Search the dblp DataBase
Lein Harn :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Wen-Jung Hsin , Lein Harn Simple certified e-check with a partial PKI solution. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference (2), 2005, pp:185-190 [Conf ] Lein Harn , Hung-Yu Lin , Shoubao Yang A Software Authentication System for the Prevention of Computer Viruses. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1992, pp:447-450 [Conf ] Jian Wang , Miodrag J. Mihaljevic , Lein Harn , Hideki Imai A Hierarchical Key Management Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP ] ARCS, 2006, pp:422-434 [Conf ] Lein Harn , Hung-Yu Lin On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:312-320 [Conf ] Lein Harn , Shoubao Yang Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:133-142 [Conf ] Lein Harn , Shoubao Yang Public-Key Cryptosystem Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:469-476 [Conf ] Chi-Sung Laih , Lein Harn Generalized Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:159-166 [Conf ] Chi-Sung Laih , Sung-Ming Yen , Lein Harn Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:450-459 [Conf ] Hung-Yu Lin , Lein Harn A Generalized Secret Sharing Scheme With Cheater Detection. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:149-158 [Conf ] Darren Xu , Lein Harn , Mayur Narasimhan , Junzhou Luo An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:309-314 [Conf ] Lein Harn , Hung-Yu Lin An l-Span Generalized Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:558-565 [Conf ] Chi-Sung Laih , Lein Harn , Jau-Yien Lee , Tzonelih Hwang Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:286-298 [Conf ] Wen-Jung Hsin , Lein Harn The e-Traveler's Check. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2005, pp:59-65 [Conf ] Lein Harn , David Huang , Chi-Sung Laih Password Authentication Based On Public-Key Distribution Cryptosystem. [Citation Graph (0, 1)][DBLP ] ICDE, 1989, pp:332-338 [Conf ] Jian Wang , Lein Harn , Hideki Imai Key Management for Multicast Fingerprinting. [Citation Graph (0, 0)][DBLP ] ICISS, 2005, pp:191-204 [Conf ] Chi-Sung Laih , Jau-Yien Lee , Lein Harn , Chin-Hsing Chen A New Scheme for ID-Based Cryptosystems and Signature. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1989, pp:998-1002 [Conf ] Jian Wang , Zhengyou Xia , Lein Harn , Guihai Chen Storage-Optimal Key Sharing with Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:466-474 [Conf ] Guang Gong , Lein Harn , Huapeng Wu The GH Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:284-300 [Conf ] Dijiang Huang , Manish Mehta , Deep Medhi , Lein Harn Location-aware key management scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SASN, 2004, pp:29-42 [Conf ] Hung-Yu Lin , Lein Harn Authentication Protocols for Personal Communication Systems. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1995, pp:256-261 [Conf ] Lein Harn , Thomas Kiesler Authenticated Group Key Distribution Scheme for a Large Distributed Network. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:300-311 [Conf ] Lein Harn , Wen-Jung Hsin On the security of wireless network access with enhancements. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2003, pp:88-95 [Conf ] Jian Ren , Lein Harn Ring Signature Based on ElGamal Signature. [Citation Graph (0, 0)][DBLP ] WASA, 2006, pp:445-456 [Conf ] Dijiang Huang , Qing Cao , Amit Sinha , Marc J. Schniederjans , Cory C. Beard , Lein Harn , Deep Medhi New architecture for intra-domain network security issues. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:11, pp:64-72 [Journal ] Lein Harn , Hung-Yu Lin , Shoubao Yang A software authentication system for information integrity. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:8, pp:747-752 [Journal ] Hung-Yu Lin , Lein Harn Fair Reconstruction of a Secret. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:55, n:1, pp:45-47 [Journal ] Lein Harn , Thomas Kiesler An Efficient Probabilistic Encryption Scheme. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1990, v:34, n:3, pp:123-129 [Journal ] Lein Harn , Shoubao Yang ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:757-760 [Journal ] Guang Gong , Lein Harn Public-key cryptosystems based on cubic finite field extensions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2601-2605 [Journal ] Lein Harn , David Huang A Protocol for Establishing Secure Communication Channels in a Large Network. [Citation Graph (0, 8)][DBLP ] IEEE Trans. Knowl. Data Eng., 1994, v:6, n:1, pp:188-191 [Journal ] Chi-Sung Laih , Lein Harn , Jau-Yien Lee On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:9, pp:1135-1137 [Journal ] Manish Mehta , Dijiang Huang , Lein Harn RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks. [Citation Graph (0, 0)][DBLP ] IPCCC, 2005, pp:193-197 [Conf ] Information-theoretically Secure Strong Verifiable Secret Sharing. [Citation Graph (, )][DBLP ] Ideal Perfect Multilevel Threshold Secret Sharing Scheme. [Citation Graph (, )][DBLP ] An Improved Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (, )][DBLP ] Efficient identity-based RSA multisignatures. [Citation Graph (, )][DBLP ] A cryptographic key generation scheme for multilevel data security. [Citation Graph (, )][DBLP ] Detection and identification of cheaters in ( t , n ) secret sharing scheme. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.005secs