Authenticated group key transfer protocol based on secret sharing L Harn, C Lin IEEE transactions on computers 59 (6), 842-846, 2010 | 218 | 2010 |
Strong (n, t, n) verifiable secret sharing scheme L Harn, C Lin Information Sciences 180 (16), 3059-3064, 2010 | 123 | 2010 |
Detection and identification of cheaters in (t, n) secret sharing scheme L Harn, C Lin Designs, Codes and Cryptography 52 (1), 15-24, 2009 | 106 | 2009 |
Design of DL-based certificateless digital signatures L Harn, J Ren, C Lin Journal of Systems and Software 82 (5), 789-793, 2009 | 58 | 2009 |
Efficient group Diffie–Hellman key agreement protocols L Harn, C Lin Computers & Electrical Engineering 40 (6), 1972-1980, 2014 | 29 | 2014 |
Ideal perfect multilevel threshold secret sharing scheme C Lin, L Harn, D Ye 2009 Fifth International Conference on Information Assurance and Security 2 …, 2009 | 28 | 2009 |
Fair secret reconstruction in (t, n) secret sharing L Harn, C Lin, Y Li Journal of Information Security and Applications 23, 1-7, 2015 | 27 | 2015 |
Efficient on-line/off-line signature schemes based on multiple-collision trapdoor hash families L Harn, WJ Hsin, C Lin The Computer Journal 53 (9), 1478-1484, 2010 | 24 | 2010 |
Provably secure convertible nominative signature scheme W Zhao, C Lin, D Ye International Conference on Information Security and Cryptology, 23-40, 2008 | 19 | 2008 |
Security of truncated MACs P Wang, D Feng, C Lin, W Wu International Conference on Information Security and Cryptology, 96-114, 2008 | 14 | 2008 |
Fully deniable message authentication protocols preserving confidentiality L Harn, CY Lee, C Lin, CC Chang The Computer Journal 54 (10), 1688-1699, 2011 | 11 | 2011 |
Unconditionally secure verifiable secret sharing scheme C Lin, L Harn AISS: Advances in Information Sciences and Service Sciences 4 (17), 514-518, 2012 | 10 | 2012 |
An efficient group authentication for group communications L Harn, C Lin arXiv preprint arXiv:1306.1436, 2013 | 9 | 2013 |
Ciphertext-Auditable Identity-Based Encryption. C Lin, Y Li, K Lv, CC Chang Int. J. Netw. Secur. 17 (1), 23-28, 2015 | 6 | 2015 |
Unconditionally secure multi-secret sharing scheme C Lin, L Harn 2012 IEEE International Conference on Computer Science and Automation …, 2012 | 6 | 2012 |
Efficient identity-based GQ multisignatures L Harn, J Ren, C Lin International Journal of Information Security 8 (3), 205-210, 2009 | 6 | 2009 |
Universal designated verifier signcryption F Tang, C Lin, P Ke International Conference on Network and System Security, 126-134, 2012 | 5 | 2012 |
基于门限属性加密的安全分布式云存储模型 吴胜艳, 许力, 林昌露 计算机应用 33 (7), 1880-1884, 2013 | 4 | 2013 |
针对一类无证书签名方案的攻击及改进 郭玲玲, 林昌露, 张胜元 计算机工程 38 (16), 134-137, 2012 | 3 | 2012 |
基于多方排序协议的安全电子投票方案 杨婷婷, 林昌露, 刘忆宁, 张胜元 计算机系统应用 24 (8), 25-32, 2015 | 2 | 2015 |