Lein Harn

Orcid: 0000-0003-0922-6148

Affiliations:
  • University of Missouri-Kansas City, USA


According to our database1, Lein Harn authored at least 132 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones.
Comput. Networks, January, 2024

Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G.
Comput. J., 2024

2023
Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities.
Inf. Sci., November, 2023

Multiple Blind Signature for e-Voting and e-Cash.
Comput. J., October, 2023

Simple and efficient threshold changeable secret sharing.
J. Inf. Secur. Appl., September, 2023

A Lightweight and Robust Stream Cipher Based on PI for Intelligent Transportation Systems.
Wirel. Pers. Commun., June, 2023

Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT.
Wirel. Pers. Commun., April, 2023

Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks.
Comput. J., January, 2023

Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things.
IEEE Trans. Serv. Comput., 2023

A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments.
IEEE Trans. Dependable Secur. Comput., 2023

2022
General logic-operation-based lightweight group-key distribution schemes for Internet of Vehicles.
Veh. Commun., 2022

Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments.
J. Cloud Comput., 2022

Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs).
IET Commun., 2022

A novel threshold changeable secret sharing scheme.
Frontiers Comput. Sci., 2022

2021
Lightweight and flexible key distribution schemes for secure group communications.
Wirel. Networks, 2021

Lightweight Privacy-Preserving Data Sharing Scheme for Internet of Medical Things.
Wirel. Commun. Mob. Comput., 2021

PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks.
Secur. Commun. Networks, 2021

Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks.
Peer-to-Peer Netw. Appl., 2021

Design of ideal secret sharing based on new results on representable quadripartite matroids.
J. Inf. Secur. Appl., 2021

Non-interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks.
IET Commun., 2021

2020
UMKESS: user-oriented multi-group key establishments using secret sharing.
Wirel. Networks, 2020

Secret sharing with secure secret reconstruction.
Inf. Sci., 2020

Lightweight group key distribution schemes based on pre-shared pairwise keys.
IET Commun., 2020

Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir's SS for 5G Networks.
IEEE Access, 2020

A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test.
IEEE Access, 2020

Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN.
IEEE Access, 2020

2019
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN).
Secur. Commun. Networks, 2019

Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks.
IEEE Access, 2019

Provably Secure Group Authentication in the Asynchronous Communication Model.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Polynomial-based Lightweight Key Management in a Permissioned Blockchain.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange.
IEEE Syst. J., 2018

Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party.
Mob. Networks Appl., 2018

Hierarchical Polynomial-Based Key Management Scheme in Fog Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
A Novel Threshold Cryptography with Membership Authentication and Key Establishment.
Wirel. Pers. Commun., 2017

(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial.
Wirel. Pers. Commun., 2017

Computation-efficient key establishment in wireless group communications.
Wirel. Networks, 2017

How to Share Secret Efficiently over Networks.
Secur. Commun. Networks, 2017

A Novel Design of Membership Authentication and Group Key Establishment Protocol.
Secur. Commun. Networks, 2017

Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017

A Practical Hybrid Group Key Establishment for Secure Group Communications.
Comput. J., 2017

2016
Realizing secret sharing with general access structure.
Inf. Sci., 2016

Full-healing group-key distribution in online social networks.
Int. J. Secur. Networks, 2016

Threshold Signature Scheme without Using Polynomial Interpolation.
Int. J. Netw. Secur., 2016

2015
New Results on Ideal Multipartite Secret Sharing and its Applications to Group Communications.
Wirel. Pers. Commun., 2015

Conference key establishment protocol using a multivariate polynomial and its applications.
Secur. Commun. Networks, 2015

An image-based key agreement protocol using the morphing technique.
Multim. Tools Appl., 2015

Fair secret reconstruction in (t, n) secret sharing.
J. Inf. Secur. Appl., 2015

Dynamic threshold secret reconstruction and its application to the threshold cryptography.
Inf. Process. Lett., 2015

A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
Int. J. Commun. Syst., 2015

2014
An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs.
Wirel. Pers. Commun., 2014

Multipartite Secret Sharing Based on CRT.
Wirel. Pers. Commun., 2014

Simulatable and secure certificate-based threshold signature without pairings.
Secur. Commun. Networks, 2014

Secure universal designated verifier identity-based signcryption.
Secur. Commun. Networks, 2014

Verifiable secret sharing based on the Chinese remainder theorem.
Secur. Commun. Networks, 2014

Secure secret reconstruction and multi-secret sharing schemes with unconditional security.
Secur. Commun. Networks, 2014

Multilevel threshold secret sharing based on the Chinese Remainder Theorem.
Inf. Process. Lett., 2014

Weighted Secret Sharing Based on the Chinese Remainder Theorem.
Int. J. Netw. Secur., 2014

An authenticated group key distribution mechanism using theory of numbers.
Int. J. Commun. Syst., 2014

Comments on 'fair (t, n) threshold secret sharing scheme'.
IET Inf. Secur., 2014

Generalised cheater detection and identification.
IET Inf. Secur., 2014

Efficient group Diffie-Hellman key agreement protocols.
Comput. Electr. Eng., 2014

Group key distribution with full-healing property.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications.
IEEE Trans. Wirel. Commun., 2013

Group Authentication.
IEEE Trans. Computers, 2013

Verifiable symmetric polynomial-based key distribution schemes.
Secur. Commun. Networks, 2013

