Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: N:\web\h\harnl\LOGO.jpg.gif

PUBLICATIONS

BOOKS

  1. C. S. LAIH, L. HARN and C. C. CHANG, Contemporary Cryptography and its Applications, Published by the Unalis Corporation, Taiwan, Aug. 1995.  (Also available in simplified Chinese characters, Defense Industrial Publish Company, July, 2001).
  2. C. S. LAIH, and L. HARN, The Internet Security: PGP Principle, Installation and Operation,Published by Information and Computer Publisher,Taiwan,July 1997.
  3. W. J. HSIN and L. HARN, “Offline/Online Security in Mobile Ad Hoc Networks”, book Chapter 9 in Theory and Practice of Cryptography Solutions for Secure Information Systems, ISBN 13: 9781466640306, pp. 199-222, published by IGI Global, 2013. http://www.igi-global.com/book/theory-practice-cryptography-solutions-secure/73568?camid=3v6Vol. 11, Nos. 1/2, 2016

JOURNALS

2017:

1. L. HARN and C. F. XU, "A Practical hybrid group key establishment for secure group communications,"   Accepted by the Computer Journal.

2.  L. HARN and C. F. XU, "A novel threshold cryptography with membership authentication and key establishment,"   accepted by Wireless Personal Communications,

3.   L. HARN and C. F. XU, "A novel design of membership authentication and group key establishment protocol,"   Security and Communication Networks,  2017..

4.   L. HARN and C. F. XU, Z. Xia and J. Zhou, "How to share secret efficiently over networks,"  Security and Communication Networks,  2017.

5.   O. RUAN, Y. ZHANG, M. ZHANG, J. ZHOUu, and L. HARN, "After-the-fact leakage-resilient identity-based
authenticated key exchange
,"  IEEE System Journal. 2017.

2016:

1. .Y. N. LIU, L. HARN, L. MAO, Z. XIONG, 'Full-healing group-key distribution in online social networks,"  International Journal of Security and Networks, vol. 11, nos. 1/2, pp. 12-24, 2016.

2. L. HARN and C. F. XU, O. Ruan, and M.-Y. Zhang "Novel design of secure end-to-end routing protocol in wireless sensor networks,"   IEEE Sensors Journal,  Vol. 16, No. 6, pp. 1779-1785,  2016.

3.  C.. F. XU, L. HARN, T. HE and M. ZHANG,  "Efficient group key transfer protocol for WSNs,"   IEEE Sensors Journal,  Vol. 16, No. 11, pp. 4515-4520,  2016.

4.  L. HARN and C. F. XU, M. ZHANG,  T. HE and M. ZHANG, "Realizing secret sharing with general access structure,"   Information Science,  Vol. 367-368, pp. 209-220,  2016.

5.  L. HARN and F. WANG, "Threshold signature scheme without using polynomial interpolation”,   International Journal of Network Security, Vol.18, No.4, pp.710-717, July 2016.

6.  C.. F. XU, L. HARN, Y. MU, M. ZHANG and X. ZHU, "Computation-efficient key establishment in wireless group communications ,"   Wireless Networks, online Feb. 2016.

7.  L. HARN and C. F. XU, "Centralized group key establishment protocol without mutually trusted party,"  Mobile Networks and Applications, DOI: 10.1007/s11036-016-0776-7,

8.  L. HARN and C. F. XU, "(t, n) multi-secret sharing scheme based on bivariate polynomial," Wireless Personal Communications, DOI 10.1007/s11277-016-3862-z.

2015:

1.  L. HARN and G. GONG, “Conference Key Establishment Protocol using a Multivariate Polynomial and Its Applications, Security and Communication Networks, vol. 8, pp. 1794-1800, 2015.

2. C. F. HSU, S. WU, L. HARN, "New results on ideal multipartite secret sharing and its applications to group communications", Wireless Personal Communications,   82, Issu 1, pp 283-292, May 2015.

3.  L. HARN and C. F. XU, "Predistribution scheme for establishing group keys in wireless wensor networks,"   IEEE Sensors Journal,  Vol. 15, No. 9, pp. 5103-5108, September 2015.

4. L. HARN, C. LIN and Y. LI, "Fair secret reconstruction in (t, n) secret sharing ,"  Journal of Information Security and Applications, Vol. 23, pp. 1-7, 2015.

5.  L. HARN and C. F. XU, "Dynamic threshold secret reconstruction and its application to the threshold cryptography,"   Information Processing Letters,  115, pp.851-857r 2015.

2014:

1. L. HARN and C. LIN, “Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography”, International Journal of Communications, Network and System Sciences (IJCNS), Vol. 7, pp. 22-29, 2014.

2. C. –C. CHANG, L. HARN and T. F. CHENG, “Notes on “Polynomial-Based Key Management for Secure Intra-Group and Inter-Group Communication”, International Journal of Network Security, Vol.16, No.2, PP.143-148, Mar. 2014.

3. Y. LIU, L. HARN and C. –C. CHANG, “A Novel Verifiable Secret Sharing Mechanism Using Theory of Numbers and a Method for Sharing Secrets, International Journal of Communication Systems, 28, pp. 1282–1292, 2014.

4. C.-F. HSU, L. HARN and G. CUI, “Multipartite Secret Sharing Based on CRT”, Wireless Personal Communication, Springer,78, pp. 271-282, 2014.

