Lein Harn
Lein Harn
Professor of Computer Science Electrical Engineering, University of Missouri- Kansas City
Verified email at UMKC.EDU
Title
Cited by
Cited by
Year
Group-oriented (t, n) threshold digital signature scheme and digital multisignature
L Harn
IEE Proceedings-Computers and Digital Techniques 141 (5), 307-313, 1994
4961994
Location-aware key management scheme for wireless sensor networks
D Huang, M Mehta, D Medhi, L Harn
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
3302004
Efficient sharing (broadcasting) of multiple secrets
L Harn
IEE Proceedings-Computers and Digital Techniques 142 (3), 237-240, 1995
2471995
A cryptographic key generation scheme for multilevel data security
L Harn, HY Lin
Computers & Security 9 (6), 539-546, 1990
2301990
Authenticated group key transfer protocol based on secret sharing
L Harn, C Lin
IEEE transactions on computers 59 (6), 842-846, 2010
2152010
New digital signature scheme based on discrete logarithm
L Harn
Electronics letters 30 (5), 396-398, 1994
2111994
Design of generalised ElGamal type digital signature schemes based on discrete logarithm
L Harn, Y Xu
Electronics letters 30 (24), 2025-2026, 1994
2051994
Public-key cryptosystems based on cubic finite field extensions
G Gong, L Harn
IEEE Transactions on Information Theory 45 (7), 2601-2605, 1999
1471999
Public-key cryptosystem design based on factoring and discrete logarithms
L Harn
IEE Proceedings-Computers and Digital Techniques 141 (3), 193-195, 1994
1461994
Group authentication
L Harn
IEEE Transactions on computers 62 (9), 1893-1898, 2012
1252012
Comment on" Multistage secret sharing based on one-way function"
L Harn
Electronics Letters 31 (4), 262, 1995
1201995
Strong (n, t, n) verifiable secret sharing scheme
L Harn, C Lin
Information Sciences 180 (16), 3059-3064, 2010
1182010
New scheme for digital multisignatures
L Harn, T Kiesler
Electronics letters 25 (15), 1002-1003, 1989
1071989
Detection and identification of cheaters in (t, n) secret sharing scheme
L Harn, C Lin
Designs, Codes and Cryptography 52 (1), 15-24, 2009
992009
Authenticated key agreement without using one-way hash functions
L Harn, HY Lin
Electronics Letters 37 (10), 629-630, 2001
992001
Batch verifying multiple RSA digital signatures
L Harn
Electronics Letters 34 (12), 1219-1220, 1998
981998
Dynamic threshold scheme based on the definition of cross-product in an n-dimensional linear space
CS Laih, L Harn, JY Lee, T Hwang
Conference on the Theory and Application of Cryptology, 286-298, 1989
961989
Cryptanalysis of the blind signatures based on the discrete logarithm problem
L Harn
Electronics Letters 31 (14), 1136, 1995
901995
Steganography and authentication in image sharing without parity bits
CN Yang, JF Ouyang, L Harn
Optics Communications 285 (7), 1725-1735, 2012
892012
Authentication protocols for personal communication systems
HY Lin, L Harn
ACM SIGCOMM Computer Communication Review 25 (4), 256-261, 1995
861995
The system can't perform the operation now. Try again later.
Articles 1–20