|
BOOKS
- C. S. LAIH, L. HARN and C. C.
CHANG, Contemporary Cryptography and its Applications, Published by the Unalis Corporation, Taiwan, Aug. 1995. (Also
available in simplified Chinese characters, Defense Industrial Publish
Company, July, 2001).
- C. S. LAIH, and L. HARN, The
Internet Security: PGP Principle, Installation and Operation,Published by Information and Computer Publisher,Taiwan,July 1997.
- W. J. HSIN and L. HARN, “Offline/Online Security in Mobile Ad Hoc Networks”, book Chapter
9 in Theory and Practice of
Cryptography Solutions for Secure Information Systems, ISBN
13: 9781466640306,
pp. 199-222, published by IGI Global, 2013. http://www.igi-global.com/book/theory-practice-cryptography-solutions-secure/73568?camid=3v6Vol. 11, Nos. 1/2, 2016
JOURNALS
2017:
1. L.
HARN and C. F. XU, "A
Practical hybrid group key establishment for secure group communications,"
Accepted by the Computer Journal.
2. L.
HARN and C. F. XU, "A
novel threshold cryptography with membership authentication and key
establishment," accepted by Wireless Personal
Communications,
3. L. HARN and C. F. XU, "A
novel design of membership authentication and
group key establishment protocol,"
Security and Communication Networks, 2017..
4. L. HARN and C.
F. XU, Z. Xia and J. Zhou, "How to share
secret efficiently over networks," Security and Communication
Networks, 2017.
5. O. RUAN, Y. ZHANG, M. ZHANG, J. ZHOUu, and
L. HARN, "After-the-fact leakage-resilient
identity-based authenticated key exchange," IEEE System
Journal. 2017.
2016:
1.
.Y. N.
LIU, L. HARN, L. MAO, Z. XIONG,
'Full-healing group-key distribution in online social networks,"
International Journal of Security and Networks, vol. 11, nos. 1/2,
pp. 12-24, 2016.
2. L. HARN and C. F. XU, O. Ruan, and M.-Y. Zhang "Novel
design of secure end-to-end routing protocol in wireless sensor networks,"
IEEE Sensors Journal, Vol. 16, No. 6, pp. 1779-1785, 2016.
3. C.. F. XU, L. HARN, T. HE and M. ZHANG, "Efficient
group key transfer protocol for WSNs,"
IEEE Sensors Journal, Vol. 16, No. 11, pp. 4515-4520, 2016.
4. L. HARN and C. F. XU, M. ZHANG, T. HE and
M. ZHANG, "Realizing secret sharing with
general access structure,"
Information Science, Vol. 367-368, pp. 209-220, 2016.
5.
L.
HARN and F. WANG, "Threshold
signature scheme without using polynomial interpolation”,
International Journal of Network Security, Vol.18, No.4,
pp.710-717, July 2016.
6. C.. F. XU, L. HARN, Y. MU, M. ZHANG and X.
ZHU, "Computation-efficient
key establishment in wireless group communications
,"
Wireless Networks, online Feb. 2016.
7. L. HARN and C. F. XU, "Centralized group key
establishment protocol without mutually trusted party," Mobile
Networks and Applications,
DOI:
10.1007/s11036-016-0776-7,
8. L. HARN and C. F. XU, "(t, n)
multi-secret sharing scheme based on bivariate polynomial," Wireless
Personal Communications, DOI 10.1007/s11277-016-3862-z.
2015:
1. L. HARN and G. GONG, “Conference Key Establishment Protocol using a
Multivariate Polynomial and Its Applications”,
Security and Communication Networks,
vol. 8, pp. 1794-1800, 2015.
2.
C. F. HSU, S. WU, L. HARN, "New results on ideal
multipartite secret sharing and its applications to group communications",
Wireless Personal Communications, May
vol. 82,
Issu 1, pp 283-292, May 2015.
3.
L. HARN and C. F. XU, "Predistribution
scheme for establishing group keys in wireless wensor networks,"
IEEE Sensors Journal, Vol. 15, No. 9, pp. 5103-5108,
September 2015.
4. L. HARN, C. LIN and Y. LI, "Fair
secret reconstruction in (t, n) secret sharing ," Journal of
Information Security and Applications, Vol. 23, pp. 1-7, 2015.
5. L. HARN and C. F. XU, "Dynamic
threshold secret reconstruction and its application to the threshold
cryptography," Information Processing Letters,
115, pp.851-857r 2015.
2014:
1. L. HARN
and C. LIN, “Asynchronous Secret Reconstruction and Its
Application to the Threshold Cryptography”, International Journal of Communications, Network and System Sciences
(IJCNS), Vol. 7, pp. 22-29, 2014.
2. C. –C.
CHANG, L. HARN and T. F. CHENG, “Notes on
“Polynomial-Based Key Management for Secure Intra-Group and Inter-Group
Communication”, International Journal of Network Security, Vol.16,
No.2, PP.143-148, Mar. 2014.
3.
Y. LIU, L. HARN and C. –C. CHANG, “A Novel Verifiable Secret
Sharing Mechanism Using Theory of Numbers and a Method for Sharing Secrets”, International Journal of Communication Systems,
28, pp. 1282–1292, 2014.
4.
C.-F. HSU, L. HARN and G. CUI, “Multipartite
Secret Sharing Based on CRT”, Wireless
Personal Communication, Springer,78, pp. 271-282, 2014.