5.  L. HARN and F. MIAO, “Multilevel Threshold Secret Sharing Based on the Chinese Remainder Theorem”, Information Processing Letters, Vol. 114, Iss. 9, Pages 504-509, 2014.

6.   L. HARN, “Generalized Cheater Detection and Identification”, IET Information Security, Vol. 8, Iss. 3, pp. 171178, 2014.

7.  L. HARN and C. LIN, “Efficient Group Diffie-Hellman Key Agreement Protocols”, Computers and Electrical Engineering, 40, pp.1972–1980, 2014.

8.  L. HARN, “Secure Secret Reconstruction and Multi-Secret Sharing Schemes with Unconditional Security”, Security and Communication Networks, Vol. 7, Iss. 3, pp. 567-573, 2014.

9.  F. WANG, C. –C. CHANG and L. HARN, “Simulatable and Secure Certificate-based Threshold Signature without Pairings”, Security and Communication Networks, Vol. 7, Iss. 11, pp. 2094-2103,Nov. 2014.

2013:

1.  J. REN and L. HARN, “An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications”, IEEE Trans. ON Wireless Commu., Vol. 12(3), pp. 1018-1025, March 2013.

2.   L. HARN, “Group Authentication”, IEEE Trans. on Computers. vol. 62, no. 9, pp. 1893-1898, 2013.

3. L. HARN, F. MIAO and C. C. CHANG, “Verifiable Secret Sharing based on the Chinese Remainder  Theorem”, Security and Communication Networks, will be published in 2013.

4.   L. HARN and C. LIN, “An Extension of Harn-Lin’s Cheater Detection and Identification”, Advances in Intelligent Systems and Applications, vol. 2, pp. 25-32, 2013

5.   L. HARN and C. LIN, “An Efficient Group Authentication for Group Communications”, International Journal of Computer Networks & Communications (IJCNC), vol..5, no.3,pp. 9-16,  2013.

6.   L. HARN, C.- C. CHANG, and H.-L. WU, “An Anonymous Multi-Receiver Encryption Based on RSA”, Journal of Network Security, Vol.15, No.4, PP.307-312, July 2013.

7.   Y. LIU, L. HARN and C.- C. CHANG, “An Authenticated Group Key Distribution Mechanism Using Theory of Numbers”, International Journal of Communication Systems, will be published in 2013.

8. C. LIN, F. TANG, P. Ke, L. HARN and and S. ZHANG, “Secure Universal Designated Verifier Identity-based Signcryption”, Security and Communication Networks, Published online in Wiley Online Library in June, 2013.

9. L. HARN, “Comments on “Fair (t, n) Threshold Secret Sharing Scheme”, IET Information Security,     accepted in 2013.

10. L. HARN and F. MIAO, “Weighted Secret Sharing Based on the Chinese Remainder Theorem”, International Journal of Network Security, accepted in 2013.

11. C.-F. HSU, L. HARN and G. CUI, “An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs”, Wireless Personal Communication, Springer, accepted in 2013.

12. Y. –X. LIU, Y. ZHANG, L. HARN and Y. HU, “Verifiable Symmetric Polynomial-based Key Distribution Schemes”, Security and Communication Networks, Vol. 6(8), pp 1028-1034, Aug. 2013.

13.  Q. MAO, C.-C. CHANG, L. HARN and S. -H. CHANG, "An Image-Based Key Agreement Protocol Using the Morphing Technique", Multimedia Tools and Applications, accepted in 2013.

2012:

1. C.-N. YANG, H.-W. SHIH, C.-C. WU, and L. HARN, “k out of n Region Incrementing Scheme in Visual Cryptography”, IEEE Trans. on Circuits and Systems for Video Technology,  Vol. 22(5), pp. 799-810, May 2012.

2. C.-N. YANG, J. F. OUYANG, L. HARN, “Steganography and Authentication in Image Sharing without Parity Bits”, Optics Communications, Vol. 285, Issue 7, pp. 1725-1735, April 2012.

3. Y. -X. LIU, L. HARN, C.-N. YANG, Y.-C. ZHAMG, “Efficient (n, t, n) Secret Sharing Schemes”, The Journal of Systems and Software, Vol. 85, pp. 1325– 1332, 2012.

 2011:

1.    L. HARN and J. REN, “Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications, IEEE Trans. on Wireless Communications, Vol. 10, NO. 7, pp. 2372-3279, July 2011

2. L. Harn1, C.-Y. LEE, C. LIN and C.-C. CHANG, “Fully Deniable Message Authentication Protocols Preserving Confidentiality”, The Computer Journal, Vol. 54, No. 10, pp. 1688-1699., 2011.

3.  L. Harn1, C. H. LIN, “Contract Signature in e-Commerce”, Computers and Electrical Engineering, 37, pp. 169-173, 2011.

4. C.-Y. LEE, Z. -H. WANG, L. HARN and C.-C. CHANG, “Secure Key Transfer Protocol Based On Secret Sharing For Group Communications”, IEICE Trans. on Inf. & Syst., Vol. E94-D, No. 11, pp. 2069-2076, Nov. 2011.

