidentiality Computer Journal. 54: 1688-1699. DOI: 10.1093/Comjnl/Bxr081  0.5
2011 Harn L, Lin CH. Contract signature in e-commerce Computers and Electrical Engineering. 37: 169-173. DOI: 10.1016/J.Compeleceng.2011.02.001  0.523
2011 Yang CN, Shih HW, Chu YY, Harn L. New region incrementing visual cryptography scheme Proceedings of the 2011 International Conference On Image Processing, Computer Vision, and Pattern Recognition, Ipcv 2011. 1: 323-329.  0.316
2010 Harn L, Lin C. Authenticated group key transfer protocol based on secret sharing Ieee Transactions On Computers. 59: 842-846. DOI: 10.1109/TC.2010.40  0.439
2010 Harn L, Hsin WJ, Lin C. Efficient on-line/off-line signature schemes based on multiple-collision trapdoor hash families Computer Journal. 53: 1478-1484. DOI: 10.1093/Comjnl/Bxp044  0.445
2010 Rashvand HF, Harn L, Park JH, Salah K. Editorial: Multi-agent & distributed information security Iet Information Security. 4: 185-187. DOI: 10.1049/Iet-Ifs.2010.9128  0.355
2010 Rashvand HF, Salah K, Calero JMA, Harn L. Distributed security for multi-agent systems-Review and applications Iet Information Security. 4: 188-201. DOI: 10.1049/Iet-Ifs.2010.0041  0.386
2010 Harn L, Lin C. Strong (n, t, n) verifiable secret sharing scheme Information Sciences. 180: 3059-3064. DOI: 10.1016/J.Ins.2010.04.016  0.457
2009 Lin C, Harn L, Ye D. Ideal perfect multilevel threshold secret sharing scheme 5th International Conference On Information Assurance and Security, Ias 2009. 2: 118-121. DOI: 10.1109/IAS.2009.279  0.505
2009 Harn L, Ren J, Lin C. Design of DL-based certificateless digital signatures Journal of Systems and Software. 82: 789-793. DOI: 10.1016/J.Jss.2008.11.844  0.555
2009 Harn L, Lin C. Detection and identification of cheaters in (t, n) secret sharing scheme Designs, Codes, and Cryptography. 52: 15-24. DOI: 10.1007/S10623-008-9265-8  0.503
2009 Harn L, Ren J, Lin C. Efficient identity-based GQ multisignatures International Journal of Information Security. 8: 205-210. DOI: 10.1007/S10207-008-0072-Z  0.608
2009 Lin C, Harn L, Ye D. Information-theoretically secure strong verifiable secret sharing Icete 2009 - International Joint Conference On E-Business and Telecommunications. 233-238.  0.457
2008 Ren J, Harn L. Generalized ring signatures Ieee Transactions On Dependable and Secure Computing. 5: 155-163. DOI: 10.1109/Tdsc.2008.22  0.48
2008 Ren J, Harn L, Li T. How to leak a secret from multiple sources Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2008.4753202  0.371
2008 Harn L, Ren J. Design of fully deniable authentication service for E-mail applications Ieee Communications Letters. 12: 219-221. DOI: 10.1109/Lcomm.2008.071793  0.404
2008 Qingyu X, Mingxing H, Harn L. An improved time-bound hierarchical key assignment scheme Proceedings of the 3rd Ieee Asia-Pacific Services Computing Conference, Apscc 2008. 1489-1494. DOI: 10.1109/APSCC.2008.167  0.47
2008 Harn L, Ren J. Efficient identity-based RSA multisignatures Computers and Security. 27: 12-15. DOI: 10.1016/J.Cose.2008.03.003  0.598
2007 Zhou T, Harn L. Security in user-assisted communications 2007 Wireless Telecommunications Symposium, Wts 2007. DOI: 10.1109/WTS.2007.4563301  0.323
2007 Jian R, Harn L, Tongtong L. A novel provably secure anonymous communication (PSAC) scheme Wasa 2007 - the 2nd International Conference On Wireless Algorithms, Systems and Applications. 275-280. DOI: 10.1109/WASA.2007.137  0.459
2007 Ren J, Harn L. Generalized anonymous information sharing Proceedings - Safe 2007: Workshop On Signal Processing Applications For Public Security and Forensics 0.403
2006 Darren X, Harn L, Narasimhan M, Junzhou L. An improved free-roaming mobile agent security protocol against colluded truncation attacks Proceedings - International Computer Software and Applications Conference. 2: 309-314. DOI: 10.1109/COMPSAC.2006.111  0.33
2006 Ren J, Harn L. Ring signature based on ElGamal signature Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4138: 445-456.  0.393
2006 Wang J, Mihaljevic MJ, Harn L, Imai H. A hierarchical key management approach for secure multicast Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3894: 422-434.  0.417
2005 Hsin W, Harn L. Simple certified e-check with a partial PKI solution Proceedings of the Annual Southeast Conference. 2: 2185-2190. DOI: 10.1145/1167253.1167296  0.304
