Lein Harn
YOU?
Author Swipe
View article: A new robust PKC encryption method based on invertible matrix multiplication for HIE in medical IoT systems
A new robust PKC encryption method based on invertible matrix multiplication for HIE in medical IoT systems Open
Electronic health information exchange (HIE) allows doctors, nurses, pharmacists, other health care providers and patients to appropriately access and securely share a patient’s vital medical information electronically—improving the speed,…
View article: Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones Open
As mobile internet and Internet of Things technologies continue to advance, the application scenarios of peer-to-peer Internet of Drones (IoD) are becoming increasingly diverse. However, the development of IoD also faces significant challe…
View article: Lightweight Privacy-Preserving (t, m, n) Multi-Party Computation Based on Secret Sharing in Untrusted Cloud Environments
Lightweight Privacy-Preserving (t, m, n) Multi-Party Computation Based on Secret Sharing in Untrusted Cloud Environments Open
The next generation of Internet of Things (IoT) networks and mobile communications (5G IoT networks) has the particularity of being heterogeneous, therefore, it has very strong ability to compute, store, etc. Group-oriented applications de…
View article: Practical Undeniable Multiparty Drawing-Straw Protocol in Asynchronous Networks for Resource-Constrained Information Systems
Practical Undeniable Multiparty Drawing-Straw Protocol in Asynchronous Networks for Resource-Constrained Information Systems Open
The next generation of mobile networks and communications (5G networks) has a very strong ability to compute, store, and so on. Group-oriented applications demonstrate their potential ability in resource-constrained information systems (RI…
View article: A Fast VANET-Assisted Scheme for Event Data Recorders
A Fast VANET-Assisted Scheme for Event Data Recorders Open
An event data recorder (EDR) is a device installed in a vehicle to record information. Similar to a black box in an airplane, an EDR is used in the study of automobile accidents. Many schemes have been proposed that use vehicle network tec…
View article: Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs)
Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs) Open
Sensitive data collected by a wireless sensor network (WSN) should be protected by a secret key shared between two adjacent (or neighboring) sensors. Sensors are mobile devices with limited memory and computational power, and sensors are d…
View article: An HSS‐based robust and lightweight multiple group authentication for ITS towards 5G
An HSS‐based robust and lightweight multiple group authentication for ITS towards 5G Open
The next generation of network communications (5G) has the particularity of being heterogeneous, which has different abilities with storage, computing and communication. Group communications is more and more popular for Intelligent Transpo…
View article: PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks
PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks Open
Because of the movements of sensor nodes and unknown mobility pattern, how to ensure two communicating (static or mobile) nodes authenticate and share a pairwise key is important. In this paper, we propose a mutual-authenticated key distri…
View article: Lightweight Privacy‐Preserving Data Sharing Scheme for Internet of Medical Things
Lightweight Privacy‐Preserving Data Sharing Scheme for Internet of Medical Things Open
Internet of Medical Things (IoMT) is a kind of Internet of Things (IoT) that includes patients and medical sensors. Patients can share real‐time medical data collected in IoMT with medical professionals. This enables medical professionals …
View article: Non‐interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks
Non‐interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks Open
Group‐oriented applications show its potential ability in the next generation of wireless sensor networks (5G WSNs), which have the particularity of being heterogeneous and so have different capabilities in terms of storage, computing, com…
View article: A New Efficient and Secure Secret Reconstruction Scheme (SSRS) with Verifiable Shares Based on a Symmetric Bivariate Polynomial
A New Efficient and Secure Secret Reconstruction Scheme (SSRS) with Verifiable Shares Based on a Symmetric Bivariate Polynomial Open
Secret sharing (SS) schemes have been widely used in secure computer communications systems. Recently, a new type of SS scheme, called the secure secret reconstruction scheme (SSRS), was proposed, which ensures that the secret can only be …
View article: Lightweight Noninteractive Membership Authentication and Group Key Establishment for WSNs
Lightweight Noninteractive Membership Authentication and Group Key Establishment for WSNs Open
Wireless sensor networks (WSNs) exhibit their potential capacity in the next generation of mobile communication networks and wireless systems (5G). Collected data in WSNs are different from most data transmitted in digital communication ap…
View article: Lightweight group key distribution schemes based on pre‐shared pairwise keys
Lightweight group key distribution schemes based on pre‐shared pairwise keys Open
In a secure communication, a one‐time session key is needed to be shared among all participants. Most well‐known key distribution schemes, such as Diffie–Hellman public‐key key distribution scheme invented in 1976 and quantum key distribut…
View article: Reliable and efficient PUF‐based cryptographic key generator using bit self‐tests
Reliable and efficient PUF‐based cryptographic key generator using bit self‐tests Open
This Letter proposes a reliable and lightweight key generator based on a novel bit‐self‐test arbiter physically unclonable function (BST‐APUF). The BST‐APUF adds a delay detection circuit into a classical APUF to automatically test the del…
View article: Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir’s SS for 5G Networks
Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir’s SS for 5G Networks Open
Wireless group communications and mobile computing have demonstrated its potential capacity in the next generation of mobile communication networks and wireless systems (5G), where devices have the particularity of being heterogeneous and …
View article: Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN
Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN Open
The primary task of secure group communications in wireless sensor networks (WSNs) is to securely transmit various types of data, for example weather data, traffic data, etc. Collected data in WSNs is different from most data transmitted i…
View article: PUF-based Key Distribution in Wireless Sensor Networks
PUF-based Key Distribution in Wireless Sensor Networks Open
Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict. Therefore, PUFs with unclonable and unpredictable properties are welcome to be a…
View article: A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test
A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test Open
Physically unclonable functions (PUFs) promise to be a critical hardware primitive for billions of Internet of Things (IoT) devices. The arbiter PUF (A-PUF) is one of the most well-known PUF circuits. However, its FPGA implementation has a…
View article: An efficient and adaptive data-hiding scheme based on secure random matrix
An efficient and adaptive data-hiding scheme based on secure random matrix Open
There is a vivid research on securely deliver a secret message by using a data hiding technique in digital images. However, most existing solutions of data-hiding need to encrypt secret data first, and embed the encrypt message into cover …
View article: Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN) Open
Securing data transferred over a WSN is required to protect data from being compromised by attackers. Sensors in the WSN must share keys that are utilized to protect data transmitted between sensor nodes. There are several approaches intro…
View article: Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks
Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks Open
A novel design of secure end-to-end routing protocol in wireless sensor networks was recently proposed by Harn et al. Their design is based on a group key pre-distribution scheme (GKPS) using a multivariate polynomial. A group key also cal…
View article: Research on Blending Learning Flipped Class Model in Colleges and Universities Based on Computational Thinking — “Database Principles” for Example
Research on Blending Learning Flipped Class Model in Colleges and Universities Based on Computational Thinking — “Database Principles” for Example Open
Computational thinking is to use heuristic reasoning to seek the solution of the problem, and has a strong ability to innovate. In the teaching of computer courses, it is one of the important subjects of teaching research to cultivate stud…
View article: A Novel Design of Membership Authentication and Group Key Establishment Protocol
A Novel Design of Membership Authentication and Group Key Establishment Protocol Open
A new type of authentication, called group authentication , has been proposed recently which can authenticate all users belonging to the same group at once in a group communication. However, the group authentication can only detect the exi…
View article: How to Share Secret Efficiently over Networks
How to Share Secret Efficiently over Networks Open
In a secret-sharing scheme, the secret is shared among a set of shareholders, and it can be reconstructed if a quorum of these shareholders work together by releasing their secret shares. However, in many applications, it is undesirable fo…