2010:

  1. L. HARN and C. LIN, “Authenticated Group Key Transfer Protocol Based on Secret Sharing”, IEEE Trans. on Computers, Vol. 59, NO. 6, pp. 842-846, June 2010.
  2. L. HARN and C. LIN, “Strong (n, t, n) Verifiable Secret Sharing Scheme”, Information Sciences, Vol. 180, Issue 16, pp. 3059-3064, Aug. 2010.
  3. H..F. ASHVAND, K. SALAH,  J. M. A. CALERO, L. HARN, .”Distributed Security for Multi-Agent Systems –Review and Applications”, Special Issue on Multi-Agent & Distributed Information Security, IET Inf. Security, Vol. 4, Issue 4, pp. 188–201, 2010.
  4. H..F. ASHVAND, L. HARN, J. H. PARK, K. SALAH, ”Editorial Multi-Agent & Distributed Information Security”, Special Issue on Multi-Agent & Distributed Information Security, IET Inf. Security, Vol. 4, Issue 4, pp. 185-187, 2010.

2009:

1. T. ZHOU and L. HARN, “Hybrid Trust Structure In Self-Organizing Networks”, International Journal of Interdisciplinary Telecommunications and Networking (IJITN), Vol. 1, Issue 2, pp. 1-15. 2009.

2. L.HARN and J.REN, and C.LIN, “Efficient Identity-Based GQ Multisignatures”, International Journal of Information Security, Vol. 8, Issue 3, pp. 205-210, 2009.

3.  L. HARN and J. REN, and C. LIN, “Design of DL-Based Certificateless Digital Signatures”, Journal of Systems and Software, vol. 82, Issue 5, ,pp, 789-793, ,  May 2009.

4.  L. HARN and C. LIN, “Detection and Identification of Cheaters in Secret Reconstruction",Designs, Code and Cryptography, Vol. 52, no. 1, pp. 15-24, 2009.

5.  L.HARN , W.J.HSIN and C.LIN, "Efficient On-line/Off-line Signaturepapers Schemes Based on Multiple -Collision   Trapdoor Hash Families", The Computer Journal, Vol. 53, No. 9, pp. 1478-1484, 2009.

2008:

  1. L. HARN and J. REN, “Design of Fully Deniable Authentication Service for E-Mail Applications”, IEEE Communication Letters, Vol. 12, No. 3, pp. 219-221, March 2008.
  2. J. REN and L. HARN, “Generalized Ring Signatures”, IEEE Trans. on Dependable and Secure Computing, Vol. 5, No. 3, pp. 155-163, July-Sep. 2008.
  3.  L. HARN and J. REN, “Efficient Identity-Based RSA Multisignatures”, Computers & Security, Vol. 27, pp.    1 2– 1 5, 2008.

2006:

  1. C.-H. LIN, R.-H. HSU and L. HARN, “Improved DSA variant for batch verification”, Applied Mathematics and Computation, Elsevier, 169 (1), pp. 75-81, 2006.
  2. D. HUANG, Q. CAO, A. SINHA, M. J. SCHNIEDERJANS, C. BEARD, L. HARN, and D. MEDHI " New Architecture for Intra-Domain Network", Communications of the ACM, Vol. 49 , Issue 11, pp. 64 - 72, Nov.2006.

2005:

  1. L. HARN, W. –J. HSIN and M. MANISH, “Authenticated Diffie-Hellman key agreement protocol using single cryptographic assumption”, IEE Proceedings Communications, Vol. 152, No. 4, pp. 404-410, Aug 2005.
  2. M.MEHTA and L.HARN, “Efficient One-time Proxy Signatures”, IEE Proceedings Communications, Vol. 152, No. 2, pp. 129-133, April 2005.

2004:

  1. L. HARN, M. MANISH and W. –J. HSIN, “Integrate Diffie-Hellman Key Exchange into the Digital Signature Algorithm (DSA)”, IEEE Communication Letters, Vol. 8, No. 3, pp. 198-200, March 2004.
  2. L. HARN, C. Y. LIN and T. –C. WU, “Structured Multisignature Algorithms”, IEE Proceedings- Computers &  Digital Techniques, Vol. 151, No. 2, pp. 231-234, May 2004.

2001:

  1. L. HARN, H. Y. LIN, “Authenticated Key Agreement without using One-Way Hash Functions”,   Electronics Letters, Vol. 37, No 10, pp. 629-630, May 2001.
  2. L. HARN, H. Y. LIN, “A Non-Repudiation Metering Scheme”,  IEEE Communications Letters, Vol. 5, No. 12, pp. 486-487, Dec. 2001.

2000:

  1. L. HARN, H. Y. LIN. and G. GONG, "Bounded-to-unbounded Poker Game”, Electronics Letters, Vol. 36, No. 3, pp. 214-215, Feb.  2000.

1999:

  1. G. GONG and L. HARN, “Public-Key Cryptosystems Based on Cubic Finite Field Extensions”, IEEE Trans. On Information Theory, Vol. 45, Issue 6, Sep. 1999.
  2. L. HARN, Digital Multisignature with Distinguished Signing Authorities”, Electronics Letters, Vol. 35, No. 4, pp. 294-295, Feb. 18, 1999.
  3. H. Y. LIN and L. HARN, “Authentication Protocols with Nonrepudiation Services in Personal Communication Systems”, IEEE Communications Letters, Vol. 3, Number 8, pp. 236-238, Aug. 1999.

