The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Robert H. Deng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu
    Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:190-205 [Conf]
  2. Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng
    Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:261-270 [Conf]
  3. Jianying Zhou, Robert H. Deng, Feng Bao
    Evolution of Fair Non-repudiation with TTP. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:258-269 [Conf]
  4. Yanjiang Yang, Feng Bao, Robert H. Deng
    Security Analysis and Improvement of the Global Key Recovery System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:17-24 [Conf]
  5. Yanjiang Yang, Feng Bao, Robert H. Deng
    Security Analysis and Fix of an Anonymous Credential System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:537-547 [Conf]
  6. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
    Cryptanalysis of the m-Permutation Protection Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:97-111 [Conf]
  7. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
    Cryptanalysis of Polynominal Authentication and Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:278-288 [Conf]
  8. Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi
    Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:369-382 [Conf]
  9. Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng
    Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:343-356 [Conf]
  10. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
    Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:126-132 [Conf]
  11. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
    Improved Truncated Differential Attacks on SAFER. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:133-147 [Conf]
  12. Robert H. Deng, Jianying Zhou, Feng Bao
    Defending against redirect attacks in mobile IP. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:59-67 [Conf]
  13. Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair
    A New On-Line Cash Check Scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:111-116 [Conf]
  14. Yanjiang Yang, Robert H. Deng, Feng Bao
    Fortifying password authentication in integrated healthcare delivery systems. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:255-265 [Conf]
  15. Yanjiang Yang, Robert H. Deng, Feng Bao
    Practical private data matching deterrent to spoofing attacks. [Citation Graph (0, 0)][DBLP]
    CIKM, 2006, pp:852-853 [Conf]
  16. Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan
    Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:858-863 [Conf]
  17. Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
    Private Information Retrieval Using Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:49-64 [Conf]
  18. Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Trust Establishment in Large Scale Grid Settings. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:317-324 [Conf]
  19. Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng
    Privacy and Ownership Preserving of Outsourced Medical Data. [Citation Graph (0, 0)][DBLP]
    ICDE, 2005, pp:521-532 [Conf]
  20. Feng Bao, Robert H. Deng
    Privacy Protection for Transactions of Digital Goods. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:202-213 [Conf]
  21. Feng Bao, Robert H. Deng, Huafei Zhu
    Variations of Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:301-312 [Conf]
  22. Yongdong Wu, Robert H. Deng
    Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:238-248 [Conf]
  23. Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
    Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:79-91 [Conf]
  24. Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou
    Authenticating Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:376-388 [Conf]
  25. Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li
    Dynamic Access Control for Multi-privileged Group Communications. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:508-519 [Conf]
  26. Shuhong Wang, Feng Bao, Robert H. Deng
    Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:53-60 [Conf]
  27. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Security Remarks on a Group Signature Scheme with Member Deletion. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:72-83 [Conf]
  28. Hongjun Wu, Feng Bao, Robert H. Deng
    An Efficient Known Plaintext Attack on FEA-M. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:84-87 [Conf]
  29. Jianying Zhou, Feng Bao, Robert H. Deng
    An Efficient Public-Key Framework. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:88-99 [Conf]
  30. Huafei Zhu, Feng Bao, Robert H. Deng
    Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:207-219 [Conf]
  31. Yongdong Wu, Robert H. Deng
    Compliant encryption of jpeg2000 codestreanis. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:3439-3442 [Conf]
  32. Yongdong Wu, Di Ma, Robert H. Deng
    Progressive protection of jpeg2000 codestreams. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:3447-3450 [Conf]
  33. Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao
    A Block Oriented Fingerprinting Scheme in Relational Database. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:455-466 [Conf]
  34. Feng Bao, Robert H. Deng, Peirong Feng
    An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:162-170 [Conf]
  35. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim
    On Security Notions for Steganalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:440-454 [Conf]
  36. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Security Analysis of Some Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:305-319 [Conf]
  37. Robert H. Deng, Aurel A. Lazar, Weiguo Wang
    A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1993, pp:697-708 [Conf]
  38. Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng
    RSA-type Signatures in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1997, pp:155-160 [Conf]
  39. Robert H. Deng, Wendy C. L. Chiew, Kuan-Tsae Huang
    Analysis of Token Ring Networks with Both Finite and Infinite Buffer Capacity Stations. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1991, pp:202-210 [Conf]