5. L. HARN and F. MIAO, “Multilevel Threshold Secret Sharing Based on the
Chinese Remainder Theorem”, Information
Processing Letters, Vol. 114, Iss. 9, Pages 504-509, 2014.
6. L. HARN, “Generalized
Cheater Detection and Identification”, IET Information Security, Vol. 8, Iss.
3, pp. 171–178,
2014.
7. L. HARN and C. LIN, “Efficient Group Diffie-Hellman Key Agreement
Protocols”, Computers and
Electrical Engineering, 40, pp.1972–1980, 2014.
8. L. HARN, “Secure
Secret Reconstruction and Multi-Secret Sharing Schemes with Unconditional
Security”, Security and Communication
Networks, Vol. 7, Iss.
3, pp. 567-573, 2014.
9. F. WANG, C. –C. CHANG and L. HARN, “Simulatable
and Secure Certificate-based Threshold Signature without Pairings”, Security and
Communication Networks, Vol. 7, Iss. 11, pp. 2094-2103,Nov. 2014.
2013:
1. J. REN and L. HARN, “An Efficient Threshold Anonymous Authentication
Scheme for Privacy-Preserving Communications”, IEEE Trans. ON Wireless Commu., Vol.
12(3), pp. 1018-1025, March 2013.
2. L. HARN, “Group
Authentication”, IEEE Trans. on Computers. vol. 62, no. 9, pp. 1893-1898,
2013.
3. L. HARN, F.
MIAO and C. C. CHANG, “Verifiable Secret Sharing based on the Chinese Remainder Theorem”,
Security and Communication Networks, will be
published in 2013.
4. L. HARN and C. LIN, “An Extension of Harn-Lin’s Cheater Detection and
Identification”, Advances in
Intelligent Systems and Applications, vol. 2, pp. 25-32, 2013
5. L. HARN and C. LIN, “An Efficient Group Authentication for Group
Communications”, International
Journal of Computer Networks & Communications (IJCNC), vol..5, no.3,pp. 9-16, 2013.
6. L. HARN, C.- C. CHANG, and H.-L. WU, “An Anonymous Multi-Receiver Encryption Based on RSA”,
Journal of Network Security, Vol.15, No.4, PP.307-312, July 2013.
7. Y. LIU, L. HARN and C.- C. CHANG, “An Authenticated Group
Key Distribution Mechanism Using Theory of Numbers”, International Journal of Communication Systems, will be published
in 2013.
8. C. LIN,
F. TANG, P. Ke, L. HARN and and
S. ZHANG, “Secure Universal Designated Verifier Identity-based Signcryption”, Security and Communication Networks, Published online in Wiley Online Library in June, 2013.
9. L. HARN,
“Comments on “Fair (t, n) Threshold Secret Sharing Scheme”, IET Information Security, accepted in 2013.
10. L. HARN
and F. MIAO, “Weighted Secret Sharing Based on the Chinese
Remainder Theorem”,
International
Journal of Network Security, accepted in 2013.
11. C.-F. HSU, L. HARN and G. CUI, “An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs”, Wireless
Personal Communication, Springer, accepted in 2013.
12.
Y. –X. LIU, Y. ZHANG, L. HARN and Y. HU, “Verifiable Symmetric Polynomial-based Key
Distribution Schemes”, Security
and Communication Networks, Vol. 6(8), pp 1028-1034, Aug. 2013.
13. Q. MAO, C.-C. CHANG, L.
HARN and S. -H. CHANG, "An Image-Based Key Agreement Protocol Using the
Morphing Technique", Multimedia Tools and Applications, accepted
in 2013.
2012:
1. C.-N. YANG, H.-W. SHIH,
C.-C. WU, and L. HARN, “k out of n Region
Incrementing Scheme in Visual Cryptography”, IEEE Trans. on Circuits and
Systems for Video Technology, Vol. 22(5), pp. 799-810, May 2012.
2. C.-N. YANG, J. F.
OUYANG, L. HARN, “Steganography and
Authentication in Image Sharing without Parity Bits”, Optics Communications, Vol. 285, Issue
7, pp. 1725-1735, April 2012.
3. Y. -X. LIU, L. HARN,
C.-N. YANG, Y.-C. ZHAMG, “Efficient (n, t, n)
Secret Sharing Schemes”, The
Journal of Systems and Software, Vol. 85, pp. 1325–
1332, 2012.
2011:
1.
L. HARN and J. REN, “Generalized Digital Certificate
for User Authentication and Key Establishment for Secure Communications”, IEEE Trans. on Wireless Communications, Vol. 10, NO. 7, pp.
2372-3279, July 2011
2. L. Harn1, C.-Y. LEE,
C. LIN and C.-C. CHANG, “Fully Deniable Message
Authentication Protocols Preserving Confidentiality”, The Computer Journal, Vol. 54, No. 10, pp. 1688-1699., 2011.
3. L. Harn1, C. H. LIN, “Contract Signature in e-Commerce”, Computers and Electrical Engineering, 37, pp.
169-173, 2011.
4. C.-Y. LEE, Z. -H. WANG, L. HARN and C.-C. CHANG, “Secure Key Transfer Protocol Based On Secret Sharing
For Group Communications”, IEICE Trans.
on Inf. & Syst., Vol. E94-D, No. 11, pp. 2069-2076, Nov. 2011.