1998:

  1. L. HARN, "Batch Verifying Multiple DSA-Type Digital Signatures”, Electronics Letters, Vol.34, No. 9, pp. 870-871, April, 1998.
  2. L. HARN, "Batch Verifying RSA Signatures”, Electronics Letters, Vol. 34, No. 12, pp. 1219-1220, June, 1998.

1997:

  1. L. HARN, "Digital Signatures for Diffie-Hellman Public Keys Without Using a One-Way Function", Electronics Letters, Vol. 33, No. 2, pp. 125-126, Jan. 1997.
  2. L. HARN and G. GONG, “Broadband Subliminal Channel”, IEE Proc.-Comput. Digit. Tech., Vol. 6, Nov. 1997, pp. 387-389.

1996:

  1. L. HARN, "Reply: Comment Public-Key Cryptosystem Design Based on Factoring and Discrete Logarithms", IEE Proceedings - Computers and Digital Techniques, Vol. 143, No.1, p. 96, Jan. 1996.

1995:

  1. L. HARN, "Efficient Sharing (Broadcasting) of Multiple Secrets", IEE Proceedings - Computers and Digital Techniques, Vol. 142, No. 3, pp. 237-240, May 1995.
  2. L. HARN, " ared VerificReply: Digital Signature with (t, n) Shation based on Discrete Logarithms", Electronics Letters, Vol. 31, No. 3, p. 177, Jan. 1995.
  3. L. HARN, "Comment Multistage Secret Sharing Based on One-Way Function”, Electronics Letters, Vol. 31, No. 4, p. 262, Feb. 1995.
  4. L. HARN, "DSA Type Secure Interactive Batch Verification Protocols", Electronics Letters, Vol. 31, No. 4, p. 257, Feb. 1995.
  5. L. HARN, "Modified Key Agreement Protocol Based On The Digital Signature Standard", Electronics Letters, Vol. 31, No. 6, pp. 448-449, March 1995.
  6. H. Y. LIN and L. HARN, "Fair Reconstruction of a Secret", Information Processing Letters, 55, pp. 45-47, 1995.
  7. L. HARN, "Comments on Enhancing the Security of ElGamal's Signature Scheme", IEE Proceedings - Computers and Digital Techniques, Vol. 142, No. 5, p. 376, Sep. 1995.
  8. L. HARN, "Cryptanalysis of the Blind Signature Based on the Discrete Logarithm", Electronics Letters, Vol. 31, No. 14, p. 1136, July, 1995.

1994:

  1. L. HARN and D. HWANG, "A Protocol for Establishing Secure Communication Channels in a Large Network", IEEE Trans. on Knowledge and Data Engineering, Vol. 6, No. 1, pp. 188-191, Feb. 1994.
  2. L. HARN, H. Y. LIN and S. YANG, “Threshold Cryptosystem with Multiple Secret Sharing Policies", IEE Proceedings- Computers and Digital Techniques, Vol. 141, No. 2, pp. 142-144, March 1994.
  3. L. HARN, "Public-Key Cryptosystem Design Based on Factoring and Discrete Logarithms", IEE Proceedings-Computers and Digital Techniques, Vol. 141, No. 3, pp. 193-195, May, 1994.
  4. L. HARN, "A New Digital Signature Based on the Discrete Logarithm”, Electronics Letters, Vol. 30, No. 5, pp. 396-398, March 1994.
  5. L. HARN, "Group-Oriented (t, n) Threshold Signature and Multisignature", IEE Proceedings-Computers and Digital Techniques, Vol. 141, No. 5, pp. 307-313, Sep. 1994.
  6. L. HARN, H. Y. LIN and Y. XU, “Cryptography for PC/Workstation Security", ACM SIGICE Bulletin, Vol. 20, No. 1, pp. 21-26, July 1994 (invited paper).
  7. L. HARN and Y. XU, "On the Design of Generalized ElGamal Type Digital Signature Schemes Based On the Discrete Logarithm", Electronics Letters, Vol. 30, No. 24, pp. 2025-2026, Nov. 1994.

1993:

  1. L. HARN and H. Y. LIN, "Key Management for Decentralized Computer Network Services", IEEE Trans. on Communications, Vol. 41, No. 12, pp. 1777-1779, Dec. 1993.
  2. L. HARN and S. YANG, "ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution", IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, pp. 757-760, June 1993.
  3. L. HARN, "Digital Signature with (t, n) Shared Verification based on Discrete Logarithms", Electronics Letters, Vol. 29, No. 24, pp., Nov. 25, 1993.

