


Остановите войну!
for scientists:


default search action
Lein Harn
Person information

- affiliation: University of Missouri-Kansas City, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j92]Chingfang Hsu
, Lein Harn, Zhe Xia, Jianqun Cui, Jingxue Chen:
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks. Comput. J. 66(1): 208-220 (2023) - [j91]Lein Harn, Ching-Fang Hsu, Zhe Xia
, Zixuan Li
:
Multiple Blind Signature for e-Voting and e-Cash. Comput. J. 66(10): 2331-2338 (2023) - [j90]Ching-Fang Hsu
, Zhe Xia, Lein Harn, Man Ho Au, Jianqun Cui
, Zhuo Zhao:
Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities. Inf. Sci. 647: 119488 (2023) - [j89]Lein Harn
, Chingfang Hsu, Zhe Xia
, Hang Xu, Shuchang Zeng, Fengling Pang:
Simple and efficient threshold changeable secret sharing. J. Inf. Secur. Appl. 77: 103576 (2023) - [j88]Linyan Bai, Ching-Fang Hsu
, Lein Harn
, Jianqun Cui
, Zhuo Zhao
:
A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments. IEEE Trans. Dependable Secur. Comput. 20(4): 3535-3545 (2023) - [j87]Hang Xu, Ching-Fang Hsu
, Lein Harn
, Jianqun Cui
, Zhuo Zhao
, Ze Zhang:
Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things. IEEE Trans. Serv. Comput. 16(4): 3000-3013 (2023) - [j86]Ching-Fang Hsu
, Lein Harn, Zhe Xia, Zhuo Zhao, Hang Xu:
Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT. Wirel. Pers. Commun. 129(4): 2403-2417 (2023) - [j85]Hongyu Wang, Ching-Fang Hsu
, Lein Harn:
A Lightweight and Robust Stream Cipher Based on PI for Intelligent Transportation Systems. Wirel. Pers. Commun. 130(3): 1661-1675 (2023) - 2022
- [j84]Lein Harn, Chingfang Hsu, Zhe Xia:
A novel threshold changeable secret sharing scheme. Frontiers Comput. Sci. 16(1): 161807 (2022) - [j83]Wei Liu
, Lein Harn, Jian Weng:
Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs). IET Commun. 16(1): 58-66 (2022) - [j82]Chingfang Hsu, Lein Harn, Zhe Xia, Linyan Bai, Ze Zhang:
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments. J. Cloud Comput. 11: 89 (2022) - [j81]Lein Harn, Chingfang Hsu, Zhe Xia:
General logic-operation-based lightweight group-key distribution schemes for Internet of Vehicles. Veh. Commun. 34: 100457 (2022) - 2021
- [j80]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Zhuo Zhao:
Non-interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks. IET Commun. 15(2): 328-336 (2021) - [j79]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Quanrun Li:
Design of ideal secret sharing based on new results on representable quadripartite matroids. J. Inf. Secur. Appl. 58: 102724 (2021) - [j78]Lein Harn, Zhe Xia, Chingfang Hsu
:
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks. Peer-to-Peer Netw. Appl. 14(2): 722-728 (2021) - [j77]Yanan Liu
, Yijun Cui, Lein Harn, Zheng Zhang
, Hao Yan, Yuan Cheng, Shuo Qiu
:
PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks. Secur. Commun. Networks 2021: 5532683:1-5532683:13 (2021) - [j76]Zhuo Zhao, Chingfang Hsu
, Lein Harn, Qing Yang, Lulu Ke:
Lightweight Privacy-Preserving Data Sharing Scheme for Internet of Medical Things. Wirel. Commun. Mob. Comput. 2021: 8402138:1-8402138:13 (2021) - [j75]Lein Harn, Chingfang Hsu
, Zhe Xia:
Lightweight and flexible key distribution schemes for secure group communications. Wirel. Networks 27(1): 129-136 (2021) - 2020
- [j74]Qi Cheng, Ching-Fang Hsu
, Zhe Xia, Lein Harn:
Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN. IEEE Access 8: 71833-71839 (2020) - [j73]Zhangqing He