2010:
- L. HARN and C. LIN, “Authenticated Group Key Transfer Protocol
Based on Secret Sharing”,
IEEE Trans. on Computers, Vol.
59, NO. 6, pp. 842-846, June 2010.
- L. HARN and C. LIN,
“Strong (n, t, n) Verifiable Secret Sharing
Scheme”, Information
Sciences, Vol. 180, Issue 16, pp.
3059-3064, Aug. 2010.
- H..F. ASHVAND, K. SALAH, J. M. A.
CALERO, L. HARN, .”Distributed Security
for Multi-Agent Systems –Review and Applications”, Special Issue on Multi-Agent &
Distributed Information Security, IET Inf. Security, Vol. 4, Issue 4, pp. 188–201, 2010.
- H..F. ASHVAND, L. HARN, J. H. PARK,
K. SALAH, ”Editorial Multi-Agent & Distributed Information Security”, Special Issue on Multi-Agent & Distributed Information
Security, IET Inf. Security,
Vol. 4, Issue 4, pp. 185-187, 2010.
2009:
1. T. ZHOU and L. HARN, “Hybrid
Trust Structure In Self-Organizing Networks”, International Journal of Interdisciplinary Telecommunications
and Networking (IJITN), Vol. 1, Issue 2, pp. 1-15. 2009.
2. L.HARN and J.REN, and C.LIN, “Efficient
Identity-Based GQ Multisignatures”, International Journal of Information
Security, Vol. 8, Issue 3, pp. 205-210, 2009.
3. L. HARN and J. REN,
and C. LIN, “Design of DL-Based Certificateless Digital
Signatures”, Journal of
Systems and Software, vol. 82, Issue 5, ,pp,
789-793, , May 2009.
4. L. HARN and C. LIN,
“Detection and Identification of Cheaters in Secret Reconstruction",Designs, Code and Cryptography, Vol. 52, no. 1, pp.
15-24, 2009.
5. L.HARN
, W.J.HSIN and C.LIN, "Efficient On-line/Off-line Signaturepapers Schemes Based on Multiple -Collision Trapdoor Hash Families", The
Computer Journal,
Vol. 53, No. 9, pp. 1478-1484, 2009.
2008:
- L. HARN and J. REN, “Design of Fully Deniable Authentication
Service for E-Mail Applications”, IEEE
Communication Letters, Vol. 12, No. 3, pp. 219-221, March
2008.
- J. REN and L. HARN, “Generalized Ring Signatures”, IEEE Trans. on Dependable and Secure Computing,
Vol. 5, No. 3, pp. 155-163, July-Sep. 2008.
- L. HARN and J. REN, “Efficient Identity-Based RSA Multisignatures”,
Computers &
Security, Vol. 27, pp. 1 2– 1 5, 2008.
2006:
- C.-H. LIN,
R.-H. HSU and L. HARN, “Improved DSA variant for batch verification”, Applied Mathematics and
Computation, Elsevier, 169 (1), pp. 75-81, 2006.
- D. HUANG, Q. CAO, A. SINHA, M. J.
SCHNIEDERJANS, C. BEARD, L. HARN, and D. MEDHI " New Architecture for Intra-Domain Network", Communications of the ACM,
Vol. 49 , Issue 11, pp. 64 - 72, Nov.2006.
2005:
- L. HARN, W. –J. HSIN and M.
MANISH, “Authenticated Diffie-Hellman key agreement protocol using single
cryptographic assumption”,
IEE Proceedings
Communications, Vol. 152, No. 4, pp. 404-410, Aug 2005.
- M.MEHTA and L.HARN, “Efficient One-time Proxy Signatures”, IEE Proceedings Communications, Vol.
152, No. 2, pp. 129-133, April 2005.
2004:
- L. HARN, M. MANISH and W. –J.
HSIN, “Integrate Diffie-Hellman Key
Exchange into the Digital Signature Algorithm (DSA)”, IEEE Communication Letters, Vol. 8, No.
3, pp. 198-200, March 2004.
- L. HARN, C. Y. LIN and T. –C. WU,
“Structured Multisignature Algorithms”, IEE Proceedings- Computers & Digital
Techniques, Vol. 151, No. 2, pp. 231-234, May 2004.
2001:
- L. HARN, H. Y. LIN, “Authenticated Key Agreement without using
One-Way Hash Functions”, Electronics Letters, Vol. 37, No 10, pp.
629-630, May 2001.
- L. HARN, H. Y. LIN, “A Non-Repudiation Metering Scheme”, IEEE Communications
Letters, Vol. 5, No. 12, pp. 486-487, Dec. 2001.
2000:
- L. HARN, H. Y. LIN. and G. GONG,
"Bounded-to-unbounded Poker Game”, Electronics Letters, Vol. 36, No. 3, pp.
214-215, Feb. 2000.
1999:
- G. GONG and L. HARN, “Public-Key Cryptosystems Based on Cubic
Finite Field Extensions”, IEEE
Trans. On Information Theory, Vol. 45, Issue 6, Sep. 1999.
- L. HARN, Digital Multisignature
with Distinguished Signing Authorities”, Electronics Letters, Vol. 35, No. 4, pp.
294-295, Feb. 18, 1999.
- H. Y. LIN and L. HARN, “Authentication Protocols with Nonrepudiation
Services in Personal Communication Systems”, IEEE Communications Letters, Vol. 3,
Number 8, pp. 236-238, Aug. 1999.