1992:

  1. L. HARN and D. C. WANG, "Cryptanalysis and Modification of Digital Signature Scheme Based on Error- Correcting Code", Electronics Letters, Vol. 28, No. 2, pp. 157-159, Jan. 1992.
  2. L. HARN and H. Y. LIN, "The Integration of User Authentication and Access Control", IEE Proceedings E, Vol. 139, No. 2, pp. 139-143,March 1992.
  3. T. KIESLER and L. HARN, "A Cryptographic Master Key Generation Scheme and Its Application to Public Key Distribution", IEE Proceedings-E, Vol. 139, No. 3, pp. 203-206, May 1992.
  4. L. HARN, H. Y. LIN and S. YANG, "A Software Authentication System for Information Integrity", Computers & Security, Vol. 11, No. 8, pp.747-752, Dec.1992.
  5. L. HARN and H. Y. LIN, "An l-Span Generalized Secret Sharing Scheme", Lecture Notes in Computer Science, Advances in Cryptology-CRYPTO '92, Springer-Verlag, Berlin, pp. 558-565.
  6. L. HARN and S. YANG, "A Cryptosystem based on the Discrete Logarithm Problem", will publish in the Lecture Notes in Computer Science, Advances in Cryptology-AUSCRYPT '92, Springer-Verlag, Berlin.
  7. L. HARN and S. YANG, "A Group Oriented Undeniable Signature without the Assistance of a Mutually Trusted Party", Lecture Notes in Computer Science, Advances in Cryptology-AUSCRYPT '92, Springer- Verlag, Berlin.

1991:

  1. C. S. LAIH, L. HARN, J. Y. LEE and T. HWANG, "Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Space", Journal of Information Science and Engineering, 7, pp.1323, 1991.
  2. H. Y. LIN and L. HARN, "A Generalized Secret Sharing Scheme with Cheater Detection", Lecture Notes in Computer Science, Advances in Cryptology-ASIACRYPT '91, Springer-Verlag, Berlin, pp. 149-158.
  3. C. S. LAIH and L. HARN, "Generalized Threshold Cryptosystem", Lecture Notes in Computer Science, Advances in Cryptology-ASIACRYPT '91,Springer-Verlag, Berlin, pp. 159-169.
  4. C. S. LAIH, S. M. YEN and L. HARN, "Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence", Lecture Notes in Computer Science, Advances in Cryptology-ASIACRYPT '91, Springer-Verlag, Berlin, pp. 450-459.
  5. L. HARN and H. Y. LIN, "An Oblivious Transfer Protocol and Its Application for the Exchange of Secrets", Lecture Notes in Computer Science, Advances in Cryptology-ASIACRYPT '91, Springer-Verlag, Berlin, pp. 312-320.

1990:

  1. L. HARN and T. KIESLER, "An Efficient Probabilistic Encryption Scheme", Information Processing Letters, Vol. 34, No. 3, pp. 123-129, April, 1990.
  2. L. HARN and H. Y. LIN, "Noninteractive

  Oblivious Transfer ", Electronics Letters, Vol. 26, No. 10, pp. 635-636, May, 1990.

  1. L. HARN and H.Y. LIN, "A New Cryptographic Key Generation Scheme for Multilevel Data Security", Journal of Computers & Security, Sep., 1990.
  2. T. KIESLER and L. HARN, "RSA Blocking and Multisignature Schemes with No Bit Expansion", Electronics Letters, Vol. 26, No. 18, pp.1490-1491, Aug.1990.

1989:

  1. L.HARN and T. KIESLER, "A Public-Key Encryption Algorithm Incorporating Error Detection", Electronics Letters, Vol. 25, No. 6, pp. 389-390, March, 1989.
  2. C. S. LAIH, J. Y. LEE, L. HARN and Y. K. SU, "Linearly Shift Knapsack Public-Key Cryptosystem", IEEE Journal on Selected Areas in Communication, Vol. 7, No. 4, pp. 534-539, May, 1989.
  3. L. HARN and T. KIESLER, "An Efficient Cryptosystem Based on Rabin’s Public- Key Scheme", Electronics Letters, Vol. 25, No. 11, pp. 726-728,May, 1989.
  4. L. HARN and T. KIESLER, "New Scheme for Digital Multisignature", Electronics Letters, Vol. 25, No. 15, pp. 1002-1003, July, 1989.
  5. C. S. LAIH, L. HARN and J. Y. LEE, "A New Threshold Scheme and Its Application in Designing the Conference Key Distribution Cryptosystem”, Information Processing Letters, Vol. 32, No. 3, pp. 95-99, Aug. 1989.
  6. C. S. LAIH, L. HARN and J. Y. LEE, "Dynamic Threshold Scheme Based On The Definition of Cross Product In An N-Dimensional Linear Space", Lecture Notes in Computer Science, Advances in Cryptology-Crypto '89, Springer-Verlag, Berlin.
  7. C. S. LAIH, L. HARN and J. Y. LEE, "On the Design of Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial",   IEEE Trans. on Software  Engineering, Vol. 15, No. 9, pp. 1135-1137, Sept. 1989.
  8. L. HARN and T. KIESLER, "2-bit, Chained, Probabilistic Encryption Scheme", Electronics Letters, Vol. 25, No. 21, pp. 1432-1433,Oct. 1989.
  9. L. HARN, D. HUANG and C. S. LAIH, "Password Authentication using Public-Key Cryptography", International Journal of Computers & Mathematics with Applications, Vol. 18, No. 12, pp. 1001 1017, Dec.1989.

1988:

  1. E. H. LU, L. HARN, J. Y. LEE and W.Y.HWANG,"A Programmable VLSI Architecture for Computing Multiplication and Polynomial Evaluation Modulo a Positive Integer", IEEE J. on Solid-State Circuits, Vol. 23, No. 1, pp. 204-207, Feb., 1988.