  40. Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang
    Token-passing Systems with Batch Arrivals and their Application to Multimedia File Transfer over Token-ring LANs. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1991, pp:1041-1049 [Conf]
  41. Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng
    Secure the image-based simulated telesurgery system. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:596-599 [Conf]
  42. Yanjiang Yang, Robert H. Deng, Feng Bao
    Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:177-192 [Conf]
  43. Robert H. Deng, Yanjiang Yang
    Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:284-300 [Conf]
  44. Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi
    Modified Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:82-95 [Conf]
  45. Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen
    Rights Protection for Data Cubes. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:359-372 [Conf]
  46. Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon
    Security Analysis of Two Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:123-133 [Conf]
  47. Jianying Zhou, Feng Bao, Robert H. Deng
    Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:96-110 [Conf]
  48. Qibin Sun, Peirong Feng, Robert H. Deng
    An Optical Watermarking Solution for Authenticating Printed Documents. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:65-70 [Conf]
  49. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim
    On Security Notions of Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:137-151 [Conf]
  50. Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao
    Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:328-335 [Conf]
  51. Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Anonymous Secure Routing in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:102-108 [Conf]
  52. Ying Qiu, Jianying Zhou, Robert H. Deng
    Security Analysis and Improvement of Return Routability Protocol. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:174-181 [Conf]
  53. Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao
    A flexible and scalable authentication scheme for JPEG2000 image codestreams. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2003, pp:433-441 [Conf]
  54. Feng Bao, Robert H. Deng
    A Signcryption Scheme with Signature Directly Verifiable by Public Key. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:55-59 [Conf]
  55. Feng Bao, Robert H. Deng
    A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:1-11 [Conf]
  56. Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu
    Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:153-164 [Conf]
  57. Hongjun Wu, Feng Bao, Robert H. Deng
    Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:173-179 [Conf]
  58. Jianying Zhou, Robert H. Deng, Feng Bao
    Some Remarks on a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:46-57 [Conf]
  59. Feng Bao, Robert H. Deng, Jianying Zhou
    Electronic Payment Systems with Fair On-line Verification. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:451-460 [Conf]
  60. Yongdong Wu, Feng Bao, Robert H. Deng
    Secure Person-To-Person Communications Based on Biometrics Signals. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:205-222 [Conf]
  61. Yongdong Wu, Tieyan Li, Robert H. Deng
    Protecting Group Dynamic Information in Large Scale Multicast Groups. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:459-476 [Conf]
  62. Yanjiang Yang, Feng Bao, Robert H. Deng
    A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:95-112 [Conf]
  63. Yingjiu Li, Haibing Lu, Robert H. Deng
    Practical Inference Control for Data Cubes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:115-120 [Conf]
  64. Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair
    Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:115-124 [Conf]
  65. Guilin Wang, Jianying Zhou, Robert H. Deng
    On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:289-298 [Conf]
  66. Yanjiang Yang, Feng Bao, Robert H. Deng
    Flexible authentication of images. [Citation Graph (0, 0)][DBLP]
    VCIP, 2003, pp:1905-1911 [Conf]
  67. Robert H. Deng, Jian Hu, Feng Bao, A. Desai Narasimhalu
    A Ubiquitous Secure and Reliable Digital Data Depository System. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:354-358 [Conf]
  68. Yunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao
    Practical Zero-Knowledge Arguments from Sigma-Protocols. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:288-298 [Conf]
  69. Kisenchand Ranai, Koon Seng Lim, Robert H. Deng
    Simulating a Multimedia FDDI Backbone Network. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1994, v:37, n:3, pp:188-198 [Journal]
  70. Feng Bao, Robert H. Deng
    Protocols that hide user's preferences in electronic transactions. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:4, pp:503-515 [Journal]
  71. Jiangling Du, Robert H. Deng, Chi Chung Ko
    Performance Analysis of Interconnected LANs with Server/Client Configuration. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1993, v:25, n:12, pp:1321-1333 [Journal]
  72. Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim
    Highly reliable trust establishment scheme in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:45, n:6, pp:687-699 [Journal]
  73. Xian-Yu Zhang, Robert H. Deng
    Gateway Design for LAN Interconnection via ISDN. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1990, v:19, n:1, pp:43-51 [Journal]
  74. Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang
    Efficient and robust key management for large mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:4, pp:657-682 [Journal]
  75. Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng
    Routing optimization security in mobile IPv6. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:13, pp:2401-2419 [Journal]
  76. Brigitte Berg, Robert H. Deng
    End-to-end performance of interconnected LANs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1991, v:14, n:2, pp:105-112 [Journal]