1998:
- L. HARN, "Batch Verifying Multiple DSA-Type Digital
Signatures”, Electronics
Letters, Vol.34, No. 9, pp. 870-871, April, 1998.
- L. HARN, "Batch Verifying RSA Signatures”, Electronics Letters,
Vol. 34, No. 12, pp. 1219-1220, June, 1998.
1997:
- L. HARN, "Digital Signatures for Diffie-Hellman Public
Keys Without Using a One-Way Function", Electronics Letters,
Vol. 33, No. 2, pp. 125-126, Jan. 1997.
- L. HARN and G. GONG, “Broadband Subliminal Channel”, IEE Proc.-Comput.
Digit. Tech., Vol. 6, Nov. 1997, pp. 387-389.
1996:
- L.
HARN, "Reply: Comment Public-Key Cryptosystem Design Based on
Factoring and Discrete Logarithms", IEE Proceedings - Computers and Digital Techniques,
Vol. 143, No.1, p. 96, Jan. 1996.
1995:
- L. HARN, "Efficient Sharing (Broadcasting) of Multiple
Secrets", IEE
Proceedings - Computers and Digital Techniques, Vol. 142,
No. 3, pp. 237-240, May 1995.
- L. HARN, " ared VerificReply: Digital
Signature with (t, n) Shation based on
Discrete Logarithms", Electronics
Letters, Vol. 31, No. 3, p. 177, Jan. 1995.
- L. HARN, "Comment Multistage Secret Sharing Based on
One-Way Function”, Electronics
Letters, Vol. 31, No. 4, p. 262, Feb. 1995.
- L. HARN, "DSA Type Secure Interactive Batch
Verification Protocols", Electronics
Letters, Vol. 31, No. 4, p. 257, Feb. 1995.
- L. HARN, "Modified Key Agreement Protocol Based On The Digital Signature Standard", Electronics Letters,
Vol. 31, No. 6, pp. 448-449, March 1995.
- H. Y. LIN and L. HARN, "Fair Reconstruction of a Secret", Information Processing Letters, 55,
pp. 45-47, 1995.
- L. HARN, "Comments on
Enhancing the Security of ElGamal's Signature
Scheme", IEE
Proceedings - Computers and Digital Techniques, Vol. 142,
No. 5, p. 376, Sep. 1995.
- L. HARN, "Cryptanalysis of the Blind Signature Based
on the Discrete Logarithm", Electronics
Letters, Vol. 31, No. 14, p. 1136, July, 1995.
1994:
- L. HARN and D. HWANG, "A Protocol for Establishing Secure Communication
Channels in a Large Network", IEEE Trans. on Knowledge and Data
Engineering, Vol. 6, No. 1, pp. 188-191, Feb. 1994.
- L. HARN, H. Y. LIN and S. YANG, “Threshold Cryptosystem with Multiple Secret
Sharing Policies", IEE
Proceedings- Computers and Digital Techniques, Vol. 141, No.
2, pp. 142-144, March 1994.
- L. HARN, "Public-Key Cryptosystem Design Based on
Factoring and Discrete Logarithms", IEE Proceedings-Computers and Digital Techniques,
Vol. 141, No. 3, pp. 193-195, May, 1994.
- L. HARN, "A New Digital Signature Based on the
Discrete Logarithm”, Electronics
Letters, Vol. 30, No. 5, pp. 396-398, March 1994.
- L. HARN, "Group-Oriented (t, n) Threshold Signature
and Multisignature", IEE Proceedings-Computers and
Digital Techniques, Vol. 141, No. 5, pp. 307-313, Sep. 1994.
- L. HARN, H. Y. LIN and Y. XU,
“Cryptography for PC/Workstation Security", ACM SIGICE Bulletin,
Vol. 20, No. 1, pp. 21-26, July 1994 (invited paper).
- L. HARN and Y. XU, "On the Design of Generalized ElGamal Type
Digital Signature Schemes Based On the Discrete Logarithm", Electronics Letters,
Vol. 30, No. 24, pp. 2025-2026, Nov. 1994.
1993:
- L. HARN and H. Y. LIN, "Key Management for Decentralized Computer Network
Services", IEEE
Trans. on Communications, Vol. 41, No. 12, pp. 1777-1779,
Dec. 1993.
- L. HARN and S. YANG, "ID-Based Cryptographic Schemes for User
Identification, Digital Signature, and Key Distribution", IEEE Journal on Selected Areas in
Communications, Vol. 11, No. 5, pp. 757-760, June 1993.
- L. HARN, "Digital Signature with (t, n) Shared
Verification based on Discrete Logarithms", Electronics Letters,
Vol. 29, No. 24, pp., Nov. 25, 1993.
1992:
- L. HARN and D. C. WANG, "Cryptanalysis and Modification of Digital
Signature Scheme Based on Error- Correcting Code", Electronics Letters,
Vol. 28, No. 2, pp. 157-159, Jan. 1992.
- L. HARN and H. Y. LIN, "The Integration of User Authentication and
Access Control", IEE
Proceedings E, Vol. 139, No. 2, pp. 139-143,March 1992.
- T. KIESLER and L. HARN, "A Cryptographic Master Key Generation Scheme
and Its Application to Public Key Distribution", IEE
Proceedings-E, Vol.
139, No. 3, pp. 203-206, May 1992.
- L.
HARN, H. Y. LIN and S. YANG, "A Software Authentication System for
Information Integrity", Computers
& Security, Vol. 11, No. 8, pp.747-752, Dec.1992.
