The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chunming Rong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Anne Marie Hegland, Eli Winjum, Pål Spilling, Chunming Rong, Øivind Kure
    Analysis of IBS for MANET Security in Emergency and Rescue Operations. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:155-159 [Conf]
  2. Chunming Rong, Won-Chol Kim
    Effective Storage Security in Incompletely Trusted Environment. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:432-437 [Conf]
  3. Janne Merete Hagen, Tormod Kalberg Sivertsen, Chungming Rong
    Information Security Threats and Access Control Practices in Norwegian Businesses. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:470-476 [Conf]
  4. Chunming Rong, Hein Meling, Dagfinn Waage
    Towards Integrated Services for Health Monitoring. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:776-781 [Conf]
  5. Christian Veigner, Chunming Rong
    On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:521-530 [Conf]
  6. Geng Yang, Chunming Rong, Yunping Dai
    A Distributed Honeypot System for Grid Security. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:1083-1086 [Conf]
  7. Peng Jiang, Geng Yang, Chunming Rong
    Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2006, pp:794-797 [Conf]
  8. Peng Jiang, Geng Yang, Chunming Rong
    Combined Method for Nonlinear Systems of Equations. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:693-699 [Conf]
  9. Christian Veigner, Chunming Rong
    Flooding attack on the binding cache in mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:36-43 [Conf]
  10. Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong
    A Scalable Security Architecture for Grid. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:89-93 [Conf]
  11. Christian Veigner, Chunming Rong
    On Use of Identity-Based Encryption for Secure Emailing. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:289-296 [Conf]
  12. Kari Anne Haaland, Chunming Rong
    Securing Web Services Using Identity-Based Encryption (IBE). [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:413-418 [Conf]
  13. Iwan M. Duursma, Tor Helleseth, Chunming Rong, Kyeongcheol Yang
    Split Weight Enumerators for the Preparata Codes with Applications to Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:18, n:1/3, pp:103-124 [Journal]
  14. Tor Helleseth, Chunming Rong, Kyeongcheol Yang
    On t-designs from codes over Z4. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2001, v:238, n:1-3, pp:67-80 [Journal]
  15. Tor Helleseth, Chunming Rong, Kyeongcheol Yang
    New 3-designs from Goethals codes over Z4. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2001, v:226, n:1-3, pp:403-409 [Journal]
  16. Stig Fr. Mjølsnes, Chunming Rong
    On-Line E-Wallet System with Decentralized Credential Keepers. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:1, pp:87-99 [Journal]
  17. Tor Helleseth, Chunming Rong, Daniel Sandberg
    New Families of Almost Perfect Nonlinear Power Mappings. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:475-485 [Journal]
  18. Chunming Rong, Tor Helleseth, Jyrki T. Lahtonen
    On algebraic decoding of the Z4-linear Calderbank-McGuire code. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:5, pp:1423-1434 [Journal]
  19. Son Thanh Nguyen, Chunming Rong
    ZigBee Security Using Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:3-12 [Conf]
  20. Son Thanh Nguyen, Chunming Rong
    Electronic Payment Scheme Using Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:330-337 [Conf]
  21. Tor Helleseth, Chunming Rong, Kyeongcheol Yang
    New infinite families of 3-designs from preparata codes over Z4. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1999, v:195, n:1-3, pp:139-156 [Journal]

  22. Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors. [Citation Graph (, )][DBLP]


  23. IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  24. Data Integration in Oil and Gas at Norwegian Continental Shelf. [Citation Graph (, )][DBLP]


  25. SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  26. An Integrated Information Sharing Structure for Resuscitation Data. [Citation Graph (, )][DBLP]


  27. Di-GAFR: Directed Greedy Adaptive Face-Based Routing. [Citation Graph (, )][DBLP]


  28. SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  29. Bayesian Networks for Fault Detection under Lack of Historical Data. [Citation Graph (, )][DBLP]


  30. Towards Dataintegration from WITSML to ISO 15926. [Citation Graph (, )][DBLP]


  31. RFID System Security Using Identity-Based Cryptography. [Citation Graph (, )][DBLP]


  32. Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding. [Citation Graph (, )][DBLP]


  33. Secure many to many routing for wireless sensor and actuator networks. [Citation Graph (, )][DBLP]


  34. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. [Citation Graph (, )][DBLP]


  35. Industrial Cloud: Toward Inter-enterprise Integration. [Citation Graph (, )][DBLP]


  36. Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges. [Citation Graph (, )][DBLP]


  37. An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf. [Citation Graph (, )][DBLP]


  38. DataStorm. [Citation Graph (, )][DBLP]


  39. An efficient approach to intelligent real-time monitoring using ontologies and Hadoop. [Citation Graph (, )][DBLP]


  40. Deployment models: Towards eliminating security concerns from cloud computing. [Citation Graph (, )][DBLP]


  41. A survey of key management in ad hoc networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002