  77. Robert H. Deng
    Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:6, pp:591-0 [Journal]
  78. Robert H. Deng, Wendy C. L. Chiew
    Effects of station buffer capacity on token ring network performance. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1993, v:16, n:6, pp:366-375 [Journal]
  79. Robert H. Deng, Renben Shu
    LAN-based medical visualization communication system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1993, v:16, n:8, pp:518-525 [Journal]
  80. Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang
    Performance of a token-passing system with batch arrivals and its application to file transfers. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1993, v:16, n:7, pp:422-431 [Journal]
  81. Chi Chung Ko, W. C. Wong, J. L. Du, Robert H. Deng, Kin Mun Lye
    Performance analysis of two bridged CSMA/CD networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1993, v:16, n:8, pp:501-510 [Journal]
  82. Koon Seng Lim, Robert H. Deng, Kisenchand Ranai
    Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:4, pp:251-256 [Journal]
  83. Xinkai Wang, Robert H. Deng, Feng Bao
    Multicast Internet protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:11, pp:1047-1054 [Journal]
  84. Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng
    New efficient user identification and key distribution scheme providing enhanced security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:697-704 [Journal]
  85. Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng
    A secure extension of the Kwak-Moon group signcryption scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:435-444 [Journal]
  86. Shen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao
    Three architectures for trusted data dissemination in edge computing. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2006, v:58, n:3, pp:381-409 [Journal]
  87. Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng
    Generic yet Practical ZK Arguments from any Public-Coin HVZK [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2005, v:, n:162, pp:- [Journal]
  88. Jianying Zhou, Feng Bao, Robert H. Deng
    Minimizing TTP's involvement in signature validation. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:1, pp:37-47 [Journal]
  89. Hongjun Wu, Feng Bao, Robert H. Deng
    Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
  90. Robert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang
    Practical Protocols for Certified Electronic Mail. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 1996, v:4, n:3, pp:- [Journal]
  91. Robert H. Deng, Aurel A. Lazar, Weiguo Wang
    A Probabilistic Approach to Fault Diagnosis in Linear Lightware Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:9, pp:1438-1448 [Journal]
  92. Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu
    Scalable trusted online dissemination of JPEG2000 images. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:1, pp:60-67 [Journal]
  93. Robert H. Deng, Shailendra K. Bhonsle, Weiguo Wang, Aurel A. Lazar
    Integrating Security in the CORBA Architecture. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1997, v:3, n:1, pp:3-13 [Journal]
  94. Robert H. Deng, Daniel J. Costello Jr.
    Decoding of DBEC-TBED Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1987, v:36, n:11, pp:1359-1363 [Journal]
  95. Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen
    New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:9, pp:1071-1080 [Journal]
  96. Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen
    New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:12, pp:1473-1483 [Journal]
  97. Yongdong Wu, Robert H. Deng
    Security of an ill-posed operator for image authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2005, v:15, n:1, pp:161-163 [Journal]
  98. Yanjiang Yang, Robert H. Deng, Feng Bao
    A Practical Password-Based Two-Server Authentication and Key Exchange System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:2, pp:105-114 [Journal]
  99. Robert H. Deng, Mark A. Herro
    DC-free coset codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:4, pp:786-792 [Journal]
  100. Yuan Xing Li, Robert H. Deng, Xin-mei Wang
    On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:271-0 [Journal]
  101. Steven S. Pietrobon, Robert H. Deng, Alain Lafanechére, Gottfried Ungerboeck, Daniel J. Costello Jr.
    Trellis-coded multidimensional phase modulation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:1, pp:63-89 [Journal]
  102. Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang
    Tailored reversible watermarking schemes for authentication of electronic clinical atlas. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Technology in Biomedicine, 2005, v:9, n:4, pp:554-563 [Journal]
  103. Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng
    A smart-card-enabled privacy preserving E-prescription system. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Technology in Biomedicine, 2004, v:8, n:1, pp:47-58 [Journal]
  104. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1309-1311 [Journal]
  105. Yongdong Wu, Robert H. Deng
    Scalable authentication of MPEG-4 streams. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:1, pp:152-161 [Journal]
  106. Yongdong Wu, Feng Bao, Robert H. Deng
    Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:171-183 [Conf]
  107. Yanjiang Yang, Yingjiu Li, Robert H. Deng
    New Paradigm of Inference Control with Trusted Computing. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:243-258 [Conf]
  108. Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel
    n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:31-43 [Conf]
  109. Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Providing efficient certification services against active attacks in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:285-292 [Conf]
  110. Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda
    Access control protocols with two-layer architecture for wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:655-670 [Journal]