- L. HARN and H. Y. LIN, "An l-Span Generalized Secret Sharing Scheme",
Lecture Notes in Computer Science, Advances
in Cryptology-CRYPTO '92, Springer-Verlag, Berlin, pp.
558-565.
- L. HARN and S. YANG, "A
Cryptosystem based on the Discrete Logarithm Problem", will publish
in the Lecture Notes in Computer Science, Advances in Cryptology-AUSCRYPT '92, Springer-Verlag, Berlin.
- L. HARN and S. YANG, "A
Group Oriented Undeniable Signature without the Assistance of a Mutually
Trusted Party", Lecture Notes in Computer Science, Advances in Cryptology-AUSCRYPT
'92, Springer- Verlag, Berlin.
1991:
- C. S. LAIH, L. HARN, J. Y. LEE
and T. HWANG, "Dynamic Threshold Scheme Based on the Definition of
Cross-Product in an N-Dimensional Space", Journal of Information Science
and Engineering, 7, pp.13- 23,
1991.
- H. Y. LIN and L. HARN, "A
Generalized Secret Sharing Scheme with Cheater Detection", Lecture
Notes in Computer Science, Advances
in Cryptology-ASIACRYPT '91, Springer-Verlag, Berlin, pp.
149-158.
- C. S. LAIH and L. HARN,
"Generalized Threshold Cryptosystem", Lecture Notes in
Computer Science, Advances in
Cryptology-ASIACRYPT '91,Springer-Verlag, Berlin, pp.
159-169.
- C. S. LAIH, S. M. YEN and L.
HARN, "Two Efficient Server-Aided Secret Computation Protocols
Based on the Addition Sequence", Lecture Notes in Computer Science,
Advances in Cryptology-ASIACRYPT
'91, Springer-Verlag, Berlin, pp. 450-459.
- L. HARN and H. Y. LIN, "An
Oblivious Transfer Protocol and Its Application for the Exchange of
Secrets", Lecture Notes in Computer Science, Advances in Cryptology-ASIACRYPT
'91, Springer-Verlag, Berlin, pp. 312-320.
1990:
- L. HARN and T. KIESLER, "An
Efficient Probabilistic Encryption Scheme", Information Processing Letters,
Vol. 34, No. 3, pp. 123-129, April, 1990.
- L. HARN and H. Y.
LIN, "Noninteractive
Oblivious Transfer ",
Electronics
Letters, Vol. 26,
No. 10, pp. 635-636, May, 1990.
- L.
HARN and H.Y. LIN, "A New Cryptographic Key Generation Scheme for
Multilevel Data Security", Journal
of Computers & Security, Sep., 1990.
- T.
KIESLER and L. HARN, "RSA Blocking and Multisignature Schemes with No Bit
Expansion", Electronics
Letters, Vol. 26, No. 18, pp.1490-1491, Aug.1990.
1989:
- L.HARN
and T. KIESLER, "A
Public-Key Encryption Algorithm Incorporating Error Detection",
Electronics Letters,
Vol. 25, No. 6, pp. 389-390, March, 1989.
- C.
S. LAIH, J. Y. LEE, L. HARN and Y. K. SU, "Linearly Shift Knapsack
Public-Key Cryptosystem", IEEE
Journal on Selected Areas in Communication, Vol. 7, No. 4,
pp. 534-539, May, 1989.
- L.
HARN and T. KIESLER, "An Efficient Cryptosystem Based on Rabin’s
Public- Key Scheme", Electronics
Letters, Vol. 25, No. 11, pp. 726-728,May, 1989.
- L.
HARN and T. KIESLER, "New Scheme for Digital Multisignature", Electronics Letters,
Vol. 25, No. 15, pp. 1002-1003, July, 1989.
- C.
S. LAIH, L. HARN and J. Y. LEE, "A New Threshold Scheme and Its
Application in Designing the Conference Key Distribution Cryptosystem”, Information Processing Letters,
Vol. 32, No. 3, pp. 95-99, Aug. 1989.
- C.
S. LAIH, L. HARN and J. Y. LEE, "Dynamic Threshold Scheme Based On
The Definition of Cross Product In An N-Dimensional Linear
Space", Lecture Notes in Computer Science, Advances in Cryptology-Crypto '89,
Springer-Verlag, Berlin.
- C.
S. LAIH, L. HARN and J. Y. LEE, "On the Design of Single-Key-Lock
Mechanism Based on Newton's Interpolating Polynomial", IEEE Trans. on Software
Engineering, Vol. 15, No. 9, pp. 1135-1137, Sept. 1989.
- L.
HARN and T. KIESLER, "2-bit, Chained, Probabilistic Encryption
Scheme", Electronics
Letters, Vol. 25, No. 21, pp. 1432-1433,Oct. 1989.
- L.
HARN, D. HUANG and C. S. LAIH, "Password Authentication using
Public-Key Cryptography", International
Journal of Computers & Mathematics with Applications,
Vol. 18, No. 12, pp. 1001 1017, Dec.1989.
1988:
- E.
H. LU, L. HARN, J. Y. LEE and W.Y.HWANG,"A Programmable VLSI
Architecture for Computing Multiplication and Polynomial Evaluation
Modulo a Positive Integer", IEEE
J. on Solid-State Circuits, Vol. 23, No. 1, pp. 204-207,
Feb., 1988.
