Lein Harn
Lein Harn
Professor of Computer Science Electrical Engineering, University of Missouri- Kansas City
Zweryfikowany adres z UMKC.EDU
TytułCytowane przezRok
Group-oriented (t, n) threshold digital signature scheme and digital multisignature
L Harn
IEE Proceedings-Computers and Digital Techniques 141 (5), 307-313, 1994
4041994
Location-aware key management scheme for wireless sensor networks
D Huang, M Mehta, D Medhi, L Harn
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
3172004
Efficient sharing (broadcasting) of multiple secrets
L Harn
IEE Proceedings-Computers and Digital Techniques 142 (3), 237-240, 1995
2311995
A cryptographic key generation scheme for multilevel data security
L Harn, HY Lin
Computers & Security 9 (6), 539-546, 1990
2281990
New digital signature scheme based on discrete logarithm
L Harn
Electronics letters 30 (5), 396-398, 1994
2051994
Design of generalised ElGamal type digital signature schemes based on discrete logarithm
L Harn, Y Xu
Electronics letters 30 (24), 2025-2026, 1994
1891994
Authenticated group key transfer protocol based on secret sharing
L Harn, C Lin
IEEE transactions on computers 59 (6), 842-846, 2010
1822010
Public-key cryptosystems based on cubic finite field extensions
G Gong, L Harn
IEEE Transactions on Information Theory 45 (7), 2601-2605, 1999
1441999
Public-key cryptosystem design based on factoring and discrete logarithms
L Harn
IEE Proceedings-Computers and Digital Techniques 141 (3), 193-195, 1994
1411994
Comment on" Multistage secret sharing based on one-way function"
L Harn
Electronics Letters 31 (4), 262, 1995
1061995
New scheme for digital multisignatures
L Harn, T Kiesler
Electronics letters 25 (15), 1002-1003, 1989
1021989
Strong (n, t, n) verifiable secret sharing scheme
L Harn, C Lin
Information Sciences 180 (16), 3059-3064, 2010
1012010
Group authentication
L Harn
IEEE Transactions on computers 62 (9), 1893-1898, 2012
942012
Authenticated key agreement without using one-way hash functions
L Harn, HY Lin
Electronics Letters 37 (10), 629-630, 2001
922001
Batch verifying multiple RSA digital signatures
L Harn
Electronics Letters 34 (12), 1219-1220, 1998
881998
Cryptanalysis of the blind signatures based on the discrete logarithm problem
L Harn
Electronics Letters 31 (14), 1136, 1995
851995
Authentication protocols for personal communication systems
HY Lin, L Harn
ACM SIGCOMM Computer Communication Review 25 (4), 256-261, 1995
811995
Detection and identification of cheaters in (t, n) secret sharing scheme
L Harn, C Lin
Designs, Codes and Cryptography 52 (1), 15-24, 2009
772009
Batch verifying multiple DSA-type digital signatures
L Harn
Electronics Letters 34 (9), 870-871, 1998
771998
A new threshold scheme and its application in designing the conference key distribution cryptosystem
CS Laih, JY Lee, L Harn
Information Processing Letters 32 (3), 95-99, 1989
761989
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20