CONFERENCE PAPERS

2014:

1.  Y.-N. LIU, L. HARN, L. MAO and Y. WAMGGroup Key Distribution with Full-Healing Property”, Proceedings of The 23rd International Conference on Computer Communications and Networks (ICCCN 2014),  Shanghai, China, August 4 - August 7, 2014.

2.  C. F. HSU, L. HARN and B. ZENG “A Novel Group Key Transfer for Big Data Security”, Proceedings of The 2014 Chinacrypt, Zhengjou, China, August 27 - August 30, 2014.

2012:

1.    C. LIN, and L. HARN, “Unconditionally Secure Multi-Secret Sharing Scheme”, Proceedings of 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2012), Zhangjiajie, China, May 25-27, 2012.

2.   L. HARN and C. LIN, An Extension of Harn-Lin’s Cheater Detection and Identification”, Proceedings of International Computer Symposium (ICS), Taiwan, December 12-14, 2012.

2011:

1.    C.N. Yang, H.W. Shih, Y.Y. Chu, and L. Harn, "New Region Incrementing Visual Cryptography Scheme," The 2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV 2011) in conjunction with WORLDCOMP 2011, pp. 323-329, Las Vegas, USA, July, 2011.

2010:

  1.  L. HARN, C. LIN and C. HU, “Contract Signatures in E-Commerce Applications”, Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications,  pp. 384-388, 2010..

2009:

1.  C. LIN, L. HARN and D. YEA, “Information-theoretically Secure Strong Veriable Secret Sharing”, Proceedings    of the Fifth International Conference on Information Conference on Security and Cryptography (SECRYPT 2009), July 7-10, 2009, Milan, Italy, pp. 233-238.

  1. C. LIN, L. HARN and D. YEA, “Ideal Hierarchical (t; n) Secret Sharing Schemes”, Proceedings of the Fifth International Conference on Information Assurance and Security (IAS'09), Aug.18-20, 2009, Xi'an, China.
  2. C. LIN, and L. HARN, “A New Perfect Threshold Secret Sharing Scheme”, Proceedings of the ChinaCrypt 2009, Nov. 14-16, Guangzhou, China.

2008:

  1. T. ZHOU and L. HARN, “Risk Management of Digital Certificates in Ad Hoc and P2P Networks", Proceedings of the 21st Canadian Conference on Electrical and Computer Engineering, May 4-7, 2008.
  2. J. REN, L. HARN and T. Li, “How to Leak a Secret from Multiple Sources”, IEEE Milcom 2008.

2007:

  1. W.-J. HSIN and L. HARN, “Practical Public Key Solution in Mobile Ad Hoc Networks”, Proceedings of the International Conference on Security of Information and Networks (SIN 2007), May 8-10, 2007, North Cyprus.http://www.sinconf.org/

2006:

  1. J. WANG, M. MIHALJEVIC, L. HARN and H. IMAI, “A Hierarchical Key Management Approach for Secure Multicast”, ARCS'06: Architecture of Computing Systems, Frankfurt/Main (Germany), Lecture Notes in Computer Science, vol. 3894, pp. 422-434, March 13-16, 2006.
  2. J. REN and L. HARN, “Ring Signatures based on ElGamal Signature”, International Conference on Wireless Algorithms, Systems and Applications (WASA'06), LNCS 4138, pp: 445-456, 2006.
  3. D. XU, L. HARN, M. NARASIMHAM, and J. LUO, “An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks”, Proceedings of the Thirtieth Annual International Computer Software and Applications Conference (IEEE COMPSAC 2006), Volume II, pp. 309-314, 1721 September 2006, Chicago, Illinois, USA.

2005:

  1. M. MEHTA D. HUANG and L. HARN, RINK-RKP: A Scheme for Key Predistribution and Shared-Key Discovery in Sensor Networks,” 24th IEEE International Performance Computing and Communications Conference 2005.
  2. W. –J. HSIN and L. HARN, “Simple Certified eCheck with a Partial PKI solution”, 43rd ACM Southeast Conference, Kennesaw State University, Kennesaw, Georgia, March, 2005.
  3. W. –J. HSIN and L. HARN, “The e-Traveler’s Check”, accepted by 6th International Conference on Internet Computing 2005, June 27 - 30, 2005, Las Vegas, Nevada.
  4. J. WANG, Z.  Y.  XIA, L. HARN, and G. CHEN, “Storage-Optimal Key Sharing with   Authentication in Sensor Networks”, Third International Symposium on Parallel and Distributed Processing and Applications (ISPA'2005), Nanjing ,China , 2-5 Nov. 2005.
  5. J. WANG, L. HARN, and H. IMAI, “Key management for multicast fingerprinting”, Information Systems Security”, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005.   Proceedings, (Also available in Lecture Notes in Computer Science Publisher: Springer-Verlag GmbH ISSN:0302-9473.
  6. J. WANG1, Z Y XIA1 and L. HARN, “Storage-Optimal Key Sharing with Authentication in Sensor  Networks”, IEE Mobility Conference 2005, Nov. 14-17, Guangzhou, China.

