Search the dblp DataBase
Dengguo Feng :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Gang Yao , Dengguo Feng Proxy Oblivious Transfer Protocol. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:190-197 [Conf ] Zhenfeng Zhang , Duncan S. Wong , Jing Xu , Dengguo Feng Certificateless Public-Key Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:293-308 [Conf ] Gang Yao , Kui Ren , Feng Bao , Robert H. Deng , Dengguo Feng Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:343-356 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Feng Bao Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:303-309 [Conf ] Fan Zhang , Dengguo Feng Identity-based PKI Scheme for Machine Readable Travel Document. [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:461-465 [Conf ] Bin Zhang , Dengguo Feng New Guess-and-Determine Attack on the Self-Shrinking Generator. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:54-68 [Conf ] Jing Xu , Zhenfeng Zhang , Dengguo Feng ID-Based Aggregate Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:110-119 [Conf ] Zhenfeng Zhang , Jing Xu , Dengguo Feng Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:200-210 [Conf ] Xin Lü , Dengguo Feng An Arbitrated Quantum Message Signature Scheme. [Citation Graph (0, 0)][DBLP ] CIS, 2004, pp:1054-1060 [Conf ] Zaiqiang Liu , Dengguo Feng Incremental Fuzzy Decision Tree-Based Network Forensic System. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:995-1002 [Conf ] Peng Wang , Dengguo Feng , Wenling Wu HCTR: A Variable-Input-Length Enciphering Mode. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:175-188 [Conf ] Dengguo Feng , Ji Xiang Experiences on Intrusion Tolerance Distributed Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:270-271 [Conf ] Yuqing Zhang , Xiuying Liu , Dengguo Feng An approach to the formal verification of the three-principal security protocols. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:163-169 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Feng Bao A Fast Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2005, pp:72-86 [Conf ] Xiaoyun Wang , Xuejia Lai , Dengguo Feng , Hui Chen , Xiuyuan Yu Cryptanalysis of the Hash Functions MD4 and RIPEMD. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:1-18 [Conf ] Wenling Wu , Bao Li , Dengguo Feng , Sihan Qing Cryptanalysis of some AES Candidate Algorithms. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:13-21 [Conf ] Zhen Xu , Dengguo Feng , Lan Li , Hua Chen UC-RBAC: A Usage Constrained Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:337-347 [Conf ] Zhenfeng Zhang , Dengguo Feng , Jing Xu , Yongbin Zhou Efficient ID-Based Optimistic Fair Exchange with Provable Security. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:14-26 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Feng Bao Security Analysis of the Generalized Self-shrinking Generator. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:388-400 [Conf ] Hua Chen , Dengguo Feng An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:352-361 [Conf ] Wenling Wu , Wentao Zhang , Dengguo Feng Integral Cryptanalysis of Reduced FOX Block Cipher. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:229-241 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Hong Wang Weaknesses of COSvd (2, 128) Stream Cipher. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:270-283 [Conf ] Purui Su , Dengguo Feng The Design of an Artificial Immune System. [Citation Graph (0, 0)][DBLP ] ICN/ICONS/MCL, 2006, pp:195- [Conf ] Haipeng Qu , Purui Su , Dongdai Lin , Dengguo Feng A Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:964-971 [Conf ] Purui Su , Dequan Li , Haipeng Qu , Dengguo Feng Detecting the Deviations of Privileged Process Execution. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:980-988 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Feng Bao Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:73-83 [Conf ] Peng Wang , Dengguo Feng , Wenling Wu Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:280-286 [Conf ] Hong Wang , Yuqing Zhang , Dengguo Feng Short Threshold Signature Schemes Without Random Oracles. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:297-310 [Conf ] Jing Xu , Zhenfeng Zhang , Dengguo Feng ID-Based Proxy Signature Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:359-367 [Conf ] Zhenfeng Zhang , Dengguo Feng Efficient Fair Certified E-Mail Delivery Based on RSA. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:368-377 [Conf ] Liwu Zhang , Dengguo Feng Intrusion Tolerant CA Scheme with Cheaters Detection Ability. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:378-386 [Conf ] Peng Wang , Dengguo Feng , Wenling Wu On the Security of Tweakable Modes of Operation: TBC and TAE. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:274-287 [Conf ] Xianfeng Zhao , Yingxia Dai , Dengguo Feng A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:204-217 [Conf ] Xianfeng Zhao , Yingxia Dai , Dengguo Feng Towards the Public but Noninvertible Watermarking. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:218-231 [Conf ] Yan Zhu , Dengguo Feng , Wei Zou Collusion Secure Convolutional Spread Spectrum Fingerprinting. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:67-83 [Conf ] Wenling Wu , Dengguo Feng , Hua Chen Collision Attack and Pseudorandomness of Reduced-Round Camellia. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:252-266 [Conf ] Jianchun Jiang , Weifeng Chen , Sihan Qing , Dengguo Feng The Defense Framework for Large-scale Computer Network System. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:69-78 [Conf ] Wang Mingsheng , Sihan Qing , Dengguo Feng A Simple Algorithm for Computing Several Sequences Synthesis. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:211-220 [Conf ] Shaoquan Jiang , Dengguo Feng , Sihan Qing Analysis and Design of E-voting Protocol. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:281-290 [Conf ] Wenling Wu , Dengguo Feng , Sihan Qing Power Analysis of RC6 and Serpent. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:201-209 [Conf ] Honggang Hu , Dengguo Feng On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences. [Citation Graph (0, 0)][DBLP ] SETA, 2004, pp:185-196 [Conf ] Honggang Hu , Lei Hu , Dengguo Feng On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. [Citation Graph (0, 0)][DBLP ] SETA, 2006, pp:199-208 [Conf ] Zhi Ma , Xin Lu , Keqin Feng , Dengguo Feng On Non-binary Quantum BCH Codes. [Citation Graph (0, 0)][DBLP ] TAMC, 2006, pp:675-683 [Conf ] Jing Xu , Zhenfeng Zhang , Dengguo Feng A Ring Signature Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:160-169 [Conf ] Gang Yao , Dengguo Feng A New k-Anonymous Message Transmission Protocol. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:388-399 [Conf ] Yunlei Zhao , Jesper Buus Nielsen , Robert H. Deng , Dengguo Feng Generic yet Practical ZK Arguments from any Public-Coin HVZK [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 2005, v:, n:162, pp:- [Journal ] Qingguang Ji , Sihan Qing , Yongbin Zhou , Dengguo Feng Study on Strand Space Model Theory. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:5, pp:553-570 [Journal ] Hong-Da Li , Dongyao Ji , Dengguo Feng , Bao Li Oblivious Polynomial Evaluation. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2004, v:19, n:4, pp:550-554 [Journal ] Hong-Da Li , Xiong Yang , Dengguo Feng , Bao Li Distributed Oblivious Function Evaluation and Its Applications. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2004, v:19, n:6, pp:942-947 [Journal ] Rui Xue , Dengguo Feng New Semantic Model for Authentication Protocols in ASMs. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2004, v:19, n:4, pp:555-563 [Journal ] Dengguo Feng , Xiaoyun Wang Progress and Prospect of Some Fundamental Research on Information Security in China. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2006, v:21, n:5, pp:740-755 [Journal ] Dengguo Feng Three Characterizations of Correlation-immune Functions over Rings ZN . [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:37-43 [Journal ] Honggang Hu , Dengguo Feng , Wenling Wu Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2260-2265 [Journal ] Zhongwei Sun , Dengguo Feng , Chuankun Wu DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory. [Citation Graph (0, 0)][DBLP ] Journal of Computer Research and Development, 2006, v:43, n:11, pp:1920-1926 [Journal ] Xiao feng Li , Feng Deng Guo Composing Administrative Scope of Delegation Policies based on extended XACML. [Citation Graph (0, 0)][DBLP ] EDOC, 2006, pp:467-470 [Conf ] Hua Chen , Wenling Wu , Dengguo Feng Differential Fault Analysis on CLEFIA. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:284-295 [Conf ] Rui Xue , Dengguo Feng Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:239-253 [Conf ] Wentao Zhang , Wenling Wu , Dengguo Feng New Results on Impossible Differential Cryptanalysis of Reduced AES. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:239-250 [Conf ] Bin Zhang , Dengguo Feng Multi-pass Fast Correlation Attack on Stream Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:234-248 [Conf ] Wentao Zhang , Wenling Wu , Lei Zhang , Dengguo Feng Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:15-27 [Conf ] Wen-Ling Wu , Wentao Zhang , Dengguo Feng Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:449-456 [Journal ] Improved Client-to-Client Password-Authenticated Key Exchange Protocol. [Citation Graph (, )][DBLP ] On the Unprovable Security of 2-Key XCBC. [Citation Graph (, )][DBLP ] Efficient Anonymous Electronic Metering Scheme. [Citation Graph (, )][DBLP ] Fault-tolerate Multiparty Electronic Contract Signing Protocol. [Citation Graph (, )][DBLP ] An Effective Genetic Algorithm for Self-Inverse S-Boxes. [Citation Graph (, )][DBLP ] Exploring Malware Behaviors Based on Environment Constitution. [Citation Graph (, )][DBLP ] Security of Truncated MACs. [Citation Graph (, )][DBLP ] Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. [Citation Graph (, )][DBLP ] Bring Efficient Connotation Expressible Policies to Trust Management. [Citation Graph (, )][DBLP ] Practical Rebound Attack on 12-Round Cheetah-256. [Citation Graph (, )][DBLP ] Related-Key Differential-Linear Attacks on Reduced AES-192. [Citation Graph (, )][DBLP ] Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. [Citation Graph (, )][DBLP ] On the Correctness of an Approach against Side-Channel Attacks. [Citation Graph (, )][DBLP ] Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. [Citation Graph (, )][DBLP ] Reconstructing a Packed DLL Binary for Static Analysis. [Citation Graph (, )][DBLP ] Privacy Preserving of Trust Management Credentials Based on Trusted Computing. [Citation Graph (, )][DBLP ] An Improved Fast Correlation Attack on Stream Ciphers. [Citation Graph (, )][DBLP ] Cryptanalysis of the LANE Hash Function. [Citation Graph (, )][DBLP ] Real-Time Remote Attestation with Privacy Protection. [Citation Graph (, )][DBLP ] Research on Malicious Transaction Processing Method of Database System. [Citation Graph (, )][DBLP ] Fine-Grained Cloud DB Damage Examination Based on Bloom Filters. [Citation Graph (, )][DBLP ] SEPCOM: customizable zero copy model. [Citation Graph (, )][DBLP ] L-UCON: Towards Layered Access Control with UCON. [Citation Graph (, )][DBLP ] TBDRM: A TPM-Based Secure DRM Architecture. [Citation Graph (, )][DBLP ] An Anonymous Property-Based Attestation Protocol from Bilinear Maps. [Citation Graph (, )][DBLP ] BIFI: Architectural Support for Information Flow Integrity Measurement. [Citation Graph (, )][DBLP ] A Fast Implementation of Computing the Transparency Order of S-Boxes. [Citation Graph (, )][DBLP ] A New Direct Anonymous Attestation Scheme from Bilinear Maps. [Citation Graph (, )][DBLP ] A New Client-to-Client Password-Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP ] ReconBin: Reconstructing Binary File from Execution for Software Analysis. [Citation Graph (, )][DBLP ] Search in 0.096secs, Finished in 0.098secs