#### Filter Results:

- Full text PDF available (69)

#### Publication Year

1989

2017

- This year (3)
- Last 5 years (38)
- Last 10 years (65)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Dijiang Huang, Manish Mehta, Deep Medhi, Lein Harn
- SASN
- 2004

Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several pairwise key schemes have been proposed for large distributed sensor networks. These schemes randomly select a set of keys from a key pool and install the keys in the memory of… (More)

- Guang Gong, Lein Harn
- IEEE Trans. Information Theory
- 1999

The cryptographic properties of third-order linear feedback shift-register (LFSR) sequences over GF (p) are investigated. A fast computational algorithm for evaluating the kth term of a characteristic sequence of order 3 is presented. Based on these properties, a new public-key distribution scheme and an RSA-type encryption algorithm are proposed. Their… (More)

- Lein Harn, Hung-Yu Lin
- Computers & Security
- 1990

In 1982, and Taylor proposed an elegant solution to rhe partially ordered multilevel key distribution problem, using a cryptographic approach. Since then, continuing research has been conducred to try to realize and simplify their scheme. Generally speaking, there are two problems associated with their scheme. First, a large value associated with each… (More)

- Lein Harn, Changlu Lin
- Inf. Sci.
- 2010

Article history: Received 15 December 2009 Received in revised form 14 April 2010 Accepted 17 April 2010

- Lein Harn, Changlu Lin
- Des. Codes Cryptography
- 2009

In a (t, n) secret sharing scheme, a secret s is divided into n shares and shared among a set of n shareholders by a mutually trusted dealer in such a way that any t or more than t shares will be able to reconstruct this secret; but fewer than t shares cannot know any information about the secret. When shareholders present their shares in the secret… (More)

- Lein Harn
- IEEE Trans. Computers
- 2013

- Lein Harn, Manish Mehta, Wen-Jung Hsin
- IEEE Communications Letters
- 2004

The National Institute of Standards and Technology (NIST) has published a series of security standards under Federal Information Processing Standard (FIPS). Standard for key agreement is still missing in the current standards. Arazi proposed integrating Diffie–Hellman (DH) key exchange into the Digital Signature Algorithm (DSA). However, the protocol was… (More)

- Guang Gong, Lein Harn, Huapeng Wu
- Selected Areas in Cryptography
- 2001

- Lein Harn, Wen-Jung Hsin
- Workshop on Wireless Security
- 2003

The security of the current 3G wireless protocols addresses the problems faced by the 2G systems, in addition to fulfilling the higher 3G security requirements mandated from operating in IP networks as well as voice networks. However, the approach adopted by the two most popular 3G mobile system forerunners, UMTS and cdma2000, leaves many areas for… (More)

- Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, Lein Harn
- IEEE Trans. Circuits Syst. Video Techn.
- 2012

Recently, Wang introduced a novel (2, n) region incrementing visual cryptographic scheme (RIVCS), which can gradually reconstruct secrets in a single image with multiple security levels. In RIVCS, the secret image is subdivided into multiple regions in such a way that any t shadow images, where 2 ≤ t ≤ n, can be used to reveal the (t − 1)th region. However,… (More)