2014:
1. Y.-N. LIU, L. HARN, L.
MAO and Y. WAMG “Group Key Distribution with Full-Healing Property”, Proceedings of The
23rd International Conference on Computer Communications and Networks (ICCCN
2014), Shanghai, China, August 4 -
August 7, 2014.
2. C. F. HSU, L. HARN and
B. ZENG “A
Novel Group Key Transfer for Big Data Security”, Proceedings of The
2014 Chinacrypt, Zhengjou, China, August 27 - August 30, 2014.
2012:
1. C. LIN, and L. HARN, “Unconditionally Secure Multi-Secret
Sharing Scheme”, Proceedings of 2012 IEEE International Conference on Computer
Science and Automation Engineering (CSAE 2012), Zhangjiajie, China, May
25-27, 2012.
2. L. HARN and C. LIN, “An Extension
of Harn-Lin’s Cheater Detection and Identification”,
Proceedings
of International Computer Symposium (ICS), Taiwan,
December 12-14, 2012.
2011:
1. C.N. Yang,
H.W. Shih, Y.Y. Chu, and L. Harn, "New Region Incrementing Visual Cryptography
Scheme," The 2011 International Conference on Image Processing, Computer
Vision, and Pattern Recognition (IPCV 2011) in conjunction with WORLDCOMP
2011, pp. 323-329, Las Vegas, USA, July, 2011.
2010:
- L. HARN, C. LIN and C. HU, “Contract Signatures in E-Commerce Applications”,
Proceedings of the 2010 International Conference on Broadband, Wireless
Computing, Communication and Applications, pp. 384-388, 2010..
2009:
1. C. LIN,
L. HARN and D. YEA, “Information-theoretically Secure Strong Veriable Secret
Sharing”, Proceedings of the Fifth International Conference on
Information Conference on Security and Cryptography (SECRYPT 2009), July
7-10, 2009, Milan, Italy, pp. 233-238.
- C. LIN,
L. HARN and D. YEA, “Ideal
Hierarchical (t; n) Secret Sharing Schemes”,
Proceedings of the Fifth International Conference on Information
Assurance and Security (IAS'09), Aug.18-20, 2009, Xi'an, China.
- C. LIN,
and L. HARN, “A New Perfect Threshold Secret Sharing Scheme”,
Proceedings of the ChinaCrypt 2009, Nov. 14-16, Guangzhou, China.
2008:
- T. ZHOU
and L. HARN, “Risk Management of Digital Certificates in Ad Hoc and
P2P Networks", Proceedings of the 21st Canadian Conference on
Electrical and Computer Engineering, May 4-7, 2008.
- J. REN,
L. HARN and T. Li, “How to Leak a Secret from Multiple Sources”, IEEE Milcom 2008.
2007:
- W.-J. HSIN
and L. HARN, “Practical Public Key Solution in Mobile Ad Hoc Networks”, Proceedings of the International Conference on
Security of Information and Networks (SIN 2007), May 8-10,
2007, North Cyprus.http://www.sinconf.org/
2006:
- J.
WANG, M. MIHALJEVIC, L. HARN and H. IMAI, “A
Hierarchical Key Management Approach for Secure Multicast”, ARCS'06: Architecture of
Computing Systems, Frankfurt/Main (Germany), Lecture Notes in Computer
Science, vol. 3894, pp. 422-434, March 13-16, 2006.
- J.
REN and L. HARN, “Ring Signatures based on ElGamal Signature”, International Conference on
Wireless Algorithms, Systems and Applications (WASA'06),
LNCS 4138, pp: 445-456, 2006.
- D.
XU, L. HARN, M. NARASIMHAM, and J. LUO, “An Improved Free-Roaming Mobile Agent Security
Protocol against Colluded Truncation Attacks”, Proceedings of the Thirtieth
Annual International Computer Software and Applications Conference (IEEE
COMPSAC 2006), Volume II, pp. 309-314, 1721 September 2006,
Chicago, Illinois, USA.
2005:
- M. MEHTA
D. HUANG and L. HARN, “RINK-RKP:
A Scheme for Key Predistribution and Shared-Key Discovery in Sensor
Networks,” 24th
IEEE International Performance
Computing and Communications Conference 2005.
- W. –J.
HSIN and L. HARN, “Simple Certified eCheck with a Partial PKI solution”,
43rd ACM Southeast
Conference, Kennesaw State University, Kennesaw, Georgia,
March, 2005.
- W. –J.
HSIN and L. HARN, “The e-Traveler’s Check”, accepted by 6th International Conference on
Internet Computing 2005, June 27 - 30, 2005, Las Vegas,
Nevada.
- J. WANG,
Z. Y. XIA, L. HARN, and G. CHEN, “Storage-Optimal Key
Sharing with Authentication in Sensor Networks”, Third International Symposium on
Parallel and Distributed Processing and Applications (ISPA'2005),
Nanjing ,China , 2-5 Nov. 2005.
- J. WANG,
L. HARN, and H. IMAI, “Key management for multicast fingerprinting”,
Information Systems Security”, First
International Conference, ICISS 2005, Kolkata, India,
December 19-21, 2005. Proceedings,
(Also available in Lecture Notes in Computer Science
Publisher: Springer-Verlag GmbH ISSN:0302-9473.
- J.
WANG1, Z Y XIA1 and L. HARN, “Storage-Optimal Key Sharing with
Authentication in Sensor Networks”,
IEE Mobility Conference
2005, Nov. 14-17, Guangzhou, China.
