Follow
Changlu Lin(林昌露)
Title
Cited by
Cited by
Year
Authenticated group key transfer protocol based on secret sharing
L Harn, C Lin
IEEE transactions on computers 59 (6), 842-846, 2010
2182010
Strong (n, t, n) verifiable secret sharing scheme
L Harn, C Lin
Information Sciences 180 (16), 3059-3064, 2010
1232010
Detection and identification of cheaters in (t, n) secret sharing scheme
L Harn, C Lin
Designs, Codes and Cryptography 52 (1), 15-24, 2009
1062009
Design of DL-based certificateless digital signatures
L Harn, J Ren, C Lin
Journal of Systems and Software 82 (5), 789-793, 2009
582009
Efficient group Diffie–Hellman key agreement protocols
L Harn, C Lin
Computers & Electrical Engineering 40 (6), 1972-1980, 2014
292014
Ideal perfect multilevel threshold secret sharing scheme
C Lin, L Harn, D Ye
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
282009
Fair secret reconstruction in (t, n) secret sharing
L Harn, C Lin, Y Li
Journal of Information Security and Applications 23, 1-7, 2015
272015
Efficient on-line/off-line signature schemes based on multiple-collision trapdoor hash families
L Harn, WJ Hsin, C Lin
The Computer Journal 53 (9), 1478-1484, 2010
242010
Provably secure convertible nominative signature scheme
W Zhao, C Lin, D Ye
International Conference on Information Security and Cryptology, 23-40, 2008
192008
Security of truncated MACs
P Wang, D Feng, C Lin, W Wu
International Conference on Information Security and Cryptology, 96-114, 2008
142008
Fully deniable message authentication protocols preserving confidentiality
L Harn, CY Lee, C Lin, CC Chang
The Computer Journal 54 (10), 1688-1699, 2011
112011
Unconditionally secure verifiable secret sharing scheme
C Lin, L Harn
AISS: Advances in Information Sciences and Service Sciences 4 (17), 514-518, 2012
102012
An efficient group authentication for group communications
L Harn, C Lin
arXiv preprint arXiv:1306.1436, 2013
92013
Ciphertext-Auditable Identity-Based Encryption.
C Lin, Y Li, K Lv, CC Chang
Int. J. Netw. Secur. 17 (1), 23-28, 2015
62015
Unconditionally secure multi-secret sharing scheme
C Lin, L Harn
2012 IEEE International Conference on Computer Science and Automation …, 2012
62012
Efficient identity-based GQ multisignatures
L Harn, J Ren, C Lin
International Journal of Information Security 8 (3), 205-210, 2009
62009
Universal designated verifier signcryption
F Tang, C Lin, P Ke
International Conference on Network and System Security, 126-134, 2012
52012
基于门限属性加密的安全分布式云存储模型
吴胜艳, 许力, 林昌露
计算机应用 33 (7), 1880-1884, 2013
42013
针对一类无证书签名方案的攻击及改进
郭玲玲, 林昌露, 张胜元
计算机工程 38 (16), 134-137, 2012
32012
基于多方排序协议的安全电子投票方案
杨婷婷, 林昌露, 刘忆宁, 张胜元
计算机系统应用 24 (8), 25-32, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20