Group-oriented (t, n) threshold digital signature scheme and digital multisignature L Harn IEE Proceedings-Computers and Digital Techniques 141 (5), 307-313, 1994 | 467 | 1994 |
Location-aware key management scheme for wireless sensor networks D Huang, M Mehta, D Medhi, L Harn Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004 | 341 | 2004 |
Efficient sharing (broadcasting) of multiple secrets L Harn IEE Proceedings-Computers and Digital Techniques 142 (3), 237, 1995 | 260 | 1995 |
Authenticated group key transfer protocol based on secret sharing L Harn, C Lin IEEE transactions on computers 59 (6), 842-846, 2010 | 236 | 2010 |
A cryptographic key generation scheme for multilevel data security L Harn, HY Lin Computers & Security 9 (6), 539-546, 1990 | 235 | 1990 |
Design of generalised ElGamal type digital signature schemes based on discrete logarithm L Harn, Y Xu Electronics letters 30 (24), 2025-2026, 1994 | 218 | 1994 |
New digital signature scheme based on discrete logarithm L Harn Electronics letters 30 (5), 396-398, 1994 | 218 | 1994 |
Group authentication L Harn IEEE Transactions on computers 62 (9), 1893-1898, 2012 | 167 | 2012 |
Public-key cryptosystems based on cubic finite field extensions G Gong, L Harn IEEE Transactions on Information Theory 45 (7), 2601-2605, 1999 | 160 | 1999 |
Public-key cryptosystem design based on factoring and discrete logarithms L Harn IEE Proceedings-Computers and Digital Techniques 141 (3), 193-195, 1994 | 153 | 1994 |
Strong (n, t, n) verifiable secret sharing scheme L Harn, C Lin Information Sciences 180 (16), 3059-3064, 2010 | 135 | 2010 |
Comment: Multistage secret sharing based on one-way function L Harn Electron. Lett. 31 (4), 262, 1995 | 126 | 1995 |
Detection and identification of cheaters in (t, n) secret sharing scheme L Harn, C Lin Designs, Codes and Cryptography 52, 15-24, 2009 | 124 | 2009 |
New scheme for digital multisignatures L Harn, T Kiesler Electronics letters 25 (15), 1002-1003, 1989 | 117 | 1989 |
Generalized digital certificate for user authentication and key establishment for secure communications L Harn, J Ren IEEE Transactions on Wireless Communications 10 (7), 2372-2379, 2011 | 113 | 2011 |
Authenticated key agreement without using one-way hash functions L Harn, HY Lin Electronics Letters 37 (10), 629-630, 2001 | 107 | 2001 |
Steganography and authentication in image sharing without parity bits CN Yang, JF Ouyang, L Harn Optics Communications 285 (7), 1725-1735, 2012 | 106 | 2012 |
Batch verifying multiple RSA digital signatures L Harn Electronics Letters 34 (12), 1219-1220, 1998 | 103 | 1998 |
Dynamic threshold scheme based on the definition of cross-product in an n-dimensional linear space CS Laih, L Harn, JY Lee, T Hwang Advances in Cryptology—CRYPTO’89 Proceedings 9, 286-298, 1990 | 97 | 1990 |
Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA) L Harn, M Mehta, WJ Hsin IEEE communications letters 8 (3), 198-200, 2004 | 96 | 2004 |