An Anonymous Multi-Receiver Encryption Based on RSA.
Int. J. Netw. Secur., 2013

An efficient group authentication for group communications.
CoRR, 2013

2012
$k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2012

Efficient (n, t, n) secret sharing schemes.
J. Syst. Softw., 2012

2011
Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications.
IEEE Trans. Wirel. Commun., 2011

Secure Key Transfer Protocol Based on Secret Sharing for Group Communications.
IEICE Trans. Inf. Syst., 2011

Fully Deniable Message Authentication Protocols Preserving Confidentiality.
Comput. J., 2011

Contract signature in e-commerce.
Comput. Electr. Eng., 2011

2010
Authenticated Group Key Transfer Protocol Based on Secret Sharing.
IEEE Trans. Computers, 2010

Strong (n, t, n) verifiable secret sharing scheme.
Inf. Sci., 2010

Distributed security for multi-agent systems - review and applications.
IET Inf. Secur., 2010

Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families.
Comput. J., 2010

Contract Signatures in E-Commerce Applications.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Design of DL-based certificateless digital signatures.
J. Syst. Softw., 2009

Hybrid Trust Structure in Self-Organizing Networks.
Int. J. Interdiscip. Telecommun. Netw., 2009

Efficient identity-based GQ multisignatures.
Int. J. Inf. Sec., 2009

Detection and identification of cheaters in ( <i>t</i> , <i>n</i> ) secret sharing scheme.
Des. Codes Cryptogr., 2009

Information-theoretically Secure Strong Verifiable Secret Sharing.
Proceedings of the SECRYPT 2009, 2009

Ideal Perfect Multilevel Threshold Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Generalized Ring Signatures.
IEEE Trans. Dependable Secur. Comput., 2008

Design of Fully Deniable Authentication Service for E-mail Applications.
IEEE Commun. Lett., 2008

Efficient identity-based RSA multisignatures.
Comput. Secur., 2008

An Improved Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Security in User-Assisted Communications.
Proceedings of the Wireless Telecommunications Symposium, 2007

2006
New architecture for intra-domain network security issues.
Commun. ACM, 2006

Ring Signature Based on ElGamal Signature.
Proceedings of the Wireless Algorithms, 2006

An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A Hierarchical Key Management Approach for Secure Multicast.
Proceedings of the Architecture of Computing Systems, 2006

2005
Improved DSA variant for batch verification.
Appl. Math. Comput., 2005

Storage-Optimal Key Sharing with Authentication in Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Key Management for Multicast Fingerprinting.
Proceedings of the Information Systems Security, First International Conference, 2005

The e-Traveler's Check.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Simple certified e-check with a partial PKI solution.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA).
IEEE Commun. Lett., 2004

Location-aware key management scheme for wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

2003
On the security of wireless network access with enhancements.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

2001
The GH Public-Key Cryptosystem.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

1999
Public-key cryptosystems based on cubic finite field extensions.
IEEE Trans. Inf. Theory, 1999

Authentication protocols with nonrepudiation services in personal communication systems.
IEEE Commun. Lett., 1999

1995
Fair Reconstruction of a Secret.
Inf. Process. Lett., 1995

Authentication Protocols for Personal Communication Systems.
Proceedings of the ACM SIGCOMM 1995 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, MA, USA, August 28, 1995

1994
A Protocol for Establishing Secure Communication Channels in a Large Network.
IEEE Trans. Knowl. Data Eng., 1994

1993
Key management for decentralized computer network services.
IEEE Trans. Commun., 1993

ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution.
IEEE J. Sel. Areas Commun., 1993

1992
A software authentication system for information integrity.
Comput. Secur., 1992

An l-Span Generalized Secret Sharing Scheme.
Proceedings of the Advances in Cryptology, 1992

Public-Key Cryptosystem Based on the Discrete Logarithm Problem.
Proceedings of the Advances in Cryptology, 1992

Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party.
Proceedings of the Advances in Cryptology, 1992

A Software Authentication System for the Prevention of Computer Viruses.
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992

1991
A Generalized Secret Sharing Scheme With Cheater Detection.
Proceedings of the Advances in Cryptology, 1991

Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
Proceedings of the Advances in Cryptology, 1991

Generalized Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1991

On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets.
Proceedings of the Advances in Cryptology, 1991

1990
An Efficient Probabilistic Encryption Scheme.
Inf. Process. Lett., 1990

A cryptographic key generation scheme for multilevel data security.
Comput. Secur., 1990

Entropy as a measure of database information.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial.
IEEE Trans. Software Eng., 1989

Linearly shift knapsack public-key cryptosystem.
IEEE J. Sel. Areas Commun., 1989

A new threshold scheme and its application in designing the conference key distribution cryptosystem.
Inf. Process. Lett., 1989

Authenticated Group Key Distribution Scheme for a Large Distributed Network.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

A New Scheme for ID-Based Cryptosystems and Signature.
Proceedings of the Proceedings IEEE INFOCOM '89, 1989

Password Authentication Based On Public-Key Distribution Cryptosystem.
Proceedings of the Fifth International Conference on Data Engineering, 1989

Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.
Proceedings of the Advances in Cryptology, 1989

Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

An extended cryptographic key generation scheme for multilevel data security.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

1988
A conference key distribution system based on the Lagrange interpolating polynomial.
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?, 1988


  Loading...