2004:
- L. HARN,
J. WANG and H. IMAI, “Boolean Function Simplification in Secure
Broadcasting”, Proc.
of Second International Conference on Applied Cryptography and Network
Security (ACNS 2004), June 8-11, Yellow Mountain, China.
- D. HUANG
M. MEHTA D. MEDHI, L. HARN, “Location-aware Key Management Scheme for
Wireless Sensor Networks,” Proceedings
of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN
'04, in conjunction with ACM CCS2004), pages 29- 42, Oct.
25, 2004.
2003:
- L. HARN
and W. J. HSIN, “On the Security of Wireless Network Access with
Enhancements”, in Proc. of 1003 ACM Workshop on Wireless Security,
pp. 88-95, San Diego, California, Sep. 19, 2003.
- D.
HUANG, D. MEDHI, C. BEARD, and L. HARN, "Trust Analysis of Link State
Network Routing", 2nd
International Workshop on Trusted Internet (TIW), Hyderabad,
India, December 17, 2003.
2002:
- L..
HARN, C. C. LIN and C. S. LAIH, “Multiple-Public-Key (MPK)”, InfoSecure 2002, Science
Center Shanghai, China, July 10-13, 2002.
2001:
- L. HARN,
“Two Internet B2C Services: e-Stamp and e-Ticket”, Proc. of the 11th National
Conference on Information Security, pp. 271-280, May 3-4,
2001, Tainan, Taiwan.
- G. GONG,
L. HARN and H. WU, “The GH Public-Key Cryptosystem”, Proc. of the SAC
2001 Conference, Toronto, Canada, Aug. 2001.
2000:
- L. HARN,
H. Y. LIN, and G. GONG, “A Fair-E-Lottery without the Assistance of a
Mutually Trusted Drawing Party”, ”, Proc.
of the 10th National Conference on Information Security, pp.
323-336, May 5-6, 2000, Hua-Liang, Taiwan.
1999:
- L. HARN,
H. Y. LIN and G. GONG, "A Global Key Recovery System", Proceedings of the International
Workshop on Cryptographic Techniques & E-Commerce,
pp.81-85, July 1999, Hong Kong.
- L. HARN
and G. GONG, "Elliptic-Curve Digital Signatures and
Accessories", Proceedings
of the International Workshop on Cryptographic Techniques &
E-Commerce, pp. 126-130, July 1999, Hong Kong.
- X.SHEN,
Z. LIU, L. HARN, and Y. LOU, "A Batch-Verifying Algorithm for
Multiple Digital Signatures", Proceedings
of the IASTED International Conference on Parallel and distributed
Computing and Systems,November 3-6,1999 MIT, Boston, USA.
1998:
- G. GONG
and L. HARN, “A New Approach on Public-Key Distribution”, Proc. Of ChinaCrypt ’98,
pp. 50-55, May, 1998.
1996:
- G. GONG,
and L. HARN, "Efficient Lucas Public-Key Cryptosystems", Proc. of ICS '96,
Taiwan.
- L. HARN,
"The Interactive Protocol for Digital Multisignature", Proc. of ICS '96,
Taiwan.
1995:
- L. HARN
and H. Y. LIN, "Modification to Enhance the Security of the GSM
Protocol", Proc.
of the Fifth National Conference on Information Security,
pp. 74-76, May 5, 1995, Taipei, Taiwan.
- H. Y.
LIN and L. HARN, "Authentication Protocols for wireless
Communications", Proc.
of ACM SIGCOMM '95, pp. 256-261, 1995.
- H. Y.
LIN, L. HARN and V. KUMAR, "Authentication Protocols in Wireless
Communications", Proc.
of the International Conference on Automation, Dec. 12-14,
1995, Indore, India.
1993:
- H.Y. LIN
and L. HARN, "Authentication in Wireless Communications", Proc. of GLOBCOMM
'93, Nov. 1993.
1992:
- L. HARN,
H. Y. LIN and S. YANG, "A Software Authentication System for the
Prevention of Computer Viruses", Proc.
of ACM 1992 Computer Science Conference, March, 1992.
1991:
- L. HARN,
"A Public-Key Based Dynamic Password Scheme", Proc. of 1991 Symposium on
Applied Computing, April 1991.
1990:
- E. A.
UNGER, L. HARN and V. KUMAR, "Entropy as a Measure of Database
Information", 6th
Annual Computer Security Application Conference, Dec. 1990,
pp. 80-87.
1989:
- L. HARN,
D. HUANG and C. S. LAIH, "Password Authentication Based on
Public-Key Distribution Cryptosystem",
Proc. of Fifth International Conf. on Data Engineering, Los
Angeles, Feb. 1989.
- L. HARN
and T. KIESLER, "A Variation on the Rabin Public-Key Encryption
Scheme Incorporating Coding Technique", Proc. of Workshop on Applied
Computing '89, March, 1989.
- L. HARN
and D. HUANG, "An Authenticated Public-key Distribution Scheme for
a Distributed Network", Proc.
of Workshop on Applied Computing '89, March, 1989.
- C. S.
LAIH, J. Y. LEE, L. HARN and C. H. CHEN, "A New Scheme for ID-Based
Cryptosystem and Signature", Proc.
of IEEE INFOCOM '89, Ottawa, Canada, April, 1989.
