The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lein Harn: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wen-Jung Hsin, Lein Harn
    Simple certified e-check with a partial PKI solution. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:185-190 [Conf]
  2. Lein Harn, Hung-Yu Lin, Shoubao Yang
    A Software Authentication System for the Prevention of Computer Viruses. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1992, pp:447-450 [Conf]
  3. Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai
    A Hierarchical Key Management Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    ARCS, 2006, pp:422-434 [Conf]
  4. Lein Harn, Hung-Yu Lin
    On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:312-320 [Conf]
  5. Lein Harn, Shoubao Yang
    Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:133-142 [Conf]
  6. Lein Harn, Shoubao Yang
    Public-Key Cryptosystem Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:469-476 [Conf]
  7. Chi-Sung Laih, Lein Harn
    Generalized Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:159-166 [Conf]
  8. Chi-Sung Laih, Sung-Ming Yen, Lein Harn
    Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:450-459 [Conf]
  9. Hung-Yu Lin, Lein Harn
    A Generalized Secret Sharing Scheme With Cheater Detection. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:149-158 [Conf]
  10. Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Luo
    An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:309-314 [Conf]
  11. Lein Harn, Hung-Yu Lin
    An l-Span Generalized Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:558-565 [Conf]
  12. Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang
    Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:286-298 [Conf]
  13. Wen-Jung Hsin, Lein Harn
    The e-Traveler's Check. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2005, pp:59-65 [Conf]
  14. Lein Harn, David Huang, Chi-Sung Laih
    Password Authentication Based On Public-Key Distribution Cryptosystem. [Citation Graph (0, 1)][DBLP]
    ICDE, 1989, pp:332-338 [Conf]
  15. Jian Wang, Lein Harn, Hideki Imai
    Key Management for Multicast Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:191-204 [Conf]
  16. Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Chin-Hsing Chen
    A New Scheme for ID-Based Cryptosystems and Signature. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1989, pp:998-1002 [Conf]
  17. Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
    Storage-Optimal Key Sharing with Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:466-474 [Conf]
  18. Guang Gong, Lein Harn, Huapeng Wu
    The GH Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:284-300 [Conf]
  19. Dijiang Huang, Manish Mehta, Deep Medhi, Lein Harn
    Location-aware key management scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:29-42 [Conf]
  20. Hung-Yu Lin, Lein Harn
    Authentication Protocols for Personal Communication Systems. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1995, pp:256-261 [Conf]
  21. Lein Harn, Thomas Kiesler
    Authenticated Group Key Distribution Scheme for a Large Distributed Network. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:300-311 [Conf]
  22. Lein Harn, Wen-Jung Hsin
    On the security of wireless network access with enhancements. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:88-95 [Conf]
  23. Jian Ren, Lein Harn
    Ring Signature Based on ElGamal Signature. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:445-456 [Conf]
  24. Dijiang Huang, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory C. Beard, Lein Harn, Deep Medhi
    New architecture for intra-domain network security issues. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:11, pp:64-72 [Journal]
  25. Lein Harn, Hung-Yu Lin, Shoubao Yang
    A software authentication system for information integrity. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:8, pp:747-752 [Journal]
  26. Hung-Yu Lin, Lein Harn
    Fair Reconstruction of a Secret. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:55, n:1, pp:45-47 [Journal]
  27. Lein Harn, Thomas Kiesler
    An Efficient Probabilistic Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1990, v:34, n:3, pp:123-129 [Journal]
  28. Lein Harn, Shoubao Yang
    ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:757-760 [Journal]
  29. Guang Gong, Lein Harn
    Public-key cryptosystems based on cubic finite field extensions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2601-2605 [Journal]
  30. Lein Harn, David Huang
    A Protocol for Establishing Secure Communication Channels in a Large Network. [Citation Graph (0, 8)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1994, v:6, n:1, pp:188-191 [Journal]
  31. Chi-Sung Laih, Lein Harn, Jau-Yien Lee
    On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1989, v:15, n:9, pp:1135-1137 [Journal]
  32. Manish Mehta, Dijiang Huang, Lein Harn
    RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:193-197 [Conf]

  33. Information-theoretically Secure Strong Verifiable Secret Sharing. [Citation Graph (, )][DBLP]


  34. Ideal Perfect Multilevel Threshold Secret Sharing Scheme. [Citation Graph (, )][DBLP]


  35. An Improved Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (, )][DBLP]


  36. Efficient identity-based RSA multisignatures. [Citation Graph (, )][DBLP]


  37. A cryptographic key generation scheme for multilevel data security. [Citation Graph (, )][DBLP]


  38. Detection and identification of cheaters in ( t , n ) secret sharing scheme. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002