2004:

  1. L. HARN, J. WANG and H. IMAI, “Boolean Function Simplification in Secure Broadcasting”,  Proc. of Second International Conference on Applied Cryptography and Network Security (ACNS 2004), June 8-11, Yellow Mountain, China.
  2. D. HUANG M. MEHTA D. MEDHI, L. HARN, “Location-aware Key Management Scheme for Wireless Sensor Networks,” Proceedings of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04, in conjunction with ACM CCS2004), pages 29- 42, Oct. 25, 2004.   

2003:

  1. L. HARN and W. J. HSIN, “On the Security of Wireless Network Access with Enhancements”, in Proc. of 1003 ACM Workshop on Wireless Security, pp. 88-95, San Diego, California, Sep. 19, 2003.
  2. D. HUANG, D. MEDHI, C. BEARD, and  L. HARN,  "Trust Analysis of Link State Network Routing", 2nd International Workshop on Trusted Internet (TIW), Hyderabad, India, December 17, 2003.

2002:

  1. L.. HARN, C. C. LIN and C. S. LAIH, “Multiple-Public-Key (MPK)”, InfoSecure 2002,  Science Center Shanghai, China, July 10-13, 2002.

2001:

  1. L. HARN, “Two Internet B2C Services: e-Stamp and e-Ticket”, Proc. of the 11th National Conference on Information Security, pp. 271-280, May 3-4, 2001, Tainan, Taiwan.
  2. G. GONG, L. HARN and H. WU, “The GH Public-Key Cryptosystem”, Proc. of the SAC 2001 Conference, Toronto, Canada, Aug. 2001.

2000:

  1. L. HARN, H. Y. LIN, and G. GONG, “A Fair-E-Lottery without the Assistance of a Mutually Trusted Drawing Party”, ”, Proc. of the 10th National Conference on Information Security, pp. 323-336, May 5-6, 2000, Hua-Liang, Taiwan.

1999:

  1. L. HARN, H. Y. LIN and G. GONG, "A Global Key Recovery System", Proceedings of the International Workshop on Cryptographic Techniques & E-Commerce, pp.81-85, July 1999, Hong Kong.
  2. L. HARN and G. GONG, "Elliptic-Curve Digital Signatures and Accessories", Proceedings of the International Workshop on Cryptographic Techniques & E-Commerce, pp. 126-130, July 1999, Hong Kong.
  3. X.SHEN, Z. LIU, L. HARN, and Y. LOU, "A Batch-Verifying Algorithm for Multiple Digital Signatures", Proceedings of the IASTED International Conference on Parallel and distributed Computing and Systems,November 3-6,1999 MIT, Boston, USA.

1998:

  1. G. GONG and L. HARN, “A New Approach on Public-Key Distribution”, Proc. Of ChinaCrypt ’98, pp. 50-55, May, 1998.

1996:

  1. G. GONG, and L. HARN, "Efficient Lucas Public-Key Cryptosystems", Proc. of  ICS '96, Taiwan.
  2. L. HARN, "The Interactive Protocol for Digital Multisignature", Proc. of  ICS '96, Taiwan.

1995:

  1. L. HARN and H. Y. LIN, "Modification to Enhance the Security of the GSM Protocol", Proc. of the Fifth National Conference on Information Security, pp. 74-76, May 5, 1995, Taipei, Taiwan.
  2. H. Y. LIN and L. HARN, "Authentication Protocols for wireless  Communications",  Proc. of  ACM SIGCOMM '95, pp. 256-261, 1995.
  3. H. Y. LIN, L. HARN and V. KUMAR, "Authentication Protocols in Wireless Communications", Proc. of the International Conference on Automation, Dec. 12-14, 1995, Indore, India.

1993:

  1. H.Y. LIN and L. HARN, "Authentication in Wireless Communications", Proc. of GLOBCOMM '93, Nov. 1993.

1992:

  1. L. HARN, H. Y. LIN and S. YANG, "A Software Authentication System for the Prevention of Computer Viruses", Proc. of ACM 1992 Computer Science Conference, March, 1992.

1991:

  1. L. HARN, "A Public-Key Based Dynamic Password Scheme", Proc. of 1991 Symposium on Applied Computing, April 1991.

1990:

  1. E. A. UNGER, L. HARN and V. KUMAR, "Entropy as a Measure of Database Information", 6th Annual Computer Security Application Conference, Dec. 1990, pp. 80-87.

1989:

  1. L. HARN, D. HUANG and C. S. LAIH, "Password Authentication Based on Public-Key Distribution Cryptosystem", Proc. of Fifth International Conf. on Data Engineering, Los Angeles, Feb. 1989.
  2. L. HARN and T. KIESLER, "A Variation on the Rabin Public-Key Encryption Scheme Incorporating Coding Technique", Proc. of Workshop on Applied Computing '89, March, 1989.
  3. L. HARN and D. HUANG, "An Authenticated Public-key Distribution Scheme for a Distributed Network", Proc. of Workshop on Applied Computing '89, March, 1989.
  4. C. S. LAIH, J. Y. LEE, L. HARN and C. H. CHEN, "A New Scheme for ID-Based Cryptosystem and Signature", Proc. of IEEE INFOCOM '89, Ottawa, Canada, April, 1989.
  5. L. HARN and T. KIESLER, "Authenticated Group Key Distribution Scheme for a Large Distributed Network", Proc. of IEEE 1989 Symposium on Research in Security and Privacy, Oakland, CA, May, 1989.
  6. L. HARN, Y. R. CHIEN and T. KIESLER, "An Extended Cryptographic Key Generation Scheme for Multilevel Data Security", Proc. of 5th Aerospace Computer Security Applications Conference, Dec., 1989.
  7. L. HARN and T. KIESLER, "Two New Efficient Cryptosystems Based on Rabin's Scheme: Alternatives to RSA Cryptosystem", Proc. of 5th Aerospace Computer Security Applications Conference, Dec., 1989.

