D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 33 Citations 5,586 179 World Ranking 8567 National Ranking 3965

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer network
  • Public-key cryptography

His primary scientific interests are in Cryptography, Public-key cryptography, Computer security, Digital signature and Theoretical computer science. His Cryptography study incorporates themes from Key, Discrete logarithm, Key size and Key encapsulation. His Public-key cryptography research is multidisciplinary, incorporating elements of Challenge-Handshake Authentication Protocol, Signature and Arithmetic.

His Computer security study frequently links to adjacent areas such as Verifiable secret sharing. The various areas that he examines in his Digital signature study include Cryptographic hash function and Computer network, Authentication. His Theoretical computer science research includes themes of Discrete mathematics, Finite field, XTR, Encryption and Key distribution.

His most cited work include:

  • Group-oriented (t, n) threshold digital signature scheme and digital multisignature (278 citations)
  • Location-aware key management scheme for wireless sensor networks (224 citations)
  • Refereed article: A cryptographic key generation scheme for multilevel data security (178 citations)

What are the main themes of his work throughout his whole career to date?

Lein Harn spends much of his time researching Computer security, Cryptography, Secret sharing, Computer network and Theoretical computer science. His Cryptography study integrates concerns from other disciplines, such as Signature and Discrete logarithm, Encryption, Public-key cryptography. His biological study deals with issues like Digital signature, which deal with fields such as Algorithm.

His Secret sharing study combines topics from a wide range of disciplines, such as Secure multi-party computation, Verifiable secret sharing, Group key and Key distribution. The concepts of his Computer network study are interwoven with issues in Key distribution in wireless sensor networks, Key and Distributed computing. His studies in Theoretical computer science integrate themes in fields like Polynomial and Group.

He most often published in these fields:

  • Computer security (41.01%)
  • Cryptography (37.64%)
  • Secret sharing (30.34%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer network (28.65%)
  • Cryptography (37.64%)
  • Secret sharing (30.34%)

In recent papers he was focusing on the following fields of study:

Lein Harn mainly investigates Computer network, Cryptography, Secret sharing, Group key and Theoretical computer science. His Computer network research includes elements of Key distribution in wireless sensor networks, Key establishment and Key. The Cryptography study combines topics in areas such as Field-programmable gate array, Arbiter, Scalability and Authentication.

His Secret sharing research entails a greater understanding of Computer security. His Theoretical computer science study combines topics in areas such as Bivariate polynomials, Verifiable secret sharing, Group and Communications system. Lein Harn works mostly in the field of Node, limiting it down to topics relating to Homomorphic encryption and, in certain cases, Public-key cryptography.

Between 2017 and 2021, his most popular works were:

  • Reliable and efficient PUF-based cryptographic key generator using bit self-tests (20 citations)
  • After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange (14 citations)
  • Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party (11 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • The Internet

His main research concerns Computer security, Information security, Secret sharing, Computer network and Key distribution. Lein Harn has researched Computer security in several fields, including Certificate, Bounded function and Formal proof. His work carried out in the field of Information security brings together such families of science as Ontology, Cryptographic protocol, Secrecy, Robustness and Big data.

His Computer network research is multidisciplinary, relying on both Probabilistic logic and Polynomial. The Wireless sensor network study combines topics in areas such as Key management, Overhead, Secure communication and Routing protocol. His study in Group key is interdisciplinary in nature, drawing from both Trusted third party, Communication in small groups, Server and Channel.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Group-oriented (t, n) threshold digital signature scheme and digital multisignature

L. Harn.
IEE Proceedings - Computers and Digital Techniques (1994)

512 Citations

Location-aware key management scheme for wireless sensor networks

Dijiang Huang;Manish Mehta;Deep Medhi;Lein Harn.
security of ad hoc and sensor networks (2004)

346 Citations

Refereed article: A cryptographic key generation scheme for multilevel data security

Lein Harn;Hung-Yu Lin.
Computers & Security (1990)

272 Citations

Efficient sharing (broadcasting) of multiple secrets

L. Harn.
IEE Proceedings - Computers and Digital Techniques (1995)

254 Citations

New digital signature scheme based on discrete logarithm

L. Harn.
Electronics Letters (1994)

216 Citations

Design of generalised ElGamal type digital signature schemes based on discrete logarithm

L. Harn;Y. Xu.
Electronics Letters (1994)

215 Citations

Public-key cryptosystems based on cubic finite field extensions

Guang Gong;Lein Harn.
IEEE Transactions on Information Theory (1999)

153 Citations

Public-key cryptosystem design based on factoring and discrete logarithms

L. Harn.
IEE Proceedings - Computers and Digital Techniques (1994)

151 Citations

Group Authentication

L. Harn.
IEEE Transactions on Computers (2013)

135 Citations

Strong (n,t,n) verifiable secret sharing scheme

Lein Harn;Changlu Lin.
Information Sciences (2010)

127 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Lein Harn

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 68

Min-Shiang Hwang

Min-Shiang Hwang

Asia University Taiwan

Publications: 47

Ching-Nung Yang

Ching-Nung Yang

National Dong Hwa University

Publications: 40

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 22

Alfredo De Santis

Alfredo De Santis

University of Salerno

Publications: 19

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 19

Tzonelih Hwang

Tzonelih Hwang

National Cheng Kung University

Publications: 17

Feng Ding

Feng Ding

Jiangnan University

Publications: 17

Yuguang Fang

Yuguang Fang

City University of Hong Kong

Publications: 13

Chris Mitchell

Chris Mitchell

Royal Holloway University of London

Publications: 12

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 11

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 11

Tasawar Hayat

Tasawar Hayat

Quaid-i-Azam University

Publications: 11

Mukesh Singhal

Mukesh Singhal

University of California, Merced

Publications: 10

Chin-Laung Lei

Chin-Laung Lei

National Taiwan University

Publications: 10

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 10

Trending Scientists

Nicolas Halbwachs

Nicolas Halbwachs

Grenoble Alpes University

Federico Carpi

Federico Carpi

University of Florence

Marshall N. Rosenbluth

Marshall N. Rosenbluth

University of California, San Diego

Jinli Zhang

Jinli Zhang

Tianjin University

David J. Fermín

David J. Fermín

University of Bristol

Iván Mora-Seró

Iván Mora-Seró

Jaume I University

Christopher Neill

Christopher Neill

Woods Hole Research Center

Hanne F. Harbo

Hanne F. Harbo

Oslo University Hospital

Finn K. Vogensen

Finn K. Vogensen

University of Copenhagen

Patrizia Brigidi

Patrizia Brigidi

University of Bologna

Marie Weiss

Marie Weiss

INRAE : Institut national de recherche pour l'agriculture, l'alimentation et l'environnement

Ivana Sartori

Ivana Sartori

University of Pavia

Bruce G. Cumming

Bruce G. Cumming

National Institutes of Health

Maya Frankfurt

Maya Frankfurt

Hofstra University

Vincenzo Mazzaferro

Vincenzo Mazzaferro

University of Milan

David H. Weaver

David H. Weaver

Indiana University

Something went wrong. Please try again later.