An ideal multi-secret sharing scheme based on MSP CF Hsu, Q Cheng, X Tang, B Zeng Information Sciences 181 (7), 1403-1409, 2011 | 64 | 2011 |
Predistribution scheme for establishing group keys in wireless sensor networks L Harn, CF Hsu IEEE Sensors Journal 15 (9), 5103-5108, 2015 | 53 | 2015 |
Novel design of secure end-to-end routing protocol in wireless sensor networks L Harn, CF Hsu, O Ruan, MY Zhang IEEE Sensors Journal 16 (6), 1779-1785, 2015 | 46 | 2015 |
A novel group key transfer for big data security C Hsu, B Zeng, M Zhang Applied Mathematics and Computation 249, 436-443, 2014 | 42 | 2014 |
Dynamic threshold secret reconstruction and its application to the threshold cryptography L Harn, CF Hsu Information Processing Letters 115 (11), 851-857, 2015 | 38 | 2015 |
A Provably Secure and Lightweight Identity‐Based Two‐Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks Q Li, CF Hsu, KK Raymond Choo, D He Security and Communication Networks 2019 (1), 7871067, 2019 | 36 | 2019 |
Secret sharing with secure secret reconstruction L Harn, Z Xia, C Hsu, Y Liu Information Sciences 519, 1-8, 2020 | 32 | 2020 |
Computation-efficient key establishment in wireless group communications CF Hsu, L Harn, Y Mu, M Zhang, X Zhu Wireless Networks 23, 289-297, 2017 | 31 | 2017 |
Realizing secret sharing with general access structure L Harn, C Hsu, M Zhang, T He, M Zhang Information Sciences 367, 209-220, 2016 | 31 | 2016 |
Fast multivariate-polynomial-based membership authentication and key establishment for secure group communications in WSN Q Cheng, C Hsu, Z Xia, L Harn IEEE Access 8, 71833-71839, 2020 | 26 | 2020 |
Centralized group key establishment protocol without a mutually trusted third party L Harn, CF Hsu, B Li Mobile Networks and Applications 23, 1132-1140, 2018 | 25 | 2018 |
How to share secret efficiently over networks L Harn, CF Hsu, Z Xia, J Zhou Security and Communication Networks 2017 (1), 5437403, 2017 | 25 | 2017 |
A quantum secure and noninteractive identity-based aggregate signature protocol from lattices Q Li, M Luo, C Hsu, L Wang, D He IEEE Systems Journal 16 (3), 4816-4826, 2021 | 24 | 2021 |
Lightweight aggregated data encryption for wireless sensor networks (WSNs) L Harn, CF Hsu, Z Xia, Z He IEEE Sensors Letters 5 (4), 1-4, 2021 | 23 | 2021 |
Multipartite secret sharing based on CRT CF Hsu, L Harn Wireless personal communications 78 (1), 271-282, 2014 | 23 | 2014 |
Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things H Xu, C Hsu, L Harn, J Cui, Z Zhao, Z Zhang IEEE Transactions on Services Computing 16 (4), 3000-3013, 2023 | 22 | 2023 |
A practical hybrid group key establishment for secure group communications L Harn, CF Hsu The Computer Journal 60 (11), 1582-1589, 2017 | 22 | 2017 |
(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial L Harn, CF Hsu Wireless Personal Communications 95, 1495-1504, 2017 | 22 | 2017 |
Lightweight noninteractive membership authentication and group key establishment for WSNs Q Cheng, C Hsu, L Harn Mathematical Problems in Engineering 2020 (1), 1452546, 2020 | 21 | 2020 |
Cryptanalysis and improvement of a group authentication scheme with multiple trials and multiple authentications Z Xia, Y Liu, CF Hsu, CC Chang Security and Communication Networks 2020 (1), 6183861, 2020 | 21 | 2020 |