, Wanbo Chen
, Lingchao Zhang
, Gaojun Chi, Qi Gao, Lein Harn:
A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test. IEEE Access 8: 181751-181762 (2020) - [j72]Chingfang Hsu
, Lein Harn, Zhe Xia, Maoyuan Zhang
:
Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir's SS for 5G Networks. IEEE Access 8: 203965-203971 (2020) - [j71]Lein Harn, Chingfang Hsu, Zhe Xia:
Lightweight group key distribution schemes based on pre-shared pairwise keys. IET Commun. 14(13): 2162-2165 (2020) - [j70]Lein Harn, Zhe Xia, Ching-Fang Hsu
, Yining Liu
:
Secret sharing with secure secret reconstruction. Inf. Sci. 519: 1-8 (2020) - [j69]Ching-Fang Hsu, Lein Harn, Bing Zeng
:
UMKESS: user-oriented multi-group key establishments using secret sharing. Wirel. Networks 26(1): 421-430 (2020)
2010 – 2019
- 2019
- [j68]Ashwag Albakri
, Lein Harn:
Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks. IEEE Access 7: 31615-31623 (2019) - [j67]Ashwag Albakri
, Lein Harn, Sejun Song:
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN). Secur. Commun. Networks 2019: 3950129:1-3950129:11 (2019) - [c37]Ashwag Albakri, Lein Harn, Mahesh Maddumala:
Polynomial-based Lightweight Key Management in a Permissioned Blockchain. CNS 2019: 1-9 - [c36]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo
, Weizhi Meng
:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - 2018
- [j66]Lein Harn, Ching-Fang Hsu, Bohan Li:
Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party. Mob. Networks Appl. 23(5): 1132-1140 (2018) - [j65]Ou Ruan
, Yuanyuan Zhang, Mingwu Zhang, Jing Zhou, Lein Harn:
After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange. IEEE Syst. J. 12(2): 2017-2026 (2018) - [c35]Ashwag Albakri, Mahesh Maddumala, Lein Harn:
Hierarchical Polynomial-Based Key Management Scheme in Fog Computing. TrustCom/BigDataSE 2018: 1593-1597 - 2017
- [j64]Lein Harn, Ching-Fang Hsu:
A Practical Hybrid Group Key Establishment for Secure Group Communications. Comput. J. 60(11): 1582-1589 (2017) - [j63]Mingwu Zhang, Yudi Zhang, Hua Shen, Chunming Tang, Lein Harn:
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security. J. Inf. Sci. Eng. 33(4): 993-1006 (2017) - [j62]Lein Harn, Ching-Fang Hsu
, Zhe Xia, Junwei Zhou
:
How to Share Secret Efficiently over Networks. Secur. Commun. Networks 2017: 5437403:1-5437403:6 (2017) - [j61]Lein Harn, Ching-Fang Hsu
:
A Novel Design of Membership Authentication and Group Key Establishment Protocol. Secur. Commun. Networks 2017: 8547876:1-8547876:7 (2017) - [j60]Ching-Fang Hsu, Lein Harn, Yi Mu, Maoyuan Zhang, Xuan Zhu:
Computation-efficient key establishment in wireless group communications. Wirel. Networks 23(1): 289-297 (2017) - [j59]Lein Harn, Ching-Fang Hsu:
(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial. Wirel. Pers. Commun. 95(2): 1495-1504 (2017) - [j58]Lein Harn, Ching-Fang Hsu:
A Novel Threshold Cryptography with Membership Authentication and Key Establishment. Wirel. Pers. Commun. 97(3): 3943-3950 (2017) - 2016
- [j57]Lein Harn, Feng Wang:
Threshold Signature Scheme without Using Polynomial Interpolation. Int. J. Netw. Secur. 18(4): 710-717 (2016) - [j56]Yanan Liu, Lein Harn, Lei Mao, Zhangliang Xiong:
Full-healing group-key distribution in online social networks. Int. J. Secur. Networks 11(1/2): 12-24 (2016) - [j55]Lein Harn, Ching-Fang Hsu, Mingwu Zhang, Tingting He, Maoyuan Zhang:
Realizing secret sharing with general access structure. Inf. Sci. 367-368: 209-220 (2016) - 2015