  111. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. [Citation Graph (, )][DBLP]


  112. Conditional Proxy Broadcast Re-Encryption. [Citation Graph (, )][DBLP]


  113. Revisiting Unpredictability-Based RFID Privacy Models. [Citation Graph (, )][DBLP]


  114. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. [Citation Graph (, )][DBLP]


  115. RFID privacy: relation between two notions, minimal condition, and efficient construction. [Citation Graph (, )][DBLP]


  116. Conditional proxy re-encryption secure against chosen-ciphertext attack. [Citation Graph (, )][DBLP]


  117. Practical ID-based encryption for wireless sensor network. [Citation Graph (, )][DBLP]


  118. Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. [Citation Graph (, )][DBLP]


  119. Efficient CCA-Secure PKE from Identity-Based Techniques. [Citation Graph (, )][DBLP]


  120. On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. [Citation Graph (, )][DBLP]


  121. Privacy-enhanced superdistribution of layered content with trusted access control. [Citation Graph (, )][DBLP]


  122. A New Framework for RFID Privacy. [Citation Graph (, )][DBLP]


  123. Efficient Client-to-Client Password Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  124. Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. [Citation Graph (, )][DBLP]


  125. Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  126. Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. [Citation Graph (, )][DBLP]


  127. On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. [Citation Graph (, )][DBLP]


  128. Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. [Citation Graph (, )][DBLP]


  129. Private Query on Encrypted Data in Multi-user Settings. [Citation Graph (, )][DBLP]


  130. Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. [Citation Graph (, )][DBLP]


  131. RSA-Based Certificateless Public Key Encryption. [Citation Graph (, )][DBLP]


  132. Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. [Citation Graph (, )][DBLP]


  133. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. [Citation Graph (, )][DBLP]


  134. Distinguishing between FE and DDoS Using Randomness Check. [Citation Graph (, )][DBLP]


  135. An Efficient PIR Construction Using Trusted Hardware. [Citation Graph (, )][DBLP]


  136. Efficient and Practical Fair Exchange Protocols with Off-Line TTP. [Citation Graph (, )][DBLP]


  137. Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. [Citation Graph (, )][DBLP]


  138. Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. [Citation Graph (, )][DBLP]


  139. Attacks and improvements to an RIFD mutual authentication protocol and its extensions. [Citation Graph (, )][DBLP]


  140. Efficient Unidirectional Proxy Re-Encryption. [Citation Graph (, )][DBLP]


  141. Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. [Citation Graph (, )][DBLP]


  142. Remote Attestation on Function Execution (Work-in-Progress). [Citation Graph (, )][DBLP]


  143. On the validity of digital signatures. [Citation Graph (, )][DBLP]


  144. Efficient discrete logarithm based multi-signature scheme in the plain public key model. [Citation Graph (, )][DBLP]


Search in 0.048secs, Finished in 0.054secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002