2005 Mehta M, Harn L. Efficient one-time proxy signatures Iee Proceedings: Communications. 152: 129-133. DOI: 10.1049/ip-com:20045251  0.527
2005 Harn L, Hsin WJ, Mehta M. Authenticated Diffie-Hellman key agreement protocol using a single cryptographic assumption Iee Proceedings: Communications. 152: 404-410. DOI: 10.1049/ip-com:20041041  0.426
2005 Wang J, Xia ZY, Harn L. Storage-optimal key sharing with authentication in sensor networks Iet Conference Publications. 134. DOI: 10.1049/cp:20051549  0.341
2005 Lin CH, Hsu RH, Harn L. Improved DSA variant for batch verification Applied Mathematics and Computation. 169: 75-81. DOI: 10.1016/J.Amc.2004.10.041  0.54
2005 Hsin WJ, Harn L. The e-traveler's check Proceedings of the 2005 International Conference On Internet Computing, Icomp'05. 59-65.  0.362
2005 Mehta M, Huang D, Harn L. RINK-RKP: A scheme for key predistribution and shared-key discovery in sensor networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 193-197.  0.46
2004 Harn L, Mehta M. Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA) Ieee Communications Letters. 8: 198-200. DOI: 10.1109/Lcomm.2004.825705  0.443
2004 Harn L, Lin CY, Wu TC. Structured multisignature algorithms Iee Proceedings: Computers and Digital Techniques. 151: 231-234. DOI: 10.1049/ip-cdt:20040247  0.344
2001 Harn L, Lin HY. A non-repudiation metering scheme Ieee Communications Letters. 5: 486-487. DOI: 10.1109/4234.974494  0.524
2001 Harn L, Lin HY. Authenticated key agreement without using one-way hash functions Electronics Letters. 37: 629-630. DOI: 10.1049/El:20010441  0.486
2000 Harn L, Lin HY, Gong G. Bounded-to-unbounded poker game Electronics Letters. 36: 214-215. DOI: 10.1049/El:20000239  0.372
2000 Qi M, Harn L. Some new proxy signature schemes based on discrete logarithms Tien Tzu Hsueh Pao/Acta Electronica Sinica. 28: 114-115.  0.465
1999 Lin HY, Harn L. Authentication protocols with nonrepudiation services in personal communication systems Ieee Communications Letters. 3: 236-238. DOI: 10.1109/4234.781006  0.37
1999 Gong G, Harn L. Public-key cryptosystems based on cubic finite field extensions Ieee Transactions On Information Theory. 45: 2601-2605. DOI: 10.1109/18.796413  0.481
1999 Harn L. Digital multisignature with distinguished signing authorities Electronics Letters. 35: 294-295. DOI: 10.1049/El:19990166  0.552
1998 Harn L. Batch verifying multiple RSA digital signatures Electronics Letters. 34: 1219-1220. DOI: 10.1049/El:19980833  0.522
1998 Harn L. Batch verifying multiple DSA-type digital signatures Electronics Letters. 34: 870-871. DOI: 10.1049/El:19980620  0.485
1997 Harn L. Digital signature for Diffie-Hellman public keys without using a one-way function Electronics Letters. 33: 125-126. DOI: 10.1049/El:19970071  0.588
1995 Harn L. Efficient sharing (broadcasting) of multiple secrets Iee Proceedings: Computers and Digital Techniques. 142: 237-240. DOI: 10.1049/ip-cdt:19951874  0.48
1995 Harn L. Cryptanalysis of the blind signatures based on the discrete logarithm problem Electronics Letters. 31: 1136. DOI: 10.1049/El:19950815  0.469
1995 Harn L. Modified key agreement protocol based on the digital signature standard Electronics Letters. 31: 448-449. DOI: 10.1049/El:19950298  0.59
1995 Harn L. DSA type secure interactive batch verification protocols Electronics Letters. 31: 257-258. DOI: 10.1049/El:19950203  0.443
1995 Harn L. Comment on "Multistage secret sharing based on one-way function" Electronics Letters. 31: 262-262. DOI: 10.1049/El:19950201  0.423
1995 Lee WB, Chang C, Harn L. Comment on “Digital signature with (t,n) shared verification based on discrete logarithms” [and reply] Electronics Letters. 31: 176-177. DOI: 10.1049/El:19950161  0.563
1995 Lin HY, Harn L. Fair reconstruction of a secret Information Processing Letters. 55: 45-47. DOI: 10.1016/0020-0190(95)00045-E  0.458
1994 Harn L, Lin H, Xu Y. Cryptography for PC/workstation security Acm Sigice Bulletin. 20: 21-26. DOI: 10.1145/181823.181830  0.438
1994 Harn L, Huang D. Correspondence: A Protocol for Establishing Secure Communication Channels in a Large Network Ieee Transactions On Knowledge and Data Engineering. 6: 188-191. DOI: 10.1109/69.273037  0.472
1994 Harn L. Group-oriented (t, n) threshold digital signature scheme and digital multisignature Iee Proceedings: Computers and Digital Techniques. 141: 307-313. DOI: 10.1049/ip-cdt:19941293  0.442
