An ideal multi-secret sharing scheme based on MSP CF Hsu, Q Cheng, X Tang, B Zeng Information Sciences 181 (7), 1403-1409, 2011 | 63 | 2011 |
Predistribution scheme for establishing group keys in wireless sensor networks L Harn, CF Hsu IEEE Sensors Journal 15 (9), 5103-5108, 2015 | 47 | 2015 |
Novel design of secure end-to-end routing protocol in wireless sensor networks L Harn, CF Hsu, O Ruan, MY Zhang IEEE Sensors Journal 16 (6), 1779-1785, 2015 | 45 | 2015 |
A novel group key transfer for big data security C Hsu, B Zeng, M Zhang Applied Mathematics and Computation 249, 436-443, 2014 | 41 | 2014 |
Dynamic threshold secret reconstruction and its application to the threshold cryptography L Harn, CF Hsu Information Processing Letters 115 (11), 851-857, 2015 | 35 | 2015 |
Secret sharing with secure secret reconstruction L Harn, Z Xia, C Hsu, Y Liu Information Sciences 519, 1-8, 2020 | 32 | 2020 |
Computation-efficient key establishment in wireless group communications CF Hsu, L Harn, Y Mu, M Zhang, X Zhu Wireless Networks 23, 289-297, 2017 | 31 | 2017 |
A provably secure and lightweight identity-based two-party authenticated key agreement protocol for vehicular ad hoc networks Q Li, CF Hsu, KK Raymond Choo, D He Security and Communication Networks 2019, 1-13, 2019 | 29 | 2019 |
Realizing secret sharing with general access structure L Harn, C Hsu, M Zhang, T He, M Zhang Information Sciences 367, 209-220, 2016 | 28 | 2016 |
Fast multivariate-polynomial-based membership authentication and key establishment for secure group communications in WSN Q Cheng, C Hsu, Z Xia, L Harn IEEE Access 8, 71833-71839, 2020 | 24 | 2020 |
Centralized group key establishment protocol without a mutually trusted third party L Harn, CF Hsu, B Li Mobile Networks and Applications 23, 1132-1140, 2018 | 22 | 2018 |
A practical hybrid group key establishment for secure group communications L Harn, CF Hsu The Computer Journal 60 (11), 1582-1589, 2017 | 22 | 2017 |
How to share secret efficiently over networks L Harn, CF Hsu, Z Xia, J Zhou Security and Communication Networks 2017, 2017 | 22 | 2017 |
(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial L Harn, CF Hsu Wireless Personal Communications 95, 1495-1504, 2017 | 22 | 2017 |
Multipartite secret sharing based on CRT CF Hsu, L Harn Wireless personal communications 78 (1), 271-282, 2014 | 21 | 2014 |
Lightweight noninteractive membership authentication and group key establishment for WSNs Q Cheng, C Hsu, L Harn Mathematical Problems in Engineering 2020, 2020 | 20 | 2020 |
An ideal multi-secret sharing scheme based on connectivity of graphs CF Hsu, L Harn, G Cui Wireless personal communications 77 (1), 383-394, 2014 | 18 | 2014 |
A quantum secure and noninteractive identity-based aggregate signature protocol from lattices Q Li, M Luo, C Hsu, L Wang, D He IEEE Systems Journal 16 (3), 4816-4826, 2021 | 17 | 2021 |
Lightweight aggregated data encryption for wireless sensor networks (WSNs) L Harn, CF Hsu, Z Xia, Z He IEEE Sensors Letters 5 (4), 1-4, 2021 | 17 | 2021 |
A novel linear multi-secret sharing scheme for group communication in wireless mesh networks CF Hsu, GH Cui, Q Cheng, J Chen Journal of network and computer applications 34 (2), 464-468, 2011 | 17 | 2011 |