- [j54]Yanjun Liu, Lein Harn, Chin-Chen Chang:
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. Int. J. Commun. Syst. 28(7): 1282-1292 (2015) - [j53]Lein Harn, Ching-Fang Hsu:
Dynamic threshold secret reconstruction and its application to the threshold cryptography. Inf. Process. Lett. 115(11): 851-857 (2015) - [j52]Lein Harn, Changlu Lin
, Yong Li:
Fair secret reconstruction in (t, n) secret sharing. J. Inf. Secur. Appl. 23: 1-7 (2015) - [j51]Qian Mao, Chin-Chen Chang, Lein Harn, Shih-Chang Chang:
An image-based key agreement protocol using the morphing technique. Multim. Tools Appl. 74(9): 3207-3229 (2015) - [j50]Lein Harn, Guang Gong:
Conference key establishment protocol using a multivariate polynomial and its applications. Secur. Commun. Networks 8(9): 1794-1800 (2015) - [j49]Ching-Fang Hsu, Shan Wu, Lein Harn:
New Results on Ideal Multipartite Secret Sharing and its Applications to Group Communications. Wirel. Pers. Commun. 82(1): 283-292 (2015) - 2014
- [j48]Lein Harn, Changlu Lin:
Efficient group Diffie-Hellman key agreement protocols. Comput. Electr. Eng. 40(6): 1972-1980 (2014) - [j47]Lein Harn:
Generalised cheater detection and identification. IET Inf. Secur. 8(3): 171-178 (2014) - [j46]Lein Harn:
Comments on 'fair (t, n) threshold secret sharing scheme'. IET Inf. Secur. 8(6): 303-304 (2014) - [j45]Yanjun Liu, Lein Harn, Chin-Chen Chang:
An authenticated group key distribution mechanism using theory of numbers. Int. J. Commun. Syst. 27(11): 3502-3512 (2014) - [j44]Lein Harn, Fuyou Miao:
Weighted Secret Sharing Based on the Chinese Remainder Theorem. Int. J. Netw. Secur. 16(6): 420-425 (2014) - [j43]Lein Harn, Fuyou Miao:
Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Inf. Process. Lett. 114(9): 504-509 (2014) - [j42]Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn, Shengyuan Zhang:
Secure universal designated verifier identity-based signcryption. Secur. Commun. Networks 7(2): 434-444 (2014) - [j41]Lein Harn:
Secure secret reconstruction and multi-secret sharing schemes with unconditional security. Secur. Commun. Networks 7(3): 567-573 (2014) - [j40]Lein Harn, Fuyou Miao, Chin-Chen Chang:
Verifiable secret sharing based on the Chinese remainder theorem. Secur. Commun. Networks 7(6): 950-957 (2014) - [j39]Feng Wang, Chin-Chen Chang, Lein Harn:
Simulatable and secure certificate-based threshold signature without pairings. Secur. Commun. Networks 7(11): 2094-2103 (2014) - [j38]Ching-Fang Hsu, Lein Harn, Guohua Cui:
An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs. Wirel. Pers. Commun. 77(1): 383-394 (2014) - [j37]Ching-Fang Hsu, Lein Harn:
Multipartite Secret Sharing Based on CRT. Wirel. Pers. Commun. 78(1): 271-282 (2014) - [c34]Yanan Liu, Lei Mao, Lein Harn, Yi Wang:
Group key distribution with full-healing property. ICCCN 2014: 1-6 - 2013
- [j36]Lein Harn, Chin-Chen Chang, Hsiao-Ling Wu:
An Anonymous Multi-Receiver Encryption Based on RSA. Int. J. Netw. Secur. 15(4): 307-312 (2013) - [j35]Yan-Xiao Liu, Yuqing Zhang, Lein Harn, Yu-pu Hu:
Verifiable symmetric polynomial-based key distribution schemes. Secur. Commun. Networks 6(8): 1028-1034 (2013) - [j34]Lein Harn:
Group Authentication. IEEE Trans. Computers 62(9): 1893-1898 (2013) - [j33]Jian Ren, Lein Harn:
An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications. IEEE Trans. Wirel. Commun. 12(3): 1018-1025 (2013) - [i1]Lein Harn, Changlu Lin:
An efficient group authentication for group communications. CoRR abs/1306.1436 (2013) - 2012
- [j32]Yan-Xiao Liu, Lein Harn, Ching-Nung Yang
, Yuqing Zhang:
Efficient (n, t, n) secret sharing schemes. J. Syst. Softw. 85(6): 1325-1332 (2012) - [j31]Ching-Nung Yang
, Hsiang-Wen Shih, Chih-Cheng Wu, Lein Harn:
$k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5): 799-810 (2012) - 2011
- [j30]Lein Harn, Chu-Hsing Lin:
Contract signature in e-commerce. Comput. Electr. Eng. 37(2): 169-173 (2011) - [j29]Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang:
Fully Deniable Message Authentication Protocols Preserving Confidentiality. Comput. J. 54(10): 1688-1699 (2011) - [j28]Chia-Yin Lee, Zhi-Hui Wang, Lein Harn, Chin-Chen Chang:
Secure Key Transfer Protocol Based on Secret Sharing for Group Communications. IEICE Trans. Inf. Syst. 94-D(11): 2069-2076 (2011) - [j27]Lein Harn, Jian Ren:
Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications. IEEE Trans. Wirel. Commun. 10(7): 2372-2379 (2011) - 2010
- [j26]Lein Harn, Wen-Jung Hsin, Changlu Lin:
Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families. Comput. J. 53(9): 1478-1484 (2010) - [j25]Habib F. Rashvand, Khaled Salah
, Jose M. Alcaraz Calero
, Lein Harn:
Distributed security for multi-agent systems - review and applications. IET Inf. Secur. 4(4): 188-201 (2010) - [j24]Lein Harn, Changlu Lin:
Strong (n, t, n) verifiable secret sharing scheme. Inf. Sci. 180(16): 3059-3064 (2010) - [j23]Lein Harn, Changlu Lin:
Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. Computers 59(6): 842-846 (2010) - [c33]Lein Harn, Chu-Hsing Lin, Che-Wei Hu:
Contract Signatures in E-Commerce Applications. BWCCA 2010: 384-388
2000 – 2009
- 2009
- [j22]Lein Harn, Changlu Lin:
Detection and identification of cheaters in ( t , n ) secret sharing scheme. Des. Codes Cryptogr. 52(1): 15-24 (2009) - [j21]Lein Harn, Jian Ren, Changlu Lin:
Efficient identity-based GQ multisignatures. Int. J. Inf. Sec. 8(3): 205-210 (2009) - [j20]Tong Zhou, Lein Harn:
Hybrid Trust Structure in Self-Organizing Networks. Int. J. Interdiscip. Telecommun. Netw. 1(2): 1-15 (2009) - [j19]Lein Harn, Jian Ren, Changlu Lin:
Design of DL-based certificateless digital signatures. J. Syst. Softw. 82(5): 789-793 (2009) - [c32]Changlu Lin, Lein Harn, Dingfeng Ye:
Ideal Perfect Multilevel Threshold Secret Sharing Scheme. IAS 2009: 118-121 - [c31]Changlu Lin, Lein Harn, Dingfeng Ye:
Information-theoretically Secure Strong Verifiable Secret Sharing. SECRYPT 2009: 233-238 - 2008
- [j18]Lein Harn, Jian Ren:
Efficient identity-based RSA multisignatures. Comput. Secur. 27(1-2): 12-15 (2008) - [j17]Lein Harn, Jian Ren:
Design of Fully Deniable Authentication Service for E-mail Applications. IEEE Commun. Lett. 12(3): 219-221 (2008) - [j16]Jian Ren, Lein Harn:
Generalized Ring Signatures. IEEE Trans. Dependable Secur. Comput. 5(3): 155-163 (2008) - [c30]Qingyu Xu, Mingxing He, Lein Harn:
An Improved Time-Bound Hierarchical Key Assignment Scheme. APSCC 2008: 1489-1494 - 2007
- [c29]Tong Zhou, Lein Harn:
Security in User-Assisted Communications. WTS 2007: 1-10 - 2006
- [j15]Dijiang Huang
, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory C. Beard, Lein Harn, Deep Medhi:
New architecture for intra-domain network security issues. Commun. ACM 49(11): 64-72 (2006) - [c28]Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast. ARCS 2006: 422-434 - [c27]Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Luo:
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. COMPSAC (2) 2006: 309-314 - [c26]Jian Ren, Lein Harn:
Ring Signature Based on ElGamal Signature. WASA 2006: 445-456 - 2005
- [j14]Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn:
Improved DSA variant for batch verification. Appl. Math. Comput. 169(1): 75-81 (2005) - [c25]Wen-Jung Hsin, Lein Harn:
Simple certified e-check with a partial PKI solution. ACM Southeast Regional Conference (2) 2005: 185-190 - [c24]Wen-Jung Hsin, Lein Harn:
The e-Traveler's Check. International Conference on Internet Computing 2005: 59-65 - [c23]Jian Wang, Lein Harn, Hideki Imai:
Key Management for Multicast Fingerprinting. ICISS 2005: 191-204 - [c22]Manish Mehta, Dijiang Huang, Lein Harn:
RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks. IPCCC 2005: 193-197 - [c21]Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
:
Storage-Optimal Key Sharing with Authentication in Sensor Networks. ISPA Workshops 2005: 466-474 - 2004
- [j13]Lein Harn, Manish Mehta, Wen-Jung Hsin:
Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA). IEEE Commun. Lett. 8(3): 198-200 (2004) - [c20]Dijiang Huang
, Manish Mehta, Deep Medhi, Lein Harn:
Location-aware key management scheme for wireless sensor networks. SASN 2004: 29-42 - 2003
- [c19]Lein Harn, Wen-Jung Hsin:
On the security of wireless network access with enhancements. Workshop on Wireless Security 2003: 88-95 - 2001
- [c18]Guang Gong, Lein Harn, Huapeng Wu:
The GH Public-Key Cryptosystem. Selected Areas in Cryptography 2001: 284-300
1990 – 1999
- 1999
- [j12]Hung-Yu Lin, Lein Harn:
Authentication protocols with nonrepudiation services in personal communication systems. IEEE Commun. Lett. 3(8): 236-238 (1999) - [j11]Guang Gong, Lein Harn:
Public-key cryptosystems based on cubic finite field extensions. IEEE Trans. Inf. Theory 45(7): 2601-2605 (1999) - 1995
- [j10]Hung-Yu Lin, Lein Harn:
Fair Reconstruction of a Secret. Inf. Process. Lett. 55(1): 45-47 (1995) - [c17]Hung-Yu Lin, Lein Harn:
Authentication Protocols for Personal Communication Systems. SIGCOMM 1995: 256-261 - 1994
- [j9]Lein Harn, David Huang:
A Protocol for Establishing Secure Communication Channels in a Large Network. IEEE Trans. Knowl. Data Eng. 6(1): 188-191 (1994) - 1993
- [j8]Lein Harn, Shoubao Yang:
ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution. IEEE J. Sel. Areas Commun. 11(5): 757-760 (1993) - [j7]Lein Harn, Hung-Yu Lin:
Key management for decentralized computer network services. IEEE Trans. Commun. 41(12): 1777-1779 (1993) - 1992
- [j6]Lein Harn, Hung-Yu Lin, Shoubao Yang:
A software authentication system for information integrity. Comput. Secur. 11(8): 747-752 (1992) - [c16]Lein Harn, Hung-Yu Lin, Shoubao Yang:
A Software Authentication System for the Prevention of Computer Viruses. ACM Conference on Computer Science 1992: 447-450 - [c15]Lein Harn, Shoubao Yang:
Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party. AUSCRYPT 1992: 133-142 - [c14]Lein Harn, Shoubao Yang:
Public-Key Cryptosystem Based on the Discrete Logarithm Problem. AUSCRYPT 1992: 469-476 - [c13]Lein Harn, Hung-Yu Lin:
An l-Span Generalized Secret Sharing Scheme. CRYPTO 1992: 558-565 - 1991
- [c12]Hung-Yu Lin, Lein Harn:
A Generalized Secret Sharing Scheme With Cheater Detection. ASIACRYPT 1991: 149-158 - [c11]Chi-Sung Laih, Lein Harn:
Generalized Threshold Cryptosystems. ASIACRYPT 1991: 159-166 - [c10]