Search the dblp DataBase
Robert H. Deng :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Feng Bao , Robert H. Deng , Peirong Feng , Yan Guo , Hongjun Wu Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:190-205 [Conf ] Feng Bao , Robert H. Deng , Yongfei Han , Albert B. Jeng Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:261-270 [Conf ] Jianying Zhou , Robert H. Deng , Feng Bao Evolution of Fair Non-repudiation with TTP. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:258-269 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng Security Analysis and Improvement of the Global Key Recovery System. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:17-24 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng Security Analysis and Fix of an Anonymous Credential System. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:537-547 [Conf ] Hongjun Wu , Feng Bao , Dingfeng Ye , Robert H. Deng Cryptanalysis of the m -Permutation Protection Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:97-111 [Conf ] Hongjun Wu , Feng Bao , Dingfeng Ye , Robert H. Deng Cryptanalysis of Polynominal Authentication and Signature Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:278-288 [Conf ] Bok-Min Goi , Raphael Chung-Wei Phan , Yanjiang Yang , Feng Bao , Robert H. Deng , M. U. Siddiqi Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:369-382 [Conf ] Gang Yao , Kui Ren , Feng Bao , Robert H. Deng , Dengguo Feng Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:343-356 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng , Qin-Zhong Ye Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:126-132 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng , Qin-Zhong Ye Improved Truncated Differential Attacks on SAFER. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:133-147 [Conf ] Robert H. Deng , Jianying Zhou , Feng Bao Defending against redirect attacks in mobile IP. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:59-67 [Conf ] Robert H. Deng , Yongfei Han , Albert B. Jeng , Teow-Hin Ngair A New On-Line Cash Check Scheme. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:111-116 [Conf ] Yanjiang Yang , Robert H. Deng , Feng Bao Fortifying password authentication in integrated healthcare delivery systems. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:255-265 [Conf ] Yanjiang Yang , Robert H. Deng , Feng Bao Practical private data matching deterrent to spoofing attacks. [Citation Graph (0, 0)][DBLP ] CIKM, 2006, pp:852-853 [Conf ] Feng Bao , Robert H. Deng , Khanh Quoc Nguyen , Vijay Varadharajan Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1999, pp:858-863 [Conf ] Shuhong Wang , Xuhua Ding , Robert H. Deng , Feng Bao Private Information Retrieval Using Trusted Hardware. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:49-64 [Conf ] Bo Zhu , Tieyan Li , Huafei Zhu , Mohan S. Kankanhalli , Feng Bao , Robert H. Deng Trust Establishment in Large Scale Grid Settings. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:317-324 [Conf ] Elisa Bertino , Beng Chin Ooi , Yanjiang Yang , Robert H. Deng Privacy and Ownership Preserving of Outsourced Medical Data. [Citation Graph (0, 0)][DBLP ] ICDE, 2005, pp:521-532 [Conf ] Feng Bao , Robert H. Deng Privacy Protection for Transactions of Digital Goods. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:202-213 [Conf ] Feng Bao , Robert H. Deng , Huafei Zhu Variations of Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:301-312 [Conf ] Yongdong Wu , Robert H. Deng Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:238-248 [Conf ] Tieyan Li , Yongdong Wu , Di Ma , Huafei Zhu , Robert H. Deng Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:79-91 [Conf ] Di Ma , Robert H. Deng , HweeHwa Pang , Jianying Zhou Authenticating Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:376-388 [Conf ] Di Ma , Robert H. Deng , Yongdong Wu , Tieyan Li Dynamic Access Control for Multi-privileged Group Communications. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:508-519 [Conf ] Shuhong Wang , Feng Bao , Robert H. Deng Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:53-60 [Conf ] Guilin Wang , Feng Bao , Jianying Zhou , Robert H. Deng Security Remarks on a Group Signature Scheme with Member Deletion. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:72-83 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng An Efficient Known Plaintext Attack on FEA-M. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:84-87 [Conf ] Jianying Zhou , Feng Bao , Robert H. Deng An Efficient Public-Key Framework. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:88-99 [Conf ] Huafei Zhu , Feng Bao , Robert H. Deng Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:207-219 [Conf ] Yongdong Wu , Robert H. Deng Compliant encryption of jpeg2000 codestreanis. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:3439-3442 [Conf ] Yongdong Wu , Di Ma , Robert H. Deng Progressive protection of jpeg2000 codestreams. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:3447-3450 [Conf ] Siyuan Liu , Shuhong Wang , Robert H. Deng , Weizhong Shao A Block Oriented Fingerprinting Scheme in Relational Database. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:455-466 [Conf ] Feng Bao , Robert H. Deng , Peirong Feng An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:162-170 [Conf ] Kisik Chang , Robert H. Deng , Feng Bao , Sangjin Lee , HyungJun Kim , Jongin Lim On Security Notions for Steganalysis. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:440-454 [Conf ] Guilin Wang , Feng Bao , Jianying Zhou , Robert H. Deng Security Analysis of Some Proxy Signatures. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:305-319 [Conf ] Robert H. Deng , Aurel A. Lazar , Weiguo Wang A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 1993, pp:697-708 [Conf ] Marc Joye , Jean-Jacques Quisquater , Feng Bao , Robert H. Deng RSA-type Signatures in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1997, pp:155-160 [Conf ] Robert H. Deng , Wendy C. L. Chiew , Kuan-Tsae Huang Analysis of Token Ring Networks with Both Finite and Infinite Buffer Capacity Stations. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1991, pp:202-210 [Conf ] Robert H. Deng , Xian-Yu Zhang , Kuan-Tsae Huang Token-passing Systems with Batch Arrivals and their Application to Multimedia File Transfer over Token-ring LANs. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1991, pp:1041-1049 [Conf ] Yanjiang Yang , Zhenlan Wang , Feng Bao , Robert H. Deng Secure the image-based simulated telesurgery system. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2003, pp:596-599 [Conf ] Yanjiang Yang , Robert H. Deng , Feng Bao Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:177-192 [Conf ] Robert H. Deng , Yanjiang Yang Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:284-300 [Conf ] Feng Bao , Robert H. Deng , Xiang Gao , Yoshihide Igarashi Modified Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:82-95 [Conf ] Jie Guo , Yingjiu Li , Robert H. Deng , Kefei Chen Rights Protection for Data Cubes. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:359-372 [Conf ] Guilin Wang , Robert H. Deng , Dong Jin Kwak , Sang-Jae Moon Security Analysis of Two Signcryption Schemes. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:123-133 [Conf ] Jianying Zhou , Feng Bao , Robert H. Deng Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:96-110 [Conf ] Qibin Sun , Peirong Feng , Robert H. Deng An Optical Watermarking Solution for Authenticating Printed Documents. [Citation Graph (0, 0)][DBLP ] ITCC, 2001, pp:65-70 [Conf ] Kisik Chang , Robert H. Deng , Feng Bao , Sangjin Lee , HyungJun Kim On Security Notions of Steganographic Systems. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:137-151 [Conf ] Zhiguo Wan , Akkihebbal L. Ananda , Robert H. Deng , Feng Bao Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:328-335 [Conf ] Bo Zhu , Zhiguo Wan , Mohan S. Kankanhalli , Feng Bao , Robert H. Deng Anonymous Secure Routing in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2004, pp:102-108 [Conf ] Ying Qiu , Jianying Zhou , Robert H. Deng Security Analysis and Improvement of Return Routability Protocol. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:174-181 [Conf ] Cheng Peng , Robert H. Deng , Yongdong Wu , Weizhong Shao A flexible and scalable authentication scheme for JPEG2000 image codestreams. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2003, pp:433-441 [Conf ] Feng Bao , Robert H. Deng A Signcryption Scheme with Signature Directly Verifiable by Public Key. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1998, pp:55-59 [Conf ] Feng Bao , Robert H. Deng A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:1-11 [Conf ] Feng Bao , Robert H. Deng , Willi Geiselmann , Claus-Peter Schnorr , Rainer Steinwandt , Hongjun Wu Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:153-164 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:173-179 [Conf ] Jianying Zhou , Robert H. Deng , Feng Bao Some Remarks on a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:46-57 [Conf ] Feng Bao , Robert H. Deng , Jianying Zhou Electronic Payment Systems with Fair On-line Verification. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:451-460 [Conf ] Yongdong Wu , Feng Bao , Robert H. Deng Secure Person-To-Person Communications Based on Biometrics Signals. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:205-222 [Conf ] Yongdong Wu , Tieyan Li , Robert H. Deng Protecting Group Dynamic Information in Large Scale Multicast Groups. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:459-476 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:95-112 [Conf ] Yingjiu Li , Haibing Lu , Robert H. Deng Practical Inference Control for Data Cubes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:115-120 [Conf ] Feng Bao , Robert H. Deng , Yongfei Han , Albert B. Jeng , A. Desai Narasimhalu , Teow-Hin Ngair Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:115-124 [Conf ] Guilin Wang , Jianying Zhou , Robert H. Deng On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:289-298 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng Flexible authentication of images. [Citation Graph (0, 0)][DBLP ] VCIP, 2003, pp:1905-1911 [Conf ] Robert H. Deng , Jian Hu , Feng Bao , A. Desai Narasimhalu A Ubiquitous Secure and Reliable Digital Data Depository System. [Citation Graph (0, 0)][DBLP ] WETICE, 1998, pp:354-358 [Conf ] Yunlei Zhao , Robert H. Deng , Binyu Zang , Yiming Zhao Practical Zero-Knowledge Arguments from Sigma-Protocols. [Citation Graph (0, 0)][DBLP ] WINE, 2005, pp:288-298 [Conf ] Kisenchand Ranai , Koon Seng Lim , Robert H. Deng Simulating a Multimedia FDDI Backbone Network. [Citation Graph (0, 0)][DBLP ] Comput. J., 1994, v:37, n:3, pp:188-198 [Journal ] Feng Bao , Robert H. Deng Protocols that hide user's preferences in electronic transactions. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:48, n:4, pp:503-515 [Journal ] Jiangling Du , Robert H. Deng , Chi Chung Ko Performance Analysis of Interconnected LANs with Server/Client Configuration. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1993, v:25, n:12, pp:1321-1333 [Journal ] Kui Ren , Tieyan Li , Zhiguo Wan , Feng Bao , Robert H. Deng , Kwangjo Kim Highly reliable trust establishment scheme in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:45, n:6, pp:687-699 [Journal ] Xian-Yu Zhang , Robert H. Deng Gateway Design for LAN Interconnection via ISDN. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1990, v:19, n:1, pp:43-51 [Journal ] Bo Zhu , Feng Bao , Robert H. Deng , Mohan S. Kankanhalli , Guilin Wang Efficient and robust key management for large mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:48, n:4, pp:657-682 [Journal ] Kui Ren , Wenjing Lou , Kai Zeng , Feng Bao , Jianying Zhou , Robert H. Deng Routing optimization security in mobile IPv6. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:13, pp:2401-2419 [Journal ] Brigitte Berg , Robert H. Deng End-to-end performance of interconnected LANs. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1991, v:14, n:2, pp:105-112 [Journal ] Robert H. Deng Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:6, pp:591-0 [Journal ] Robert H. Deng , Wendy C. L. Chiew Effects of station buffer capacity on token ring network performance. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1993, v:16, n:6, pp:366-375 [Journal ] Robert H. Deng , Renben Shu LAN-based medical visualization communication system. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1993, v:16, n:8, pp:518-525 [Journal ] Robert H. Deng , Xian-Yu Zhang , Kuan-Tsae Huang Performance of a token-passing system with batch arrivals and its application to file transfers. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1993, v:16, n:7, pp:422-431 [Journal ] Chi Chung Ko , W. C. Wong , J. L. Du , Robert H. Deng , Kin Mun Lye Performance analysis of two bridged CSMA/CD networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1993, v:16, n:8, pp:501-510 [Journal ] Koon Seng Lim , Robert H. Deng , Kisenchand Ranai Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:4, pp:251-256 [Journal ] Xinkai Wang , Robert H. Deng , Feng Bao Multicast Internet protocol. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:11, pp:1047-1054 [Journal ] Yanjiang Yang , Shuhong Wang , Feng Bao , Jie Wang , Robert H. Deng New efficient user identification and key distribution scheme providing enhanced security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:8, pp:697-704 [Journal ] Dong Jin Kwak , Sang-Jae Moon , Guilin Wang , Robert H. Deng A secure extension of the Kwak-Moon group signcryption scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:435-444 [Journal ] Shen-Tat Goh , HweeHwa Pang , Robert H. Deng , Feng Bao Three architectures for trusted data dissemination in edge computing. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2006, v:58, n:3, pp:381-409 [Journal ] Yunlei Zhao , Jesper Buus Nielsen , Robert H. Deng , Dengguo Feng Generic yet Practical ZK Arguments from any Public-Coin HVZK [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 2005, v:, n:162, pp:- [Journal ] Jianying Zhou , Feng Bao , Robert H. Deng Minimizing TTP's involvement in signature validation. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:1, pp:37-47 [Journal ] Hongjun Wu , Feng Bao , Robert H. Deng Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal ] Robert H. Deng , Li Gong , Aurel A. Lazar , Weiguo Wang Practical Protocols for Certified Electronic Mail. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 1996, v:4, n:3, pp:- [Journal ] Robert H. Deng , Aurel A. Lazar , Weiguo Wang A Probabilistic Approach to Fault Diagnosis in Linear Lightware Networks. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:9, pp:1438-1448 [Journal ] Robert H. Deng , Di Ma , Weizhong Shao , Yongdong Wu Scalable trusted online dissemination of JPEG2000 images. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2005, v:11, n:1, pp:60-67 [Journal ] Robert H. Deng , Shailendra K. Bhonsle , Weiguo Wang , Aurel A. Lazar Integrating Security in the CORBA Architecture. [Citation Graph (0, 0)][DBLP ] TAPOS, 1997, v:3, n:1, pp:3-13 [Journal ] Robert H. Deng , Daniel J. Costello Jr. Decoding of DBEC-TBED Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1987, v:36, n:11, pp:1359-1363 [Journal ] Gui Liang Feng , Robert H. Deng , Feng Bao , Jia-Chen Shen New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:9, pp:1071-1080 [Journal ] Gui Liang Feng , Robert H. Deng , Feng Bao , Jia-Chen Shen New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:12, pp:1473-1483 [Journal ] Yongdong Wu , Robert H. Deng Security of an ill-posed operator for image authentication. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2005, v:15, n:1, pp:161-163 [Journal ] Yanjiang Yang , Robert H. Deng , Feng Bao A Practical Password-Based Two-Server Authentication and Key Exchange System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:2, pp:105-114 [Journal ] Robert H. Deng , Mark A. Herro DC-free coset codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1988, v:34, n:4, pp:786-792 [Journal ] Yuan Xing Li , Robert H. Deng , Xin-mei Wang On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:271-0 [Journal ] Steven S. Pietrobon , Robert H. Deng , Alain Lafanechére , Gottfried Ungerboeck , Daniel J. Costello Jr. Trellis-coded multidimensional phase modulation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:1, pp:63-89 [Journal ] Feng Bao , Robert H. Deng , Beng Chin Ooi , Yanjiang Yang Tailored reversible watermarking schemes for authentication of electronic clinical atlas. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Technology in Biomedicine, 2005, v:9, n:4, pp:554-563 [Journal ] Yanjiang Yang , Xiaoxi Han , Feng Bao , Robert H. Deng A smart-card-enabled privacy preserving E-prescription system. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Technology in Biomedicine, 2004, v:8, n:1, pp:47-58 [Journal ] Guilin Wang , Feng Bao , Jianying Zhou , Robert H. Deng Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1309-1311 [Journal ] Yongdong Wu , Robert H. Deng Scalable authentication of MPEG-4 streams. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Multimedia, 2006, v:8, n:1, pp:152-161 [Journal ] Yongdong Wu , Feng Bao , Robert H. Deng Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:171-183 [Conf ] Yanjiang Yang , Yingjiu Li , Robert H. Deng New Paradigm of Inference Control with Trusted Computing. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:243-258 [Conf ] Zhiguo Wan , Robert H. Deng , Feng Bao , Bart Preneel n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:31-43 [Conf ] Bo Zhu , Guilin Wang , Zhiguo Wan , Mohan S. Kankanhalli , Feng Bao , Robert H. Deng Providing efficient certification services against active attacks in ad hoc networks. [Citation Graph (0, 0)][DBLP ] IPCCC, 2005, pp:285-292 [Conf ] Zhiguo Wan , Robert H. Deng , Feng Bao , Akkihebbal L. Ananda Access control protocols with two-layer architecture for wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:655-670 [Journal ] Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. [Citation Graph (, )][DBLP ] Conditional Proxy Broadcast Re-Encryption. [Citation Graph (, )][DBLP ] Revisiting Unpredictability-Based RFID Privacy Models. [Citation Graph (, )][DBLP ] Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. [Citation Graph (, )][DBLP ] RFID privacy: relation between two notions, minimal condition, and efficient construction. [Citation Graph (, )][DBLP ] Conditional proxy re-encryption secure against chosen-ciphertext attack. [Citation Graph (, )][DBLP ] Practical ID-based encryption for wireless sensor network. [Citation Graph (, )][DBLP ] Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. [Citation Graph (, )][DBLP ] Efficient CCA-Secure PKE from Identity-Based Techniques. [Citation Graph (, )][DBLP ] On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. [Citation Graph (, )][DBLP ] Privacy-enhanced superdistribution of layered content with trusted access control. [Citation Graph (, )][DBLP ] A New Framework for RFID Privacy. [Citation Graph (, )][DBLP ] Efficient Client-to-Client Password Authenticated Key Exchange. [Citation Graph (, )][DBLP ] Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. [Citation Graph (, )][DBLP ] Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. [Citation Graph (, )][DBLP ] On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. [Citation Graph (, )][DBLP ] Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. [Citation Graph (, )][DBLP ] Private Query on Encrypted Data in Multi-user Settings. [Citation Graph (, )][DBLP ] Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. [Citation Graph (, )][DBLP ] RSA-Based Certificateless Public Key Encryption. [Citation Graph (, )][DBLP ] Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. [Citation Graph (, )][DBLP ] Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. [Citation Graph (, )][DBLP ] Distinguishing between FE and DDoS Using Randomness Check. [Citation Graph (, )][DBLP ] An Efficient PIR Construction Using Trusted Hardware. [Citation Graph (, )][DBLP ] Efficient and Practical Fair Exchange Protocols with Off-Line TTP. [Citation Graph (, )][DBLP ] Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. [Citation Graph (, )][DBLP ] Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. [Citation Graph (, )][DBLP ] Attacks and improvements to an RIFD mutual authentication protocol and its extensions. [Citation Graph (, )][DBLP ] Efficient Unidirectional Proxy Re-Encryption. [Citation Graph (, )][DBLP ] Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. [Citation Graph (, )][DBLP ] Remote Attestation on Function Execution (Work-in-Progress). [Citation Graph (, )][DBLP ] On the validity of digital signatures. [Citation Graph (, )][DBLP ] Efficient discrete logarithm based multi-signature scheme in the plain public key model. [Citation Graph (, )][DBLP ] Search in 0.092secs, Finished in 0.101secs