Lein Harn

5.0k total citations
183 papers, 3.2k citations indexed

About

Lein Harn is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Lein Harn has authored 183 papers receiving a total of 3.2k indexed citations (citations by other indexed papers that have themselves been cited), including 145 papers in Artificial Intelligence, 96 papers in Computer Networks and Communications and 72 papers in Information Systems. Recurrent topics in Lein Harn's work include Cryptography and Data Security (130 papers), Advanced Authentication Protocols Security (60 papers) and Security in Wireless Sensor Networks (53 papers). Lein Harn is often cited by papers focused on Cryptography and Data Security (130 papers), Advanced Authentication Protocols Security (60 papers) and Security in Wireless Sensor Networks (53 papers). Lein Harn collaborates with scholars based in United States, China and Taiwan. Lein Harn's co-authors include Ching-Fang Hsu, Hung‐Yu Lin, Jian Ren, M. Mehta, Changlu Lin, Dijiang Huang, Deep Medhi, Ching‐Nung Yang, Yanyan Xu and Zhe Xia and has published in prestigious journals such as PLoS ONE, IEEE Transactions on Information Theory and Communications of the ACM.

In The Last Decade

Lein Harn

174 papers receiving 2.9k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Lein Harn United States 31 2.2k 1.4k 1.2k 856 367 183 3.2k
Phillip Rogaway United States 23 3.8k 1.8× 1.6k 1.1× 1.3k 1.1× 887 1.0× 322 0.9× 51 4.4k
David Pointcheval France 17 2.1k 1.0× 1.2k 0.9× 1.1k 0.9× 280 0.3× 302 0.8× 72 2.5k
Eiji Okamoto Japan 18 1.5k 0.7× 744 0.5× 892 0.7× 303 0.4× 597 1.6× 239 2.3k
Huaxiong Wang Singapore 24 1.5k 0.7× 628 0.4× 858 0.7× 381 0.4× 274 0.7× 144 2.0k
Dengguo Feng China 22 1.3k 0.6× 899 0.6× 1.1k 0.9× 371 0.4× 188 0.5× 228 2.1k
Jean-Jacques Quisquater Belgium 25 1.9k 0.9× 780 0.5× 719 0.6× 831 1.0× 305 0.8× 120 2.6k
Kenneth G. Paterson United Kingdom 25 2.1k 1.0× 1.2k 0.8× 836 0.7× 347 0.4× 937 2.6× 111 3.0k
Jianhua Chen China 27 1.5k 0.7× 1.8k 1.2× 1.6k 1.3× 334 0.4× 263 0.7× 116 2.7k
Christian Cachin Switzerland 29 1.2k 0.5× 1.4k 1.0× 1.1k 0.9× 350 0.4× 213 0.6× 79 2.4k
Kee-Young Yoo South Korea 27 865 0.4× 1.6k 1.1× 1.5k 1.3× 739 0.9× 222 0.6× 165 2.5k

Countries citing papers authored by Lein Harn

Since Specialization
Citations

This map shows the geographic impact of Lein Harn's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Lein Harn with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Lein Harn more than expected).

Fields of papers citing papers by Lein Harn

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Lein Harn. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Lein Harn. The network helps show where Lein Harn may publish in the future.

Co-authorship network of co-authors of Lein Harn

This figure shows the co-authorship network connecting the top 25 collaborators of Lein Harn. A scholar is included among the top collaborators of Lein Harn based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Lein Harn. Lein Harn is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hsu, Ching-Fang, et al.. (2024). A revocable and comparable attribute-based signature scheme from lattices for IoMT. Journal of Systems Architecture. 154. 103222–103222. 5 indexed citations
2.
Hsu, Ching-Fang, et al.. (2024). Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones. Cybersecurity. 7(1). 2 indexed citations
3.
Li, Long, et al.. (2024). Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks. IEEE Transactions on Information Forensics and Security. 19. 9629–9642. 4 indexed citations
4.
Hsu, Ching-Fang, et al.. (2023). Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities. Information Sciences. 647. 119488–119488. 3 indexed citations
5.
Hsu, Ching-Fang, et al.. (2022). A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments. IEEE Transactions on Dependable and Secure Computing. 20(4). 3535–3545. 16 indexed citations
6.
He, Zhangqing, et al.. (2020). A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test. IEEE Access. 8. 181751–181762. 51 indexed citations
7.
Wang, Meijuan, et al.. (2018). Inverted XML Access Control Model based on Ontology Semantic Dependency. Cmc-computers Materials & Continua. 55(3). 465–482. 10 indexed citations
8.
Harn, Lein, Ching-Fang Hsu, Zhe Xia, & Junwei Zhou. (2017). How to Share Secret Efficiently over Networks. Security and Communication Networks. 2017. 1–6. 21 indexed citations
9.
Harn, Lein, et al.. (2016). Threshold Signature Scheme without Using Polynomial Interpolation. International journal of network security. 18. 710–717. 6 indexed citations
10.
Chang, Chin‐Chen, et al.. (2014). A Pairing-free ID-based Key Agreement Protocol with Different PKGs. International journal of network security. 16(2). 143–148. 21 indexed citations
11.
Harn, Lein, et al.. (2013). An Anonymous Multi-Receiver Encryption Based on RSA. International journal of network security. 15. 307–312. 9 indexed citations
12.
Mao, Qian, et al.. (2013). An image-based key agreement protocol using the morphing technique. Multimedia Tools and Applications. 74(9). 3207–3229. 1 indexed citations
13.
Zhang, Yuqing, et al.. (2012). Verifiable symmetric polynomial‐based key distribution schemes. Security and Communication Networks. 6(8). 1028–1034. 1 indexed citations
14.
Lin, Changlu, et al.. (2009). Ideal Perfect Multilevel Threshold Secret Sharing Scheme. 118–121. 10 indexed citations
15.
Hsin, Wen‐Jung & Lein Harn. (2005). The e-Traveler's Check.. International Conference on Internet Computing. 59–65. 1 indexed citations
16.
Harn, Lein & Wen‐Jung Hsin. (2003). On the security of wireless network access with enhancements. 88–95. 19 indexed citations
17.
Harn, Lein. (1996). Reply: Public-key cryptosystem design based on factoring and discrete logarithms. IEE Proceedings - Computers and Digital Techniques. 143(1). 96–96. 1 indexed citations
18.
Harn, Lein. (1995). Multistage secret sharing based on one-way function. Electronics Letters. 31(4). 3 indexed citations
19.
Harn, Lein, et al.. (1990). An efficient probabilistic encryption scheme. Information Processing Letters. 34(3). 123–129. 7 indexed citations
20.
Harn, Lein, Daren Huang, & Chi‐Sung Laih. (1989). Password authentication using public-key cryptography. Computers & Mathematics with Applications. 18(12). 1001–1017. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026