|
Search the dblp DataBase
Chunming Rong:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Anne Marie Hegland, Eli Winjum, Pål Spilling, Chunming Rong, Øivind Kure
Analysis of IBS for MANET Security in Emergency and Rescue Operations. [Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:155-159 [Conf]
- Chunming Rong, Won-Chol Kim
Effective Storage Security in Incompletely Trusted Environment. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:432-437 [Conf]
- Janne Merete Hagen, Tormod Kalberg Sivertsen, Chungming Rong
Information Security Threats and Access Control Practices in Norwegian Businesses. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:470-476 [Conf]
- Chunming Rong, Hein Meling, Dagfinn Waage
Towards Integrated Services for Health Monitoring. [Citation Graph (0, 0)][DBLP] AINA Workshops (2), 2007, pp:776-781 [Conf]
- Christian Veigner, Chunming Rong
On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:521-530 [Conf]
- Geng Yang, Chunming Rong, Yunping Dai
A Distributed Honeypot System for Grid Security. [Citation Graph (0, 0)][DBLP] GCC (1), 2003, pp:1083-1086 [Conf]
- Peng Jiang, Geng Yang, Chunming Rong
Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (1), 2006, pp:794-797 [Conf]
- Peng Jiang, Geng Yang, Chunming Rong
Combined Method for Nonlinear Systems of Equations. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (4), 2006, pp:693-699 [Conf]
- Christian Veigner, Chunming Rong
Flooding attack on the binding cache in mobile IPv6. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:36-43 [Conf]
- Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong
A Scalable Security Architecture for Grid. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:89-93 [Conf]
- Christian Veigner, Chunming Rong
On Use of Identity-Based Encryption for Secure Emailing. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:289-296 [Conf]
- Kari Anne Haaland, Chunming Rong
Securing Web Services Using Identity-Based Encryption (IBE). [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:413-418 [Conf]
- Iwan M. Duursma, Tor Helleseth, Chunming Rong, Kyeongcheol Yang
Split Weight Enumerators for the Preparata Codes with Applications to Designs. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1999, v:18, n:1/3, pp:103-124 [Journal]
- Tor Helleseth, Chunming Rong, Kyeongcheol Yang
On t-designs from codes over Z4. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2001, v:238, n:1-3, pp:67-80 [Journal]
- Tor Helleseth, Chunming Rong, Kyeongcheol Yang
New 3-designs from Goethals codes over Z4. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2001, v:226, n:1-3, pp:403-409 [Journal]
- Stig Fr. Mjølsnes, Chunming Rong
On-Line E-Wallet System with Decentralized Credential Keepers. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:1, pp:87-99 [Journal]
- Tor Helleseth, Chunming Rong, Daniel Sandberg
New Families of Almost Perfect Nonlinear Power Mappings. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:475-485 [Journal]
- Chunming Rong, Tor Helleseth, Jyrki T. Lahtonen
On algebraic decoding of the Z4-linear Calderbank-McGuire code. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:5, pp:1423-1434 [Journal]
- Son Thanh Nguyen, Chunming Rong
ZigBee Security Using Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:3-12 [Conf]
- Son Thanh Nguyen, Chunming Rong
Electronic Payment Scheme Using Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:330-337 [Conf]
- Tor Helleseth, Chunming Rong, Kyeongcheol Yang
New infinite families of 3-designs from preparata codes over Z4. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1999, v:195, n:1-3, pp:139-156 [Journal]
Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors. [Citation Graph (, )][DBLP]
IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. [Citation Graph (, )][DBLP]
Data Integration in Oil and Gas at Norwegian Continental Shelf. [Citation Graph (, )][DBLP]
SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. [Citation Graph (, )][DBLP]
An Integrated Information Sharing Structure for Resuscitation Data. [Citation Graph (, )][DBLP]
Di-GAFR: Directed Greedy Adaptive Face-Based Routing. [Citation Graph (, )][DBLP]
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. [Citation Graph (, )][DBLP]
Bayesian Networks for Fault Detection under Lack of Historical Data. [Citation Graph (, )][DBLP]
Towards Dataintegration from WITSML to ISO 15926. [Citation Graph (, )][DBLP]
RFID System Security Using Identity-Based Cryptography. [Citation Graph (, )][DBLP]
Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding. [Citation Graph (, )][DBLP]
Secure many to many routing for wireless sensor and actuator networks. [Citation Graph (, )][DBLP]
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. [Citation Graph (, )][DBLP]
Industrial Cloud: Toward Inter-enterprise Integration. [Citation Graph (, )][DBLP]
Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges. [Citation Graph (, )][DBLP]
An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf. [Citation Graph (, )][DBLP]
DataStorm. [Citation Graph (, )][DBLP]
An efficient approach to intelligent real-time monitoring using ontologies and Hadoop. [Citation Graph (, )][DBLP]
Deployment models: Towards eliminating security concerns from cloud computing. [Citation Graph (, )][DBLP]
A survey of key management in ad hoc networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.304secs
|