- L. HARN
and T. KIESLER, "Authenticated Group Key Distribution Scheme for a
Large Distributed Network", Proc.
of IEEE 1989 Symposium on Research in Security and Privacy,
Oakland, CA, May, 1989.
- L. HARN,
Y. R. CHIEN and T. KIESLER, "An Extended Cryptographic Key
Generation Scheme for Multilevel Data Security", Proc. of 5th Aerospace
Computer Security
Applications Conference, Dec., 1989.
- L. HARN
and T. KIESLER, "Two New Efficient Cryptosystems Based on Rabin's
Scheme: Alternatives to RSA Cryptosystem", Proc. of 5th Aerospace Computer
Security Applications Conference, Dec., 1989.
1988:
- J. S.
WU, S. K. SHIEH, L. M. TSENG and L. HARN, "Common Disk Management
in Concurrent Multiple Operating Systems Environments", Proc. of 1988 SCS Multiconference, San
Diego, CA, Feb. 1988.
- E. H.
LU, W. Y. HWANG, L. HARN and J. Y. LEE,"A Conference Key
Distribution System Based On Lagrange Interpolating Polynomials", Proc. of IEEE INFOCOM '88,
March 28-31, 1988.
- C. S.
LAIH, L. HARN and J. Y. LEE, "An Improved Knapsack Public-Key
Cryptosystem", Proc.
of 1988 IEEE International Symposium on Information Theory,
Kobe, Japan, June, 1988.
- E. H.
LU, W. Y. HWANG, L. HARN and J. Y. LEE,"VLSI Design for Evaluating
Lagrange Interpolating Polynomial",
Proc. of 31st Midwest Symposium on Circuits and Systems, St.
Louis, MO, Aug, 1988.
- M. L.
YANG, C. S. LAIH, L. HARN and B. A. SHENOI,"Digital Spectral
Transformations for Designing 1-D
Digital FIR Filters", . Proc.
of 31st Midwest Symposium on Circuits and Systems, St.
Louis, MO, Aug, 1988.
- C. S.
LAIH, L. HARN and J. Y. LEE,"A Design of Dynamic Single-Key-Lock
Mechanism for Computer Protection", Proc. of IEEE International Conf on Communication
Systems, Singapore, Oct. 1988.
- C. S.
LAIH, E. H. LU, L. HARN and J. Y. LEE, "VLSI Architecture for
Modular Multiplication and Exponentiation in GF(2m)", Proc. of National Computer
Symposium, 1988, Taiwan.
- L. HARN,
D. HUANG and C. S. LAIH, "Password Authentication Using Quadratic
Residues", Proc.
of International Computer Symposium, Dec. 1988, Taipei,
Taiwan.
1987:
- W. Y.
HWANG, E. H. LU, L. HARN, and J. Y. LEE,"A Fast VLSI Multiplier for
Finite Field GF(F)", Proc.
of 1st International Conf. on VLSI Circuit, Japan, May,
1987.
- J. N.
SHIH, J. Y. LEE, and L. HARN,"A Programmable VLSI Transform
Processor with Fault-Tolerant Architecture", Proc. of 16th IASTED
International Conf. on Identification, Modeling, Simul.,
June, 1987, Paris, France.
- J. D.
LEE, J. C. HUNG, L. HARN and J. Y. Lee, "An Application of Pattern
Recognition Technique on 3-D Robot Location with Single View", Proc. of 16th IASTED
International Conf. on Identification, Modeling, Simul.,
June, 1987, Paris, France.
- W. Y.
HWANG, E. H. LU, L. HARN and J. Y. LEE,"VLSI Architecture for
Computing Polynomials in GF(2n )", 5th International Conf. on System Engineering,
Dayton, Ohio, Sept. 87.
- M. L.
YANG, C. S. LAIH, L. HARN and B. A. SHENOI, "Linear Phase 2-D FIR
Filter Design Based on Digital Spectral Transformations", 5th International Conf. on
System Engineering, Dayton, Ohio, Sept. 87.
- M. L.
YANG, L. HARN and J. Y. LEE, "On the Design of 1-D Zero-Phase FIR
Filters Using the Cosine Transformation", Proc. of 1987 Telecommunication
Symposium, Taipei, Taiwan.
- C. S.
LAIH, L. HARN and J. Y. LEE, "An Improved High-Density Knapsack
Public- Key Algorithm", Proc.
of 1987 Telecommunication Symposium, Taipei, Taiwan.
- H. K.
KU, S. K. SHIEH, L. M. TSENG and L. HARN, "Performance Modeling and
Analysis of Scheduling Strategies in VM System", Proc. of National Computer
Symposium, 1987, Taiwan.
1986:
- L. HARN
and B. A. SHENOI, "The Application of Digital Spectral
Transformations for Linear-Phase FIR Filter Design", Proc. of IEEE International Conf.
on Circuits and Systems, May, 1986.
1985:
- L. HARN
and B. A. SHENOI, "Design of Stable 2-D IIR Filters Using Digital
Spectral Transformation", IEEE
International Conf. on Circuits and Systems, Beijing, June,
1985. (invited paper)
1984:
- L. HARN
and B. A. SHENOI, "On Stable Digital Frequency Transformations for
Designing 2-D Digital Filters", IEEE Midwest Proc. on
Circuits and Systems, Morgantown, June, l984.
- L. HARN
and B. A. SHENOI, "Design of 2-D General Fan Filters", IEEE Midwest Proc. on Circuits
and Systems, Morgantown, June, l984.
|