Lein Harn
Orcid: 0000-0003-0922-6148Affiliations:
- University of Missouri-Kansas City, USA
According to our database1,
Lein Harn
authored at least 135 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones.
Cybersecur., December, 2024
Efficient and Privacy-Preserving Skyline Queries Over Encrypted Data Under a Blockchain-Based Audit Architecture.
IEEE Trans. Knowl. Data Eng., September, 2024
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones.
Comput. Networks, January, 2024
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G.
Comput. J., 2024
2023
Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities.
Inf. Sci., November, 2023
J. Inf. Secur. Appl., September, 2023
A Lightweight and Robust Stream Cipher Based on PI for Intelligent Transportation Systems.
Wirel. Pers. Commun., June, 2023
Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT.
Wirel. Pers. Commun., April, 2023
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks.
Comput. J., January, 2023
Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things.
IEEE Trans. Serv. Comput., 2023
A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments.
IEEE Trans. Dependable Secur. Comput., 2023
Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
General logic-operation-based lightweight group-key distribution schemes for Internet of Vehicles.
Veh. Commun., 2022
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments.
J. Cloud Comput., 2022
Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs).
IET Commun., 2022
2021
Wirel. Networks, 2021
Wirel. Commun. Mob. Comput., 2021
Secur. Commun. Networks, 2021
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks.
Peer-to-Peer Netw. Appl., 2021
Design of ideal secret sharing based on new results on representable quadripartite matroids.
J. Inf. Secur. Appl., 2021
Non-interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks.
IET Commun., 2021
2020
Wirel. Networks, 2020
IET Commun., 2020
Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir's SS for 5G Networks.
IEEE Access, 2020
A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test.
IEEE Access, 2020
Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN.
IEEE Access, 2020
2019
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN).
Secur. Commun. Networks, 2019
Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks.
IEEE Access, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
IEEE Syst. J., 2018
Mob. Networks Appl., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Wirel. Networks, 2017
Secur. Commun. Networks, 2017
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017
Comput. J., 2017
2016
Int. J. Secur. Networks, 2016
Int. J. Netw. Secur., 2016
2015
New Results on Ideal Multipartite Secret Sharing and its Applications to Group Communications.
Wirel. Pers. Commun., 2015
Conference key establishment protocol using a multivariate polynomial and its applications.
Secur. Commun. Networks, 2015
Multim. Tools Appl., 2015
Dynamic threshold secret reconstruction and its application to the threshold cryptography.
Inf. Process. Lett., 2015
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
Int. J. Commun. Syst., 2015
2014
Wirel. Pers. Commun., 2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Secure secret reconstruction and multi-secret sharing schemes with unconditional security.
Secur. Commun. Networks, 2014
Inf. Process. Lett., 2014
Int. J. Netw. Secur., 2014
Int. J. Commun. Syst., 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
2013
An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications.
IEEE Trans. Wirel. Commun., 2013
Secur. Commun. Networks, 2013
2012
IEEE Trans. Circuits Syst. Video Technol., 2012
2011
Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications.
IEEE Trans. Wirel. Commun., 2011
IEICE Trans. Inf. Syst., 2011
Comput. J., 2011
2010
IEEE Trans. Computers, 2010
IET Inf. Secur., 2010
Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families.
Comput. J., 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
Int. J. Interdiscip. Telecommun. Netw., 2009
Detection and identification of cheaters in ( <i>t</i> , <i>n</i> ) secret sharing scheme.
Des. Codes Cryptogr., 2009
Information-theoretically Secure Strong Verifiable Secret Sharing.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
IEEE Commun. Lett., 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Proceedings of the Wireless Telecommunications Symposium, 2007
2006
Proceedings of the Wireless Algorithms, 2006
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006
Proceedings of the Architecture of Computing Systems, 2006
2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
The e-Traveler's Check.
Proceedings of The 2005 International Conference on Internet Computing, 2005
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
2004
IEEE Commun. Lett., 2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
2003
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
1999
IEEE Trans. Inf. Theory, 1999
Authentication protocols with nonrepudiation services in personal communication systems.
IEEE Commun. Lett., 1999
1995
Proceedings of the ACM SIGCOMM 1995 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, MA, USA, August 28, 1995
1994
IEEE Trans. Knowl. Data Eng., 1994
1993
IEEE Trans. Commun., 1993
ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution.
IEEE J. Sel. Areas Commun., 1993
1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party.
Proceedings of the Advances in Cryptology, 1992
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992
1991
Proceedings of the Advances in Cryptology, 1991
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Comput. Secur., 1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial.
IEEE Trans. Software Eng., 1989
A new threshold scheme and its application in designing the conference key distribution cryptosystem.
Inf. Process. Lett., 1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
Proceedings of the Proceedings IEEE INFOCOM '89, 1989
Proceedings of the Fifth International Conference on Data Engineering, 1989
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.
Proceedings of the Advances in Cryptology, 1989
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
1988
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?, 1988