1988:

  1. J. S. WU, S. K. SHIEH, L. M. TSENG and L. HARN, "Common Disk Management in Concurrent Multiple Operating Systems Environments", Proc. of 1988 SCS Multiconference, San Diego, CA, Feb. 1988.
  2. E. H. LU, W. Y. HWANG, L. HARN and J. Y. LEE,"A Conference Key Distribution System Based On Lagrange Interpolating Polynomials", Proc. of IEEE  INFOCOM '88, March 28-31, 1988.
  3. C. S. LAIH, L. HARN and J. Y. LEE, "An Improved Knapsack Public-Key Cryptosystem", Proc. of 1988 IEEE International Symposium on Information Theory, Kobe, Japan, June, 1988.
  4. E. H. LU, W. Y. HWANG, L. HARN and J. Y. LEE,"VLSI Design for Evaluating Lagrange Interpolating Polynomial",   Proc. of 31st Midwest  Symposium on Circuits and Systems, St. Louis, MO, Aug, 1988.
  5. M. L. YANG, C. S. LAIH, L. HARN and B. A. SHENOI,"Digital Spectral Transformations for Designing 1-D Digital FIR Filters", . Proc. of 31st Midwest  Symposium on Circuits and Systems, St. Louis, MO, Aug, 1988.
  6. C. S. LAIH, L. HARN and J. Y. LEE,"A Design of Dynamic Single-Key-Lock Mechanism for Computer Protection", Proc. of IEEE International Conf on Communication Systems, Singapore, Oct. 1988.
  7. C. S. LAIH, E. H. LU, L. HARN and J. Y. LEE, "VLSI Architecture for Modular Multiplication and Exponentiation in GF(2m)", Proc. of National Computer Symposium, 1988, Taiwan.
  8. L. HARN, D. HUANG and C. S. LAIH, "Password Authentication Using Quadratic Residues", Proc. of International Computer Symposium, Dec. 1988, Taipei, Taiwan.

1987:

  1. W. Y. HWANG, E. H. LU, L. HARN, and J. Y. LEE,"A Fast VLSI Multiplier for Finite Field GF(F)", Proc. of 1st International Conf. on VLSI Circuit, Japan, May, 1987.
  2. J. N. SHIH, J. Y. LEE, and L. HARN,"A Programmable VLSI Transform Processor with Fault-Tolerant Architecture", Proc. of 16th IASTED International Conf. on Identification, Modeling, Simul., June, 1987, Paris, France.
  3. J. D. LEE, J. C. HUNG, L. HARN and J. Y. Lee, "An Application of Pattern Recognition Technique on 3-D Robot Location with Single View", Proc. of 16th IASTED  International Conf. on Identification, Modeling, Simul., June, 1987, Paris, France.
  4. W. Y. HWANG, E. H. LU, L. HARN and J. Y. LEE,"VLSI Architecture for Computing Polynomials in GF(2n )", 5th International Conf. on System Engineering, Dayton, Ohio,  Sept. 87.
  5. M. L. YANG, C. S. LAIH, L. HARN and B. A. SHENOI, "Linear Phase 2-D FIR Filter Design Based on Digital Spectral Transformations", 5th  International Conf. on System Engineering, Dayton, Ohio,  Sept. 87.
  6. M. L. YANG, L. HARN and J. Y. LEE, "On the Design of 1-D Zero-Phase FIR Filters Using the Cosine Transformation", Proc. of 1987 Telecommunication Symposium, Taipei, Taiwan.
  7. C. S. LAIH, L. HARN and J. Y. LEE, "An Improved High-Density Knapsack Public- Key Algorithm", Proc. of 1987 Telecommunication Symposium, Taipei, Taiwan.
  8. H. K. KU, S. K. SHIEH, L. M. TSENG and L. HARN, "Performance Modeling and Analysis of Scheduling Strategies in VM System", Proc. of National Computer Symposium, 1987, Taiwan.

1986:

  1. L. HARN and B. A. SHENOI, "The Application of Digital Spectral Transformations for Linear-Phase FIR Filter Design", Proc. of IEEE International Conf. on Circuits and Systems, May, 1986.

1985:

  1. L. HARN and B. A. SHENOI, "Design of Stable 2-D IIR Filters Using Digital Spectral Transformation", IEEE International Conf. on Circuits and Systems, Beijing, June, 1985. (invited paper)

1984:

  1. L. HARN and B. A. SHENOI, "On Stable Digital Frequency Transformations for Designing 2-D   Digital Filters", IEEE Midwest Proc. on  Circuits and Systems, Morgantown, June, l984.
  2. L. HARN and B. A. SHENOI, "Design of 2-D General Fan Filters", IEEE Midwest Proc. on Circuits and Systems, Morgantown, June, l984.

 

 

 

   

© Copyrights 2009