1994 Harn L. Public-key cryptosystem design based on factoring and discrete logarithms Iee Proceedings: Computers and Digital Techniques. 141: 193-195. DOI: 10.1049/ip-cdt:19941040  0.42
1994 Harn L, Lin HY, Yang S. Threshold cryptosystem with multiple secret sharing policies Iee Proceedings: Computers and Digital Techniques. 141: 142-144. DOI: 10.1049/ip-cdt:19941003  0.309
1994 Harn L, Xu Y. Design of generalised ElGamal type digital signature schemes based on discrete logarithm Electronics Letters. 30: 2025-2026. DOI: 10.1049/El:19941398  0.5
1994 Harn L. New digital signature scheme based on discrete logarithm Electronics Letters. 30: 396-398. DOI: 10.1049/El:19940317  0.553
1993 Harn L, Yang S. ID-based cryptographic schemes for user identification, digital signature, and key distribution Ieee Journal On Selected Areas in Communications. 11: 757-760. DOI: 10.1109/49.223877  0.585
1993 Harn L, Lin HY. Key Management for Decentralized Computer Network Services Ieee Transactions On Communications. 41: 1777-1779. DOI: 10.1109/26.250825  0.377
1993 Harn L. Digital signature with (t, n) shared verification based on discrete logarithms Electronics Letters. 29: 2094-2095. DOI: 10.1049/El:19931399  0.474
1992 Laih CS, Lee JY, Chen CH, Harn L. A new scheme for id-based cryptosystems and signatures Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series a/Chung-Kuo Kung Ch'Eng Hsuch K'An. 15: 605-610. DOI: 10.1080/02533839.1992.9677452  0.52
1992 Harn L, Wang DC. Cryptanalysis and modification of digital signature scheme based on error-correcting code Electronics Letters. 28: 157-159. DOI: 10.1049/El:19920098  0.507
1992 Harn L, Lin HY, Yang S. A software authentication system for information integrity Computers and Security. 11: 747-752. DOI: 10.1016/0167-4048(92)90130-J  0.301
1992 Harn L, Lin HY. Integration of user authentication and access control Iee Proceedings E: Computers and Digital Techniques. 139: 139-143.  0.405
1990 Kiesler T, Harn L. RSA blocking and multisignature schemes with no bit expansion Electronics Letters. 26: 1490-1491. DOI: 10.1049/El:19900957  0.417
1990 Harn L, Lin HY. Noninteractive oblivious transfer Electronics Letters. 26: 635-636. DOI: 10.1049/El:19900416  0.303
1990 Harn L, Lin HY. A cryptographic key generation scheme for multilevel data security Computers and Security. 9: 539-546. DOI: 10.1016/0167-4048(90)90132-D  0.574
1990 Harn L, Kiesler T. An efficient probabilistic encryption scheme Information Processing Letters. 34: 123-129. DOI: 10.1016/0020-0190(90)90090-K  0.526
1989 Laih C-, Lee J-, Harn L, Su Y-. Linearly shift knapsack public-key cryptosystem Ieee Journal On Selected Areas in Communications. 7: 534-539. DOI: 10.1109/49.17717  0.451
1989 Laih CS, Harn L, Lee JY. On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial Ieee Transactions On Software Engineering. 15: 1135-1137. DOI: 10.1109/32.31371  0.32
1989 Harn L, Kiesler T. 2-Bit, chained, probabilistic encryption scheme Electronics Letters. 25: 1432-1433. DOI: 10.1049/El:19890956  0.539
1989 Harn L, Kiesler T. Erratum: Improved Rabin's scheme with high efficiency Electronics Letters. 25: 1016. DOI: 10.1049/El:19890679  0.447
1989 Harn L, Kiesler T. New scheme for digital multisignatures Electronics Letters. 25: 1002-1003. DOI: 10.1049/El:19890670  0.563
1989 Harn L, Kiesler T. Improved Rabin's scheme with high efficiency Electronics Letters. 25: 726-728. DOI: 10.1049/El:19890492  0.585
1989 Harn L, Kiesler T. Public-key encryption algorithm incorporating error detection Electronics Letters. 25: 389-390. DOI: 10.1049/El:19890268  0.461
1989 Harn L, Huang D, Laih CS. Password authentication using public-key cryptography Computers and Mathematics With Applications. 18: 1001-1017. DOI: 10.1016/0898-1221(89)90028-X  0.571
1989 Laih CS, Lee JY, Harn L. A new threshold scheme and its application in designing the conference key distribution cryptosystem Information Processing Letters. 32: 95-99. DOI: 10.1016/0020-0190(89)90008-2  0.54
1988 Lu EH, Harn L, Lee JY, Hwang WY. A Programmable VLSI Architecture for Computing Multiplication and Polynomial Evaluation Modulo a Positive Integer Ieee Journal of Solid-State Circuits. 23: 204-207. DOI: 10.1109/4.280  0.303
Show low-probability matches.